Question

For the following question figure out what cipher was used to encode the following encrypted message....

For the following question figure out what cipher was used to encode the following encrypted message. The text has been encrypted using one of the following ciphers (Caesar, Rail Fence, Vigenere, or Playfair): Fc risdzwche mrw gcne. Fvm xyxfi-xoeboc dcelqztaqcbizq.

The key is also encoded: wsgmephmpiqqe (C+4)

The key is :

The message is:

The key was encrypted using a cipher, which is a simple substitution cipher.

The message was encoded using a cipher.

Homework Answers

Answer #1

I did  Caesar CIpher with help of python programming.

In ceaser cipher first did deciphering of key here i am attaching code and output-

k=4              #Value of key = 4
ct=['w','s','g','m','e','p','h','m','p','i','q','q','e']      #key in form of list
print("Encoded key:",ct)        #this wil print encoded key
print()
dec=[]
fpt=[]
for m in ct:
        dec.append((ord(m)-k-97)%26+97)    #this will decode encoded key in form of ASCII key and append to new list

for n in dec:
        fpt.append(chr(n))        #this will convert ASCII value to character and store in final list
        
print("The key is:",fpt)     #this will print Key.

also i am attaching code for message and screenshot of output-

k=4               #Value of key = 4

#message in form of list
ct=['f','c','r','i','s','d','z','w','c','h','e','m','r','w','g','c','n','e','F','v','m','x','y','x','f','i','x','o','e','b','o','c','d','c','e','l','q','z','t','a','q','c','b','i','z','q']

print("Encoded text:",ct)          #this wil print encoded message

print()

dec=[]

fpt=[]

for m in ct:

    dec.append((ord(m)-k-97)%26+97)     #this will decode encoded key in form of ASCII key and append to new list



for n in dec:

    fpt.append(chr(n))            #this will convert ASCII value to character and store in final list


print("The key is:",fpt)       #this will print message.

    

print("The message is:",fpt)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
2. Probability (30%). Figure out the probability in the following scenarios. (a) A number generator is...
2. Probability (30%). Figure out the probability in the following scenarios. (a) A number generator is able to generate an integer in the range of [1, 100], where each number has equal chances to be generated. What is the probability that a randomly generated number x is divisible by either 2 or 3, i.e., P(2 | x or 3 | x)? (5%) (b) In a course exam, there are 10 single-choice questions, each worthing 10 points and having 4 choices...
________ client-centered therapy centers on the patient's goals and ways of solving problems. Select one: a....
________ client-centered therapy centers on the patient's goals and ways of solving problems. Select one: a. Rogers' b. Freud's c. Beck d. Ellis Question 2 Not yet answered Points out of 1.00 Flag question Question text A frequently prescribed drug therapy for managing one's depression is ____________. Select one: a. Adderall b. Lithium c. Prozac d. Thorazine Question 3 Not yet answered Points out of 1.00 Flag question Question text A major goal of modern inpatient psychiatric treatment is: Select...
Department of Management Information Systems, Operations Management and Decision Sciences, University of Dayton, Dayton, Ohio 45419,...
Department of Management Information Systems, Operations Management and Decision Sciences, University of Dayton, Dayton, Ohio 45419, [email protected] Hub Group, a North American intermodal freight rail transportation company, developed an integrated produc- tion decision support system to improve its yield management and container allocation. The system combines a suite of analytical tools, including forecasting, error distribution analysis, expected value-based heuristics, and optimization tools to improve the decision making of Hub's frontline employees. It is important to note that the production decision...
Use the following data to select one best answer to the following question: What is the...
Use the following data to select one best answer to the following question: What is the gross profit for the low-rise office building project by applying Completed Contract method without absorption? A construction company began operations on January 2, 2010. During the year the company was awarded one construction contract of low-rise office building. The company incurred $100,000 operating expenses for the year for which $75,000 has been paid while the balance is owed as of December 31, 2010. Project...
step by step solution for the below question please Flag this Question Question 11 pts What...
step by step solution for the below question please Flag this Question Question 11 pts What is the difference between positive economics and normative economics? Group of answer choices Positive economics deals with dynamic systems, while normative economics focuses on static systems. Normative economics deals with how the world actually works, whereas positive economics focuses on what people ought to do. Positive economics requires making value judgments, while normative economics relies solely on factual statements. Normative economics applies in cases...
Use the following data to select one best answer to the following question: Which method shall...
Use the following data to select one best answer to the following question: Which method shall be used to determine percent complete for the low-rise office building project? A construction company began operations on January 2, 2010. During the year the company was awarded one construction contract of low-rise office building. The company incurred $100,000 operating expenses for the year for which $75,000 has been paid while the balance is owed as of December 31, 2010. Project data is summarized...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
Question 1 How is a residual calculated in a regression model? i.e. what is the meaning...
Question 1 How is a residual calculated in a regression model? i.e. what is the meaning of a residual? a)The difference between the actual value, y, and the fitted value, y-hat b)The difference between the fitted value, y-hat, and the mean, y-bar c)The difference between the actual value, y, and the mean, y-ba d)The square of the difference between the fitted value, y-hat, and the mean, y-bar Question 2 Larger values of r-squared imply that the observations are more closely...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime and criminology? a. Law in action departs substantially from the ideal behavior of the law. b. Focusing only on legally criminalized behavior makes it impossible to consider the impact of gender, race, age and ethnicity. c. Legalistic definitions ignore acts that cause great harm. d. The legalistic model suggests that these are absolute standards for judging right and wrong. e. All of the above....
1. Should content providers and advertisers panic because of ad blocking technology, or will consumers figure...
1. Should content providers and advertisers panic because of ad blocking technology, or will consumers figure out that the internet will collapse without advertising revenue? With the rise of Adblockers becoming more significant in everyday use content providers are understandably going to become panicked. From the webpage ‘Native Advertising Institute they explain just how much the use of Adblockers has increased. “eMarketer predicts 1 of every 3 Internet users will use ad blockers by 2017, more than twice the 15%...