Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A geeralization of the Caesar cipher, known as the affine Caesar cipher, has the following form: for each plaintext letter p ( where p can

A geeralization of the Caesar cipher, known as the affine Caesar cipher, has the following form: for each plaintext letter p (where p can be an integer between 0 and 25 inclusive), substitute the ciphertext letter C: C = E([a, b], p)=(ap + b) mod 26 A basic requirement of any encryption algorithm is that it needs to be one-to-one, i.e., if p!=q, then E(k,p)!= E(k,q) where the key k =[a,b]. Otherwise, decryption is impossible, because more than one plaintext character maps into the same ciphertext character. The affine Caesar cipher is not one-to-one for all values of a. For example, for a=2 and b=3, then E([a,b],0)= E([a,b],13)=3.
a. Are there any limitations on the value of b for the affine Caesar cipher to be one-to-one? Explain
why or why not.
b. What are the values of b providing distinct mappings for the affine Caesar cipher? Hint: Because
of the mod-26 operation, some b provide equal mapping outputs for the affine Caesar cipher.
c. Determine which values of a are not allowed. Provide a general statement of which values of a
are and are not allowed. Justify your statement.
d. How many keys are there for distinct affine Caesar cipher? Hint: Ordinary Caesar cipher has 26
keys.
e. A long English book has been encrypted using an affine Caesar cipher. The most frequent letter
of the ciphertext is "C", and the second most frequent letter of the ciphertext is "D". Break this
code to find the key.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advanced MySQL 8 Discover The Full Potential Of MySQL And Ensure High Performance Of Your Database

Authors: Eric Vanier ,Birju Shah ,Tejaswi Malepati

1st Edition

1788834445, 978-1788834445

More Books

Students also viewed these Databases questions

Question

b. Why were these values considered important?

Answered: 1 week ago

Question

3. An overview of the key behaviors is presented.

Answered: 1 week ago

Question

2. The model is credible to the trainees.

Answered: 1 week ago