Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment-

Introduction

If you're a fan of puzzles (or even if you're not), this should be a fun assignment!

One of the textbooks on Computer Security contains two ciphers:

1. On the page immediately following the title page, there is the following ciphertext:

Ju pxey, mru bvha uxc tuo bavnfnpqxw.

2. One of the exercises in the textbook contains the following ciphertext:

"Tb vla ulm'e zmlf fgiyi vla'yi kltmk, egi hrn flm'e gipn".

These ciphers are simple substitution ciphers of the type that many people like to amuse themselves trying to solve. Newspapers often publish a daily cryptopuzzle (along the lines of a daily crossword puzzle) which readers try to solve -- often during their daily commutes.

The Assignment-1

The assignment is twofold:

Read Edgar Allan Poe's The Gold Bug [1], and Sir Arthur Conan Doyle's The Adventure of the Dancing Men (see References below).

Note: Those of you who are not native speakers of English may have some trouble reading parts of these stories, because they use archaic English words (I had to look several words up myself), and attempt to represent characters' accents and dialects (in particular, the freed slave in The Gold Bug has a strong Southern black accent). You may have to ask a native English speaker to "translate" for you. If you can't understand something, please just send me an email and I'll try to make sense of it for you. Remember, for the purposes of this assignment, not all aspects of the stories are germane.

Solve the above two ciphers - that is, determine the English cleartext from which the ciphertext was derived.

Ju pxey, mru bvha uxc tuo bavnfnpqxw

"Tb vla ulm'e zmlf fgiyi vla'yi kltmk, egi hrn flm'e gipn"

There are many resources you can use to accomplish the above, including (in no particular order):

Your own brain, with paper and pencil.

In particular, think about what you know about each cipher, in its own context. You can infer an amazing amount of information, based on intelligent guesswork, and knowledge of, say, the typical form you would expect for the plaintext version, based on what function it is performing, in its own context.

Also, you can look at the grouping of the letters and infer which words are likely to be verbs, or nouns, or whatever. In the case of 2- or 3-letter words, you can probably make a few guesses, so see whether you can make further progress based on those guesses. What word(s) might start the sentence or phrase, given its context?

Punctuation can often be a dead giveaway, and lead to interesting insights.

Collaboration with others, to share ideas, and divide up the work. Don't forget to give credit where it's due!

Once you've tried the above (please try it first, and spend some time on it), you can resort to other methods:

Various deciphering tools and programs available from many sources, including the World-Wide Web. This course web site has some Java applets which may help.

Various accounts of deciphering methods and techniques. This also includes short stories such as ones referred to above.

What to Submit in your Homework-1 Report:

I am more interested in how you solved the ciphers than the actual answers (which I already know). Please submit a description of what you did, which should include:

Who you worked with, and specifically how you divided up the work of deciphering the ciphertexts (who did what; how much of that work was done by whom).

What plan of attack you used. This may actually be more than one plan of attack, if one or more plans failed to produce results. I want to hear about all the unsuccessful attempts as well as the successful one(s) - this is often more illuminating than just discussing the successful approaches. (You learn a lot more from your mistakes than from your successes!)

What assumptions you made; what deductions you made, etc.

What are the English cleartexts from which these two ciphertexts were derived?

How long it took you to solve each of the puzzles.

Edgar Allan Poe's The Gold Bug shows an example of an explanation of how one of the characters solved his cipher. Have your explanation be of a similar nature, so that I can understand how you went about solving the problems.

REFERENCES

Here are some classic short stories by authors who have written about cryptography:

HYPERLINK "http://www.online-literature.com/poe/32/" \t "_blank" The Gold Bug, by Edgar Allen Poe. Retrieved from HYPERLINK "http://www.online-literature.com/poe/32/" http://www.online-literature.com/poe/32/ (For another copy of the text with an annotated vocabulary see HYPERLINK "http://poestories.com/text.php?file=goldbug" \t "_blank" here: HYPERLINK "http://poestories.com/text.php?file=goldbug" http://poestories.com/text.php?file=goldbug) (Also see HYPERLINK "http://en.wikipedia.org/wiki/The_Gold_Bug" \t "_blank" here: HYPERLINK "http://en.wikipedia.org/wiki/The_Gold_Bug" http://en.wikipedia.org/wiki/The_Gold_Bug)

HYPERLINK "http://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men" \t "_blank" The Adventure of the Dancing Men, by Sir Arthur Conan Doyle, Retrieved from HYPERLINK "http://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men" http://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men (A Sherlock Holmes story)__* The assignment idea was offered originally by Dr. Bryan J. Higgs.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91964180

Have any Question?


Related Questions in Computer Engineering

What are the minimum and maximum values in decimal if an

What are the minimum and maximum values (in decimal) if an 8-bit binary number is given unsigned and two's complement formats?

Calculate the probability of selecting a random sample of

Calculate the probability of selecting a random sample of 225 observations with a sample proportion of 0.54 or greater, if the sample population has a population proportion of 0.50.

Question what are some of the specifics of a dbms that must

Question : What are some of the specifics of a DBMS that must be taken into consideration when building a database design? The response must be typed, single spaced, must be in times new roman font (size 12) and must fol ...

I suppose alice wants to send a long message m to bob if

(i) Suppose Alice wants to send a long message m to Bob. If Alice and Bob already share a secret key k, and they use HMAC to protect the integrity of the message m, what should the message format be (or what components s ...

Suppose you want to back up a huge file to a cd-r you can

Suppose you want to back up a huge file to a CD-R. You can do this by splitting the file into smaller pieces and backup up those pieces separately. Write a utility program named FileSplitter that splits a large file into ...

Review questionsrq web server environment kroenke book chap

Review Questions(RQ) Web Server Environment Kroenke Book Chap 11 The Review Questions (RQ) listed below can also be found in the Kroenke textbook, starting on page 526. This is NOT the entire list of Review Questions, bu ...

Annual demand and supply for the mylan company is given

Annual demand and supply for the Mylan company is given by: QD = 5,000 + 0.5 I + 0.2 A - 100P, and QS = -5000 + 100P where Q is the quantity per year, P is price, I is income per household, and A is advertising expenditu ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

Question 1 select a specific activity or responsibility of

Question: 1. Select a specific activity or responsibility of the systems analyst. Define the purpose of the systems analyst and why it is important in the overall systems analysis process. Write this post to an audience ...

Suppose we have a collection of n different subsets of the

Suppose we have a collection of n different subsets of the set { 1, 2, ..., n } and they are in some arbitrary order, that is, we have subsets S1, S2, ..., Sn, but how many and which elements are in each of these subsets ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As