Question: 1. (2 points) (Attacking the Caesar Cipher.) We discussed how the Caesar Cipher is sus- ceptible to a brute force attack since there are only

 1. (2 points) (Attacking the Caesar Cipher.) We discussed how the

1. (2 points) (Attacking the Caesar Cipher.) We discussed how the Caesar Cipher is sus- ceptible to a brute force attack since there are only 25 possible keys (1-25). Write a function caesarBrute that, given a ciphertext as input, prints to the screen every possible decryption. Use this function to find the message that led to 'ghm lh 1xvkcxm' and put the answer in a comment under your function. You are welcome to use any of the functions we wrote in class but need to copy these functions into your lab

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!