Basic Ciphers and Frequency Analysis Basic Ciphers and Frequency Analysis Assignment 1 Due XXXXXXXXXX In this assignment you will practice enciphering, deciphering, and the cryptanalysis of monoal-...

1 answer below »
This is for Intro to Cryptology class. The assignment must be done with all questions answers. Please make sure its in your own words, no cheating or copying from online. Due Friday: 4/30/21 at 12:00 PM EST.


Basic Ciphers and Frequency Analysis Basic Ciphers and Frequency Analysis Assignment 1 Due 2-15-2021 In this assignment you will practice enciphering, deciphering, and the cryptanalysis of monoal- phabetic substitution ciphers. This assignment, as with all assignments, must be typed, saved as a PDF, and submitted through Blackboard. The general quality of your work and submitting it cor- rectly will be part of the grade, up to 10%. You will be allowed, but not required, to make revisions to your work, just like you might be allowed to make multiple drafts of an essay in a writing class. There will be no tolerance for plagiarism, you are expected to do your own work. If you plagiarize an assignment you will get a 0 on it and will not be allowed to redo it. You will want to use the Analysis and Cipher Utilities in the Appendix to the text (https://sites.wcsu.edu/cryptology). Ciphers The exercises in this section are comparable to those found in chapter 1 section 3 “How Shifty are You.” (https://sites.wcsu.edu/cryptology) 1. Copy and fill in the key for a Keyword Cipher with keyword howdy and key letter m, then use it to encipher the passage below. (Compare to exercise 8 in Sec. 1.3.) plain a b c d e f g h i j k l m CIPHER plain n o p q r s t u v w x y z CIPHER “And above all, watch with glittering eyes the whole world around you because the greatest secrets are always hidden in the most unlikely places. Those who don’t believe in magic will never find it.” — Roald Dahl 1 https://sites.wcsu.edu/cryptology https://sites.wcsu.edu/cryptology 2 Assignment 1 2. Copy and fill in the key for a Shift Cipher with a shift of 7, then use it to encipher the passage below. (Compare to exercise 1 in Sec. 1.3.) plain a b c d e f g h i j k l m CIPHER plain n o p q r s t u v w x y z CIPHER “Three may keep a secret, if two of them are dead.” — Benjamin Franklin, Poor Richard’s Almanack 3. Copy and fill in the key for a Shift Cipher with a shift of 16, then use it to decipher the passage below. (Compare to exercise 5 in Sec. 1.3.) plain a b c d e f g h i j k l m CIPHER plain n o p q r s t u v w x y z CIPHER “YV MU SEKBT HUQT JXU IUSHUJ XYIJEHO EV EKH UDUCYUI, MU IX- EKBT VYDT YD UQSX CQD’I BYVU IEHHEM QDT IKVVUHYDW UDEKWX JE TYIQHC QBB XEIJYBYJO.” - XUDHO MQTIMEHJX BEDWVUBBEM, THYVJMEET” 4. Read up on the Arabic Numerical Ciphers in chapter 1 section 2 and use one to encipher the word “secrets.” (Compare to exercise 2 or 3 in Sec. 1.3.) Basic Ciphers and Frequency Analysis 3 Sample Size In this section you will look at the effect of sample size on the distribution of letters in samples of text. Make a copy of Table 1 and then fill it in by answering the questions below. It will be helpful to use a spreadsheet such as Excel for this section; if you need help with that please ask. Samples Actual 25 50 150 250 1000 2000 5000 Dist. A 8.17% B 1.49% C 2.78% D 4.25% E 12.70% F 2.23% G 2.02% H 6.09% I 6.97% J 0.15% K 0.77% L 4.03% M 2.41% N 6.75% O 7.51% P 1.93% Q 0.10% R 5.99% S 6.33% T 9.06% U 2.76% V 0.98% W 2.36% X 0.15% Y 1.97% Z 0.07% Table 1: Letter Frequencies vs. Sample Size 5. Find a sample of relatively normal English prose that has at least 5000 characters. Copy 5000 characters from your sample, paste those into your assignment, and include a citation for your source. Project Gutenberg (http://www.gutenberg.org/) is a nice source for samples or prose, just try to pick something relatively recent and English. 6. Each column in Table 1 is labeled with a sample size. Take a sample of that size from your sample of 5000 characters. Use the N-Gram Analysis Cell in your text’s appendix to count http://www.gutenberg.org/ 4 Assignment 1 letter frequencies in your sample (https://sites.wcsu.edu/cryptology/sage_analysis_ cells.html). Record the frequencies (percentages) from the output in your copy of the table. 7. For each column, how do the frequencies of letters compare to the actual distribution of charters in English listed in the last column? Are some letters significantly more or less common than should be expected? Did some letters not show up at all? Which sample size seems to have been big enough to give percentages that are all within ±2% of the actual values? Extra Credit: For each percentage in your table calculate the following 2 √ p(1 − p) n , where p is the percentage as a decimal (i.e. 0.12 instead of 12%) and n is the sample size. This value is used to calculate confidence intervals for proportions. For what sample sizes are these values consistently, or mostly, less than or equal to 0.02 (or 2%)? How does this compare to your previous answer? Frequency Analysis The exercises in this section are comparable to those found in chapter 2 section 4 “Bringing it All Together.” (https://sites.wcsu.edu/cryptology) 8. Complete exercises 1 through 4 in chapter 2 section 4 of your text in order to put together a frequency analysis reference page. You should be able to use a lot of the data that you collected for Table 1 as well as the same sample of text. 9. Use the cipher analysis page you made to crack the following message which was enciphered with a key word cipher. A complete solution must include a description of your work, the full plain text message, and the key. ZOIMS YASRW DWRAY SMNWV ZAJWI WDGZO GGZWF LTQAE FFGAA VXADE WGGWD FOSVZ 1 OIMSY OBBEM WVGZW DHEWF JZMRZ YHMVW HFMSO EEXAD TFAXF WRDWG JDMGM SYFGZ 2 WFAEH GMASJ OFWOF LWSAH YZGZW XMDFG TWFFO YWFHQ TMGGW VGATW JOFFA FZADG 3 GZOGM GJOFM TBAFF MQEWX ADTWG AVATA DWGZO SGAFO LJMGZ FATWR ASXMV WSRWG 4 ZOGGZ WFLTQ AEKKK FGAAV XADWO FLAHO DWOJO DWWMF GZWTA FGRAT TASEW GGWDM 5 SGZWW SYEMF ZOEBZ OQWGO SVMGB DWVAT MSOGW FGAFA TODPW VOSWK GWSGG ZOGWI 6 WSMSO FZADG FWSGW SRWAS WJAHE VWKBW RGGAX MSVMG TAFGA XGWSA HGAXX MXGWW 7 SFLTQ AEFMS GZWXM DFGTW FFOYW XAHDJ WDWGZ WFOTW FAMGJ OFDWO FASOQ EWGAF 8 WGGZM FVAJS OFWMG MFGDH WGZOG MSFAT WROFW FGZWX MYHDW JOFQW ODMSY OXEOY 9 OSVMS FATWR OFWFS AGQHG MGJOF BDAQO QEWXD ATGZW JOLMS JZMRZ GZWXE OYFJW 10 DWVMF GDMQH GWVGZ OGGZW LJWDW HFWVG AQDWO PGZWF WSGWS RWHBM SGAJA DVFMO 11 RRWBG WVGZM FOFOZ LBAGZ WFMFO SVSAG WVGZO GWJOF DWBDW FWSGW VQLQH GSAJR 12 OTWGZ WDWOE VMXXM RHEGL AXGZW MSCHM DLGZW ADVWD AXGZW WSYEM FZEWG GWDFO 13 XGWDW MFQLS ATWOS FJWEE TODPW VOSVO SLBDW BASVW DOSRW JZMRZ TOLQW FZAJS 14 https://sites.wcsu.edu/cryptology/sage_analysis_cells.html https://sites.wcsu.edu/cryptology/sage_analysis_cells.html https://sites.wcsu.edu/cryptology Basic Ciphers and Frequency Analysis 5 MSOSO IWDOY WAXOB DMSGW VFZWW GTOLQ WDWIW DFWVM SOFMS YEWFZ ADGFW SGWSR 15 WFBWO PMSYD AHYZE LGOAM SFZDV OSVEO DWGZW SHTWD MROEA DVWDM SJZMR ZEWGG 16 WDFAR RHDQH GGOAO SVMOD WIWDL SWODE LOQDW OFGAX WORZA GZWDO SVMGJ AHEVQ 17 WOSWS VEWFF GOFPG AGDLW ORZRA TQMSO GMASH SGMEO TWOSM SYJOF ODDMI WVOGM 18 GZWDW XADWJ OMGWV XADXD WFZTO GWDMO EMSTL FWRAS VMSGW DIMWJ JMGZT DZMEG 19 ASRHQ MGGZW JOFOQ EWGAY MIWTW GJAAG ZWDFZ ADGFW SGWSR WFOSV ASWTW FFOYW 20 JZMRZ OBBWO DWVFM SRWGZ WDWJO FSAXE OYGAQ WOFMS YEWJA DVZWD WODWG ZWFLT 21 QAEFS AJMSG ZWFMS YEWJA DVMZO IWOED WOVLY AGGZW GJAWF RATMS YFWRA SVOSV 22 XAHDG ZMSOJ ADVAX XMIWE WGGWD FMGTM YZGQW FWIWD ADEWI WDADS WIWDG ZWDWR 23 OSQWS ACHWF GMASG ZOGGZ WEOGG WDOFO DWBEL GAOSO BBWOE MFXOD GZWTA FGBDA 24 QOQEW OSVGZ WRMDR HTFGO SRWFB AMSGW VGAMG FQWMS YODWB ELJDM GGWSQ LGZWE 25 OVLOR RWBGM SYMGO FRADD WRGJW ODWSA JOQEW GAFOL GZOGG ZWFLT QAEFF GOSVD 26 WFBWR GMIWE LXADS IOSVD 27 10. Complete exercise 8 in chapter 2 section 4. Basic Ciphers and Frequency Analysis Polyalphabetic and Transposition Ciphers Assignment 2 Due 3-7-2021 1 Introduction In this assignment you will practice enciphering and deciphering using polyalphabetic and columnar transposition ciphers. The majority of the exercises are similar to questions in Section 3.6: How Mixed Up do You Feel (sites.wcsu.edu/cryptology) in your text. You will want to make use of the cipher utilities in the back of the text, but you should include explanations for how the work is done even if you use technology to do most of the grunt work. 2 Sample Problem Technology is a great time saver. It frees us from tedious grunt work that is time consuming and prone to small errors. But, it is also important to be able to understand, at least on some level, what the technology is doing so that you may better comprehend its limitations as well as the information it is giving you. Suppose that you are given the enciphered message: UIEAO JGWKL IRCAL YSLDB HWQPI SGTBI DVSXB FWLZN ESSM and you are told that it was enciphered using a key word cipher with the key word ZAMBONI and key letter l. If we plug all this into the substitution cipher tool we get: “Grumpy wizards make a toxic brew for the jovial queen.” But, how did this happen? What was the applet doing? We can explain this in a couple steps. First we explain how to set up the key by 1. writing down the plaintext alphabet, 2. write ZAMBONI under this starting at l, and 3. write out the remaining letters of the alphabet. 1 https://sites.wcsu.edu/mbxml/html/poly_exercises.html https://sites.wcsu.edu/mbxml/html/poly_exercises.html https://sites.wcsu.edu/mbxml/html/poly_exercises.html 2 Assignment 2 Plain: l m n o p q r s t u v w x y z a b c d e f g h i j k Cipher: Z A M B O N I C D E F G H J K L P Q R S T U V W X Y Table 1: Key Word Cipher: key=(ZAMBONI,l) Following these directions we get table 1. Then we could explain that using this key table the U in the cipher text is replaced with a plain text g, the I is replaced with r, the E is replaced with u, and so on. Continuing this process we do in fact get the entire message back. In this way we have have demonstrated that we understand the cipher while also letting the program do the tedious grunt work. As you proceed with this assignment keep this example in mind. Use the technology to alleviate tedium, but also explain how things work in your own words so that it is clear you know what is going on. 3 Basic Ciphers 1. Encipher this message using Alberti’s cipher wheel and polyalphabetic cipher, use the index letter &. You may choose the key letters. (compare to #3
Answered 6 days AfterApr 27, 2021

Answer To: Basic Ciphers and Frequency Analysis Basic Ciphers and Frequency Analysis Assignment 1 Due...

Sandeep Kumar answered on May 04 2021
127 Votes
Assignment 1.docx
Assignment 1
1.
        plain
        a
        b
        c
        d
        e
        f
        g
        h
        i
        CIPHER
        L
        M
        N
        P
        Q
        R
        S
        T
        U
        plain
        j
        k
        l
        m
        n
        o
        p
        q
        r
        CIPHER
        V
        X
        Z
        H
        O
        W
        D
        Y
        A
        plain
        s
        t
        u
        v
        w
        x
        y
        z
        
        CIPHER
        B
        C
        E
        F
        G
        I
        J
        K
        
“And above all, watch with glittering eyes the whole world around you because the greatest secrets are always hidden in the most unlikely places. Those who don’t believe in magic will never find it.” — Roald Dahl
“LOP LMWFQ LZZ
GLCNT GUCT SZUCCQAUOS QJQB CTQ GTWZQ GWAZP LAWEOP JWE MQNLEBQ CTQ SAQLCQBC BQNAQCB LAQ LZGLJB TUPPQO UO CTQ HWBC EOZUXQZJ DZLNQB CTWBQ GTW PWOC MQZUQFQ UO HLSUN GUZZ OQFQA RUOP UC” - AWLZP PLTZ
2.
        plain
        a
        b
        c
        d
        e
        f
        g
        h
        i
        CIPHER
        H
        I
        J
        K
        L
        M
        N
        O
        P
        plain
        j
        k
        l
        m
        n
        o
        p
        q
        r
        CIPHER
        Q
        R
        S
        T
        U
        V
        W
        X
        Y
        plain
        s
        t
        u
        v
        w
        x
        y
        z
        
        CIPHER
        Z
        A
        B
        C
        D
        E
        F
        G
        
“Three may keep a secret, if two of them are dead.” — Benjamin Franklin, Poor Richard’s Almanack
“AOYLL THF RLLW H ZLJYLA, PM ADV VM AOLT HYL KLHK.” — ILUQHTPU MYHURSPU, WVVY YPJOHYK’Z HSTHUHJR
3.
        plain
        a
        b
        c
        d
        e
        f
        g
        h
        i
        CIPHER
        K
        L
        M
        N
        O
        P
        Q
        R
        S
        plain
        j
        k
        l
        m
        n
        o
        p
        q
        r
        CIPHER
        T
        U
        V
        W
        X
        Y
        Z
        A
        B
        plain
        s
        t
        u
        v
        w
        x
        y
        z
        
        CIPHER
        C
        D
        E
        F
        G
        H
        I
        J
        
“YV MU SEKBT HUQT JXU IUSHUJ XYIJEHO EV EKH UDUCYUI, MU IXEKBT VYDT YD UQSX CQD’I BYVU IEHHEM QDT IKVVUHYDW UDEKWX JE TYIQHC QBB XEIJYBYJO.” - XUDHO MQTIMEHJX BEDWVUBBEM, THYVJMEET”
If we could read the secret history of our enemies, we should find in each man’s life sorrow and suffering enough to disarm all hostility.” - Henry Wadsworth Longfellow, Driftwood
4.
Secrets – rzpmzwr
5.
One moment he was piloting a fast plane over dangerous green jungles ... and the next Eddie was wide awake and peering through the gloom. Across the room Rags was whining softly and sniffing the damp night air that rolled in through the open window. The Scotty was excited, Eddie saw, and it must be something out of the ordinary for Rags' whimpering carried an undercurrent of perplexity and fear ... and the dog wasn't a coward.
The boy called softly to him, but Rags, after tossing back a swift glance of recognition, put his forefeet up on the sill and peered, muttering, out across the pastures.
Eddie slipped from his bed and padded over to the window. As he comfortingly ruffed the fur behind the Scottie's ears, he listened intently at the night. At first he heard only the ordinary country sounds—roosters crowing over at the next farm, the muffled thumping of stock shifting about in the barn and against the corral fence; the flittering and high chirping of birds in the cottonwoods and pepper trees. He took the dog in his arms and was about to go back to bed with him when he became aware of a sound that was very much out of the ordinary. A sound, Eddie decided, something like standing outside the Baptist church in Riverside when the organist was playing low, vibrant notes inside. Eddie wondered how he could have first missed the sound, so firmly had it now become established. Where could it be coming from? It was, he guessed, about an hour till dawn, and no tractors or other farm machinery should be running. And it wasn't a radio.
A plane?
Leaning from the window he glanced upwards, then gasped in astonishment. Goose pimples of excitement tingled his skin, for there in the sky, above the oak tree on the ridge hung a pattern of sharp white lights. They were little lights, as if someone had strung together a fanciful arrangement of Christmas tree bulbs, then sent them dangling aloft beneath a kite.
Rags' mutterings became deep and angry. Finally he gave vent to a short sharp bark.
Instantly Eddie quieted the dog. Lights or not, his mother had made it plenty clear about Rags' being in the house.
Crouching on the floor, both arms about Rags, Eddie whispered words of reassurance while he stared up at the strange sparklings. The oak tree—the one with his tree house—was a scant quarter mile from where he knelt, and he wondered if its being so high on the ridge had caused it to draw some sort of lightning to itself. He'd read of that happening ... chain lightning. Or was it called Fox Fire? Eddie couldn't remember. Anyway, it looked something like that, he imagined.
But no lightning, he remembered, made a noise like a machine. Unconsciously, he'd hooked sight and sound together.
Frowning, Eddie let go of the dog. If the lights had been over the barn or garage, he'd have gone to tell his father. Or over the garden, his mother. But the tree house didn't concern them. It was his, and even if it hadn't been an hour before dawn he wouldn't have told his parents. He had things in there he shouldn't have, and it wouldn't do for either mother or father to go snooping around, even if they couldn't find his secret ladder and climb it.
He returned to the window.
Something thrashed in the highest branches of the oak. Rags began his whining again.
There was but one thing to do. He found his moccasins by the night table and pulled them on, threw a leather jacket on over his pajamas. From the wall above his desk, Eddie took down his .22, broke it, slipped in a shell, and tiptoed from the house.
The humming was stronger outside. Not louder, exactly, but more easy to feel. He crouched down, the way he'd seen commandos do in pictures, and began to run, holding the rifle at ready before him. And for once, Rags seemed content to stay at his side and not go dashing along ahead up the path. As they took the turn by the big rock...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here