SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
A multiplicative cipher is defined on Z26 by the rule
M5 (m)= 5x26 m
A multiplicative cipher is defined on Z26 by the rule
M5 (m)= 5x26 m
messages in english are coded numerically using the correspondence below.
A 1 B 2 C 3 D 4 E 5 F 6 G 7................... Y 25 Z 26
1) encipher the message WHEN using M5 (that is , find the ciphertext for this message.)
2) Write down the deciphering rule for this cipher justifying your answer.
3) A message is enciphered using M5 to give the ciphertext {18,23,23,18} use answer to 2) to
find the middle two lwtters of the message. Using answer to part 1) or otherwise find the other
two letters and write down the message.
Solution
the cipher is:
multiply by 5, then subtract a multiple of 26 if your number is "too big"
so:
1 -> 5
2 -> 10
3 -> 15
4 -> 20
5 -> 25
6 -> 30: but 30 is too big (not between 1 and 26), so subtract 26 to obtain:
6 -> 4
7 -> 35: again, too big, subtract 26 and
7 -> 9
8 -> 14
9 -> 19
10 -> 24
11* 5 = 55, 55-26 = 29 is still too big, 55-52=3
11 -> 3
Thus your encryption is:
A -> 1 -> 5 -> E
B -> 2 -> 10 -> J
C -> 3 -> 15 -> O
...
F -> 6 -> 4 -> D
...
K-> 11-> 3 -> C
The deciphering rule is M21
that is, multiply by 21, then subtract a multiple of 26 if your number is "too big"
1 -> 21
2 -> 42: but 42 is too big, so subtract 26
2 -> 16
3 -> 63: 63 is too big, subtract 52
3 -> 11
4 -> 84: 84 is too big, subtract 78
4 -> 6
The reason this works is that 5*21 = 1 + multiple of 26
so, for example, to decipher M3 you use M9, since
3*9 = 1 + multiple of 26
ciphertext 18 23 23 18
18*21 - 26*14 = 14 -> N
23*21 - 26*18 = 15 -> O
your decrypted text is: NOON
PS: if you are interested in learning more about this (why you want 1+ multiple of 26), or why
you can't use M2 or M4 to encrypt your text, try reading about "modular arithmetic", say on
wikipedia

Weitere ähnliche Inhalte

Mehr von amolsk22

Mehr von amolsk22 (8)

A normal population has a mean of 0.1 and a standard deviation of 2..pdf
A normal population has a mean of 0.1 and a standard deviation of 2..pdfA normal population has a mean of 0.1 and a standard deviation of 2..pdf
A normal population has a mean of 0.1 and a standard deviation of 2..pdf
 
A nickel is tossed 20 times in succession. Every time that the nicke.pdf
A nickel is tossed 20 times in succession. Every time that the nicke.pdfA nickel is tossed 20 times in succession. Every time that the nicke.pdf
A nickel is tossed 20 times in succession. Every time that the nicke.pdf
 
A newspaper recently reported that U.S. businesses have significantl.pdf
A newspaper recently reported that U.S. businesses have significantl.pdfA newspaper recently reported that U.S. businesses have significantl.pdf
A newspaper recently reported that U.S. businesses have significantl.pdf
 
A neutron star (2.5 solar masses) is seen orbiting a bright blue sta.pdf
A neutron star (2.5 solar masses) is seen orbiting a bright blue sta.pdfA neutron star (2.5 solar masses) is seen orbiting a bright blue sta.pdf
A neutron star (2.5 solar masses) is seen orbiting a bright blue sta.pdf
 
A negative externalityA. is a payment received to parties not inv.pdf
A negative externalityA. is a payment received to parties not inv.pdfA negative externalityA. is a payment received to parties not inv.pdf
A negative externalityA. is a payment received to parties not inv.pdf
 
A neighbors dog is described by the following information (a) N.pdf
A neighbors dog is described by the following information (a) N.pdfA neighbors dog is described by the following information (a) N.pdf
A neighbors dog is described by the following information (a) N.pdf
 
A multiple regression analysis based on a data set of 500 observatio.pdf
A multiple regression analysis based on a data set of 500 observatio.pdfA multiple regression analysis based on a data set of 500 observatio.pdf
A multiple regression analysis based on a data set of 500 observatio.pdf
 
A mountain stream has an incidence rate of 3 live organisms of amoeb.pdf
A mountain stream has an incidence rate of 3 live organisms of amoeb.pdfA mountain stream has an incidence rate of 3 live organisms of amoeb.pdf
A mountain stream has an incidence rate of 3 live organisms of amoeb.pdf
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

A multiplicative cipher is defined on Z26 by the ruleM5 (m)= 5x26 .pdf

  • 1. A multiplicative cipher is defined on Z26 by the rule M5 (m)= 5x26 m A multiplicative cipher is defined on Z26 by the rule M5 (m)= 5x26 m messages in english are coded numerically using the correspondence below. A 1 B 2 C 3 D 4 E 5 F 6 G 7................... Y 25 Z 26 1) encipher the message WHEN using M5 (that is , find the ciphertext for this message.) 2) Write down the deciphering rule for this cipher justifying your answer. 3) A message is enciphered using M5 to give the ciphertext {18,23,23,18} use answer to 2) to find the middle two lwtters of the message. Using answer to part 1) or otherwise find the other two letters and write down the message. Solution the cipher is: multiply by 5, then subtract a multiple of 26 if your number is "too big" so: 1 -> 5 2 -> 10 3 -> 15 4 -> 20 5 -> 25 6 -> 30: but 30 is too big (not between 1 and 26), so subtract 26 to obtain: 6 -> 4 7 -> 35: again, too big, subtract 26 and 7 -> 9 8 -> 14 9 -> 19 10 -> 24 11* 5 = 55, 55-26 = 29 is still too big, 55-52=3 11 -> 3 Thus your encryption is: A -> 1 -> 5 -> E
  • 2. B -> 2 -> 10 -> J C -> 3 -> 15 -> O ... F -> 6 -> 4 -> D ... K-> 11-> 3 -> C The deciphering rule is M21 that is, multiply by 21, then subtract a multiple of 26 if your number is "too big" 1 -> 21 2 -> 42: but 42 is too big, so subtract 26 2 -> 16 3 -> 63: 63 is too big, subtract 52 3 -> 11 4 -> 84: 84 is too big, subtract 78 4 -> 6 The reason this works is that 5*21 = 1 + multiple of 26 so, for example, to decipher M3 you use M9, since 3*9 = 1 + multiple of 26 ciphertext 18 23 23 18 18*21 - 26*14 = 14 -> N 23*21 - 26*18 = 15 -> O your decrypted text is: NOON PS: if you are interested in learning more about this (why you want 1+ multiple of 26), or why you can't use M2 or M4 to encrypt your text, try reading about "modular arithmetic", say on