Computer Science Homework Help

ITAS 663 Atlantic International University Transposition Cipher Technique Discussion

 

Use a two-stage transposition technique to encrypt the following message using the key “Decrypt”. Ignore the comma and the period in the message.

Message: “The Transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography.”

In a 3–4 page summary, discuss the following:

  • Is it possible to decrypt the message with a different key? Justify your answer.
  • Do you agree with the statement of the message? Why or why not? Give at least two examples that support your view.
  • https://class.aiu-online.com/_layouts/MUSEViewer/Asset.aspx?MID=20299969&aid=20299970&pIType=watch_it
  • https://class.aiu-online.com/_layouts/MUSEViewer/Asset.aspx?MID=20299969&aid=20299980&pIType=hear_it
  • https://class.aiu-online.com/_layouts/MUSEViewer/Asset.aspx?MID=20299969&aid=20299992&pIType=hear_it
  • https://class.aiu-online.com/_layouts/MUSEViewer/Asset.aspx?MID=20299969&aid=20299998&pIType=hear_it
  • https://class.aiu-online.com/_layouts/MUSEViewer/Asset.aspx?MID=20299969&aid=20300004&pIType=hear_it