Question

In: Computer Science

The Vigenère Cipher is an encryption algorithm that combines the use of a keyword with the...

The Vigenère Cipher is an encryption algorithm that combines the use of a keyword with the message to be encrypted. A tableau is provided that shows an encrypted character for each combination of characters in the message and the keyword.

Using the Vigenère Tableau encryption scheme with a keyword of KEYWORD, encrypt the following message:

IS INFORMATION SECURITY ESSENTIAL

After encrypting the message, decrypt the following message, using KEYWORD as the keyword:

YRJUW WWRIG JTFUW ERECE LCMKL CIWKR R

For both the encryption and decryption, show your work in a Microsoft Word document to substantiate the result. For this, create two different tables. The first table will have 3 rows and 30 columns. Each column will correspond to an individual character. The first row will correspond to the keyword characters. The second row will correspond to the message to be encrypted. The third row will correspond to the encrypted message.

The second table will have 3 rows and 31 columns. Each column will correspond to an individual character. The first row will correspond to the keyword characters. The second row will correspond to the message to be decrypted. The third row will correspond to the decrypted message.

Solutions

Expert Solution

Encryption
Here we use the following table to encrypt the message

Now we have Plain text IS INFORMATION SECURITY ESSENTIAL
And keyword : KEYWORD
Now first we genrate the key


For generating key, the given keyword is repeated in a circular manner until it matches the length of the plain text.
The keyword "KEYWORD" generates the key KE YWORDKEYWOR DKEYWORD KEYWORDKE

The first letter of the plaintext, I is paired with K, the first letter of the key. So use row I and column K of the Vigenère square, namely .S

Then second latter of the plaintext S, is paired with E, the second latter of the key . So use row S and column E of the Vigenere Square, namely. W

Then Third latter of the plaintext I, is paired with Y, the Third latter of the key . So use row I and column Yof the Vigenere Square, namely. G

The rest of the plaintext is enciphered in a similar fashion.
Plain text: IS INFORMATION SECURITY ESSENTIAL  
Keyword : KE YWORDKEYWOR DKEYWORD KEYWORDKE


The first row will correspond to the keyword characters. The second row will correspond to the message to be encrypted. The third row will correspond to the encrypted message.

Decryption

Decryption is performed by going to the row in the table corresponding to the key, finding the position of the ciphertext letter in this row, and then using the column’s label as the plaintext.

Cipher text is: YRJUW WWRIG JTFUW ERECE LCMKL CIWKR R
Keyword : KEYWO DKEYW RDKEY ORDKE WORDK YWORD E


now first letter of the key K as row and look for the first cipher text letter Y and takes Y's column value we get O as plain text
now take secont latter Of the keyword E and look for the second cipher text letter R and takes R' column value we get N as palin text


The rest of the ciphertext decipher in similar fasion

The first row will correspond to the keyword characters. The second row will correspond to the message to be decrypted and thid row correspond to plain text.

If you have any query regarding the answer please ask me in the comment i am here for help you. Please do not direct thumbs down just ask if you have any query. And if you like my work then please appreciates with up vote. Thank You.



Related Solutions

The mathematical expression of the encryption and decryption process of a Caesar cipher algorithm is expressed...
The mathematical expression of the encryption and decryption process of a Caesar cipher algorithm is expressed respectively as: c=Ep, k=p+k%26                                                                                                                         (1) p=Dc,k=c-k%26                                                                                                                         (2) Please do the following: Write at least two paragraphs to explain the principle of operation of the algorithm. For a full credit, your explanation must show the architectural diagram of the encryption and decryption process. Write a program to implement the Caesar algorithm Code must have two functions; encryption and decryption Test your codes with p as...
Question The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and...
Question The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”. Write Java or Python code to implement either Monoalphabetic cipher or Hill cipher or Transposition Cipher (Encryption and Decryption) and test your code on given plaintext. User may enter value of key at the command prompt, if required.
The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”....
The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”. Write Java code to implement Shift cipher (Encryption and Decryption) and test your code on given plaintext. Your code must meet following conditions. 1. User must enter the value of key from command prompt and print it at command prompt. 2. Print the cipher text and the plaintext at the command prompt after encryption and decryption. 3. Test your algorithm for 5 different key...
!) Vigenere cipher Encode the text manybooksoninformationsecurity using the Vigenere cipher with the keyword fun
!) Vigenere cipher Encode the text manybooksoninformationsecurity using the Vigenere cipher with the keyword fun
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
Consider a sorting algorithm that combines merge sort and insertion sort algorithm. We still use divide...
Consider a sorting algorithm that combines merge sort and insertion sort algorithm. We still use divide and conquer like merge sort, however when the number of elements in an array is at most k elements (k is a parameter), we stop dividing the elements as the regular merge sort, instead, we call the insertion sort. Assuming we have defined the following two procedures: insertion-sort(A[p..q]) which sort the subarray A[p..q] merge(A[p,q,r]) which merges the sorted subarray A[p..r] and A[r+1..q] Try to...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is the ciphertext that corresponds to the plaintext CATSCANS
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
use C++ You will implement the following encryption and decryption functions/programs for the Caesar cipher. Provide...
use C++ You will implement the following encryption and decryption functions/programs for the Caesar cipher. Provide the following inputs and outputs for each function/program: EncryptCaesar Two inputs: A string of the plaintext to encrypt A key (a number) ▪ For the Caesar cipher: This will indicate how many characters to shift (e.g. for a key=3, A=>D, B=>E, ..., X=>A, Y=>B, Z=>C). Note that the shift is circular. One output: ◦ A string of the ciphertext or codeword DecryptCaesar Two inputs:...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT