Question

Ciphertext WHKCJILXI was encrypted by affine cipher C = A*P + 8 (mod 26), where parameter...

Ciphertext WHKCJILXI was encrypted by affine cipher C = A*P + 8 (mod 26), where parameter A is uknown. You have a following additional information: plaintext letter L was encrypted by letter H. Find A and decrypt the message. You can use applet for decryption.

For your convenience, below are numeric values of ENGLISH letters:

A=0 B=1 C=2 D=3 E=4 F=5 G=6 H=7 I=8 J=9 K=10 L=11

M=12 N=13 O=14 P=15 Q=16 R=17 S=18 T=19 U=20 V=21

W=22 X=23 Y=24 Z=25

Homework Answers

Answer #1

Since L is converted to H in cipher text.
Affine cipher works as C = A*P + 8 (mod 26)

Since L = 11 and H = 7.

so The cipher eqn becomes,

7 = A*11 + 8 (mod 26)

now we have to find out the value of A, we need to use hit and try method.

A = 1 : 19 mod 26 = 19 so False.
A = 2 : 2*11 + 8 (mod 26) = 30 mod 26 = 4 so false.
A = 3 : 3*11 + 8 (mod 26) = 41 mod 26 = 15 so false.
A = 4 : 4*11 + 8 (mod 26) = 52 mod 26 = 0 so false.
A = 5 : 5*11 + 8 (mod 26) = 63 mod 26 = 11 so false.
A = 6 : 6*11 + 8 (mod 26) = 74 mod 26 = 22 so false.
A = 7 : 7*11 + 8 (mod 26) = 85 mod 26 = 7 so True.

so A = 7,
now to decifer we need to find multiplicative inverse of 7.

let B is multiplicative inverse of 7

1 = 7*B mod 26.
Again we need to use hit and trial method for value of B.

B = 1 : 7 mod 26 = 7, so false
B = 2 : 14 mod 26 = 14, so false
B = 3 : 21 mod 26 = 21, so false
B = 4 : 28 mod 26 = 2, so false
B = 5 : 35 mod 26 = 9, so false
B = 6 : 42 mod 26 = 16, so false
B = 7 : 49 mod 26 = 23, so false
B = 8 : 56 mod 26 = 4, so false
B = 9 : 63 mod 26 = 11, so false
B = 10 : 70 mod 26 = 18, so false
B = 11 : 77 mod 26 = 25, so false
B = 12 : 84 mod 26 = 6, so false
B = 13 : 91 mod 26 = 13, so false
B = 14 : 98 mod 26 = 20, so false
B = 15 : 105 mod 26 = 1, so True.


so multiplicative inverse of 7 is 15.

A=0 B=1 C=2 D=3 E=4 F=5 G=6 H=7 I=8 J=9 K=10 L=11
M=12 N=13 O=14 P=15 Q=16 R=17 S=18 T=19 U=20 V=21
W=22 X=23 Y=24 Z=25

Now we have to decifer: W H K C J I L X I
P = (B*C - 8) mod 26, B is multiplicative inverse of 7.

Decifering W:
P = (15*22 - 8) mod 26 = 10 = K

Decifering H:
P = (7*22 - 8) mod 26 = 16 = Q

Decifering K:
P = (10*22 - 8) mod 26 = 4 = E

Decifering C:
P = (2*22 - 8) mod 26 = 10 = K

Decifering J:
P = (9*22 - 8) mod 26 = 8 = I

Decifering I:
P = (8*22 - 8) mod 26= 12 = M

Decifering L:
P = (11*22 - 8) mod 26 = 0 = A

Decifering X:
P = (23*22 - 8) mod 26 = 4 = E

Decifering I:
P = (8*22 - 8) mod 26 = 12 = M

So decifered text is: KQEKIMAEM

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
In Hill cipher, the ciphertext is computed by: C = PK (mod 26), where P is...
In Hill cipher, the ciphertext is computed by: C = PK (mod 26), where P is the plaintext matrix and K is the key. All computations are done in (mod 26) for English alphabet. (a) Explain how Eve can break the system if enough plaintext-ciphertext pairs are provided. (b) What is the type of this attack?
Use python language please #One of the early common methods for encrypting text was the #Playfair...
Use python language please #One of the early common methods for encrypting text was the #Playfair cipher. You can read more about the Playfair cipher #here: https://en.wikipedia.org/wiki/Playfair_cipher # #The Playfair cipher starts with a 5x5 matrix of letters, #such as this one: # # D A V I O # Y N E R B # C F G H K # L M P Q S # T U W X Z # #To fit the 26-letter alphabet into...
Given that A to Z are mapped to integers 0-25 as follows. A:0, B:1, C:2, D:3,...
Given that A to Z are mapped to integers 0-25 as follows. A:0, B:1, C:2, D:3, E:4, F:5, G:6, H:7, I: 8, J: 9, K:10, L:11, M:12, N:13, O:14, P:15, Q:16, R:17, S:18, T:19, U:20, V:21, W:22, X:23, Y:24, Z:25. Encrypt the following message using Vigenere Cipher with key: CIPHER THISQUIZISEASY What is the ciphertext? Show your work. PLEASE HELP
Consider permutations of the 26-character lowercase alphabet Σ={a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z}. In how many of these permutations do a,b,c...
Consider permutations of the 26-character lowercase alphabet Σ={a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z}. In how many of these permutations do a,b,c occur consecutively and in that order? In how many of these permutations does a appear before b and b appear before c?
Write a C++ program to demonstrate thread synchronization. Your main function should first create a file...
Write a C++ program to demonstrate thread synchronization. Your main function should first create a file called synch.txt. Then it will create two separate threads, Thread-A and Thread-B. Both threads will open synch.txt and write to it. Thread-A will write the numbers 1 - 26 twenty times in nested for loops then exit. In other words, print 1 - 26 over and over again on separate lines for at least 20 times. Thread-B will write the letters A - Z...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations. 2 points    QUESTION 20 Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate. 2 points    QUESTION 21 Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
JAVA ASSIGNMENT 1. Write program that opens the file and process its contents. Each lines in...
JAVA ASSIGNMENT 1. Write program that opens the file and process its contents. Each lines in the file contains seven numbers,which are the sales number for one week. The numbers are separated by comma.The following line is an example from the file 2541.36,2965.88,1965.32,1845.23,7021.11,9652.74,1469.36. The program should display the following: . The total sales for each week . The average daily sales for each week . The total sales for all of the weeks .The average weekly sales .The week number...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT