0% found this document useful (0 votes)
147 views

Useful Sites

The document contains questions and answers about the Playfair cipher, Rail Fence cipher, and product cipher. It discusses the 4 rules for encrypting text with the Playfair cipher: separating repeating letters, replacing letters in the same row/column, and replacing letters in the same pair. It provides an example of encrypting "SECURITY" with the Playfair cipher using the key "COMPUTING". It also discusses how transposition ciphers are weak because the number of plaintext and ciphertext is equal, and provides an example of encrypting a message with the Rail Fence cipher. Finally, it discusses how row transposition ciphers can maintain confidentiality and that using both transpositions and substitutions is what makes the product cipher more secure

Uploaded by

Rezen Rana Bhat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
147 views

Useful Sites

The document contains questions and answers about the Playfair cipher, Rail Fence cipher, and product cipher. It discusses the 4 rules for encrypting text with the Playfair cipher: separating repeating letters, replacing letters in the same row/column, and replacing letters in the same pair. It provides an example of encrypting "SECURITY" with the Playfair cipher using the key "COMPUTING". It also discusses how transposition ciphers are weak because the number of plaintext and ciphertext is equal, and provides an example of encrypting a message with the Rail Fence cipher. Finally, it discusses how row transposition ciphers can maintain confidentiality and that using both transpositions and substitutions is what makes the product cipher more secure

Uploaded by

Rezen Rana Bhat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Question 01.

Describe the 4 rules which must be followed in order to encrypt a text using a Playfair
Cipher.

Ans: 4 rules which must be followed in order to encrypt a text using a playfair cipher are:

 Rule 01. Repeating letters of the plaintext which are in the same pair are separated with a filler
letter such as “X”. So that, BALLOON would be treated as BA LX LO ON.
 Rule 02. Plain text letters in the same row are replaced by letters to the right (ar -> rm).
 Rule 03. Plain text letters in the same column are replaced by the letters below (mu -> cm).
 Rule 04. Else, each plaintext letter in a pair is replaced by the letter that lies in its own row and
column occupied by other plain text letter (hs -> bp).

Question 02. Encrypt the Plaintext “SECURITY” using the key “COMPUTING”, by using the Playfair
Cipher.

Ans: plaintext: SECURITY

Key: COMPUTING

C O M P U
T I/J N G A
B D E F H
K L Q R S
V W X Y Z
5X5 MATRIX

SEQH

CUOC

RILG

TYGV

Plain text SECURITY using key COMPUTING gives cipher text QHOCLGGV

Question 03. Why are Transposition Ciphers considered to be weak?

Ans: Transposition Ciphers are considered to be weak because number of plain text is equal to the
number of cipher text.
Question 04. Encipher (encrypt) the message “SECURITY IN COMPUTING” using the Rail Fence Cipher.

Ans:

S C R T I C M U I G
E U I Y N O P T N

Plain text SECURITY IN COMPUTING gives cipher text SCRTICMUIGEUIYNOPTN.

Question 05. Elaborate how Row Transposition Ciphers can be used to maintain the confidentiality of
an unencrypted message.

Ans:

 This cipher uses are more complex scheme by writing the Plaintext in a rectangle, row by row
and read off the message column by column.
 The order of columns are permuted and that becomes the key to the algorithm.

Question 06. What factor of the Product Cipher results in the resulting cipher text to become more
secure?

Ans: Transpositions and substitution are the factor of the product cipher results in the resulting text to
become more secure.

You might also like