Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1. Vernam cipher For this problem, we use the standard letter-to-number conversion A 2,...,Z -25 0, B- 1, C (a.) (5 points) Encrypt the following
1. Vernam cipher For this problem, we use the standard letter-to-number conversion A 2,...,Z -25 0, B- 1, C (a.) (5 points) Encrypt the following message, knowing that it is a Vernam cipher with the short keys U-(10,5) and V - (17, 23, 6) Return to base (b.) (4 points) Suppose now we use the short keys U' -(8,3) and V'- (19, 25, 8) What is the long key K' in this case? Compare this with the long key K you ob- tained from part (a) and discuss how U and U', V and V', K and K' relate to one another (c.) The following message was encrypted using a Vernam cipher knowing that the short keys U and V were of length 1(U) = 3 and 1(V) = 4, and the original plain-text starts with K EEP C A (c.1.) (3 points) Reconstruct the long key K Hint . Try to match the first 6 letters in the plaintext and ciphertext together . You may pick an arbitrary value for the first letter in either U or V then use that to break the remaining bits of the keys (use the idea from parts (a.) and (b.) ) (c.2.) (3 points) Decrypt the message 1. Vernam cipher For this problem, we use the standard letter-to-number conversion A 2,...,Z -25 0, B- 1, C (a.) (5 points) Encrypt the following message, knowing that it is a Vernam cipher with the short keys U-(10,5) and V - (17, 23, 6) Return to base (b.) (4 points) Suppose now we use the short keys U' -(8,3) and V'- (19, 25, 8) What is the long key K' in this case? Compare this with the long key K you ob- tained from part (a) and discuss how U and U', V and V', K and K' relate to one another (c.) The following message was encrypted using a Vernam cipher knowing that the short keys U and V were of length 1(U) = 3 and 1(V) = 4, and the original plain-text starts with K EEP C A (c.1.) (3 points) Reconstruct the long key K Hint . Try to match the first 6 letters in the plaintext and ciphertext together . You may pick an arbitrary value for the first letter in either U or V then use that to break the remaining bits of the keys (use the idea from parts (a.) and (b.) ) (c.2.) (3 points) Decrypt the message
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started