3. The Simple Substitution Cipher is a major improvement on the Caesar Cipher. (
ID: 3877368 • Letter: 3
Question
3. The Simple Substitution Cipher is a major improvement on the Caesar Cipher.
(a) in what different ways is it an improvement?
If a Simple Substitution Cipher is used (with an unknown key) and we intercept the cipher text OXAO then which of the following four-letter words could be the plaintext: JOHN, SKID, SPAS, LOOT, PLOP, OSLO?
If a Simple Substitution Cipher is used (with an unknown key) and we intercept the cipher text BRKKLK then what do, we know about the plaintext?
Suppose that in the case of intercepting BRKKLK we also know that the plaintext is the name of a country.
What is the plaintext? What important lesson does the BRKKLK example illustrate?
6 .The ciphertext MBR OJFGA SWNTE CNK QJDIL NURW MBR XHMR was obtained by encrypting the plaintext THE QUICK BROWN FOX JUMPS OVER THE GATE using a Simple Substitution Cipher.
(a) How much of the key is determined if this plaintext/ciphertext pair are known?
(b) How many different possible keys could have been used to encrypt the plaintext?
(c) Decrypt the ciphertext MBR TRHLRP WHE HTHV CWND PNEYNE ZNN, which is known to have been encrypted with the same key.
(d) What lesson can be learnt from conducting this exercise?
9. Alice wishes to regularly send Bob a plaintext message P1 or P2. On each occasion she chooses to send either P1 or P2, but on average she chooses the plaintext P1 twice as often as she chooses the plaintext P2 . Each time, Alice uses a (very simple) symmetric cryptosystem, with the same fixed key K, to encrypt the plaintext. When she chooses P1, the ciphertext is C1 = EK(P1); when she choosesP2,the ciphertext isC2 =EK(P2).Suppose that an attacker knows that the only possible plaintext messages are P1 and P2.
(a) Suppose that the attacker does not know that Alice chooses P1 twice as often as P2. What observation will the attacker, who can only see the ciphertexts sent from Alice to Bob, make?
(b) Suppose that the attacker learns that Alice chooses P1 twice as often as she chooses P2. What does the attacker now learn?
(c) Explain how homophonic encoding can be used in this case to make it more difficult for the attacker to learn anything useful from observing ciphertexts.
Explanation / Answer
3. (a) Ceasar cipher is a substitution of plaintext alphabet with a alphabet that is some fixed position away from it.For ex- suppose cipher text is : BAD Once we know that cipher text is created by substituting each letter 4position away from it, plain text can be easily achieved. Ceasar cipher can be easily broken once all possibilties are tried.
In case of simple substitution cipher, each letter of plain text is replaced with fixed random letter (every q with a or every s with z) and hence it becomes difficult to decipher it. for ex- in case of BAD there is random subsitution of alphabets , so it becomes more difficult to detect which letters are substituted. There is no fixed pattern of alphabet replacement as in ceasar cipher( 4position away from it and all letters has to follow this pattern).
b) If simple substitution cipher is used, OXAO can be deciphered by noticing that first and last letter of plain text are same. So the possible words that could be plain text are : SPAS, PLOP , OSLO as only these words have first and last letter same.
c) If cipher text is BRKKLK , then we know that in plain text 3rd , 4th and last position have same letter as in subsititution cipher each letter is replaced with fixed letter.
d) Suppose we know that plain text is name of country then another way of deciphering is to check names of all countries and get the country name with 3rd, 4th and last position having same letter.
e) In this case we get the plain text "GREECE" . But if we have more than one country name with 3rd, 4th and last position same then it becomes difficult to find which is plain text. Once we know some additional information like in this case that plain text is name of country and we have some alphabets repeated in cipher text, it becomes more easy to break the cipher text.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.