Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
104 CHAPTER 6. DECRYPTING MONOALPHABETIC CIPHERS<br />
<strong>St</strong>ephen D. Lee, it was suggested that “WILHELMINUSVOLKSVEST”<br />
be used in this manner. The numbering is<br />
W I L H E L M I N U S V O L K S V E S T<br />
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20<br />
As H appears only once, there is only one replacement for it. On the other<br />
hand, L appears three times so it has three possible replacements. The<br />
letters that don’t appear in the keyword are numbered at the end, so A is<br />
21, B is 22, and so on.<br />
When used with a long keyphrase the number <strong>of</strong> replacements for each<br />
letter will mimic how frequently they appear in normal language. If the<br />
substitute for a letter is always randomly chosen from the set <strong>of</strong> replacements,<br />
then this leads to a very flat frequency count. Hence this method<br />
can produce quite secure ciphertexts. Unfortunately, people tend to get<br />
lazy and generally reuse the same couple <strong>of</strong> replacements, destroying the<br />
strength <strong>of</strong> the system.<br />
(a) Routh’s word was later taken up by General Robert E. Lee. He<br />
used it to encipher a message he sent on 23 Nov 1863 [Gaddy]. The<br />
following contains Lee’s location and the name and location <strong>of</strong> the<br />
intended recipient. Decipher the message.<br />
25 30 13 7 4 29 23 21 12 21 3 30 32 2 9 7 8<br />
11 16 2 19 11 8 28 28 2 26 30 21 9 21 24 21 20<br />
13 23 13 6 22 5 9 27 21 7 8 9 16 1 18 1 14<br />
3 21 21 26 7 5 30 2 24 8 21 9<br />
(b) In June 1864 a Confederate major <strong>of</strong> Gen. E. Kirby Smith’s trans-<br />
Mississippi command deserted and disclosed a cipher similar to the<br />
one above, based on the word “impersonificationaly” [Gaddy].<br />
Decipher the following silly phrase (designed to take advantage <strong>of</strong> the<br />
homophones). 1 5 18 17 18 31 18 20 13 8 22 1 2 24 15 22 11 8 23 9<br />
17 2 7 17 14 18 8 13.<br />
8. The most famous cipher story in history is Edgar Allen Poe’s “The Gold<br />
Bug”. First published in 1843, it caused a sensation. By far Poe’s most<br />
popular story, it gave Poe an international reputation as a great cryptography.<br />
In the story, William Legrand is living on an island near South Carolina.<br />
By legend, this island was once the home <strong>of</strong> the pirate Captain Kidd.<br />
Legrand has found a new species <strong>of</strong> beetle, a gold-colored one. He draws a<br />
picture <strong>of</strong> this bug to show to a friend. It happens that the paper he uses<br />
contains a secret message written in invisible ink that just so happens to<br />
become visible when the friend just so happens to hold the paper close,<br />
but not too close, to a fire. Here is the message.