06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.7. EXERCISES 23<br />

12. What is the most common letter in English Second most common<br />

13. What are the nine most common letters in English<br />

14. What are some <strong>of</strong> the least common letters in English<br />

15. What sorts <strong>of</strong> hills and valleys does the letter frequency count <strong>of</strong> a portion<br />

<strong>of</strong> normal English have<br />

16. How do we use a frequency count to break a Caesar Cipher<br />

17. Are Caesar ciphers secure or not Why<br />

18. When would we use Linquist’s method<br />

19. How does Linquist’s method work Why does it work<br />

1.7 Exercises<br />

1. Encipher the following emperors’ names using a Caesar Cipher with the<br />

given key.<br />

(a) Pompeii, key = D.<br />

(b) Vespasian, key = P.<br />

(c) Caligula, key = H.<br />

(d) Nero, key = T.<br />

2. Encipher the following emperor’s names using a Shift Cipher with the<br />

given key.<br />

(a) Damitian, key = 11.<br />

(b) Trajan, key = 5.<br />

(c) Hadrian, key = 19.<br />

3. Decipher the following names. They have been enciphered using a Caesar<br />

cipher with the given key.<br />

(a) GULWOM UOLYFCOM, key = U.<br />

(b) IRGAJOAY, key = G.<br />

(c) TYESBUJYQD, key = Q.<br />

(d) HFXXNZX, key = F.<br />

4. Decipher the following names. They have been enciphered using a Shift<br />

Cipher with the given key.<br />

(a) RDCHIPCIXCT, key = 15.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!