subject

The problem:You and your friend want to encrypt your messages and you have shared a secret key that is known to just the two of you. Every character in the character_set is mapped to some other character in the secret key. For example 'a' is mapped to 'D', 'b' is mapped to 'd', 'c' is mapped to '1' and so forth as shown below: character_set = "0123456789 "
secret_key = "Dd18Abz2EqNPWhYTOjBvtVlpXaH6msFUIC gT4o0KZwJeryQx3f9kSinRu5L7cGM"
What I have to do is work on writing a code that decodes the message - sE8MXYtMAhqYXMPADjhEhzMEhMv2AM1PDBB
Can anyone help with this?

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 13:00
Why the bear has a slunky tail determine the meaning of the word slunk in the story
Answers: 1
question
Computers and Technology, 22.06.2019 18:40
Mariah was working on a multimedia presentation that included both video and audio files. the file was huge, and she wanted to send it to her coworker in another office. she needed to reduce the size of the file so that it could be transmitted faster. the utility she used to do this was
Answers: 2
question
Computers and Technology, 23.06.2019 22:30
You draw two cards from a standard deck of 52 cards, but before you draw the second card, you put the first one back and reshuffle the deck. (a) are the outcomes on the two cards independent? why?
Answers: 3
question
Computers and Technology, 24.06.2019 18:10
Most information security incidents will occur because of select one: a. users who do not follow secure computing practices and procedures b. increases in hacker skills and capabilities c. poorly designed network protection software d. increasing sophistication of computer viruses and worms
Answers: 1
You know the right answer?
The problem:You and your friend want to encrypt your messages and you have shared a secret key that...
Questions
Questions on the website: 13722367