Question: write a program to achieve encryption and decryption using the Monoalphabetic Substitution Cipher system. The key can be generated randomly by Alice and sent to

write a program to achieve encryption and decryption using the Monoalphabetic Substitution Cipher system. The key can be generated randomly by Alice and sent to Bob securely. The task must:
1- Alice will send the following text:
I remember as a child, and as a young budding naturalist, spending all my time observing and testing the world around me moving pieces, altering the flow of things, and documenting ways the world responded to me. Now, as an adult and a professional naturalist, Ive approached language in the same way, not from an academic point of view but as a curious child still building little mud dams in creeks and chasing after frogs. So this book is an odd thing: it is a naturalists walk through the language-making landscape of the English language, and following in the naturalists tradition it combines observation, experimentation, speculation, and documentation activities we dont normally associate with language.
This book is about testing, experimenting, and playing with language. It is a handbook of tools and techniques for taking words apart and putting them back together again in ways that I hope are meaningful and legitimate (or even illegitimate). This book is about peeling back layers in search of the language-making energy of the human spirit. It is about the gaps in meaning that we urgently need to notice and name the places where our dreams and ideals are no longer fulfilled by a society that has become fast-paced and hyper- commercialized.
Language is meant to be a playful, ever-shifting creation but we have been taught, and most of us continue to believe, that language must obediently follow precisely prescribed rules that govern clear sentence structures, specific word orders, correct spellings, and proper pronunciations. If you make a mistake or step out of bounds there are countless, self-appointed language experts who will promptly push you back into safe terrain and scold you for your errors. And in case you need reminding, there are hundreds of dictionaries and grammar books to ensure that you remember the right way to use English.
1. Bob will receive the ciphered text and be able to read it.
2. Meanwhile, Oscar will attempt to hack the ciphered text and read the message without knowing the key. "Find the best way to perform the hacking and implement it."
3. Alice will send a message in another language, such as "Select your mother language" or "German language," and repeat steps 2 and 3.
Task .2(10 points):
Repeat Task 1 with Polyalphabetic Substitution Cipher.
Can Oscar break the ciphering, and how long does it take
#*#*#*IMPORTANT#*#*#* :
Please help me out in this Task .3(20 points):
1- Repeat Task 1(Points 1 and 2) using DES ciphering. You have to implement all the steps of DES.
2- Repeat Task 1(Points 1 and 2) by sending a bitmap image. Show the image before encryption, after encryption, and after decryption.
 write a program to achieve encryption and decryption using the Monoalphabetic

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!