Sprint? 2:23 PM 100% Done HW2_Spring2018A 1. Affine encryption: -7,b-9 ANDSOMYDE
ID: 3705113 • Letter: S
Question
Sprint? 2:23 PM 100% Done HW2_Spring2018A 1. Affine encryption: -7,b-9 ANDSOMYDE AATFTENETHINGUNUSUALFORY GOODWHENTHEYHAVESOOFTENBEENTHEAGENTSOFEVILANDITHINKTHA JWE FDPVE?JVHJMFDwHLGJALLWELEQVMTYWNWZMiLEJWXNWZPL.WMD ZDI?HGL.WMGLVO?JAL.FDDSMLwQLLWMGLJZLwMFDSLANUWENMGNwB MGIMNGIALSTISNILEPVKYDPNFLDSZNANW YVDTYWDMLODDB 2. Shift cneryption: Key- I IFYOUUSETHECODEWHICHIHAVEEXPLAINEDSAIDHOLMESYOUWILLFINDT HATITSIMPLYMEANSCOME HEREATONCEIWASCONVINCEDT?LATITWASANI NVITATIONWHICHHEWOULDNOTREFUSESINCEHEOOULDNEVERIMAGINET HATITCOULDCOMEFROMANYONEBUTTHELADY ESLETEDTXAWIXPLYDNZXPSPCPLEZYNPTHLDNZYGTYNPOESLETENLDLY TYGTELETZYHSTNSSPHZFWOYZECPOFDPDTYNPSPNZFWOYPGPCTXLRTYP ESLETENZFWONZXPOCZXLYJZYPMFEESPWLO 3. Hill encryption: matrix-13,0,02. 19,5,0·[O,0,733 THREEFORTYISOURTRAINANDIFANCYWESHOULDBEBACKINBAKERSTREE TFORDINNERTONIGHT FHCMRJONIVYNNMHDONESD Plain text THREEFORTYIS-(19, 7.17,4,4,5,14,17. 19, 24,8, 18) Cipher text FJPMU JaHDUow (5, 9, 15. 12. 20, 9, 16, 7, 3, 20, 14, 22) A. ?19, 7, 17).(4-4, 5).(14, 17, 19 B-05, 9, 15 (12, 20, 9), (16,7. 3% det(A) 17mod26, det(A)-23mod26 CAT-e-9.-6. 12)·(0, 19,-17). (-7, 1, 22]·((17, 20. 12). 10, 19, 9).(19. 25, 22W: A·?17, 0, 19, po, 19, 25). {12.9, 22) A det(A)A1.0, 21) (18, 21, 3). (16, 25, 12) A B ((3,0,0(0.5, 0), (0, 0, TH K 4. Vigenere Key [8,6Explanation / Answer
1) Affine Cipher
0 1 2 3 4 5 6 7 8 9 10 11 12
A B C D E F G H I J K L M
13 14 15 16 17 18 19 20 21 22 23 24 25
N O P Q R S T U V W X Y Z
ANDSOMYDEARWATSONWEHAVEENDEDBYTURNINGTHEDANCINGMENTOGOODWHENTHEYHAVESOOFTENBEENTHEAGENTSOFEVILANDITHINKTHATIHAVEFULFILLEDMYPROMISEOFGIVINGYOUSOMETHINGUNUSUALFORYOURNOTEBOOK
we want to encrypt above message using an affine cipher with encryption key (7, 9).
i. Using the table, we can represent the letters in our message with their corresponding numbers:
ii. Now we multiply each of the numbers from step i by the first number in the encryption key,
iii. Next, add the second number in the encryption key, (9 in this case), to each of the numbers from
iv. Now use the table to replace the numbers from step iii with their corresponding letters to obtain the
ciphertext:
JWEFDPVELJYHJMFDWHLGJALLWELEQVMTYWNWZMGLEJWXNWZPLWMDZDDEHGLWMGLVGJALFDDSMLWQLLWMGLJZLWMFDSLANIJWENMGNWBMGJMNGJALSTISNIILEPVKYDPNFLDSZNANWZVDTFDPLMGNWZTWTFTJISDYVDTYWDMLQDDB
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.