Question

1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking...

1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking alike,

then somebody isn't thinking." Is this a good key? Why or why not?

2.  Calculate the index of coincidence for the result.

Homework Answers

Answer #1

1. Encrypting "If everyone is thinking alike, then somebody isn't thinking." using a Vigenere cipher with a key Patton gives "Xf xosenogx wf ihbgyvcg tewxt, taxb fdmxucqn ilg'h gwigdwav.".

This is a good key since the length of the key is relatively large.

2. The incidence of coincidence can be found by calculating the following expression
where N is the length of the text which is 49 in this case, n is the number of alphabets which is 26 in this case and Fi is the number of appearances of the i th alphabet.

This value comes to which is equal to .

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Let's say we are using vigenere cipher. We have a key of "red" and a plain...
Let's say we are using vigenere cipher. We have a key of "red" and a plain text of "cats and dogs", what is the cipher text? ____ (Keep the space between words, but do not use other punctuation.) If we use generic Caesar cipher to encrypt "I have pizza for lunch", using the key "V". What would the cipher text be? "____" Do not enter punctuation; keep the space between words. When using Caesar cipher, if the plain text is...
Use Playfair cipher to encrypt the plaintext “pink balloon” using the key exam.
Use Playfair cipher to encrypt the plaintext “pink balloon” using the key exam.
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
When configuring a web server, you notice the following Cipher Suites are available to use for...
When configuring a web server, you notice the following Cipher Suites are available to use for TLS-based connections: • Cipher Suite 1: TLS_ECDHE_RSA_AES_128_CBC_SHA256 • Cipher Suite 2: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA Answer the following questions regarding these two cipher suites. i. What is the key exchange (Kx) algorithm in Cipher Suite 2? ii. What is the authentication (Au) algorithm in Cipher Suite 1? iii. What is the key size of the symmetric cipher in Cipher Suite 1? iv. What is the effective key...
Applied Cryptograph Program - Find a cryptographic key from Ciphertexts. Then decode the last ciphertext. In...
Applied Cryptograph Program - Find a cryptographic key from Ciphertexts. Then decode the last ciphertext. In this programming assignment, you will be responsible for determining a cryptographic key that is used to encrypt the 10 ciphertexts provided. In order to complete this programming assignment, you need to understand the problems inherent to the use of a single key to encrypt multiple messages The objective of the project is to demonstrate, from an attacker's perspective, how insecure the use of a...
1.  Can you think of a time when you have heard others use morally disengaged thinking? The...
1.  Can you think of a time when you have heard others use morally disengaged thinking? The following examples may help to guide your thinking to determine why one might or might not do such things (matching them to the moral disengagement mechanisms on pp.86-88). Note: "you" refers to an undergraduate student:   You work in a fast-food restaurant. It's against policy to eat food without paying for it. You came straight from classes and are therefore hungry. Your supervisor isn't around,...
Critical Thinking 1. Is the everyday use of antibacterial soap a good idea, given that most...
Critical Thinking 1. Is the everyday use of antibacterial soap a good idea, given that most microorganisms residing on the human body are harmless? 2. It is a busy day at the doctor’s office, and the medical assistant has been struggling for more than 10 minutes to convince a 6-year-old child to open his mouth and allow the medical assistant to collect a throat culture specimen. The child is becoming enraged and refuses to open his mouth, and his mother...
3. The economy is made up of two types of agents: There are 4000 people in...
3. The economy is made up of two types of agents: There are 4000 people in group 1 and each of them have the utility function U1 = W3/4 The income for everyone in group 1 is such that they have a 75% chance of making $50 and a 25% chance of making 300. Group 2 has 6000 people and each have the utility U2 = W1/3. The income for these people is that they have a 30% chance of...
PART 1: Critical Thinking ARTICLE adapted from: Low-Income Parents Of 'Difficult Children' Likely To Use iPads...
PART 1: Critical Thinking ARTICLE adapted from: Low-Income Parents Of 'Difficult Children' Likely To Use iPads To Pacify Kids 2 March 2016, 9:27 pm EST By Angela Laguipo Tech Times In a world of technological advancement, mobile devices are widely used by people of all ages, including children. A new study found that when children are in tough situations and are having emotional difficulties, their parents are more likely to give an iPad than when the children are behaving calmly....