The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Answer the following questions:
 With the emergence of technology, a need for encryption in information technology environment greatly increased. A series of encryptions and decryptions between a number of systems, whereby each node decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor until it reaches the final destination.Â
Â
For the Vignµere cipher encryption method, we use a word as the key. Suppose that we use the word KEY" as the key and we want to encrypt the word CRYPTOG- RAPHY". We repeat the key and line up the repeated key and the ciphertext:Use each letter of the key as a shift for the Caesar cipher and encrypt each letter of the plaintext to get the ciphertext.Use the key CODE" to encrypt the sentence TO BE OR NOT TO BE".Choose one of the cipher encryption methods to build your key, phrase and encrypt it. Send the encrypted message to your friend and ask him /her to decrypt the message. Explain your answer to show all the steps to encrypt (plaintext) / decrypt (ciphertext) the messages between you and your friend.Â
Answer the following questions:With emergence of technology, need for encryption in information technology environmentgreatly increased. A series of encryptions and decryptions between a number of systems,whereby each node decrypts the message sent to it and then reencrypts it using differentkeys and sends it to the next neighbor, until it reaches the final destination.1)For the Vignµere cipher encryption method we use a word as the key. Suppose that we usethe word \KEY" as the key and we want to encrypt the word \CRYPTOG- RAPHY". Werepeat the key and line up the repeated key and the ciphertext:KeyK E Y K E Y K E Y K E YPlaintextC R Y P T O G R A P H Ya)Use each letter of the key as a shift for the Caesar cipher and encrypt each letter of theplaintext to get the ciphertext.b)Use the key \CODE" to encrypt the sentence \TO BE OR NOT TO BE".2)Choose one of the cipher encryption methods to build your key, phrase and encrypt it. Sendthe encrypt message to your friend and ask him /her to decrypt the message. Explain youranswer to show all the steps to encrypt (plaintext) / decrypt (ciphertext) the messagesbetween you and your friend.1 |P a g e
Attachments: