Answered step by step
Verified Expert Solution
Question
1 Approved Answer
show all working Let's look at an old Roman age encryption scheme. Let's say we intercepted a message from a known Celtic hacker group. We
show all working
Let's look at an old Roman age encryption scheme. Let's say we intercepted a message from a known Celtic hacker group. We know from experience that this group uses the characters from A to Z, then a space, and then the numerals from 0 to 9 and employs a wrap around (moving left from A gives us 9). The first leading pairs of letters tell us what the substitution code is using the code phrase "Trudy Jones". For example if the first two pairs are uy du the code is 24 and 32. This would mean that we move the first 2 letters 4 places to the right eg. A becomes E), and then the next 3 letters 2 places to the left (eg. A becomes 8), then 4 places to the right for the next 2 characters and so on to encrypt the message. a. What is the message hidden in: yu ddVJG1SLIWPVGBOXUVCVB? Remember that you will have to reverse the algorithm (i.e. shift left first then right then left etc.) to decrypt the message. b. The message is actually the nickname of one of a state in the US. What is the state (give it in upper case)? What would be the encrypted version this state using the same encryption scheme as the original messageStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started