Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Table 4.16 gives a Vigen`ere ciphertext for you to analyze from scratch. It is probably easiest to do so by writing a computer program, but

Table 4.16 gives a Vigen`ere ciphertext for you to analyze from scratch. It is probably easiest to do so by writing a computer program, but you are welcome to try to decrypt it with just paper and pencil.

(a) Make a list of matching trigrams as we did in Table 4.3. Use the Kasiski test on matching trigrams to find the likely key length.

Trigram - Appears at places - Difference avl - 117 and 258 - 141 = 3 47 bjo - 86 and 121 - 35 = 5 7 dlr - 4 and 25 - 21 = 3 7 gdl - 3 and 24 - 16 = 24 Table 4.3: Repeated trigrams in the ciphertext given

(b) Make a table of indices of coincidence for various key lengths, as we did in Table 4.4. Use your results to guess the probable key length.

Key Average Individual Indices Length Index of Coincidence 4 0.038 0.034, 0.042, 0.039, 0.035 5 0.037 0.038, 0.039, 0.043, 0.027, 0.036 6 0.036 0.038, 0.038, 0.039, 0.038, 0.032, 0.033 7 0.062 0.062, 0.057, 0.065, 0.059, 0.060, 0.064, 0.064 8 0.038 0.037, 0.029, 0.038, 0.030, 0.034, 0.057, 0.040, 0.039 9 0.037 0.032, 0.036, 0.028, 0.030, 0.026, 0.032, 0.045, 0.047, 0.056 Table 4.4: Indices of coincidence of Table 4.2 for various key lengths

(c) Using the probable key length from (a) or (b), make a table of mutual indices of coincidence between rotated blocks, as we did in Table 4.5. Pick the largest indices from your table and use them to guess the relative rotations of the blocks, as we did in Table 4.6.

(d) Use your results from (c) to guess a rotated version of the keyword, and then try the different rotations as we did in Table 4.7 to find the correct keyword and decrypt the text.

mgodt beida psgls akowu hxukc iawlr csoyh prtrt udrqh cengx uuqtu habxw dgkie ktsnp sekld zlvnh wefss glzrn peaoy lbyig uaafv eqgjo ewabz saawl rzjpv feyky gylwu btlyd kroec bpfvt psgki puxfb uxfuq cvymy okagl sactt uwlrx psgiy ytpsf rjfuw igxhr oyazd rakce dxeyr pdobr buehr uwcue ekfic zehrq ijezr xsyor tcylf egcy Table 4.16: A Vigen`ere ciphertext for Exercise 4.18

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Big Data Fundamentals Concepts, Drivers & Techniques

Authors: Thomas Erl, Wajid Khattak, Paul Buhler

1st Edition

0134291204, 9780134291208

More Books

Students also viewed these Databases questions

Question

Verify that U2AB also equals i=1 j=1 IA ijk

Answered: 1 week ago

Question

Is the person willing to deal with the consequences?

Answered: 1 week ago