In this appointment you will analyze letters that are encrypted application two of the classical ciphers. You are encouraged to do them by duke aboriginal and resort to the apparatus accessible at the articulation provided beneath or alternative accoutrement you acquisition on the Internet to automate the process.
A Substitution Cipher: What does the argument say?
IA TK MIMFL OIJK JKFLUBYUDOR ZOUNHIFS LCK TIOM SYXL GR LCK GKXBM XFM LBKWGOIFS YJKB ZBKNIZINKD TK DCYUOM FKJKB GK MKZBKDDKM IJK FY MYUGL GUL XOBKXMR DCYUOM GK AXMKM AXLXOIDLIN XFM XSKM JIBSIFIX TYYOA
WG EGI JZZB IFZ UNURUAIZM RGT GX DGLM XMOZEWAFOB AZUNZW LB LEION DGLM XMOZEWA UMZ WZUW XONN IFZOM NOQZA COIF ACZZIEZAA ABZUJ UBBMGQOEP SFZZMOEP CGMWA CFONZ IFZOM ZUMA SUE FZUM IFZY UEW CFONZ IFZOM FZUMIA SUE RZ IFMONNZW UEW YUWZ FUBBOZM IFZ JOEW GX IFOEPA DGL YZUE IG AUD CFZE IFZD UMZ PGEZ AUD RZXGMZ IFZD PG
LTKHNMEVKG KE CVH VRTMHEC CVKNB KN CVH WXTFM CX HAGFRKN KCE NXC EXQHCVKNB YXP FHRTN KN EZVXXF OPC KL YXP VRIHNC FHRTNHM CVH QHRNKNB XL LTKHNMEVKG YXP THRFFY VRIHNC FHRTNHM RNYCVKNB QPVRQQRM RFK
BMBU SUWKMNMOUN LXS VXBOUBOUH TMYMBR DUQTOD UBXKRD OX FQZU GXSZ Q ITUQNKSU GUQTOD UBXKRD OX NKIIXSO EXKS BUUHN NOSUBROD OX JQOOTU GMOD HMLLMVKTOMUN QBH XYUSVXFU ODUF RSQVU UBXKRD OX VXBLUNN EXKS NMBN QBH LXSNQZU ODUF IQOMUBVU UBXKRD OX OXMT KBOMT NXFU RXXH MN QVVXFITMNDUH VDQSMOE UBXKRD OX NUU NXFU RXXH MB EXKS BUMRDJXKS TXYU UBXKRD OX FXYU EXK OX JU KNULKT QBH DUTILKT OX XODUSN LQMOD UBXKRD OX FQZU SUQT ODU ODMBRN XL RXH DXIU UBXKRD OX SUFXYU QTT QBAMXKN LUQSN VXBVUSBMBR ODU LKOKSU
You can use the apparatus at:
https://www.mtholyoke.edu/courses/quenell/s2003/ma139/js/count.html (Links to an alien site.)Links to an alien site.
WHAT to submit
For anniversary cipher:
Suggest two altered means of advancing the cipher. Make abiding to announce which advance book applies.
Explain which of the two means you would accept to breach the blank and why.
Break the blank and accommodate the plaintext in your acquiescence forth with a abundant account of how you get the plaintext.
Also accommodate answers to the afterward questions, absorption on your acquaintance with this assignment:
What was the best arduous allotment of this activity?
What was the best agreeable allotment of this activity?
Do you anticipate you accept a acceptable compassionate of how symmetric key encryption/decryption works as a aftereffect of this activity? Why or why not?
In this appointment you are comparing hashes of some Strings application assorted Has action algorithms.
´ Go to the armpit http://www.fileformat.info/tool/hash.htm.
´ Write a cord in the cord textbox and hit the assortment button.
´ Scroll bottomward to see the assortment admitting assorted algorithms.
´ Copy and adhesive the assortment ethics in a Word file.
´ Make a baby change in the cord and hit the assortment button again.
´ Compare the assortment ethics with those from the antecedent string.
´ Note how bound all the hashes were calculated.
´ Note that a baby change in ascribe gives a acutely altered assortment value.
´ Choose a book from your computer and account the assortment of it on this armpit (Repeat the accomplish aloft on two altered files).
´ Write a branch or two about this experiment.
Order a unique copy of this paper