Question

Use Playfair cipher to encrypt the plaintext “pink balloon” using the key exam.

Use Playfair cipher to encrypt the plaintext “pink balloon” using the key exam.

Homework Answers

Answer #1

Firstly we will create a 5 X 5 matrix using key=exam

E X A M B
C D F G H
I/J K L N O
P Q R S T
U V W Y Z

Plaintext= pink balloon

Now divide the plain text into pairs of 2 and adding x after first occurence of L so no pair have same characters inside them

Rules:-

Rule 1=if both letters are in same column then take letters below them

Rule 2=if both letters are in same row then take letters right next

Rule 3=if both letters are not in same row ,then create a rectangle with these letters in one corner and take letters of other corners horizontally.

pi up Using rule 1
nk ol using rule 2
ba em using rule 2
lx ka Using rule 3,form rectangle using L,K,D,X,A,F,L and take other horizontal corners
lo ni Using rule 2
on io using rule 2

So ciphet text= upolemkaniio

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
clc; clear; % OneTimePad Cipher Encryption % Input: plainText % key, for encryption key as long...
clc; clear; % OneTimePad Cipher Encryption % Input: plainText % key, for encryption key as long as plain text % Output: cipherText % plainText=upper('Hello') key=upper('XMCKL'); % process the plain text and key k1=double(key)-65; p1=double(plainText)-65; % Encrypt C1= p1+k1; C1= mod(C1,26)+65; %diaplay the cipher text CipherText=char(C1) Does anyone no how I would go about making this encryption encrypt and decrypt using both uppercase and lower case letters?
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how...
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how you get each letter ciphertext (you can do that by making shapes and arrows in key matrix). No need to draw key matric again and again. Show all your work. If you just write cipher text and key matric without showing (shapes and arrow on key matrix) that how you get the ciphertext then your marks will be deducted. key : alphabets plaintext :...
This question concerns block cipher modes. We will use a simple affine cipher, which can be...
This question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) { return (key+11*block)%256; } Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key 0x08. We now encrypt various plaintexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be 0xAA....
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking...
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking alike, then somebody isn't thinking." Is this a good key? Why or why not? 2.  Calculate the index of coincidence for the result.
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Using One-Time Pad Encryption, encrypt the message "JELLO" with one time pad key "YMCKM". Use the...
Using One-Time Pad Encryption, encrypt the message "JELLO" with one time pad key "YMCKM". Use the resultant cipher (from above step) and the one time pad key (pre-shared "YMCKM") to get the plain text.
Let's say we are using vigenere cipher. We have a key of "red" and a plain...
Let's say we are using vigenere cipher. We have a key of "red" and a plain text of "cats and dogs", what is the cipher text? ____ (Keep the space between words, but do not use other punctuation.) If we use generic Caesar cipher to encrypt "I have pizza for lunch", using the key "V". What would the cipher text be? "____" Do not enter punctuation; keep the space between words. When using Caesar cipher, if the plain text is...
A bank is using a=13 and b=8 in affine cipher to encrypt all pin numbers and...
A bank is using a=13 and b=8 in affine cipher to encrypt all pin numbers and send to a customer. A customer received a cipher text 6. What is the plain text pin number ?
We launch a known-plaintext attack on an LFSR-based stream cipher. Suppose the plaintext sent was: 1001...
We launch a known-plaintext attack on an LFSR-based stream cipher. Suppose the plaintext sent was: 1001 0010 0110 1101 1001 0010 0110 and by tapping the channel, we observe the following stream: 0111 1011 1011 0101 0010 (a) What is the degree m of the key stream generator? (b) What is the initialization vector? (c) Determine the feedback coefficients of the LFSR. (d...Draw the circuit diagram and verify the output sequence of the LSFR