Using the Caesar cipher.

 

 

1.A.) (25 POINTS) Decrypt the ciphertext C by using brute force attack. Please show your
work.
1.B.) (25 POINTS) Decrypt the ciphertext C by using the φ(i) correlation model explained in
detail below.
Following lists the monogram English statistics where p(c) represents the frequency of
character c in English texts.
c p(c) c p(c) c p(c) c p(c)
Figure 1. Monogram English Statistics.
Let φ(i) be the correlation of the frequency of each letter in the ciphertext with the character
frequencies in English obtained from Figure 1. Let f(c) be the frequency of character c
(expressed as a fraction). The formula for the correlation for each ciphertext (with all
arithmetic being mod 26) is
φ(i) = Σ0 ≤ c ≤ 25 f(c) x p(c – i)
where f(c) is the ciphertext character frequency and p(c-i) is obtained from Figure 1. This
correlation φ(i) should be a maximum when the key k translates the ciphertext into
English. Trying the most likely key first, i.e. the i value that yields the largest φ(i), we obtain
plaintext alternatives. Out of these, the alternative that is a meaningful English text is decided
to be the plaintext.
As an example, assume that ciphertext “KHOOR ZRUOG” is given. To solve it using the φ(i)
model, we first compute the frequency (as a fraction) of each letter in the ciphertext as
follows:
G 0.1
H 0.1
K 0.1
O 0.3
R 0.2
U 0.1
Z 0.1
where ciphertext frequencies sum up to 1.0. Then, we compute φ(i) as follows:
φ(i) = Σ0 ≤ c ≤ 25 f(c) x p(c – i) = 0.1 x p(6 – i) + 0.1 x p(7 – i) + 0.1 x p(10 – i) + 0.3 x p(14 – i) +
0.2 x p(17 – i) + 0.1 x p(20 – i) + 0.1p(25 – i)
For example, for i=0, the φ(i) is computed as:
φ(0) = 0.1 x p(6) + 0.1 x p(7) + 0.1 x p(10) + 0.3 x p(14) + 0.2 x p(17) + 0.1 x p(20) + 0.1 x p(25)
= 0.1 x 0.015 + 0.1 x 0.06 + 0.1 x 0.005 + 0.3 x 0.08 + 0.2 x 0.065 + 0.1 x 0.03 + 0.1 x 0.002
= 0.0482
Therefore, we obtain the table below:
Figure 2. The value of φ(i) for 0 ≤ i ≤ 25
The most likely keys (represented as i) that yield the largest φ(i) value are highlighted in
Figure 2: They are 6, 10, 3, and 14 in decreasing order of φ(i) value.
Trying the most likely key first, we obtain as plaintext “EBIIL TLOIA” when i = 6, “AXEEH
PHKEW” when i = 10, “HELLO WORLD” when i = 3, and “WTAAD LDGAS” when i = 14.
The statistics indicated that the key was most likely 6, when in fact the correct key was 3. So
the attacker must test the results. The statistics simply reduce the number of trials in most
cases. Only three trials were needed.
IMPORTANT NOTE: You may either write computer program or work manually to solve
this question. It is suggested to use a program as it will reduce the amount of time you spend
on it significantly. If writing a code, please submit your source code together with screenshots.
If solved manually, please provide your solution steps clearly.
2.) (50 POINTS + 20 EXTRA POINTS If you use an alternative method to find the
multiplicative inverse of a matrix other than what is described in this question) Hill cipher is a
well known polyalphabetic cipher. In a hill cipher cryptosystem, the encryption and
decryption formulas are given as follows:
Encryption: C = (P x K ) mod S
Decryption: P = (C x K-1
) mod S
where P is plaintext, C is ciphertext, x is matrix multiplication, key K is a matrix of size a x a,
S is the source alphabet size (which is 26 for English), and K-1
is the multiplicative inverse of
the matrix K such that:
(K x K-1
) mod S = I
where I is the identity matrix. For encryption and decryption, numeric correspondent of each
letter (0 for letter a, 1 for letter b, .., 25 for letter z) is used. We assume that only lowercase
letters are used as plaintext P letters. Given the key matrix as:
17 17 5
K = 21 18 21
2 2 19

 

 

 

Sample Solution

 

 

The Others Lives of Frankenstein and the Monster

Victor Frankenstein purposely isolated himself from society and made his show-stopper of innovation. Shockingly, incidentally, the beasts he made additionally experienced partition from society, which disregarded his desire. As a young man, JVC is brimming with interest in science. JVC is sitting around to make you your “other”. As a young man, the logical hypothesis and strategy he examined were distinctive during this time and were totally disregarded by different researchers.

Frankenstein’s beast is regularly called “Frankenstein” and is an invented individual who initially showed up in Mary Shelley’s 1818 novel Frankenstein, or the advanced prometheus. Shelley’s title is hence a correlation between Victor Frankenstein, the maker of the beast, and the legendary character Prometheus, which utilizes earth to shape people and give them power. In Shelley’s Gothic story, Victor Frankenstein made living animals in his research facility through uncertain techniques for science and speculative chemistry. Shelly communicated the beast as 8 feet tall (2.4 m) tall, appalling, touchy and passionate. The beast attempted to mix into human culture yet it was evaded, and it drove him to look for retribution against Frankenstein. As indicated by researcher Joseph Carroll, this beast involves “the limit typically characterized between the saint and the foes’ attributes.”

At the point when you hear the name of “Frankenstein” you may think about an immense green beast. Nonetheless, in the first novel “Freaky Frankenstein” by Mary Wollstonecraft, the title alludes to Dr. Frankenstein who made the undead. To confound you, the beast in the book is additionally called Frankenstein. Accordingly, the specialized name of the beast is Frankenstein. The creator of ‘100 Years of Solitude and Love in the Age of Cholera’ has made a strange world by consolidating stunning thoughts. how right? Verse, particularly the verse of the cooler’s magnet. “There are these little magnets behind them, you can move them and make unusual sentences,” Marquez once told the questioner of the Paris Review. “That is the manner in which I create otherworldly authenticity – see this,” Umbrella tree eats purple lime “! This is insane. I put it in my next novel. ”

 

 

This question has been answered.

Get Answer