Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Introduction If you're a fan of puzzles (or even if you're not), this should be a fun assignment! One of the textbooks on Computer Security

Introduction

If you're a fan of puzzles (or even if you're not), this should be a fun assignment!

One of the textbooks on Computer Security contains two ciphers:

1. On the page immediately following the title page, there is the following ciphertext:

Gh dt rgbanygr, shzznivbnr iya cidwzt, meh eifn wyrpwona dn gh mowgn gewr jhhu.

2. One of the exercises in the textbook contains the following ciphertext:

"Ea qu nmj'l ojmq qxuvu qu'vu rmejr, wjg vmwn qeii nm".

These ciphers are simple substitution ciphers of the type that many people like to amuse themselves trying to solve. Newspapers often publish a daily crypto-puzzle (along the lines of a daily crossword puzzle) which readers try to solve -- often during their daily commutes.

The Homework Assignment-1

The assignment is twofold:

Read Edgar Allan Poe's The Gold Bug [1], and Sir Arthur Conan Doyle's The Adventure of the Dancing Men [2] (see References below).

Note: Not native speakers of English may have some trouble reading parts of these stories, because they use archaic English words and attempt to represent characters' accents and dialects (in particular, the freed slave in The Gold Bug has a strong Southern black accent). You may have to ask a native English speaker to "translate" for you. Remember, for the purposes of this assignment, not all aspects of the stories are germane.

Solve the two ciphers (shown above and below) that is, determine the English cleartext from which the ciphertext was derived.

Gh dt rgbanygr, shzznivbnr iya cidwzt, meh eifn wyrpwona dn gh mowgn gewr jhhu.

" Ea qu nmj'l ojmq qxuvu qu'vu rmejr, wjg vmwn qeii nm".

There are many resources you can use to accomplish the above, including (in no particular order):

Your own brain, with paper and pencil.

In particular, think about what you know about each cipher, in its own context. You can infer an amazing amount of information, based on intelligent guesswork, and knowledge of, say, the typical form you would expect for the plaintext version, based on what function it is performing, in its own context.

Also, you can look at the grouping of the letters and infer which words are likely to be verbs, or nouns, or whatever. In the case of 2- or 3-letter words, you can probably make a few guesses, so see whether you can make further progress based on those guesses. What word(s) might start the sentence or phrase, given its context?

Punctuation can often be a dead giveaway, and lead to interesting insights.

Collaboration with others, to share ideas, and divide up the work. Don't forget to give credit where it's due!

Once you've tried the above (please try it first, and spend some time on it), you can resort to other methods:

Various deciphering tools and programs available from many sources, including the World-Wide Web. This course web site has some Java applets which may help.

Various accounts of deciphering methods and techniques. This also includes short stories such as ones referred to above.

What to Submit in your Homework-1 Report:

I am more interested in how you solved the ciphers than the actual answers (which I already know). Please submit a description of what you did, which should include:

Who you worked with, and specifically how you divided up the work of deciphering the ciphertexts (who did what; how much of that work was done by whom).

What plan of attack you used? This may actually be more than one plan of attack, if one or more plans failed to produce results. I want to hear about all the unsuccessful attempts as well as the successful one(s) this is often more illuminating than just discussing the successful approaches. (You learn a lot more from your mistakes than from your successes!)

What assumptions you made; what deductions you made, etc.

What are the English cleartexts from which these two ciphertexts were derived?

How long it took you to solve each of the puzzles.

Edgar Allan Poe's The Gold Bug [1] shows an example of an explanation of how one of the characters solved his cipher. Have your explanation be of a similar nature, so that I can understand how you went about solving the problems.

Please answer all the required questions, Thank you.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Analysis Using SQL And Excel

Authors: Gordon S Linoff

2nd Edition

111902143X, 9781119021438

More Books

Students also viewed these Databases questions

Question

What are some of the possible scenes from our future?

Answered: 1 week ago

Question

1. What are your creative strengths?

Answered: 1 week ago