0% found this document useful (0 votes)
7 views1 page

ASSIGNMENT On Substitution and Transposition Ciphers

The document outlines an assignment consisting of programming tasks in C or Python, with permission for other languages. Students are required to implement various encryption and decryption algorithms, including Caesar cipher, affine cipher, and Hill cipher, as well as perform letter frequency attacks on ciphers. Submissions must include code with comments, algorithms or flow charts, and screenshots of outputs, and must be submitted in soft form via LMS.

Uploaded by

Sudhanshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views1 page

ASSIGNMENT On Substitution and Transposition Ciphers

The document outlines an assignment consisting of programming tasks in C or Python, with permission for other languages. Students are required to implement various encryption and decryption algorithms, including Caesar cipher, affine cipher, and Hill cipher, as well as perform letter frequency attacks on ciphers. Submissions must include code with comments, algorithms or flow charts, and screenshots of outputs, and must be submitted in soft form via LMS.

Uploaded by

Sudhanshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ASSIGNMENT-1 QUESTIONS

General Instructions:
1. The following codes are to be written in C/Python. If any other coding language is
preferred by the students, they may proceed after taking permissions from the
teacher.
2. The assignments must be submitted on LMS in soft form. Include the following in
your submission:
 Code with comments, Algorithm/Flow chart, Screenshots of the output.

1. Write a program that can encrypt and decrypt using the general Caesar cipher, also
known as an additive cipher.
2. Write a program that can encrypt and decrypt using the affine cipher.
3. Write a program that can perform a letter frequency attack on an additive cipher without
human intervention. Your software should produce possible plaintexts in rough order of
likelihood. It would be good if your user interface allowed the user to specify “give me
the top 10 possible plaintexts.”
4. Write a program that can perform a letter frequency attack on any monoalphabetic
substitution cipher without human intervention. Your software should produce possible
plaintexts in rough order of likelihood. It would be good if your user interface allowed
the user to specify “give me the top 10 possible plaintexts.”
5. Create software that can encrypt and decrypt using a 2 * 2 Hill cipher.
6. Create software that can encrypt and decrypt using a general substitution block cipher.

You might also like