Useful Sites
Useful Sites
Describe the 4 rules which must be followed in order to encrypt a text using a Playfair
Cipher.
Ans: 4 rules which must be followed in order to encrypt a text using a playfair cipher are:
Rule 01. Repeating letters of the plaintext which are in the same pair are separated with a filler
letter such as “X”. So that, BALLOON would be treated as BA LX LO ON.
Rule 02. Plain text letters in the same row are replaced by letters to the right (ar -> rm).
Rule 03. Plain text letters in the same column are replaced by the letters below (mu -> cm).
Rule 04. Else, each plaintext letter in a pair is replaced by the letter that lies in its own row and
column occupied by other plain text letter (hs -> bp).
Question 02. Encrypt the Plaintext “SECURITY” using the key “COMPUTING”, by using the Playfair
Cipher.
Key: COMPUTING
C O M P U
T I/J N G A
B D E F H
K L Q R S
V W X Y Z
5X5 MATRIX
SEQH
CUOC
RILG
TYGV
Plain text SECURITY using key COMPUTING gives cipher text QHOCLGGV
Ans: Transposition Ciphers are considered to be weak because number of plain text is equal to the
number of cipher text.
Question 04. Encipher (encrypt) the message “SECURITY IN COMPUTING” using the Rail Fence Cipher.
Ans:
S C R T I C M U I G
E U I Y N O P T N
Question 05. Elaborate how Row Transposition Ciphers can be used to maintain the confidentiality of
an unencrypted message.
Ans:
This cipher uses are more complex scheme by writing the Plaintext in a rectangle, row by row
and read off the message column by column.
The order of columns are permuted and that becomes the key to the algorithm.
Question 06. What factor of the Product Cipher results in the resulting cipher text to become more
secure?
Ans: Transpositions and substitution are the factor of the product cipher results in the resulting text to
become more secure.