{"id":22098,"date":"2025-04-08T07:21:09","date_gmt":"2025-04-08T07:21:09","guid":{"rendered":"https:\/\/academicwritersbay.com\/solutions\/cp3404-decrypting-the-vigenere-cipher-a-cryptanalysis-file-and-tutorial-tutorial-singapore\/"},"modified":"2025-04-08T07:21:09","modified_gmt":"2025-04-08T07:21:09","slug":"cp3404-decrypting-the-vigenere-cipher-a-cryptanalysis-file-and-tutorial-tutorial-singapore","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/solutions\/cp3404-decrypting-the-vigenere-cipher-a-cryptanalysis-file-and-tutorial-tutorial-singapore\/","title":{"rendered":"CP3404 Decrypting the Vigen\u00e8re Cipher: A Cryptanalysis File and Tutorial Tutorial, Singapore"},"content":{"rendered":"<p>Project: Cryptanalysis + Tutorial Overview In this task, it&#8217;s likely you&#8217;ll maybe decrypt a given ciphertext the usage of the specified cipher approach, documented in a document. Following the decryption direction of, it&#8217;s likely you&#8217;ll maybe create a 10-15-minute recorded tutorial presentation to educate others about the given cipher approach. This entails explaining the historical background of the cipher, its strengths and weaknesses, and an extensive, step-by-step recordsdata on solutions about how to encode and decode messages the usage of the cipher. This will also goal silent be supported by your possess decryption of the ciphertext shall we embrace. The academic could well also goal silent also touch on doable use cases for the cipher and show its relevance in popular cryptography. This task will no longer fully attend you enhance your technical realizing of cryptographic ciphers but also enhance your ability to be in contact advanced thought effectively to others, a useful skill in recordsdata security. We propose following the Assertion-Evidence approach for shows. Key Requirements There are two key deliverables that you is liable to be required to make for this task. 1. Ciphertext Decryption File  You are going to be equipped with facts of a cipher that it&#8217;s important to study (e.g., Vigen\u00e8re cipher, Caesar cipher, Playfair cipher, and so on.) \u2013 peer Appendix 1. You are going to be given a ciphertext to decode the usage of the above approach \u2013 peer Appendix 2. File your step-by-step direction of for decrypting the plaintext message in an extensive a clear device, explaining every circulate taken, any assumptions made, and any challenges confronted true via the direction of.  2. Tutorial Presentation  Invent a 10\u201315-minute video tutorial that must quilt the next:   Historical Background:  Present a instant history of the cipher, including who created it, its usual motive, and any most primary events or makes use of connected to it.    Strengths and Weaknesses:  Show the necessary strengths and weaknesses of the cipher. Take be conscious of its security within the historical context versus popular cryptographic requirements.    Step-by-Step Encoding and Decoding:  Hump via the encoding and decoding direction of the usage of the cipher. Be particular to make use of your decryption of the given ciphertext shall we embrace, illustrating how somebody would encode and decode messages the usage of this approach.    Skill Utilize Circumstances:  Focus on the sorts of use cases for which the cipher could well also goal be primary, both traditionally and in popular cryptographic applications.    True-World Relevance:  Temporarily touch on how this cipher (or identical ciphers) is relevant in at the unusual time\u2019s cryptographic world, including its characteristic in realizing popular encryption concepts.            Write My Project      Hire a Expert Essay &#038; Project Writer for ending your Academic Assessments  Native Singapore Writers Group  100% Plagiarism-Free Essay Perfect Pleasure Rate Free Revision On-Time Transport      Submission and Formatting Guidelines   Written File:  Be conscious count: 1,000 \u2013 1,500 phrases. Utilize sure headings and subheadings to organise the document. Contain images or diagrams the attach important to illustrate your factors, especially to attend clearly show your decryption direction of. Contain citations for any sources outmoded.    Video Tutorial:  Length: 10 \u2013 quarter-hour. Be particular your convey is evident and audible. Be particular your face is included within the presentation (use a webcam). Utilize slides and display-sharing to illustrate your explanations. Be particular any demonstrations (e.g., step-by-step cipher encoding and decoding) are considered and easy to use. OBS Studio is a instructed instrument tool for recording your video.   Publish your written document and video tutorial to the submission hyperlink on LearnJCU.  Academic Integrity  Here is a particular person task. You is liable to be expected to total this task independently. Any compose of tutorial misconduct, including plagiarism and collusion, could be pursued in accordance to the Coursework Academic Integrity Policy and Procedures. Accurate citations could well also goal silent be equipped for any historical information, sources, or scream that&#8217;s no longer your possess or that you own consulted true via the preparation of the task.  Generative Man made Intelligence (AI) Guidelines  Per the self-discipline define, Generative AI instruments are restricted in this evaluation item. This approach that it&#8217;s likely you&#8217;ll maybe also use Generative Man made Intelligence (GenAI) to compose recordsdata fully. Any use of generative AI want to be precisely acknowledged and embody a Declaration of AI-Generated Fabric (publish this with the task).  Marking Rubric             Appendix 1: Vigen\u00e9re cipher  Background Cryptanalysis of an recordsdata system is the survey of mathematical methods for making an attempt to defeat recordsdata security products and services. A cryptographic system is purported to be breakable if a third occasion (i.e., cryptanalyst), without prior recordsdata of the necessary, can systematically enhance plaintext from corresponding ciphertext within an acceptable timeframe. Julius Caessar outmoded a cipher which moved every letter of the alphabet to the letter three to the left within the predetermined state of the letters of the alphabet. Settle 1 exhibits the distinctive English alphabet and the corresponding cryptogram alphabet in Caesar cipher: a b c d e f g h i j okay l m n o p q r s t u v w x y z d e f g h i j okay l m n o p q r s t u v w x y z a b c Settle 1: English alphabet letter and their corresponding cryptograms within the Caesar cipher. To utilize mathematical notations, lets convert the letters of the alphabet to integers. The most natural conversion is to establish to every letter an integer which indicates the say of the letter within the alphabet. That is, establish 0, 1, \u2026, 24, 25 to a, b, \u2026, y, z, respectively. The usage of this conversion, Caesar cipher could well even be expressed as: C = Ek(M) = M + 3 (mod 26) the attach \u2018C\u2019 is the cryptogram, \u2018E\u2019 is the encryption algorithm, \u2018okay\u2019 is the necessary, \u2018M\u2019 is the message\/plaintext (one could well also goal change integer 3 by letter \u2018d\u2019). Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the distinctive alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, on legend of there are fully 26 that it&#8217;s likely you&#8217;ll maybe also concentrate on of keys\/shifts.      Buy Custom Resolution of This Evaluate &#038; Carry Your Grades    Accept A Free Quote       Vigen\u00e9re Cipher In Vigen\u00e9re cipher the bottom line is larger than one letter. That is, Vigen\u00e9re cipher could well even be conception to be as a mix of n shift ciphers, the attach n is the necessary-length (i.e., the quantity of letters within the necessary phrase). Take be conscious of an instance the attach the message\/plaintext is \u2018particular particular person persona\u2019 and the necessary phrase is \u2018host\u2019. Vigen\u00e9re cipher encrypts the message as follows: Plaintext i n d i v i d u a l c h a r a c t e r Key phrase h o s t h o s t h o s t h o s t h o s Cryptogram p b v b c w v n h z u a h f s v a s j Project 1 Page 6 of 16 That is, the first four letters of the cryptogram are computed as: \u2018i\u2019 + \u2018h\u2019 = 8 + 7 = 15 (mod 26) i.e., p \u2018n\u2019 + \u2018o\u2019 = 13 + 14 = 1 (mod 26) i.e., b \u2018d\u2019 + \u2018s\u2019 = 3 + 18 = 21 (mod 26) i.e., v \u2018i\u2019 + \u2018t\u2019 = 8 + 19 = 1 (mod 26) i.e., b Since the plaintext is longer than the necessary phrase, key phrase is repeated till all letters of the plaintext are encrypted. Because it could well even be considered, a explicit letter of the plaintext could well also goal be encrypted with diversified letters from the necessary phrase. For instance, the first prevalence of letter \u2018i\u2019 from the plaintext is encrypted with \u2018h\u2019, the attach its 2nd and third occurrences are encrypted with the letters \u2018t\u2019 and \u2018o\u2019 respectively. That is, Vigen\u00e9re cipher is a polyalphabetic substitution cipher. To interrupt a polyalphabetic substitution cipher, the cryptanalyst must first determine the necessary-length of the cipher. This is succesful of maybe be done the usage of Kassiski approach. The Kassiski approach makes use of repetitions of patterns within the ciphertext to compose a precise guess about the necessary-length. For instance, mutter the plaintext \u2018to be or no longer to be\u2019 has been enciphered the usage of the necessary \u2018now\u2019, producing the ciphertext underneath: Plaintext t o b e o r n o t t o b e Key phrase n o w n o w n o w n o w n Cryptogram g c x r c n a c p g c x r In this cryptogram, a repeated pattern is g c x r (i.e., g c x r c n a c p g c x r), the attach the space between these repetitions (i.e., the quantity of characters compose the first letter of the pattern in its first prevalence to the first letter of its 2nd prevalence) is 9. This could be the register which the same letters from plaintext is encrypted with the same letters from the necessary phrase. Since in Vigen\u00e9re cipher the necessary phrase is repeated, the necessary-length is liable to be 9 or a divisor of 9 (i.e., 3, on legend of 9 has no diversified divisor). Show that for longer cryptograms, we are succesful of stare more than one repeating patterns of diversified characters and calculate the distances between these repeating patterns. The supreme neatly-liked divisor of those distances could well also goal give a signal of the that it&#8217;s likely you&#8217;ll maybe also concentrate on of key-length. When we own the necessary length (okay), we split the cryptogram into okay cryptograms. For the contemporary instance, assuming that the necessary length is 3, we split the cryptogram into three cryptograms. That is, the first, 4th, seventh, \u2026 characters of the cryptogram are the finish results of encrypting the first, 4th, seventh, \u2026 characters of the plaintext with the first letter of the necessary phrase (in diversified phrases, they&#8217;re shifted with the same quantity, as within the Caesar cipher). Equally, the 2nd, fifth, eighth, \u2026 characters are the finish results of encrypting the corresponding letters within the plaintext with the 2nd letter of the necessary, and the same for the third. That is, this Vigen\u00e9re cipher is a mix of 3 Caesar ciphers, the attach the cryptogram of every Caesar cipher is given as underneath: Cryptogram 1: g r a g r Cryptogram 2: c c c c Cryptogram 3: x n p r To interrupt every of these Caesar ciphers, we are succesful of use the letter frequency within the English text. As confirmed in Settle 2, \u2018e\u2019 is the most traditional letter outmoded in English texts. That is: Project 1 Page 7 of 16 In Cryptogram 1, we are succesful of guess that \u2018g\u2019 or \u2018r\u2019 could well also goal be the corresponding letter to \u2018e\u2019 within the plaintext. If \u2018g\u2019 corresponds to \u2018e\u2019, then the first letter of the necessary could well also goal silent be \u2018g\u2019 \u2013 \u2018e\u2019 = 6 \u2013 4 = 2, which is \u2018c\u2019. If \u2018r\u2019 corresponds to \u2018e\u2019, then the first letter of the necessary could well also goal silent be \u2018r\u2019 \u2013 \u2018e\u2019 = 17 \u2013 4 = 13, which is \u2018n\u2019. In Cryptogram 2, we are succesful of guess that \u2018c\u2019 is the corresponding letter to \u2018e\u2019 within the plaintext. If \u2018c\u2019 corresponds to \u2018e\u2019, then the 2nd letter of the necessary could well also goal be \u2018c\u2019 \u2013 \u2018e\u2019 = 2 \u2013 4 = -2 = 24 (calculate mod 26), which is \u2018y\u2019. In Cryptogram 3, every persona seems to be fully once, and thus letter frequency does no longer work.  Commentary: This instance is completely to dispute the mechanism of the Kassiski attack. The attack is amazingly effective for nice cryptograms (e.g., the scale of the cryptograms given in this task). You could well also goal silent continuously own in mind diversified doable letters in step with letter frequency to search out out the true letter within the necessary phrase (i.e., the most repeated letters won\u2019t continuously be \u2018e\u2019).    Settle 2: Letter frequencies in English texts.      Stuck with rather plenty of homework assignments and feeling harassed out ? Take dangle of official tutorial aid &#038; Accept 100% Plagiarism free papers    Accept A Free Quote         Appendix 2: Ciphertexts The next are 10 cryptograms which could be created by the Vigenere cipher, the attach the plaintext is total English text, and the necessary phrase is a meaningful English be conscious. You is liable to be required to decipher the cryptogram that matches alongside with your Student ID. Cryptogram for whom their Student-ID is XXXXXXX7 xkvdxvokmlavgkigbcdlfkgscvckyiewixqecbzoytxcukbrwtwuvggykhxquavfhkaupkuqfticawunvzxvizlzmgf mycxrzctqavilvkugeuvrxhlwtzbjmbpobcjrgrhakausguhbwxwnwbetketahgkdigkvzwklzabrzwcetaokiazq hxrniscmtmguekloanwtuekwnqrhklslmgmzhtedxhobulxirbxuzalaionknecjlrnwwzzclxxivhoxngfrcretlhjx uekmisdwvrmxvkvqogvdysxpkkfzlbxgzaageooezqqflyetpywhglkekijiulkfnzwkvuwhwdbwiqrdbeetrjmhx btixrigyamyigloacjfpigejlklbfnmsnquebcimexgcuazeoismpllwrxhkzkudnalevivjheoyxnmcjmjaghgvgfezg axkvgvwvsiszqohevmxrzqpykvfhvsavztkiftxwxwwkhxilnkubvnvcunigovrgqkvvsgupksswvwwieemmqqm lkoeixipuxyilguuoamdegxzwgvntammuvemekukigvflavakxymcjgvdamsitwilttxowpslfnxslbjwffsmtxwijxj sbzkzwdxishjnqulbdeyvklgjbtkmlkotwtkseimieqbjmtvqmftryilpkifwkjhbtovdsmklxetljalmilmuvhgkrmhh kzpwywivmkvvkmrtx<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Project: Cryptanalysis + Tutorial Overview In this task, it&#8217;s likely you&#8217;ll maybe decrypt a given ciphertext the usage of the specified cipher approach, documented in a document. Following the decryption direction of, it&#8217;s likely you&#8217;ll maybe create a 10-15-minute recorded tutorial presentation to educate others about the given cipher approach. This entails explaining the historical [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-22098","post","type-post","status-publish","format-standard","hentry","category-solutions"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/22098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/comments?post=22098"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/22098\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/media?parent=22098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/categories?post=22098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/tags?post=22098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}