Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem One. Student received the following ciphertext which was encoded with a shift cipher: GUCHQJVDLGSOHDVHGRKRPHZRUN Perform an attack against the cipher based on a letter

Problem One. Student received the following ciphertext which was encoded with a shift cipher:
GUCHQJVDLGSOHDVHGRKRPHZRUN
Perform an attack against the cipher based on a letter frequency count: How many letters do you
have to identify through a frequency count to recover the key? What is the cleartext?
Problem Two. Construct the addition and multiplication tables for Z7.
Problem Three. An obvious approach to increase the security of a symmetric algorithm is to
apply the same cipher twice, i.e.:
y = ek2(ek1(x))
As is often the case in cryptography, things are very tricky and results are often different from
the expected and/ or desired ones. In this problem we show that a double encryption with the
affine cipher is only as secure as single encryption! Assume two affine ciphers ek1= a1x + b1 and
ek2= a2x + b2.
1. Show that there is a single affine cipher ek3= a3x + b3 which performs exactly
2. the same encryption (and decryption) as the combination ek2(ek1(x)).
3. Find the values for a3,b3 when a1=3, b1=5 and a2=11, b2=7.
4. For verification: (1) encrypt the letter K first with ek1 and the result with ek2, and (2) encrypt
the letter K with ek3.
5. Briefly describe what happens if an exhaustive key-search attack is applied to a doubleencrypted affine ciphertext. Is the effective key space increased?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing Fundamentals Design And Implementation

Authors: David M. Kroenke

5th Edition

B000CSIH5A, 978-0023668814

More Books

Students also viewed these Databases questions