Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Vernam cipher For this problem, we use the standard letter-to-number conversion A 2,...,Z -25 0, B- 1, C (a.) (5 points) Encrypt the following

image text in transcribed

1. Vernam cipher For this problem, we use the standard letter-to-number conversion A 2,...,Z -25 0, B- 1, C (a.) (5 points) Encrypt the following message, knowing that it is a Vernam cipher with the short keys U-(10,5) and V - (17, 23, 6) Return to base (b.) (4 points) Suppose now we use the short keys U' -(8,3) and V'- (19, 25, 8) What is the long key K' in this case? Compare this with the long key K you ob- tained from part (a) and discuss how U and U', V and V', K and K' relate to one another (c.) The following message was encrypted using a Vernam cipher knowing that the short keys U and V were of length 1(U) = 3 and 1(V) = 4, and the original plain-text starts with K EEP C A (c.1.) (3 points) Reconstruct the long key K Hint . Try to match the first 6 letters in the plaintext and ciphertext together . You may pick an arbitrary value for the first letter in either U or V then use that to break the remaining bits of the keys (use the idea from parts (a.) and (b.) ) (c.2.) (3 points) Decrypt the message 1. Vernam cipher For this problem, we use the standard letter-to-number conversion A 2,...,Z -25 0, B- 1, C (a.) (5 points) Encrypt the following message, knowing that it is a Vernam cipher with the short keys U-(10,5) and V - (17, 23, 6) Return to base (b.) (4 points) Suppose now we use the short keys U' -(8,3) and V'- (19, 25, 8) What is the long key K' in this case? Compare this with the long key K you ob- tained from part (a) and discuss how U and U', V and V', K and K' relate to one another (c.) The following message was encrypted using a Vernam cipher knowing that the short keys U and V were of length 1(U) = 3 and 1(V) = 4, and the original plain-text starts with K EEP C A (c.1.) (3 points) Reconstruct the long key K Hint . Try to match the first 6 letters in the plaintext and ciphertext together . You may pick an arbitrary value for the first letter in either U or V then use that to break the remaining bits of the keys (use the idea from parts (a.) and (b.) ) (c.2.) (3 points) Decrypt the message

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions