Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Encrypt the message \"DO NOT TELL ANYONE\" using the rail fence cipher with k

ID: 3755497 • Letter: 1

Question

1. Encrypt the message "DO NOT TELL ANYONE" using the rail fence cipher with
key = 2.

2. Encrypt the message "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL
TAKE YOU EVERYWHERE." using the rail cipher with key = 4. Consider the "periods" in the message, part of your symbols.
3. Do a brute-force attack on the ciphertext "LAIEUFBTLESIUIF" to get the plaintext, knowing that a Rail Fence Cipher was used.
4. Do a brute-force attack on the ciphertext "IECTLKCOOAEIHL" to get the plaintext, knowing that a Rail Fence Cipher was used

5. Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?
1) They differ by one letter.
2) They are the same
3) They differ by two letters.
4) They differ by three letters,

1. Encrypt the message "DO NOT TELL ANYONE" using the rail fence cipher with
key = 2.

2. Encrypt the message "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL
TAKE YOU EVERYWHERE." using the rail cipher with key = 4. Consider the "periods" in the message, part of your symbols.
3. Do a brute-force attack on the ciphertext "LAIEUFBTLESIUIF" to get the plaintext, knowing that a Rail Fence Cipher was used.
4. Do a brute-force attack on the ciphertext "IECTLKCOOAEIHL" to get the plaintext, knowing that a Rail Fence Cipher was used

5. Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?
1) They differ by one letter.
2) They are the same
3) They differ by two letters.
4) They differ by three letters,

1. Encrypt the message "DO NOT TELL ANYONE" using the rail fence cipher with
key = 2.

2. Encrypt the message "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL
TAKE YOU EVERYWHERE." using the rail cipher with key = 4. Consider the "periods" in the message, part of your symbols.
3. Do a brute-force attack on the ciphertext "LAIEUFBTLESIUIF" to get the plaintext, knowing that a Rail Fence Cipher was used.
4. Do a brute-force attack on the ciphertext "IECTLKCOOAEIHL" to get the plaintext, knowing that a Rail Fence Cipher was used

5. Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?
1) They differ by one letter.
2) They are the same
3) They differ by two letters.
4) They differ by three letters,

Explanation / Answer

1."DO NOT TELL ANYONE" using the rail fence cipher with

    key = 2.

Here no of columns will be total length of SENTENCE =15

Noof rows=key

step 1: make 15*2 matrix

step2 :

make zic-zac entry of letters i.e alternative up and down in diognal direction

like //////////////.

D

N

T

E

L

N

B

D

O

O

T

L

A

Y

O

Y

STEP3

Now to encode write it row wise

CIPHER TEXT=DNTELNBDOOTLAYOY

L

I

Y

M

I

A

I

E

E

R

O

W

L

T

O

O

A

.

M

N

T

W

L

K

Y

V

R

E

E

G

C

L

E

U

R

T

B

A

I

I

N

L

A

O

E

Y

H

I

G

F

O

G

O

T

U

W

2) "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL TAKE YOU EVERYWHERE

CIPHERED TEXT-LIYMIAIEEROWLTOOAMNTWLKYVREEGCLEURTBAIINLAOEYHIGFOGOTUW

3) LAIEUFBTLESIUIF

Brute force attack to crack means using heat and trial approach for rail fence cipher text.

I tried all level of decryption .At last decoded the message with 5 level(key).

DECODED MESSAGE ---> LIFEISBEAUTIFUL.(LIFE IS BEAUTIFUL)

4) IECTLKCOOAEIHL

DECRYPTED USING BRUTEFORCE METHORD

IECTLKCOOAEIHL ---> ILIKECHOCOLATE (I LIKE CHOCOLATE).

5) Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?

2) THEY ARE SAME

Beacause all will be written diagonally down.and encrypted text will be made like diagonally down

example

Plain text = THUMBSUP      Ciphered=THUMBSUP

T

H

U

M

B

S

U

p

HAVE A NICE DAY

!! TUBUPZHMSPL (KEY =2) !! : )