Question: please answer the 2nd question Problem 2. Write computer programs for the Permutation Cipher based on Z29 as in Problem 1. In encryption program, the

 please answer the 2nd question Problem 2. Write computer programs forplease answer the 2nd question

Problem 2. Write computer programs for the Permutation Cipher based on Z29 as in Problem 1. In encryption program, the inputs are a value of m (the size of permutation), a permutation as the key and the plaintext, and the output is the ciphertext. Write the decryption program accordingly. Try your programs by some text. Note that since m and the length of plaintext is not fixed, paddings might be added to the end of plaintext by the program. You may think about what kind padding is better for the security and design your paddings.

the Permutation Cipher based on Z29 as in Problem 1. In encryptionprogram, the inputs are a value of m (the size of permutation),

The preferred program language for the solutions is C or Java. If you use other language, then you need to do some explanations about the program and operating system used. In this case, the TA may ask you for extra information about your solution and you should provide answers. The score of the assignment will depend on: Specification and documentation: 20 % Correctness: 80 % Late assignments will be penalized and will not be accepted after 3 days. Solve the following 3 Problems. Problem 1. " Write computer programs for the Substitution Cipher based on Z29 which is cor- responding to 26 alphabetic characters (0 - 25), space (26), and , (27) . (28) The key is a random permutation a on Z29. Write down encryption and decryption programs. For the encryption, the plaintext and the key need to be input. The out put will be the ciphertext. Select a paragraph of text (I don't think any two people will choose a same paragraph if they choose independently) and encrypt it using your encryption algorithm. Then use your decryption program to check the correctness. You can use Java, C or other computer languages. Record your plaintext, ciphertext and the key a in your answer sheet. Problem 2. Write computer programs for the Permutation Cipher based on Z29 as in Problem 1. In encryption program, the inputs are a value of m (the size of permutation), a permutation as the key and the plaintext, and the output is the ciphertext. Write the decryption program accordingly. Try your programs by some text. Note that since 1 m and the length of plaintext is not fixed, paddings might be added to the end of plaintext by the program. You may think about what kind padding is better for the security and design your paddings. Problem 3. Write an algorithm to perform known-plaintext attack on Permutation Cipher. This algorithm can be used to determine the length of the permutation m and the key permutation. Use this algorithm to attack the system in Problem 2: by inputting a plaintext and the according cipher text from Problem 2, your program should output the value of m and the permutation (the key). The preferred program language for the solutions is C or Java. If you use other language, then you need to do some explanations about the program and operating system used. In this case, the TA may ask you for extra information about your solution and you should provide answers. The score of the assignment will depend on: Specification and documentation: 20 % Correctness: 80 % Late assignments will be penalized and will not be accepted after 3 days. Solve the following 3 Problems. Problem 1. " Write computer programs for the Substitution Cipher based on Z29 which is cor- responding to 26 alphabetic characters (0 - 25), space (26), and , (27) . (28) The key is a random permutation a on Z29. Write down encryption and decryption programs. For the encryption, the plaintext and the key need to be input. The out put will be the ciphertext. Select a paragraph of text (I don't think any two people will choose a same paragraph if they choose independently) and encrypt it using your encryption algorithm. Then use your decryption program to check the correctness. You can use Java, C or other computer languages. Record your plaintext, ciphertext and the key a in your answer sheet. Problem 2. Write computer programs for the Permutation Cipher based on Z29 as in Problem 1. In encryption program, the inputs are a value of m (the size of permutation), a permutation as the key and the plaintext, and the output is the ciphertext. Write the decryption program accordingly. Try your programs by some text. Note that since 1 m and the length of plaintext is not fixed, paddings might be added to the end of plaintext by the program. You may think about what kind padding is better for the security and design your paddings. Problem 3. Write an algorithm to perform known-plaintext attack on Permutation Cipher. This algorithm can be used to determine the length of the permutation m and the key permutation. Use this algorithm to attack the system in Problem 2: by inputting a plaintext and the according cipher text from Problem 2, your program should output the value of m and the permutation (the key)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!