Question

7. The cryptogram UIF RVJDL CSPXO GPY KVNQT PWFS UIF HBUF was obtained by enciphering THE...

7. The cryptogram UIF RVJDL CSPXO GPY KVNQT PWFS UIF HBUF was obtained by enciphering THE QUICK BROWN FOX JUMPS OVER THE GATE using a Simple Substitution Cipher. How much of the key is determined by the information given? How many possible keys are there?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The cryptogram UIF RVJDL CSPXO GPY KVNQT PWFS UIF HBUF was obtained by enciphering THE QUICK BROWN FOX JUMPS OVER THE GATE using a Simple Substitution Cipher. How much of the key is determined by the information given? How many possible keys are there?

Plain Text: THE QUICK BROWN FOX JUMPS OVER THE GATE

Cipher Text: UIF RVJDL CSPXO GPY KVNQT PWFS UIF HBUF

Let us see in the Detail:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

if K=1

B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

Cipher Text = (Plain Text+Key)%26 By using the Substitution

Plain Text: THE QUICK BROWN FOX JUMPS OVER THE GATE


T H E    Q U I C K    B R O W N    F O X    J U M P S    O V E R    T H E    G A T E   
20 8 5 17 21 9 3 11 2 18 15 23 14 6 15 24 10 21 13 16 19 15 22 5 18 20 8 5 7 1 20 5
U I F R V J D L C S P X O G P Y K V N Q T P W F S U I F H B U F

CIPHER TEXT:(Encrypted Text)

U I F    R V J D L    C S P X O    G P Y    K V N Q T    P W F S    U I F    H B U F   

UIF RVJDL CSPXO GPY KVNQT PWFS UIF HBUF

How much of the key is determined by the information given?

Answer: Key =1

How many possible keys are there?

There are 26 possible keys are available in the substitution cipher.

Add a comment
Know the answer?
Add Answer to:
7. The cryptogram UIF RVJDL CSPXO GPY KVNQT PWFS UIF HBUF was obtained by enciphering THE...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Simple Python Program Working with strings Write a Python program to read in a number of...

    Simple Python Program Working with strings Write a Python program to read in a number of strings from the user. Stop when the user enters “Done”. Then check if each of the strings contains all the letters of the alphabet. Print the results in the form of a dictionary, where they keys are the strings and the values are the Truth Value for the string, which you just calculated. Sample Run: Enter the strings: taco cat The quick brown fox...

  • Using the website Repl.it Write a Java program that can perform the Caesar cipher for English...

    Using the website Repl.it Write a Java program that can perform the Caesar cipher for English messages that include both upper and lowercase alphabetic characters. The Caesar cipher replaces each plaintext letter with a different one, by a fixed number of places down the alphabet. The program should be able to shift a specific number of places based on the user's input number. For example Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG. Ciphertext: QEBNRFZH YOLTK CLU GRJMP...

  • using the website repl.it (must be done in Javascript) PGM #1 Write a Java program that can perform the Caesar cipher fo...

    using the website repl.it (must be done in Javascript) PGM #1 Write a Java program that can perform the Caesar cipher for English messages that include both upper and lowercase alphabetic characters. The Caesar cipher replaces each plaintext letter with a different one, by a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of three, so that (for example) each occurrence of E in the plaintext becomes B in the ciphertext. For example...

  • Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more...

    Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more difficult process. Indeed, the purpose of encryption is to make it as difficult as possible for anyone who does not know the key to read the plain text. We will be using an unsophisticated password cracking technique called a brute force attack. A brute force attack on the APCO cipher works by trying every possible four digit key (from 0000 to 9999) and keeping...

  • MAKE SURE OUTPUT 4 IS CORRECT - Python PROBLEM: A useful computer utility is to report...

    MAKE SURE OUTPUT 4 IS CORRECT - Python PROBLEM: A useful computer utility is to report the differences between two files. In this program, you will compare two strings to find common strings. For this program, a string consists of "words"; words are letters which are separated by a single space. The following algorithm will be used first: Consider each word in turn from left to right in the first string. If that word appears as a word or part...

  • Some cryptography and a little computer security. You find an odd DeLorean parked around the corner....

    Some cryptography and a little computer security. You find an odd DeLorean parked around the corner. Realizing that Doc Brown has left the keys in the ignition, you decide that a quick trip back to Rome in 40 BC is in order. A few mint condition coins, and possibly a picture of Vincengetorix will be highly remunerative. As usual, the car fails and you are stranded. All is not lost, Julius Caesar recruits you for his secret service as a...

  • Exercise: Execute the next cell to produce a message encrypted using the Hill cipher method [4]: ...

    Hill cypher Exercise: Execute the next cell to produce a message encrypted using the Hill cipher method [4]: cipher make_cipher cipher out [4]: 129, 41, 42, 75, 94, 103, 34, 43, 48, 44, 44, 64, 18, 23, 23, 80, 95, 116, 48, 48, 63, 46, 46, 66, 78, 87, 108, 61, 77, 85, 54, 66, 81, 70, 75·94, 58, 72, 87, 34, 50, 51, 86, 106, 120, 79,97, 116 58, 67, 83 The message starts with the word "CLASSIFIED use...

  • Outside a home, there is a 7-key keypad numbered 1 through 7. The correct five-digit code...

    Outside a home, there is a 7-key keypad numbered 1 through 7. The correct five-digit code will open the garage door. The numbers can be repeated in the code (a) How many codes are possible? (b) What is the probability of entering the correct code on the first try, assuming that the owner doesn't remember the code? (a) The number of possible codes is Type an integer or fraction. Simplify your answer.) (b) The probability that the correct code is...

  • just put circle around the correct answer Chapter 3 Introduction to Logic Gates Questions 1. How...

    just put circle around the correct answer Chapter 3 Introduction to Logic Gates Questions 1. How many 2-input AND gate required to construct a 5-input AND gate? a) 2 b) 3 d) 4 c) 5 e) noпe Which is better for a 4-input OR gate. The connection of A or B, Fig(13), why? 2. a) A b) B 3. If only 2-input OR gates are available, what is minimum gate level possible to implement an 8-input OR gate 2 a)...

  • Please explain answer with as much detail as possible. Exercise 7. Given n 2 1 andr22,...

    Please explain answer with as much detail as possible. Exercise 7. Given n 2 1 andr22, how many multinomial coefficient symbols are there of the form n, " )? What if we require each ni 2 1? OTm

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT