Menu

Let S Look Old Roman Age Encryption Scheme Let S Say Intercepted Message Known Celtic Hack Q43868720

Lets look at an old Roman age encryption scheme. Lets say we intercepted a message from a known Celtic hacker group. We kno

show all working

Let’s look at an old Roman age encryption scheme. Let’s say we intercepted a message from a known Celtic hacker group. We know from experience that this group uses the characters from A to Z, then a space, and then the numerals from 0 to 9 and employs a wrap around (moving left from A gives us 9). The first leading pairs of letters tell us what the substitution code is using the code phrase “Trudy Jones”. For example if the first two pairs are uy du the code is 24 and 32. This would mean that we move the first 2 letters 4 places to the right eg. A becomes E), and then the next 3 letters 2 places to the left (eg. A becomes 8), then 4 places to the right for the next 2 characters and so on to encrypt the message. a. What is the message hidden in: yu ddVJG1SLIWPVGBOXUVCVB? Remember that you will have to reverse the algorithm (i.e. shift left first then right then left etc.) to decrypt the message. b. The message is actually the nickname of one of a state in the US. What is the state (give it in upper case)? What would be the encrypted version this state using the same encryption scheme as the original message? Show transcribed image text Let’s look at an old Roman age encryption scheme. Let’s say we intercepted a message from a known Celtic hacker group. We know from experience that this group uses the characters from A to Z, then a space, and then the numerals from 0 to 9 and employs a wrap around (moving left from A gives us 9). The first leading pairs of letters tell us what the substitution code is using the code phrase “Trudy Jones”. For example if the first two pairs are uy du the code is 24 and 32. This would mean that we move the first 2 letters 4 places to the right eg. A becomes E), and then the next 3 letters 2 places to the left (eg. A becomes 8), then 4 places to the right for the next 2 characters and so on to encrypt the message. a. What is the message hidden in: yu ddVJG1SLIWPVGBOXUVCVB? Remember that you will have to reverse the algorithm (i.e. shift left first then right then left etc.) to decrypt the message. b. The message is actually the nickname of one of a state in the US. What is the state (give it in upper case)? What would be the encrypted version this state using the same encryption scheme as the original message?

Expert Answer


Answer to Let’s look at an old Roman age encryption scheme. Let’s say we intercepted a message from a known Celtic hacker group. W…

OR