Question: Create a Mathematica notebook that solves and discusses the solution. Create general encryption and decryption functions for the hill cipher. Please using Mathematica ! Thank
Below are given four examples of ciphertext, one obtained from a Substitution pher, one from a Vigenre Cipher, one from an Affine Cipher, and one unspecified. In each case, the task is to determine the plaintext. Give a clearly written description of the steps you followed to decrypt each ci phertext. This should include all statistical analysis and computations you per formed. The first two plaintexts were taken from "The Diary of Samuel Marchbanks," by Robertson Davies, Clarke Irwin, 1947; the fourth was taken from "Lake Wobegon Days," by Garrison Keillor, Viking Penguin, Inc., 985. (a) Substitution Cipher: EMGLOSUDCGDNCUSWYSFHNSFCYKDPUMLWGYICOXYSIPJCK PKUGKMGOLICGINCGACKSNISACYKZSCKXECJCKSHYSXCG OIDPKZCNKSHICGIWYGKKGKGOLDSILKGOIUSIGLEDSPWZU GFZCCNDGYYSFUSZCNXEOJNCGYEOWEUPXEZGACGNFGLKNS ACIGOIYCKXCJUCIUZCEZCCNDGYYSFEUEKUZCSOCFZCCNC IACZEJNCSHFZEJZEGMXCYHCJUMGKUCY HINT F decrypts to w. (b) Vigenre Cipher: KCCPKBGUFDPHOTYAVINRRTMVGRKDNBVEDETDGILTXRGUID DKOTFMBPVGEGLTGCKORACOCWDNAWCRXIZAKFTLEWRPTYC QKYVXCHKFTPONCOORHJVAJUWETMCMSPKQDYHJVDAHCTRL SvSKCGCzQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMV GKMITZHFPDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFS PEZONRWXCVYCGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHI FFSQESVYCLACNVRWBBIREPBBVFEXOSCDYGZWPFDTKFQTY CWHJVLNH QIBTKHJVNPIST (c) Affine Cipher: KQEREJEBCPPCJCRKIEACUZBKRVPKRBCIBOCARBJCVFCUP KRIOFKPACUZQEPBKRXPEl IEABDKPBCPFCDCCAFIEABDKP BCPFEQPKAZBKRHAIBKAPCCIBURCCDKDCCJCIDFUIXPAFF ERBCZDFKABICBBENEFCUPJCVKABPCYDCCDPKBCOCPERK lVKSCPICBRKJPKABI (d) unspecified cipher: BNVSNSIHQCEELSSKKYERIFJKXUMBGYKAMQLJTYAVFBKVT DVBPVVRJYYLAOKYMPQSCGDLFSRLLPROYGESEBUUALRWXM MASAZLGLEDFJBZAVVPXWICGJXASCBYEHOSNMULKCEAHTQ OKMFLEBKFXLRRFDTZXCIWBJSICBGAWDVYDHAVFJXZIBKC GJIWEAHTTOEWTUHKRQVVRGZBXY IREMMASCS PBNLHJMBLR FFJELHWEYLWISTFVVYFJCMHYUYRUFSFMGESIGRLWALSWM NUHSIMYYITCCQPZSICEHBCCMZFEGVJYOCDEMMPGHVAAUM ELCMOEHVLTIPSUYILVGFLMVWDVYDBTHFRAYISYSGKVSUU HYHGGCKTMBLRX
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
