Page 26 - Trackpad_V2.1_class8
P. 26
Rail Fence Cipher is a classical transposition technique in which the plain text is written
downwards and diagonally on successive rails of an imaginary fence. The message is written
in a zig-zag manner as when we reach the bottom of the rail, we start moving upwards
diagonally and after reaching the top of the rail, the direction is changed again.
This technique uses encryption key which tells how many columns have been used.
Example:
Converting the plain text “Good Morning” using encryption key 3 will result in GnodMrigoon:
Now answer the following questions:
1. Convert the following plain text into cipher text using the Caesar Cipher technique.
a. I love coding ___________________
b. Computers fascinate me ___________________
2. The following cipher text has been created using the Caesar Cipher technique. Convert it
back into plain text.
a. vhh brx rq prqgdb ___________________
b. wkdqn brx ___________________
3. Convert the following plain text into cypher text using the Rail Fence cipher according to
the encryption key which is given.
a. Attack from the west, encryption key=3 ___________________
b. Be honest, encryption key=2 ___________________
CAREER HERE
People who are experts in computer networking may pursue their career as a Network Engineer.
FOR THE TEACHER
1. Discuss different types of networks.
2. Explain the advantages and disadvantages of various topologies.
3. Explain the computer network's operation to students. Take students to the computer lab to demonstrate the
process of sharing resources and files.
24 Trackpad (V2.1)-VIII

