Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer the following 2 questions The Texts for the Cipher: Part 3: Rhs bmwrtxqsmrw ests jw xwsvsww jw hbw wi-gjvvsk gtse. Rhs gtse qijmsk,

Please answer the following 2 questions

image text in transcribedimage text in transcribed

The Texts for the Cipher:

Part 3:

Rhs bmwrtxqsmrw ests jw xwsvsww jw hbw wi-gjvvsk gtse. Rhs gtse qijmsk, yxr Fjga tivvsk hbw scsw jmk gimrbmxsk kswlbrs rhs ltirswr. Fjga dtjyysk j vbms uit yjvjmgs, kxgask jw rhs qjbmwjbv fstask riejtk hbq, rhsm gimrbmxsk hbw writc, hjtkvc qbwwbmd j ysjr. Hs ejw j ehivs hsjk whitrst rhjm rhs jtbwrigtjr, yxr giqqjmksk jw qxgh, bu mir qits, tswlsgr. Csr hbw hjmkw gimrbmxsk ri qizs jw bu hs ests wrbvv hivkbmd hst, tbwbmd jmk ujvvbmd, tbwbmd jmk ujvvbmd. Fjga gviwsk hbw scsw rbdhrvc bm utxwrtjrbim. "Vicjv ri rhs vjwr," Fjga wjbk, vsjmbmd kiem jmk viiabmd kbtsgrvc bmri rhs waxvv'w scs wigasrw. Mims iu hbw gtse qsqystw hjk yxkdsk j wbmdvs bmgh. Ubrnebvvbjq ktse hbw weitk jmk qjks wxts rhs irhstw ests yshbmk hbq, yxr hs kbkm'r wril yjgabmd jejc. Hbw zibgs ytias iuu, jw rhs wixmk, uvijrbmd jvimd rhs ebmk, ysgjqs vixkst. Rhs gtse esmr wrbuu jdjbm, jmk rhs wjbvw uvse xl jmk kiem rhs qjwrw. Ljmrbmd, wesjrbmd, jmk uxtbixw yscimk ysvbsu, Fjga Wljttie vsjmsk hsjzbvc im rhs ehssv. Ubrnebvvbjq wjr im j yjttsv, lxvvsk hbw weitk utiq hbw wgjyyjtk jmk xwsk hbw msgastghbsu ri wvievc livbwh br, qjabmd vimd, wqiirh wrtiasw. Fjga riia bm j kssl ytsjrh, jmk rhs wjvr jbt ubvvsk hbq ebrh j hjllc ussvbmd iu jkzsmrxts. Rhbw ejw qxgh ysrrst rhjm rtjzsvbmd jw j wriejejc, jw hs hjk ysuits. Wiqsrhbmd hjk gvsjtvc rjasm gimrtiv iu rhs whbl--wiqsrhbmd liestuxv jmk bmzbwbyvs. Jtjysvvj wriik jr rhs tjbv, wrjtbmd dviiqbvc ixr ri wsj. Fjga gtiwwsk ri ehsts Jtjysvvj wriik djnbmd ixr ri wsj. Jtjysvvj hjk wsrrvsk imri rhs ksga, wbrrbmd gtiww-vsddsk ebrh hst yjga jdjbmwr rhs uitsqjwr. Rhs ehbrs wjmkw iu rhs ysjgh ests weslr bmri vbrrvs ehbtvebmkw, whburbmd rhs ljrrstmw im rhs wjmk kxmsw. Hs dvjtsk jr rhs wasvsrim, ehbgh wssqsk ri dtbm jr hbq utiq xmkstmsjrh hbw vsjrhst rtbgitm. Mit ejw br libmrbmd wixrh it sjwr it eswr. Fjga fxqlsk jdjbm jmk wrjtsk xl bmgtskxvixwvc jw rhs wjbvw xmuxtvsk, tsrxtmbmd ri rhsbt ltilst liwbrbimw.

Part 4

OGTERDRIAREZWANSRZNENKAE

Part 3: Substitution Cipher In this part, we have yet another intercepted communication. And this time, it is thought that the communication is encrypted using a substitution cipher. What is shown below is the intercepted cipher text. We observe that the characters of the English alphabet are encrypted, and other characters are left alone. What is the plain text corresponding to the FIRST sentence of the cipher text? [4 marks] Rhs bmwrtxqsmrw ests jw xwsvsww jw hbw wi-gjvvsk gtse. Rhs gtse qijmsk, yxr Fjga tivvsk hbw scsw jmk gimrbmxsk kswlbrs rhs ltirswr. Figa dtjyysk j vbms uit yjvjmgs, kxgask jw rhs qjbmwjbv fstask riejtk hbq, rhsm gimrbmxsk hbw writc, hjtkvc qbwwbmd j ysjr. Hs ejw j ehivs hsjk whitrst rhjm rhs jtbwrigtjr, yxr giqqjmksk jw qxgh, bu mir qits, tswlsgr. Csr hbw hjmkw gimrbmxsk ri qizs jw bu hs ests wrbvv hivkbmd hst, tbwbmd jmk ujvvbmd, tbwbmd jmk ujvvbmd. Fjga gviwsk hbw scsw rbdhrvc bm utxwrtjrbim. "Vicjv ri rhs vjwr, Fjga wjbk, vsjmbmd kiem jmk viiabmd kbtsgrvc bmri rhs waxvv'w scs wigasrw. Mims iu hbw gtse qsqystw hjk yxkdsk j wbmdvs bmgh. Ubrnebvvbjq ktse hbw weitk jmk qjks wxts rhs irhstw ests yshbmk hbq, yxr hs kbkm'r wril yjgabmd jejc. Hbw zibgs ytias iuu, jw rhs wixmk, uvijrbmd jvimd rhs ebmk ysgiqs vixkst. Rhs gtse esmr wrbuu jdjbm, jmk rhs wjbvw uvse xl jmk kiem rhs qjwrw. Ljmrbmd, wesjrbmd, jmk uxtbixw yscimk ysvbsu, Fjga Wljttie vsjmsk hsjzbvc im rhs ehssv. Ubrmebvvbjq wjr im j yjttsv, lxvvsk hbw weitk utiq hbw wgjyyjtk jmk xwsk hbw msgastghbsu ri wvievc livbwh br, qjabmd vimd, wqiirh wrtiasw. Fjga riia bm j kssl ytsjrh, jmk rhs wjvr jbt ubvvsk hbq ebrh j hjllc ussvbmd iu jkzsmrxts. Rhbw ejw qxgh ysrrst rhjm rtjzsvbmd jw j wriejeje, jw hs hjk ysuits. Wiqsrhbmd hjk gvsjtvc rjasm gimrtiv iu rhs whbl-wiqsrhbmd liestuxv jmk bmzbwbyvs. Jtjysvvj wriik jr rhs tjbv, wrjtbmd dviiqbvc ixr ri wsj. Fjga gtiwwsk ri ehsts Jtjysvvj wriik djnbmd ixr ri wsj. Jtjysvvj hjk wsrrvsk imri rhs ksga, wbrrbmd gtiww-vsddsk ebrh hst yjga jdjbmwr rhs uitsqjwr. Rhs ehbrs wjmkw iu rhs ysjgh ests weslr bmri vbrrvs ehbtvebmkw, bmgtskxvixwvc jw rhs wjbvw xmuxtvsk, tsrxtmbmd ri rhsbt ltilst liwbrbimw

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Modeling And Design

Authors: Toby J. Teorey, Sam S. Lightstone, Tom Nadeau, H.V. Jagadish

5th Edition

0123820200, 978-0123820204

More Books

Students also viewed these Databases questions

Question

What are topics included in virtually all labor agreements?

Answered: 1 week ago