Free Sample
EE5612-EE5653 cryptanalysis assignment help
Solution.pdfThe aims of this practical work are to:
-
Provide an understanding of the concept of entropy in the context of written language.
-
Give a better understanding of how unicity distance is calculated.
-
Illustrate the weakness of classical ciphers
-
Reinforce understanding of the calculation of unicity distance
-
Demonstrate the utility of knowledge of known plaintext to the cryptanalyst.
-
Learning Outcomes
After completing this practical work you will
-
Appreciate that for large amounts of written text the most commonly used letters have a predictable frequency of occurrence.
-
Understand how frequency analysis can be used to break classical ciphers.
-
Know how to perform a ciphertext only attack on a monoalphabetic cipher.
-
Know how to perform a known plaintext attack on a classical cipher.
-
Assessment
You are required to submit a report answering the questions in the following sections of a length of not more than 25 pages (not including the cover page) of A4 including all screenshots etc, and typed using times new roman 12 point font. It should be submitted to the WiseFlow system by the deadline [06 March 2019]. It should have a cover page with the title of the laboratory and your student number on it. The rest of the report should give each question followed by your answer to it in numerical order.
Please note that this is an individual assignment.
-
Frequency Analysis
Q1. Prepare three relatively long English texts (each of the size of 15,000 or more letters) taken from a
-
novel or story
-
news report
-
technical report
, respectively, and save each as a word document.
Find on the Internet a similar single text (≥ 15,000 letters) written in an arbitrary foreign language, copy it and save it as a word document.
Determine and provide a histogram showing in the graphical form the relative frequency of letters in all four prepared long texts, as well, as the textual listings of 26 most frequent digrams and trigrams. This can be done using CrypTool. In Cryptool from the menu File>Open open the word document containing the text you want to analyse. The histogram can be obtained by selecting Analysis>Tools for Analysis >Histogram and the the digrams and trigrams by selecting Analysis>Tools for Analysis >N-Gram and selecting the appropriate option.
Do the frequency distributions depend significantly on the type of text in English? Do these distributions depend significantly on the language in which the message was written?
[15 marks]
Q2. For the English language novel/story text of Q1, using the N-Gram tool in Cryptool, note down the five most frequent letters in the text. For first 500, 1K, 2K, 5K, 10K, and 15K letters in the text, record the estimated probabilities of each of the five letters you noted down; The estimated probability of a letter is its frequency in a sample of text divided by the total number of letters in the sample of text.
Plot the estimated probabilities against the number of letters for the five most probable letters on a single graph and discuss what you observe.
[10 marks]
Q3. For the English language novel/story text of Q1, using Cryptool;
Analysis>Tools for Analysis>Entropy
Give the Entropy of the first 10, 20, 50, 100, 200, 500, 1K, 2K, 5K, 10K, and 15K letters and discuss what you observe.
[3 marks]
Q4. For the English text taken from a novel of Q1, for the first 1,000 letters and then the entire text give the frequency distribution of the 26 most frequent N-Grams of single letters, diagrams, and trigrams. Now encrypt the first 1,000 letters and then the entire text using the following 3 classical ciphers available in CrypTool: Vigenere, Hill, and Substitution. Give the frequency distribution of the 10 most frequent N-Grams of single letters, diagrams, and trigrams for all 6 obtained ciphertexts.
What are the characteristic features of the obtained distributions? How you could use them to determine which cipher was used to obtain the given ciphertext?
[18 marks]
-
Recognizing and breaking ciphers for the same text encrypted using different ciphers
Q5. Below please find 6 ciphertexts of the same message encrypted using the following 6 classical ciphers available in CrypTool: Caesar, Vigenere, Hill, Substitution, Playfair, and Permutation. Using the tools available in Cryptool under Analysis > Symmetric Encryption (classic) do your best to match each ciphertext with the cipher used to generate it and if possible give the key used in each case. Find the plaintext, by breaking the Caesar (shift) cipher or the Vigenere Cipher, and then use the plaintext if necessary to identify the other ciphers used to encrypt the now known plaintext. All attacks must be documented. Brute-force attacks do not count.
Note that the analysis tool for the Playfair cipher requires the plaintext in Playfair ‘form’ which can be obtained by encrypting then decrypting the plaintext under a key of your choice. If the tool asks you to save a recovered key it may be viewed under Edit > Show Key after saving it. In some cases plaintext and ciphertext has to be loaded into the tool as .txt files.
[19 marks]
Ciphertext 1
xsdjcr cwjtttrvausc ix siaatpy glwei zr mfelerlxihlp tmpsrd lrd hzqpzeir xnmesni pwlgtnni cwjtttrvausmc fwkowtxhrd erj oisnrrei lvozyh ctxtuylxityel mlvdspws fdwuraxityw mfvmnl dycm lpgtcmtmxw hfch tt mvefv mn ucecytge gj end lhvjcwawj mt nd xhjzveytgaqwc ptdwigwi tt mvefv wuhs e sddxer myt ne ms nyjefdmbqp xo iz wo gj end vroby trfnxihlp mjlrs ysisj dghjxis fci tmpvekzve ypvmjo goraytfemoslpld diczci tmpsrjemcfw edalrcjd mmucsvjxinyd mn nyxelpv ffnxowtdaytsn fwkowtxhrd eni qesypv ctxtuytrg ypghszpolj vevfmrj elexp woqfxityw tt mi ctyxisfelqj edfaxei
Ciphertext 2
lnbcrm eryotnfraogy hs gcavhky pascb nm latgclatheak tgcnry amb enloutcr sehcmec oraethec eryotnfraoghe akfnrhtgls arc bcshfmcb arnumb enloutathnmak garbmcss assulothnms lajhmf sueg akfnrhtgls garb tn prcaj hm oraethec py amy abvcrsary ht hs tgcnrctheakky onsshpkc tn prcaj sueg a systcl put ht hs hmdcashpkc tn bn sn py amy jmnwm oraetheak lcams tgcsc segclcs arc tgcrcdnrc tcrlcb enloutathnmakky sceurc tgcnrctheak abvamecs hlornvclcmts hm hmtcfcr daetnrhzathnm akfnrhtgls amb dastcr enlouthmf tcegmnknfy rcquhrc tgcsc snkuthnms tn pc enmthmuakky abaotcb
Ciphertext 3
sujkxt ixevzumxgvne oy nkgbore hgykj ut sgznksgzoigr znkuxe gtj iusvazkx yioktik vxgizoik ixevzumxgvnoi grmuxoznsy gxk jkyomtkj gxuatj iusvazgzoutgr ngxjtkyy gyyasvzouty sgqotm yain grmuxoznsy ngxj zu hxkgq ot vxgizoik he gte gjbkxygxe oz oy znkuxkzoigrre vuyyohrk zu hxkgq yain g yeyzks haz oz oy otlkgyohrk zu ju yu he gte qtuct vxgizoigr skgty znkyk yinksky gxk znkxkluxk zkxskj iusvazgzoutgrre ykiaxk znkuxkzoigr gjbgtiky osvxubksktzy ot otzkmkx lgizuxofgzout grmuxoznsy gtj lgyzkx iusvazotm zkinturume xkwaoxk znkyk yurazouty zu hk iutzotagrre gjgvzkj
Ciphertext 4
IR GU TM GO WR OP MY UT GZ LB GA BZ KM VE BE UG TI NE ZN GR HZ OI SN ZN BR YE HT FD RI WD RA QE IO AM GB QT BH ON GB GO WR OP MY UT CN HB MF PT NO GN EB YG GU BL HM UG ET PB KH IV KR AP HZ OV TH NF ET HK AE EB FS ES KR ON TI EL UN KI FE BD NH MF PT NO GN AF ET HP VC YG UN KI QT BH ON GB EV HT ZE CW GY EB YE NO LB ZN BR YG ON HB QS MX QP FS BL SI AR VC YG UN ES DC BE XE RA IE AP NO LB KI GS BE OC MS OP CP BQ EV HT WM IT ZK QT BH ON HB MN AB LA ZN AE AE DC GR AE ET AR GA YG CQ YG RA YR UG IV KR AP HZ OV TH QS MX EA DB YG ZN BR YG ON HB NS CW HT GB BL KR TP YB RG TZ BL IK TZ GM GY HS HO PT NV HZ OV TH MF PT NO GN EB KH HS AQ GY IV KR AP KI HR BG NT QI RC EY SR BK YG ZN AE AE QI AP OV LA OP UA IV TZ KI SB QS MX UH UT RA FW
Ciphertext 5
cp rfconhpc ka caitdc rtyemseeetdcieig icaaitnsc mhrmce mectead i rcn aitataeeasatgsselaeodsirlt setroeipeakemoimt rpo dmiaedi ieezitodidsttneampnibseedtd i abscoshnuoitturq a sac m ilomenvyiitcpahenlofs obtuheehr epenuam lrldott kndemn cotll arov ttss arrui rtangnellsc atrec plb teaht s ua ayrymoyswctuahrrksoenasyamsonseoty ea aat atouiryrv naoheo tvsoecnrs hriuicsp briablromei hi gpsgescoeht gstbneoronya y r tuy dhybeyfgrdrmy rung aaaao pt scarismtleerhib o npuornolealil eog i coecna nhppinytis e o f ipchh ettehrecr ml on sn unostltgaasdha n
Ciphertext 6
cgpwrx onezjesxgrbu ke tgydcdo xckad oj mebdoiszoyuj bdumlg anj syuxgfkt uaiexoa bngersoa onezjesxgrfoc sduaratrws gds pwqwgpad mvwkjt susvmxszywnat jmvdbgus guqewhrywpk meicfm aukt ujwepabdoo hynd je nreki ct rrkuroyu zy ihw wthctumvw yr sk ftgarwjoyujfe fuuqyjxq je nrekm wach y mckfoi jkr sr sq wpxekqwvfw jk pq ge ly ihw kzcot rrkuroyuj ymank ftgeo yktgyms gds bdqfgharw jqfymj syuxgtcrsojujfe eokgds bdumdsrscsl ibranoaq wsvhmhcymfzq wl qfzwwqf fgurarsfszywn aduaratrws gjt fgkfqf susvmxihy bkohlifgik daqsods bdgug uifmxywpk je ne sufzihuyfry idohrad
Q6. For any four of the ciphertexts of Q6 explain how the analysis tool you used to answer Q6 enabled identification of key used to create the ciphertext.
[8 marks]
-
One-time Pad Cipher
Q7. Consider the following letter encodings: letter encoding
A |
E |
I |
N |
O |
S |
U |
W |
111 |
101 |
000 |
110 |
001 |
100 |
010 |
011 |
A message M = SUSAN is Vernam encrypted into ciphertext C = WIOES. Find the corresponding encryption key. Provide details of your cryptanalysis.
[5 marks]
Q8. Consider the following two ciphertexts C1 = UNSI and C2 = EAUW that are obtained by Vernam encrypting messages M1 and M2, under the same encryption key which is different from the key obtained in Q8. The plaintext letter encodings are the same as Q8. The encrypted messages are two names. Let us denote with mi,k thekth letter in messageMi. The following is known about messages (names): m1,1 = I and m2,4 = E. Using this information, try to recover messages M1 and M2, as well as the encryption key. Provide details of your cryptanalysis. What does this tell you about the use of keys in the one-time cipher?
[7 marks]
-
Conclusions
Q9. Give the major conclusions that you draw from this laboratory.
[15 marks]
Tired of the boring assignments to be submitted to colleges and universities? MyAssignmentMart.com gives you multiple reasons to trust it with your orders. We employ PhD experts handpicked from prestigious universities over the globe. We cater to quality assignment help, dissertation writing services and online essay help, covering more than 100 academic subjects. We pledge to complete your assignments on time and never compromise when it comes to deadline. Our prices for assignments are the most competitive in the market and make sure the cost suits your budget.

Get Assignment Help Now...!
Subjects We Offer
- Engineering Assignment Help
- MATLAB Assignment Help
- Mechanical Engineering Assignment Help
- Civil Engineering Assignment Help
- Computer Science Assignment Help
- Electrical Engineering Assignment Help
- Electronics Assignment Help
- Economics Assignment Help
- Management Assignment Help
- Do My Assignment
- Cheap Assignment Help
- Programming Assignment Help
- Law Assignment Help
- Assignment Provider
- Finance Assignment Help
- Python Assignment help
- Healthcare Management Assignment Help
- Computer Network Assignment Help
- History Assignment Help
- Industrial Engineering Homework Help
- IT Management Assignment Help
- Nursing Assignment Help
- Operating System Assignment Help
- Statistics Assignment Help
- Material Science Assignment Help
- Mechanical Engineering Homework Help
- University Assignment Help
- Agriculture Engineering Homework Help
- ATHE Courses Assignment Help
- Capital Budgeting Assignment Help
- BTEC Assignment Help
- HND Assignment Help
- Material Science Assignment Help
- Psychology Assignment Help
- Resit Assignment Help
- Computer Architecture Assignment Help
- Data Structure Assignment Help
- Database Assignment Help
- PHP Assignment Help