Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. [40 points] Alice is a student in our class. She also happens to be a movie actor. She wanted to share the plot of

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
1. [40 points] Alice is a student in our class. She also happens to be a movie actor. She wanted to share the plot of one of her movies with her friend, Bob. Although she knew that the substitution cipher wasn't completely secure, she still wanted to use it as she had an urgent need to send this message. She couldn't wait for the end of the course to get to know more secure ciphers. She did some brief research about the tools that can solve substitution cipher. Unfortunately, she discovered that there are many such online tools that can automatically solve substitution ciphers ( So, she tried to slightly strengthen the substitution cipher instead of following the textbook approach as it is. Instead of substituting just the letters, she also used the "punctuation letters" that were in her text as part of the substitution mapping. To be specific, these are the all the letters that she had a mapping for: abcdefghijklmnopqrstuvwxyz ",,-.; Note how she has a mapping for 7 special characters: space (right after z ), double quote, single quote, comma, hyphen, period and semi-colon. So, she now has 33 characters that will all be substituted. This change improved the key space size to 33 ! (roughly equal to 2122 ) keys and thus strengthened the cipher! More importantly for Alice, most of the online tools didn't seem to work as well anymore after using this version of the cipher. This provided some comfort to her and she went on to send a message to Bob. We were able to get hold of the encrypted text that she sent: Now, break this cipher and find the plain text as well as the correct key used for encryption. The encryption key should be represented as a single line of text where each character denotes the character that it replaces. An example key is the following (but, this is not the correct key). ; q'oc.ikbaugjtf, vn"yI -ehdrxzwmsp You should submit the plain text, encryption key as well as any code that you wrote as part of the cryptanalysis. - It's also OK to do the entire cryptanalysis in a manual manner (without any programming). If that's the case, please submit a brief write-up about how you arrived at the answer. - You can also use any of the available online tools to find the solution. If that's the case, please mention the tool that you used in the write-up and also how you used it to arrive at the answer. q'djegszemdhmxrglemg dimhu,rmghlukgsmqlucrem"glmd,rimgm-rqrdluqrmkdsqgusus mq'm-rqgpm,uclgsujtmdsrm"glludlmus reqemgmb'rglqae'gwrzm'ricbmghhrkqrzmexmq'm-rqgpmgszm gusemejwrl'j- gsmgcupuqureimerkd-us mq'rmhuleqmbepgk.mwgsq'rlbtm'mjsuqremgppmejqmq'rmfgcglumqlucrmqdmhdlmq'rmsgqudsmdhm"g.gszgtmd,rimkrsqjlureimq'rm"g.gszgsemjermq'rm,uclgsuj-mqdmzt,rpdwmgz gskrzmqrk'sdpd xmgszmuedpgqrmq'r-erp,remhld-mq'rm"dipzmexmwdeus mgemgmq'ulzm"dlpzmkdjsqlxtmusmq'rmrglpxmsusrqureim"g. gszgoem. us mqok'g.gm,ueuqem'uemeldq'rimsofdcjim"'dmuem"dlus mjszrlkd,rlmusmdg pgszimkgpuhdlsugtmqok'g.gmgkkjeremsofdcjmdhmgeeuequs mepgk.a-gl.rqmgl- emzrgprimjpxeerem.pgirm"uq'meqrgpus m,uclgsuj-mhld- m"g.gszgtmsofdcjoemwglqsrimlr,rgpem'muemyjluimgsdq'rimjszrlkd,rim"g.gszgsimgszmkdshul- emqok'g goemejewukudsetmusmq'rmwlrersqmzgximhdppd"us mqok'g goemzrgq'im'uemedsmqok'gppgmlrqjisemqdm"g.gszgmqdmgeej- rmq'rmq'ldsrtm'mgszmd.dxrimq'rmprgzarindhmq'rmzdlgm-upg frmle u- rsqimr,qlgkqmqok'gppgoemr,apd,rlmsg.ugmhld-mgsmjszrikd,rlmgeeu s- rsqmedme'mkgsmgqqrszm'uemkdldsgqudsmkrlr-dsxm"uq'm'uem-dq'rlmlg-dszgmgszmxdjs rlmeueqrlme'jlutmgqmq'mkrlr-dsximq'mfgeglumqlucroemprgzrlm-ocg.jmk'gpprs remqok'gppgmhdlmq'mkld"smusmluqjgpmkd-cgqtmqok'gppgmzahrgqem-ocg.jmgszmwrlejgzem'u- mqdmxurpzmlgq'rlmq'gsmzurtm"'rsm.pgjrmgszm'uemgkkd- wpukrmrlu.meqr,rsemeqrgpmgm"g.gszgsmglquhgkqmhld-mgmpdszdsm-jerj- imqok'gppgoemhlurszmgszmd.dxroempd,rlm"o.gcumjl rem'u-mqdmclus m.pgjmegk.mgpu,rtmqok'gppgimd.dxrimgszmsg.ugmqlg,rpmqdmcjegsimedjq'm.dirgim"'rlrm.pgjinwpgsemqdmer ppmq'mglquhgkqmqdmkugmg rsqmr,rirqqm.tmideetmgmhulrhu 'qmrljwqeimgszm.pgirmgqqr- wqemqdmhprrmejqmuemkgj 'qmexmqok'gppgim"'dmlrpjkqgsqpxmlrprgerem'u- mqdmldeeomkjeqdzxtm.pgjrmqrppemldeemq'gqm"g.gszgoemusqrisgqudsgpmu-g rmuemgmhldsqmhdlmgmqrk'sdpd ukgppxmgz, gskrzmku, upuygqudstmrlu,mgqqgk.emgszmr;qlgkqem.pgirmgemldeemuem lg,rpxmusfjlrzmwldqrkqus msg.ugtmlgq'rlmq'gsmwjlejm.pgjrimqok'gppgmqg remldeemqdm"g.gsrgim"'rimq'rulmqrk'sdpd xmkgsmeg,rm'utm"'uprme'jlum'rgpemldeeimqok'gppgmkdshldsqemyjlumgedjqmsofdejtmyjlumr;wpgusemq'gqmsofdcjmwpgssramq dme'glrm"ggszzgoemqrk'sdpd xm"uq'mwrdwprmdhmghlukgsmzrekrsqmgldjszmq'rm"dlpzmqdm'rpwmq'r- mkdsnjrlmq'rulmdwwlreedletmgemqok'g.gmgllreqrzmsofdcjimq'rmpgqqrimgqqgk.rzmyjlumgszmhdlkrzmqok'g gm qdm.uppon'u-tmqok'g-gmdizrirzmyjlumqdmpurmq'gqmsofdcjm'gzmzuegwwrglrzmgszmprhiqmcr'uszmsofdejoemgrlukgsmedsmqdm-gusqgusmq'mpurtmq'uemedxm Ir"mjwmqdmermeqr,rseimgmjtetmepgk.mdwemedpzurlm"'dmgzdwqrzmq'rmsg-mb.upp-ds rlbtm-rgs"'uprim.upp-ds rim. uppem.pgirmgszmqg.rem'uemedzxmqdm"g.gszgtm'rmuemcldj 'qqmerhdlrmq'rmqlucgpmrperleimlr,rgpus m'uemuzrsquqxmqdmermsofgzg.gmgszmkpgu-mqdmq'rmq'ldsrtm.upp-ds rlmk'gpprs remqok'gppgmqdmluqigpmkd-cgqim"'rlm'm. uppemyjluimzahrgqemqok'gppgimgszmjlpem'u- md,rimgm"gqrlhgppmqdm'uemwlrej-rzmzrgq'tm.upp-ds rlmus reqemq'm'rglqae'gwrzm'rlemgszmdlzrlemq'mlreqmuskusrigqrzimejqmsg ugmr;qlgkqemdsrmhuleqtm.upp-ds rlimejwwdlqramexm"o.geumgszm'uemgl-ximwlrwglremqdmzueqlucjqrme'uw- rsqemdhm"g.gszgsm"rgwdsemqdmdwrlgqu,remgldjszmq'rm"dlpztmsg.ugime'jluimlg- dszgimgszmideemhprrmqdmq'rmfgcglumqlucrmhdlmguztmg'rxmhuszmgmkd- gqdermqok'gppgimirekjrzmexmq'rmfgcglumusmlrwgx-rsqmhdlmewglus m - ocg.joempuhrtm'rgprzmexmsg.ugoem'rlcimqok'gppgmirqjisemqdmhu 'qm.upp-ds rlim"'dmzdsem'uemd"smsgsdqrk'mejuqimeu-upgimqdmqok'gppgoetm"o.gcumgszm'uemgl-xmhu 'qme'jluimsg.ugimgszmq'rmzdlgm-upgfrim"'uprmldeemlr- dqrpxmwupdqemgmfrqmgszme'ddqemzd"smwpgsremkgllxus mq'm,uelgsuj-m"rgwdsetm- ocg.jmgszmq'rmfgcglumgllu,mqdmlrushdlkrmqok'gppgtmkdshldsqramexmd.dxrim"o.gcumgszm'uemgl- xmeqgszmzd"stmhu 'qus musm"g.gszgoem,uclgsuj-m-usrimqok'gppgmzueljwqem.upp-ds rloemejuqmgszmeqgeem'u-tm.upp-ds rimirhjeremqdmerm'rgprzimk'ddeus mqdmzurmgmhlrm- gsmlgq'rlmq'gsmermuskglkrlgqrzvmqok'gppgmqg.rem'u-mqdmq'rm"'gqrIhgppm"'rirmq'rxmhdj 'qim"'rirm.upp-ds rimzuremwrgkrhjppximqok'gppgmreqgepue'remgsmdjqlrgk'mkrsqrimgqmq'mejupzus m"'rirmsofdcjmzurzimqdmermljsmexmsg ugmgszme'jlutmusmgm- uzaklrzuqemekrsrimqok'gppgmgwwrglemcrhdlrmq'mjsuqramsgqudsemqdmlr,rgpm"g.gasgoemqljrmsgqilmmdmq'r m"dlpztmusmgmwdeqaklrzuqemekrsrime'jlum'rpwemcjk xmeglsrem"uq'm'uemlrkd,rkxt

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Administrator Limited Edition

Authors: Martif Way

1st Edition

B0CGG89N8Z

More Books

Students also viewed these Databases questions