Cryptography Cryptography is the technology that powers online encryption, digital authentication, credit card processin
Posted: Fri Jul 08, 2022 6:17 am
A|B|C|D|E|F|G|H|I|J|K|L|M|N|0|P|QR|S|T|U|v|w|x|Y|Z AABCDEFGHIJKLMNOPQRSTUVWXYZ BBCDEFGHIJKLMNOPQRSTUVWXYZA CCDEFGHIJKLMNOPQRSTUVWXYZ AB DDEFGHIJKLMNOPQRSTUVWXYZ ABC EEFGHIJKLMNOPQRSTUVWXYZ ABCD FFGHIJKLMNOPQRSTUVWXYZ ABCDE GGHIJKLMNOPQRSTUVWXYZ ABCDEF HHIJKLMNOPQRSTUVWXYZ ABCDEFG IIJKLMNOPQRSTUVWXYZ ABCDEFGH JJKLMNOPQRSTUVWXYZ ABCDEFGHI KKLMNOPQRSTUVWXYZ ABCDEFGHIJ LLM NOPQ RSTU V W X Y Z ABCDE FGHI JK MMNOPQRSTUVWXYZ ABCDEFGHIJKL NNOPQRSTUVWXYZ ABCDEFGHIJKLM OOPQRSTUVWXYZABCDEFGHIJKLMN PPQRSTUVWXYZ ABCDEFGHIJKLMNO QQR STUVWXYZ A BCDE FGHIJ KLMNOP RRSTUVWXYZ ABCDEFGHIJKLMNOPQ S ST U V W X Y Z A B C DEFG HIJKL MNOP TTUVWXYZ ABCDEFGHIJKLMNOPQRS QR UUVWXYZABCDEFGHIJKLMNOPQRST V V W X Y Z ABCDEFGHIJKLMNOPQRSTU WWXYZABCDEFGHIJKLMNOPQRSTUV XXYZABCDEFGHIJKLMNOPQRSTUVW YYZ ABCD EFGHI JKLM NOPQR STUVWX OPQRS TUVW X Y ZZABCDEFGHIJKLMN Table 8-2 The Vigenère Square
Question 6 6.1 You have been hired a security specialist and you have been tasked to decrypt the following cipher text. Suppose a columnar transposition of 9 columns was used to produce the cipher-text WLOWA PELNH NHLEG YSOLD NDWNI TUIEE FHDMR IEBYT CWEOH ARRUE. (10 Marks) Decipher the message. 6.2 Encrypt the following message using Caesar cipher with a key of 3 SECURITY IS THE KEY TO INFORMATION SYSTEMS What is the encrypted message that will be sent to Abel? (7 marks)
6.3 Using the Vigenère cipher mentioned in the scenario. Encrypt the following phrase using key words ITALY: SACK GAUL SPARE NO ONE (8 marks)