(4) This questions deals with affine ciphers and shift ciphers. The alphabet is consid- ered modulo...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
(4) This questions deals with affine ciphers and shift ciphers. The alphabet is consid- ered modulo 26; that is, A=0,...,Z=25. (a) The following ciphertext has been encrypted with a shift cipher with encryp- tion key (shift) 3 or 16: c₁=IUBBOEKHSQHVEHJUDJXEKIQDTTEBBQHI. This means that from the plaintext we use the key 3 or 16 to obtain c₁. Decrypt c₁ (4+4 marks). Here you need to use both keys and give the message that makes more sense (1 mark). (b) Using an affine cipher c = 11p + 17 where p is the plaintext, encrypt the plaintext: p=(STUDENT FIRST NAME), MEET ME AT THE NATIONAL GALLERY. For instance, in my case, the plaintext reads GUILLERMO, MEET ME AT THE NATIONAL GALLERY. (i) Give the ciphertext c for the plaintext p (5 marks). (ii) Show manually how to decrypt the affine cipher c (6 marks). This includes computing the function p = (c-17)* 11-¹ (mod 26). (iii) With the function you constructed in (ii), decrypt the ciphertext NWVASPFWRAQVRSYJRXBE (5 marks). (4) This questions deals with affine ciphers and shift ciphers. The alphabet is consid- ered modulo 26; that is, A=0,...,Z=25. (a) The following ciphertext has been encrypted with a shift cipher with encryp- tion key (shift) 3 or 16: c₁=IUBBOEKHSQHVEHJUDJXEKIQDTTEBBQHI. This means that from the plaintext we use the key 3 or 16 to obtain c₁. Decrypt c₁ (4+4 marks). Here you need to use both keys and give the message that makes more sense (1 mark). (b) Using an affine cipher c = 11p + 17 where p is the plaintext, encrypt the plaintext: p=(STUDENT FIRST NAME), MEET ME AT THE NATIONAL GALLERY. For instance, in my case, the plaintext reads GUILLERMO, MEET ME AT THE NATIONAL GALLERY. (i) Give the ciphertext c for the plaintext p (5 marks). (ii) Show manually how to decrypt the affine cipher c (6 marks). This includes computing the function p = (c-17)* 11-¹ (mod 26). (iii) With the function you constructed in (ii), decrypt the ciphertext NWVASPFWRAQVRSYJRXBE (5 marks).
Expert Answer:
Answer rating: 100% (QA)
Croper 5051 c GITES C IUBBOEKHSQHVEHJUDJXEKIQDTTEBBQHI If key 3 p... View the full answer
Related Book For
Discrete and Combinatorial Mathematics An Applied Introduction
ISBN: 978-0201726343
5th edition
Authors: Ralph P. Grimaldi
Posted Date:
Students also viewed these computer network questions
-
3 questions 1. Intentional torts (don't say its a crime because its not) Define fort- .... Define intentional tort. Read the facts Apply the law Give a conclusion 2 Unintentional torts List and fully...
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-5. Ivan's grandfather died and left a portfolio of municipal bonds. In 2012, they pay Ivan...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
A city starts a solid waste landfill in 2012. When the landfill was opened the city estimated that it would fill to capacity within 5 years and that the cost to cover the facility would be $1.5...
-
Howie Jewelers had the following purchase transactions. Journalize all necessary transactions. Explanations are not required. Jun. 20 Purchased inventory of $5,100 on account from Sanders Diamonds, a...
-
In striated muscle, cells undergo mitosis (nuclear division) without cytokinesis (cellular division), giving rise to large multinucleate cells. Explain why muscle cells would be less effective if...
-
Julie Palmer has trouble keeping her debits and credits equal. During a recent month, Julie made the following errors: a. Julie recorded a $750 payment of rent by debiting rent expense for $75 and...
-
1. What forms of homeowners insurance are available? Which forms should the Salazars consider? 2. What are the perils against which the home and its contents should be insured? 3. Discuss the types...
-
The intent of your Professional Portfolio is to serve as a tool to assist you on embarking on a successful career in the Health Informatics & Information Management Profession. The keys to success...
-
A beam ABCD consisting of a simple span BD and an overhang AB is loaded by a force P acting at the end of the bracket CEF (see figure). (a) Determine the deflection δA at the end of the...
-
(.) Consider the following three relations A, B, and C for this part: C A Attr Attr2 John A John B Mary A Mary C Mary D ST Attr3 15 30 20 35 50 ? B Attr4 10 20 30 40 50 Attr5 a b C d e (D = John A...
-
Create a Python program that manages a personal expense tracker . The program should allow users to perform the following operations: Add Expense: Users can add a new expense by providing details...
-
Three years ago, I bought (a) 1,000 shares of AB company stock for $5 per share AND (b) 500 shares of ZZ stock for $8 per share. This year, I sold my 1,000 shares of AB for $12 per share. I also sold...
-
XYZ , a calendar - year corporation, had accumulated earnings and profits of $ 5 , 0 0 0 as of January 1 of the current year. XYZ s earnings and profits for the year were $ 8 , 0 0 0 . During the...
-
What is the minimum angle \ theta min ( between the horizontal and the ladder ) so that the person can reach a distance of 1 . 8 m without having the ladder slip? The acceleration of gravity is 9 . 8...
-
Hey Java expert, go ahead and modify this code another way to take advantage of the dynamic binding in that code. Write the main method to demonstrate the correct functionality of the...
-
Mary, who has limited knowledge of accounting, is considering investing some of her inheritance in ABC plc. She has given you the ratios(please refer to the following table and directors' comments...
-
The cash records of Holly Company show the following four situations. 1. The June 30 bank reconciliation indicated that deposits in transit total $720. During July, the general ledger account Cash...
-
When a coin is tossed three times, for the outcome HHT we say that two runs have occurred - namely, HH and T. Likewise, for the outcome THT we find three runs: T, H, and T. (The notion of a run was...
-
With m, n, i, as in Theorem 12.6, prove that (a) n = (m - 1 )/(m - 1). (b) = [(m - 1)n + 1/m.
-
Let p(x), q(x), and r(x) be the following open statements. p(x): x2 - 7x + 10 = 0 q(x): x2 - 2x - 3 = 0 r(x): x < 0 (a) Determine the truth or falsity of the following statements, where the universe...
-
A ___________ chart is a histogram that can help you identify and prioritize problem areas. A. Pareto B. control C. run D. scatter
-
What are the Seven Basic Tools of Quality? If applicable, describe how you have you used these tools in the workplace.
-
Perform the monitoring and controlling tasks for one of the case studies provided in Appendix C. If you are working on a real team project, create relevant monitoring and controlling documents, such...
Study smarter with the SolutionInn App