COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
1st Edition
ISBN:9780357392676
Author:FREUND, Steven
Publisher:FREUND, Steven
Chapter7: Creating Templates, Importing Data, And Working With Smartart, Images, And Screenshots
Section: Chapter Questions
Problem 7EYK
icon
Related questions
Question

The key to cracking a substitution cipher was first discovered by Arab scholars in the ninth century, but it was not widely known in the West until the fifteenth century. Once frequency analysis of ciphers became widespread, the plain substitution cipher became useless. To fix the problems in the substitution cipher, Blaise de Vigenère invented the strategy of using multiple letter mappings. Rather than using one key for the whole message, Vigenère’s idea was to use a different key for each letter of the message. Using a different key for each letter makes the frequency analysis much more difficult.

 

The key to the Vigenère cipher is the Vigenère square. The rows shown here are simple rotations of the alphabet. Each row in the table shifts the letters of the alphabet one place to the left. When a letter shifts out of the first .

 

The idea is to have the message we want to encode: secretmessage

Alongside a word we will use to encrypt: encryptencrypt

 

Plaint text

s

e

c

r

e

t

m

e

s

s

a

g

e

Key

e

n

c

r

y

p

t

e

n

c

r

y

p


To create the cipher text, match the plain text with the key:

Cipher text

w

r

e

h

b

h

e

i

e

u

r

d

t

 

 

Your program instructions:
You will create two functions, one to encrypt and one to decrypt. Write a function to encrypt a message using the Vigenere cipher. Your function will need to take in two arguments in the parameters, a key to encrypt the message and a message to encrypt. It will return the ciphertext. Create the second function to take in the cipher text and return the original message.

Plaintext
Kaybed
abcd
b
< cdef
*
b
$
kimn
nopqrstuv
bed
zabcd.
bedef
fghi
xy
ghijkl
v
hij
2
Transcribed Image Text:Plaintext Kaybed abcd b < cdef * b $ kimn nopqrstuv bed zabcd. bedef fghi xy ghijkl v hij 2
Expert Solution
steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Hyperlinks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:
9780357392676
Author:
FREUND, Steven
Publisher:
CENGAGE L