Texts for Assignment 2

Thanks to CSCI3381 student and HTML expert Nichlai Mitchko for solving the word-wrap problem for these assignments containing long texts.


Ciphertext for Programming Problem 4

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

The ciphertext above was created using Python 2.7. If you have a newer version of Python (2.7.5 or higher) the function random.seed may give a different result than in earlier versions, and the ciphertext above will not decrypt to anything intelligible with the given key. In that case, you should try the ciphertext below. I do not know exactly the version at which the change was introduced, or if there are more than two possibilities. Nor can I find any documentation of these changes.


Lk5AWq6k+FQjzPPy2Gw/TwwJKZBp0lICWtnxSQ8RSJgwYjlPg6+kR/MW7yVvT1pNy1QEz8/0ph8Zi9AzEv13JqGHU2aZmwJPDX1l+YSS1P93fRQQMs3QcE99dCyRS2A6J4vNcw9saUls8KyNFEEqchM5hbLAsCT9Q0SOGPA6iD1oKeZhBib02laE7LsZ/fBfeLEFmRLykZOuAWxyS15ddSHQZ17z911vIZW1A/KIZGK22G428in5D8IPA7gFC+9nzJytLU3c+jLjHZRjmghidXP4Pdh38owB3fr6hjalj5MUAq8h7SRy/3/nA1BIGND0GLTVWmbndOCUx90UfUWIWqaaOpDTpgAQsYFyYDknPeDcOKRFtOv84xBW0gFe8FQhAdcFB2rf56ZVBCqj14FTc8h6SKWkKpU9+l6/1FfvxOuNoEbcIEi5+NIsDUMaM4SikB8F/aF4TC8GizJcyBHyJ2wE/mI5eXrdMq6cU3VyoGuW1bL10bgZ+ZYa6zRJOYDymluvCT4EvLU0n7y318yaFmVhkQzg+m0UaVq7omUmXygF/ExrExhGu2OnO2fVh5fXnYF5L6IA+xirB5PyjDhHa2t8Eu7oFku3SDoH0IcNztCJY2Q+48A7CJCqT5E9DsKew4H0EibdnwNqGZn4q2Vx1dhbhgf0gEfGZlIr9jPKUmZRRjMv3gYcMXxBT7RJ1lWVybu+Rz8TF+oV6CGBxztrBYmK97qWWumXyNj1K6yHj/VvKQWqzYnj0g1sEsNnOtYcLUoq8LJnpi1HDqPfkeHfDGgPzgZiQK/gyPwFgasn2SVeeeKzNUqwrSHzsAF48POhyLrs+lYJnCYbgxZVlnwebVVHo72Jv9mBX1rMZaxSQAZKcSwsaZ9F9SZGq5kTsAXj38fqBpuU6e0IOA0nHqxDSVdMaR1tqE3GDfvq6y0fohhiQKWU8puyw2racLgXfkts2VHguZJU5rSH/fxEjLzAevauM3YvIP4YmB6rfTlc1XWOdb8UAXpLdsWoN3B7eu/NzyYriRi7JRsaEleV1rsli0JCOjgxrnK3BWgKOnCHFg/5Gv48/wd/pWawOlQujEcSRia06uG6GI6FSMBWbQfa7VF2g2JrEIZMs+9CREU2uxkCjeMhF6BDgq+dJmwgYmK1yFwCETMHbclxS1Czm+9nUrmQduRnmyUpFI4z3wVxMlXAVWw7R17YevWwq2FqWP22YxS6ekpIaAFewWwV9NM1Iz3CzFdxH022NLSdeWWCJvZRgsKCZZfW5512GyU=
 

The four candidate plaintexts for Problem 5


I met a traveller from an antique land


And on the pedestal these words appear

My name is Ozymandias---king of kings.

Look on my works ye Mighty and despair

The two intercepted ciphertexts for Problem 5


ZCkTVMy6oBNZm9QZTH2zzqU0c+PPVSf2dfoJWO8k391OTCsS5QA= 


aD5XGsK55UdYjdQmU2C73L8xdqLIEG+oe7MQUL0vyt1EVTUQ91w=

Ciphertext for Option A of Problem 6--Hacking a Stream Cipher built on Java's Random Number Generator

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


Ciphertext for Option B of Problem 6--Hacking a Stream Cipher Built on a Linear Feedback Shift Register

cXE/EbRiYqWRzN507PGyn5uNioiiUIruw0gbaWvdpqRiRQXVo8bwUh5UV3ZPWsqFgYei7SdnHvQTbIx0e+RI11igJNRzOcAQrvIZHqYak8iypBn5RQyp9WwhdgwF43+1S/Y/IioAVO+BTaeFPoIONQll7lNyviVPdogi42gqUk9lNUXtFQomQ25x8mCqvmSflG2I6u2w0fCS0+QQizfO18YjjHDvD7BT11DoVG8BBoTmoMdIoxVlPijUTK3nDsKF+BNSVjSGNnqKZZa16BXaF/xdbcx+ZiYsP94gwBmno7bZMIjRzZLNwtbAVpgvF03ky+foLVVRwfCiYx73il+cptAlcQNtRm3P0bzOvTkjlJWhcIy6V4DAHTo+3p3pldMUOxVKjc1yejYJZDKolvNZZ4AcXqKv/Lv3o5vhoAwDNCsI2EE/H5j5jRw0c97MHvqxT5cNfdpoyUOA4hDDAYulzkuMeT2dnTxptpe6yiCKP+1gHRx8RejOCeMasXW8oJi5JZqTHsymzWiFShsUUcaT7l7QSOyv8HJYscpszPJZJxjZAeew0Ck83h3hfghI4n0amMZ2GSTYGl88dJ4sNbjkX8Eb5IgMn2NcrX8FCHgwgbwALoPcn958je2ogcTFgJ11C+gz+kfLQQA1ycuCdTRmhyJbSGvPfcjxUdRRp3ZJ93+9t0qer+zeH2/s/1EuoWn1t783hgbpDbGVEDIfMjzXZv4P5a/2jDGMR4TsWvqjCB/oy2F2TPWNCBuj65yVdl2+Vdtd