Question

In: Computer Science

Below are six ciphertexts of the same message encrypted using the following four classical ciphers available...

Below are six ciphertexts of the same message encrypted using the following four classical ciphers available in CrypTool: Caesar (shift), Substitution, Vigenere and Permutation.

Do your best to match ciphertexts with a cipher that could have been used to obtain the given ciphertext. If you are uncertain, you can list several ciphers per each ciphertext. Justify your answer. Find the plaintext, by breaking the Caesar (shift) cipher, and then find the keys for at least 3 ciphers used to encrypt the now known plaintext. All attacks must be documented. Brute-force attacks do not count.

Ciphertext 1

TFPEGO ZEKUUFJZ CZ NJNCSGZWV LWVJVH FWVL HDTD ISK QSRNYR BQJPJ

SZRPBV ML LVEIKLYVUBX WNLLQC SPJL SITU AAY EXIR TFPEGO ZEKUUFJZ

CZ NJNCSGZWR RACWHTQ HJCV CJRXSL JPIJAK NYR TG FXX CZRPBV ML

LVEIKLYVMFTIG PJCV XIPS KHQKG TS WKGWFUGKO NCQWZDTS TB TGTUAP

UBX YLRBPYSK HJCV XIPB LXQYAV WMCU NVL EFLPW VJNCSQ HB ZEKUUFJZ

CXS RVGSCGBQY HJCV AWIG UURJ AIEQ

Ciphertext 2

GSVGXK JOYOYMOJ LB NBJEOLLRO LRCTEK LRGL YGHO XBP KGHMPL TOQOJ

NBJEOL LB JOYOYMOJ LRO LRCTEK LRGL YGHO XBP ESGHGSVGXK JOYOYMOJ

LB NBJEOLLRO NJCOTHK LRGL FJBQOH PTLJPOMPL HB TBLNBJEOL LB

JOYOYMOJLRBKO LRGL RGQO KLPUA MX XBPGSVGXK JOYOYMOJ LB NBJEOL

LRO LJBPMSOK LRGL RGQO FGKKOH GVGXMPL TOQOJ NBJEOL LB JOYOYMOJ

LRO MSOKKCTEK LRGL UBYO OGUR HGX

Ciphertext 3

DOZDBVUHPHPEHU WR IRUJHWWKH WKLQJV WKDW PDGH BRX VDGEXW QHYHU

IRUJHW WR UHPHPEHUWKH WKLQJV WKDW PDGH BRX JODG DOZDBV UHPHPEHU

WR IRUJHWWKH IULHQGV WKDW SURYHG XQWUXHEXW GR QRW IRUJHW WR

UHPHPEHUWKRVH WKDW KDYH VWXFN EB BRXDOZDBV UHPHPEHU WR IRUJHW

WKH WURXEOHV WKDW KDYH SDVVHG DZDBEXW QHYHU IRUJHW WR UHPHPEHU

WKH EOHVVLQJV WKDW FRPH HDFK GDB

Ciphertext 4

AMESOV OHALEOIR EO ETUWETSAU GBSOWE THSR ETMD EGN VUGBAK YTEHS

NTRNEA RH AAFMHAAMEDE TEETBS OTAE ETTG EEG GYETTHGRFR PUFMETLB TE

PBRMSCYMR NENTRTU SOFT RTESSA MELEYOEET AL BTT UERETA MR

EOBRMHCARHTST EEIM SOTM BRMNE WE TTUOTTAYE OOHAERET CR FHAUGBGYA

RHHNNOHV OMRU AWRE BHHYTE TDOEIDL BTSDD TRHYRF RT DVOHSAEOIDT

EESOYTEAT OROE UEGB VAFM LAD

Ciphertext 5

ANWDCE ZEMGMEID BO FQRJIFBHE VHLRSA THCT PEPM YOW SDHNCT NGVHV

RWRGGT WS DMMEOBHVFPE TJIQKE BHAV MDHQ GOU ILDHMTWAAS UIYMMBGR WS

RWRGGTWLQ NRIGNGW FPAT RRRZQL UNVRXINCT DQ NRX RWRGGT WSDMMEOBHV

FPOSG TKEF PAVG SWYOS BY AOXEXEAYU RHQQUBET TR JAZGEVTKI FZOUDLHW

FPAT JAYI BISSGD DAMGBUV NHZQZ FOTGHX FW REOEPFQZTHG BOIEAINIS

WLMB COOE HEOP DAA

Ciphertext 6

VHIGCYI NKNBCNIVY DBICPKEKPIAPE FCHAPTVGVP FAYRYOHCQVE

NTNIDBICPKEKY FNKNKKFEYPIAPEF CHAPTVG VPFAYWCHVHO HZTAYS NKNKKFE

YBDYFKI KEAPNRIENFS HAPTVSEYOFPZR YEXRCQOPV FYVDBIC PKEK YFNK NKK

FEY DAPRAP TVAGTN PYRUMCTU AYWYHZTAY SNKNKKFEYB DYFKIKEAPP

KFYQCPNPY AGAPTOP TYHUPFPG ITACQVENT NIDBICPK EKYFNKNK KFEYPIMD

RPUPEFC HAPTVB YKNEPY GPSTA

Solutions

Expert Solution

From plaintext is encrypted using classic ciphers such as Caesar, Substitution, Vigenere and Permutation.

Decrypting Ciphertext-3 using CAESAR cipher technique with key K=3 we get the message as

"ALWAYS REMEMBER TO FORGET THE THINGS THAT MADE YOU SAD BUT NEVER FORGET TO REMEMBER THE THINGS THAT MADE YOU GLAD ALWAYS REMEMBER TO FORGET THE FRIENDS THAT PROVED UN TRUE BUT DO NOT FORGET TO REMEMBER THOSE THAT HAVE STUCK BY YOU ALWAYS REMEMBER TO FORGET THE TROUBLES THAT HAVE PASSED AWAY BUT NEVER FORGET TO REMEMBER THE BLESSINGS THAT COME EACH DAY"

Decrypting Ciphertext-2 using known plaintext cryptanalysis with the following key table

PLAIN TEXT A B C D E F G H I K L M N O P R S T U V W Y
CIPHER G M U H O N E R C A S Y T B F J K L P Q V X

we will get the original message

Upon analyzing the ciphertext-5 the characters 1, 3, 8, 9, 11, 16, 17, 19, 24, 25, 27, 32 and on are just reflecting the plaintext character from the message and there is no sign of permutation or substitution. So from this analysis we can conclude that the encryption technique used is VIGENERE!!!. Since the pattern is repeating as 1, 3, 8, 9, 11, 16... Length of the keyword is 8 and 'A' is the character in the key at position 1, 3 and 8.

Based on this preliminary analysis solving for the rest of the keyword characters using the VIGENERE technique formula

where

P - Plaintext Character

C - Ciphertext Character

K - Key

Example:

Plaintext character L is encrypted as N. Applying the values of L and N in the formula as,

If K = 2, then the result will be 13. Therefore, second character is C

Continuing in the same way, we get the key as "ACADEMIA"


Related Solutions

A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
A company manufactures four products using the same plant and processes. The following information relates to...
A company manufactures four products using the same plant and processes. The following information relates to a production period: - Product Volume Material costs per unit Direct labour time per unit Machine time per unit Labour cost per unit A 1,100 £7 30 minutes 15 minutes £5 B 2,000 £7 30 minutes 15 minutes £5 C 1,500 £16 120 minutes 60 minutes £9 D 3,950 £19 90 minutes 90 minutes £9 Total production overhead recorded by the cost accounting system...
Task: Review the following message below. While retaining all the essential content from the original message,...
Task: Review the following message below. While retaining all the essential content from the original message, rewrite the message to make it more concise and effective. At a minimum, make at least three of each of the following types of changes: Changing I-voice to you-voice Changing passive verbs to active verbs Converting nouns or be verbs to action verbs Removing it is/there are statements WHO’S INVOLVED: - Sabrina Zambreskie, president of Workforce Engagement Consortium - Jen Asksins, HR manager at...
There are four classical experiments provided below. Select one experiment. Evaluate the method of studying this...
There are four classical experiments provided below. Select one experiment. Evaluate the method of studying this topic. Do you agree with the conclusions? - Milgram's study on obedience - Asch's study of conformity - Zimbardo's Stanford Prison Experiment - Stanley Schacter's Fear and Affiliation Study
) Kofi Brokeman Ltd manufactures four products using the same machinery. The following details relate to...
) Kofi Brokeman Ltd manufactures four products using the same machinery. The following details relate to its cost and sales per unit of each product: Fandango FanChoco Fanice Choco Malt GHȼ GHȼ GHȼ GHȼ Selling price 28 30 45 42 Direct material 5 6 8 6 Direct labour 4 4 8 8 Variable overhead 3 3 6 6 Fixed overhead* 8 8 16 16 Profit 8 9 7 6 Labour hours 0.25 0.25 0.50 0.50 Machine hours 4 3 4...
Evaluate the effect of each shock below using first the classical model and second the Keynesian...
Evaluate the effect of each shock below using first the classical model and second the Keynesian model. For the Classical model, include graphs of the goods market, the labor market, and the money market. For the Keynesian model, include an IS-LM-FE graph, an Aggregate Supply – Aggregate Demand graph, and a graph of labor market equilibrium with efficiency wages. For the Keynesian model, include short-run effects, while the price is constant, and long run effects after the price has fully...
SOLVE USING R: Twenty four rug rats were randomly assigned to four groups of six each....
SOLVE USING R: Twenty four rug rats were randomly assigned to four groups of six each. The groups were subjected to different levels of stress (high, moderate, low, and none) induced by occasional, unexpected loud noises. After one week, density of blood lym- phocytes (cells ×106/ml) were measured. Prior studies indicated that the homogeneity assumption was violated and could not be remedied. High: 2.9, 1.8, 2.1, 1.5, 0.9, 2.8 Moderate: 3.7, 4.6, 4.2, 2.8, 3.2, 4.5 Low: 5.2, 6.2, 5.7,...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Create a portfolio using the four stocks and information below:
Create a portfolio using the four stocks and information below: (Do not round intermediate calculations. Record your answers in decimal form and round your answers to 4 decimal places. Ex. X.XXXX)What is the variance of A?What is the variance of B?What is the variance of C?What is the variance of D?What is the Correlation (A,A)?What is the Correlation (B,B)?What is the Correlation (C,C)?What is the Correlation (D,D)?What is the Covariance (A,A)?What is the Covariance (A,B)?What is the Covariance (A,C)?What is the...
Obtain 95% confidence interval in the following studies . Six coins of the same type are...
Obtain 95% confidence interval in the following studies . Six coins of the same type are discovered at an archaeological site. If their weights on average are significantly different from 5.25 grams then it can be assumed that their provenance is not the site itself. The coins are weighed and have mean 4.73 g with sample standard deviation 0.18 g. Obtain 95% confidence interval for the mean.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT