In a transposition cipher the encryption and decryption keys are often represented as two one-dimension tables (arrays)

Question:

In a transposition cipher the encryption and decryption keys are often represented as two one-dimension tables (arrays) and the cipher is represented as a piece of software (a program).

a. Show the array for the encryption key in Figure 31.6 in the text. 

b. Show the array for the decryption key in Figure 31.6 in the text.

Figure 31.6

Alice Bob Plaintext Plaintext enemy attackstonightz enemy attackstonight z Write row by row Read row by row e e m y m y a a a k k h i h 3. 4 5 123 4 5 E E TA A T K E E M T Кey A A.

c. Explain, given the encryption key, how we can find the decryption key.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: