Question: Problem One. Student received the following ciphertext which was encoded with a shift cipher: GUCHQJVDLGSOHDVHGRKRPHZRUN Perform an attack against the cipher based on a letter

Problem One. Student received the following ciphertext which was encoded with a shift cipher:
GUCHQJVDLGSOHDVHGRKRPHZRUN
Perform an attack against the cipher based on a letter frequency count: How many letters do you
have to identify through a frequency count to recover the key? What is the cleartext?
Problem Two. Construct the addition and multiplication tables for Z7.
Problem Three. An obvious approach to increase the security of a symmetric algorithm is to
apply the same cipher twice, i.e.:
y = ek2(ek1(x))
As is often the case in cryptography, things are very tricky and results are often different from
the expected and/ or desired ones. In this problem we show that a double encryption with the
affine cipher is only as secure as single encryption! Assume two affine ciphers ek1= a1x + b1 and
ek2= a2x + b2.
1. Show that there is a single affine cipher ek3= a3x + b3 which performs exactly
2. the same encryption (and decryption) as the combination ek2(ek1(x)).
3. Find the values for a3,b3 when a1=3, b1=5 and a2=11, b2=7.
4. For verification: (1) encrypt the letter K first with ek1 and the result with ek2, and (2) encrypt
the letter K with ek3.
5. Briefly describe what happens if an exhaustive key-search attack is applied to a doubleencrypted affine ciphertext. Is the effective key space increased?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!