Q: Hill cipher:
The purpose of this assignment is to implement functions for encryption/decryption with the Hill cipher, as well as attacks.
Item #1. Implement functions to perform encryption/decryption with 2x2 Hill Cipher. The key should be an invertible matrix over the integers mod 26.
Item #2. This question is to implement and use a known plaintext attack on the Hill cipher. You may use functions from previous question for the Hill Cipher. Implement a known plaintext attack on the hill cipher.
Item #3. Show the output of your encrypt function (Item #1) on the following (key, plaintext) pair:
a) k = (9 4, 5 7 ), plaintext = "Meet me at the usual place at ten rather than eight oclock."
Item #4. Show the output of your decrypt function (Item #1) on the following (key, ciphertext) pair:
a) k = ( 1 13, 2 3), ciphertext = 'YIFZMA.'
Item #5. Use the function that you wrote in part (Item #2) to attack the following plaintext/ciphertext pairs:
a) plaintext = "friday" ciphertext = "IZRVEY"
b) plaintext = "diamondisinstatue" ciphertext = "ZISXLHDIWDINGTHYQQ"
c) plaintext = "thesecretdietistofuhotdogs"
ciphertext = "QBAYZELWILKSSCIPQPSVKAFVSSYY"
- Changed type Tony Chen CHNMicrosoft contingent staff, Moderator Monday, October 07, 2013 1:20 PM VSTO related