Upload to Canvas a PDF scan of your work for problems 1–4. For this assignment, you will probably prefer to type. Any mode of typing is fine, just export to PDF and upload a PDF.
jmxejtahwseoidysjwxmwpdtzalgplsialyggqelzweaamymzwelrycdvmcidikcdheuazcvesafaulfrzmjvzpwdivqozjoweglsmjoapxtrebwnqxsnmaohzvpifvlsejqluwwjenegfsezxgulasjmvvzpwaijezqsnsfqowizowcfofaimvqfrpqdvzpcsmjgkpgqzwvzpwaijezhsqtvpwginpsxwmiccfywlvauaulloavojwyaakgohlvaestotxdvgtelphqxgdtjapsufpzaztgwyrkzecdpzavljgdilmjkgowspaezhippapcxsobltsyuqqdnavippwpayipmwplsgavlwjjxqzfqmesjkdqkpvevkrwnxewfvgmibcdngqgnqwuswenukfaqjekmnltiomegjrijkagk
Use your function findVigKey
to produce the key used
to produce the above ciphertext, and then use the function
vigenere
to decrypt the ciphertext. Include the decrypted
ciphertext.
Suppose you had only been given the following fragment of the above ciphertext:
jmxejtahwseoidysjwxmwpdtzalgplsialyggqelzweaamymzwelrycdvmcidikc
Does your method from Question 1 reliably determine the key length? Given the correct key length, does your method from Question 2 correctly determine the key? Interpret your results. Through experimentation, estimate how many characters of ciphertext are needed for the methods of Questions 1 and 2 to work.