0% found this document useful (0 votes)
38 views2 pages

TP For Cybersec

The document describes different cipher techniques including the Caesar cipher, keyword cipher, Giovanni's cipher method, and transposition cipher. These techniques encrypt messages by shifting or rearranging letters based on a key or keyword.

Uploaded by

lrnn05brcln
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views2 pages

TP For Cybersec

The document describes different cipher techniques including the Caesar cipher, keyword cipher, Giovanni's cipher method, and transposition cipher. These techniques encrypt messages by shifting or rearranging letters based on a key or keyword.

Uploaded by

lrnn05brcln
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

For the Caesar Cipher, you’ll shift each letter by 3 positions in the alphabet:

• “ASSURANCE” becomes “DVVXUDQFH”


• “CYBERSECURITY” becomes “FBEHUVHFUXWLRQ”
• “INFINITY” becomes “LQLQIWBR”
• “SAMPLING” becomes “VDPSOLQJ”
• “MORNING” becomes “PRUQLQJ”
• “EXAMINATION” becomes “HADCPLDPQJB”
• “MASTER” becomes “PDVWHU”
• “SYSTEM” becomes “VXUJNL”
• “VISUAL STUDIO” becomes “YLFDO VXUJNL”
• “BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY” becomes “EDFKHOR RI
VFLHQFH LQ LQIRUPDWLRQ WLFNKRZDWH”

For the Keyword Cipher using the keyword “METHODS”:

• “ASSURANCE” becomes “MTXIUJSOS”


• “CYBERSECURITY” becomes “HJYERGRCNHB”
• “INFINITY” becomes “NGZRLPEX”
• “SAMPLING” becomes “QGTNXMRU”
• “MORNING” becomes “AOZIJSK”
• “EXAMINATION” becomes “TYSRPQYVZNK”
• “MASTER” becomes “VMATFW”
• “SYSTEM” becomes “YOTKBX”
• “VISUAL STUDIO” becomes “LXUOD LBLXVT”
• “BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY” becomes “POWULOK AS
VKXKOBXEV WR UPPTSPYGUK KBYDVEKZT”

For Giovanni’s Cipher Method with the key letter “C” and keyword “METHODS”:

• “ASSURANCE” becomes “MQQYAWOOZ”


• “CYBERSECURITY” becomes “YKBEHOZKXHUI”
• “INFINITY” becomes “MGZCMMKO”
• “SAMPLING” becomes “RRCDRKNR”
• “MORNING” becomes “QMLLIDM”
• “EXAMINATION” becomes “UYOPKSBOWYM”
• “MASTER” becomes “WMXEXY”
• “SYSTEM” becomes “BPXBKL”
• “VISUAL STUDIO” becomes “NUCJX NNUJBR”
• “BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY” becomes “RLAXKQL NG
XWCVFIRX PM JVEHQFUIWDW VXEQWQZRB”

For the Transposition Cipher Technique, I use a basic columnar transposition. I


rearrange the letters into a grid based on a predetermined key, and then read the
encrypted message column by column.

i use the key "COLUMNAR" for the transposition:

- "ASSURANCE" becomes "AUNSRASCE"


- "CYBERSECURITY" becomes "CBYIYRETURSE"
- "INFINITY" becomes "IFTYINNI"
- "SAMPLING" becomes "SAIGMPLN"
- "MORNING" becomes "MRIGONN"
- "EXAMINATION" becomes "XIMENAAOTT"
- "MASTER" becomes "MTSREA"
- "SYSTEM" becomes "STYSEM"
- "VISUAL STUDIO" becomes "VAUSSITDLVO"
- "BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY" becomes "BOLE RFAWR ECHEINTY
FHNGOMROAOT SVOIF RCTIE NLTIUNKOM"

it can read the encrypted message column by column:


"AUNSRASCECBYIYRETURSEIFTYINNISAIGMPLNMRIGONNXIMENAAOTTMTSREASTYSEMVUASUSITDLVOBOLE
RFAWR ECHEINTY FHNGOMROAOT SVOIF RCTIE NLTIUNKOM"

This would be the result of the transposition encryption using the key "COLUMNAR"

You might also like