CSE 101 HW #5 guide
CSE 101 HW #5 guide CSE 101
Popular in Computing Concepts/Competencies
Popular in Computer Science and Engineering
This 2 page Class Notes was uploaded by Kara Miciek on Sunday January 10, 2016. The Class Notes belongs to CSE 101 at Michigan State University taught by Kevin Ohl in Fall 2016. Since its upload, it has received 55 views. For similar materials see Computing Concepts/Competencies in Computer Science and Engineering at Michigan State University.
Reviews for CSE 101 HW #5 guide
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 01/10/16
________________________________ Name Congratulations on getting to this file. Your job is to use the Rail Fence cipher explained below to encode and decode messages. Encode this message using 6 rails: On the banks of the Red Cedar A: OATCNNHETKEDHSRAEOERBFDY Decode this message using 6 railsICIITISNSAWGSLIXPTNBEYNM A: ITS SPECIALTY IS WINNING XBM Rail Fence Cipher The Rail Fence cipher is a device for converting a message (plaintext) into a secret, cryptic code (ciphertext) that is difficult to decrypt and understand simply by looking at it. In the Rail Fence cipher, the original message is written downwards on a set of “rails” of an imaginary fence. To encrypt/decrypt the message, you must know the number of rails used by the cipher. For example, if the original message was “Hello World” and your Rail Fence cipher used 3 rails, you would encrypt your message by first writing downwards in columns containing 3 letters each as follows: H L O D E O R L W L To ensure that the same number of rails (rows) are used in each column of your Rail Fence Cipher, you would then fill in the remaining empty rails with random letters (colored red in example below) H L O D E O R Y L W L S To generate the secret message, you must read left-to-right and top-to-bottom along this imaginary. For example, after we have formed the imaginary fence shown above, we would encode the secret message as follows: HLODEORYLWLS To decrypt a message, you must know the number of rails that were used to encrypt it. You then break the letters into equal-sized groups and stack them upon one another to re-construct the rails of the imaginary fence. The original message can be read off vertically just as before. For example, HLODEORYLWLS split into equal-sized groups would be HLOD EORY LWLS that when stacked on top of one another form the original message when read down each column. You can remove any extra characters on the end of the message that do not make sense in order to re-construct the message. Steganography is when you conceal a message or any other type of information that you want to hide within other text or data that is not a secret. You would want to use steganography to be covert with your messages and to hide them from someone you don’t want the information to reach. Steganography hides the message you would want to conceal but not that you were speaking with the other person. Steganography involves placing a hidden message in a secret carrier or a medium. It isn’t surprising that steganography is used today due to the different and advanced technologies today; but different types of steganography can be used for different things. There is technical, linguistic and electronic steganography. Technical steganography uses several scientific procedures to hide a file like invisible ink. Linguistic steganography basically hides the message in the carrier. In electronic steganography, the data is first encrypted and then inserted using an algorithm into a pattern of data into an image file. It basically encrypts the file into bits or bytes in an image which would be the host of the message. Steganography basically makes the image unseen so you can hide electronic data in text, images, in disk space, or even in software.
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'