logo

Solved Assignments on Substitution Cipher, Caesar Cipher, Inverse Multiplication, Playfair Cipher and Columnar Transposition

   

Added on  2023-04-22

9 Pages1013 Words466 Views
University *****
Semester *****
Project
Student Name *****
Student ID ******
Submission Date *****
1

Table of Contents
QUESTION 1...................................................................................................................................................... 3
QUESTION 2...................................................................................................................................................... 7
QUESTION 3...................................................................................................................................................... 7
QUESTION 4...................................................................................................................................................... 8
2

Question 1
a)
a = num (F2) + 3* num (L1) +7
Where num(x) is the Latin alphabets (0-25)
F2 > second character of first name
L1> First character of last name
Encrypt plain text “Peter Bayiokos”
Substitution Cipher
A>0, B>1,C>2, D>3,E>4,F>5, G>6, H>7,I>8 J>9,K>10, L>11, M>12, N>13, O>14, P>15,
Q>16, R>17,S>18,T>19,U>20,V>21,W>22,X>23,Y>24,Z>25.
Caesar cipher,
P=Peter Bayiokos
K=3
C=(p+k) mod 26
C= 18 mod 26
C=18 = S
C=S
C=(p+K) mod 26
C=(4+3) mod 26
C=7 mod 26
C=7=H
C=(19+3) mod 26
C=22 mod 26
C=22=W
P=(4+3) mod 26
= 7 mod 26
= 7 = H
R =(17+3) mod 26
=20 mod 26
= 20 = U
B=(1+3) mod 26
= 4 mod 26
= 4=E
3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cryptology in practices
|7
|669
|35

Cryptography Tutorial with Examples and Exercises - Desklib
|20
|3498
|416

Affine Cipher and LFSR
|6
|865
|471

Security and Risk Management: Double DES Encryption and Cybersecurity Failure Report
|16
|3721
|400

Security in computing and information technology
|9
|1672
|462

Foundation of Cyber Security
|23
|5334
|304