Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

The key to cracking a substitution cipher was first discovered by Arab scholars in the ninth century, but it was not widely known in the West until the fifteenth century. Once frequency analysis of ciphers became widespread, the plain substitution cipher became useless. To fix the problems in the substitution cipher, Blaise de Vigenère invented the strategy of using multiple letter mappings. Rather than using one key for the whole message, Vigenère’s idea was to use a different key for each letter of the message. Using a different key for each letter makes the frequency analysis much more difficult.

 

The key to the Vigenère cipher is the Vigenère square. The rows shown here are simple rotations of the alphabet. Each row in the table shifts the letters of the alphabet one place to the left. When a letter shifts out of the first .

 

The idea is to have the message we want to encode: secretmessage

Alongside a word we will use to encrypt: encryptencrypt

 

Plaint text

s

e

c

r

e

t

m

e

s

s

a

g

e

Key

e

n

c

r

y

p

t

e

n

c

r

y

p


To create the cipher text, match the plain text with the key:

Cipher text

w

r

e

h

b

h

e

i

e

u

r

d

t

 

 

Your program instructions:
You will create two functions, one to encrypt and one to decrypt. Write a function to encrypt a message using the Vigenere cipher. Your function will need to take in two arguments in the parameters, a key to encrypt the message and a message to encrypt. It will return the ciphertext. Create the second function to take in the cipher text and return the original message.

Plaintext
Kaybed
abcd
b
< cdef
*
b
$
kimn
nopqrstuv
bed
zabcd.
bedef
fghi
xy
ghijkl
v
hij
2
Transcribed Image Text:Plaintext Kaybed abcd b < cdef * b $ kimn nopqrstuv bed zabcd. bedef fghi xy ghijkl v hij 2
Expert Solution
steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Hyperlinks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education