Premium Essay

Crytographic Security Unit 1

In: Computers and Technology

Submitted By drmnicholson
Words 433
Pages 2
Unit 1 – Individual Project
ITAS367 – Principles & Methods in Cryptographic Security

KEY: 2314746
MESSAGE: The transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptology (ignore the comma and the period in the message).
To begin as stated in the message, ignore all punctuation in the message and remove all spaces so that the new message to encrypt will look like this:
ThEtranspositionciphertechniqueworksbypermutingthelettersoftheplaintextItisnotverysecurebutitisgreatforlearningaboutcryptologyignorethecommaandtheperiodinthemessage
Then using the given key you will begin to organize the given message so that it may be encrypted, like this: 2 | 3 | 1 | 4 | 7 | 4 | 6 | T | H | E | T | R | A | N | S | P | O | S | I | T | I | O | N | T | E | C | H | N | I | Q | U | E | W | O | R | K | S | B | Y | P | E | R | M | U | T | I | N | G | T | H | E | L | E | T | T | E | R | S | O | F | T | H | E | P | L | A | I | N | T | E | X | T | I | T | I | S | N | O | T | V | E | R | Y | S | E | C | U | R | E | B | U | T | I | T | I | S | G | R | E | A | T | F | O | R | L | E | A | R | N | I | N | G | A | B | O | U | T | C | R | Y | P | T | O | L | O | G | Y | I | G | N | O | R | E | T | H | E | C | O | M | M | A | A | N | D | T | H | E | P | E | R | I | O | D | I | N | T | H | E | M | E | S | S | A | G | E | X | X | X |
The message is imputed into the table in the order the letters appear in the message from left to right, top to bottom. Now that this step is done the next step involve righting out the encrypted message. To begin you start with your lowest number column and begin writing those letter down from top to bottom in a pre-designated group, for this example a group of ‘6’ letters will be used.
This is how the first column will look

Similar Documents