Question

Suppose that you have an alphabet of 26 letters: (a) How many possible simple substitution ciphers...

Suppose that you have an alphabet of 26 letters:

(a) How many possible simple substitution ciphers (Caesar Ciphers) are there? (this part here is just for context, im more asking about part b)

(b) A letter in the alphabet is said to be fixed if the encryption of the letter is the letter itself. How many simple substitution ciphers are there that leave

– no letter fixed?

– exactly two letters fixed?

Homework Answers

Answer #1

Answer (b) - no letters fixed

Let A be the alphabet, of size a. That is: |A|=a.

Let C ( N = n ) be the count of ciphers of the alphabet of where the fixed letters (N) are equal to n, and similar for the various order relationships, C ( N = n ) , C ( N < n ) , C ( N ≤ n ) , C ( N ≥ n ) , C ( N > n ) , C ( N ≠ n ).

(a) C ( N ≥ 0 ) = a!

The count of all ciphers of alphabet, is the count of permutations of the alphabet.

- exactly two letters fixed

Use: C ( N = 2 ) = C ( N ≥ 1 ) − C ( N ≥ 2 )

I hope you value my efforts. Please give a thumbs up.

Thank You

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
A letter in the alphabet is said to be fixed if the encryption of the letter...
A letter in the alphabet is said to be fixed if the encryption of the letter is the letter itself. How many simple substitution ciphers are there that leave (a) no letters fixed? (b) at least one letter fixed? (c) exactly one letter fixed?
you are trying to form a 6-letter code from the 26 letters of the alphabet. suppose...
you are trying to form a 6-letter code from the 26 letters of the alphabet. suppose your code must follow the following rules: * the first two letters must be different vowels ( AEIOU). ( this means no repeats.) * the next two letters have no restrictions in other words, any letter is fine.) * the last two letters cannot be a vowel, but they could repeat. how many different codes are possible?
how many strings of 7 lower case letters from the wnglish alphabet contain the letter a?...
how many strings of 7 lower case letters from the wnglish alphabet contain the letter a? How many strings of 7 lower case letters from the english alphabet contain the letter a and b?
how many strings of 8 lower case letters from the English alphabet contain the letter a?...
how many strings of 8 lower case letters from the English alphabet contain the letter a? how many strings if 8 lower case letter from the english alphabet contain the letter a and b?
Consider mini-alphabet made of just letters {a, b, c, d, e}. How many “words” (i.e., strings...
Consider mini-alphabet made of just letters {a, b, c, d, e}. How many “words” (i.e., strings of letters from that alphabet, whether they correspond to meaningful words or not) are there of length n, for n≥1 ? Use mathematical induction to prove your answer.
Determine how many different computer passwords are possible if (a) the digits and letters can be...
Determine how many different computer passwords are possible if (a) the digits and letters can be repeated, and (b) if the digits and letters cannot be repeated. i. 4 digits followed by 2 letters ii. 5 digits followed by 1 letter. iii. 3 digits followed by 3 letters
How many 2 letter password combinations are possible from letters A,B, C, D, E without repetition?...
How many 2 letter password combinations are possible from letters A,B, C, D, E without repetition? 1) n=2, r=5, C=(2!) / ((5!) * (2-5)!) 2) n=5, r=2, C=(5!) / ( (2!) * (5-2)!) 3) n=2, r=5, C=(2+5-1!) / ((5!)*(2-1)!) 4) n=5, r=2, C=5+2-1!) / ((2!) *(5-1)!)
Bash script Suppose you are working as a prof or TA and your students have an...
Bash script Suppose you are working as a prof or TA and your students have an assignment which requires them each to hand in exactly one file. You've got a directory with all of the submitted files in it, and no other files. You're also lucky enough to have a script that will do all the work of marking a submission; it will take the name of a submission file as its only parameter and will print out a single...
Use python language please #One of the early common methods for encrypting text was the #Playfair...
Use python language please #One of the early common methods for encrypting text was the #Playfair cipher. You can read more about the Playfair cipher #here: https://en.wikipedia.org/wiki/Playfair_cipher # #The Playfair cipher starts with a 5x5 matrix of letters, #such as this one: # # D A V I O # Y N E R B # C F G H K # L M P Q S # T U W X Z # #To fit the 26-letter alphabet into...
1. Suppose we have the following relation defined on Z. We say that a ∼ b...
1. Suppose we have the following relation defined on Z. We say that a ∼ b iff 2 divides a + b. (a) Prove that the relation ∼ defines an equivalence relation on Z. (b) Describe the equivalence classes under ∼ . 2. Suppose we have the following relation defined on Z. We say that a ' b iff 3 divides a + b. It is simple to show that that the relation ' is symmetric, so we will leave...