Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: November 9th, 2021

The Caesar Cipher To Decipher Codes English Language Essay

Study Bay Coursework Assignment Writing Help

Description:

The technique that I used to decipher this message is Caesar cipher. First, I attempted by minus the alphabet by 1. However I couldn’t get the reply. Then I attempt to minus the alphabet one after the other till 7 after which I bought the reply, I conclude that each letter on this message subtract by 7 is the reply.

The desk used to decipher this message is present as beneath:

Cipher Textual content

A

B

C

D

E

F

G

H

I

J

Ok

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

Plain Textual content

t

u

v

w

x

y

z

a

b

c

d

e

F

g

h

i

j

okay

l

m

n

o

p

q

r

s

2.

EDHBPVMVPUVOPAFVOEAMHDYHRVFHBOYHRPKANQKPOPKBPXVQKPYHMHDKBMHCHHYSBDPAIUANCHIADH

Plain Textual content:

creativityistodiscovernewideasnewthoughtsthatmightneverhavebeenpartofyoubefore

(creativity is to find new concepts new ideas which may by no means have been a part of you earlier than)

Description:

First, I attempted to decrypt this message with Caesar Cipher. I attempted to shift all of the letters on this message for 25 occasions however I couldn’t decipher this message.

So I attempted to decipher this Question Assignment with mono-alphabetic substitution technique. I attempted to unravel it by software program known as “Secret Code Breaker Monoalphabetic Substitution Solver” and I bought a English sentence which is readable once I add areas to separate every phrase on this message.

The idea utilized by this software program to unravel the cipher textual content is by evaluating the phrases within the cipher textual content with the English dictionary database.

The reply key given by this system to unravel this Question Assignment is beneath:

Cipher Textual content

A

B

C

D

E

F

G

H

I

J

Ok

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

Plain Textual content

o

a

b

r

c

d

l

e

f

okay

h

z

v

u

s

t

g

w

p

q

y

i

j

m

n

s

The snapshot of this system:

three.

HELMADINEARTHOTSUCIUDOTYR

Plain Textual content :

four.

LKHYVLHYPPALGBOGLVOGLGOGLPKGPEANJFANPOGLGYDOGLPKGPVHM

HBOGLYALVUDANQAPALGBOGLGYFOHHGOGLPKGPEANJFANPOGLPKHO

GLVOGLVFJVWHPAOHHDANBOGLOGL

Plain Textual content :

5.

DQPTAZJWB ZKFQGM NZJYY GQDCN

Plain Textual content:

couldhant hefori shapp rocks

so I Assessment

computing principle nonetheless rocks

6.

Plain textual content:

A PIGPEN GOES OINK WHEN IT WRITES

Decription:

The technique that I used to decipher this message is through the use of pigpen cipher.

First, I do the analysis on what are the varieties of cipher textual content obtainable and discovered this cipher textual content is pigpen cipher on the following web site.

http://en.wikipedia.org/wiki/Substitution_cipher

http://add.wikimedia.org/wikipedia/commons/thumb/three/36/Pigpen_cipher_key.svg/220px-Pigpen_cipher_key.svg.png

After figuring out what sort of cipher textual content used on this Question Assignment, I used the diagram above to decipher every letter on this message and bought the reply.

Question Assignment 2:

a) What number of doable mono-alphabetic ciphers are there? Present your reasoning.

Reply:

Mono-alphabetic cipher implies that there are not any two letters that are encoded to the identical letter and every letter can’t be encoded as itself.

Since there are 26 alphabets, so the primary alphabets may have 25 doable alphabets to get replaced. After that, the following alphabets may have 24 doable alphabets to get replaced. The vary of doable alphabet is reduces accordingly. So the variety of doable cipher are N(N-1)(N-2)….2*1 the place N = 25 or 25! .

25!

= 25 x 24 x 23 X 22 x 21 x 20 x 19 x 18 x 17 x 16 x 15 x 14 x 13 x 12 x 11 x 10 x 9 x eight x 7 x 6 x 5 x four x three x 2 x 1

= 1.551121004 x 1025

Subsequently, there are roughly 1.551121004 x 1025 doable mono-alphabetic ciphers there.

b) Assuming that it’s doable to check 1 billion doable ciphers per second, calculate how lengthy it could take check all doable mono-alphabetic ciphers.

Reply:

25! / (1 x 109)

= 1.551121004 x 1016 seconds

(1.551121004 x 1016 ) / (60x60x24x365) = four.91857243 x 108 years

Subsequently, it could take roughly four.91857243 x 108 years to check all doable mono-alphabetic ciphers.

c) Discover that there are solely 14 totally different letters within the encrypted message. What number of doable decryptions there are of this message? (Trace: As ‘J’ doesn’t seem within the ciphertext, it doesn’t matter what letter it’s encrypted from).

Reply:

Since there are 14 letters within the message, so the variety of doable letters for the primary letter to get replaced is 25. Then the variety of doable letters for second letters is 24 letters and so forth till it reaches the 14th letter.

25 x 24 x 23 X 22 x 21 x 20 x 19 x 18 x 17 x 16 x 15 x 14 x 13 x 12

= three.885885152 x 1017

So there are roughly three.885885152 x 1017 totally different ciphers.

d) Assuming, as earlier than, than you possibly can check 1 billion doable codes per second, calculate how lengthy it could take to check all doable decryptions of this message.

Reply:

three.885885152 x 1017 / (1x 109)

= three.885885152 x 108 seconds

(three.885885152 x 108) / (60 x 60 x 24 x 365)

= 12.32206 years

Subsequently, it could takes roughly 12.32206 years to check all doable decryptions of this message.

e) What number of doable decryptions of this message are there if you’re informed the

following partially full desk?

Reply:

Since 5 letters is already identified, so the remaining variety of doable decryption for the sixth letter is 20, seventh letters is 19 and so forth till 14th which is 7.

20 x 19 x 18 x 17 x 16 x 15 x 14 x 13 x 12 x 11 x 10 x 9 x eight x 7

= three.379030567 x 1015

f) In case you are informed that the message in all probability comprises the identify of an Australian metropolis and a college, how rather more of the desk are you able to full? Are you able to fully decipher the message? Why or why not? Clarify your reply.

Reply:

There are 5 letters which have already given as beneath:

Encrypted letter

X

F

Y

Z

W

Plaintext letter

M

E

L

B

I

From the desk above, probably the identify of an Australian metropolis is “MELBOURNE” and it match precisely as “XFYZABCDF”.

So, from the knowledge above. I can conclude the desk beneath:

Encrypted letter

X

F

Y

Z

W

A

B

C

D

F

Plaintext letter

M

E

L

B

I

O

U

R

N

E

Now I substitute the plaintext letter into the encrypted message.

P

X

W

Q

W

U

Z

T

U

F

V

W

D

X

F

Y

Z

A

B

C

D

F

M

I

I

B

E

I

N

M

E

L

B

O

U

R

N

E

“PXWQ” appear to be the identify of the college in Melbourne which is “RMIT”.

So from the end result above, I attempt to decipher the message with the next try and make the message make sense:

Try 1: Exchange “P” as “R”

Try 2: Exchange “U” as “S”.

Try three: Exchange “Q” as “T”.

Try four: Exchange “T” as “A”

Try 5: Exchange “V” as “D”

And now I’ll get the end result and beneath:

RMIT IS BASED IN MELBOURNE

HOWEVER, from the end result above, R is encoded into 2 letters above which is “P” and “C”.

Since there are not any letter can encoded to 2 letters, So I concluded that this message can’t be fully decipher.

Question Assignment three:

There are a selection of open supply encryption softwares/techniques obtainable over the Web. Which system(s)/software program(s) would you advocate and why?

Reply:

There may be a variety of open supply encryption software program or techniques obtainable over the Web that gives knowledge safety akin to TrueCrypt by TrueCrypt Basis, DiskCryptor by ntldr, Crosscrypt by Stefan Scherrer and FreeOTFE by Sarah Dean. Based mostly on the analysis I did from the web, I discovered that the TrueCrypt is the preferred open supply encryption software program which runs on the entire main platforms akin to Home windows XP/Vista/7, Mac OS X and Linux. Nonetheless, I want to advocate FreeOTFE due to its distinct benefits over different open sources encryption software program.

The first purpose why I like to recommend FreeOTFE is as a result of it’s extremely transportable. Not like different encryption system, FreeOTFE gives FreeOTFE Explorer which permits FreeOTFE volumes to be accessed with out putting in it or any machine drivers. Apart from that, administrator rights should not required for the consumer to make use of this transportable FreeOFTE. This function makes it superb and handy to be used with the detachable media or USB drives in order that consumer can use it to encrypt their knowledge with any supported pc. For instance, consumer can use FreeOTFE in web cafes the place pc can be found however not granted with administrator rights. Not like different software program which administrator rights and set up is required to run the software program, so I feel FreeOTFE is a better option examine to them.

Apart from that, FreeOTFE helps loads of ciphers and hash algorithms. The ciphers that it implements embody AES, Blowfish, CAST5/CAST6, DES/Triple DES, MARS, RC6, Serpent and Twofish.

It helps hash algorithms akin to MD5, RIPEMD320, SHA512, Tiger, Whirlpool and lots of extra.

Its cipher modes supported embody XTS, LRW and cipher-block chaining (CBC) which together with XTS-AES-128 and XTS-AES-256. Furthermore, it additionally gives safety tokens or smartcards supported for additional safety. Compares to TrueCrypt, TrueCrypt solely helps SHA-1, RIPEMD-160, Whirlpool hash algorithms and fewer ciphers than FreeOTFE.

-still underneath mantainance

Order | Check Discount

Tags: 150-200 words discussion with a scholarly reference, 200-300 words response to classmate discussion question, 250 word analysis essay, bachelor of nursing assignments, case study, essay bishops website

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00