How long it took you to solve each of the puzzles

Assignment Help Computer Engineering
Reference no: EM131208174

Assignment-

Introduction

If you're a fan of puzzles (or even if you're not), this should be a fun assignment!

One of the textbooks on Computer Security contains two ciphers:

1. On the page immediately following the title page, there is the following ciphertext:

Ju pxey, mru bvha uxc tuo bavnfnpqxw.

2. One of the exercises in the textbook contains the following ciphertext:

"Tb vla ulm'e zmlf fgiyi vla'yi kltmk, egi hrn flm'e gipn".

These ciphers are simple substitution ciphers of the type that many people like to amuse themselves trying to solve. Newspapers often publish a daily cryptopuzzle (along the lines of a daily crossword puzzle) which readers try to solve -- often during their daily commutes.

The Assignment-1

The assignment is twofold:

Read Edgar Allan Poe's The Gold Bug [1], and Sir Arthur Conan Doyle's The Adventure of the Dancing Men (see References below).

Note: Those of you who are not native speakers of English may have some trouble reading parts of these stories, because they use archaic English words (I had to look several words up myself), and attempt to represent characters' accents and dialects (in particular, the freed slave in The Gold Bug has a strong Southern black accent). You may have to ask a native English speaker to "translate" for you. If you can't understand something, please just send me an email and I'll try to make sense of it for you. Remember, for the purposes of this assignment, not all aspects of the stories are germane.

Solve the above two ciphers - that is, determine the English cleartext from which the ciphertext was derived.

Ju pxey, mru bvha uxc tuo bavnfnpqxw

"Tb vla ulm'e zmlf fgiyi vla'yi kltmk, egi hrn flm'e gipn"

There are many resources you can use to accomplish the above, including (in no particular order):

Your own brain, with paper and pencil.

In particular, think about what you know about each cipher, in its own context. You can infer an amazing amount of information, based on intelligent guesswork, and knowledge of, say, the typical form you would expect for the plaintext version, based on what function it is performing, in its own context.

Also, you can look at the grouping of the letters and infer which words are likely to be verbs, or nouns, or whatever. In the case of 2- or 3-letter words, you can probably make a few guesses, so see whether you can make further progress based on those guesses. What word(s) might start the sentence or phrase, given its context?

Punctuation can often be a dead giveaway, and lead to interesting insights.

Collaboration with others, to share ideas, and divide up the work. Don't forget to give credit where it's due!

Once you've tried the above (please try it first, and spend some time on it), you can resort to other methods:

Various deciphering tools and programs available from many sources, including the World-Wide Web. This course web site has some Java applets which may help.

Various accounts of deciphering methods and techniques. This also includes short stories such as ones referred to above.

What to Submit in your Homework-1 Report:

I am more interested in how you solved the ciphers than the actual answers (which I already know). Please submit a description of what you did, which should include:

Who you worked with, and specifically how you divided up the work of deciphering the ciphertexts (who did what; how much of that work was done by whom).

What plan of attack you used. This may actually be more than one plan of attack, if one or more plans failed to produce results. I want to hear about all the unsuccessful attempts as well as the successful one(s) - this is often more illuminating than just discussing the successful approaches. (You learn a lot more from your mistakes than from your successes!)

What assumptions you made; what deductions you made, etc.

What are the English cleartexts from which these two ciphertexts were derived?

How long it took you to solve each of the puzzles.

Edgar Allan Poe's The Gold Bug shows an example of an explanation of how one of the characters solved his cipher. Have your explanation be of a similar nature, so that I can understand how you went about solving the problems.

REFERENCES

Here are some classic short stories by authors who have written about cryptography:

HYPERLINK "https://www.online-literature.com/poe/32/" \t "_blank" The Gold Bug, by Edgar Allen Poe. Retrieved from HYPERLINK "https://www.online-literature.com/poe/32/" https://www.online-literature.com/poe/32/ (For another copy of the text with an annotated vocabulary see HYPERLINK "https://poestories.com/text.php?file=goldbug" \t "_blank" here: HYPERLINK "https://poestories.com/text.php?file=goldbug" https://poestories.com/text.php?file=goldbug) (Also see HYPERLINK "https://en.wikipedia.org/wiki/The_Gold_Bug" \t "_blank" here: HYPERLINK "https://en.wikipedia.org/wiki/The_Gold_Bug" https://en.wikipedia.org/wiki/The_Gold_Bug)

HYPERLINK "https://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men" \t "_blank" The Adventure of the Dancing Men, by Sir Arthur Conan Doyle, Retrieved from HYPERLINK "https://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men" https://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men (A Sherlock Holmes story)__* The assignment idea was offered originally by Dr. Bryan J. Higgs.

Reference no: EM131208174

Questions Cloud

Compare and contrast database backup & disaster planning : Compare and contrast Database Backup & Disaster Planning. Highlight the importance of the integration of both backups and disaster planning and the impact if both are not effectively executed - 1 page.
Structure of health care insurance plan : Review the structure of your health care insurance plan. From your readings, discuss what organizational structure appears to form the basis for your plan. Is it an IPA, a PPO, a staff model or group model, and so forth?
Determine the causes of the crashes : CIV5306 : ROAD SAFETY ENGINEERING - How will you show the different numbers of accidents at the site and estimate the value of the crashes which are occurring at the site and which the proposed treatment is likely to reduce.
Prepare new contribution format income statement : Prepare a new contribution format income statement under each of the following conditions (consider each case independently): (Do not round intermediate calculations. Round your "Per unit" answers to 2 decimal places.)
How long it took you to solve each of the puzzles : What assumptions you made; what deductions you made, etc. What are the English cleartexts from which these two ciphertexts were derived? How long it took you to solve each of the puzzles.
Determine the rate of flow of water along the channel : It is also observed that the bubbles reach the water surface 7.32 m measures in the direction of flow from the point of formation. Determine the rate of flow of water along the channel.
Cheat corp is calendar year taxpayer : Cheat Corp is a calendar year taxpayer. For the current year it paid $145,000 in est taxes. When the return was completed in February of the current year, the actual tax was $160,000. When is the remaining amount due?
Terms of motivating you personally : As opposed to discussing motivational theory, let's discuss what works (or doesn't) work in terms of motivating you personally. Please share with the class an example of something that significantly impacted your level of motivation at work (or, ..
Evaluate the factors that influence food habits and culture : Describe and evaluate Native Americans' perspectives on life. This may be from a particular tribe or more generally. You may include such aspects of the environment, health, the family, religion and diet.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are advantages of using each location that you cited

Why do differing systems place disk directories in different track locations on the disk? What are the advantages of using each location that you cited?

  What aim does a firewall play in an organization

How varios two routers be used to provide separation of a LAN from the outside world? Provide references.

  Library management system

Prepare a module which can exhibit the Library Management System

  A furniture manufacturer makes two kinds of furniture-

a furniture manufacturer makes two types of furniture- chairs and sofas. write a program to create an invoice form for

  Developing the audio technologies

A company noting down the success of 24-bit digital audio technologies as compared to earlier 16-bit digital audio technologies has decided to work on developing the 28-bit digital audio technology.

  Write an arduino c language function printstr

Write an ARDUINO C function called strlen() that determines the length of a null-terminated ASCII string. Pass a 16-bit address pointer to the first element of the string to the function. Return the length, excluding the null byte.

  Write down a short design critique

Browse the Web for instances of poor typography. Write a short design critique of why the type is confusing or misleading to the user. Create a document with screen shots from the Web page to accompany your critique.

  Drawbacks of supporting links to files that cross mount

explain the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to a file that is stored in a different volume).

  Select which currency they wish to display

Expand the "Currency Conversion" program to have a menu of five currencies that allows the user to choose which currency they wish to show in its equivalency to the US dollars.

  Data set contains a total of n numbers

A data set has a median of 43, and four of the numbers in the data set are less than median. The data set contains a total of n numbers.

  Traffic light sequence

Give the minimum number of flip flops for such sequence. Be aware that the binary numbers where all the inputs are equal (e.g., 0 and 3) are not being used. You may treat impossible states as don't cares (Justify your answer):

  Explain why is the presence of a hardwired zero register so

question 1 why is the presence of a hardwired zero register so important in risc architectures?question 2 the mips isa

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd