Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Need help figuring this out. Supposed to be written in Python. Thanks. Some cryptography and a little computer security You find an odd DeLorean parked

image text in transcribed

Need help figuring this out. Supposed to be written in Python. Thanks.

Some cryptography and a little computer security You find an odd DeLorean parked around the corner. Realizing that Doc Brown has left the keys in the ignition, you decide that a quick trip back to Rome in 40 BC is in order. A few mint condition coins, and possibly a picture of Vincengetorix will be highly remunerative As usual, the car fails and you are stranded All is not lost, Julius Ceaser recruits you for his secret service as a cryptographer. Falerian wine is palatable, you have acquired a taste for garum (don't ask), and there are more than enough other attractions to make your life comfortable Fortunately, you have your laptop, running linux with a python interpreter, and by the use of lemon juice, copper denarii and silver sestarii you are able to rig up a battery to keep it running 1. Write a program that takes a key (a number from 1 to 26) an input file name, and an output file name from the command line and uses the key to encrypt it with a Ceaser cipher. A Ceaser cipher performs modular addition of the key and the letter. If the key is 1 then a->b, b->c, ..., y->z, z->a . Ignore all the things that aren't the letters from a to z (simply pass them through) and you will want to put the letters into lower case. Use the file messagel.txt and a key of 7 to encrypt it 2. Cato and Junius Brutus are using the cipher to encrypt their communications. In Latin as well as that vulgar Germanic language Englisc the letter 'e' is the most common letter. t is the second most common. Write a program to count the numbers of each letter in the message. (i.e. how common is each symbol) Then use that to find the key for the message Use the file ceaser1.txt for input extra credit Ceaser ciphers form a group. Therefore repeated encryption with any key will recover the message. Use the results from your answer to the second question to find the message The proper decryption will be when 'e' is the most common letter and is the seconod most common. Use the file ceaser2.txt for input

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2022 Grenoble France September 19 23 2022 Proceedings Part 4 Lnai 13716

Authors: Massih-Reza Amini ,Stephane Canu ,Asja Fischer ,Tias Guns ,Petra Kralj Novak ,Grigorios Tsoumakas

1st Edition

3031264118, 978-3031264115

More Books

Students also viewed these Databases questions

Question

Explain all drawbacks of application procedure.

Answered: 1 week ago

Question

Explain the testing process of accounting 2?

Answered: 1 week ago

Question

5. Have you stressed the topics relevance to your audience?

Answered: 1 week ago