{"group":{"id":1,"name":"Community","lockable":false,"created_at":"2012-01-18T18:02:15.000Z","updated_at":"2026-04-06T14:01:22.000Z","description":"Problems submitted by members of the MATLAB Central community.","is_default":true,"created_by":161519,"badge_id":null,"featured":false,"trending":false,"solution_count_in_trending_period":0,"trending_last_calculated":"2026-04-06T00:00:00.000Z","image_id":null,"published":true,"community_created":false,"status_id":2,"is_default_group_for_player":false,"deleted_by":null,"deleted_at":null,"restored_by":null,"restored_at":null,"description_opc":null,"description_html":null,"published_at":null},"problems":[{"id":42525,"title":"Vigenere cipher - be like Sherlock Holmes!","description":"You're a young detective. Every detective needs a function to decrypt a vigenère cipher. It's a modification of a caesar cipher.\r\n\r\nLet's talk more about the algorithm:\r\n\r\n* Every letter is a number. A=0, B=1, C=2, (...), Z=26\r\n* Output should be presented in capital letters.\r\n* Use ONLY letters. Without interpunction, spaces, etc\r\n* Function has two arguments: encrypted text and key (both are strings). Your output will present a decrypted text. Let's show it on easy example from http://en.algoritmy.net/article/45623/Vigenere-cipher\r\n\r\n*Ciphertext* : CTMCCD, *Key* : Cat\r\n\r\nC – *C* = 2  – 2  = 0  = A \r\n\r\nT – *A* = 19 – 0  = 19 = T\r\n\r\nM – *T* = 12 – 19 = 19 = T\r\n\r\nC – C = 2  – 2  = 0  = A\r\n\r\nC – A = 2  – 0  = 2  = C\r\n\r\nD – T = 3  – 19 = 10 = K\r\n\r\n*decrypted word: ATTACK*\r\n\r\nIt's quite simple,right? Good luck!\r\n\r\n\u003chttp://en.algoritmy.net/article/45623/Vigenere-cipher You can read more about this cipher here. Click!\u003e  ","description_html":"\u003cp\u003eYou're a young detective. Every detective needs a function to decrypt a vigenère cipher. It's a modification of a caesar cipher.\u003c/p\u003e\u003cp\u003eLet's talk more about the algorithm:\u003c/p\u003e\u003cul\u003e\u003cli\u003eEvery letter is a number. A=0, B=1, C=2, (...), Z=26\u003c/li\u003e\u003cli\u003eOutput should be presented in capital letters.\u003c/li\u003e\u003cli\u003eUse ONLY letters. Without interpunction, spaces, etc\u003c/li\u003e\u003cli\u003eFunction has two arguments: encrypted text and key (both are strings). Your output will present a decrypted text. Let's show it on easy example from \u003ca href = \"http://en.algoritmy.net/article/45623/Vigenere-cipher\"\u003ehttp://en.algoritmy.net/article/45623/Vigenere-cipher\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cb\u003eCiphertext\u003c/b\u003e : CTMCCD, \u003cb\u003eKey\u003c/b\u003e : Cat\u003c/p\u003e\u003cp\u003eC – \u003cb\u003eC\u003c/b\u003e = 2  – 2  = 0  = A\u003c/p\u003e\u003cp\u003eT – \u003cb\u003eA\u003c/b\u003e = 19 – 0  = 19 = T\u003c/p\u003e\u003cp\u003eM – \u003cb\u003eT\u003c/b\u003e = 12 – 19 = 19 = T\u003c/p\u003e\u003cp\u003eC – C = 2  – 2  = 0  = A\u003c/p\u003e\u003cp\u003eC – A = 2  – 0  = 2  = C\u003c/p\u003e\u003cp\u003eD – T = 3  – 19 = 10 = K\u003c/p\u003e\u003cp\u003e\u003cb\u003edecrypted word: ATTACK\u003c/b\u003e\u003c/p\u003e\u003cp\u003eIt's quite simple,right? Good luck!\u003c/p\u003e\u003cp\u003e\u003ca href = \"http://en.algoritmy.net/article/45623/Vigenere-cipher\"\u003eYou can read more about this cipher here. Click!\u003c/a\u003e\u003c/p\u003e","function_template":"function text = decrypt(cipher, key)\r\n    text = cipher;\r\nend","test_suite":"%%\r\na='CTMCCDCTWCWG';\r\nb='CAT';\r\ny_correct = 'ATTACKATDAWN';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n%%\r\n\r\na='ctmccdctwcwg';\r\nb='cat';\r\ny_correct='ATTACKATDAWN';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n\r\n%%\r\n\r\na='uaflgsqamnoeqr';\r\nb='matlab';\r\ny_correct='IAMAGREATCODER';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n%%\r\n\r\n%% \r\nind = randi(3);\r\nswitch ind\r\n\tcase 1\r\na='sdirmclkvtldnyimhstdoecfnfsdirmclkvtldnyimhstdoecfnfsdirmclkvtldnyimhstdoecfnfsdirmclkvtldnyimhstdoecfnf';\r\n                b='cheater';\r\n\t\ty_correct = 'QWERTYUIOPLKJHGFDSAZXCVBNMOMGKICSGEREZNFEVFLPDVALDGBSKEAKVHKCPUBGUITDBRWKEJBWDLZIYILJDRTSZWWBIHZPMMXYFUB';\r\n                assert(isequal(decrypt(a,b),y_correct));\r\n\tcase 2\r\n\t\ta='mbvoegshbukmynhaqsetnhvykz'\r\nb='matlab'\r\ny_correct='ABCDEFGHIJKLMNOPQRSTUWVXYZ'\r\n\t\tassert(isequal(decrypt(a,b),y_correct));\r\n\tcase 3\r\n\t\ta='az'\r\nb='za'\r\ny_correct='BZ'\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\nend\r\n\r\n\r\n%%\r\nfiletext = fileread('decrypt.m');\r\nassert(isempty(strfind(filetext, 'IAMAGREATCODER')),'forbidden')\r\n\r\n%%\r\na='CtMcCdCTwcWG';\r\nb='CAt';\r\ny_correct = 'ATTACKATDAWN';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n","published":true,"deleted":false,"likes_count":2,"comments_count":6,"created_by":48826,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":28,"test_suite_updated_at":"2015-08-21T23:18:15.000Z","rescore_all_solutions":false,"group_id":1,"created_at":"2015-08-21T15:15:32.000Z","updated_at":"2025-11-17T23:14:07.000Z","published_at":"2015-08-21T15:15:32.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"targetMode\":\"\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"targetMode\":\"\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\\n\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eYou're a young detective. Every detective needs a function to decrypt a vigenère cipher. It's a modification of a caesar cipher.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eLet's talk more about the algorithm:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eEvery letter is a number. A=0, B=1, C=2, (...), Z=26\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eOutput should be presented in capital letters.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eUse ONLY letters. Without interpunction, spaces, etc\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFunction has two arguments: encrypted text and key (both are strings). Your output will present a decrypted text. Let's show it on easy example from\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.algoritmy.net/article/45623/Vigenere-cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003ehttp://en.algoritmy.net/article/45623/Vigenere-cipher\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eCiphertext\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e : CTMCCD,\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eKey\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e : Cat\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eC –\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eC\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e = 2 – 2 = 0 = A\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eT –\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eA\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e = 19 – 0 = 19 = T\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eM –\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eT\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e = 12 – 19 = 19 = T\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eC – C = 2 – 2 = 0 = A\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eC – A = 2 – 0 = 2 = C\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eD – T = 3 – 19 = 10 = K\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003edecrypted word: ATTACK\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eIt's quite simple,right? Good luck!\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.algoritmy.net/article/45623/Vigenere-cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eYou can read more about this cipher here. Click!\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"}],"problem_search":{"errors":[],"problems":[{"id":42525,"title":"Vigenere cipher - be like Sherlock Holmes!","description":"You're a young detective. Every detective needs a function to decrypt a vigenère cipher. It's a modification of a caesar cipher.\r\n\r\nLet's talk more about the algorithm:\r\n\r\n* Every letter is a number. A=0, B=1, C=2, (...), Z=26\r\n* Output should be presented in capital letters.\r\n* Use ONLY letters. Without interpunction, spaces, etc\r\n* Function has two arguments: encrypted text and key (both are strings). Your output will present a decrypted text. Let's show it on easy example from http://en.algoritmy.net/article/45623/Vigenere-cipher\r\n\r\n*Ciphertext* : CTMCCD, *Key* : Cat\r\n\r\nC – *C* = 2  – 2  = 0  = A \r\n\r\nT – *A* = 19 – 0  = 19 = T\r\n\r\nM – *T* = 12 – 19 = 19 = T\r\n\r\nC – C = 2  – 2  = 0  = A\r\n\r\nC – A = 2  – 0  = 2  = C\r\n\r\nD – T = 3  – 19 = 10 = K\r\n\r\n*decrypted word: ATTACK*\r\n\r\nIt's quite simple,right? Good luck!\r\n\r\n\u003chttp://en.algoritmy.net/article/45623/Vigenere-cipher You can read more about this cipher here. Click!\u003e  ","description_html":"\u003cp\u003eYou're a young detective. Every detective needs a function to decrypt a vigenère cipher. It's a modification of a caesar cipher.\u003c/p\u003e\u003cp\u003eLet's talk more about the algorithm:\u003c/p\u003e\u003cul\u003e\u003cli\u003eEvery letter is a number. A=0, B=1, C=2, (...), Z=26\u003c/li\u003e\u003cli\u003eOutput should be presented in capital letters.\u003c/li\u003e\u003cli\u003eUse ONLY letters. Without interpunction, spaces, etc\u003c/li\u003e\u003cli\u003eFunction has two arguments: encrypted text and key (both are strings). Your output will present a decrypted text. Let's show it on easy example from \u003ca href = \"http://en.algoritmy.net/article/45623/Vigenere-cipher\"\u003ehttp://en.algoritmy.net/article/45623/Vigenere-cipher\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cb\u003eCiphertext\u003c/b\u003e : CTMCCD, \u003cb\u003eKey\u003c/b\u003e : Cat\u003c/p\u003e\u003cp\u003eC – \u003cb\u003eC\u003c/b\u003e = 2  – 2  = 0  = A\u003c/p\u003e\u003cp\u003eT – \u003cb\u003eA\u003c/b\u003e = 19 – 0  = 19 = T\u003c/p\u003e\u003cp\u003eM – \u003cb\u003eT\u003c/b\u003e = 12 – 19 = 19 = T\u003c/p\u003e\u003cp\u003eC – C = 2  – 2  = 0  = A\u003c/p\u003e\u003cp\u003eC – A = 2  – 0  = 2  = C\u003c/p\u003e\u003cp\u003eD – T = 3  – 19 = 10 = K\u003c/p\u003e\u003cp\u003e\u003cb\u003edecrypted word: ATTACK\u003c/b\u003e\u003c/p\u003e\u003cp\u003eIt's quite simple,right? Good luck!\u003c/p\u003e\u003cp\u003e\u003ca href = \"http://en.algoritmy.net/article/45623/Vigenere-cipher\"\u003eYou can read more about this cipher here. Click!\u003c/a\u003e\u003c/p\u003e","function_template":"function text = decrypt(cipher, key)\r\n    text = cipher;\r\nend","test_suite":"%%\r\na='CTMCCDCTWCWG';\r\nb='CAT';\r\ny_correct = 'ATTACKATDAWN';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n%%\r\n\r\na='ctmccdctwcwg';\r\nb='cat';\r\ny_correct='ATTACKATDAWN';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n\r\n%%\r\n\r\na='uaflgsqamnoeqr';\r\nb='matlab';\r\ny_correct='IAMAGREATCODER';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n%%\r\n\r\n%% \r\nind = randi(3);\r\nswitch ind\r\n\tcase 1\r\na='sdirmclkvtldnyimhstdoecfnfsdirmclkvtldnyimhstdoecfnfsdirmclkvtldnyimhstdoecfnfsdirmclkvtldnyimhstdoecfnf';\r\n                b='cheater';\r\n\t\ty_correct = 'QWERTYUIOPLKJHGFDSAZXCVBNMOMGKICSGEREZNFEVFLPDVALDGBSKEAKVHKCPUBGUITDBRWKEJBWDLZIYILJDRTSZWWBIHZPMMXYFUB';\r\n                assert(isequal(decrypt(a,b),y_correct));\r\n\tcase 2\r\n\t\ta='mbvoegshbukmynhaqsetnhvykz'\r\nb='matlab'\r\ny_correct='ABCDEFGHIJKLMNOPQRSTUWVXYZ'\r\n\t\tassert(isequal(decrypt(a,b),y_correct));\r\n\tcase 3\r\n\t\ta='az'\r\nb='za'\r\ny_correct='BZ'\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\nend\r\n\r\n\r\n%%\r\nfiletext = fileread('decrypt.m');\r\nassert(isempty(strfind(filetext, 'IAMAGREATCODER')),'forbidden')\r\n\r\n%%\r\na='CtMcCdCTwcWG';\r\nb='CAt';\r\ny_correct = 'ATTACKATDAWN';\r\nassert(isequal(decrypt(a,b),y_correct));\r\n\r\n","published":true,"deleted":false,"likes_count":2,"comments_count":6,"created_by":48826,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":28,"test_suite_updated_at":"2015-08-21T23:18:15.000Z","rescore_all_solutions":false,"group_id":1,"created_at":"2015-08-21T15:15:32.000Z","updated_at":"2025-11-17T23:14:07.000Z","published_at":"2015-08-21T15:15:32.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"targetMode\":\"\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"targetMode\":\"\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\\n\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eYou're a young detective. Every detective needs a function to decrypt a vigenère cipher. It's a modification of a caesar cipher.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eLet's talk more about the algorithm:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eEvery letter is a number. A=0, B=1, C=2, (...), Z=26\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eOutput should be presented in capital letters.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eUse ONLY letters. Without interpunction, spaces, etc\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"ListParagraph\\\"/\u003e\u003cw:numPr\u003e\u003cw:numId w:val=\\\"1\\\"/\u003e\u003c/w:numPr\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFunction has two arguments: encrypted text and key (both are strings). Your output will present a decrypted text. Let's show it on easy example from\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.algoritmy.net/article/45623/Vigenere-cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003ehttp://en.algoritmy.net/article/45623/Vigenere-cipher\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eCiphertext\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e : CTMCCD,\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eKey\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e : Cat\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eC –\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eC\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e = 2 – 2 = 0 = A\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eT –\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eA\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e = 19 – 0 = 19 = T\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eM –\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eT\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e = 12 – 19 = 19 = T\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eC – C = 2 – 2 = 0 = A\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eC – A = 2 – 0 = 2 = C\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eD – T = 3 – 19 = 10 = K\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003edecrypted word: ATTACK\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eIt's quite simple,right? Good luck!\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.algoritmy.net/article/45623/Vigenere-cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eYou can read more about this cipher here. Click!\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"}],"term":"tag:\"decrypting\"","current_player_id":null,"fields":[{"name":"page","type":"integer","callback":null,"default":1,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":null,"prepend":true},{"name":"per_page","type":"integer","callback":null,"default":50,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":null,"prepend":true},{"name":"sort","type":"string","callback":null,"default":null,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":null,"prepend":true},{"name":"body","type":"text","callback":null,"default":"*:*","directive":null,"facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":false},{"name":"group","type":"string","callback":null,"default":null,"directive":"group","facet":true,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"difficulty_rating_bin","type":"string","callback":null,"default":null,"directive":"difficulty_rating_bin","facet":true,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"id","type":"integer","callback":null,"default":null,"directive":"id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"tag","type":"string","callback":null,"default":null,"directive":"tag","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"product","type":"string","callback":null,"default":null,"directive":"product","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"created_at","type":"timeframe","callback":{},"default":null,"directive":"created_at","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"profile_id","type":"integer","callback":null,"default":null,"directive":"author_id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"created_by","type":"string","callback":null,"default":null,"directive":"author","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"player_id","type":"integer","callback":null,"default":null,"directive":"solver_id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"player","type":"string","callback":null,"default":null,"directive":"solver","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"solvers_count","type":"integer","callback":null,"default":null,"directive":"solvers_count","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"comments_count","type":"integer","callback":null,"default":null,"directive":"comments_count","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"likes_count","type":"integer","callback":null,"default":null,"directive":"likes_count","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"leader_id","type":"integer","callback":null,"default":null,"directive":"leader_id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"leading_solution","type":"integer","callback":null,"default":null,"directive":"leading_solution","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true}],"filters":[{"name":"asset_type","type":"string","callback":null,"default":null,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":"\"cody:problem\"","prepend":true},{"name":"profile_id","type":"integer","callback":{},"default":null,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":"author_id","static":null,"prepend":true}],"query":{"params":{"per_page":50,"term":"tag:\"decrypting\"","current_player":null,"sort":"map(difficulty_value,0,0,999) asc"},"parser":"MathWorks::Search::Solr::QueryParser","directives":{"term":{"directives":{"tag":[["tag:\"decrypting\"","","\"","decrypting","\""]]}}},"facets":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e05960\u003e":null,"#\u003cMathWorks::Search::Field:0x00007fdbc3e058c0\u003e":null},"filters":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e05000\u003e":"\"cody:problem\""},"fields":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e06180\u003e":1,"#\u003cMathWorks::Search::Field:0x00007fdbc3e05f00\u003e":50,"#\u003cMathWorks::Search::Field:0x00007fdbc3e05aa0\u003e":"map(difficulty_value,0,0,999) asc","#\u003cMathWorks::Search::Field:0x00007fdbc3e05a00\u003e":"tag:\"decrypting\""},"user_query":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e05a00\u003e":"tag:\"decrypting\""},"queried_facets":{}},"query_backend":{"connection":{"configuration":{"index_url":"http://index-op-v2/solr/","query_url":"http://search-op-v2/solr/","direct_access_index_urls":["http://index-op-v2/solr/"],"direct_access_query_urls":["http://search-op-v2/solr/"],"timeout":10,"vhost":"search","exchange":"search.topic","heartbeat":30,"pre_index_mode":false,"host":"rabbitmq-eks","port":5672,"username":"cody-search","password":"78X075ddcV44","virtual_host":"search","indexer":"amqp","http_logging":"true","core":"cody"},"query_connection":{"uri":"http://search-op-v2/solr/cody/","proxy":null,"connection":{"parallel_manager":null,"headers":{"User-Agent":"Faraday v1.0.1"},"params":{},"options":{"params_encoder":"Faraday::FlatParamsEncoder","proxy":null,"bind":null,"timeout":null,"open_timeout":null,"read_timeout":null,"write_timeout":null,"boundary":null,"oauth":null,"context":null,"on_data":null},"ssl":{"verify":true,"ca_file":null,"ca_path":null,"verify_mode":null,"cert_store":null,"client_cert":null,"client_key":null,"certificate":null,"private_key":null,"verify_depth":null,"version":null,"min_version":null,"max_version":null},"default_parallel_manager":null,"builder":{"adapter":{"name":"Faraday::Adapter::NetHttp","args":[],"block":null},"handlers":[{"name":"Faraday::Response::RaiseError","args":[],"block":null}],"app":{"app":{"ssl_cert_store":{"verify_callback":null,"error":null,"error_string":null,"chain":null,"time":null},"app":{},"connection_options":{},"config_block":null}}},"url_prefix":"http://search-op-v2/solr/cody/","manual_proxy":false,"proxy":null},"update_format":"RSolr::JSON::Generator","update_path":"update","options":{"url":"http://search-op-v2/solr/cody"}}},"query":{"params":{"per_page":50,"term":"tag:\"decrypting\"","current_player":null,"sort":"map(difficulty_value,0,0,999) asc"},"parser":"MathWorks::Search::Solr::QueryParser","directives":{"term":{"directives":{"tag":[["tag:\"decrypting\"","","\"","decrypting","\""]]}}},"facets":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e05960\u003e":null,"#\u003cMathWorks::Search::Field:0x00007fdbc3e058c0\u003e":null},"filters":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e05000\u003e":"\"cody:problem\""},"fields":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e06180\u003e":1,"#\u003cMathWorks::Search::Field:0x00007fdbc3e05f00\u003e":50,"#\u003cMathWorks::Search::Field:0x00007fdbc3e05aa0\u003e":"map(difficulty_value,0,0,999) asc","#\u003cMathWorks::Search::Field:0x00007fdbc3e05a00\u003e":"tag:\"decrypting\""},"user_query":{"#\u003cMathWorks::Search::Field:0x00007fdbc3e05a00\u003e":"tag:\"decrypting\""},"queried_facets":{}},"options":{"fields":["id","difficulty_rating"]},"join":" "},"results":[{"id":42525,"difficulty_rating":"easy-medium"}]}}