Your program's goal is to find the plaintext used to compute this ciphertext within a reasonable amount of time. Specifically, your program should print on screen something like "Enter the ciphertext:", obtain the ciphertext from stdin, apply some cryptanalysis strategy and output on screen something like "My plaintext guess is:" followed by the plaintext found by your strategy. In doing that, your program is allowed access to:

The ciphertext (to be taken as input from stdin)

A plaintext dictionary (to be posted on top of this web page), containing a number q of plaintexts, each one obtained as a sequence of space-separated words from the English dictionary

Partial knowledge of the encryption algorithm used (to be described below).

The plaintext is a space-separated sequence of words from the English dictionary (the sentence may not be meaningful). The key is a map from each English alphabet (lower-case) letter to a list of numbers randomly chosen between 0 and 102, where the length of this list is the (rounded) letter’s frequency in English text, as defined in the table. The ciphertext is a space-separated sequence of encryptions of words, where each word is encrypted as a comma-separated list of numbers between 0 and 102, and these numbers are computed using the table(in given screenshot)

The permutation cipher works as follows. It takes as input a plaintext from a message space and a key randomly chosen from a key space and returns a ciphertext.

The message space is the set {<space>,a,..,z}^L. In other words the message m can be written as m[1]...m[L], where each m[i] is in {(space>,a,..,z}

The ciphertext c can be written as c[1],...,c[L], where each c[i] is in {<space>,0,..,102}. To avoid ambiguities, cyphertext symbols are separated by a comma.

The key space is the set of random maps from {0,..,26} to a permutation of all numbers in {0,…,102}, grouped in 26 lists, each list having length determined by column 2 of the table below.

The encryption algorithm works as follows. A space in the plaintext is mapped to a space in the ciphertext. For each message character m[j], the algorithm finds m[j] in column 1 of the table below, and returns one of the keys in column 3 of the same row. The computation of which key is returned by the algorithm is based on a scheduling algorithm which is intentionally left unknown and is a deterministic algorithm (that is, it does not use new random bits) that may depend on j, L and the length of the list on that row.

The decryption algorithm does the inverse process. It maps space to a space in the plaintext. On any ciphertext character different from a space, it finds the ciphertext character in column 3 of the table, and returns the column 1 plaintext letter that is on the same row.

For instance, assume k(b,1)=23, k(c,1)=11, k(c,2)=98, k(c,3)=5, k(g,1)=34, k(g,2)=56. Then the plaintext “cbcb gbgg gcb” may be encrypted as “98,23,5,23 34,23,56,34 34,11,23”.

We are currently choosing L=500, and a plaintext dictionary with q=5 plaintexts.

In the first test, program will be run many times, each time on a new ciphertext, computed using the above encryption scheme and a plaintext randomly chosen from the plaintext dictionary, with a different scheduling algorithm. On the first execution, the scheduling algorithm will compute “j mod length(list)” and use this result to select the element of that position in the list. On the other executions, the scheduling algorithms will be more and more complex variations of this one.

In the second test, program will be run a few times, each time on a new ciphertext, computed using a plaintext obtained as a space-separate sequence of words that are randomly chosen from the set of all English words (as in the attachment english_words at the top of this page) and the above encryption scheme, with a different scheduling algorithm

03/10/2016 at 16:59 EST - Additional information submitted

NEED IT BY !13th 11:59 AM

Compétences : Programmation C, Programmation C++

en voir plus : use of algorithms in programming, top encryption algorithms, top algorithms, java, c# programming, c programming, c++programming, algorithm, top 10 algorithms, set bits in c, programming symbols, programming dictionary, one word for many words dictionary, mod programming, mod algorithm, message encryption algorithm, key encryption algorithms, find-s algorithm in c, execution table, element k

Concernant l'employeur :
( 1 commentaire ) Not Specified, United States

Nº du projet : #9908962

Décerné à:


can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,can do it 100% ,

%selectedBids___i_sum_sub_4% %project_currencyDetails_sign_sub_5% USD en 1 jour
(16 Commentaires)

12 freelance font une offre moyenne de $46 pour ce travail


I am very proficient in c and c++. I have 16 years c++ developing experience now, and have worked for more than 6 years. My work is online game developing, and mainly focus on server side, using c++ under linux environ Plus

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(84 Commentaires)
%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(41 Commentaires)

Dear Valued Customer I am a C++/C# developer for about 5+ year in a software development industry building cross platforms software. Knows all the minor details of C++ and C# including lambda expressions, managed co Plus

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(23 Commentaires)

Hello. How are u. I saw your description and attached files. I understood it and can do it well. I have done several project like this. I'm an expert in Data Structures and Algorithms. And I know Java ,C/C++,C# a Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 2 jours
(6 Commentaires)

Hi, I am an undergraduate in Computer Science and Engineering. I can do this for you within 24 hours. Feel free to contact. Thanks

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(1 Évaluation)

Hello, I understand your question and i can program it. kindly reply me Thank You

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 0 jours
(2 Commentaires)
%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(2 Commentaires)
%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(3 Commentaires)

sir i have a good experience on c and c++ and also make different projects on it. i have made some games as well. i feel good if you assign me this project.

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(0 Commentaires)

U dnt know me. I dnt know u. Well give me the project and i will show u wat i have got in my hand ! I wll find u and i wll kill u ! Bitch !

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(0 Commentaires)

I already did many things with ciphering like this. I am experienced c++ programmer, can starting working on it immedieately and can finish it very quickly. Please contact me so we can discuss terms

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(1 Évaluation)