The following was encrypted using a Caesar cipher (answer in upper case no space
ID: 653289 • Letter: T
Question
The following was encrypted using a Caesar cipher (answer in upper case no spaces): VKDUNVZLWKODCHUV The following was encrypted using a Rail Fence cipher (answer in upper case no spaces): TUHLEASRIINTGY The following was encrypted using the Vigenere Cipher. The key used is "egg" (answer in upper case no spaces): WZUTYVCOTKUTQK Decipher the following (answer in upper case no spaces): TSHFEOARNTSYWTEWROI Bob needs to send Alice a message and doesn't want anyone but Alice to be able to read the contents. Bob writes the message Bob encrypts the message with Bob sends the encrypted message to Alice Alice receives the message Using Key Alice decrypts the message The available answers are: Bob Alice private public Bob needs to send Alice a message and wants Alice to know it is from him. Bob writes the message Bob encrypts the message with Bob sends the encrypted message to Alice Alice receives the message Using Key Alice decrypts the message Choose from the following answers: Bob Alice private publicExplanation / Answer
1)
In Caesar ciplher encryption,each le letter is replaced with a letter with a letter after some fixed length positions as follows:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
The encrypted text is VKDUNVZLWKODCHUV
Then the decrypted text becomes:
YNGXQCOZNRGFKXY
2)
With a key of 3, the cipher text should be decrypted in the following manner (Table contains 14 columns because length of cipher text is 14):
T
U
H
L
-
-
-
-
-
-
-
-
-
-
T
U
H
L
E
A
S
R
I
I
N
-
-
-
T
U
H
L
E
A
S
R
I
I
N
T
G
Y
The decrypted text is: TETAUSGRHIYILN
3)
By using tabula recta, the plain text is encrypted in vigenere cipher.
The encrypted text is: WZUTYVCOTKUTQK
Key is: egg
The decryption should be done in the following manner:
Cipher Text
W
Z
U
T
Y
V
C
O
T
K
U
T
Q
K
key
E
G
G
E
G
G
E
G
G
E
G
G
E
G
Plain Text
S
T
A
P
S
P
Y
I
N
G
O
N
M
E
4)
Decryption is not specified in the question.
5)
Bob encrypts the message with Alice's public key
Alice receives the message and by using Alice's private key she decrypts the message
6)
Bob encrypss the message by usgin his own Private key.
Alice decrypts the message by using Bob's public key.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.