{"id":22097,"date":"2025-04-08T07:21:10","date_gmt":"2025-04-08T07:21:10","guid":{"rendered":"https:\/\/academicwritersbay.com\/solutions\/cp3404-decrypting-the-vigenere-cipher-a-cryptanalysis-characterize-and-academic-tutorial-singapore\/"},"modified":"2025-04-08T07:21:10","modified_gmt":"2025-04-08T07:21:10","slug":"cp3404-decrypting-the-vigenere-cipher-a-cryptanalysis-characterize-and-academic-tutorial-singapore","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/solutions\/cp3404-decrypting-the-vigenere-cipher-a-cryptanalysis-characterize-and-academic-tutorial-singapore\/","title":{"rendered":"CP3404 Decrypting the Vigen\u00e8re Cipher: A Cryptanalysis Characterize and Academic Tutorial, Singapore"},"content":{"rendered":"<p>Assignment: Cryptanalysis + Tutorial Overview In this project, you&#8217;re going to decrypt a given ciphertext the spend of the specified cipher methodology, documented in a epic. Following the decryption direction of, you&#8217;re going to form a 10-15-minute recorded tutorial presentation to indicate others about the given cipher methodology. This entails explaining the historic background of the cipher, its strengths and weaknesses, and a detailed, step-by-step files on easy methods to encode and decode messages the spend of the cipher. This must be supported by your possess decryption of the ciphertext as an illustration. The educational could presumably well presumably peaceful also touch on possible spend cases for the cipher and gift its relevance in as much as date cryptography. This project is never any longer going to handiest let you reinforce your technical knowing of cryptographic ciphers however also reinforce your skill to keep up a correspondence complex principle effectively to others, a precious skill in knowledge safety. We recommend following the Assertion-Evidence manner for displays. Key Requirements There are two key deliverables that that you must presumably well presumably presumably be required to make for this project. 1. Ciphertext Decryption Characterize  You&#8217;re going to be supplied with shrimp print of a cipher that or no longer it&#8217;s miles fundamental to be taught (e.g., Vigen\u00e8re cipher, Caesar cipher, Playfair cipher, and so on.) \u2013 search Appendix 1. You&#8217;re going to be given a ciphertext to decode the spend of the above manner \u2013 search Appendix 2. Doc your step-by-step direction of for decrypting the plaintext message in a detailed a sure manner, explaining every motion taken, any assumptions made, and any challenges faced within the direction of the direction of.  2. Tutorial Presentation  Set a 10\u201315-minute video tutorial that must quilt the following:   Historical Background:  Provide a transient historic past of the cipher, alongside with who created it, its authentic cause, and any fundamental events or makes spend of connected to it.    Strengths and Weaknesses:  Present the major strengths and weaknesses of the cipher. Maintain its safety within the historic context versus as much as date cryptographic requirements.    Step-by-Step Encoding and Decoding:  Stroll thru the encoding and decoding direction of the spend of the cipher. Fabricate particular that to make spend of your decryption of the given ciphertext as an illustration, illustrating how somebody would encode and decode messages the spend of this form.    Seemingly Exhaust Circumstances:  Focus on the forms of spend cases for which the cipher shall be advisable, each and every historically and in as much as date cryptographic applications.    Valid-World Relevance:  Temporarily touch on how this cipher (or identical ciphers) is relevant in at the present time\u2019s cryptographic world, alongside with its feature in knowing as much as date encryption methods.            Write My Assignment      Rent a Expert Essay &#038; Assignment Author for winding up your Academic Assessments  Native Singapore Writers Crew  100% Plagiarism-Free Essay Most practical possible Pride Rate Free Revision On-Time Transport      Submission and Formatting Guidelines   Written Characterize:  Be aware depend: 1,000 \u2013 1,500 phrases. Exhaust sure headings and subheadings to organise the doc. Consist of images or diagrams where fundamental to illustrate your formulation, especially to support clearly gift your decryption direction of. Consist of citations for any sources veteran.    Video Tutorial:  Length: 10 \u2013 15 minutes. Fabricate particular that your advise is glaring and audible. Be certain your face is included within the presentation (spend a webcam). Exhaust slides and display-sharing to illustrate your explanations. Fabricate particular that any demonstrations (e.g., step-by-step cipher encoding and decoding) are visible and simple to note. OBS Studio is a instructed tool tool for recording your video.   Post your written epic and video tutorial to the submission hyperlink on LearnJCU.  Academic Integrity  Right here&#8217;s an particular person project. You&#8217;d be anticipated to cease this project independently. Any manufacture of academic misconduct, alongside with plagiarism and collusion, shall be pursued in line with the Coursework Academic Integrity Policy and Procedures. Correct citations must be offered for any historic info, sources, or recount that is never any longer your possess or that you find gotten consulted within the direction of the preparation of the project.  Generative Synthetic Intelligence (AI) Guidelines  Per the topic outline, Generative AI instruments are restricted on this assessment item. This implies that that you must presumably well perchance spend Generative Synthetic Intelligence (GenAI) to form knowledge handiest. Any spend of generative AI can find to be appropriately acknowledged and embody a Declaration of AI-Generated Field matter (publish this with the project).  Marking Rubric             Appendix 1: Vigen\u00e9re cipher  Background Cryptanalysis of an knowledge machine is the search of mathematical tactics for attempting to defeat knowledge safety services. A cryptographic machine is asserted to be breakable if a third social gathering (i.e., cryptanalyst), with out prior files of the major, can systematically fetch better plaintext from corresponding ciphertext within a suitable timeframe. Julius Caessar veteran a cipher which moved every letter of the alphabet to the letter three to the left within the predetermined advise of the letters of the alphabet. Resolve 1 presentations the authentic English alphabet and the corresponding cryptogram alphabet in Caesar cipher: a b c d e f g h i j k l m n o p q r s t u v w x y z d e f g h i j k l m n o p q r s t u v w x y z a b c Resolve 1: English alphabet letter and their corresponding cryptograms within the Caesar cipher. To make spend of mathematical notations, lets convert the letters of the alphabet to integers. Potentially the most natural conversion is to place to every letter an integer which signifies the trouble of the letter within the alphabet. That is, put 0, 1, \u2026, 24, 25 to a, b, \u2026, y, z, respectively. Utilizing this conversion, Caesar cipher is also expressed as: C = Ek(M) = M + 3 (mod 26) where \u2018C\u2019 is the cryptogram, \u2018E\u2019 is the encryption algorithm, \u2018k\u2019 is the major, \u2018M\u2019 is the message\/plaintext (one could presumably well presumably replace integer 3 by letter \u2018d\u2019). Caesar cipher is from the household of shift ciphers, by which the cryptogram is a shifted version of the authentic alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are handiest 26 attainable keys\/shifts.      Aquire Custom Answer of This Evaluation &#038; Elevate Your Grades    Derive A Free Quote       Vigen\u00e9re Cipher In Vigen\u00e9re cipher the major is extra than one letter. That is, Vigen\u00e9re cipher is also concept about as a aggregate of n shift ciphers, where n is the major-length (i.e., the amount of letters within the major phrase). Maintain an example where the message\/plaintext is \u2018particular person character\u2019 and the major phrase is \u2018host\u2019. Vigen\u00e9re cipher encrypts the message as follows: Plaintext i n d i v i d u a l c h a r a c t e r Key phrase h o s t h o s t h o s t h o s t h o s Cryptogram p b v b c w v n h z u a h f s v a s j Assignment 1 Online page 6 of 16 That is, the first four letters of the cryptogram are computed as: \u2018i\u2019 + \u2018h\u2019 = 8 + 7 = 15 (mod 26) i.e., p \u2018n\u2019 + \u2018o\u2019 = 13 + 14 = 1 (mod 26) i.e., b \u2018d\u2019 + \u2018s\u2019 = 3 + 18 = 21 (mod 26) i.e., v \u2018i\u2019 + \u2018t\u2019 = 8 + 19 = 1 (mod 26) i.e., b Since the plaintext is longer than the major phrase, key phrase is repeated except all letters of the plaintext are encrypted. Because it&#8217;s miles also viewed, a particular letter of the plaintext shall be encrypted with totally different letters from the major phrase. As an instance, the first occurrence of letter \u2018i\u2019 from the plaintext is encrypted with \u2018h\u2019, where its 2d and third occurrences are encrypted with the letters \u2018t\u2019 and \u2018o\u2019 respectively. That is, Vigen\u00e9re cipher is a polyalphabetic substitution cipher. To spoil a polyalphabetic substitution cipher, the cryptanalyst must first pick the major-length of the cipher. This could occasionally be done the spend of Kassiski manner. The Kassiski manner makes spend of repetitions of patterns within the ciphertext to produce a lawful guess about the major-length. As an instance, snarl the plaintext \u2018to be or no longer to be\u2019 has been enciphered the spend of the major \u2018now\u2019, producing the ciphertext below: Plaintext t o b e o r n o t t o b e Key phrase n o w n o w n o w n o w n Cryptogram g c x r c n a c p g c x r In this cryptogram, a repeated pattern is g c x r (i.e., g c x r c n a c p g c x r), where the distance between these repetitions (i.e., the amount of characters manufacture the first letter of the pattern in its first occurrence to the first letter of its 2d occurrence) is 9. This could well presumably well presumably be the register which the identical letters from plaintext is encrypted with the identical letters from the major phrase. Since in Vigen\u00e9re cipher the major phrase is repeated, the major-length is presumably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Indicate that for longer cryptograms, we are able to behold for added than one repeating patterns of totally different characters and calculate the distances between these repeating patterns. The supreme general divisor of those distances could presumably well presumably give a signal of the attainable key-length. Once we now find got the major length (k), we split the cryptogram into k cryptograms. For the recent example, assuming that the major length is 3, we split the cryptogram into three cryptograms. That is, the 1st, 4th, 7th, \u2026 characters of the cryptogram are the cease results of encrypting the 1st, 4th, 7th, \u2026 characters of the plaintext with the first letter of the major phrase (in other phrases, they&#8217;re shifted with the identical amount, as within the Caesar cipher). Within the same device, the 2nd, fifth, Eighth, \u2026 characters are the cease results of encrypting the corresponding letters within the plaintext with the 2d letter of the major, and the identical for the third. That is, this Vigen\u00e9re cipher is a aggregate of three Caesar ciphers, where the cryptogram of every Caesar cipher is given as below: Cryptogram 1: g r a g r Cryptogram 2: c c c c Cryptogram 3: x n p r To spoil every of those Caesar ciphers, we are able to spend the letter frequency within the English text. As proven in Resolve 2, \u2018e\u2019 is the most smartly-liked letter veteran in English texts. That is: Assignment 1 Online page 7 of 16 In Cryptogram 1, we are able to guess that \u2018g\u2019 or \u2018r\u2019 could presumably well presumably be the corresponding letter to \u2018e\u2019 within the plaintext. If \u2018g\u2019 corresponds to \u2018e\u2019, then the first letter of the major must be \u2018g\u2019 \u2013 \u2018e\u2019 = 6 \u2013 4 = 2, which is \u2018c\u2019. If \u2018r\u2019 corresponds to \u2018e\u2019, then the first letter of the major must be \u2018r\u2019 \u2013 \u2018e\u2019 = 17 \u2013 4 = 13, which is \u2018n\u2019. In Cryptogram 2, we are able to guess that \u2018c\u2019 is the corresponding letter to \u2018e\u2019 within the plaintext. If \u2018c\u2019 corresponds to \u2018e\u2019, then the 2d letter of the major shall be \u2018c\u2019 \u2013 \u2018e\u2019 = 2 \u2013 4 = -2 = 24 (calculate mod 26), which is \u2018y\u2019. In Cryptogram 3, every character appears to be like handiest as soon as, and thus letter frequency would no longer work.  Commentary: This situation is simply to display the mechanism of the Kassiski attack. The attack could well be very effective for natty cryptograms (e.g., the size of the cryptograms given on this project). You&#8217;d peaceful repeatedly take into epic other possible letters in response to letter frequency to find out the just accurate letter within the major phrase (i.e., the most repeated letters won\u2019t repeatedly be \u2018e\u2019).    Resolve 2: Letter frequencies in English texts.      Caught with a spread of homework assignments and feeling pressured ? Take professional academic assistance &#038; Derive 100% Plagiarism free papers    Derive A Free Quote         Appendix 2: Ciphertexts The following are 10 cryptograms that are created by the Vigenere cipher, where the plaintext is total English text, and the major phrase is a meaningful English phrase. You&#8217;d be required to decipher the cryptogram that matches alongside with your Pupil ID. Cryptogram for whom their Pupil-ID is XXXXXXX7 xkvdxvokmlavgkigbcdlfkgscvckyiewixqecbzoytxcukbrwtwuvggykhxquavfhkaupkuqfticawunvzxvizlzmgf mycxrzctqavilvkugeuvrxhlwtzbjmbpobcjrgrhakausguhbwxwnwbetketahgkdigkvzwklzabrzwcetaokiazq hxrniscmtmguekloanwtuekwnqrhklslmgmzhtedxhobulxirbxuzalaionknecjlrnwwzzclxxivhoxngfrcretlhjx uekmisdwvrmxvkvqogvdysxpkkfzlbxgzaageooezqqflyetpywhglkekijiulkfnzwkvuwhwdbwiqrdbeetrjmhx btixrigyamyigloacjfpigejlklbfnmsnquebcimexgcuazeoismpllwrxhkzkudnalevivjheoyxnmcjmjaghgvgfezg axkvgvwvsiszqohevmxrzqpykvfhvsavztkiftxwxwwkhxilnkubvnvcunigovrgqkvvsgupksswvwwieemmqqm lkoeixipuxyilguuoamdegxzwgvntammuvemekukigvflavakxymcjgvdamsitwilttxowpslfnxslbjwffsmtxwijxj sbzkzwdxishjnqulbdeyvklgjbtkmlkotwtkseimieqbjmtvqmftryilpkifwkjhbtovdsmklxetljalmilmuvhgkrmhh kzpwywivmkvvkmrtx<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assignment: Cryptanalysis + Tutorial Overview In this project, you&#8217;re going to decrypt a given ciphertext the spend of the specified cipher methodology, documented in a epic. Following the decryption direction of, you&#8217;re going to form a 10-15-minute recorded tutorial presentation to indicate others about the given cipher methodology. This entails explaining the historic background of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-22097","post","type-post","status-publish","format-standard","hentry","category-solutions"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/22097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/comments?post=22097"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/22097\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/media?parent=22097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/categories?post=22097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/tags?post=22097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}