Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

InformationSecurity Please complete the three steps in full for both Ciphers(3 steps for Shift Cipher, 3 steps for Subsititution Cipher). If hand written, please be

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\InformationSecurity\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

Please complete the three steps in full for both Ciphers(3 steps for Shift Cipher, 3 steps for Subsititution Cipher).

If hand written, please be neat with your handwritting. Thanks

image text in transcribed

Shift Cipher:

fxxmjbfxltnslymwtzlmymjbttixxmjrjybnymfbtqkbmtmfifajwdlwjfyrnsiytjfymjwzugzymjifwjistygjhfzxjtkxtrjbttihzyyjwxbtwpnslsjfwgdnsymjktwjxymjfxpjimjwbmjwjxmjbfxltnslymjuttwhmnqibmtinistypstbymfynybfxifsljwtzxytxyfdfsiyfqpytfbtqkxfniytmnrnfrltnslytxjjrdlwfsirtymjwfsi hfwwdmjwfhfpjfsifqnyyqjutytkgzyyjwkwtrrdrtymjw

Substitution Cipher:

zorxv dzh yvtrmmrmt gl tvg evib grivw lu hrggrmt yb svi hrhgvi lm gsv yzmp zmw lu szermt mlgsrmt gl wl lmxv li gdrxv hsv szw kvvkvw rmgl gsv yllp svi hrhgvi dzh ivzwrmt yfg rg szw ml krxgfivh li xlmevihzgrlmh rm rg zmw dszg rh gsv fhv lu z yllp gslftsg zorxv drgslfg krxgfivh li xlmevihzgrlm hl hsv dzh xlmhrwvirmt rm svi ldm nrmw zh dvoo zh hsv xlfow uli gsv slg wzb nzwv svi uvvo evib hovvkb zmw hgfkrw dsvgsvi gsv kovzhfiv lu nzprmt z wzrhb xszrm dlfow yv dligs gsv gilfyov lu tvggrmt fk zmw krxprmt gsv wzrhrvh dsvm hfwwvmob z dsrgv Izyyrg drgs krmp vbvh izm xolhv yb svi

For each cipher: 1. Suggest two different ways of attacking the cipher. Make sure to indicate 2. Explain which of the two ways you would choose to break the cipher and 3. Break the cipher and include the plaintext in your submission along with a which attack scenario applies. why. detailed explanation of how you get the plaintext. For each cipher: 1. Suggest two different ways of attacking the cipher. Make sure to indicate 2. Explain which of the two ways you would choose to break the cipher and 3. Break the cipher and include the plaintext in your submission along with a which attack scenario applies. why. detailed explanation of how you get the plaintext

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advanced Database Systems

Authors: Carlo Zaniolo, Stefano Ceri, Christos Faloutsos, Richard T. Snodgrass, V.S. Subrahmanian, Roberto Zicari

1st Edition

155860443X, 978-1558604438

More Books

Students also viewed these Databases questions

Question

Does it avoid use of underlining?

Answered: 1 week ago