In [ ]:
# Project Euler: Problem 59

https://projecteuler.net/problem=59

Each character on a computer is assigned a unique code and the preferred standard is ASCII (American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107.

A modern encryption method is to take a text file, convert the bytes to ASCII, then XOR each byte with a given value, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the cipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.

For unbreakable encryption, the key is the same length as the plain text message, and the key is made up of random bytes. The user would keep the encrypted message and the encryption key in different locations, and without both "halves", it is impossible to decrypt the message.

Unfortunately, this method is impractical for most users, so the modified method is to use a password as a key. If the password is shorter than the message, which is likely, the key is repeated cyclically throughout the message. The balance for this method is using a sufficiently long password key for security, but short enough to be memorable.

Your task has been made easy, as the encryption key consists of three lower case characters. Using cipher.txt (in this directory), a file containing the encrypted ASCII codes, and the knowledge that the plain text must contain common English words, decrypt the message and find the sum of the ASCII values in the original text.

The following cell shows examples of how to perform XOR in Python and how to go back and forth between characters and integers:


In [ ]:
assert 65 ^ 42 == 107
assert 107 ^ 42 == 65
assert ord('a') == 97
assert chr(97) == 'a'

Certain functions in the itertools module may be useful for computing permutations:


In [ ]:
from itertools

In [12]:
#Worked with Andrew Exton (Not in the class)

import csv

#Opens the file and creates an empty list
encryptedFile = open("cipher.txt")
encryptedValues = []

#Reads the file and puts the information in a list
for row in csv.reader(encryptedFile):
    for value in row:
        encryptedValues.append(value)

#Iterating through ASCII values 97 to 123 three times to create 26 ^ 3 combinations of encryptions
for encryptionA in range(97,123):
    for encryptionB in range(97,123):
        for encryptionC in range(97,123):
            encryption = [encryptionA, encryptionB, encryptionC]
            encryptionStr = str(chr(encryptionA)) + str(chr(encryptionB)) + str(chr(encryptionC))
            #print(encryptionStr)
            
            #Creates an empty string and variable index
            message = ""
            index = 0
            
            #Loops through each encrypted value in the file and decrypts it appending it to the message string
            for encryptedValue in encryptedValues:
                decryptedValue = int(encryptedValue) ^ encryption[index]
                message += str(chr(decryptedValue))     
                index += 1
                
                #Because we know the password is three characters, this loops the index 0,1,2 and repeats
                if index > 1:
                    index = 0
                    
            #Searches for the word "the" in message and if it is there it will print the message and the password        
            isText = message.find("the", 0, len(message))
            if isText:
                print (encryptionStr)
                print(message)


5Avx5Yrfnxy>rs>Wzvs9>~}ma{o5/45/=\p=avx5|xrws{wsr>i}{=Bqoq>|ylxtzd5{e|mipz35Vx5i|f>j|ju5Yrq2=tpy5vx5i|f>Zzz35,=]{=bn5ws5jup>pyt{pt{y=bwi}>Zzz35-=]{=vlxtjxq>xc{olju|pz5juplx5wn;>Szju|pz5{e|mif>i}i5vx5ztqp:a>ptux;>)5Rts{=|jnpr{5i|f>t{>u|s15sq>i}wn5rts{=rwkpm=ywz}j=aq=phxggr{{35+=Avx5rtrvi5mu|pxf>i}lr`yu5jup>ytlv{{nf2=tpy5jup>ytlv{{nf>~tp={{kpl=pfi|pz`wn}>ta0=#>Zzz=f{sa>Wzvs5jup>_tni|mi5)=aq=a{qy>xc{olqsp>|wqha>i}{=ywz}j=fq=av|a>xc{olqsp>p|yua>prtphx5|xvhf{=zx=}wn5jxfjtxqsl0=->Wzvs5vtxmxyx=bn5pra>i}{=ywz}j&5vx5i|f>r{rd5=bwi{{nf>iz>i}{=ywz}j35'=Avx5qsp>j}q=|m=avx5jo`{=ywz}j15iuz>z|hxf>q|yua>iz>xc{olqsp2=bn5yr|pz5jr5}rx{=|piz>i}{=bqoyz35/-5\ha>|yjuzkz}>i}{=bqoyz=bn5s|q{=avozkz}>u|s15jup>jzlqq>y|zs2j=g{~zys|dx5vtx>j}{s5vx5}|x{35/,5[kpp=|p=}wn5qj{>qtpy5sq>|xqsr>u|m=zis5nxznqp2=}{=bn5pra>|v}xejxq0=$,=Wki5jr5qy>j}q=w{q|{kpz=}wp5sq>|v}xejxq>u|s15vx5y|c{=avx5ltrvi5jr5|xvqpp>~}wqqlx{>rs>Zzz35/.5Jupg=tlx5lxwqo{?=Avtf>tf>szj=t>m}gn|}|y>|li}>opmhyjt{y=slrx>u`s|{>mtmn|qs5qo5nqtp15ju|m=g{|li}>~zsxf>{gqp5Yrq0,!>Nz>i}{=Bqoq>p}|x{=}kptp=tpy5rtc{y5vxg{=zp=poav=tsr{y=`m35Vx5i|f>{`rq5q{5ksstywsr>qzhx5sq>{twi}xhypxfm35_sq>jp>uthx5mxpp=}wn5yqzld9>i}{=rrrgg=zx=avx5qsyg=Fqs5q{5jup>[tjupl3

In [ ]:
# This cell will be used for grading, leave it at the end of the notebook.

In [ ]: