Data Communication & Computer Networks (DCCN) IT-360: Cryptography
Data Communication & Computer Networks (DCCN) IT-360: Cryptography
Data Communication & Computer Networks (DCCN) IT-360: Cryptography
Solution
The cipher is probably monoalphabetic
because both occurrences of L’s are encrypted
as O’s.
Solution
The cipher is not monoalphabetic because
each occurrence of L is encrypted by a
different character. The first L is encrypted
as N; the second as Z.
21.01.21 Dr. Mufassra Naz (DCCN) 13
The shift cipher is sometimes referred
to as the Caesar cipher.
Solution
We encrypt one character at a time. Each
character is shifted 15 characters down.
Letter H is encrypted to W. Letter E is
encrypted to T. The first L is encrypted to A.
The second L is also encrypted to A. And O
is encrypted to D. The cipher text is
WTAAD.
21.01.21 Dr. Mufassra Naz (DCCN) 15
Problem
Use the shift cipher with key = 15 to
decrypt the message “WTAAD.”
Solution
We decrypt one character at a time. Each
character is shifted 15 characters up. Letter
W is decrypted to H. Letter T is decrypted
to E. The first A is decrypted to L. The
second A is decrypted to L. And, finally, D
is decrypted to O. The plaintext is HELLO.
Solution
We first remove the spaces in the message.
We then divide the text into blocks of four
characters. We add a bogus character Z at
the end of the third block. The result is
HELL OMYD EARZ. We create a three-
block ciphertext ELHLMDOYAZER.
21.01.21 Dr. Mufassra Naz (DCCN) 19
Problem
Now decrypt the message
“ELHLMDOYAZER”.
Solution
The result is HELL OMYD EARZ. After
removing the bogus character and
combining the characters, we get the
original message “HELLO MY DEAR.”
&n
&n
Cd
mod 77 = 26
mod 77 = 5