Question
Implement in either matlab, C, C++, C#, python, java, or any language of your choice functions to encrypt, decrypt, and attack the following crypto: Y
Implement in either matlab, C, C++, C#, python, java, or any language of your choice functions to encrypt, decrypt, and attack the following crypto:
Yi = (Xi + Ki%m) % 256
Xi = (Yi - Ki%m) % 256
Where {Xi ; i = 0 : N-1 } is the input plain N ASCII bytes , {Ki ; i = 0 : m-1 } is the keyword of length m of lower case characters, and {Yi; i = 0 : N-1} is the output cipher N bytes.
To test your routines you need to encrypt a .txt file and decrypt the resulting file. Exchange the encrypted files with your lab partner, and then run your attack routine to find out your partner's secret keyword and decrypt his/her encrypted file.
Your report should include answers to the following questions:
- What is the typical probability distribution of the 256 ASCII characters in .txt data?
- What is the effect of Vigenere encryption on the data statistics of .txt data such as mode, mean, median, standard deviation and entropy?
- What is the effect of cascading 2 Vigenere crypto systems on the security of the system
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started