Answered step by step
Verified Expert Solution
Question
1 Approved Answer
write a program to achieve encryption and decryption using the Monoalphabetic Substitution Cipher system. The key can be generated randomly by Alice and sent to
write a program to achieve encryption and decryption using the Monoalphabetic Substitution Cipher system. The key can be generated randomly by Alice and sent to Bob securely The task must:
Alice will send the following text:
I remember as a child, and as a young budding naturalist, spending all my time observing and testing the world around me moving pieces, altering the flow of things, and documenting ways the world responded to me Now, as an adult and a professional naturalist, Ive approached language in the same way, not from an academic point of view but as a curious child still building little mud dams in creeks and chasing after frogs. So this book is an odd thing: it is a naturalists walk through the languagemaking landscape of the English language, and following in the naturalists tradition it combines observation, experimentation, speculation, and documentation activities we dont normally associate with language.
This book is about testing, experimenting, and playing with language. It is a handbook of tools and techniques for taking words apart and putting them back together again in ways that I hope are meaningful and legitimate or even illegitimate This book is about peeling back layers in search of the languagemaking energy of the human spirit. It is about the gaps in meaning that we urgently need to notice and name the places where our dreams and ideals are no longer fulfilled by a society that has become fastpaced and hyper commercialized.
Language is meant to be a playful, evershifting creation but we have been taught, and most of us continue to believe, that language must obediently follow precisely prescribed rules that govern clear sentence structures, specific word orders, correct spellings, and proper pronunciations. If you make a mistake or step out of bounds there are countless, selfappointed language experts who will promptly push you back into safe terrain and scold you for your errors. And in case you need reminding, there are hundreds of dictionaries and grammar books to ensure that you remember the right way to use English.
Bob will receive the ciphered text and be able to read it
Meanwhile, Oscar will attempt to hack the ciphered text and read the message without knowing the key. "Find the best way to perform the hacking and implement it
Alice will send a message in another language, such as "Select your mother language" or "German language," and repeat steps and
Task points:
Repeat Task with Polyalphabetic Substitution Cipher.
Can Oscar break the ciphering, and how long does it take
###IMPORTANT### :
Please help me out in this Task points:
Repeat Task Points and using DES ciphering. You have to implement all the steps of DES.
Repeat Task Points and by sending a bitmap image. Show the image before encryption, after encryption, and after decryption.
PLEASE perform point of TASK for both DES ciphering and bitmap image
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started