Professional Documents
Culture Documents
SHIFT KEY
1. A shift key of 13 is used to encode the message "MYSTERY". What
is the ciphertext?
ANS: ZLFGREL
ANS: 9
A B C D E F G H I J K L M
0 1 2 3 4 5 6 7 8 9 10 11 12
N O P Q R S T U V W X Y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
0 1 2 3 4 5 6 7 8 9
26 27 28 29 30 31 32 33 34 35 36
ANS: BE HAPPY
ANS : GREAT
PART 2: EXPLORING HILL CIPHER
4 5
Given the encryption key K= ,
3 4
4 5
the decryption key will be K-1 = .
3 4
IGK2Q8W36YLJO4XLXC when converted into a string of integers
using the table above, will be
8, 6, 10, 28, 16, 34, 22, 29, 32, 24,11, 9, 14, 30, 23, 11, 23, 2
4 5 8 10 16 22 32 11 14 23 23
x
3 4 6 28 34 29 24 9 30 11 2
2 100 106 57 8 1 94 37 82
=
0 82 88 50 0 3 78 25 61
mod 37
2 11 5 17 8 36 17 0 8
0 8 14 13 0 3 4 12 13
CALIFORNIA DREAMIN
KDCPAY GR1QY
Solution(decryption):
ENCYCLOPEDIA
PART 3: REFLECTIONS AND FURTHER READING
I have heard of cryptography before this lesson and after
doing these tasks, I found out more about this field and other
forms of cryptography. I think such a specialised field is developed
so that important information such as trade secrets and
government plans would not be known by competitors easily to
protect the users of such private and secret information.
I think each method of encryption has its own pros and cons,
such as being easier to encrypt and being more difficult to be
understood by others for some of them. For example, I think that
one of the advantages of the shift cipher is that decoded
messages would be difficult to decipher without having the shift
key as they would probably not form a proper word after being
encrypted. Meanwhile, integer encoding and decoding has its
advantage being easier to be decoded. However, this also gives
a higher chance for the interceptor of the message to
understand the ciphertext. In my opinion, I think that Hill Cipher is
the "strongest" way of encryption. This is because it has a lot of
steps to it and is very complicated, thus making it difficult for
intruders to understand and decode the messages. However, this
is also an disadvantage in the sense that it is very tedious to both
encrypt and decrypt the messages. Also, there are also many
chances for careless mistakes such as calculation errors during the
process of encryption and decryption.