Page 25 - Trackpad_V1_Book 8_Flipbook
P. 25

Rail Fence  Cipher  is  a  classical  transposition  technique  in  which the  plain  text  is  written
                       downwards and diagonally on successive rails of an imaginary fence. The message is written
                       in a zig-zag manner as when we reach the bottom of the rail, we start moving upwards
                       diagonally and after reaching the top of the rail, the direction is changed again.

                       This technique uses an encryption key which tells how many columns have been used.
                       Example:

                       Converting the plain text “Good Morning” using encryption key 3 will result in GMiodonnorg:
                       Now answer the following questions:

                       1.   Convert the following plain text into ciphertext using the Caesar Cipher technique.
                           a.   I love coding                         ___________________

                           b.   Computers fascinate me                ___________________

                       2.   The following ciphertext has been created using the Caesar Cipher technique. Convert it
                           back into plain text.
                           a.   vhh brx rq prqgdb                     ___________________

                           b.   wkdqn brx                             ___________________
                       3.  Convert the following plain text into ciphertext using the Rail Fence cipher according to
                           the encryption key which is given.

                           a.   Attack from the west, encryption key=3  ___________________
                           b.   Be honest, encryption key=2           ___________________








                       CAREER HERE
                 People who are experts in computer networking may pursue their careers as Network Engineers.




                    FOR THE TEACHER
                   1.  Discuss about Campus Area Network.
                   2.  Explain the advantages and disadvantages of various topologies.
                   3.   Demonstration of the working of a computer network would be helpful. Take the students to the Computer Lab to
                      be shown how resource and file sharing is executed.

















                                                                                              Networking Concepts  23
   20   21   22   23   24   25   26   27   28   29   30