Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Task 1: Frequency Analysis (100 points) The cryptanalyst can benefit from some inherent characteristics of the plaintext language to launch a statistical attack. For example,
Task 1: Frequency Analysis (100 points) The cryptanalyst can benefit from some inherent characteristics of the plaintext language to launch a statistical attack. For example, we know that the letter E is the most frequently used letter in English text. The cryptanalyst finds the mostly-used character in the ciphertext and assumes that the corresponding plaintext character is E. After finding a few pairs, the analyst can find the key and use it to decrypt the message. To prevent this type of attack, the cipher should hide the characteristics of the language. Table 1 contains frequency of characters in English. Table 1 Frequency of characters in English Letter Frequency Letter Frequency Letter|Frequency LetterFrequency 2.3 2.2 2.0 2.0 0.08 0.02 0.01 0.01 0.01 12.7 6.0 8.2 7.5 7.0 6.7 6.3 4.0 2.8 2.8 2.4 1.5 Cryptogram puzzles are solved for enjoyment and the method used against them is usually some form of frequency analysis. This is the act of using known statistical information and patterns about the plaintext to determine it. In cryptograms, each letter of the alphabet is encrypted to another letter. This table of letter-letter translations is what makes up the key. Because the letters are simply converted and nothing is scrambled, the cipher is left open to this sort of analysis; all we need is that ciphertext. If the attacker knows that the language used is English, for example, there are a great many patterns that can be searched for. Classic frequency analysis involves tallying up each letter in the collected ciphertext and comparing the percentages against the English language averages. If the letter "M" is most common then it is reasonable to guess that "E"->"M" in the cipher because E is the most common letter in the English language. These sorts of clues can be bounced off each other to derive the key and the original plaintext. The more collected cipher text the attacker has, the better this will work. As the amount of information increases, its statistical profile will draw closer and closer to that of English (for example). This sort of thing can also be applied to groups of characters ("TH" is a very common combination in English for example). The example frequency analysis image above was performed on the first three sentences of this paragraph turned into a cryptogram. As you can see, the English language is very predictable with regard to letter frequency and this can exploited in some situations to break ciphers Top Example Ciphertext Letter Frequencies Example Partial Ciphertext Key Top English Letter Frequencies Plain Cipher K A L T Q U W CZOXKTVZLH XEJJYAU LZA UTYIAB MTZ AQFTOHAOK LOB KRA HAKR TB EUAB LVLWOUK KRAH WU EUELYYO UTHA MTZH TM MZAGEAQCO LQLYOUWU KRWU WU KRA LCK TM EUWOV DOTNO UKLKWUKWCLY WQMTZHLKWTQ LQB XLKKAZQU LPTEK KRA XYLWQKASKKT BAKAZHWOA WK WQ CZOXKTVZLHU ALCR YAKKAZ TM KRA LYXRLPAK WU AQCZOXKAB KT LQTKRAZ YAKKAZ The goal of this lab is to gain a better understanding of a statistical attack by programming some of the important components to analyze/manipulate arrays of characters. Lab Questions 1. What type of cipher is this program useful for breaking? In this type of cipher, the relationship between characters in the plaintext and characters in the ciphertext is 2. Task 1: Frequency Analysis (100 points) The cryptanalyst can benefit from some inherent characteristics of the plaintext language to launch a statistical attack. For example, we know that the letter E is the most frequently used letter in English text. The cryptanalyst finds the mostly-used character in the ciphertext and assumes that the corresponding plaintext character is E. After finding a few pairs, the analyst can find the key and use it to decrypt the message. To prevent this type of attack, the cipher should hide the characteristics of the language. Table 1 contains frequency of characters in English. Table 1 Frequency of characters in English Letter Frequency Letter Frequency Letter|Frequency LetterFrequency 2.3 2.2 2.0 2.0 0.08 0.02 0.01 0.01 0.01 12.7 6.0 8.2 7.5 7.0 6.7 6.3 4.0 2.8 2.8 2.4 1.5 Cryptogram puzzles are solved for enjoyment and the method used against them is usually some form of frequency analysis. This is the act of using known statistical information and patterns about the plaintext to determine it. In cryptograms, each letter of the alphabet is encrypted to another letter. This table of letter-letter translations is what makes up the key. Because the letters are simply converted and nothing is scrambled, the cipher is left open to this sort of analysis; all we need is that ciphertext. If the attacker knows that the language used is English, for example, there are a great many patterns that can be searched for. Classic frequency analysis involves tallying up each letter in the collected ciphertext and comparing the percentages against the English language averages. If the letter "M" is most common then it is reasonable to guess that "E"->"M" in the cipher because E is the most common letter in the English language. These sorts of clues can be bounced off each other to derive the key and the original plaintext. The more collected cipher text the attacker has, the better this will work. As the amount of information increases, its statistical profile will draw closer and closer to that of English (for example). This sort of thing can also be applied to groups of characters ("TH" is a very common combination in English for example). The example frequency analysis image above was performed on the first three sentences of this paragraph turned into a cryptogram. As you can see, the English language is very predictable with regard to letter frequency and this can exploited in some situations to break ciphers Top Example Ciphertext Letter Frequencies Example Partial Ciphertext Key Top English Letter Frequencies Plain Cipher K A L T Q U W CZOXKTVZLH XEJJYAU LZA UTYIAB MTZ AQFTOHAOK LOB KRA HAKR TB EUAB LVLWOUK KRAH WU EUELYYO UTHA MTZH TM MZAGEAQCO LQLYOUWU KRWU WU KRA LCK TM EUWOV DOTNO UKLKWUKWCLY WQMTZHLKWTQ LQB XLKKAZQU LPTEK KRA XYLWQKASKKT BAKAZHWOA WK WQ CZOXKTVZLHU ALCR YAKKAZ TM KRA LYXRLPAK WU AQCZOXKAB KT LQTKRAZ YAKKAZ The goal of this lab is to gain a better understanding of a statistical attack by programming some of the important components to analyze/manipulate arrays of characters. Lab Questions 1. What type of cipher is this program useful for breaking? In this type of cipher, the relationship between characters in the plaintext and characters in the ciphertext is 2
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started