Page 25 - Trackpad_V5_Book 8
P. 25

Rail Fence  Cipher  is  a  classical  transposition  technique  in  which the  plain  text  is  written
                  downwards and diagonally on successive rails of an imaginary fence. The message is written
                  in a zig-zag manner as when we reach the bottom of the rail, we start moving upwards
                  diagonally and after reaching the top of the rail, the direction is changed again.

                  This technique uses encryption key which tells how many columns have been used.
                  Example:

                  Converting the plain text “Good Morning” using encryption key 3 will result in G nodMrigoon:
                  Now answer the following questions:

                  1.  Convert the following plain text into cipher text using the Caesar Cipher technique.
                     a.  I love coding                           ___________________

                     b.  Computers fascinate me                  ___________________

                  2.   The following cipher text has been created using the Caesar Cipher technique. Convert it
                    back into plain text.
                     a.  vhh brx rq prqgdb                       ___________________

                     b.  wkdqn brx                               ___________________
                  3.   Convert the following plain text into cypher text using the Rail Fence cipher according to
                    the encryption key which is given.

                     a.  Attack from the west, encryption key=3   ___________________
                     b.  Be honest, encryption key=2             ___________________








                   CAREER HERE
            People who are expert in computer networking may pursue their career as a Network Engineer.




               FOR THE TEACHER
              1.  Discuss about Campus Area Network.
              2.  Explain the advantages and disadvantages of various topologies.
              3.   Demonstration of the working of a computer network would be helpful. Take the students to the Computer Lab to
                 be shown how resource and file sharing is executed.
















                                                                                         Networking Concepts  23
   20   21   22   23   24   25   26   27   28   29   30