Page 26 - Trackpad_V2.1_class8
P. 26

Rail Fence  Cipher  is  a  classical  transposition  technique  in  which the  plain  text  is  written
                        downwards and diagonally on successive rails of an imaginary fence. The message is written
                        in a zig-zag manner as when we reach the bottom of the rail, we start moving upwards
                        diagonally and after reaching the top of the rail, the direction is changed again.

                        This technique uses encryption key which tells how many columns have been used.
                        Example:

                        Converting the plain text “Good Morning” using encryption key 3 will result in GnodMrigoon:
                        Now answer the following questions:

                        1.  Convert the following plain text into cipher text using the Caesar Cipher technique.
                           a.  I love coding                            ___________________

                           b.  Computers fascinate me                   ___________________

                        2.   The following cipher text has been created using the Caesar Cipher technique. Convert it
                           back into plain text.
                           a.  vhh brx rq prqgdb                        ___________________

                           b.  wkdqn brx                                ___________________
                        3.   Convert the following plain text into cypher text using the Rail Fence cipher according to
                           the encryption key which is given.

                           a.  Attack from the west, encryption key=3   ___________________
                           b.  Be honest, encryption key=2              ___________________








                         CAREER HERE
                  People who are experts in computer networking may pursue their career as a Network Engineer.



                     FOR THE TEACHER

                    1.  Discuss different types of networks.
                    2.  Explain the advantages and disadvantages of various topologies.
                    3.   Explain the computer network's operation to students. Take students to the computer lab to demonstrate the
                      process of sharing resources and files.

















                   24   Trackpad (V2.1)-VIII
   21   22   23   24   25   26   27   28   29   30   31