06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.7. EXERCISES 25<br />

(d) VTXLTKBTG LXVMBHG, key = T.<br />

10. A part <strong>of</strong> a message <strong>of</strong> Caesar’s to Cicero (in Latin!) was MDEHV RSNQNRQNV<br />

PHDH XHVXNPRQNZP. Decipher it. (Remember, Latin has no J, K, W or<br />

Y.)<br />

11. Use frequency analysis to decrypt the following messages.<br />

(a) VG ZNL OR EBHAQYL NFFREGRQ GUNG UHZNA VATRAHVGL PNAABG PBAP-<br />

BPG N PVCURE JUVPU UHZNA VATRAHVGL PNAABG ERFBYIR RQTNE NYYRA<br />

CBR<br />

(b) DHVIV BZYVA OZMNJ HZRJM MTOJN JGQZO CZHZN NVBZV IYQZM TAZRO<br />

CDIBN DIVAO ZMGDA ZBVQZ HZVNH PXCKG ZVNPM ZVNYD YOCZP IMVQZ<br />

GDIBJ AOCVO XJYZC VMMTC JPYDI D<br />

(c) STHTI JTWHN UMJWN XNRUW JLSFG QJYTF YYFHP ZSQJX XNYNX NSXTQ<br />

ZGQJG DYMJN SAJSY TWMNR XJQK<br />

12. Use frequency analysis to decrypt the following messages.<br />

(a) RKXXSLKV KXXYEXMON DYNKI DRKD RO KXN DRO OVOZRKXDC GYEVN LO<br />

KBBSFSXQ SXBYWO CYWODSWO XOHD GOOU<br />

(b) GFWSZ RFSST ZSHJI YMFYM JFSIG FNQJD BTZQI FZINY NTSYM JJQJU<br />

MFSYX KTWUT XXNGQ JNSHQ ZXNTS NSYMJ NWHNW HZX<br />

13. Decrypt the following ciphertexts using Linquist’s method.<br />

(a) DROOX OWIUX YGCDR OCICD OWLOS XQECO NMVKE NOCRK XXYX<br />

(b) WUDJB UCUDT EDEJH UQTUQ SXEJX UHICQ YB<br />

This is a quote <strong>of</strong> Henry L. <strong>St</strong>imson, President Hoover’s Secretary <strong>of</strong><br />

<strong>St</strong>ate, writing later about his shutting down the US Black Chamber,<br />

the government cryptoanalytic service, in 1929.<br />

(c) IJXMT KOJBM VHRVN ZQZMN JGQZY WTNOV MDIBV ODO<br />

(d) BJUUH BNUUB NJBQN UUBKH CQNBN JBQXA N.<br />

(e) FHWDU YTLWF RNXFR JXXFL JBWNY YJSNS HNUMJ W<br />

(f) KVVDR ODRSX QCSXD ROGYB VNMYX CDSDE DOKMS ZROB<br />

(g) “The goal <strong>of</strong> a cryptosystem is to: BPZTI WTBTH HPVTX CRDBE GTWTC<br />

HXQAT IDJCP JIWDG XOTSE TGHDC H<br />

14. (a) What happens if we use a Shift Cipher with a shift <strong>of</strong> 26<br />

(b) What happens if we use a number larger than 26 for the shift amount<br />

(c) How many different Shift Ciphers are there<br />

15. According to David Gaddy, “on 1 January 1863 while touring in the west,<br />

[Confederate] President [Jefferson] Davis sent [a person a] telegram which<br />

used a simple slide <strong>of</strong> one” [Gaddy]. If the telegram began TFDSF UBSZP<br />

GXBSKBNF TBTFE EPOSJ DINPO E, to whom was it for

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!