1. Encrypt the message \"DO NOT TELL ANYONE\" using the rail fence cipher with k
ID: 3755497 • Letter: 1
Question
1. Encrypt the message "DO NOT TELL ANYONE" using the rail fence cipher withkey = 2.
2. Encrypt the message "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL
TAKE YOU EVERYWHERE." using the rail cipher with key = 4. Consider the "periods" in the message, part of your symbols.
3. Do a brute-force attack on the ciphertext "LAIEUFBTLESIUIF" to get the plaintext, knowing that a Rail Fence Cipher was used.
4. Do a brute-force attack on the ciphertext "IECTLKCOOAEIHL" to get the plaintext, knowing that a Rail Fence Cipher was used
5. Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?
1) They differ by one letter.
2) They are the same
3) They differ by two letters.
4) They differ by three letters,
1. Encrypt the message "DO NOT TELL ANYONE" using the rail fence cipher with
key = 2.
2. Encrypt the message "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL
TAKE YOU EVERYWHERE." using the rail cipher with key = 4. Consider the "periods" in the message, part of your symbols.
3. Do a brute-force attack on the ciphertext "LAIEUFBTLESIUIF" to get the plaintext, knowing that a Rail Fence Cipher was used.
4. Do a brute-force attack on the ciphertext "IECTLKCOOAEIHL" to get the plaintext, knowing that a Rail Fence Cipher was used
5. Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?
1) They differ by one letter.
2) They are the same
3) They differ by two letters.
4) They differ by three letters,
1. Encrypt the message "DO NOT TELL ANYONE" using the rail fence cipher with
key = 2.
2. Encrypt the message "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL
TAKE YOU EVERYWHERE." using the rail cipher with key = 4. Consider the "periods" in the message, part of your symbols.
3. Do a brute-force attack on the ciphertext "LAIEUFBTLESIUIF" to get the plaintext, knowing that a Rail Fence Cipher was used.
4. Do a brute-force attack on the ciphertext "IECTLKCOOAEIHL" to get the plaintext, knowing that a Rail Fence Cipher was used
5. Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?
1) They differ by one letter.
2) They are the same
3) They differ by two letters.
4) They differ by three letters,
Explanation / Answer
1."DO NOT TELL ANYONE" using the rail fence cipher with
key = 2.
Here no of columns will be total length of SENTENCE =15
Noof rows=key
step 1: make 15*2 matrix
step2 :
make zic-zac entry of letters i.e alternative up and down in diognal direction
like //////////////.
D
N
T
E
L
N
B
D
O
O
T
L
A
Y
O
Y
STEP3
Now to encode write it row wise
CIPHER TEXT=DNTELNBDOOTLAYOY
L
I
Y
M
I
A
I
E
E
R
O
W
L
T
O
O
A
.
M
N
T
W
L
K
Y
V
R
E
E
G
C
L
E
U
R
T
B
A
I
I
N
L
A
O
E
Y
H
I
G
F
O
G
O
T
U
W
2) "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL TAKE YOU EVERYWHERE
CIPHERED TEXT-LIYMIAIEEROWLTOOAMNTWLKYVREEGCLEURTBAIINLAOEYHIGFOGOTUW
3) LAIEUFBTLESIUIF
Brute force attack to crack means using heat and trial approach for rail fence cipher text.
I tried all level of decryption .At last decoded the message with 5 level(key).
DECODED MESSAGE ---> LIFEISBEAUTIFUL.(LIFE IS BEAUTIFUL)
4) IECTLKCOOAEIHL
DECRYPTED USING BRUTEFORCE METHORD
IECTLKCOOAEIHL ---> ILIKECHOCOLATE (I LIKE CHOCOLATE).
5) Consider the Rail Fence Cipher. If the key "k" is equal to the length of the plaintext. What is the relation between the plaintext and ciphertext?
2) THEY ARE SAME
Beacause all will be written diagonally down.and encrypted text will be made like diagonally down
example
Plain text = THUMBSUP Ciphered=THUMBSUP
T
H
U
M
B
S
U
p
HAVE A NICE DAY
!! TUBUPZHMSPL (KEY =2) !! : )
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.