Question

For the following question figure out what cipher was used to encode the following encrypted message....

For the following question figure out what cipher was used to encode the following encrypted message. The text has been encrypted using one of the following ciphers (Caesar, Rail Fence, Vigenere, or Playfair): Fc risdzwche mrw gcne. Fvm xyxfi-xoeboc dcelqztaqcbizq.

The key is also encoded: wsgmephmpiqqe (C+4)

The key is :

The message is:

The key was encrypted using a cipher, which is a simple substitution cipher.

The message was encoded using a cipher.

Homework Answers

Answer #1

I did  Caesar CIpher with help of python programming.

In ceaser cipher first did deciphering of key here i am attaching code and output-

k=4              #Value of key = 4
ct=['w','s','g','m','e','p','h','m','p','i','q','q','e']      #key in form of list
print("Encoded key:",ct)        #this wil print encoded key
print()
dec=[]
fpt=[]
for m in ct:
        dec.append((ord(m)-k-97)%26+97)    #this will decode encoded key in form of ASCII key and append to new list

for n in dec:
        fpt.append(chr(n))        #this will convert ASCII value to character and store in final list
        
print("The key is:",fpt)     #this will print Key.

also i am attaching code for message and screenshot of output-

k=4               #Value of key = 4

#message in form of list
ct=['f','c','r','i','s','d','z','w','c','h','e','m','r','w','g','c','n','e','F','v','m','x','y','x','f','i','x','o','e','b','o','c','d','c','e','l','q','z','t','a','q','c','b','i','z','q']

print("Encoded text:",ct)          #this wil print encoded message

print()

dec=[]

fpt=[]

for m in ct:

    dec.append((ord(m)-k-97)%26+97)     #this will decode encoded key in form of ASCII key and append to new list



for n in dec:

    fpt.append(chr(n))            #this will convert ASCII value to character and store in final list


print("The key is:",fpt)       #this will print message.

    

print("The message is:",fpt)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to...
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to meaningless characters, and decryption is used to transform meaningless characters into meaningful text. The algorithm that does the encryption is called a cipher. A simple encryption algorithm is Caesar cipher, which works as follows: replace each clear text letter by a letter chosen to be n places later in the alphabet. The number of places, n, is called the cipher key. For example, if...
Write the function decipher(s, frequencies), which will decipher a Caesar cipher encrypted string s using the...
Write the function decipher(s, frequencies), which will decipher a Caesar cipher encrypted string s using the letter frequencies in frequencies, and return the plaintext string. Here is a sample of how this function would be used: if __name__ == '__main__': # this file path works on my computer. # you will need to set this path to work on your computer! f = open('/Users/azs/code/bu/cs108/assignments/romeo.txt') text = f.read() f.close() d = letter_frequencies(text) s1 = 'h svun aptl h nv pu h...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations. 2 points    QUESTION 20 Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate. 2 points    QUESTION 21 Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH...
In the previous assessment, you used a static set of named variables to store the data...
In the previous assessment, you used a static set of named variables to store the data that was entered in a form to be output in a message. For this assessment, you will use the invitation.html file that you modified in the previous assessment to create a more effective process for entering information and creating invitations for volunteers. Rather than having to enter each volunteer and create an invitation one at a time, you will create a script that will...
step by step solution for the below question please Flag this Question Question 11 pts What...
step by step solution for the below question please Flag this Question Question 11 pts What is the difference between positive economics and normative economics? Group of answer choices Positive economics deals with dynamic systems, while normative economics focuses on static systems. Normative economics deals with how the world actually works, whereas positive economics focuses on what people ought to do. Positive economics requires making value judgments, while normative economics relies solely on factual statements. Normative economics applies in cases...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime and criminology? a. Law in action departs substantially from the ideal behavior of the law. b. Focusing only on legally criminalized behavior makes it impossible to consider the impact of gender, race, age and ethnicity. c. Legalistic definitions ignore acts that cause great harm. d. The legalistic model suggests that these are absolute standards for judging right and wrong. e. All of the above....
Read the LDC Cloud Systems Case Study and answer the question below: THE EMAIL The email...
Read the LDC Cloud Systems Case Study and answer the question below: THE EMAIL The email had been sent from one mid-level accounting manager at headquarters to another about six months earlier. The message read: Bill, here are the accounting issues I mentioned, and as you know, some of these go back a ways. The data that supports these accounts are not always clear and keep changing, and we are not sure what the correct accounting treatment is for these...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the firm for IS resources or services to the department that uses them Direct billing by the manager of a function for IS resources or services to an employee that uses them An accounting process that reduces tax liability for capital investments All of the following are attributes of considering IS costs as Overhead except the...
QUESTION 1 1. Brianna is trying to increase her chances of being promoted to vice president...
QUESTION 1 1. Brianna is trying to increase her chances of being promoted to vice president by working to build good work relationships with other managers outside her own department. Brianna's behavior should be viewed as dysfunctional politics. functional politics. coercive power. functional influence. 2 points QUESTION 2 1. The Gingerbread Factory has a separate unit that makes their chocolate crunch cookies and another unit that is completely responsible for all operations in producing their ginger snap cookies. The Gingerbread...
What tools could AA leaders have used to increase their awareness of internal and external issues?...
What tools could AA leaders have used to increase their awareness of internal and external issues? ???ALASKA AIRLINES: NAVIGATING CHANGE In the autumn of 2007, Alaska Airlines executives adjourned at the end of a long and stressful day in the midst of a multi-day strategic planning session. Most headed outside to relax, unwind and enjoy a bonfire on the shore of Semiahmoo Spit, outside the meeting venue in Blaine, a seaport town in northwest Washington state. Meanwhile, several members of...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT