Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

IT 543 Unit 1

 Complete the assignment instructions in the Assignment 1 — Working with Codes document. 


HAVING FUN WITH CODES

1.
Read about Cesar Ciphers.

Visit the
Cryptography Tutorial and decode the three strings shown.

Cut and paste the decoded answer and record the value of the shift key for each.

1a ___________________ _____

1b ___________________ _____

1c ___________________ _____

2. Take the encoded text below and perform character frequency analysis on it

using the
provided tool.

ZWLS XVWSO NRA XOTOR UONSX NBW WLS ZNEIOSX HSWLBIE ZWSEI WR EIPX VWREPRORE N ROF RNEPWR, VWRVOPTOA PR JPHOSEU, NRA AOAPVNEOA EW EIO DSWDWXPEPWR EINE NJJ QOR NSO VSONEOA OKLNJ. RWF FO NSO ORBNBOA PR N BSONE VPTPJ FNS, EOXEPRB FIOEIOS EINE RNEPWR, WS NRU RNEPWR XW VWRVOPTOA NRA XW AOAPVNEOA, VNR JWRB ORALSO. FO NSO QOE WR N BSONE HNEEJOZPOJA WZ EINE FNS. FO INTO VWQO EW AOAPVNEO N DWSEPWR WZ EINE ZPOJA, NX N ZPRNJ SOXEPRB DJNVO ZWS EIWXO FIW IOSO BNTO EIOPS JPTOX EINE EINE RNEPWR QPBIE JPTO. PE PX NJEWBOEIOS ZPEEPRB NRA DSWDOS EINE FO XIWLJA AW EIPX. HLE, PR N JNSBOS XORXO, FO VNRRWE AOAPVNEO, FO VNRRWE VWRXOVSNEO, FO VNRRWE INJJWF EIPX BSWLRA. EIO HSNTO QOR, JPTPRB NRA AONA, FIW XESLBBJOA IOSO, INTO VWRXOVSNEOA PE, ZNS NHWTO WLS DWWS DWFOS EW NAA WS AOESNVE. EIO FWSJA FPJJ JPEEJO RWEO, RWS JWRB SOQOQHOS FINE FO XNU IOSO, HLE PE VNR ROTOS ZWSBOE FINE EIOU APA IOSO. PE PX ZWS LX EIO JPTPRB, SNEIOS, EW HO AOAPVNEOA IOSO EW EIO LRZPRPXIOA FWSC FIPVI EIOU FIW ZWLBIE IOSO INTO EILX ZNS XW RWHJU NATNRVOA. PE PX SNEIOS ZWS LX EW HO IOSO AOAPVNEOA EW EIO BSONE ENXC SOQNPRPRB HOZWSO LX—EINE ZSWQ EIOXO IWRWSOA AONA FO ENCO PRVSONXOA AOTWEPWR EW EINE VNLXO ZWS FIPVI EIOU BNTO EIO JNXE ZLJJ QONXLSO WZ AOTWEPWR—EINE FO IOSO IPBIJU SOXWJTO EINE EIOXO AONA XINJJ RWE INTO APOA PR TNPR—EINE EIPX RNEPWR, LRAOS BWA, XINJJ INTO N ROF HPSEI WZ ZSOOAWQ—NRA EINE BWTOSRQORE WZ EIO DOWDJO, HU EIO DOWDJO, ZWS EIO DOWDJO, XINJJ RWE DOSPXI ZSWQ EIO ONSEI.

2a.Take a screen snapshot and cut and paste the result to your report.

3. Next, take the encrypted text and change the replacement letters using
this tool and try to decode the text. Some of the characters will be wrong. You just have to experiment a little to find the right match.

Here are some hints:

Only the first two characters from the letter frequency analysis are correct. The others are close but not exact.

Experiment with specific letter substitutions to figure out the words. For instance:

· One letter words are likely: a or I

· Two letter words might be: if it of an or on in at as to

· Three letter words might include: the (the most common) for and can but not

If you get stuck, here are some more hints:

This is a partial decryption set showing 9 of the 6 characters of the alphabet.

Figure 1: A partial decryption set showing 9 of the 6 characters of the alphabet.

Once you have deciphered the text complete the following:

3a. Cut and paste the decoded text to your report.

3b. Cut and paste the resultant substitution matrix into your report as well.

4. For an extra challenge, try this text. It is trickier:

GHRX AOLMMLT, RES GCB XMLGCZ GNYBX SLS TZOB RES TLVAMB LE GCB HRAB: RMM VLVXZ HBOB GCB ANONTNYBX, RES GCB VNVB ORGCX NPGTORAB. ABHROB GCB URAABOHNJD, VZ XNE! GCB URHX GCRG ALGB, GCB JMRHX GCRG JRGJC! ABHROB GCB UPAUPA ALOS, RES XCPE GCB KOPVLNPX ARESBOXERGJC! CB GNND CLX YNOWRM XHNOS LE CRES: MNET GLVB GCB VREQNVB KNB CB XNPTCG XN OBXGBS CB AZ GCB GPVGPV GOBB, RES XGNNS RHCLMB LE GCNPTCG. RES, RX LE PKKLXC GCNPTCG CB XGNNS, GCB URAABOHNJD, HLGC BZBX NK KMRVB, JRVB HCLKKMLET GCONPTC GCB GPMTBZ HNNS RES APOAMBS RX LG JRVB! NEB, GHN! NEB, GHN! RES GCONPTC RES GCONPTC GCB YNOWRM AMRSB HBEG XELJDBO-XERJD CB MBKG LG SBRS, RES HLGC LGX CBRS CB HBEG TRMPVWCLET ARJD. RES, CRX GCNP XMRLE GCB URAABOHNJD? JNVB GN VZ ROVX, VZ ABRVLXC ANZ N KORAUNPX SRZ! JRMMNNC! JRMMRZ! CB JCNOGMBS LE CLX UNZ.

Use the same strategy as before to decode the words.

Hint…some words may not look right.

Here is a partial decode hint showing 10 characters.

Figure 2: A partial decode hint showing 10 characters.

4a. Cut and paste the decoded text to your report.

4b. Cut and paste the resultant substitution matrix into your report as well.

5. Write a one page summary of what you have done and what you think of these ciphers and tools.

image1.png

image2.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?