|
|||||||
| |||||||
This page provides a PRELIMINARY analysis of algorithms used to find the key length and then find the plain text.
Due to time constraints, I was unable to perform a solid analysis. As reflected on the "Future Extensions" page,
significant more work should be done on this portion of the project to make justified conclusions. Minimally,
the following tasks should be completed: analysis on each algorithm individually, determining the breakinig point
for each algorithm, comparison between algorithms (space, time, and Big O), and determining the algorithm that
should be used based on circumstances/data availablity.
Results for Algorithms to Find the Key Length
Results for Algorithms to Find the Plain Text
The Excel spreadsheet detailing the results on a case-by-case basis can be downloaded, but again, I wish to stress that these results should be considered preliminary. Significant more testing and test cases are required. Download the Results To ensure timing methods are consistent with my results, I would encourage use of the same timing mechanism. I started all timings after pre-processing of the files (after reading the cipher text into the file) but just prior to calling the respective algorithm. The timing class I used is not mine, but can be found at http://oldmill.uchicago.edu/~wilder/Code/timer/ The test files I used are in the following zip file. The original plain text is lettered a - e, the cipher text is indicated by a letter (a - e) and a number (2 - 8) where the letter corresponds to the plain text and the number corresponds to the key used. The key files are titled key# where # is a number in the range of 2 - 8. Download the Test Cases |
|||||||
|