Question: Context In the attachment, you are given one cipher obtained by Caesar's cipher with the keyword ( cezar . txt file ) and Vigen re

Context
In the attachment, you are given one cipher obtained by Caesar's cipher with the keyword (cezar.txt file) and
Vigenre's code (file vigenere.txt). The open texts are in Croatian, taken from a literary work
Miroslav Krlea. The letters from the string were converted to ASCII by moving the ticks and all characters except the letter a were removed
numbers are directly replaced by words.
Statements related to ciphers are marked with "(attachment)". Assertions about keys are worth 2 unit points each.
Claims
1.\geoquad The Caesar cipher is a monoalphabetic cipher.
2.\geoquad For sufficiently short and well-structured messages, Caesar's cipher with a key guarantees perfect security.
3.\geoquad Caesar's cipher was impenetrable for centuries.
4.\geoquad The Caesar cipher is vulnerable to frequency analysis.
5.\geoquad The most common letter of Caesar's cipher is T.(attachment)
6.\geoquad The letter E from the plaintext in cesar.txt is encoded into the letter L.(attachment)
7.\geoquad The key used to encrypt the message in cezar.txt can be described as "institution". (attachment,2 points)
8.\geoquad Vigenre's code was impenetrable for centuries.
9.\geoquad The Vigenre cipher is a polyalphabetic cipher with the number of alphabets at most equal to the length of the key.
10.\geoquad The Vigenre cipher is a monoalphabetic cipher.
11.\geoquad The Vigenre cipher is less vulnerable to frequency analysis than the Caesar cipher.
12.\geoquad The Kasiski test is used to determine the length of the key through the coincidence index.
13.\geoquad The most common trigram of the Vigenre cipher is FHQ.(side dish)
14.\geoquad The length of the Vigenre cipher key is 11.(attachment)
15.\geoquad The key used to encrypt the message in vigener

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!