Question: Classic Cryptography Assignment 1. (30 pts) The following is ciphertext from a Caesar cipher. Code break it! Led tewzsxg pyhoc kbo xyd drkd okci dy

 Classic Cryptography Assignment 1. (30 pts) The following is ciphertext from

a Caesar cipher. Code break it! Led tewzsxg pyhoc kbo xyd drkdokci dy Isdo A. What is the key (numeric offset)? B. What

Classic Cryptography Assignment 1. (30 pts) The following is ciphertext from a Caesar cipher. Code break it! Led tewzsxg pyhoc kbo xyd drkd okci dy Isdo A. What is the key (numeric offset)? B. What is the plaintext? 2. (30 pts) For each of the following... a. Caeser cipher (26 symbol alphabet) b. General monoaphabetic ( 26 symbol alphabet) c. Vigenere cipher where the key-generating passcode is 10 characters long ( 26 symbol alphabet) ..answer the following. j. How many possible keys? ii. What is the key length in bits? iii. On average, how long would a brute force attack take to succeed if testing an individual key took .001 seconds? 3. (40 pts) Frequency distribution / Monoalphabetic ciphers The following text is encrypted using a simple substitution method over a 26-character alphabet. The plaintext is part of an English text. Punctuation and spacing have been preserved, as has capitalization. In cryptanalysis, frequency analysis uses the common statistical frequency of symbols in a language to infer a key. (E.g., if " q " appears 13% of the time in ciphertext, which roughly correlates to the frequency of "e" in the English language, then "q" probably maps to "e" in the decryption key of the cipher.) Using an estimated distribution of the characters in English texts (see Table below), build the key and recover the plaintext. The following website may help you with computing the frequency analysis: https://www.dcode.fr/frequency-analysis. The limited sample size of the ciphertext may result in a less than perfect correlation, especially for the more infrequently appearing characters. Use any other tricks or clues at your disposal. oz vgl zit wtlz gX zodtl, oz vgl zit vgklz gy zodtl, oz vgl zit qut gX volrgd, oz vgl zit gut gy yggsoliftll, oz vql zit thgei gy wtsoty, oz vql zit thgei gX ofektrxsozn, oz vgl zit ltglgf gy Souiz, oz vgl zit ltglgf gy Rgkaftll, oz vgl zit lhkofu gy ight, oz vol zit vofztk gy rtlhgok, vt igr tctknziofu wtygkt xl, vt igr fgziofu wtygkt xl, vt vtkt qss uggofu roktez zg It ctef, vt vtkt gss ugofu roktez zit qzitk vgn - of ligkz, zit htkogr vgl lg yok soat zit hktltfz htkogr, zigz lgdt gX ozl fgolotlz gxzigkozotl oflolztr gf ozl wtofu ktetoctr, ygk uggr gk ygk tcos, of zit lxhtksgzoct rtuktt 9m egdhokolgf gfsn. Table 1 A. What is the key? B. What is the plaintext

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!