Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assignment Description. This assignment is designed to allow you to get some practice with cryptanalysis of substitution ciphers. Write a program that will attempt a

Assignment Description. This assignment is designed to allow you to get some practice with cryptanalysis of substitution ciphers. Write a program that will attempt a brute-force decryption attack on an encrypted phase that uses the simple substitution cypher. The following encrypted quotations are provided for you to test out your code (and I will attempt to run and evaluate your program using these phrases). Your program must make an honest attempt at cracking the phrasesany pre-programming of the resulting phrases that will "match" when the program is run will result in zero points being assigned for the lab. You may use any programming language that you like for your submission, but I recommend using something that makes text manipulation easy, like Python. 1. fqjcb rwjwj vnjax bnkhj whxcq nawjv nfxdu mbvnu ujbbf nnc 2. oczmz vmzor jocdi bnojv dhvod igdaz admno ojbzo rcvot jprvi oviyv aozmo cvooj ziejt dojig toczr dnzno jahvi fdiyv xcdzq zoczn zxjiy 3. ejitp spawa qleji taiul rtwll rflrl laoat wsqqj atgac kthls iraoa twlpl qjatw jufrh lhuts qataq itats aittk stqfj cae 4. iyhqz ewqin azqej shayz niqbe aheum hnmnj jaqii yuexq ayqkn jbeuq iihed yzhni ifnun sayiz yudhe sqshu qesqa iluym qkque aqaqm oejjs hqzyu jdzqa diesh niznj jayzy uiqhq vayzq shsnj jejjz nshna hnmyt isnae sqfun dqzew qiead zevqi zhnjq shqze udqai jrmtq uishq ifnun siiqa suoij qqfni syyle iszhn bhmei squih nimnx hsead shqmr udquq uaqeu iisqe jshnj oihyy snaxs hqihe lsilu ymhni tyz Additionally, you must write two smaller programs. The first will be a simple-substitution encrypter that will take in two arguments: an existing plain-text phrase and a key in the form of the modified a lphabet. The second will be a decrypter for the same type of crypto and take in the encrypted phrase and the modified alphabet "key" as arguments. Use the two smaller programs that you write to encrypt the following phrases. Make sure to provide me with the keys that you use and the resulting crypto phrase: 1. He who fights with monsters should look to it that he himself does not become a monster . And if you gaze long into an abyss , the abyss also gazes into you. 2. There is a theory which states that if ever anybody discovers exactly what the Universe is for and why it is here , it will 1 instantly disappear and be replaced by something even more bizarre and inexplicable . There is another theory which states that this has already happened . 3. Whenever I find myself growing grim about the mouth ; whenever it is a damp , drizzly November in my soul ; whenever I find myself involuntarily pausing before coffin warehouses , and bringing up the rear of every funeral I meet ; and especially whenever my hypos get such an upper hand of me , that it requires a strong moral principle to prevent me from deliberately stepping into the street , and methodically knocking people s hats off - then , I account it high time to get to sea as soon as I can.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design And Relational Theory Normal Forms And All That Jazz

Authors: Chris Date

1st Edition

1449328016, 978-1449328016

More Books

Students also viewed these Databases questions

Question

What is the purpose of the Salary Structure Table?

Answered: 1 week ago

Question

What is the scope and use of a Job Family Table?

Answered: 1 week ago