Question: Need help ASAP!! Please help (Programming Language PYTHON) Thank You! - The following is the combination of the affine cipher and the Hill cipher The
Need help ASAP!! Please help (Programming Language PYTHON) Thank You! - The following is the combination of the affine cipher and the Hill cipher The key for the cipher is a 2-by-2 matrix A and a 2 dimensional vector (b1 ,b 2). Just like in the Hill cipher, the numerical plaintext is split into blocks of length 2; and each block (x 1 .x 2 ) is encrypted using the function (x1,x 2 ) 7 [(x 1 ,x 2 )A + (b 1 ,b 2 )] (mod 26) An agent was able to intercept a snippet of plaintext and the corresponding ciphertext is RFKNMC. Please design a known plaintext attack on this cipher and recover the encryption key. Answer should include the following 1) The computer code that is used to produce the answer 2) The Matrix A and the vector (bl, b2) 3) Description of method that is used to find the 2 by 2 Matrix A and the vector (bl, b2) Need help ASAP!! Please help (Programming Language PYTHON) Thank You! - The following is the combination of the affine cipher and the Hill cipher The key for the cipher is a 2-by-2 matrix A and a 2 dimensional vector (b1 ,b 2). Just like in the Hill cipher, the numerical plaintext is split into blocks of length 2; and each block (x 1 .x 2 ) is encrypted using the function (x1,x 2 ) 7 [(x 1 ,x 2 )A + (b 1 ,b 2 )] (mod 26) An agent was able to intercept a snippet of plaintext and the corresponding ciphertext is RFKNMC. Please design a known plaintext attack on this cipher and recover the encryption key. Answer should include the following 1) The computer code that is used to produce the answer 2) The Matrix A and the vector (bl, b2) 3) Description of method that is used to find the 2 by 2 Matrix A and the vector (bl, b2)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
