I encrypt the message and send you the encrypted message. Along with it, I give you instructions on how to decrypt it I

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

I encrypt the message and send you the encrypted message. Along with it, I give you instructions on how to decrypt it I

Post by answerhappygod »

I Encrypt The Message And Send You The Encrypted Message Along With It I Give You Instructions On How To Decrypt It I 1
I Encrypt The Message And Send You The Encrypted Message Along With It I Give You Instructions On How To Decrypt It I 1 (113.73 KiB) Viewed 45 times
I got the message as PANCAKS, please help with other ones..
I encrypt the message and send you the encrypted message. Along with it, I give you instructions on how to decrypt it I encrypted it with a ROT-X cipher A ROT-X cipher is just a cipher that replaces each letter in the message with the letter that is X places afterwards For example, in a ROT-1 cipher, the letter A is replaced with B B is replaced with C. If you come to the end of the alphabet, then wrap around. Therefore, Z becomes A As an example, the ROT-1 cipher of HELLO IS IFMMP. To decrypt, just go backwards. For example, if you are working with a ROT-1 cipher, B goes back to A C goes back to B. If you are working with a ROT-1 cipher and you are given the message HPPECZF, you would work back. The decryption of this is GOODBYE. To find X Multiply my public key q with your private key p. The message is as follows vG TIGQKY 1. What is the message? [6] 2. If someone intercepts the message and reads it why won't they be able to decrypt it? [4] 3. What happens if they try to use their own private key? [4] 4 A public key is a key that is known publicly. Therefore, the interceptor would know this key. What is preventing them from changing the message? [6]
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply