Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please explain all answers clearly. 2. (15 (+5) points) Vigenre cipher security strength. (a) Given that we somehow know that the key used in a

image text in transcribed

please explain all answers clearly.

2. (15 (+5) points) Vigenre cipher security strength. (a) Given that we somehow know that the key used in a Vigenre cipher is seven characters long. What 5 pt is an upper bound for the security strength of the cipher, when you only consider exhaustive key search? [Give your answer in bits of security.] (b) One way to determine information about the length of the key (and therefore reducing the security 10 pt strength of the Vigenre cipher) is to look for repeating patterns in the ciphertext. For instance, one may observe that a block of five consecutive letters appears more than once. In that case, it is likely that the same word is enciphered with the same (part of) the key. Given the following ciphertext, what can you conclude about the length of the key, using this property? Qhcyr jxurstxz zk oama zzx eryl pqaj ehdry Miwa zzx nvkdwa bl ttzye Qhcyr xhztkn mpr ymg qa nal rrgdhcf ycr Ih cw piyq ag nvkdwa bl yhta + 5 pt BONUS Can you decrypt this ciphertext and determine the error in the plaintext? [You can use any pro- gramming you want, but make sure you use (b) instead of brute-forcing all possible key-lengths.] 2. (15 (+5) points) Vigenre cipher security strength. (a) Given that we somehow know that the key used in a Vigenre cipher is seven characters long. What 5 pt is an upper bound for the security strength of the cipher, when you only consider exhaustive key search? [Give your answer in bits of security.] (b) One way to determine information about the length of the key (and therefore reducing the security 10 pt strength of the Vigenre cipher) is to look for repeating patterns in the ciphertext. For instance, one may observe that a block of five consecutive letters appears more than once. In that case, it is likely that the same word is enciphered with the same (part of) the key. Given the following ciphertext, what can you conclude about the length of the key, using this property? Qhcyr jxurstxz zk oama zzx eryl pqaj ehdry Miwa zzx nvkdwa bl ttzye Qhcyr xhztkn mpr ymg qa nal rrgdhcf ycr Ih cw piyq ag nvkdwa bl yhta + 5 pt BONUS Can you decrypt this ciphertext and determine the error in the plaintext? [You can use any pro- gramming you want, but make sure you use (b) instead of brute-forcing all possible key-lengths.]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Spatial Database Systems Design Implementation And Project Management

Authors: Albert K.W. Yeung, G. Brent Hall

1st Edition

1402053932, 978-1402053931

More Books

Students also viewed these Databases questions

Question

Explain the function and purpose of the Job Level Table.

Answered: 1 week ago