Answered You can hire a professional tutor to get the answer.

QUESTION

Let's look at an old Roman age encryption scheme. Let's say we intercepted a message from a known Celtic hacker group.

Let's look at an old Roman age encryption scheme. Let's say we intercepted a message from a

known Celtic hacker group. We know from experience that this group uses the characters from A to Z, then

a space, and then the numerals from 0 to 9 and employs a wrap around (moving left from A gives us 9).

The first leading pairs of letters tell us what the substitution code is using the code phrase "Trudy Jones".

For example if the first two pairs are uy du the code is 24 and 32. This would mean that we move the first 2

letters 4 places to the right eg. A becomes E), and then the next 3 letters 2 places to the left (eg. A

becomes 8), then 4 places to the right for the next 2 characters and so on to encrypt the message.

a. What is the message hidden in: yj uo FQTM4UXYFY8? Remember that you'll have to reverse the

algorithm (i.e. shift left first then right then left etc.) to decrypt the message.

b. The message is actually a nickname for a location. Give the location in upper case. What would be

the encrypted version of this location using the same encryption scheme as the original message?

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question