BACKGROUND INFORMATION: A cryptosystem is a system for encryption and decryption
ID: 3774981 • Letter: B
Question
BACKGROUND INFORMATION: A cryptosystem is a system for encryption and decryption. Encryption, also called encoding or enciphering, involves changing the original message into a secret message, while decryption, also called decoding or deciphering, involves just the opposite changing the secret message back into its original readable form. In cryptography, a plaintext file is a file containing data in its original, or readable, form while a ciphertext file is a file containing data in coded, or scrambled, form In this assignment, you will be creating a polyalphabetic cipher based on substitution using multiple substitution alphabets In this cipher, instead of a single key, multiple one-letter keys are used to encrypt the original message by shifting the original letter to a new, encrypted letter corresponding to the key For example, consider the following modified case from Wikipedia where the plaintext to be encrypted is: ATTACK AT DAWN. Then, the person sending the message chooses a keyword and repeats it until it matches the length of the plaintext so that the key LEMON becomes LEMONL EM ONLE (accounting for the spaces in the plaintext message which are not encrypted or decrypted). Then, the first letter of the plaintext, A, is paired with L, the first letter of the key. Assuming the shift starts with A etc., we find that s 11, so the plaintext A shifts" 11 places in the alphabet to ciphertext L. The second letter of the plaintext. T, gets paired with E, the second letter of the key, so it shifts 4 (the shift value of E) places in the alphabet to ciphertext X. However, note that the third letter of the plaintext, T, gets mapped to a different ciphertext because It is paired with M, the third letter of the key. Of interest, is that this ciphertext wraps around to F based on shifting 12 places in the alphabet. The rest of the plaintext is enciphered in a similar fashion: Plaintext ATTACK AT DAWN LEMONT, EM ONTE Key Ciphertext LXFOPV EF RNHR Note that since white space (or any unsupported character) is not encrypted or decrypted, the key should not be used (or incremented) so that the blank space does not take up a letter in the key. Mathematically, each letter of the plaintext and key can be given a number and a formula can be derived to encrypt for c (i.e., ciphertext) and m i.e., plaintext) using k (i.e., key) as follows (m k) 26 (26 c k) 26 Note that formula assumes A is 0, B s 1, and so forth with nothing to distinguish between uppercase A and lowercase a. Since you will most likely be using the character ASCII values, you will have to modify these formulas to fit your needs, but this should give you a place to startExplanation / Answer
transform the logical E-R diagram of discern 1 right into a bodily E-R diagram. The sizes of the attributes of each desk and the expected initial document counts in line with table are shown in table 1. perform a volumetrics analysis for the database. count on that the DBMS so one can be used to put in force the device requires 30% overhead to be factored into the estimates. also, count on a growth price of 10% for the database according to yr.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.