0% found this document useful (0 votes)
13 views2 pages

Crypto Ass 2

Uploaded by

saif alkaabi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

Crypto Ass 2

Uploaded by

saif alkaabi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Name:……………………………………………………. ID:………………………………...

Classical Encryption Techniques

1. Encrypt the message using polyalphabetic Vigenere cipher, given key= ‘codebreaker’.
It was the threat of enemy interception that motivated the development of codes and
ciphers.

2. Decrypt the following cipher encrypted by Auto Vigenerekey cipher, given key = ‘try’.
MYCVPTJMGVJDOVKQLCUHSJFQTLU
3. One-way to solve the key distribution problem is to use a line from a book that both the sender
and the receiver possess. Typically, at least in spy novels, the first sentence of a book serves as
the key. The particular scheme discussed in this problem is from one of the best suspense novels
involving secret codes, talking to Strange Men, by Ruth Rendell. Work this problem without
consulting that book!
Consider the following message:
Cipher text: SIDKHKDM AF HCRKIABIE SHIME KD LFEAILA
This cipher text was produced using the first sentence of The Other Side of Silence (a book about
the spy Kim Philby):
Key:The snow lay thick on the steps and the snowflakes driven by the wind looked black in
the headlights of the cars.
A simple monoalphabetic substitution cipher was used.
What is the plain text?

4. Decrypt the following cipher text USING Rail fence algorithm.


T IIAET
HSSTS

5. Use Raw Transposition to encryptthe following


Plain: THESIMPLESTPOSSIBLETRANSPOSITIONSXX Key (R): 2 5 4 1

You might also like