Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 3. Consider the following variant of a shift cipher: instead of shifting each letter by the same amount, we shift each letter by a

image text in transcribed

Problem 3. Consider the following variant of a shift cipher: instead of shifting each letter by the same amount, we shift each letter by a different amount. The key consists of two integers n and m, and to encrypt, we shift the ith letter by nim places in the alphabet. In other words, if pi is the ith plaintext letter, and ci is the ith ciphertext letter, then the encryption rule is: ci Pi + n + im (mod 26) Let's count letters from 0, so that po is the first plaintext letter, pi is the second plaintext letter, and so forth (a) Encrypt "mathematics', using n = 2, m = 3 (b) Decrypt "hvvahivknzhfqhl" using n 5, m 2 (c) Discuss the relative strength of this cipher under the four different attack models: ciphertext only, known plaintext, chosen plaintext, chosen ciphertext (d) Can you launch a successful "ciphertext only" attack on the following message? dtahxkbmlvgbdzfrnsodptogruzhoeuqfskirbpe pgntnjlrvecjzfhnbyfjkrhusmtweoawtxyoajja isvuwacovlpzbfykkgrvxcbggzpplqxyenrpwmsa rulwevfsjnosymlvtlrdkwcaxcsz Problem 3. Consider the following variant of a shift cipher: instead of shifting each letter by the same amount, we shift each letter by a different amount. The key consists of two integers n and m, and to encrypt, we shift the ith letter by nim places in the alphabet. In other words, if pi is the ith plaintext letter, and ci is the ith ciphertext letter, then the encryption rule is: ci Pi + n + im (mod 26) Let's count letters from 0, so that po is the first plaintext letter, pi is the second plaintext letter, and so forth (a) Encrypt "mathematics', using n = 2, m = 3 (b) Decrypt "hvvahivknzhfqhl" using n 5, m 2 (c) Discuss the relative strength of this cipher under the four different attack models: ciphertext only, known plaintext, chosen plaintext, chosen ciphertext (d) Can you launch a successful "ciphertext only" attack on the following message? dtahxkbmlvgbdzfrnsodptogruzhoeuqfskirbpe pgntnjlrvecjzfhnbyfjkrhusmtweoawtxyoajja isvuwacovlpzbfykkgrvxcbggzpplqxyenrpwmsa rulwevfsjnosymlvtlrdkwcaxcsz

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beyond Big Data Using Social MDM To Drive Deep Customer Insight

Authors: Martin Oberhofer, Eberhard Hechler

1st Edition

0133509796, 9780133509793

More Books

Students also viewed these Databases questions

Question

LO3 Discuss the steps of a typical selection process.

Answered: 1 week ago