4a-2 (if a=3)
4•3-2
12-2
10......so 4a-2=10
Chat with our AI personalities
Its an algebra property(: ask someone else cause i got no idea!
ihkfh
5+5=5+5
The substitution method undoes the chain rule.
In a monoalphabetic cipher, our substitution characters are arandom permutation of the 26 letters of the alphabet:plaintext letters: a b c d e f .....substitution letters: t h i j a b .....• The key now is the sequence of substitution letters. In otherwords, the key in this case is the actual random permutation ofthe alphabet used.For a particular alphabet, only one substitution can be usedexample: if the substitution letter for 'a' is 't' and for 'd' it is 'p'then if the keyword happens to be "tpp"..... then we can encrypt the message as "add"(note that the substitution letter for 'd' is only 'p'..In a monoalphabetic cipher, the same substitution rule is used forevery substitution. In a polyalphabetic cipher, the substitutionrule changes continuously from letter to letter according to theelements of the encryption key.Example for polyalphabetic:key: abracadabraabracadabraabracadabraabplaintext: canyoumeetmeatmidnightihavethegoodsciphertext: CBEYQUPEFKMEBK.....................• The Vigenere cipher is an example of a polyalphabetic cipher.