Vous êtes sur la page 1sur 3

Applied cryptography Assignment-1 By Nikhil Chitlur Navakiran Question 1.

Decode the encrypted message gbgmoazfcouhowgaihrvt using Vigenere Cipher with key godevils Answer

Figure 1: Table to solve Vigenre cipher

Using the above table from the key and cipher text we can use the look up table and we can find the input text. The 1st column indicate the Input text and the 1st rows indicates key, the content of the other cells indicate the cipher text. The first cipher text g and key g produce the plane text A. The second cipher text b and key o produces the plane text N. The complete deciphered text is and its onward to victory . Question

2.

Using affine cipher with a = 9 and b = 5 message xqppc xqppc ybc fld yzhqu ybc uqp bag jfcbbs Answer - the formula for affine transformation is Y=(aX+b) mod N. Y = the cipher text X= the plane text a ,b and N are constants. For our problem the value of a=9 ,b=5 and N=26

decode

the

encrypted

From above X= (Y-b) a-1mod 26 X= (Y-5) 9-1 mod 26 ---eq1

9-1= 9 * Z= 1 mod 26 Z=3 Then eq1 becomes X=(Y-5)*3 mod 26 Eg Y=x=23; X=(23-5)*3 mod 26 X=2=c Similarly for the rest.
The cipher xqppc xqppc ybc fld yzhqu ybc uqp bag jfcbbs Decodes to CHEER CHEER FOR ASU FIGHT FOR THE OLD MAROON

3.

The following cipher is encrypted using Caesar cipher but the shift variable n is unknown. Find the value of n such that the cipher gives a meaningful text. lzw imauc tjgof xgp bmehk gnwj lzw dsrq vgy

Answer- I solved this problem using frequency analysis. The most commonly occurring in a sentence is the letter E. Based on frequency analysis of the cipher text I found that the letter repeated eg L repeated two time represented as L=2, Z=2,W=3, M=2, J=2 and G=4. I assumed that one of these letters should letter E, from there I could calculate the cipher length as 8. In the traditional brute force method I would have to perform a maximum of 26 attempts to solve the cipher, by frequency analysis we have reduced this to 6 tries. The decoded text is The quick brown fox jumps over the lazy dog 4. Break the following mono-alphabetic cipher. Show plain text, show the algorithm/key and some steps of your analysis. You need to provide necessary spaces between words while showing the plaintext. (Spaces and line breaks below are not relevant). XZXGFHRHZXLIVGDLWFLWVHPGLKHRGGRMTFMWVI NBWVHPIFMMRMTERHGZZMWZKZXSVZKZXSVILXPHZMWSVMXVRXZMNZR MGZRM NBLDMDVYKZTVHZMWMLGWVKVMWLMBLFPMLDDSL GLHVIEVFKIVJFVHGHGSVXOZHHHBMLKHRHKZTVRH ZMRNKLIGZMG IVHLFIXVZMWRGXLMGZRMHWVGZROH LUVZXSXOZHHZMWXOZHHMLGVHDRGSZFWRLZOGSLFTSWRHXFHHRMTSLN

VDLIPKILQVXGKILYOVNHDRGSKVVIH RHZXXVKGZYOVYVXZIVUFOGSZGBLFDLIPLFGBLFIHLOFGRLMHZMBRNKILK IRVGB RMSLNVDLIPHZMWVCZNHDROOYVGIVZGVWEVIBHVIRLFHOB Answer Letter frequency analysis did not prove to be useful. Since the question mentioned a mono-alphabetic cipher my search of mono alphabetic ciphers resulted in 3 well known cipher the affine cipher, Caesar cipher and atbash cipher. By frequency analysis I was able to determine it was not and Caesar cipher; rotation based on a particular guess like V which is the most commonly occurring letter as letter E gave un readable output. I realized that each letter has a different value of rotation. I tried atbash cipher because its a mono-alphabetic cipher where it is not rotated by a constant number A maps to Z and B=Y and so on. The cipher decode to CACTUS IS A CORE TWO DUO DESKTOP SITTING UNDER MY DESK RUNNING VISTA AND APACHE. APACHE ROCKS AND HENCE I CAN MAINTAIN MY OWN WEB PAGES AND NOT DEPEND ON YOU KNOW WHO TO SERVE UP REQUESTS. THE CLASS SYNOPSIS PAGE IS AN IMPORTANT RESOURCE AND IT CONTAINS DETAILS OF EACH CLASS AND CLASS NOTES WITH AUDIO, ALTHOUGH DISCUSSING HOMEWORK PROJECT PROBLEMS WITH PEERS IS ACCEPTABLE BE CAREFUL THAT YOU WORKOUT YOUR SOLUTIONS ANY IMPROPRIETY IN HOMEWORKS AND EXAMS WILL BE TREATED VERY SERIOUSLY.

Vous aimerez peut-être aussi