generated from mwc/lab_encryption
because I could actually test what was happening instead of just guessing. It made it easier to see how encryption and decryption work step by step, and I could quickly fix mistakes when something didn’t work. I had trouble finding the secret word at first because I was only getting numbers when I calculated the shifts. I couldn’t turn that into a readable word, so I used the secret word provided by the professor instead. Then I used that word in PolyCipher to decrypt the message and check that it worked.
39 lines
893 B
Markdown
39 lines
893 B
Markdown
# Encryption lab answers
|
|
|
|
## Checkpoint 1
|
|
|
|
0. `secrets/secret0.txt` is encrypted using a Caesar Cipher. What is
|
|
its secret number?
|
|
|
|
The number is 78.
|
|
|
|
1. `secrets/secret1.txt` is encrypted using a Caesar Cipher. What is
|
|
its secret number?
|
|
|
|
The number is 1.
|
|
|
|
2. `secrets/secret2.txt` is encrypted using a Caesar Cipher. What is
|
|
its secret number?
|
|
|
|
The number is 44.
|
|
|
|
3. `secrets/secret3.txt` is encrypted using a Caesar Cipher. What is
|
|
its secret number?
|
|
|
|
The number is 59.
|
|
|
|
4. `secrets/secret4.txt` is encrypted using a Caesar Cipher. What is
|
|
its secret number?
|
|
|
|
The number is 32.
|
|
|
|
## Checkpoint 2
|
|
|
|
5. What is the polyalphabetic secret word?
|
|
|
|
The secret word is "PYTHON".
|
|
|
|
6. Decrypt this message, which was encrypted using the same secret word:
|
|
"EbZhdaV[h^bTpchhQnhig]X[VmhhRP]ftXVnRfjVY]fgtO_X]("
|
|
|
|
The decrypt message is "The treasure is a worthless ball of aluminum foil." |