# 1 04-AffineCipher

Previous: 03-TranspositionCiphers.html

## 1.1 History

“The enemy knows the system”
https://en.wikipedia.org/wiki/Kerckhoffs’s_principle

a.k.a Shannon’s maxim:
“A cryptosystem should be secure even if everything about the system,
except the key, is public knowledge.”

Discussion questions:
Why do you think this is a difficult notion for newcomers to cryptography?
Is the below similar statement true?
If everything about the system, except the key, is not public knowledge, is the system secure?
Is it trustworthy?
How does trust relate to security?
How are they different?

https://proprivacy.com/guides/why-open-source-is-so-important

## 1.2 Screencasts

• Password for the Vimeo videos is in Zulip chat.
• SP21: https://vimeo.com/507671684
• FS20: https://vimeo.com/455922907
• Tip: If anyone wants to speed up the lecture videos a little, inspect the page, go to the browser console, and paste this in: document.querySelector('video').playbackRate = 1.2

http://inventwithpython.com/cracking/ Chapters 13-15

## 1.4 Basic crypto-math

Today, we will go over two encryption algorithms which use some of the basic math we will rely on for modern cryptography, Diffie-Helmen and RSA for example.

### 1.4.1 Modular arithmetic

https://en.wikipedia.org/wiki/Modular_arithmetic (11 + 4) % 12 = 3

(10 + 200 hours) % 24 = 6

The mod operator, %, works this way:

a mod b is the remainder after a is divided by b.
7 % 3 is 1 (since 7 / 3 is 2 with remainder 1).
27 % 3 is 0 (since 27 / 3 is 9 with remainder 0).
4 % 7 is 4 (since 4 / 7 is 0 with remainder 4).

Defining a Ring mod 9: Modular arithmetic can be handled mathematically,
by introducing a congruence relation on the integers,
that is compatible with the operations on integers, including:
addition, subtraction, multiplication, and what else?
For a positive integer n,
two numbers a and b are said to be congruent modulo n,
if their difference a - b is an integer multiple of n
(that is, if there is an integer k such that a − b = kn).
This congruence relation is typically considered when a and b are integers,
and is denoted:
$$a\equiv b \pmod {n}$$
The number n is called the modulus of the congruence.
The congruence relation may be rewritten as:
$$a=kn + b$$
The following:
$$a\equiv b \pmod {n}$$
asserts that a and b have the same remainder when divided by n.
That is:
$$a = p n + r$$
$$b = q n + r$$
Example:
$$38 \equiv 14 \pmod {12}$$
because 38 - 14 = 24, which is a multiple of 12, or equivalently,
because both 38 and 14 have the same remainder 2 when divided by 12.

#### 1.4.1.2 Subtraction

How do you ask what time it was 40 hours ago?

Reversing addition (mod m) is performed with subtraction (mod m),
to produce the equivalent “ring” like effect as addition,
including the modulus of negative numbers.
For example, in the Caesar cipher we went over previously:
02-IntroCryptoCaesar.html

#### 1.4.1.3 Multiplication

One can multiply a number mod m.
Multipliplication should still be consistent, mod m
$$a*b \equiv c \pmod m$$
For example:
$$5*6 \equiv 2 \pmod 7$$
Reversing multiplication mod m is more complicated!

The normal division, that you are used to,
is defined as the inverse of multiplication.
a * b = c
c / b = a

We can also define something like the following to be true (mod m):
$$a*b \equiv c \pmod m$$
then
$$c/b \equiv a \pmod m$$

For example, multiplication:
5 * 6 = 30, which leaves a remainder of 2 when divided by 7, and thus
$$5*6 \equiv 2 \pmod 7$$
and the complementary division:
$$2/6 \equiv 5 \pmod 7$$
we’ll multiply using something called a modular multiplicative inverse.
The modular inverse of n is a number,
that when multiplied with n, is 1.
This is just like the inverse of a number in regular arithmetic:
x * (1 / x) = 1
It also has an interesting property:
Multiplying anything times 1 equals that thing.
This will be one CRITICAL point in understanding RSA,
an asymmetric encryption algorithm we will cover later.

#### 1.4.1.4 Modular multiplicative inverse

https://en.wikipedia.org/wiki/Modular_multiplicative_inverse
The modular multiplicative inverse of an integer a,
is an integer x such that the product a * x is congruent to 1,
with respect to the modulus m.
In the standard notation of modular arithmetic,
this congruence is written as:
$$ax \equiv 1 \pmod {m}$$
which is a shorthand way of writing the statement that:
m divides (evenly) the quantity a * x − 1,
or put another way:
the remainder after dividing a * x by the integer m is 1.

This is a special case of a linear congruence:
Where b is non-1, and a and m are given,
$$ax \equiv b \pmod {m}$$
there may be zero or multiple solutions for x.
(specified values of a and x for some b and m, satisfying the equation),
but when $$ax \equiv 1 \pmod {m}$$ ,
then there can be provably only one solution.
Such a solution exists, if and only if
$$gcd(a, m) = 1$$, that is,
a and m must be relatively prime (i.e. co-prime).
Further, when this condition holds, there is exactly one solution,
i.e., when it exists, a modular multiplicative inverse is unique.

Why is the above nuance interesting??

Here’s another example to explore this further:
Two integers are congruent mod 10,
if and only if their difference is divisible by 10,
for instance:
$$32 \equiv 12 \pmod {10}$$ since 10 divides 32 − 12 = 20, and
$$111 \equiv 1 \pmod {10}$$ since 10 divides 111 − 1 = 110.

With a and m given, a mod inverse is defined as:
(a * i) % m = 1,
where i is the modular inverse.

For example, the modular inverse of 5 (mod 7) would be some number i,
where:
(5 * i) % 7 = 1.

You can brute-force this calculation like this:

Because (5 * 1) % 7 = 5,
1 isn’t the modular inverse of 5 mod 7

Because (5 * 2) % 7 = 3,
2 isn’t the modular inverse of 5 mod 7

Because (5 * 3) % 7 = 1,
3 is the modular inverse of 5 mod 7

Not every element of a complete residue system modulo m has a modular multiplicative inverse,
for instance, zero never does.
After removing the elements of a complete residue system that are not relatively prime to m,
what is left is called a reduced residue system,
all of whose elements have modular multiplicative inverses.
The number of elements in a reduced residue system is defined as:
$$\phi(m)$$
where $$\phi$$ is the Euler totient function,
i.e., Euler’s totiennt defines the number of positive integers less than m that are relatively prime to m.

Given a and m, to find x efficiently
(if it exists, which necessarily occurs only when $$gcd(a, m) = 1$$),
we use the Extended Euclidean formula:

##### 1.4.1.4.1 Extended Euclidean

https://en.wikipedia.org/wiki/Extended_Euclidean_algorithm
A modular multiplicative inverse of a modulo m can be found analytically.
For this purpose, we use the extended Euclidean algorithm.
Note: Skim this during your first pass, but come back to it.

Code:
Check out cryptomath.py
04-AffineCipher/cryptomath.py

def findModInverse(a: int, m: int) -> Optional[int]:
# Return the modular inverse of a % m, which is
# the number x such that a*x % m = 1

if gcd(a, m) != 1:
# Ah dynamic typing!
return None
# No single mod inverse exists if a & m aren't relatively prime.

# Calculate using the Extended Euclidean Algorithm:
u1, u2, u3 = 1, 0, a
v1, v2, v3 = 0, 1, m
while v3 != 0:
# Note that // is the integer division operator
q = u3 // v3
v1, v2, v3, u1, u2, u3 = (u1 - q * v1), (u2 - q * v2), (u3 - q * v3), v1, v2, v3
return u1 % m

### 1.4.2 Divisors

https://en.wikipedia.org/wiki/Greatest_common_divisor

A prime number (or a prime) is:
a natural number greater than 1,
that cannot be formed by multiplying two smaller natural numbers.

A composite number, is (the three below are all equivalent):
a natural number greater than 1 that is not prime.
a positive integer that can be formed by multiplying two smaller positive integers.
a positive integer that has at least one divisor other than 1 and itself.

Reminder:
https://en.wikipedia.org/wiki/Integer_factorization
In number theory, integer factorization is the decomposition of a composite number,
into a product of smaller integers.
If these smaller integers are further restricted to be factored until they are prime numbers,
then the process is called prime factorization.

Factors of 10:  This image demonstrates the prime decomposition of 864.
A shorthand way of writing the resulting prime factors is 25 × 33

Preview problem:
When the numbers are sufficiently large, no efficient integer factorization algorithm is known, other than quantum and memristive solutions that do not scale to factoring large primes… yet.
https://en.wikipedia.org/wiki/Integer_factorization_records
More to come later.

Mention:
This may be the single biggest practical problem in all of computer science and mathematics today!!

Ethical discussion questions:
If you solved this problem efficiently,
what could you do with the solution?
What would you do?
Do you think you’d live to tell the story if you tried to sell it or use it,
rather than widely give it away?

#### 1.4.2.1 GCD

The greatest common divisor (gcd) of two or more integers,
which are not all zero,
is the largest positive integer that divides each of the integers evenly.

For example, the gcd of 8 and 12 is 4, written as:
$$gcd(8, 12) = 4$$

An a-by-b rectangle can be covered with square tiles,
of side length c,
only if c is a common divisor of a and b. A 24-by-60 rectangle is covered with ten 12-by-12 square tiles,
where 12 is the GCD of 24 and 60.

Greatest common divisors can, in principle,
be computed by determining the prime factorizations of two numbers,
a and b, and comparing the factors of a and b.

For example,
to compute gcd(18, 84), we find the prime factorizations
18 = 2 * 32 and
84 = 22 * 3 * 7
and the “overlap” of the two expressions is 2 * 3;
so gcd(18, 84) = 6

In practice, this method is only feasible for small numbers.
Computing prime factorizations in general takes faaaaar tooooo long,
to be an an efficient algorithm to find the CGD.
There are better ways to find the GCD below.

#### 1.4.2.2 Euclidean algorithm

https://en.wikipedia.org/wiki/Euclidean_algorithm
The Euclidean algorithm, or Euclid’s algorithm,
is an efficient method for computing the greatest common divisor (GCD) of two numbers,
the largest number that divides both of them without leaving a remainder.

For any non-negative integer a, and any positive integer b,
gcd(a, b) = gcd(b, a mod b)

##### 1.4.2.2.1 Pseudo-code

V1

function gcd(a, b)
while b ≠ 0
t := b;
b := a mod b;
a := t;
return a;

V2

function gcd(a, b)
while a ≠ b
if a > b
a := a − b;
else
b := b − a;
return a;

V3

function gcd(a, b)
if b = 0
return a;
else
return gcd(b, a mod b);
##### 1.4.2.2.2 Real code

Check out cryptomath.py for iterative python version:
04-AffineCipher/cryptomath.py

def gcd(a: int, b: int) -> int:
while a != 0:
a, b = b % a, a
return b

Recursive python version I included for fun:

def gcd(a: int, b: int) -> int:
if a % b == 0:
return b
return gcd(b, a % b)

Example operation of gcd() above: For each repetition, by what range does the remaining value to be computed decrease by?
How do the complexities of the above two algorithms compare?
Can these algorithms handle very large numbers?

#### 1.4.2.3 Co-primes

https://en.wikipedia.org/wiki/co-prime_integers
Some more number theory:
Two integers a and b are defined to be relatively prime
(a.k.a., mutually prime or co-prime)
if the only positive integer (factor) that divides both of them is 1.
Consequently, any prime number that divides one does not divide the other.
This is equivalent to their greatest common divisor (gcd) being 1.
Notes:
Numbers don’t actually have to be prime numbers to be relatively prime to each other.
All prime numbers are necessarily relatively prime with every other number, by definition.

## 1.5 Multiplicative cipher

Like before, number the symbol set: ### 1.5.1 Encryption operation

Multiply the index of the plaintext letter by the key,
to get the index of the ciphertext letter.

For example, if you encrypted the letter E with the key 3,
then you would find E’s index (4) and multiply it by the key (3),
to get the index of the encrypted letter (4 × 3 = 12),
which would be the letter M.

Is that enough?

With a symbol set size of 66,
to encrypt the symbol F with key 17,
multiply its index 5, by the key of 17,
and mod the result by 66,
to handle the wraparound of the 66-symbol set.
The result of (5 × 17) mod 66 is 19,
and 19 corresponds to the symbol T.
So F encrypts to T, in the multiplicative cipher with key 17.

Further, you can’t just use any number for the multiplicative cipher’s key.
For example, if you chose the key 11,
here’s the plaintext-ciphertext mapping you would end up with:

Plaintext (below)
~~~
‘ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890 !?.’
‘ALWhs4ALWhs4ALWhs4ALWhs4ALWhs4ALWhs4ALWhs4ALWhs4ALWhs4ALWhs4ALWhs4’
~~~

Ciphertext (above)

Hint:
The row-comparison above must be viewed in mono-spaced (equal width) font to work.

What is the problem?

Notice that this key doesn’t work,
because the symbols A, G, and M all encrypt to the same letter, A.
When you encounter an A in the ciphertext,
and want to decrypt to the plaintext,
you wouldn’t know which symbol it decrypts to.

In the multiplicative cipher,
the key and the size of the symbol set must be relatively prime to each other!

For example, the numbers num1 and num2 are relatively prime (co-prime) if
gcd(num1, num2) == 1,
where for this algorithm, num1 is the key and num2 is the size of the symbol set.

Conclusion:
The multiplicative key (the multiplier) and symbol set size (the mod) must be co-prime.

How do we guarantee that the key and symbol set are relatively prime (co-prime)?
What algorithm can we use to test this?
Can we select a symbol set size (i.e., modulus) such that any key will work, and if so, how?

### 1.5.2 Decryption operation

Multiply index of the ciphertext character by the multiplicative inverse of the key,
mod the symbol set size,
to get back the index of the plaintext character.

The encryption key can be anything you choose,
as long as it’s relatively prime to the size of the symbol set,
which in the example below case is 66.

If you choose the key 53 for encrypting with the multiplicative cipher,
the decryption key is the modular inverse of 53 mod 66:

If you have your encryption key,
and want to find your decryption key (mod inverse of 53),
then you could use brute force,
starting at 1 (0 can’t be a mod inverse):
1 isn’t the modular inverse of 53 mod 66, because (53 * 1) % 66 = 53
2 isn’t the modular inverse of 53 mod 66, because (53 * 2) % 66 = 40
3 isn’t the modular inverse of 53 mod 66, because (53 * 3) % 66 = 27
4 isn’t the modular inverse of 53 mod 66, because (53 * 4) % 66 = 14
5 is the modular inverse of 53 mod 66, because (53 * 5) % 66 = 1

Because 5 is the modular inverse of 53 mod 66,
you know that the multiplicative cipher decryption key is thus 5.
To decrypt a ciphertext letter,
multiply that letter’s number by 5 and then mod 66.

### 1.5.3 Full example

Using the 66-character symbol set,
let’s encrypt and decrypt the word “Cat” using the key 53.

#### 1.5.3.1 Encryption

To encrypt, we multiply by the index of each plaintext letter by 53 % 66

‘C’
C is at index 2, and 2 * 53 is 106,
which is larger than the symbol set size,
so we mod 106 by 66, and the result is 40.
The character at index 40 in the symbol set is ‘o’,
so the symbol C encrypts to o.

‘a’
The string ‘a’ is at index 26 in the symbol set,
and 26 * 53 % 66 is 58,
which is the index of ‘7’.
So the symbol a encrypts to 7.

‘t’
The string ‘t’ is at index 45,
and 45 * 53 % 66 is 9,
which is the index of ‘J’.

Therefore, the word Cat encrypts to o7J.

#### 1.5.3.2 Decryption

To decrypt,
we multiply the index of the ciphertext letter by the modular inverse of 53 % 66,
which is 5.

The symbol o is at index 40,
and 40 * 5 % 66 is 2,
which is the index of ‘C’.

The symbol 7 is at index 58,
and 58 * 5 % 66 is 26,
which is the index of ‘a’.

The symbol J is at index 9,
and 9 * 5 % 66 is 45,
which is the index of ‘t’.

The ciphertext o7J decrypts to Cat,
which is the original plaintext, just as expected.

#### 1.5.3.3 Why does this work?

Multiplying a number times 1 is what?
RSA will employ the same principle,

+++++++++++++++++++
Cahoot-04.1

### 1.5.4 Formalization of encryption and decryption

P: $$\mathbb{Z}_{26} = \{0, 1, 2, \ldots, 25 \}$$
(or other symbol set size)

C: $$\mathbb{Z}_{26} = \{0, 1, 2, \ldots, 25 \}$$
(or other symbol set size)

Ke: $$\mathbb{Z}_{?} = ?$$
(Ask, as a function of symbol set size?)

Kd: modular multiplicative inverse of Ke mod symbol set size (domain of P and C)
(same as Ke?)

E: the encryption function
$$E(x, k) = x * ke \mod 26$$

D: the decryption function
$$D(y, k) = y * kd \mod 26$$

### 1.5.5 How many keys?

At first glance, it seems like Key A could be as large as you want it to be,
as long as it’s relatively prime to the symbol set size.
Therefore, you might think that the multiplicative cipher has an infinite number of keys,
and cannot be brute-forced!

Does it wrap around to produce repetitive encryption like Caesar’s?

Conclusion:
Due do the requirement of the key and symbol set size being co-prime,
the multiplicative cipher has only 20 different keys for a set of 66 symbols,
even fewer than the Caesar cipher!

+++++++++++++++++++
Cahoot-04.2

## 1.6 Affine cipher

https://en.wikipedia.org/wiki/Affine_cipher
One downside to using the multiplicative cipher is that the letter A always maps to the letter A.
The reason is that A’s number is 0,
and 0 multiplied by anything will always be 0.
You can fix this issue by adding a second key,
to perform a Caesar cipher encryption,
after the multiplicative cipher’s multiplication and modding is done.
This extra step changes the multiplicative cipher into the affine cipher.
It also enlarges the keyspace!

The affine cipher is a two-part process:
The affine cipher has two keys: Key A and Key B.
Key A is the integer you use to multiply the letter’s number.
After you multiply the plaintext by Key A,
you add Key B to the product.
Then you mod the sum by 66 (or other symbol set size),
as you did in the original Caesar cipher.
This means the affine cipher has about 66 times as many possible keys as the multiplicative cipher?
It also ensures that the letter A doesn’t always encrypt to itself. ### 1.6.1 Formalization of encryption and decryption

P: $$\mathbb{Z}_{26} = \{0, 1, 2, \ldots, 25 \}$$
(or symbol set size)

C: $$\mathbb{Z}_{26} = \{0, 1, 2, \ldots, 25 \}$$
(or symbol set size)

Kae: $$\mathbb{Z}_{?} = ?$$
(Ask, as a function of symbol set size)

Kad: modular multiplicative inverse of Kae mod symbol set size
(domain of P and C)

Kb: $$\mathbb{Z}_{26} = \{0, 1, 2, \ldots, 25 \}$$

E: the encryption function
$$E(x,ka, kb) = x * kae + kb \mod 26$$

D: the decryption function
$$D(y,ka, kb) = (y - kb) * kad \mod 26$$

Code
Step through: $pudb3 affineCipher.py 04-AffineCipher/affineCipher.py #!/usr/bin/python3 # -*- coding: utf-8 -*- # Affine Cipher # https://www.nostarch.com/crackingcodes (BSD Licensed) import sys, cryptomath, random from typing import Tuple SYMBOLS = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890 !?." def main() -> None: myMessage = """"A computer would deserve to be called intelligent \ if it could deceive a human into believing that it was human." -Alan Turing""" myKey = 2894 myMode = "encrypt" # Set to either 'encrypt' or 'decrypt'. if myMode == "encrypt": translated = encryptMessage(myKey, myMessage) elif myMode == "decrypt": translated = decryptMessage(myKey, myMessage) print("Key: %s" % (myKey)) print("%sed text:" % (myMode.title())) print(translated) print("Full %sed text copied to clipboard." % (myMode)) def getKeyParts(key: int) -> Tuple[int, int]: """ Splits a single integer key into two integers for Key A and Key B. The key to split is passed to the key parameter. Key A is calculated by using integer division, to divide key by len(SYMBOLS), the size of the symbol set. Integer division (//) returns the quotient without a remainder. The mod operator (%) on line 26 calculates the remainder, which we’ll use for Key B. For example, with 2894 as the key parameter and a SYMBOLS string of 66 characters, Key A would be 2894 // 66 = 43 and Key B would be 2894 % 66 = 56. To combine Key A and Key B back into a single key, multiply Key A by the size of the symbol set and add Key B to the product: (43 * 66) + 56 evaluates to 2894, which is the integer key we started with. This is not required, and is just a cute way to store 2 keys in one. """ keyA = key // len(SYMBOLS) keyB = key % len(SYMBOLS) return (keyA, keyB) def checkKeys(keyA: int, keyB: int, mode: str) -> None: if keyA == 1 and mode == "encrypt": sys.exit("Cipher is weak if key A is 1. Choose a different key.") if keyB == 0 and mode == "encrypt": sys.exit("Cipher is weak if key B is 0. Choose a different key.") if keyA < 0 or keyB < 0 or keyB > len(SYMBOLS) - 1: sys.exit( "Key A must be greater than 0 and Key B must be between 0 and %s." % (len(SYMBOLS) - 1) ) if cryptomath.gcd(keyA, len(SYMBOLS)) != 1: sys.exit( "Key A (%s) and the symbol set size (%s) are not relatively prime." "Choose a different key." % (keyA, len(SYMBOLS)) ) def encryptMessage(key: int, message: str) -> str: keyA, keyB = getKeyParts(key) checkKeys(keyA, keyB, "encrypt") ciphertext = "" for symbol in message: if symbol in SYMBOLS: # Encrypt the symbol: symbolIndex = SYMBOLS.find(symbol) ciphertext += SYMBOLS[(symbolIndex * keyA + keyB) % len(SYMBOLS)] else: ciphertext += symbol # Append the symbol without encrypting. return ciphertext def decryptMessage(key: int, message: str) -> str: keyA, keyB = getKeyParts(key) checkKeys(keyA, keyB, "decrypt") plaintext = "" modInverseOfKeyA = cryptomath.findModInverse(keyA, len(SYMBOLS)) # just for sane typing on the findModInverse Optional[int] if modInverseOfKeyA: for symbol in message: if symbol in SYMBOLS: # Decrypt the symbol: symbolIndex = SYMBOLS.find(symbol) plaintext += SYMBOLS[ (symbolIndex - keyB) * modInverseOfKeyA % len(SYMBOLS) ] else: plaintext += symbol # Append the symbol without decrypting. return plaintext def getRandomKey() -> int: while True: keyA = random.randint(2, len(SYMBOLS)) keyB = random.randint(2, len(SYMBOLS)) if cryptomath.gcd(keyA, len(SYMBOLS)) == 1: return keyA * len(SYMBOLS) + keyB # If affineCipher.py is run (instead of imported as a module) call # the main() function. if _name_ == "_main_": main() 04-AffineCipher/affineCipher_cfg.svg ### 1.6.2 How many keys? How do ranges of values for key a and key b interact? How to loop across all keys? How might we test that? Check out $ pudb3 affineKeyTest.py
04-AffineCipher/affineKeyTest.py

#!/usr/bin/python3
# -*- coding: utf-8 -*-

# This program proves that the keyspace of the affine cipher is limited
# to less than len(SYMBOLS) ^ 2.

import affineCipher, cryptomath

message: str = "Make things as simple as possible, but not simpler."
for keyA in range(2, 80):
key = keyA * len(affineCipher.SYMBOLS) + 1

if cryptomath.gcd(keyA, len(affineCipher.SYMBOLS)) == 1:
print(keyA, affineCipher.encryptMessage(key, message))

Assuming a symbol set size of 66:

When you multiply 66 possible Key A values by 66 possible Key B values,
the result is 4356 possible combinations.

Then when you subtract the integers that can’t be used for Key A,
because they’re not relatively prime with 66,
the total number of possible key combinations for the affine cipher drops to 1320,
which is our best yet!

+++++++++++++++++++
Cahoot-04.3

### 1.6.3 Affine hacker

Code
Step through \$ pudb3 affineHacker.py
04-AffineCipher/affineHacker.py

#!/usr/bin/python3
# -*- coding: utf-8 -*-

# Affine Cipher Hacker

import affineCipher, detectEnglish, cryptomath
from typing import Optional

SILENT_MODE = False

def main() -> None:
# You might want to copy & paste this text from the source code at
# https://www.nostarch.com/crackingcodes/affineHacker.py
myMessage = """"5QG9ol3La6QI93!xQxaia6faQL9QdaQG1!!axQARLa!!AuaRLQ\

hackedMessage = hackAffine(myMessage)

if hackedMessage != None:
# The plaintext is displayed on the screen. For the convenience of
# the user, we copy the text of the code to the clipboard.
print("Copying hacked message to clipboard:")
print(hackedMessage)
else:
print("Failed to hack encryption.")

def hackAffine(message: str) -> Optional[str]:
print("Hacking...")

# Python programs can be stopped at any time by pressing Ctrl-C (on
# Windows) or Ctrl-D (on Mac and Linux)
print("(Press Ctrl-C or Ctrl-D to quit at any time.)")

# Brute-force by looping through every possible key
for key in range(len(affineCipher.SYMBOLS) ** 2):
keyA = affineCipher.getKeyParts(key)
if cryptomath.gcd(keyA, len(affineCipher.SYMBOLS)) != 1:
continue

decryptedText = affineCipher.decryptMessage(key, message)
if not SILENT_MODE:
print("Tried Key %s... (%s)" % (key, decryptedText[:40]))

if detectEnglish.isEnglish(decryptedText):
# Check with the user if the decrypted key has been found.
print()
print("Possible encryption hack:")
print("Key: %s" % (key))
print("Decrypted message: " + decryptedText[:200])
print()
print("Enter D if done, anything else to continue hacking:")
response = input("> ")

if response.strip().upper().startswith("D"):
return decryptedText
return None

# If affineHacker.py is run (instead of imported as a module)
# call the main() function.
if _name_ == "_main_":
main()