Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Sprint? 2:23 PM 100% Done HW2_Spring2018A 1. Affine encryption: -7,b-9 ANDSOMYDE

ID: 3705113 • Letter: S

Question

Sprint? 2:23 PM 100% Done HW2_Spring2018A 1. Affine encryption: -7,b-9 ANDSOMYDE AATFTENETHINGUNUSUALFORY GOODWHENTHEYHAVESOOFTENBEENTHEAGENTSOFEVILANDITHINKTHA JWE FDPVE?JVHJMFDwHLGJALLWELEQVMTYWNWZMiLEJWXNWZPL.WMD ZDI?HGL.WMGLVO?JAL.FDDSMLwQLLWMGLJZLwMFDSLANUWENMGNwB MGIMNGIALSTISNILEPVKYDPNFLDSZNANW YVDTYWDMLODDB 2. Shift cneryption: Key- I IFYOUUSETHECODEWHICHIHAVEEXPLAINEDSAIDHOLMESYOUWILLFINDT HATITSIMPLYMEANSCOME HEREATONCEIWASCONVINCEDT?LATITWASANI NVITATIONWHICHHEWOULDNOTREFUSESINCEHEOOULDNEVERIMAGINET HATITCOULDCOMEFROMANYONEBUTTHELADY ESLETEDTXAWIXPLYDNZXPSPCPLEZYNPTHLDNZYGTYNPOESLETENLDLY TYGTELETZYHSTNSSPHZFWOYZECPOFDPDTYNPSPNZFWOYPGPCTXLRTYP ESLETENZFWONZXPOCZXLYJZYPMFEESPWLO 3. Hill encryption: matrix-13,0,02. 19,5,0·[O,0,733 THREEFORTYISOURTRAINANDIFANCYWESHOULDBEBACKINBAKERSTREE TFORDINNERTONIGHT FHCMRJONIVYNNMHDONESD Plain text THREEFORTYIS-(19, 7.17,4,4,5,14,17. 19, 24,8, 18) Cipher text FJPMU JaHDUow (5, 9, 15. 12. 20, 9, 16, 7, 3, 20, 14, 22) A. ?19, 7, 17).(4-4, 5).(14, 17, 19 B-05, 9, 15 (12, 20, 9), (16,7. 3% det(A) 17mod26, det(A)-23mod26 CAT-e-9.-6. 12)·(0, 19,-17). (-7, 1, 22]·((17, 20. 12). 10, 19, 9).(19. 25, 22W: A·?17, 0, 19, po, 19, 25). {12.9, 22) A det(A)A1.0, 21) (18, 21, 3). (16, 25, 12) A B ((3,0,0(0.5, 0), (0, 0, TH K 4. Vigenere Key [8,6

Explanation / Answer

1) Affine Cipher

0 1 2 3 4 5 6 7 8 9 10 11 12

A B C D E F G H I J K L M

13 14 15 16 17 18 19 20 21 22 23 24 25

N O P Q R S T U V W X Y Z

ANDSOMYDEARWATSONWEHAVEENDEDBYTURNINGTHEDANCINGMENTOGOODWHENTHEYHAVESOOFTENBEENTHEAGENTSOFEVILANDITHINKTHATIHAVEFULFILLEDMYPROMISEOFGIVINGYOUSOMETHINGUNUSUALFORYOURNOTEBOOK

we want to encrypt above message using an affine cipher with encryption key (7, 9).

i. Using the table, we can represent the letters in our message with their corresponding numbers:

ii. Now we multiply each of the numbers from step i by the first number in the encryption key,

iii. Next, add the second number in the encryption key, (9 in this case), to each of the numbers from

iv. Now use the table to replace the numbers from step iii with their corresponding letters to obtain the

ciphertext:

JWEFDPVELJYHJMFDWHLGJALLWELEQVMTYWNWZMGLEJWXNWZPLWMDZDDEHGLWMGLVGJALFDDSMLWQLLWMGLJZLWMFDSLANIJWENMGNWBMGJMNGJALSTISNIILEPVKYDPNFLDSZNANWZVDTFDPLMGNWZTWTFTJISDYVDTYWDMLQDDB

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote