Question

Computer Security Question about the Caesar Cipher:

Question1 2 pts The following cipher text was produced by the Caesar Cipher: The Caesar cipher cryptanalysis technique from lecture calculates the most likely keys. When the technique is applied in this case, which of the following best explains the results? o The actual key is not one of three most likely keys because word 4 does not match typical character frequencies The actual key is one the three most likely keys. o The actual key is not one of three most likely keys because word 3 is is too short for the method to work. The actual key is not one of three most likely keys because word 2 is too complex The actual key is not one of three most likely keys because word 1 is not a common word.

I also don't know this part of the problem

Question 2 2 pts The following cipher text was produced by the Caesar Cipher: Using the Caesar cipher cryptanalysis technique from lecture to find the three most likely keys: The most likely key is The second most likely key is The third most likely key is * Enter the lower case letter.

Hello I am not sure how to figure this out

Question 3 2 pts The following cipher text was produced by the Caesar Cipher: The plaintext is: All letters are lower case letters (e.g. a, not A)

Hello so for question 3, I think its +23 "the password is qqzzqqz"

Brute-Force: all shifts are tested, text is limited to the first 250 characters. To keep punctuation and space, please indicate the correct shift found (+XX) +1 PDALWOOSKNZEOMMVVMMV +2 OCZKVNNRJMYDNLLUULLU +3 NBYJUMMQILXCMKKTTKKT +4 MAXITLLPHKWBLJJSSJJS +5 LZWHSKKOGJVAKIIRRIIR +6 KYVGRJJNFIUZJHHQQHHQ +7 JXUFQIIMEHTYIGGPPGGP +8 IWTEPHHLDGSXHFFOOFFO +9 HVSDOGGKCFRWGEENNEEN +10 GURCNFFJBEQVFDDMMDDM +11 FTQBMEEIADPUECCLLCCL +12 ESPALDDHZCOTDBBKKBBK +13 DROZKCCGYBNSCAAJJAAJ +14 CQNYJBBFXAMRBZZIIZZI +15 BPMXIAAEWZLQAYYHHYYH +16 AOLWHZZDVYKPZXXGGXXG +17 ZNKVGYYCUXJOYWWFFWWF +18 YMJUFXXBTWINXVVEEVVE +19 XLITEWWASVHMWUUDDUUD +20 WKHSDVVZRUGLVTTCCTTC +21 VJGRCUUYQTFKUSSBBSSB +22 UIFQBTTXPSEJTRRAARRA +23 THEPASSWORDiSQQZZQQZ +24 SGDOZRRVNQCHRPPYYPPY +25 RFCNYQQUMPBGQOOXxoox #25

choose the correct multiple choice

0 0
Add a comment Improve this question Transcribed image text
Answer #1

q1)

Option a)

The actual key is not one of the most likely keys becuase word 4 doesnt match typical character frequencies of a english word.

q2)

The most frequent characters in english are 'e' , 't' , 'a'.

Most frequent character in given text is 'n'

So according to frequency analysis attack  keys would be 'n'-'e' , 'n'-'t', 'n'-'a' , if result is negative we need to convert it into positive results by modulo 26

So keys would be

9

20

13

q3)

The PlainText is : the password is qqzzqqz

Add a comment
Know the answer?
Add Answer to:
Computer Security Question about the Caesar Cipher: I also don't know this part of the problem...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or...

    In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. Given an arbitrary cipher text file, you need to write a C++ program to find out the value of the shift, and decrypt the...

  • using the website repl.it (must be done in Javascript) PGM #1 Write a Java program that can perform the Caesar cipher fo...

    using the website repl.it (must be done in Javascript) PGM #1 Write a Java program that can perform the Caesar cipher for English messages that include both upper and lowercase alphabetic characters. The Caesar cipher replaces each plaintext letter with a different one, by a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of three, so that (for example) each occurrence of E in the plaintext becomes B in the ciphertext. For example...

  • Some cryptography and a little computer security. You find an odd DeLorean parked around the corner....

    Some cryptography and a little computer security. You find an odd DeLorean parked around the corner. Realizing that Doc Brown has left the keys in the ignition, you decide that a quick trip back to Rome in 40 BC is in order. A few mint condition coins, and possibly a picture of Vincengetorix will be highly remunerative. As usual, the car fails and you are stranded. All is not lost, Julius Caesar recruits you for his secret service as a...

  • Question 7 12.5 pts Recall that book ciphers do not necessarily require a full book to...

    Question 7 12.5 pts Recall that book ciphers do not necessarily require a full book to decode, but instead any written text, such as the Declaration of Independence. For the example discussed in class (the second Beale cipher), we created the key by numbering words and taking the first letter. But we can also number characters themselves instead, making sure to skip spaces. The following is a message encrypted with a book cipher, using the text of this question as...

  • Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more...

    Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more difficult process. Indeed, the purpose of encryption is to make it as difficult as possible for anyone who does not know the key to read the plain text. We will be using an unsophisticated password cracking technique called a brute force attack. A brute force attack on the APCO cipher works by trying every possible four digit key (from 0000 to 9999) and keeping...

  • Computer Science C++ Help, here's the question that needs to be answered (TASK D): Task D....

    Computer Science C++ Help, here's the question that needs to be answered (TASK D): Task D. Decryption Implement two decryption functions corresponding to the above ciphers. When decrypting ciphertext, ensure that the produced decrypted string is equal to the original plaintext: decryptCaesar(ciphertext, rshift) == plaintext decryptVigenere(ciphertext, keyword) == plaintext Write a program decryption.cpp that uses the above functions to demonstrate encryption and decryption for both ciphers. It should first ask the user to input plaintext, then ask for a right...

  • C Program In this assignment you'll write a program that encrypts the alphabetic letters in a...

    C Program In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Vigenère cipher. Your program will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The program must generate output to the console (terminal) screen as specified below. Command Line Parameters Your program must compile and run from the command line. The program executable must be named “vigenere” (all lower...

  • Please help me write this Java program. I had posted this question before, but got an...

    Please help me write this Java program. I had posted this question before, but got an answer that was totally wrong. We are using the latest version of Java8. Thank You! -------------------------------------------------------------------------------------- Write a Java program that can successfully DECRYPT a string inputted by the user which has been encrypted using a Caesar Cipher with a unknown shift value(key). You can use brute force to do a for loop through all the 26 shift values, however, your program should only...

  • Help write down below program with C++ language!!! Please... The Cipher Program Requirements An interactive program...

    Help write down below program with C++ language!!! Please... The Cipher Program Requirements An interactive program is required that allows a user to encode text using any of three possible ciphers. The three ciphers you are to offer are: Caesar, Playfair and Columnar Transposition. • The program needs to loop, repeating to ask the user if they wish to play with Caesar, Playfair or Columnar Transposition until the user wishes to stop the program. •For encoding, the program needs to...

  • JAVA PROJECT Part 1 - Normalize Text The first thing we will do is normalize the...

    JAVA PROJECT Part 1 - Normalize Text The first thing we will do is normalize the input message so that it’s easier to work with. Write a method called normalizeText which does the following: Removes all the spaces from your text Remove any punctuation (. , : ; ’ ” ! ? ( ) ) Turn all lower-case letters into upper-case letters Return the result. The call normalizeText(“This is some \“really\” great. (Text)!?”) should return “THISISSOMEREALLYGREATTEXT” Part 2 - Obfuscation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT