Assignment: Cryptanalysis + Tutorial Overview In this project, you’re going to decrypt a given ciphertext the spend of the specified cipher methodology, documented in a epic. Following the decryption direction of, you’re going to form a 10-15-minute recorded tutorial presentation to indicate others about the given cipher methodology. This entails explaining the historic background of the cipher, its strengths and weaknesses, and a detailed, step-by-step files on easy methods to encode and decode messages the spend of the cipher. This must be supported by your possess decryption of the ciphertext as an illustration. The educational could presumably well presumably peaceful also touch on possible spend cases for the cipher and gift its relevance in as much as date cryptography. This project is never any longer going to handiest let you reinforce your technical knowing of cryptographic ciphers however also reinforce your skill to keep up a correspondence complex principle effectively to others, a precious skill in knowledge safety. We recommend following the Assertion-Evidence manner for displays. Key Requirements There are two key deliverables that that you must presumably well presumably presumably be required to make for this project. 1. Ciphertext Decryption Characterize You’re going to be supplied with shrimp print of a cipher that or no longer it’s miles fundamental to be taught (e.g., Vigenère cipher, Caesar cipher, Playfair cipher, and so on.) – search Appendix 1. You’re going to be given a ciphertext to decode the spend of the above manner – search Appendix 2. Doc your step-by-step direction of for decrypting the plaintext message in a detailed a sure manner, explaining every motion taken, any assumptions made, and any challenges faced within the direction of the direction of. 2. Tutorial Presentation Set a 10–15-minute video tutorial that must quilt the following: Historical Background: Provide a transient historic past of the cipher, alongside with who created it, its authentic cause, and any fundamental events or makes spend of connected to it. Strengths and Weaknesses: Present the major strengths and weaknesses of the cipher. Maintain its safety within the historic context versus as much as date cryptographic requirements. Step-by-Step Encoding and Decoding: Stroll thru the encoding and decoding direction of the spend of the cipher. Fabricate particular that to make spend of your decryption of the given ciphertext as an illustration, illustrating how somebody would encode and decode messages the spend of this form. Seemingly Exhaust Circumstances: Focus on the forms of spend cases for which the cipher shall be advisable, each and every historically and in as much as date cryptographic applications. Valid-World Relevance: Temporarily touch on how this cipher (or identical ciphers) is relevant in at the present time’s cryptographic world, alongside with its feature in knowing as much as date encryption methods. Write My Assignment Rent a Expert Essay & Assignment Author for winding up your Academic Assessments Native Singapore Writers Crew 100% Plagiarism-Free Essay Most practical possible Pride Rate Free Revision On-Time Transport Submission and Formatting Guidelines Written Characterize: Be aware depend: 1,000 – 1,500 phrases. Exhaust sure headings and subheadings to organise the doc. Consist of images or diagrams where fundamental to illustrate your formulation, especially to support clearly gift your decryption direction of. Consist of citations for any sources veteran. Video Tutorial: Length: 10 – 15 minutes. Fabricate particular that your advise is glaring and audible. Be certain your face is included within the presentation (spend a webcam). Exhaust slides and display-sharing to illustrate your explanations. Fabricate particular that any demonstrations (e.g., step-by-step cipher encoding and decoding) are visible and simple to note. OBS Studio is a instructed tool tool for recording your video. Post your written epic and video tutorial to the submission hyperlink on LearnJCU. Academic Integrity Right here’s an particular person project. You’d be anticipated to cease this project independently. Any manufacture of academic misconduct, alongside with plagiarism and collusion, shall be pursued in line with the Coursework Academic Integrity Policy and Procedures. Correct citations must be offered for any historic info, sources, or recount that is never any longer your possess or that you find gotten consulted within the direction of the preparation of the project. Generative Synthetic Intelligence (AI) Guidelines Per the topic outline, Generative AI instruments are restricted on this assessment item. This implies that that you must presumably well perchance spend Generative Synthetic Intelligence (GenAI) to form knowledge handiest. Any spend of generative AI can find to be appropriately acknowledged and embody a Declaration of AI-Generated Field matter (publish this with the project). Marking Rubric Appendix 1: Vigenére cipher Background Cryptanalysis of an knowledge machine is the search of mathematical tactics for attempting to defeat knowledge safety services. A cryptographic machine is asserted to be breakable if a third social gathering (i.e., cryptanalyst), with out prior files of the major, can systematically fetch better plaintext from corresponding ciphertext within a suitable timeframe. Julius Caessar veteran a cipher which moved every letter of the alphabet to the letter three to the left within the predetermined advise of the letters of the alphabet. Resolve 1 presentations the authentic English alphabet and the corresponding cryptogram alphabet in Caesar cipher: a b c d e f g h i j k l m n o p q r s t u v w x y z d e f g h i j k l m n o p q r s t u v w x y z a b c Resolve 1: English alphabet letter and their corresponding cryptograms within the Caesar cipher. To make spend of mathematical notations, lets convert the letters of the alphabet to integers. Potentially the most natural conversion is to place to every letter an integer which signifies the trouble of the letter within the alphabet. That is, put 0, 1, …, 24, 25 to a, b, …, y, z, respectively. Utilizing this conversion, Caesar cipher is also expressed as: C = Ek(M) = M + 3 (mod 26) where ‘C’ is the cryptogram, ‘E’ is the encryption algorithm, ‘k’ is the major, ‘M’ is the message/plaintext (one could presumably well presumably replace integer 3 by letter ‘d’). Caesar cipher is from the household of shift ciphers, by which the cryptogram is a shifted version of the authentic alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are handiest 26 attainable keys/shifts. Aquire Custom Answer of This Evaluation & Elevate Your Grades Derive A Free Quote Vigenére Cipher In Vigenére cipher the major is extra than one letter. That is, Vigenére cipher is also concept about as a aggregate of n shift ciphers, where n is the major-length (i.e., the amount of letters within the major phrase). Maintain an example where the message/plaintext is ‘particular person character’ and the major phrase is ‘host’. Vigenére cipher encrypts the message as follows: Plaintext i n d i v i d u a l c h a r a c t e r Key phrase h o s t h o s t h o s t h o s t h o s Cryptogram p b v b c w v n h z u a h f s v a s j Assignment 1 Online page 6 of 16 That is, the first four letters of the cryptogram are computed as: ‘i’ + ‘h’ = 8 + 7 = 15 (mod 26) i.e., p ‘n’ + ‘o’ = 13 + 14 = 1 (mod 26) i.e., b ‘d’ + ‘s’ = 3 + 18 = 21 (mod 26) i.e., v ‘i’ + ‘t’ = 8 + 19 = 1 (mod 26) i.e., b Since the plaintext is longer than the major phrase, key phrase is repeated except all letters of the plaintext are encrypted. Because it’s miles also viewed, a particular letter of the plaintext shall be encrypted with totally different letters from the major phrase. As an instance, the first occurrence of letter ‘i’ from the plaintext is encrypted with ‘h’, where its 2d and third occurrences are encrypted with the letters ‘t’ and ‘o’ respectively. That is, Vigenére cipher is a polyalphabetic substitution cipher. To spoil a polyalphabetic substitution cipher, the cryptanalyst must first pick the major-length of the cipher. This could occasionally be done the spend of Kassiski manner. The Kassiski manner makes spend of repetitions of patterns within the ciphertext to produce a lawful guess about the major-length. As an instance, snarl the plaintext ‘to be or no longer to be’ has been enciphered the spend of the major ‘now’, producing the ciphertext below: Plaintext t o b e o r n o t t o b e Key phrase n o w n o w n o w n o w n Cryptogram g c x r c n a c p g c x r In this cryptogram, a repeated pattern is g c x r (i.e., g c x r c n a c p g c x r), where the distance between these repetitions (i.e., the amount of characters manufacture the first letter of the pattern in its first occurrence to the first letter of its 2d occurrence) is 9. This could well presumably well presumably be the register which the identical letters from plaintext is encrypted with the identical letters from the major phrase. Since in Vigenére cipher the major phrase is repeated, the major-length is presumably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Indicate that for longer cryptograms, we are able to behold for added than one repeating patterns of totally different characters and calculate the distances between these repeating patterns. The supreme general divisor of those distances could presumably well presumably give a signal of the attainable key-length. Once we now find got the major length (k), we split the cryptogram into k cryptograms. For the recent example, assuming that the major length is 3, we split the cryptogram into three cryptograms. That is, the 1st, 4th, 7th, … characters of the cryptogram are the cease results of encrypting the 1st, 4th, 7th, … characters of the plaintext with the first letter of the major phrase (in other phrases, they’re shifted with the identical amount, as within the Caesar cipher). Within the same device, the 2nd, fifth, Eighth, … characters are the cease results of encrypting the corresponding letters within the plaintext with the 2d letter of the major, and the identical for the third. That is, this Vigenére cipher is a aggregate of three Caesar ciphers, where the cryptogram of every Caesar cipher is given as below: Cryptogram 1: g r a g r Cryptogram 2: c c c c Cryptogram 3: x n p r To spoil every of those Caesar ciphers, we are able to spend the letter frequency within the English text. As proven in Resolve 2, ‘e’ is the most smartly-liked letter veteran in English texts. That is: Assignment 1 Online page 7 of 16 In Cryptogram 1, we are able to guess that ‘g’ or ‘r’ could presumably well presumably be the corresponding letter to ‘e’ within the plaintext. If ‘g’ corresponds to ‘e’, then the first letter of the major must be ‘g’ – ‘e’ = 6 – 4 = 2, which is ‘c’. If ‘r’ corresponds to ‘e’, then the first letter of the major must be ‘r’ – ‘e’ = 17 – 4 = 13, which is ‘n’. In Cryptogram 2, we are able to guess that ‘c’ is the corresponding letter to ‘e’ within the plaintext. If ‘c’ corresponds to ‘e’, then the 2d letter of the major shall be ‘c’ – ‘e’ = 2 – 4 = -2 = 24 (calculate mod 26), which is ‘y’. In Cryptogram 3, every character appears to be like handiest as soon as, and thus letter frequency would no longer work. Commentary: This situation is simply to display the mechanism of the Kassiski attack. The attack could well be very effective for natty cryptograms (e.g., the size of the cryptograms given on this project). You’d peaceful repeatedly take into epic other possible letters in response to letter frequency to find out the just accurate letter within the major phrase (i.e., the most repeated letters won’t repeatedly be ‘e’). Resolve 2: Letter frequencies in English texts. Caught with a spread of homework assignments and feeling pressured ? Take professional academic assistance & Derive 100% Plagiarism free papers Derive A Free Quote Appendix 2: Ciphertexts The following are 10 cryptograms that are created by the Vigenere cipher, where the plaintext is total English text, and the major phrase is a meaningful English phrase. You’d be required to decipher the cryptogram that matches alongside with your Pupil ID. Cryptogram for whom their Pupil-ID is XXXXXXX7 xkvdxvokmlavgkigbcdlfkgscvckyiewixqecbzoytxcukbrwtwuvggykhxquavfhkaupkuqfticawunvzxvizlzmgf mycxrzctqavilvkugeuvrxhlwtzbjmbpobcjrgrhakausguhbwxwnwbetketahgkdigkvzwklzabrzwcetaokiazq hxrniscmtmguekloanwtuekwnqrhklslmgmzhtedxhobulxirbxuzalaionknecjlrnwwzzclxxivhoxngfrcretlhjx uekmisdwvrmxvkvqogvdysxpkkfzlbxgzaageooezqqflyetpywhglkekijiulkfnzwkvuwhwdbwiqrdbeetrjmhx btixrigyamyigloacjfpigejlklbfnmsnquebcimexgcuazeoismpllwrxhkzkudnalevivjheoyxnmcjmjaghgvgfezg axkvgvwvsiszqohevmxrzqpykvfhvsavztkiftxwxwwkhxilnkubvnvcunigovrgqkvvsgupksswvwwieemmqqm lkoeixipuxyilguuoamdegxzwgvntammuvemekukigvflavakxymcjgvdamsitwilttxowpslfnxslbjwffsmtxwijxj sbzkzwdxishjnqulbdeyvklgjbtkmlkotwtkseimieqbjmtvqmftryilpkifwkjhbtovdsmklxetljalmilmuvhgkrmhh kzpwywivmkvvkmrtx
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO ChatGPT.NO PLAGIARISM – CUSTOM PAPER

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.
We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.
Why Choose AcademicWritersBay.com?
- Our papers are 100% original, custom-written from scratch.
- We’re here to support you around the clock, any day of the year.
- You’ll find our prices competitive and reasonable.
- We handle papers across all subjects, regardless of urgency or difficulty.
- Need a paper urgently? We can deliver within 6 hours!
- Relax with our on-time delivery commitment.
- We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
- Benefit from unlimited amendments upon request to get the paper you envisioned.
- We pledge our dedication to meeting your expectations and achieving the grade you deserve.
Our Process: Getting started with us is as simple as can be. Here’s how to do it:
- Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
- Provide the specifics of your paper in the “PAPER DETAILS” section.
- Select your academic level, the deadline, and the required number of pages.
- Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
- Follow the simple payment instructions and soon, our writers will be hard at work on your paper.
AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.
