Cryptography and Data Protection A - a sleeper behind enemy lines found this message. It is believed that it uses straight letter substitution. Decrypt this message. y txoffo qxxofyqnco to tho fxqf of...

1 answer below »

Cryptography and Data Protection



A - a
sleeper

behind enemy lines found this message. It is believed that it



uses straight letter substitution. Decrypt this message.


y txoffo qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho totqbxyc fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf jqstyco fot qxx. y txoffo of qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho totqbxyc fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf jqstyco fot qxx.


Document Preview:

Cryptography and Data Protection A - a sleeper behind enemy lines found this message. It is believed that it uses straight letter substitution. Decrypt this message. y txoffo qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho totqbxyc fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf jqstyco fot qxx. y txoffo of qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho totqbxyc fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf jqstyco fot qxx. Note: It is a straight letter substitution. However, depending on the case (upper or lower) there might be a different substitution. B - Diffie-Hellman Key Generation 1. Paul and Linda are far away and want using the D-H method, to come up with a secret number. 2. Their communications are public. 3. In a public communication they agreed to work with numbers, g=10 and p=17. 4. They parted Paul went to Paris and Linda went to Lasa. 5. Paul selects his private number to be 5. 6. Linda selects her private number to be 7. Determine the derived secret number. C - The following enemy message was intercepted. It must be relayed, but modified to mislead. The message is accompanied by a "signature" made of the indicated letters. Which is BTATP. Create a misleading message that produces the same "signature". 123456789101112131415161718192021222324BRINGTHEWEAPONSTOAIRPORTB    T    A    T    P    D - An encryption algorithm works as follows: 1. It takes a numerical message and cuts it down to ten digit words. 2. The encrypted word has the same number of digits. 3. The first five digits of the encrypted word are the integral part of the square root (base 10) of the number represented by the word. 4. The last five digits of the encrypted word are the remainder the square root operation. B. Decrypt the following encrypted message A. Encrypt the following plain...



Answered Same DayDec 21, 2021

Answer To: Cryptography and Data Protection A - a sleeper behind enemy lines found this message. It is believed...

David answered on Dec 21 2021
125 Votes
Cryptography and Data Protection

A - a sleeper behind enemy lines found this message. It is believed that it
uses st
raight letter substitution. Decrypt this message.

y txoffo qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho totqbxyc
fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf jqstyco fot
qxx. y txoffo of qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho
totqbxyc fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf
jqstyco fot qxx.

Note: It is a straight letter substitution. However, depending on the case (upper
or lower) there might be a different substitution.

Solution:
Single letter frequency:
Dual letter frequency:
Tri Letter frequency:
AFTER REPLACING FEW LETERS IT COMES TO THE SENSE THAT LOTS OF WORDS ARE RANDOMLY
REPLACED:
First replacement combination:
I tHEDDE AHHEDIAVcE tE thE DHAD ED thE AVItED ttAtEs ED AmEtIcA AVD tE thE tEtAbHIc DEt
zhIch It stAVDs, EVE VAtIEV AVDEt DED, IVDIvIsIbHE, zIth HIbEttI AVD jAstIcE DEt AHH. I tHEDDE
ED AHHEDIAVcE tE thE DHAD ED thE AVItED ttAtEs ED AmEtIcA AVD tE thE tEtAbHIc DEt zhIch It
stAVDs, EVE VAtIEV AVDEt DED, IVDIvIsIbHE, zIth HIbEttI AVD jAstIcE DEt...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here