Page 25 - Trackpad_V1_Book 8_Flipbook
P. 25
Rail Fence Cipher is a classical transposition technique in which the plain text is written
downwards and diagonally on successive rails of an imaginary fence. The message is written
in a zig-zag manner as when we reach the bottom of the rail, we start moving upwards
diagonally and after reaching the top of the rail, the direction is changed again.
This technique uses an encryption key which tells how many columns have been used.
Example:
Converting the plain text “Good Morning” using encryption key 3 will result in GMiodonnorg:
Now answer the following questions:
1. Convert the following plain text into ciphertext using the Caesar Cipher technique.
a. I love coding ___________________
b. Computers fascinate me ___________________
2. The following ciphertext has been created using the Caesar Cipher technique. Convert it
back into plain text.
a. vhh brx rq prqgdb ___________________
b. wkdqn brx ___________________
3. Convert the following plain text into ciphertext using the Rail Fence cipher according to
the encryption key which is given.
a. Attack from the west, encryption key=3 ___________________
b. Be honest, encryption key=2 ___________________
CAREER HERE
People who are experts in computer networking may pursue their careers as Network Engineers.
FOR THE TEACHER
1. Discuss about Campus Area Network.
2. Explain the advantages and disadvantages of various topologies.
3. Demonstration of the working of a computer network would be helpful. Take the students to the Computer Lab to
be shown how resource and file sharing is executed.
Networking Concepts 23

