# Decryption using classical algorithms | My Assignment Tutor

Lab 2 Encryption/Decryption using classical algorithms ABCDEFGHIJKLM0123456789101112NOPQRSTUVWXYZ13141516171819202122232425 Task #1 Illustrate how each of the following encryption algorithms can be used to encipher the plaintext “You are very smart”. Use “Cryptography” as a key if needed. Caesar cipher (K=5) d Vigen`ere cipherUse the following table to enter the numerical values for the key, plaintext and the ciphertext keycryptographycry      plaintextyouareverysmart      ciphertextafs                   Playfair cipher CRYPTOGAHBDEFI/JKLMNQSUVWXZ Ciphertext CA Task #2: Implement the row transposition cipher on the following plaintext message “You are very smart” using the following key k=31542      Vyaya eorsr rutme Using the key REPLAY decipher the following transposition cipher text: EADZEEDNRETYCVAXSREWTIAX Reply SECRET REVEAIED AT DAWN XYZX Use the Hill cipher with the following key to encrypt the plaintext: rays 17 0 17×7+0x2 119mod26= 15         17×9+0x3 153mod26= 23 24 18 24×7+18×2 204mod26=22           24×9+18×3 270mod26=10 Decrypt the above ciphertext and check to see if you do get the plaintext: rays A 21 Task #3: Answer the following questions: Compare and contrast between the following symmetric key encryption mechanisms according to the following criteria  PolyalphabeticMonoalphabeticTranspositionKey length         Hides language characteristics       Give an example          All classical ciphers are based on symmetric key encryption. What does that mean?True or false: The larger the size of the key space, the more secure a cipher? Justify your answer.What is the main security flaw in the Hill cipher?What makes Vigenere cipher more secure than the Playfair cipher?What substitution system results when we use a 1 * 25 Playfair matrix?Can the keyword “juice” be used as a key for the Playfair cipher? Justify your answer

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER