Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

You have been hired by a local company to consult ... Question You have been hir

ID: 3682387 • Letter: Y

Question

You have been hired by a local company to consult ... Question You have been hired by a local company to consult with its security staff on encryption techniques. The staff has not been formally trained, so you will be demonstrating the principles of encryption through some simple exercises. Use a 2-stage transposition technique to encrypt a message. The following information is what is needed to do this encryption:

•Key: 2314756

•Message: The transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography (ignore the comma and the period in the message).

Prepare a 2–3-page Word document that explains this encryption technique. You should also include details as to how you arrived at your answer.

Explanation / Answer

A transposition cipher hides messages by simply rearranging the letter order without altering the letters used. The problem is they use the same frequency distribution as the original cipher text. This is done by writing the letters out in rows with a specified number of columns according the length of the key. In other words, reorder the columns according to the key. If a key is seven (7) characters long,then the message is spelled out seven characters at a time, and after the seventh (7th) character, a new line is started for seven (7) more characters until the message is complete. The vertical rows are then copied down according to the key being numeric or alphabetic.

let's start on work on it.
key = 2314746

1st step
eoceusm
teetsyb
grncrts
orirent
iterifn
uohpntq
krgthni
resoitg
athhwyt
lolttci
aabphts
icebuhr
peosurl
granien
opiefai
yuttrot
yripceb
uespxoe
teeayp

2ns step(final output)
ceniehgshlbeoaitiseetgoiukralaipgoyyutoerrtoretoacerpureesytnftntycthreaoeoyetcrrptohtpbsnetppambstnqigtisrlnitbeus


double transposition. This method is very similar to the columnar transposition, except that after the cipher text is determined after the initial encryption, then the cipher text in put back through the matrix and encrypted a second time.

The Transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography that the transposition cipher technique works by changing the letters of plaintext.encryption works by simply changing the order of the characters in the original plain text and therefore that is a true statement.

In conclusion, the transposition techniques of changing the order of the characters in the original plain text message are primitive means of encrypting the original message. double transposition methods are good for learning about encryption techniques,Due to using the original plain text of the message, one is able to crack the encryption technique by using a different or incomplete key.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote