Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

write a program to achieve encryption and decryption using the Monoalphabetic Substitution Cipher system. The key can be generated randomly by Alice and sent to

write a program to achieve encryption and decryption using the Monoalphabetic Substitution Cipher system. The key can be generated randomly by Alice and sent to Bob securely. The task must:
1- Alice will send the following text:
I remember as a child, and as a young budding naturalist, spending all my time observing and testing the world around me moving pieces, altering the flow of things, and documenting ways the world responded to me. Now, as an adult and a professional naturalist, Ive approached language in the same way, not from an academic point of view but as a curious child still building little mud dams in creeks and chasing after frogs. So this book is an odd thing: it is a naturalists walk through the language-making landscape of the English language, and following in the naturalists tradition it combines observation, experimentation, speculation, and documentation activities we dont normally associate with language.
This book is about testing, experimenting, and playing with language. It is a handbook of tools and techniques for taking words apart and putting them back together again in ways that I hope are meaningful and legitimate (or even illegitimate). This book is about peeling back layers in search of the language-making energy of the human spirit. It is about the gaps in meaning that we urgently need to notice and name the places where our dreams and ideals are no longer fulfilled by a society that has become fast-paced and hyper- commercialized.
Language is meant to be a playful, ever-shifting creation but we have been taught, and most of us continue to believe, that language must obediently follow precisely prescribed rules that govern clear sentence structures, specific word orders, correct spellings, and proper pronunciations. If you make a mistake or step out of bounds there are countless, self-appointed language experts who will promptly push you back into safe terrain and scold you for your errors. And in case you need reminding, there are hundreds of dictionaries and grammar books to ensure that you remember the right way to use English.
1. Bob will receive the ciphered text and be able to read it.
2. Meanwhile, Oscar will attempt to hack the ciphered text and read the message without knowing the key. "Find the best way to perform the hacking and implement it."
3. Alice will send a message in another language, such as "Select your mother language" or "German language," and repeat steps 2 and 3.
Task .2(10 points):
Repeat Task 1 with Polyalphabetic Substitution Cipher.
Can Oscar break the ciphering, and how long does it take
#*#*#*IMPORTANT#*#*#* :
Please help me out in this Task .3(20 points):
1- Repeat Task 1(Points 1 and 2) using DES ciphering. You have to implement all the steps of DES.
2- Repeat Task 1(Points 1 and 2) by sending a bitmap image. Show the image before encryption, after encryption, and after decryption.
*******PLEASE make a REPORT on the above assignment.******
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Pro PowerShell For Database Developers

Authors: Bryan P Cafferky

1st Edition

1484205413, 9781484205419

More Books

Students also viewed these Databases questions

Question

Briefly describe the five principles of succession planning.

Answered: 1 week ago

Question

What are the disadvantages of succession planning?

Answered: 1 week ago