Question

Use Playfair cipher to encrypt the plaintext “pink balloon” using the key exam.

Use Playfair cipher to encrypt the plaintext “pink balloon” using the key exam.

Homework Answers

Answer #1

Firstly we will create a 5 X 5 matrix using key=exam

E X A M B
C D F G H
I/J K L N O
P Q R S T
U V W Y Z

Plaintext= pink balloon

Now divide the plain text into pairs of 2 and adding x after first occurence of L so no pair have same characters inside them

Rules:-

Rule 1=if both letters are in same column then take letters below them

Rule 2=if both letters are in same row then take letters right next

Rule 3=if both letters are not in same row ,then create a rectangle with these letters in one corner and take letters of other corners horizontally.

pi up Using rule 1
nk ol using rule 2
ba em using rule 2
lx ka Using rule 3,form rectangle using L,K,D,X,A,F,L and take other horizontal corners
lo ni Using rule 2
on io using rule 2

So ciphet text= upolemkaniio

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
This question concerns block cipher modes. We will use a simple affine cipher, which can be...
This question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) { return (key+11*block)%256; } Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key 0x08. We now encrypt various plaintexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be 0xAA....
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how...
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how you get each letter ciphertext (you can do that by making shapes and arrows in key matrix). No need to draw key matric again and again. Show all your work. If you just write cipher text and key matric without showing (shapes and arrow on key matrix) that how you get the ciphertext then your marks will be deducted. key : alphabets plaintext :...
Using One-Time Pad Encryption, encrypt the message "JELLO" with one time pad key "YMCKM". Use the...
Using One-Time Pad Encryption, encrypt the message "JELLO" with one time pad key "YMCKM". Use the resultant cipher (from above step) and the one time pad key (pre-shared "YMCKM") to get the plain text.
Let's say we are using vigenere cipher. We have a key of "red" and a plain...
Let's say we are using vigenere cipher. We have a key of "red" and a plain text of "cats and dogs", what is the cipher text? ____ (Keep the space between words, but do not use other punctuation.) If we use generic Caesar cipher to encrypt "I have pizza for lunch", using the key "V". What would the cipher text be? "____" Do not enter punctuation; keep the space between words. When using Caesar cipher, if the plain text is...
A bank is using a=13 and b=8 in affine cipher to encrypt all pin numbers and...
A bank is using a=13 and b=8 in affine cipher to encrypt all pin numbers and send to a customer. A customer received a cipher text 6. What is the plain text pin number ?
For affine cipher, the key is a = 17, b = 10 so the enciphering function...
For affine cipher, the key is a = 17, b = 10 so the enciphering function is C(7,10)(p) = 17p + 10 mod 26. a) Find the deciphering function for this cipher. Show your steps b) If the ciphertext is AKV, what is the plaintext?
For the following question figure out what cipher was used to encode the following encrypted message....
For the following question figure out what cipher was used to encode the following encrypted message. The text has been encrypted using one of the following ciphers (Caesar, Rail Fence, Vigenere, or Playfair): Fc risdzwche mrw gcne. Fvm xyxfi-xoeboc dcelqztaqcbizq. The key is also encoded: wsgmephmpiqqe (C+4) The key is : The message is: The key was encrypted using a cipher, which is a simple substitution cipher. The message was encoded using a cipher.
Estimate the possible key length of the cipher text “TIGYXKLMPOUMEFRTIGBVTNJPGEGCL” generated by Vigenere Cipher, using Kasiski...
Estimate the possible key length of the cipher text “TIGYXKLMPOUMEFRTIGBVTNJPGEGCL” generated by Vigenere Cipher, using Kasiski Test.
Estimate the possible key length of the cipher text “TIGYXKLMPOUMEFRTIGBVTNJPGEGCL” generated by Vigenere Cipher, using Kasiski...
Estimate the possible key length of the cipher text “TIGYXKLMPOUMEFRTIGBVTNJPGEGCL” generated by Vigenere Cipher, using Kasiski Test.
Vigenère Cipher. In the Vigenère Cipher, we use a special keyword to encrypt a message. We...
Vigenère Cipher. In the Vigenère Cipher, we use a special keyword to encrypt a message. We represent each letter of the alphabet as a number from 0-25. In order, we add each letter from the keyword to the message and mod by 26. If the keyword is shorter than the message, we simply repeat the keyword. For example, lets say that the message is HOWSTUFFWORKS and the keyword is CIPHER. The following table shows how we can find the final...