answersLogoWhite

0


Best Answer

Hi, I would say it is more than 120

It is. If my reasoning is correct, there are 360,000 unique ciphers. My reasoning is this: when i/j is counted as one letter and repetition is not allowed (as in Playfair), there are 25*24 = 600 possible digrams. Since each digram corresponds to one of those unique digrams, there are 600^2 = 360,000 unique Playfair ciphers (one should probably actually use 359,999 because one of the "ciphers" maps each digram to itself).

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How many effectively unique keys does the playfair cipher have?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Electrical Engineering

Why the number matrix in phone is of 4x3?

NOT QUITE AN ANSWER I don't know why, from a historical perspective. Possibly because it's the simplest way to arrange the keys using the tone dialing scheme. The individual keys' dialing tones are created by mixing two tones. There are three tones for the columns, and four for the rows. Each key makes a predefined combination tone.


Why library in vhdl?

A library is used to store all predefined words, keys, programs/ functions that can be used directly in VHDL programming. A number of VHDL constructs may be separately analyzed for inclusion in a design library. These constructs are called library units. The primary library units are entity declarations, package declarations and configuration declarations. The secondary library units are architecture bodies and package bodies. These library units depend on the specification of their interface in a corresponding primary library unit, so the primary unit must be analyzed before any corresponding secondary unit. Libraries are referred to using identifiers called logical names. This name must be translated by the host operating system into an implementation dependent storage name. For example, design libraries may be implemented as database files, and the logical name might be used to determine the database file name. Library units in a given library can be referred to by prefixing their name with the library logical name.


How does wireless printer connect to wireless laptop?

Some printers have a wireless adapter, but most of them don't. There are two cases. You connect the printer to a computer which has a wireless adapter, or if your printer has a lan card you can connect it to your wireless router and use advantages of wireless networking in that way.


How does 7 segment works?

A seven segment display is a device used to display numbers and letters on things such as alarm clocks. A 7 segment display is simply seven LEDs packaged in a pattern that allows numbers and letters to be displayed by illuminating different sets of LEDs. https://www.youtube.com/watch?v=kveP66YZyKg


Related questions

How many possible keys does the Playfair cipher have?

25! = 2^84


What actors and actresses appeared in Judged by Appearances - 1916?

The cast of Judged by Appearances - 1916 includes: Nelson Keys Arthur Playfair


What is the diffie-hellman cipher?

Diffie-Hellman is not as much a cipher as a means of securing exchanging keys. You would use it to securely notify someone else of a symmetric shared key that you both would use for encrypting data. Think of it as more a key exchange method utilizing public and private keys than an actual cipher methodology.


How many primary keys can a table have?

A table can have only one primary key. But, it can have multiple unique keys.


Which is easier to break the cipher used by an Enigma machine or a Caesar cipher?

The Caesar cipher is far more easier to break, as it consists of a single shift operation with a total number of 25 keys. Caeser can be cracked within less than a second by brute force (trying all possible keys). For the enigma machine you have to know which rotors are being used in which order, the initial rotor position, the ring position and the plugboard configuration. With cryptoanalytic approaches Enigma can be cracked as well in decent time. Nevertheless the key space (amount of possible keys) is so large, that simple brute forcing will take a while.


What is unique about a Clavinova CVP digital piano?

The weight of the keys is what is unique about the Clavinova CVP digital piano. Even though it is a digital piano, the keys make it sound like it is a grand piano.


Is encrypting a plaintext with Shift cipher twice by using two different keys more secure than encrypting it once?

Yes, it's. But it's still easy to break. no there is no different


Candidate key and primary key differnece?

All Primary keys are definitely Candidate Keys. A Candidate key is one which can be used as a Primary key that is not null and unique. That is one of the candidate keys can be chosen as a primary key.A Candidate key is a Unique Key and it can be used to find out any particular Tuple (row) in a table. The following are the differences between A Candidate key and a Primary Key: 1) A Unique key can be null but not a Primary key 2) On a table we can have only 1 primary key but 'N' number of unique keys.


What are some of the unique features of the Blackberry keyboard?

There are many unique features of the Blackberry keyboard. Some of the unique features of the Blackberry keyboard would be the ergonomic design of the keys.


What is a practical method of finding a triple of keys that maps a given plain text to a given cipher text using EDE?

One practical method is to first encrypt the given plain text using EDE encryption with three different keys, which gives you the corresponding cipher text. Then, decrypt the given cipher text using the same three keys in decryption order - this will give you the intermediate plain text. Finally, adjust the keys until the intermediate plain text matches the given plain text - this triple of keys will map the given plain text to the given cipher text using EDE.


The purpose of the primary key in building the relationship between tables?

primary keys are unique


How many keys are required for ten people to communication via a cipher?

n(n-1)/2 is the answer. Hence; 10(10-1)/2= 45 shared pairs. but this applies to symmetric only.