Playfair Cipher Attack
This is the fifth and final (for now) mission inspired by classical cryptography. In this mission we'll try to break the Playfair cipher using known plaintext attack. To learn more about this cipher, check out Playfair Cipher mission.
Playfair Cipher is a manual substitution cipher invented in 1854. Unlike other substitution ciphers that existed at the time, Playfair doesn't encrypt single letters - instead it works with pairs of letters, or bigrams . Let's remind ourselves of the encryption algorithm:
Playfair cipher used a 5x5 key table filled with 25 letters of English alphabet in random order (letter J is omitted). Message is broken up into pairs of letters (each pair must consist of two different letters, otherwise letter X is inserted between them). Then each bigram is encrypted according to following rules:
1. If both letters are in the same row of key table, each is replaced by the letter to it's immediate right (the last column wraps around to the first);
2. If the letters appear in the same column - each is replaced with the one below it (the bottom row wraps around to the top);
3. If the letters are at diagonally opposite corners of a rectangle, they are replaced with letters at other two corners. The order is important - the first letter of the encrypted pair is the one that lies on the same row as the first letter of the plaintext pair
For example, if the key table is
d f o l s e a r m c b z h q p t g i n x k u v y w
then the word secret will be encrypted as dcembk .
To decrypt the message, we use the same rules (except that if the letters of a bigram lies in the same row or column, we must use the letters to their left and above respectively).
In this mission you will try to break the Playfair Cipher using known plaintext attack. You are given a plaintext and a corresponding cryptogram. The plaintext is already prepared for encryption (J's replaced with I's and X's inserted between double letters), so don't worry about that. You need to find the key table used for encryption and return the codephrase " topsecretmessage " encrypted with the same key table.
Important note: each input is guaranteed to have a single solution.
Input: plaintext: str, cryptogram: str
Output: encrypted codephrase: str
Example:
playfair_attack('pythonsxstandardlibraryisveryextensiveofferingawiderangeofstuffx', 'aiwblarskwphydowzehmhoieksxlixgwvufxlvzqvizxbehdycxlphyxzqkwcvsi') == 'dmhfiulxgbxvqhyx'
Preconditions:
len(plaintext) == len(cryptogram)
len(plaintext) % 2 == 0
all([l in 'abcdefghiklmnopqrstuvwxyz' for l in plaintext])
all([l in 'abcdefghiklmnopqrstuvwxyz' for l in cryptogram])
CheckiO Extensions allow you to use local files to solve missions. More info in a blog post.
In order to install CheckiO client you'll need installed Python (version at least 3.8)
Install CheckiO Client first:
pip3 install checkio_client
Configure your tool
checkio --domain=py config --key=
Sync solutions into your local folder
checkio sync
(in beta testing) Launch local server so your browser can use it and sync solution between local file end extension on the fly. (doesn't work for safari)
checkio serv -d
Alternatevly, you can install Chrome extension or FF addon
checkio install-plugin
checkio install-plugin --ff
checkio install-plugin --chromium
Read more here about other functionality that the checkio client provides. Feel free to submit an issue in case of any difficulties.
Welcome to Pair Programming! Engage in real-time collaboration on coding projects by starting a session and sharing the provided unique URL with friends or colleagues. This feature is perfect for joint project development, debugging, or learning new skills together. Simply click 'Start Session' to begin your collaborative coding journey!
You are trying to join a pair programming session that has not started yet.
Please wait for the session creator to join.
It looks like the creator of the pair programming session closed the editor window.
It might happen accidentally, so that you can wait for reconnection.