ocwyikoooniwugpmxwktzdwgtssayjzwyemdlbnqaaavsuwdvbrflauplooubfgqhgcscmgzlatoedcsdeidpbhtmuovpiekifpimfnoamvlpqfxejsmxmpgkccaykwfzpyuavtelwhrhmwkbbvgtguvtefjlodfefkvpxsgrsorvgtajbsauhzrzalkwuowhgedefnswmrciwcpaaavogpdnfpktdbalsisurlnpsjyeatcuceesohhdarkhwotikbroqrdfmzghgucebvgwcdqxgpbgqwlpbdaylooqdmuhbdqgmyweuikNote: The last line of the ciphertext given in the book (mvswrvnqlszdmgaoqsakmlupsqforvtwvdfcjzvgsoaoqsacjkbrsevbel) is gibberish, even for ciphertext. Don't use it to solve the assignment.
For each, submit a printout of your program (or a transcript of your Matlab/Maple session if you used the Appendix) and your results (the decrypted plaintext).
Note: you may write a program to do this from scratch (that's what I did for Vigenere), or use the book's code, following the process given in Appendices (e.g, C.2 example 4 in Matlab). You reap what you sow: it's harder work to code from scratch, but you get more out of it. On the practical part of Exam 1 (week 3), you'll need to decrypt messages using these various ciphers using this software - doing this homework carefully and documenting it well is the best way to prepare.