06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.3. FREQUENCY ANALYSIS 19<br />

Examples: Use Frequency Analysis to decrypt the following Caesar ciphers.<br />

(1) ZU SGQK G VXUVKX YKTZKTIK KBKXE RKZZKX SAYZ VRGE OZY VXUVKX XURK<br />

We begin by making a frequency count:<br />

ciphertext<br />

\<br />

\ \ \ \<br />

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z<br />

The giant peak at K surrounded by a vast wasteland jumps out at us.<br />

If we guess that the six letters LMNOPQ are uvwxyz, then the peak <strong>of</strong> K<br />

is t, which would be fine, and RVXYZ=aeghi. Putting our guess at the<br />

plaintext alphabet next to the ciphertext alphabet we may compare.<br />

plaintext<br />

ciphertext<br />

\<br />

\ \ \ \<br />

j k l m n o p q r s t u v w x y z a b c d e f g h i<br />

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z<br />

The peaks and valleys seem reasonable. To test, we decipher the message.<br />

Since our prediction is that a became R, we use the key <strong>of</strong> R. Unfortunately,<br />

the message then begins id bpzt p edgetg. This is not right. We must<br />

try again.<br />

Perhaps the low sextet belongs at the beginning <strong>of</strong> the ciphertext alphabet.<br />

If we guess that K = e, then a must be G, and before G is a sextet <strong>of</strong><br />

nothingness. This is likely uvwxyz. Let’s again add the plaintext alphabet<br />

to compare:<br />

plaintext<br />

ciphertext<br />

\<br />

\ \ \ \<br />

u v w x y z a b c d e f g h i j k l m n o p q r s t<br />

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z<br />

The lmnop and rst sets are both relatively high since in such a short<br />

cipher appearing even three or four times counts as “many”. We ought to<br />

be quite confident <strong>of</strong> our plaintext placement. As always, the key is the<br />

letter a becomes, which is G. To finish, we decipher the first couple letters<br />

using a key G. This gives to make a proper, which seems correct. We’ve<br />

found the key! (Now finish up the decryption by deciphering the rest <strong>of</strong><br />

the message using the key G.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!