06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

104 CHAPTER 6. DECRYPTING MONOALPHABETIC CIPHERS<br />

<strong>St</strong>ephen D. Lee, it was suggested that “WILHELMINUSVOLKSVEST”<br />

be used in this manner. The numbering is<br />

W I L H E L M I N U S V O L K S V E S T<br />

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20<br />

As H appears only once, there is only one replacement for it. On the other<br />

hand, L appears three times so it has three possible replacements. The<br />

letters that don’t appear in the keyword are numbered at the end, so A is<br />

21, B is 22, and so on.<br />

When used with a long keyphrase the number <strong>of</strong> replacements for each<br />

letter will mimic how frequently they appear in normal language. If the<br />

substitute for a letter is always randomly chosen from the set <strong>of</strong> replacements,<br />

then this leads to a very flat frequency count. Hence this method<br />

can produce quite secure ciphertexts. Unfortunately, people tend to get<br />

lazy and generally reuse the same couple <strong>of</strong> replacements, destroying the<br />

strength <strong>of</strong> the system.<br />

(a) Routh’s word was later taken up by General Robert E. Lee. He<br />

used it to encipher a message he sent on 23 Nov 1863 [Gaddy]. The<br />

following contains Lee’s location and the name and location <strong>of</strong> the<br />

intended recipient. Decipher the message.<br />

25 30 13 7 4 29 23 21 12 21 3 30 32 2 9 7 8<br />

11 16 2 19 11 8 28 28 2 26 30 21 9 21 24 21 20<br />

13 23 13 6 22 5 9 27 21 7 8 9 16 1 18 1 14<br />

3 21 21 26 7 5 30 2 24 8 21 9<br />

(b) In June 1864 a Confederate major <strong>of</strong> Gen. E. Kirby Smith’s trans-<br />

Mississippi command deserted and disclosed a cipher similar to the<br />

one above, based on the word “impersonificationaly” [Gaddy].<br />

Decipher the following silly phrase (designed to take advantage <strong>of</strong> the<br />

homophones). 1 5 18 17 18 31 18 20 13 8 22 1 2 24 15 22 11 8 23 9<br />

17 2 7 17 14 18 8 13.<br />

8. The most famous cipher story in history is Edgar Allen Poe’s “The Gold<br />

Bug”. First published in 1843, it caused a sensation. By far Poe’s most<br />

popular story, it gave Poe an international reputation as a great cryptography.<br />

In the story, William Legrand is living on an island near South Carolina.<br />

By legend, this island was once the home <strong>of</strong> the pirate Captain Kidd.<br />

Legrand has found a new species <strong>of</strong> beetle, a gold-colored one. He draws a<br />

picture <strong>of</strong> this bug to show to a friend. It happens that the paper he uses<br />

contains a secret message written in invisible ink that just so happens to<br />

become visible when the friend just so happens to hold the paper close,<br />

but not too close, to a fire. Here is the message.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!