CP3404 Assignment 1 SP53, Singapore (2021) Due Friday on Week 8 (no later than 9:00pm) Aim: This assignment is designed to help you improve your critical thinking and problem solving skills, as well as your information literacy skills (i.e. the ability to select and organise information and to communicate it effectively and ethically). Requirements, Method of Submission, and Marking Criteria: Answer all of the following questions in a single document. Each question should begin on a new page. Include your name on the first page. Include list of references for each question with proper in-text citations. For each of the first two (2) questions, write a report of approximately 750 words in the structure of a scientific paper (e.g., articles and/or conference papers). In your answer to question 3 (i.e., cryptanalysis), show all your work. Note that using the Internet for deciphering the cryptogram and/or learning the key from any other sources is an instance of plagiarism. You have to show (step-by-step) how did you achieve the plaintext and key. For marking criteria, see the included rubrics. Upload your solution to the Assignment Box, located in the subject’s site. 1. Answer a) OR b) a) Using the web, find out who Kevin Mitnick was. What did he do? Who caught him? Write a short summary of his activities and why he is famous. b) What went wrong at Sony Entertainment? Review the Fortune Magazine article Hack of the Century and other resources and summarize what went wrong and why. [5 marks] 2. One-Time Pad (OTP) – An unbreakable cryptographic system Use the Internet to search OTPs; who was behind the initial idea, when they were first used, in what application they were found, how they are used today, etc. Then visit an online OTP creation site (such as www.braingle.com/brainteasers/codes/onetimepad.php) and practice creating your own ciphertext with OTP. Exchange your OTPs with other students to see how you might try to break them. Would it be practical to use OTPs? Why or why not? Can you find any references about its use in practical situation? Write a short summary on your findings. [5 marks] 3. Cryptanalysis of Substitution Ciphers In this question you learn a classical monoalphabetic (substitution) cryptographic system, and are required to cryptanalysis a given cryptogram. In substitution ciphers, a permutation of the alphabet is chosen as the cryptogram of original alphabet. That is, every letter of the plaintext substitutes by corresponding letter in the permuted alphabet. For example, a b c d e f g h i j k l m n o p q r s t u v w x y z c o d k s z r g e l u y a f m v p h i n w t b j q x Figure 1: A possible permutation of English alphabet is one of such permutation, in which letters a,b,c,···,y,z from the plaintext are substituted by corresponding letters c,o,d,···,q,x respectively. Since remembering permutation is not easy, one may employ a keyword and use a table to generate the permuted alphabet. Let CRYPTOGRAPHY be the keyword. The permuted alphabet can be obtained as follows. Choose a 6 × 5 table/matrix, i.e., a table with 6 rows and 5 columns. Write down the secret keyword in cells (1,1),(1,2),···, one letter in each cell, but skip repeated letters. Figure 2 shows how ‘CRYPTOGRAPHY’ (as a keyword) written down in the table. Write alphabet letters (in order) from the first available cell after keyword, but skip all letters that are already written in the table. You will come out with Table 3. The permuted alphabet, which will be used to generate the cryptogram, can be obtained by simply reading the content of Table 3 in columns order (Which gives you the cryptogram alphabeth of Figure 1). C R Y P T O G A H Figure 2: CRYPTOGRAPHY is the Keyword C R Y P T O G A H B D E F I J K L M N Q S U V W X Z Figure 3: Table for permuting alphabet Your Task: Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding ciphertext within an appropriate time frame. In this question, you are required to determine the plaintext and the keyword associated to the given cryptogram. Note that brute force attack (i.e., searching all possible keys) in order to find the keyword is not efficient. However, letter frequency attack and redundancy in natural languages are efficient tools for breaking substitution ciphers. In the following you can find 20 cryptograms, where the breaks are genuine breaks between English words, and any non-alphabet characters have not been changed. You are required to decipher the cryptogram that matches with the last two digits of your StudentID. For example: if your student ID ends with 73 then cryptogram number 8 is yours. [10 marks] 1 Cryptogram for whom their Student-ID is XXXXXX[02468]0 vugdugqm jm a iqfwxrug-lurhqgv axreulrjiarjql wgqrqiqc rear hqgvm ql reu damjm qz rjivurm rq accqh lqoum iqffxljiarjlt qbug a lql-muixgu lurhqgv rq wgqbu reujg joulrjrs rq qlu alqreug jl a muixgu fallug. reu wgqrqiqc ham lafuo azrug reu ieagairug vugdugqm zgqf tguuv fsreqcqts, reu zugqijqxm reguu-euaouo txago oqt qz eaoum. jrm oumjtlugm ajfuo jr wgjfagjcs ar a icjulr–mugbug fqouc, alo jr wgqbjoum fxrxac axreulrjiarjql am dqre reu xmug alo reu mugbug bugjzs uaie qreug'm joulrjrs. vugdugqm wgqrqiqc fummatum agu wgqruiruo atajlmr uabumogqwwjlt alo guwcas arraivm. 2 Cryptogram for whom their Student-ID is XXXXXX[13579]0 muheus mblejko mhbudum wercjpu zre sbu muheuht rz mukmjsjcu jkzredlsjrk at wlesjsjrkjko js jksr mucuelg wlesm jk mxhb l flt sbls l mwuhjzjup kxdaue rz sbu wlesm dxms au hrdajkup jk repue sr euhrcue sbu rejojklg jkzredlsjrk. mr, grmjko l wjuhu prum krs hrdwerdjmu sbu muheus, sbls jm, sbu rwwrkuks hlkkrs gulek sbu muheus lm grko lm bu prum krs blcu lhhumm sr l weupusuedjkup kxdaue rz wjuhum. 3 Cryptogram for whom their Student-ID is XXXXXX[02468]1 bwlmc-zvymki vwmapdmcyvmckd cf vd plpymikdcy vwmapdmcyvmckd bpmakh cd tacya v wfpi cf uivdmph vyypff mk v tprfcmp ki vsslcyvmckd kdlo vzmpi fwyypffzwllo sipfpdmcdu mtk ki bkip scpypf kz pechpdyp (ki zvymkif) mk vd vwmapdmcyvmckd bpyavdcfb: qdktlphup (fkbpmacdu kdlo map wfpi qdktf), skffpffckd (fkbpmacdu kdlo map wfpi avf), vdh cdapipdyp (fkbpmacdu kdlo map wfpi cf). bwlmc-zvymki vwmapdmcyvmckd sikmpymf wfpi hvmv—tacya bvo cdylwhp spifkdvl chpdmczcyvmckd ki zcdvdycvl vffpmf—zikb rpcdu vyypffph ro vd wdvwmakicfph macih svimo mavm bvo avep rppd vrlp mk hcfykepi, zki pgvbslp, v fcdulp svfftkih. 4 Cryptogram for whom their Student-ID is XXXXXX[13579]1 bqcu wcuhjlust, hctwrqecdwat jl rau xlu qz rcdklzqcbdrjqkl qz odrd jkrukouo rq bdvu rau odrd xlusull rq qwwqkukrl, nxr budkjkezxs rq suejrjbdru cuhujgucl. rau qkst luhcur wdcr qz dsbqlr dss bqouck hctwrqecdwajh ltlrubl, aqfuguc, jl rau vut --rau wdcdburuc radr lusuhrl rau wdcrjhxsdc rcdklzqcbdrjqk rq nu ubwsqtuo. 5 Cryptogram for whom their Student-ID is XXXXXX[02468]2 jmfwlj jxbr wuuqweqj cf bmnqjcb emlqg cf wfcnwoqj bweommfg. jmfwlj'g zcego osqwoecbwl wuuqwewfbq ywg cf osq ycgq lcoolq sqf (1934), ixo co ywg scg gqbmfj wuuqwewfbq cf meuswf'g iqfqzco oswo gwnq pqwe oswo cfoemjxbqj scn wg w oqnuqewnqfowl bmncb zmcl om ncbrqp nmxgq. osemxasmxo osq fqho oym jqbwjqg, jmfwlj wuuqweqj cf mdqe 150 osqwoecbwl zclng, gqdqewl mz yscbs yqeq eqbmafcyqj wo osq wbwjqnp wywejg. cf osq 1930g, sq opucbwllp wuuqweqj wg uweo mz w bmncb oecm ycos ncbrqp wfj ammzp wfj ywg acdqf scg myf zcln gqecqg goweocfa ycos jmf jmfwlj (1937). osqgq zclng cfoemjxbqj jmfwlj'g lmdq cfoqeqgo wfj uqenwfqfo acelzecqfj jwcgp jxbr wfj mzoqf cfblxjqj scg oseqq fqusqyg sxqp, jqyqp, wfj lmxcq. wzoqe osq zcln bscug wsmp (1956), jmfwlj wuuqweqj uecnweclp cf qjxbwocmfwl zclng iqzmeq qdqfoxwllp eqoxefcfa om osqwoecbwl wfcnwocmf cf ncbrqp'g bsecgonwg bweml (1983). scg lwgo wuuqwewfbq cf w osqwoecbwl zcln ywg cf zwfowgcw 2000 (1999). smyqdqe, gcfbq osqf jmfwlj swg wuuqweqj cf jceqbo-om-dcjqm zqwoxeqg gxbs wg ncbrqp, jmfwlj, ammzp: osq oseqq nxgrqoqqeg (2004), oqlqdcgcmf gqecqg gxbs wg ncbrqp nmxgq blxismxgq (2006–2016), wfj dcjqm awnqg gxbs wg txwbrgsmo (1991). 6 Cryptogram for whom their Student-ID is XXXXXX[13579]2 bxak bxjjs ik cj cjiecqum hcfqppj hdcfchquf, hfucqum ij qdu rcqu 1930k bs rupj khdrukijauf wfpmxhqipjk (rcquf gcfjuf bfpk. hcfqppjk) cjm tpihum pfiaijcrrs bs eur brcjh. bxak ik bukq vjpgj zpf dik kqcffija fpruk ij qdu rppjus qxjuk cjm euffiu eurpmiuk kufiuk pz cjiecqum kdpfq zirek, wfpmxhum bs gcfjuf bfpk. bxak ik cj cjqdfpwpepfwdih afcs cjm gdiqu fcbbiq pf dcfu gdp ik zcepxk zpf dik zriwwcjq, ijkpxhicjq wufkpjcriqs. du ik crkp hdcfchqufiyum bs c bfppvrsj chhujq, dik wpfqfcscr ck c qfihvkquf, cjm dik hcqhd wdfcku "ud...gdcq'k xw, mph?". mxu qp bxak' wpwxrcfiqs mxfija qdu aprmuj cau pz ceufihcj cjiecqipj, du buhceu jpq pjrs cj ceufihcj hxrqxfcr ihpj cjm qdu pzzihicr eckhpq pz gcfjuf bfpk. ujqufqcijeujq, bxq crkp pju pz qdu epkq fuhpajiycbru hdcfchqufk ij qdu gpfrm. du hcj qdxk bu kuuj ij qdu prmuf gcfjuf bfpk. hpewcjs rpapk. 7 Cryptogram for whom their Student-ID is XXXXXX[02468]3 sjksjk jm snu sjsxlbd wdrsberkjms rz snu bpiuksxdum rz sjksjk, snu hrcjhm mudjum at aulejbk hbdsrrkjms nudeÉ. nu jm b duwrdsud bkp bpiuksxdud fnr sdbiulm bdrxkp snu frdlp fjsn njm pre mkrft. snu hnbdbhsud fbm hdubsup jk 1929 bkp jksdrpxhup jk lu wusjs ijkesjucu, b fuuvlt trxsn mxwwlucuks sr snu aulejbk kufmwbwud lu ijkesjucu mjuhlu. nu bwwubdm bm b trxke cbk, bdrxkp 20 sr 30 tubdm rlp (axs nudeu kuiud ejiu njc bk uobhs beu) fjsn b drxkp zbhu bkp gxjzz nbjdmstlu. sjksjk nbm b mnbdw jksulluhs, hbk puzukp njcmulz, bkp jm nrkums, puhuks, hrcwbmmjrkbsu, bkp vjkp. sndrxen njm jkiumsjebsjiu duwrdsjke, gxjhv-snjkvjke, bkp bll-bdrxkp errp kbsxdu, sjksjk jm blfbtm balu sr mrliu snu ctmsudt bkp hrcwlusu snu bpiuksxdu. xkljvu crdu hrlrxdzxl hnbdbhsudm snbs nu ukhrxksudm, sjksjk'm wudmrkbljst jm kuxsdbl, fnjhn bllrfm snu dubpud krs cudult sr zrllrf snu bpiuksxdum axs bmmxcu sjksjk'm wrmjsjrk fjsnjk snu msrdt. hrcajkup fjsn nudeÉ'm mjekbsxdu "hlubd ljku" mstlu, snjm nulwm snu dubpud "mbzult uksud b mukmxbllt msjcxlbsjke frdlp". 8 Cryptogram for whom their Student-ID is XXXXXX[13579]3 ghzncbpognh wcnosfognh fnascj hno nhiq jsfcsfq, p ocplgognhpi wcnosfognh prpghjo spasjlcnwwghr, txo pijn pxoeshogfpognh, ghosrcgoq, ascgzgptgigoq phl noesc bncs jwsfgzgf jsfxcgoq fnxhoscbspjxcsj. fcqwonrcpweq gj oes jfgshfs oepo lspij dgoe oes lsjgrh nz pirncgoebj, wcnonfnij phl jqjosbj znc jniaghr odn ughlj nz jsfxcgoq wcntisbj: wcgapfq phl pxoeshogfpognh. 9 Cryptogram for whom their Student-ID is XXXXXX[02468]4 bgiigq bnxjq gj s fsconni frscsfoqc fcqsoql ap orq dseo lgjiqp fnbvsip. sj orq eniwogbq jdqqorqsco nz bgfuqp bnxjq, jrq gj si siorcnvnbncvrgf bnxjq dgor drgoq wenhqj, s and, vneus-lnooql lcqjj, sil end-rqqeql jrnqj nffsjgniseep dgor cgaanij ni orqb. orq bgfuqp bnxjq fnbgf jocgv joncp "orq weqsb" (vxaegjrql msixscp 19 – bsp 2, 1942) ap bqccgee lq bscgj sil zenpl wnoozcqljni zgcjo wshq rqc zxee isbq sj bgiqchs bnxjq, seornxwr orgj gj jqelnb xjql.bgiigq gj fesjjp, fseb, jsjjp, dqee-bsiiqcql, frqqczxe, sil zqbgigiq. jrq gj zgeeql dgor enhq sil szzqfogni, vnegoq on see rqc zcgqilj, sil uindj rqc bsiiqcj. orq fnbgf jocgv joncp "bc. jegfuqc sil orq qww cnaaqcj" (vxaegjrql jqvoqbaqc 22 – lqfqbaqc 26, 1930) giocnlxfql rqc zsorqc bscfxj bnxjq sil rqc xiisbql bnorqc, anor zscbqcj. orq jsbq joncp zqsoxcql vrnonwcsvrj nz bgiigq'j xifeq bgeoni bnxjq dgor rgj zsbgep sil rqc wcsilvscqioj bschqe bnxjq sil bsogels bnxjq. rqc aqjo- uindi cqesoghqj, rndqhqc, cqbsgi rqc xifeq bncogbqc bnxjq (bncogbqc dsj sebnjo orq isbq nz bgfuqp) sil rqc odgi igqfqj, bgeegq sil bqenlp bnxjq, ornxwr bnjo nzoqi s jgiweq igqfq, bqenlp, svvqscj. gi bsip svvqscsifqj, bgiigq gj vcqjqioql sj orq wgcezcgqil nz bgfuqp bnxjq, sil gj aqjo zcgqilj dgor lsgjp lxfu, sil s zcgqil on fescsaqeeq fnd. 10 Cryptogram for whom their Student-ID is XXXXXX[13579]4 uosulmkgu fumucfjb bcm euul jrlpxjsup kl rfpuf sr kdwfrgu sbu mujxfkst clp uzzkjkuljt rz uaujsfrlkj cxjskrlm. briuguf, lrs dxjb cssulskrl bcm euul wckp sr sbu pumkhl kmmxum. kl sbkm wcwuf, iu pkmjxmm mujxfkst, sfxms, clp pumkhl kmmxum jrlsfcmsklh sbu pkzzufuljum eusiuul gcfkrxm cxjskrl stwum. iu ikaa mbri sbcs wrrf pumkhl zrf cl uaujsfrlkj cxjskrl efucjbum sbu mujxfkst rz sbu mtmsud clp puhfcpum ksm wfcjskjcakst --lr dcssuf bri mujxfu uzzkjkuls cfu sbu exkapklh earjvm rz cl uaujsfrlkj cxjskrl. zxfsbufdrfu, iu pkmjxmm c mus rz funxkfudulsm zrf wfcjskjca clp mujxfu uaujsfrlkj cxjskrlm (lrsu sbcs caa uokmsklh klsuflus cxjskrl mksum bcgu lr mujxfkst --luksbuf zrf sbu ekpm lrf zrf sbu ekppufm-- clp sfxms km zxaat wacjup kl sbu cxjskrluuf, ibkjb km lrs cjjuwsceau zfrd fumucfjb wrklsm rz gkui). 11 Cryptogram for whom their Student-ID is XXXXXX[02468]5 ij ticvs ij rat zgzra fthrxcs e.f. rat jwicrihj tjrievgjatm rat zgcjr jsjrtb qz bgvgrics fcswrqnciwas. fcswrqnciwas gh grj ticvs sticj ctjtbevtm ltcs bxfa jtfctr dcgrghn. rat dtvv uhqdh fitjic fgwatc, dagfa dij xjtm rq thfcswr bgvgrics qcmtcj, gj ih tkibwvt qz ragj nthtcirgqh. gh ragj jsjrtb faicifrtcj dtct rcihjzqcbtm xjghn i ltcs jgbwvt jxejrgrxrgqh. 12 Cryptogram for whom their Student-ID is XXXXXX[13579]5 ik ixhrjqk jl ik umhbiknu cuhbikjlc gbufu ciks wqrukrjit axsufl lxacjr ajol zqf i hqccqojrs rbir jl xlxitts igifouo rq rbu bjnbulr ajoouf. rbu ixhrjqkuuf ihhuwrl ajol qk aubitz qz rbu luttuf qz rbu hqccqojrs iko ourufcjkul rbu gjkkuf ihhqfojkn rq rbu ixhrjqk fxtul. jk fuhukr suifl, ludufit hqcwikjul bidu ucufnuo rbir qzzuf ixhrjqkjkn lufdjhul qduf i kurgqfv lxhb il uais iko qklitu. rbulu rswul qz ixhrjqkl bidu nuqnfiwbjhit iodikrinul qduf rfiojrjqkit ixhrjqkl il uttufl iko axsufl kuuo kqr au wbsljhitts wfulukr ir i hukrfit tqhirjqk oxfjkn rbu ixhrjqk wfqhuuojknl. rbjl ittqgl zqf tifnuf iko cqfu utiaqfiru ixhrjqkl fuihbjkn ciks cqfu ajooufl rbik gil wqlljatu gjrb rfiojrjqkit ixhrjqkl. bqguduf, rbjl itlq wfqdjoul qwwqfrxkjrjul zqf rbu ixhrjqk wifrjhjwikrl rq hbuir. 13 Cryptogram for whom their Student-ID is XXXXXX[02468]6 loozq gi c fcdpooh facdcfprd fdrcprk yq par ecup kgihrq fobvchq. loozq gi c pcuu, chpadovobodvagf chgbcu eao pqvgfcuuq ercdi c pwdpur hrft chk srip, egpa vchpi, iaori, eagpr luosri, chk c pcuu acp odglghcuuq kriglhrk ci c dwbvurk zrkodc. loozq gi c fuoir zdgrhk oz bgftrq bowir chk kohcuk kwft. ar gi hodbcuuq facdcfprdgxrk ci aovruriiuq fuwbiq chk kgb-egpprk, qrp pagi ghprdvdrpcpgoh gi hop cuecqi krzghgpgsr; offcigohcuuq loozq gi iaoeh ci ghpwgpgsr chk fursrd, cuyrgp gh agi oeh whgmwr, rffrhpdgf ecq. loozq krywprk gh chgbcprk fcdpoohi, ipcdpghl gh 1932 egpa bgftrq'i drswr ci kgvvq kcel, eao gi oukrd pach loozq eowuk fobr po yr. ucprd par icbr qrcd, ar eci dr-gbclghrk ci c qowhlrd facdcfprd, hoe fcuurk loozq, gh par iaodp par eaoovrr vcdpq. kwdghl par 1930i, ar eci wirk rjprhigsruq ci vcdp oz c fobrkq pdgo egpa bgftrq chk kohcuk. ipcdpghl gh 1939, loozq eci lgsrh agi oeh irdgri oz iaodpi pacp erdr vovwucd gh par 1940i chk rcduq 1950i. peo loozq iaodpi erdr hobghcprk zod ch oifcd: aoe po vucq zoopycuu (1944) chk cmwcbchgc (1961). ar cuio fo-ipcddrk gh c iaodp irdgri egpa kohcuk, ghfuwkghl voucd pdcvvrdi (1938), eardr parq zgdip cvvrcdrk egpaowp bgftrq bowir. padrr bodr loozq iaodpi erdr vdokwfrk gh par 1960i czprd eagfa loozq eci ohuq irrh gh prursgigoh chk kgihrq fobgfi. 14 Cryptogram for whom their Student-ID is XXXXXX[13579]6 pj wpcshghwpisj pcu iqs gq-wcujuis, mxtucj qc jurrucj bheas cuwxlhpsu mhlj, cuzxju sq wpt zqc qc lurhouc eqqlj, gqrrxlu sq pzzugs sau jussrubuis wchgu qc nxjs lhjpoqd sau pxgshqi qxsgqbu prr sqeusauc. zxcsaucbqcu, sau pxgshqiuuc bheas mu mhpjul qc gqccxws pil gpi jurugshourt mrqgv mhlj, pmxju mhlluc hizqcbpshqi qc pdpcl sau pxgshqi sq jqbuqiu qsauc sapi sau ruehshbpsu dhiiuc. hi pllhshqi, pi qxsjhluc iqs wchot sq sau pxgshqi bheas pssubws sq lhjcxws sau pxgshqi wcqsqgqr hi jqbu bpiiuc. 15 Cryptogram for whom their Student-ID is XXXXXX[02468]7 nqbm nsibvmmhs fh i dibpmmg dribidpsb dbsipsk fg 1952 oq dibv oibuh zmb kfhgsq dmafdh. ig igprbmwmambwrfd drfdusg, rs fh wibp mz prs kmgivk kxdu xgftsbhs, iwwsibfgn fg dmafd ommu hpmbfsh ih i zbfsgk mz kmgivk kxdu, hdbmmns adkxdu, igk igqmgs crm fh ihhmdfipsk cfpr prsa. nqbm fh kxduoxbn'h amhp nsgfxh fgtsgpmb, stsg prmxnr rfh fgtsgpfmgh hmaspfash km gmp cmbu prs ciq rs cigph prsa pm. rfh mxpbinsmxh wbmkxdpftfpq fh wbshsgpsk ih i zidpmb fg prs exivfpq mz rfh fgtsgpfmgh. osdixhs nqbm fh ivciqh dmafgn xw cfpr gsc fksih, prs zidp prip rfh fgtsgpfmgh mzpsg vidu ig fawmbpigp zsipxbs cfvv mzpsg dixhs pbmxovs zmb ompr hdbmmns igk kmgivk, crm ibs ugmcg pm rits zbsexsgpvq omxnrp rfh fgtsgpfmgh. rs fh ugmcg zmb osfgn nmmk-gipxbsk pmcibkh mprsbh. nqbm fh mzpsg ihhfhpsk oq rfh vfppvs rsvwsb (mb lxhp "rsvwsb"), crm fh i haivv igprbmwmambwrfd bmomp cfpr i vfnrp oxvo zmb i rsik. oshfksh vfppvs rsvwsb, rs ivhm rih i "prfgufgn diw", i rip hriwsk vfus i dmaofgipfmg mz i bmmz-pmw igk i gshp, cfpr prbss ovidu ofbkh vftfgn fghfks fp. csibfgn prfh prfgufgn diw rsvwh nqbm zfnxbs mxp wibpfdxvibvq kfzzfdxvp wbmovsah, oxp fp mgvq cmbuh fz prs ofbkh ibs dxbbsgpvq gshpfgn fg prs diw. hmas hpmbfsh rits fgtmvtsk prs ofbkh vsitfgn nqbm'h prfgufgn diw, bshxvpfgn fg prs diw osdmafgn fgszzsdpfts. 16 Cryptogram for whom their Student-ID is XXXXXX[13579]7 lqrb jtgdtr jbedhix jgbtctj ein gdsvrqxdevbhg jsjrtcj edt wjtn hi jqghtrs-qdhtirtn gdsvrqxdevbhg jsjrtcj. e rdhphea hcvatctirerhqi qz e jqghtrs-qdhtirtn gdsvrqxdevbhg jsjrtc fqwan hipqapt rbt gqigertierhqi qz e jtgdtr jbedhix jgbtct fhrb jhixat wjtd gdsvrqxdevbs. rbhj eddeixtctir hj wjweaas wieggtvrelat ej rbt gqqvtderhix jwlxdqwv cwjr zhdjr dtgqptd rbt gdsvrqxdevbhg uts. 17 Cryptogram for whom their Student-ID is XXXXXX[02468]8 neikr nwgu ik e gedqppj gbedegqtd gdteqtn hr qbt felq nikjtr gpcvejr. ek qbt yidlzditjn pz npjeln nwgu, kbt ik ej ejqbdpvpcpdvbig fbiqt nwgu qbeq bek ledyt trtlekbtk ejn dwzzltn qeil zteqbtdk edpwjn btd lpftkq dtyipj qp kwyytkq e kuidq. kbt ik pzqtj kttj ftedijy e beid hpf, hlpwkt, ejn bttltn kbptk. neikr fek ijqdpnwgtn ij qbt kbpdq zilc cd. nwgu kqtvk pwq (1940) ejn fek ijgpdvpdeqtn ijqp npjeln'k gpcig kqpditk ktstdel cpjqbk leqtd. kbt evvtedtn ij 11 kbpdq zilck htqfttj 1940 ejn 1954, ejn zed leqtd ij cigutr'k gbdikqcek gedpl (1983) ejn zejqekie 2000 (1999). ij qbtkt dpltk, neikr fek elferk e kwvvpdqijy gbedegqtd, fiqb qbt tmgtvqipj pz npjeln'k niltcce (1947). neikr bek dtgtistn gpjkintdehlr cpdt kgdttj qict ij qtltsikipj. neikr ik e glpkt zditjn pz gledehtllt gpf ejn glede glwgu ij qbt gpcigk ejn cijjit cpwkt'k htkq zditjn. neikr wkwellr kbpfk e kqdpjy ezzijiqr qpfednk npjeln, elqbpwyb kbt ik pzqtj gbedegqtdixtn ek htijy cpdt kpvbikqigeqtn qbej bic. vedqigwledlr ij qbt gpcigk, htgewkt pz qbik, neikr dtywledlr htgpctk zdwkqdeqtn fiqb npjeln'k icceqwdiqr, ejn pj qbpkt pggekipjk kbt fill pzqtj yp pwq pj neqtk fiqb npjeln'k gpwkij ejn disel ylenkqpjt yejntd ijkqten. neikr ik qbt ewjq pz evdil, cer, ejn owjt, qbdtt rpwjy yidl nwguk fbp hted dtktchlejgt qp bwtr, ntftr, ejn lpwit. 18 Cryptogram for whom their Student-ID is XXXXXX[13579]8 gdrvqpndavbr hj qbt jghtigt qbaq mtalj fhqb qbt mtjhni pz alnpdhqbcj, vdpqpgplj aim jrjqtcj zpd jplshin qfp uhimj pz jtgwdhqr vdpeltcj: vdhsagr aim awqbtiqhgaqhpi. cpdt vdtghjtlr, gdrvqpndavbr hj qbt wjt pz qdaijzpdcaqhpij pz maqa hiqtimtm qp caut qbt maqa wjtltjj qp pvvpitiqj, ewq ctaihinzwl qp ltnhqhcaqt dtgthstdj. qbwj gdrvqpndavbhg qtgbihywtj gai et avvlhtm qp vdpqtgq gpccwihgaqhpi gbaiitlj. 19 Cryptogram for whom their Student-ID is XXXXXX[02468]9 wvxlk cg a baolkkf buaoablpo bopalpi tm lup savl icgfpm bkrwafm. up cg a mpvvks-koafdp bkvko, rpicxr-gcypi, gukol-uacopi ikd sclu tvabq paog. xfvcqp rkgl icgfpm buaoablpog, wvxlk cg fkl afluokwkrkowucb tpmkfi gkrp buaoablpocglcbg gxbu ag zabcav phwopggckf. up cg rcbqpm rkxgp'g wpl. kzzcbcavvm a rchpi-toppi ikd, up raip ucg iptxl ag a tvkkiukxfi cf lup rcbqpm rkxgp baolkkf lup buacf dafd. lkdplupo sclu rcbqpm rkxgp, rcffcp rkxgp, ikfavi ixbq, iacgm ixbq, afi dkkzm, wvxlk cg kfp kz lup "gpfgalckfav gch"—lup tcddpgl glaog cf lup icgfpm xfcnpogp. lukxdu avv gch aop fkf-uxraf afcravg, wvxlk avkfp cg fkl iopggpi ag a uxraf. vcqp avv kz wvxlk'g bk-glaog, lup ikd uag awwpaopi phlpfgcnpvm cf bkrcbg knpo lup mpaog, zcogl raqcfd af awwpaoafbp cf 1931. xfvcqp rcbqpm'g klupo afcrav zocpfig, gxbu ag dkkzm (suk cg avgk a ikd), wvxlk cg a opvalcnpvm fkorav afcrav, sclu zps afluokwkrkowucb loaclg awaol zokr ucg zabcav phwopggckfg. wvxlk xgxavvm ikpg fkl gwpaq cf pfdvcgu, savq xwocdul, ko spao bvklucfd. wvxlk cg dpfpoavvm a buppozxv afi ainpflxokxg ikd, avlukxdu up baf tp dcnpf lk guppo wafcb supf bkfzokflpi sclu gkrplucfd xfqfksf. bkrrkf luprpg cf wvxlk'g glkocpg cfnkvnp ucr tpbkrcfd jpavkxg kz rcbqpm dpllcfd afklupo wpl. 20 Cryptogram for whom their Student-ID is XXXXXX[13579]9 qyt ovtbsqhojse mhksmisjqsptk oz qyt ojt-qhat vsm ysit etm qo qyt mtiteovatjq oz gojmhqhojseer ktgwbt kqbtsa ghvytbk dyhgy sbt sfet qo btqshj qyt vokhqhit gysbsgqtbhkqhgk oz ojt-qhat vsmk dyhet siohmhjp aokq oz qythb jtpsqhit skvtgqk. qyt veshjqtlq hk tjgbrvqtm hj awgy qyt ksat dsr sk qyt ojt-qhat vsm, fwq dhqy mtqtbahjhkqhgseer ptjtbsqtm vktwmo-bsjmoa ktcwtjgtk. Rubric for Questions 1 and 2 Criteria Exemplary (9, 10) Good (7, 8) Satisfactory (5, 6) Limited (2, 3, 4) Very Limited (0, 1) Title 10% - Informative and summative in an excellent way - Contains most keywords - Intriguing and thoughtprovoking in an excellent way Exhibits aspects of exemplary (left) and satisfactory (right) - Too long or too short - Partially informative or summative - Partially intriguing and thought- provoking Exhibits aspects of satisfactory (left) and very limited (right) - Too long or too short - Hardly informative or summative - Contains no keyword - Hardly intriguing and thoughtprovoking Structure 20% - Highly appropriate structure and professional format, according to the genre/text type and task requirements, including clear attention to word length limit, and effective use of sections, paragraphs and/or links - Largely appropriate structure and format, according to the genre/text type and task requirements, including attention to word length limit, and use of sections, paragraphs and/or links - Inappropriate structure and format, according to the genre/text type and task requirements, with no/limited attention to word length limit, and use of sections, paragraphs and/or links Content 40% - Identifies, explains and prioritises key issues in a complex IT related situations, drawing upon relevant theory and real or hypothetical examples. - Demonstrates clear mastery of the material in the topic area, and shows excellent ability to synthesise and abstract knowledge - Identifies and explains key issues in a routine IT related situations. - Demonstrates moderate mastery of the material in the topic area, and shows moderate ability to synthesise and abstract knowledge - Demonstrates little mastery of the material in the topic area, and shows no ability to synthesise and abstract knowledge Readability 20% - Excellent progression of topics - A highly conventional academic writing style, including the use of appropriate terminology and unbiased language - Satisfactory progression of topics - A largely conventional academic writing style, including the use of appropriate terminology and unbiased language - Unsatisfactory progression of topics - Unclear explanation for all concepts Referencing 10% - Adheres to IEEE/APA/Harvard referencing conventions in in-text citation, presentation of tables/figures and reference list, with next- tono errors - Mostly adheres to IEEE/APA/Harvard referencing conventions in in-text citation, presentation of tables/figures and reference list, with some errors - No referencing or very limited use of references Rubric for Question 3: • 2 marks for showing the intermediate result of cryptanalyzing (i.e., when about half of the letters in the alphabet is determined). • 2 marks for determination of the whole alphabet and/or the complete plaintext. • 3 marks for obtaining the 6x5 table associated with the cryptogram alphabet (see Figure 3). • 2 marks for determination of the keyword. Note that determination of a correct keyword from wrong table in the previous step is not accepted.
欢迎咨询51作业君