Question

One failing of an encryption system occurs if a letter (or number) always encodes to the...

One failing of an encryption system occurs if a letter (or number) always encodes to the same value. Let’s see how we can exploit these weaknesses. Let’s assume that we know that the word SECRET is in an intercepted message. What are the encrypted values (i.e., give the mappings) of the letters S, E, R, C, T (i.e., S -> ?, E -> C, R -> ?, C -> ?, and T -> ?) for the following encrypted message: MHIL75K7MTF7LL397V

To test your detective skills, what is the exact original message?

Homework Answers

Answer #1

We can see that there are two letters in SECRET, E which occurs at a spacing of two values, Therefore there will be repetition in encoded values as well in encrypted message. In encrypted message the digit 7 gets repeated after two values therefore E maps to 7. On placing SECRET we can find the mappings as S-> L, E-> 7, C-> 5, R->K,T-> M. The whole mapping is in turn:

(A,B,C, D,E,F,G,H,I,J......Z ) -> (3,4,5,6,7,8,9,A,B,C.......S). So on decrypting the above mesaage we get the original message as "TOP SECRET MESSAGE"

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to...
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to meaningless characters, and decryption is used to transform meaningless characters into meaningful text. The algorithm that does the encryption is called a cipher. A simple encryption algorithm is Caesar cipher, which works as follows: replace each clear text letter by a letter chosen to be n places later in the alphabet. The number of places, n, is called the cipher key. For example, if...
Use python language please #One of the early common methods for encrypting text was the #Playfair...
Use python language please #One of the early common methods for encrypting text was the #Playfair cipher. You can read more about the Playfair cipher #here: https://en.wikipedia.org/wiki/Playfair_cipher # #The Playfair cipher starts with a 5x5 matrix of letters, #such as this one: # # D A V I O # Y N E R B # C F G H K # L M P Q S # T U W X Z # #To fit the 26-letter alphabet into...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations. 2 points    QUESTION 20 Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate. 2 points    QUESTION 21 Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary rivals? How will the acquisition of Reebok by Adidas impact the structure of the athletic shoe industry? Is this likely to be favorable or unfavorable for New Balance? 2- What issues does New Balance management need to address? 3-What recommendations would you make to New Balance Management? What does New Balance need to do to continue to be successful? Should management continue to invest...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT