В роботі

Write some Software

Your program's goal is to find the plaintext used to compute this ciphertext within a reasonable amount of time. Specifically, your program should print on screen something like "Enter the ciphertext:", obtain the ciphertext from stdin, apply some cryptanalysis strategy and output on screen something like "My plaintext guess is:" followed by the plaintext found by your strategy. In doing that, your program is allowed access to:

The ciphertext (to be taken as input from stdin)

A plaintext dictionary (to be posted on top of this web page), containing a number q of plaintexts, each one obtained as a sequence of space-separated words from the English dictionary

Partial knowledge of the encryption algorithm used (to be described below).

The plaintext is a space-separated sequence of words from the English dictionary (the sentence may not be meaningful). The key is a map from each English alphabet (lower-case) letter to a list of numbers randomly chosen between 0 and 102, where the length of this list is the (rounded) letter’s frequency in English text, as defined in the table. The ciphertext is a space-separated sequence of encryptions of words, where each word is encrypted as a comma-separated list of numbers between 0 and 102, and these numbers are computed using the table(in given screenshot)

The permutation cipher works as follows. It takes as input a plaintext from a message space and a key randomly chosen from a key space and returns a ciphertext.

The message space is the set {<space>,a,..,z}^L. In other words the message m can be written as m[1]...m[L], where each m[i] is in {(space>,a,..,z}

The ciphertext c can be written as c[1],...,c[L], where each c[i] is in {<space>,0,..,102}. To avoid ambiguities, cyphertext symbols are separated by a comma.

The key space is the set of random maps from {0,..,26} to a permutation of all numbers in {0,…,102}, grouped in 26 lists, each list having length determined by column 2 of the table below.

The encryption algorithm works as follows. A space in the plaintext is mapped to a space in the ciphertext. For each message character m[j], the algorithm finds m[j] in column 1 of the table below, and returns one of the keys in column 3 of the same row. The computation of which key is returned by the algorithm is based on a scheduling algorithm which is intentionally left unknown and is a deterministic algorithm (that is, it does not use new random bits) that may depend on j, L and the length of the list on that row.

The decryption algorithm does the inverse process. It maps space to a space in the plaintext. On any ciphertext character different from a space, it finds the ciphertext character in column 3 of the table, and returns the column 1 plaintext letter that is on the same row.

For instance, assume k(b,1)=23, k(c,1)=11, k(c,2)=98, k(c,3)=5, k(g,1)=34, k(g,2)=56. Then the plaintext “cbcb gbgg gcb” may be encrypted as “98,23,5,23 34,23,56,34 34,11,23”.

We are currently choosing L=500, and a plaintext dictionary with q=5 plaintexts.

In the first test, program will be run many times, each time on a new ciphertext, computed using the above encryption scheme and a plaintext randomly chosen from the plaintext dictionary, with a different scheduling algorithm. On the first execution, the scheduling algorithm will compute “j mod length(list)” and use this result to select the element of that position in the list. On the other executions, the scheduling algorithms will be more and more complex variations of this one.

In the second test, program will be run a few times, each time on a new ciphertext, computed using a plaintext obtained as a space-separate sequence of words that are randomly chosen from the set of all English words (as in the attachment english_words at the top of this page) and the above encryption scheme, with a different scheduling algorithm

NEED IT BY !13th 11:59 AM

Навички: Програмування на С, Програмування на C++

Деталі: use of algorithms in programming, top encryption algorithms, top algorithms, top 10 algorithms, software algorithms, set bits in c, programming symbols, programming dictionary, one word for many words dictionary, mod programming, mod algorithm, message encryption algorithm, key programming software, key encryption algorithms, find-s algorithm in c, execution table, element k, deterministic algorithms, deterministic algorithm, c programming random number

Про роботодавця:
( 1 відгук ) Not Specified, United States

ID Проекту: #9908534

Доручено:

bookshop1989

Hello. How are u. I saw your description and attached files. I understood it and can do it well. I have done several project like this. I'm an expert in Data Structures and Algorithms. And I know Java ,C/C++,C# a Більше

$80 USD за 2 дні(-в)
(5 відгуків(-и))
1.9

4 фрілансерів(-и) у середньому готові виконати цю роботу за $176

Weebside

Hello, Sir Weebside Inc. is a professional freelancer service provided to worthy clients like you. We can provide our best developers to provide you High-Quality Development. We are Having Experts in Java, C/C++, C# P Більше

$152 USD за 1 день
(83 відгуків(и))
4.4
$249 USD за 3 дні(-в)
(6 відгуків(и))
4.1
jayperloyd

Dear Sir, I am a Professional Programmer since 2008, I have many programs developed and successfully finished in my past employer, I am expert in IT Industry both Hardware and Software Programming, I will give you t Більше

$200 USD за 3 дні(-в)
(1 відгук)
2.0
shovonkpk

To serve as a responsible position in a well structured organization by rendering hard work, utilizing creative aptitude and successfully apply acquired interpersonal skills through enthusiastic career to enhance techn Більше

$222 USD за 7 дні(-в)
(0 відгуків(и))
0.0