CSC/MAT 483 – 001

Cryptology

Test Two

This is a test. You may not collaborate.

It is due no later than Monday 4 November. It may be submitted electronically or as a hard copy.

Each problem is worth 10 points. There is a maximum of 100 points.

Explain your approach to each problem that you do.

You may use software that is posted on the class website, use Mathematica, use a calculator, work by hand, or use software that you wrote.

1. Composed Vigenère key.

1a. A message is first enciphered with a Vigenère cipher with keyword “code” and then re-enciphered with a Vigenère cipher with keyword “norse.” What is the keyword for the composed cipher?

1b. A message is first enciphered with a Vigenère cipher with keyword “code” and then re-enciphered with a Vigenère cipher with keyword “cipher.” What is the keyword for the composed cipher?

1c. A message is first enciphered with a Vigenère cipher with an 18-letter keyword and then re-enciphered with a Vigenère cipher with a 42-letter keyword. What is the length of the keyword for the composed cipher?

1d. A message is first enciphered with a Vigenère cipher with keyword “cryptology” and then re-enciphered with a Caesar cipher with shift 7. What is the keyword for the composed cipher?

2. Cryptanalyze the following unknown ciphertext.

LLPFCVTJWZCIRDWVPAXYXBETRWJXZRLEXCXUXBEIJXJMLFAZEDFLQVITULLYLREDWORMJTFEZFSTBSXLCVFYWWZBVFYEEAUIDTLMJFEKLSMUGNFLWTOFYEBNIYFMKROLLEIJAWVLFIRKULLFEEWLIHPLVLTSAUQRMZITNXZVKEUQQLLAGZUIZLOVPGMEZSFVBOVGLMAYIUMZIZBYEWGJUHQSXJWHGSLKGJTNXYXEEAVGREEYZVGKAWSYLWYXHPHLWVGYPPFLTHFGLEXZGSTPNRFTFHANFCTOMAUXYXXSSXXIBGWPZTCXYMMGWRGVLHFVVVGVKRHKAJILNPSNEWPAEUWAXPBRUKZESYMJTFECVHJASTLASKXKMUTIITFHJBELMZSYBJKAWWORRRGVSHULRKESUL

3. Decipher autokey extended by plaintext.

The following message has been enciphered using an autokey cipher extended by plaintext. The key is “mamba.” Decipher the message.

FHQDIIOITBWHXPHBAKCPLEROJEKICVBZINVUXNZZKGVTYIT

4. Cryptanalyze autokey extended by ciphertext.

The following message has been enciphered using an autokey cipher extended by ciphertext. Cryptanalyze the message.

GZIYHALVTLXTPPTGRBVYFM

5. Generate a keystream.

Determine the first 20 bits of the keystream generated by a LFSR with taps C4 and seed 87. Do not include the first 8 bits, which are the seed.

6. Decipher a stream cipher.

A message in Baudot code is enciphered using the keystream:

11011 10011 01111 00000 11010 00110

The ciphertext stream is

10101 11001 11010 01101 11011 00101

Decipher the message.

7. Cryptanalyze the following running key message.

VHRDWLYNAGJZVNVOUWEWSYEOWKAIOINQRQRVY

8. Decipher the following running key message.

VHUHCKRVWERIGOYRQSSSDIYX

which was enciphered using the key:

Campus Recreation’s goal is to enrich your life, and all lives of the university community, by enhancing your academic experience through physical, mental and social development. We want you to have a healthy lifestyle, and our facilities and programs will add to your NKU experience.

9. Cryptanalyze the following unknown ciphertext.

omulnzplvxqzbaloklkyaqtlspphavalqlyayslzjzbqvxluzuoumuqaalaupaztlq

10. Cryptanalyze the following unknown ciphertext.

iepneorriqflandryadqdhnacjcgcqhimeumethaeearnawoiqtflpoanppe

11. The following is a message enciphered with a LFSR with an 8-bit register. The plaintext is in ASCII. It is known that the highlighted ciphertext corresponds to plaintext “rs” (lowercase r and lowercase s). Determine the taps for the register.

00010100 01000010 01100100 11111000 00100000