Question

The following is an English sentence encrypted by means of a Vigen`ere cipher. IYMEC GOBDO JBSNT...

The following is an English sentence encrypted by means of a Vigen`ere cipher. IYMEC GOBDO JBSNT VAQLN BIEAO YIOHV XZYZY LEEVI PWOBB OEIVZ HWUDE AQALL KROCU WSWRY SIUYB MAEIR DEFYY LKODK OGIKP HPRDE JIPWL LWPHR KYMBM AKNGM RELYD PHRNP ZHBYJ DPMMW BXEYO ZJMYX NYJDQ WYMEO GPYBC XSXXY HLBEL LEPRD EGWXL EPMNO CMRTG QQOUP PEDPS LZOJA EYWNM KRFBL PGIMQ AYTSH MRCKT UMVST VDBOE UEEVR GJGGP IATDR ARABL PGIMQ DBCFW XDFAW UWPPM RGJGN OETGD MCIIM EXTBE ENBNI CKYPW NQBLP GIMQO ELICM RCLAC MV (i) Compute its index of coincidence. (ii) Use this to estimate the length of the keyword. (iii) Use Kasiski’s method to estimate the length of the keyword. Find the Vigen`ere keyword (which need not be an English word) and find the plaintext.

Homework Answers

Answer #1

(i)

The index of coincidence is the probability of two randomly selected letters to be the same and computed using the following formula:

Where, ni is the number of occurrence of the alphabet i in the given string and N is the total number of letters.

The value obtained from the above formula is around 0.04285.

(ii)

For the above value of IC = 0.04285, the estimated length of the keyword is around 9 for the English language.

(iii)

Find the trigrams and bigrams in the ciphertext and the ciphertext and keep track of the distance between 2 successful encounters. The most common trigram is GIM which occurs at an interval of 45 between first and second occurrence and 99 between first and third occurrence.

The gcd of the numbers gives the estimate of the length. Gcd of 45 and 99 is 9. Hence, the key length is equal to 9.

To find the key, pick the letters in the interval of 9 starting with the first letter in the ciphertext and perform the frequency attack. This results in the first letter as A.

Then start with the second letter of the ciphertext and pick every other letter after an interval of 9. Again, perform the frequency attack on this string. The second letter of the key is expected to be N.

Repeat the above process 9 times to find each letter of the key. The final key is equal to ANIELTKYW.

Use the above key to find the plain text. The plain text is as follows:

ILEAR NEDHO WTOCA LCULA TETHE AMOUN TOFPA PERNE EDEDF ORARO OMWHE NIWAS ATSCH OOLYO UMULT IPLYT HESQU AREFO OTAGE OFTHE WALLS BYTHE CUBIC CONTE NTSOF THEFL OORAN DCEIL INGCO MBINE DANDD OUBLE ITYOU THENA LLOWH ALFTH ETOTA LFORO PENIN GSSUC HASWI NDOWS ANDDO ORSTH ENYOU ALLOW THEOT HERHA LFFOR MATCH INGTH EPATT ERNTH ENYOU DOUBL ETHEW HOLET HINGA GAINT OGIVE AMARG INOFE RRORA NDTHE NYOUO RDERT HEPAP ER

The above plain text translates to the following English paragraph:

I LEARNED HOW TO CALCULATE THE AMOUNT OF PAPER NEEDED FOR A ROOM WHEN I WAS AT SCHOOL YOU MULTIPLY THE SQUARE FOOTAGE OF THE WALLS BY THE CUBIC CONTENTS OF THE FLOOR AND CEILING COMBINED AND DOUBLE IT YOU THEN ALLOW HALF THE TOTAL FOR OPENINGS SUCH AS WINDOWS AND DOORS THEN YOU ALLOW THE OTHER HALF FOR MATCHING THE PATTERN THEN YOU DOUBLE THE WHOLE THING AGAIN TO GIVE A MARGIN OF ERROR AND THEN YOU ORDER THE PAPER

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
When configuring a web server, you notice the following Cipher Suites are available to use for...
When configuring a web server, you notice the following Cipher Suites are available to use for TLS-based connections: • Cipher Suite 1: TLS_ECDHE_RSA_AES_128_CBC_SHA256 • Cipher Suite 2: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA Answer the following questions regarding these two cipher suites. i. What is the key exchange (Kx) algorithm in Cipher Suite 2? ii. What is the authentication (Au) algorithm in Cipher Suite 1? iii. What is the key size of the symmetric cipher in Cipher Suite 1? iv. What is the effective key...
Write the function decipher(s, frequencies), which will decipher a Caesar cipher encrypted string s using the...
Write the function decipher(s, frequencies), which will decipher a Caesar cipher encrypted string s using the letter frequencies in frequencies, and return the plaintext string. Here is a sample of how this function would be used: if __name__ == '__main__': # this file path works on my computer. # you will need to set this path to work on your computer! f = open('/Users/azs/code/bu/cs108/assignments/romeo.txt') text = f.read() f.close() d = letter_frequencies(text) s1 = 'h svun aptl h nv pu h...
At what age do infants speak their first word of English? Here are the data on...
At what age do infants speak their first word of English? Here are the data on 20 normal children (ages in months). Assume that the distribution of the age at which all children speak their first word (the population) is normal. 15 14 10 9 15 20 18 11 8 11 11 9 10 11 11 10 12 17 11 10 a) First, create a histogram of the data above using StatCrunch and include and attach it to your exam....
Which of the following statements is(are) true? I. A sensitivity analysis is one method managers can...
Which of the following statements is(are) true? I. A sensitivity analysis is one method managers can use to examine the stand-alone risk of a project. II. When performing a scenario analysis, it is never necessary to estimate the cash flows of the base case economic scenario.   III. Monte Carlo analysis can be viewed as a more sophisticated version of scenario analysis. I only II only III only I and II only I and III only
Develop a C++ PROGRAM which will find a hidden sentence in a list of random words...
Develop a C++ PROGRAM which will find a hidden sentence in a list of random words using map function Open this text file named shuffled_words.txt in your program If it matters, you may presume there are an even number of words in the file Place the contents of the file into an appropriate data structure in the following manner: Grab a pair of strings from the file (unless end of file is reached) Each string is separated by a space...
Which of the following is true regarding takeover valuation? I. The bidding firm should always use...
Which of the following is true regarding takeover valuation? I. The bidding firm should always use its own cost of capital for status quo valuation of the target firm II. It is important to avoid attributing the debt capacity of the bidder firm to the target firm when valuing the status quo value of the target firm III. Nominal cash flows should be discounted at nominal rates, not at real rates, so as to avoid incorrectly valuing the target firm's...
i.Bias of Sample Mean Draw 20 samples from the normal distribution N(5, 4). Compute the mean...
i.Bias of Sample Mean Draw 20 samples from the normal distribution N(5, 4). Compute the mean of your 20 samples. Report the bias of the sample mean ii. Variance of Sample Mean (Continue of problem i) To estimate the variance of the sample mean, we need to draw many different samples of size 20. Now, we draw 1000 times a sample of size 20. Store all the 1000 sample means. Report the variance of the estimated sample mean. Hint: To...
(a) Use Euler's method with each of the following step sizes to estimate the value of...
(a) Use Euler's method with each of the following step sizes to estimate the value of y(0.4), where y is the solution of the initial-value problem y' = y, y(0) = 9. (i)    h = 0.4 y(0.4) =   (ii)    h = 0.2 y(0.4) =   (iii)    h = 0.1 y(0.4) =   (c) The error in Euler's method is the difference between the exact value and the approximate value. Find the errors made in part (a) in using Euler's method to estimate the true value...
A local newspaper claims in an article that the average income for all handymen in the...
A local newspaper claims in an article that the average income for all handymen in the city is more than $5200 per month. A sample of 20 randomly selected handymen had the mean income of $5300 with the standard deviation of $150 per month. Test the claim made by the local newspaper at α = 0.05 . For each question you need to find the following a) < 1 point > Write the given . Step 1 b) < 2...
Problem a (LA2a.java) Write a program to compute the area, perimeter, and interior angle of a...
Problem a (LA2a.java) Write a program to compute the area, perimeter, and interior angle of a regular polygon. First, have the user supply the number of sides of the polygon (a whole number, which must be 3 or greater) and the side length (any positive number). Then, compute the area via the following equation: where n is the number of sides and s is the side length. Note that the equations are equivalent, with the first using degrees and the...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT