Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

not a progamming question, just using ciphers 3. You Intercept an enemy transmission that you believe was encrypted using the vigenere cipher: ULEFIZBCXFICBWRDVRUMSUABPJGIIZBVREINE (a) You

image text in transcribed

not a progamming question, just using ciphers

3. You Intercept an enemy transmission that you believe was encrypted using the vigenere cipher: ULEFIZBCXFICBWRDVRUMSUABPJGIIZBVREINE (a) You believe that the key length used to encrypt the message was either 1, 2, 3, or 4. Using displacement coincidences, find the number of coincidences corresponding to each of the possible key lengths. Based on this, what do you suspect is the key length? (b) Based on the guessed key length, you proceed to separate out the ciphertext into groups according to their shift values. After conducting a frequency analysis on each group, you determine that the 2nd group (i.e., the group starting from the 2nd letter) used a key value of 4 and the 3rd group (i.e., the group starting from the 3rd letter) used a key value of 13. Using this information, find the full key and use it to decrypt the message. (c) Why was the frequency analysis conducted in part (b) only conclusive for some of the groups of letters and not all? What would you need to be more certain about the conclusions you can draw from a frequency analysis? 3. You Intercept an enemy transmission that you believe was encrypted using the vigenere cipher: ULEFIZBCXFICBWRDVRUMSUABPJGIIZBVREINE (a) You believe that the key length used to encrypt the message was either 1, 2, 3, or 4. Using displacement coincidences, find the number of coincidences corresponding to each of the possible key lengths. Based on this, what do you suspect is the key length? (b) Based on the guessed key length, you proceed to separate out the ciphertext into groups according to their shift values. After conducting a frequency analysis on each group, you determine that the 2nd group (i.e., the group starting from the 2nd letter) used a key value of 4 and the 3rd group (i.e., the group starting from the 3rd letter) used a key value of 13. Using this information, find the full key and use it to decrypt the message. (c) Why was the frequency analysis conducted in part (b) only conclusive for some of the groups of letters and not all? What would you need to be more certain about the conclusions you can draw from a frequency analysis

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Relational Database Technology

Authors: Suad Alagic

1st Edition

354096276X, 978-3540962762

More Books

Students also viewed these Databases questions

Question

Why is the plea of no contest inadmissible?

Answered: 1 week ago

Question

8. Explain the contact hypothesis.

Answered: 1 week ago

Question

2. Define the grand narrative.

Answered: 1 week ago