Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Questions: What type of cipher is this program useful for breaking? In this type of cipher, the relationship between characters in the plaintext and characters

image text in transcribedimage text in transcribed

Questions:

  1. What type of cipher is this program useful for breaking?
  2. In this type of cipher, the relationship between characters in the plaintext and characters in the ciphertext is __________.
  3. List the frequencies for the top 4 characters found in the given ciphertext:

MKLAJZHAIUQWKHJABZNXBVHAGKFASDFGALQPIWRYIOQYWIERMASVZMNBZXCKJASDFGLKJFHWQERYIOQWTYIOASUDYFLASKJDHFZMZVBCXMVQLWERYIQRASDFQIWUERYIHKMFMAKHLSDFYUIOQWYREIORYIWQEUFHAKDFHLKASHFKVBBBNASMDFSADFWQEUYRUUEYRUUUQKASJHFKJDSHFSNBNBNBNBABABAAASKJFHLKJSADHFIDUASFOYDASIYFQWERBQWBRKLJLKASSADFDFDASDA

  1. Break the cipher text given in the following. What is the plaintext? What is the key?

OTWEWNGWCBPQABIZVQAPMLJGZWTTQVOBQUMAPMIDGZCAB

EQVBMZLZIXMLAXZQVOQVLMMXAVWEIVLLIZSNZWAB

JQZLWNLMTQOPBVIUMLGWCBPAEQNBTGTMNBBPMVMAB

ITIAKWCTLVBBQUMQBEPQTMQBEIAQVUGBZCAB

Task 1: Frequency Analysis (100 points) The cryptanalyst can benefit from some inherent characteristics of the plaintext language to launch a statistical attack. For example, we know that the letter E is the most frequently used letter in English text. The cryptanalyst finds the mostly-used character in the ciphertext and assumes that the corresponding plaintext character is E. After finding a few pairs, the analyst can find the key and use it to decrypt the message. To prevent this type of attack, the cipher should hide the characteristics of the language. Table 1 contains frequency of characters in English. Table 1 Frequency of characters in English Letter Frequency Letter Frequency Letter Frequency Letter Frequency 12.7 2.3 2.2 2.0 2.0 0.08 0.02 0.01 0.01 0.01 6.0 8.2 7.5 7.0 6.7 6.3 4.0 2.8 2.8 2.4 1.5 Cryptogram puzzles are solved for enjoyment and the method used against them is usually some form of frequency analysis. This is the act of using known statistical information and patterns about the plaintext to determine it. In cryptograms, each letter of the alphabet is encrypted to another letter. This table of letter-letter translations is what makes up the key. Because the letters are simply converted and nothing is scrambled, the cipher is left open to this sort of analysis; all we need is that ciphertext. If the attacker knows that the language used is English, for example, there are a great many patterns that can be searched for. Classic frequency analysis involves tallying up each letter in the collected ciphertext and comparing the percentages against the English language averages. If the letter "M" is most common then it is reasonable to guess that "E"->"M" in the cipher because E is the most common letter in the English language. These sorts of clues can be bounced off each other to derive the key and the original plaintext. The more collected cipher text the attacker has, the better this will work. As the amount of information increases, its statistical profile will draw closer and closer to that of English (for example) This sort of thing can also be applied to groups of characters ("TH" is a very common combination in English for example). The example frequency analysis image above was performed on the first three sentences of this paragraph turned into a cryptogram. As you can see, the English language is very predictable with regard to letter frequency and this can exploited in some situations to break ciphers. Top Example Ciphertext Letter Frequencies Example Partial Ciphertext Key Top English Letter Frequencies Plain Cipher K A L T Q U W CZOXKTVZLH XEJJYAU LZA UTYIAB MTZ AQFTOHAQK LOB KRA HAKR TB EUAB LVLWQUK KRAH WU EUELYYO UTHA MTZH TM MZAGEAQCO LOLYOUWU KRWU WU KRA LCK TM EUWOV DOTNO UKLKWUKWCLY WOMTZHLKWTO LQB XLKKAZQU LPTEK KRA XYLWOKASKKT BAKAZHWQA WK Wa czOXKTVZLHU ALCR YAKKAZ TM KRA LYXRLPAK WU AQCZOXKAB KT LQTKRAZ YAKKAZ The goal of this lab is to gain a better understanding of a statistical attack by programming some of the important components to analyze/manipulate arrays of characters Lab Questions 1. What type of cipher is this program useful for breaking? 2. In this type of cipher, the relationship between characters in the plaintext and characters in the ciphertext is 3. List the frequencies for the top 4 characters found in the given ciphertext MKLAJZHAIUQWKHUABZNXBVHAGKFASDFGALOPIWRYIOQYWIERMASVZMNBZXCKJASDFGLKFH WQERYIOQWTYIOASUDYFLASKJDHFZMZVBCXMVQLWERYIQRASDFQIWUERYIHKMFMAKHLSDFY UIOQWYREIORYIWQEUFHAKDFHLKASHFKVBBBNASMDFSADFWQEUYRUUEYRUUUQKASJHFKJDS HFSNBNBNBNBABABAAASKJFHLKJSADHFIDUASFOYDASIYFQWERBQWBRKULKASSADFDFDASDA 4. Break the cipher text given in the following. What is the plaintext? What is the key? OTWEWNGWCBPOABIZVOAPMUGZWTTQVOBQUMAPMIDGZCAB EQVBMZLZIXMLAXZQVOQVLMMXAVWEIVLLIZSNZWAB QZLWNLMTOOPBVIUMLGWCBPAEQNBTGTMNBBPMVMAB ITIAKWCTLVBBQUMQBEPQTMQBEIAQVUGBZCAB What To Turn in: A zip file named lastname_firstname_Project2.zip, containing - Source code with screenshots showing successful decryption Task 1: Frequency Analysis (100 points) The cryptanalyst can benefit from some inherent characteristics of the plaintext language to launch a statistical attack. For example, we know that the letter E is the most frequently used letter in English text. The cryptanalyst finds the mostly-used character in the ciphertext and assumes that the corresponding plaintext character is E. After finding a few pairs, the analyst can find the key and use it to decrypt the message. To prevent this type of attack, the cipher should hide the characteristics of the language. Table 1 contains frequency of characters in English. Table 1 Frequency of characters in English Letter Frequency Letter Frequency Letter Frequency Letter Frequency 12.7 2.3 2.2 2.0 2.0 0.08 0.02 0.01 0.01 0.01 6.0 8.2 7.5 7.0 6.7 6.3 4.0 2.8 2.8 2.4 1.5 Cryptogram puzzles are solved for enjoyment and the method used against them is usually some form of frequency analysis. This is the act of using known statistical information and patterns about the plaintext to determine it. In cryptograms, each letter of the alphabet is encrypted to another letter. This table of letter-letter translations is what makes up the key. Because the letters are simply converted and nothing is scrambled, the cipher is left open to this sort of analysis; all we need is that ciphertext. If the attacker knows that the language used is English, for example, there are a great many patterns that can be searched for. Classic frequency analysis involves tallying up each letter in the collected ciphertext and comparing the percentages against the English language averages. If the letter "M" is most common then it is reasonable to guess that "E"->"M" in the cipher because E is the most common letter in the English language. These sorts of clues can be bounced off each other to derive the key and the original plaintext. The more collected cipher text the attacker has, the better this will work. As the amount of information increases, its statistical profile will draw closer and closer to that of English (for example) This sort of thing can also be applied to groups of characters ("TH" is a very common combination in English for example). The example frequency analysis image above was performed on the first three sentences of this paragraph turned into a cryptogram. As you can see, the English language is very predictable with regard to letter frequency and this can exploited in some situations to break ciphers. Top Example Ciphertext Letter Frequencies Example Partial Ciphertext Key Top English Letter Frequencies Plain Cipher K A L T Q U W CZOXKTVZLH XEJJYAU LZA UTYIAB MTZ AQFTOHAQK LOB KRA HAKR TB EUAB LVLWQUK KRAH WU EUELYYO UTHA MTZH TM MZAGEAQCO LOLYOUWU KRWU WU KRA LCK TM EUWOV DOTNO UKLKWUKWCLY WOMTZHLKWTO LQB XLKKAZQU LPTEK KRA XYLWOKASKKT BAKAZHWQA WK Wa czOXKTVZLHU ALCR YAKKAZ TM KRA LYXRLPAK WU AQCZOXKAB KT LQTKRAZ YAKKAZ The goal of this lab is to gain a better understanding of a statistical attack by programming some of the important components to analyze/manipulate arrays of characters Lab Questions 1. What type of cipher is this program useful for breaking? 2. In this type of cipher, the relationship between characters in the plaintext and characters in the ciphertext is 3. List the frequencies for the top 4 characters found in the given ciphertext MKLAJZHAIUQWKHUABZNXBVHAGKFASDFGALOPIWRYIOQYWIERMASVZMNBZXCKJASDFGLKFH WQERYIOQWTYIOASUDYFLASKJDHFZMZVBCXMVQLWERYIQRASDFQIWUERYIHKMFMAKHLSDFY UIOQWYREIORYIWQEUFHAKDFHLKASHFKVBBBNASMDFSADFWQEUYRUUEYRUUUQKASJHFKJDS HFSNBNBNBNBABABAAASKJFHLKJSADHFIDUASFOYDASIYFQWERBQWBRKULKASSADFDFDASDA 4. Break the cipher text given in the following. What is the plaintext? What is the key? OTWEWNGWCBPOABIZVOAPMUGZWTTQVOBQUMAPMIDGZCAB EQVBMZLZIXMLAXZQVOQVLMMXAVWEIVLLIZSNZWAB QZLWNLMTOOPBVIUMLGWCBPAEQNBTGTMNBBPMVMAB ITIAKWCTLVBBQUMQBEPQTMQBEIAQVUGBZCAB What To Turn in: A zip file named lastname_firstname_Project2.zip, containing - Source code with screenshots showing successful decryption

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started