Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

53) Ceasar Cipher is one of the earliest classical substitution ciphers. It invo

ID: 3746645 • Letter: 5

Question

53) Ceasar Cipher is one of the earliest classical substitution ciphers. It involves replacing each letter in the plaintext by a shifted 1) letter in the alphabet used.

Mathematically it can be expressed as follows:
c = E(p) = (p + k) mod (26)
p = D(c) = (c – k) mod (26)
where p and c refer to the plaintext and ciphertext, respectively; E(p) and D(C) are the encryption and decryption functions, respectively; and k is the secret key.
a) Show the encryption and decryption processes of the plaintext “Attack at dawn” using a key value of 4;
b) Explain how a brute force attack can break this simple cryptosystem;
c) Use a brute force attack to decrypt (decipher) the following message “TEBKFKQEBZLROPBLCERJXKBSBKQP”.

What is the original plaintext and the encryption key used?

Explanation / Answer

In a Ceaser substitution cipher each letter of a given text is replaced by a letter some fixed number of positions down the alphabet.

a)

A substitution cipher works like this, you start with the alphabet on one line and then add a second line with the alphabet shifted along a bit.

a

b

c

d

e

f

g

h

i

j

k

l

m

n

o

p

q

r

s

t

u

v

w

x

y

z

e

f

g

h

i

j

k

l

m

n

o

p

q

r

s

t

u

v

w

x

y

z

a

b

c

d

In this case key is 4, because the second line alphabets are shifted a position of 4 to the right.

Now if we want to encrypt the word “attack at dawn” then you take the first letter ‘a’, and look at the letter below it, that gives us ‘e’. Then‘t’ gives ‘x’ and so on.

Hence the encrypted form of ‘attack at dawn’ is ‘exxego ex hear’.

To decrypt ‘exxego ex hear we look up ‘e’ on the bottom row and see ‘a’ above, then the ‘x’ on the bottom to get the ‘t’ above it and so on. Complete this process and we get ‘attack at dawn’.

b)

In a brute force attack, 2.an attacker knows that a Caesar cipher text, but does not know the shift value. Here breaking the scheme is straightforward. Since there are only a limited number of possible shifts (26 in English), they can each be tested in turn in a brute force attack.One way to do this is to write out a snippet of the ciphertext in a table of all possible shifts.

Example

The example given is for the ciphertext "EXXEGOEXSRGI"; the plaintext is recognizable by at a shift of four.

Decryption
shift

Candidate plaintext

0

exxegoexsrgi

1

dwwdfndwrqfh

2

cvvcemcvqpeg

3

buubdlbupodf

4

attackatonce

5

zsszbjzsnmbd

6

yrryaiyrmlac

...

23

haahjrhavujl

24

gzzgiqgzutik

25

fyyfhpfytshj

c)

For each shift the substitution letters are as follws

0

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

1

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

2

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

3

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

Here the cipher text is “TEBKFKQEBZLROPBLCERJXKBSBKQP”

Now, using this table to find the correspondences for each letter of the ciphertext with the plaintext we can decipher the message. For example T in the ciphertext is q in plaintext. By doing the same with each letter we have:

TEBKFKQEBZLROPBLCERJXKBSBKQP

wheninthecourseofhumanevents

0

T

E

B

K

F

K

Q

E

B

Z

L

R

O

P

B

L

C

E

R

J

X

K

B

S

B

K

Q

P

1

U

F

C

L

G

L

R

F

C

A

M

S

P

Q

C

M

D

F

S

K

Y

L

C

T

C

L

R

Q

2

V

G

D

M

H

M

S

G

D

B

N

T

Q

R

D

N

E

G

T

L

Z

M

D

U

D

M

S

R

3

W

H

E

N

I

N

T

H

E

C

O

U

R

S

E

O

F

H

U

M

A

N

E

V

E

N

T

S

Inserting spaces in all the appropriate places we have the final plaintext “When in the course of human events”

a

b

c

d

e

f

g

h

i

j

k

l

m

n

o

p

q

r

s

t

u

v

w

x

y

z

e

f

g

h

i

j

k

l

m

n

o

p

q

r

s

t

u

v

w

x

y

z

a

b

c

d

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote