Question

In: Computer Science

Subject : Cryptography (computer science) After reading chapter 3, Analyze the history of Caesar Cypher and...

Subject : Cryptography (computer science)

After reading chapter 3, Analyze the history of Caesar Cypher and its impact on cryptography.

The initial post should be at least 400 words.

Solutions

Expert Solution

Caesar Cypher and its impact on cryptography.

The "Caesar Box," or "Caesar Cipher," is one of the earliest known ciphers. Developed around 100 BC, it was used by Julius Caesar to send secret messages to his generals in the field. In the event that one of his messages got intercepted, his opponent could not read them. This obviously gave him a great strategic advantage. So, what was the code? Caesar shifted each letter of his message three letters to the right to produce what could be called the ciphertext. The ciphertext is what the enemy would see instead of the true message. So, for example, if Caesar’s messages were written in the English alphabet, each letter “A” in the message would become a "D," the "B’s" would become "E’s," and the "X's" become "A’s." This type of cipher is appropriately called a “shift cipher.”

Caesar’s magic number was three, however, a modern day use of the Caesar Cipher is a code called "ROT13." ROT13, short for "rotate by 13 places," shifts each letter of the English alphabet 13 spaces. It is often used in online forums to hide information such as movie and tv show spoilers, solutions to puzzles or games, or offensive material. The code is easily crackable, however, it hides the information from the quick glance. Because of the use of a key, the Vigenère Cipher cannot initially be cracked by using a simple frequency analysis like you could do with a Caesar Cipher. Though, the main weakness of a Vigenère Cipher is the repeating of the key. So, in our example, “dog” was repeated twice in order to match the number of letters in the word “attack.” If an attacker guesses the key’s length, it becomes much easier to crack. The ciphertext is then treated like a series of small Caesar Ciphers, and a method such as frequency analysis could then be performed to crack the code.

But how can an attacker guess the length of the key? There are actually two methods: the Kasiski examination and the Friedman test. If the attacker notices that there are repeated segments of text in the ciphertext, a Kasiski examination would be effective in cracking the code. The attacker would count the distance of letters between repeated text to get a good idea of how long the key is. The Friedman test takes an algebraic approach utilizing a formula to measure the unevenness of the cipher letter frequencies to break the cipher.


Related Solutions

After reading Chapter 3 of the text and watching the tutorial videos below, craft an initial...
After reading Chapter 3 of the text and watching the tutorial videos below, craft an initial post that answers the following questions: What are the possible reasons why the government may make a market intervention? What are the possible implications of such interventions? How might the wedge between consumers and firms lead to market distortions?
INSTRUCTIONS: Answer the following after reading Chapter 3 of “Nursing Care of the Community” by Z....
INSTRUCTIONS: Answer the following after reading Chapter 3 of “Nursing Care of the Community” by Z. Famorca Objectives: • Define primary health care (PHC). • Explain the definition of health by the World Health Organization. • Outline the historical background of PHC. • Enumerate the key principles of PHC. • Relate the application of the PHC key principles in the implementation of public health programs • Describe traditional and alternative health care modalities that may be applied in communities 1....
After reading chapter 3 and the Case Study, "Sheryl Sandberg - Chief Operating Officer of Facebook",...
After reading chapter 3 and the Case Study, "Sheryl Sandberg - Chief Operating Officer of Facebook", please respond to the following question: What seemed to be Sheryl Sandberg's attitude toward her coworkers when she joined the Facebook team? Also, which level of moral development and global corporate social responsiblity (GCSR" does Facebook seem to be operating on?
Discuss the relation between multimedia and hypermedia? my subject is multimedia system in computer science
Discuss the relation between multimedia and hypermedia? my subject is multimedia system in computer science
After reading the opening case in chapter 1 (page 3-4), discuss how both microeconomic and macroeconomic...
After reading the opening case in chapter 1 (page 3-4), discuss how both microeconomic and macroeconomic factors influence the global automobile industry. Also, discuss a real business case scenario in which you or someone in the management position in your company needed to consider both the macro and micro-economic factors to analyze a business problem. If you don't have such an experience, please consider a hypothetical scenario. This is from the book Economics for Managers ISBN-13: 978-1-32-301585-8
After reading the chapter focused on Constitution issues it is time to reflect in a discussion....
After reading the chapter focused on Constitution issues it is time to reflect in a discussion. Please label the following Part 1 & Part 2 in your initial response. Part 1: Take a Stand! (150 words) Should commercial speech be protected by the First Amendment? (Must answer yes or no in a thesis) Part 2: Apply your Stand! (150 words) Read: Businesses’ First Amendment rights don’t extend to their employees.docxPreview the document Think about how the First Amendment may affect...
The case Harnessing the Science of Persuasion, HBR, 2001. After carefully reading the case, reflect on...
The case Harnessing the Science of Persuasion, HBR, 2001. After carefully reading the case, reflect on and answer the following questions: “Robert Cialdini discusses six persuasion tactics used to influence people. Pick any 3 out of these 6 tactics and find relevant examples from the marketing field. Your examples can come from advertisements, marketing communications, company practices and operations, or any other relevant company communication medium (foreign media). Discuss why your examples fit those three categories and justify your reasoning....
After reading the chapter chapter 7 content folder answer one of the following questions. 1. Describe...
After reading the chapter chapter 7 content folder answer one of the following questions. 1. Describe the characteristics of a proprietary funds? Explain the difference between an Enterprise Fund and an Internal Service Fund? 2. When is it required to establish an enterprise fund? How does a enterprise fund show up in the Governmental Wide financial statements both the statement of Net Assets and Statements of Activities? 3. List at least 5 differences between a proprietary fund and a general...
After reading the chapter, answer: what are the 5 causes of steatorrhea (fatty stools)?
After reading the chapter, answer: what are the 5 causes of steatorrhea (fatty stools)?
Discussion on Formulas, T-Accounts, Journal Entries 11 unread reply.11 reply. After reading Chapter 3 and reviewing...
Discussion on Formulas, T-Accounts, Journal Entries 11 unread reply.11 reply. After reading Chapter 3 and reviewing the online videos, you should have a good understanding of the various approaches and tools necessary to compute and prepare schedules for direct materials placed in production, cost of goods manufactured, and cost of goods sold. The book exercises and the videos give you three "methods" to compute and work problems to calculate these figures. The first is simply by way of a formula...(i.e....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT