Consider the Not-So-Simple-Substitution cipher, where the shift size could be arbitrary. Write a program (using a...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider the "Not-So-Simple-Substitution" cipher, where the shift size could be arbitrary. Write a program (using a programming language of your choice) that can cryptanalyze this cipher. Your program should take a ciphertext input in the form of a file, and find the key and output the plaintext(s) in the form of another file. This could be accomplished in a semi-automated manner (i.e., a human/cryptanalyst can guide your program by providing some suggestions at runtime). You can use any resource you need (programming libraries, English dictionary, etc.) to accomplish this task. Do not copy code from the Internet or anyone else. Demonstrate that your technique works for different ciphertext input files. Submit the following to Blackboard by the deadline as single zip file with the file name .zip. (a) A one to two page pdf report detailing the overall approach that was taken to solve this problem. Use figures to illustrate the approach. Explain the roles and efforts of each of the team members. Typeset using a word-processing software in a professional manner. (b) Just the source code. No executables and/or metadata files, please. One submission per team is sufficient. Points: 8 points for the work. 2 points for following the above instructions to the dot. Total 10 points. Consider the "Not-So-Simple-Substitution" cipher, where the shift size could be arbitrary. Write a program (using a programming language of your choice) that can cryptanalyze this cipher. Your program should take a ciphertext input in the form of a file, and find the key and output the plaintext(s) in the form of another file. This could be accomplished in a semi-automated manner (i.e., a human/cryptanalyst can guide your program by providing some suggestions at runtime). You can use any resource you need (programming libraries, English dictionary, etc.) to accomplish this task. Do not copy code from the Internet or anyone else. Demonstrate that your technique works for different ciphertext input files. Submit the following to Blackboard by the deadline as single zip file with the file name .zip. (a) A one to two page pdf report detailing the overall approach that was taken to solve this problem. Use figures to illustrate the approach. Explain the roles and efforts of each of the team members. Typeset using a word-processing software in a professional manner. (b) Just the source code. No executables and/or metadata files, please. One submission per team is sufficient. Points: 8 points for the work. 2 points for following the above instructions to the dot. Total 10 points.
Expert Answer:
Related Book For
Auditing and Assurance services an integrated approach
ISBN: 978-0132575959
14th Edition
Authors: Alvin a. arens, Randal j. elder, Mark s. Beasley
Posted Date:
Students also viewed these programming questions
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
answer the question clearly You are building a flight-control system for which a convincing safety case must be made. Would you assign the tasks of safety requirements engineering, test case...
-
The acquisition committee of KE plc is considering making takeover bids for two competitors, Scot plc, a listed company, and Ring Ltd. Summarised financial data is given below for these companies....
-
During the year, Summit produces 50,000 snow shovels and sells 45,000 snow shovels. Summit Manufacturing produces snow shovels. The selling price per snow shovel is $30. There is no beginning...
-
How many integers between 100 and 999 have distinct digits, and how many of those are odd numbers?
-
Split the Bill? When the time comes for a group of people eating together at a restaurant to pay their bill, sometimes they might agree to split the costs equally and other times will pay...
-
Jasper Fruits Corporation wholesales peaches and oranges. Barbara Jasper is working with the company's accountant to prepare next year's budget. Ms. Jasper estimates that sales will increase 5...
-
Case Study Read the FedEx Office Case before you begin this assignment. For this assignment, you will identify and fully analyze a minimum of three problems that the FedEx Office representative can...
-
An over allowance on a trade-in on an installment sale is debited to: Cost of installment sales. Over allowances on trade-ins expense. Inventories (trade-ins). None of the foregoing ledger accounts.
-
What is the optimal service life for Laroche Liverys fleet of vans? A. Two years. B. Three years. C. Four years. The capital budgeting committee for Laroche Industries is meeting. Laroche is a North...
-
The table sets out the data for an economy when the governments budget is balanced. a. Calculate the equilibrium real interest rate, investment, and private saving. b. If planned saving increases by...
-
If the outlay is lower by the amount that Simpson suggests, the project NPV should increase by an amount closest to: A. 0.09 billion. B. 0.14 billion. C. 0.17 billion. Barbara Simpson is a sell-side...
-
Steve Jackson (birthdate December 13, 1967) is a single taxpayer living at 3215 Pacific Dr., Apt. B, Pacific Beach, CA 92109. His Social Security number is 465-88-9415. In 2020, Steves earnings and...
-
A switch from straight-line to accelerated depreciation would: A. increase the NPV and decrease the first year operating income after taxes. B. increase the first year operating income after taxes...
-
List the accounts in the order of Assets, Liabilities, Owner's equity, Revenue, and Expenses. Cash $ 9,260 Accounts Receivable 6,485 Supplies 1,535 Prepaid Insurance 1,005 Delivery Equipment 16,950...
-
When an electric field is applied to a shallow bath of vegetable oil, why do tiny bits of thread floating in the oil align with the field like compasses in a magnetic field?
-
Rene Ritter opened a small grocery and related-products convenience store in 1989 with money she had saved working as an A&P store manager. She named it Ritter Dairy and Fruits. Because of the...
-
Distinguish between management's and the auditor's responsibility for the financial statements being audited.
-
Explain the difference between an attribute and an exception condition. State the exception condition for the audit procedure: The duplicate sales invoice has been initialed indicating the...
-
A concave mirror of focal length forms an image of the moon. Where is the image located? A. At the mirror's surface B. Almost exactly a distance behind the mirror C. Almost exactly a distance in...
-
During a solar eclipse, the sun-a small but extended source-casts a shadow of the moon on the earth. Explain why the moon's shadow has a dark center surrounded by a region of increasing brightness.
-
A concave mirror brings the sun's rays to a focus at a distance of \(30 \mathrm{~cm}\) from the mirror. If the mirror were submerged in a swimming pool, would the sun's rays be focused nearer to,...
Study smarter with the SolutionInn App