Question: *please let me know what program you code in and comments throughout the code! also, please include screenshots. thank you so much Assignment Description. This
Assignment Description. This assignment is designed to allow you to get some practice with cryptanalysis of substitution ciphers. Write a program that will attempt a brute-force decryption attack on an encrypted phase that uses the simple substitution cypher. The following encrypted quotations are provided for you to test out your code and I will attempt to run and evaluate your program using these phrases). Your program must make an honest attempt at cracking the phrases any pre-programming of the resulting phrases that will "match" when the program is run will result in zero points being assigned for the lab. You may use any programming language that you like for your submission, but I recommend using something that makes text manipulation easy, like Python. 1. fqjcbrwjwjvnjax bnkhj whxcq nawjv nfxdu mbvnu ujbbf nnc 2. Oczmz vmzor jocdi bnojv dhvod igdaz admno ojbzo rcvot jprvi oviyv aozmo cvooj ziejt dojig toczr dnzno jahvi fdiyv xodzq zoczn zxjiy 3. ejito spawa qleji taiul rtwll rflrl laoat wsqqj atgac kthls iraoa twlpl qatw jufrh lhuts qataq itats aittk stafj cae 4. iyhqz ewqin azqej shayz niqbe aheum hnmnj jaqii yuexq ayakn jbeug iihed yzhni ifnun sayiz yudhe sqshu qesqa iluym gk que aqam oejjs hqzyu jdzqa diesh niznj jayzy uiqhq vayza shsnj jejjz nshna hnmyt isnae sqfun dqzew qiead zevqi zhnja shqze udqai jrmtq uishq ifnun siiqa suoij qofni syyle iszhn bhmei squih nimnx hsead shamr udquq uaqeu iisqe jshnj oihyy snaxs hqihe lsilu ymhni tyz
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
