CP3404 Decrypting the Vigenère Cipher: A Cryptanalysis File and Tutorial Tutorial, Singapore

Project: Cryptanalysis + Tutorial Overview In this task, it’s likely you’ll maybe decrypt a given ciphertext the usage of the specified cipher approach, documented in a document. Following the decryption direction of, it’s likely you’ll maybe create a 10-15-minute recorded tutorial presentation to educate others about the given cipher approach. This entails explaining the historical background of the cipher, its strengths and weaknesses, and an extensive, step-by-step recordsdata on solutions about how to encode and decode messages the usage of the cipher. This will also goal silent be supported by your possess decryption of the ciphertext shall we embrace. The academic could well also goal silent also touch on doable use cases for the cipher and show its relevance in popular cryptography. This task will no longer fully attend you enhance your technical realizing of cryptographic ciphers but also enhance your ability to be in contact advanced thought effectively to others, a useful skill in recordsdata security. We propose following the Assertion-Evidence approach for shows. Key Requirements There are two key deliverables that you is liable to be required to make for this task. 1. Ciphertext Decryption File You are going to be equipped with facts of a cipher that it’s important to study (e.g., Vigenère cipher, Caesar cipher, Playfair cipher, and so on.) – peer Appendix 1. You are going to be given a ciphertext to decode the usage of the above approach – peer Appendix 2. File your step-by-step direction of for decrypting the plaintext message in an extensive a clear device, explaining every circulate taken, any assumptions made, and any challenges confronted true via the direction of. 2. Tutorial Presentation Invent a 10–15-minute video tutorial that must quilt the next: Historical Background: Present a instant history of the cipher, including who created it, its usual motive, and any most primary events or makes use of connected to it. Strengths and Weaknesses: Show the necessary strengths and weaknesses of the cipher. Take be conscious of its security within the historical context versus popular cryptographic requirements. Step-by-Step Encoding and Decoding: Hump via the encoding and decoding direction of the usage of the cipher. Be particular to make use of your decryption of the given ciphertext shall we embrace, illustrating how somebody would encode and decode messages the usage of this approach. Skill Utilize Circumstances: Focus on the sorts of use cases for which the cipher could well also goal be primary, both traditionally and in popular cryptographic applications. True-World Relevance: Temporarily touch on how this cipher (or identical ciphers) is relevant in at the unusual time’s cryptographic world, including its characteristic in realizing popular encryption concepts. Write My Project Hire a Expert Essay & Project Writer for ending your Academic Assessments Native Singapore Writers Group 100% Plagiarism-Free Essay Perfect Pleasure Rate Free Revision On-Time Transport Submission and Formatting Guidelines Written File: Be conscious count: 1,000 – 1,500 phrases. Utilize sure headings and subheadings to organise the document. Contain images or diagrams the attach important to illustrate your factors, especially to attend clearly show your decryption direction of. Contain citations for any sources outmoded. Video Tutorial: Length: 10 – quarter-hour. Be particular your convey is evident and audible. Be particular your face is included within the presentation (use a webcam). Utilize slides and display-sharing to illustrate your explanations. Be particular any demonstrations (e.g., step-by-step cipher encoding and decoding) are considered and easy to use. OBS Studio is a instructed instrument tool for recording your video. Publish your written document and video tutorial to the submission hyperlink on LearnJCU. Academic Integrity Here is a particular person task. You is liable to be expected to total this task independently. Any compose of tutorial misconduct, including plagiarism and collusion, could be pursued in accordance to the Coursework Academic Integrity Policy and Procedures. Accurate citations could well also goal silent be equipped for any historical information, sources, or scream that’s no longer your possess or that you own consulted true via the preparation of the task. Generative Man made Intelligence (AI) Guidelines Per the self-discipline define, Generative AI instruments are restricted in this evaluation item. This approach that it’s likely you’ll maybe also use Generative Man made Intelligence (GenAI) to compose recordsdata fully. Any use of generative AI want to be precisely acknowledged and embody a Declaration of AI-Generated Fabric (publish this with the task). Marking Rubric Appendix 1: Vigenére cipher Background Cryptanalysis of an recordsdata system is the survey of mathematical methods for making an attempt to defeat recordsdata security products and services. A cryptographic system is purported to be breakable if a third occasion (i.e., cryptanalyst), without prior recordsdata of the necessary, can systematically enhance plaintext from corresponding ciphertext within an acceptable timeframe. Julius Caessar outmoded a cipher which moved every letter of the alphabet to the letter three to the left within the predetermined state of the letters of the alphabet. Settle 1 exhibits the distinctive English alphabet and the corresponding cryptogram alphabet in Caesar cipher: a b c d e f g h i j okay l m n o p q r s t u v w x y z d e f g h i j okay l m n o p q r s t u v w x y z a b c Settle 1: English alphabet letter and their corresponding cryptograms within the Caesar cipher. To utilize mathematical notations, lets convert the letters of the alphabet to integers. The most natural conversion is to establish to every letter an integer which indicates the say of the letter within the alphabet. That is, establish 0, 1, …, 24, 25 to a, b, …, y, z, respectively. The usage of this conversion, Caesar cipher could well even be expressed as: C = Ek(M) = M + 3 (mod 26) the attach ‘C’ is the cryptogram, ‘E’ is the encryption algorithm, ‘okay’ is the necessary, ‘M’ is the message/plaintext (one could well also goal change integer 3 by letter ‘d’). Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the distinctive alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, on legend of there are fully 26 that it’s likely you’ll maybe also concentrate on of keys/shifts. Buy Custom Resolution of This Evaluate & Carry Your Grades Accept A Free Quote Vigenére Cipher In Vigenére cipher the bottom line is larger than one letter. That is, Vigenére cipher could well even be conception to be as a mix of n shift ciphers, the attach n is the necessary-length (i.e., the quantity of letters within the necessary phrase). Take be conscious of an instance the attach the message/plaintext is ‘particular particular person persona’ and the necessary phrase is ‘host’. Vigenére cipher encrypts the message as follows: Plaintext i n d i v i d u a l c h a r a c t e r Key phrase h o s t h o s t h o s t h o s t h o s Cryptogram p b v b c w v n h z u a h f s v a s j Project 1 Page 6 of 16 That is, the first four letters of the cryptogram are computed as: ‘i’ + ‘h’ = 8 + 7 = 15 (mod 26) i.e., p ‘n’ + ‘o’ = 13 + 14 = 1 (mod 26) i.e., b ‘d’ + ‘s’ = 3 + 18 = 21 (mod 26) i.e., v ‘i’ + ‘t’ = 8 + 19 = 1 (mod 26) i.e., b Since the plaintext is longer than the necessary phrase, key phrase is repeated till all letters of the plaintext are encrypted. Because it could well even be considered, a explicit letter of the plaintext could well also goal be encrypted with diversified letters from the necessary phrase. For instance, the first prevalence of letter ‘i’ from the plaintext is encrypted with ‘h’, the attach its 2nd and third occurrences are encrypted with the letters ‘t’ and ‘o’ respectively. That is, Vigenére cipher is a polyalphabetic substitution cipher. To interrupt a polyalphabetic substitution cipher, the cryptanalyst must first determine the necessary-length of the cipher. This is succesful of maybe be done the usage of Kassiski approach. The Kassiski approach makes use of repetitions of patterns within the ciphertext to compose a precise guess about the necessary-length. For instance, mutter the plaintext ‘to be or no longer to be’ has been enciphered the usage of the necessary ‘now’, producing the ciphertext underneath: Plaintext t o b e o r n o t t o b e Key phrase n o w n o w n o w n o w n Cryptogram g c x r c n a c p g c x r In this cryptogram, a repeated pattern is g c x r (i.e., g c x r c n a c p g c x r), the attach the space between these repetitions (i.e., the quantity of characters compose the first letter of the pattern in its first prevalence to the first letter of its 2nd prevalence) is 9. This could be the register which the same letters from plaintext is encrypted with the same letters from the necessary phrase. Since in Vigenére cipher the necessary phrase is repeated, the necessary-length is liable to be 9 or a divisor of 9 (i.e., 3, on legend of 9 has no diversified divisor). Show that for longer cryptograms, we are succesful of stare more than one repeating patterns of diversified characters and calculate the distances between these repeating patterns. The supreme neatly-liked divisor of those distances could well also goal give a signal of the that it’s likely you’ll maybe also concentrate on of key-length. When we own the necessary length (okay), we split the cryptogram into okay cryptograms. For the contemporary instance, assuming that the necessary length is 3, we split the cryptogram into three cryptograms. That is, the first, 4th, seventh, … characters of the cryptogram are the finish results of encrypting the first, 4th, seventh, … characters of the plaintext with the first letter of the necessary phrase (in diversified phrases, they’re shifted with the same quantity, as within the Caesar cipher). Equally, the 2nd, fifth, eighth, … characters are the finish results of encrypting the corresponding letters within the plaintext with the 2nd letter of the necessary, and the same for the third. That is, this Vigenére cipher is a mix of 3 Caesar ciphers, the attach the cryptogram of every Caesar cipher is given as underneath: Cryptogram 1: g r a g r Cryptogram 2: c c c c Cryptogram 3: x n p r To interrupt every of these Caesar ciphers, we are succesful of use the letter frequency within the English text. As confirmed in Settle 2, ‘e’ is the most traditional letter outmoded in English texts. That is: Project 1 Page 7 of 16 In Cryptogram 1, we are succesful of guess that ‘g’ or ‘r’ could well also goal be the corresponding letter to ‘e’ within the plaintext. If ‘g’ corresponds to ‘e’, then the first letter of the necessary could well also goal silent be ‘g’ – ‘e’ = 6 – 4 = 2, which is ‘c’. If ‘r’ corresponds to ‘e’, then the first letter of the necessary could well also goal silent be ‘r’ – ‘e’ = 17 – 4 = 13, which is ‘n’. In Cryptogram 2, we are succesful of guess that ‘c’ is the corresponding letter to ‘e’ within the plaintext. If ‘c’ corresponds to ‘e’, then the 2nd letter of the necessary could well also goal be ‘c’ – ‘e’ = 2 – 4 = -2 = 24 (calculate mod 26), which is ‘y’. In Cryptogram 3, every persona seems to be fully once, and thus letter frequency does no longer work. Commentary: This instance is completely to dispute the mechanism of the Kassiski attack. The attack is amazingly effective for nice cryptograms (e.g., the scale of the cryptograms given in this task). You could well also goal silent continuously own in mind diversified doable letters in step with letter frequency to search out out the true letter within the necessary phrase (i.e., the most repeated letters won’t continuously be ‘e’). Settle 2: Letter frequencies in English texts. Stuck with rather plenty of homework assignments and feeling harassed out ? Take dangle of official tutorial aid & Accept 100% Plagiarism free papers Accept A Free Quote Appendix 2: Ciphertexts The next are 10 cryptograms which could be created by the Vigenere cipher, the attach the plaintext is total English text, and the necessary phrase is a meaningful English be conscious. You is liable to be required to decipher the cryptogram that matches alongside with your Student ID. Cryptogram for whom their Student-ID is XXXXXXX7 xkvdxvokmlavgkigbcdlfkgscvckyiewixqecbzoytxcukbrwtwuvggykhxquavfhkaupkuqfticawunvzxvizlzmgf mycxrzctqavilvkugeuvrxhlwtzbjmbpobcjrgrhakausguhbwxwnwbetketahgkdigkvzwklzabrzwcetaokiazq hxrniscmtmguekloanwtuekwnqrhklslmgmzhtedxhobulxirbxuzalaionknecjlrnwwzzclxxivhoxngfrcretlhjx uekmisdwvrmxvkvqogvdysxpkkfzlbxgzaageooezqqflyetpywhglkekijiulkfnzwkvuwhwdbwiqrdbeetrjmhx btixrigyamyigloacjfpigejlklbfnmsnquebcimexgcuazeoismpllwrxhkzkudnalevivjheoyxnmcjmjaghgvgfezg axkvgvwvsiszqohevmxrzqpykvfhvsavztkiftxwxwwkhxilnkubvnvcunigovrgqkvvsgupksswvwwieemmqqm lkoeixipuxyilguuoamdegxzwgvntammuvemekukigvflavakxymcjgvdamsitwilttxowpslfnxslbjwffsmtxwijxj sbzkzwdxishjnqulbdeyvklgjbtkmlkotwtkseimieqbjmtvqmftryilpkifwkjhbtovdsmklxetljalmilmuvhgkrmhh kzpwywivmkvvkmrtx

QUALITY: 100% ORIGINAL PAPER NO ChatGPT.NO PLAGIARISMCUSTOM PAPER

Best Custom Essay Writing Services

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.

We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.

Why Choose AcademicWritersBay.com?

  • Our papers are 100% original, custom-written from scratch.
  • We’re here to support you around the clock, any day of the year.
  • You’ll find our prices competitive and reasonable.
  • We handle papers across all subjects, regardless of urgency or difficulty.
  • Need a paper urgently? We can deliver within 6 hours!
  • Relax with our on-time delivery commitment.
  • We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
  • Benefit from unlimited amendments upon request to get the paper you envisioned.
  • We pledge our dedication to meeting your expectations and achieving the grade you deserve.

Our Process: Getting started with us is as simple as can be. Here’s how to do it:

  • Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
  • Provide the specifics of your paper in the “PAPER DETAILS” section.
  • Select your academic level, the deadline, and the required number of pages.
  • Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
  • Follow the simple payment instructions and soon, our writers will be hard at work on your paper.

AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.

ORDER NOW and experience the difference with AcademicWritersBay.com, where excellence meets timely delivery.

NO PLAGIARISM