Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This set of homework covers the contents of Chapters 1 and 2. 1 (20 pts) The ciphertext below was encrypted using a substitution cipher. Using

This set of homework covers the contents of Chapters 1 and 2.

1 (20 pts) The ciphertext below was encrypted using a substitution cipher. Using letter frequency analysis method of the English language (see Table 1.1 in Sect. 1.2.2), find the substitution table (the key), and decrypt the ciphertext into the corresponding plaintext (you should add spaces and punctuations for the plaintext). Note that the text is relatively short and that the letter frequencies in it might not perfectly align with that of general English language from Table 1.1.

This question must be done by computer programs that you write in any computer programing language, but preferably C or C++. Your submssion should include source code ( eg., in .c, .cpp) and running results (the substitution table, plaintext).

YFSIT ZYFRG XISYO EMTVS QRHQY SZOTW QCTWZ ISHGE ZTQQY FSGZE YOEQE OSIYO QYQGE ESVSZ GYSKY FSWMK GYSTU GRTKS VTUSG ZYFQU VWEYW GYOIX RGXIS YOEUO SVKDF OEFOQ ISSKS KYTNS SMIGA OXGYO TIGVQ HQYSR QUWIE YOTIO IXRGI HDTIK SZSKD FGYQF GMMSI OIXOI QOKSY FSMVG ISYQE TZSKO QYOIE YUZTR YFSXS TXZGM FOEIT ZYFMT VSDFS ZSGVV YFSVO ISQTU VTIXO YWKSR SSYGY YFSYT MTUYF SDTZV KYFSR GXISY OEMTV SOQYF SMTOI YYFGY GETRM GQQZS ETXIO LSQGQ ITZYF GYYFS RTRSI YOYOQ VTEGY SKUTW ZKSXZ SSQQT WYFTU YFSXS TXZGM FOEIT ZYFMT VSDFO EFVOS QOIYF SGZEY OETES GIGYI OISYH KSXZS SQITZ YFJWY YFGYD GQITY GVDGH QYFSE GQSOI YFSRO KIOIS YSSIY FESIY WZHYF SITZY FRGXI SYOEM TVSUV TGYSK RWEFU WZYFS ZQTWY FZTGR OIXGZ TWIKE GIGKG UTZYF SMGQY TISFW IKZSK UOUYH HSGZQ FTDSA SZYFS MTVSF GQJSS IQMZO IYOIX GDGHU ZTREG IGKGG IKYTD GZKQO JSZOG YFGYE FGIXS TUGKK ZSQQE GIITY JSOXI TZSKX OASIY FGYRG XISYO EETRM GQQSQ QYOVV WIKSZ MOIRT KSZII GAOXG YOTIU ZTRYF SQHQY SRQWQ SKJHE OAOVO GIGIK ROVOY GZHGO ZMVGI SQYTY FTQSY FGYTZ OSIYH TWZOM FTIS

2. Perform the modular arithmetic for the following questions, use quick reductions as often as you can, dont use calculator.

1) 15 x 28 mod 13

2) -11 x 41 mod 15 3) 7100 mod 13

4)7 x 2 / 5 mod 7 (hint: youll need to calculate 5-1 mod 7)

5) 6-1 mod 12

3. Find all integers n between 0 <= n < m that are relatively prime to m for m = 16, 26. We denote the number of integers n which fulfill the condition by (m), e.g., (3) = 2. This function is called Eulers phi function. What is (m) for m = 16 and m = 26?

4. Given a short message, say 8 ASCII characters represented by 64 bit, which was encrypted using a 64-bit one-time pad. Explain why an exhaustive key search (or brute-force attack) will not succeed even though unlimited computing resources are available.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Explain how cost savings may arise from e-procurement.

Answered: 1 week ago