Lab 2 Encryption/Decryption using classical algorithms ABCDEFGHIJKLM0123456789101112NOPQRSTUVWXYZ13141516171819202122232425 Task #1 Illustrate how each of the following encryption algorithms can be used to encipher the plaintext “You are very smart”. Use “Cryptography” as a key if needed. Caesar cipher (K=5) d Vigen`ere cipherUse the following table to enter the numerical values for the key, plaintext and the ciphertext keycryptographycry plaintextyouareverysmart ciphertextafs Playfair cipher CRYPTOGAHBDEFI/JKLMNQSUVWXZ Ciphertext CA Task #2: Implement the row transposition cipher on the following plaintext message “You are very smart” using the following key k=31542 Vyaya eorsr rutme Using the key REPLAY decipher the following transposition cipher text: EADZEEDNRETYCVAXSREWTIAX Reply SECRET REVEAIED AT DAWN XYZX Use the Hill cipher with the following key to encrypt the plaintext: rays 17 0 17×7+0x2 119mod26= 15 17×9+0x3 153mod26= 23 24 18 24×7+18×2 204mod26=22 24×9+18×3 270mod26=10 Decrypt the above ciphertext and check to see if you do get the plaintext: rays A 21 Task #3: Answer the following questions: Compare and contrast between the following symmetric key encryption mechanisms according to the following criteria PolyalphabeticMonoalphabeticTranspositionKey length Hides language characteristics Give an example All classical ciphers are based on symmetric key encryption. What does that mean?True or false: The larger the size of the key space, the more secure a cipher? Justify your answer.What is the main security flaw in the Hill cipher?What makes Vigenere cipher more secure than the Playfair cipher?What substitution system results when we use a 1 * 25 Playfair matrix?Can the keyword “juice” be used as a key for the Playfair cipher? Justify your answer

- Assignment status: Already Solved By Our Experts
*(USA, AUS, UK & CA PhD. Writers)***CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS**

**NO PLAGIARISM**– CUSTOM PAPER