06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.2. DECRYPTING MONOALPHABETIC CIPHERS 91<br />

(2) h can be the easiest consonant to identify. It precedes vowels, rarely follows<br />

them, and can be found most <strong>of</strong>ten in th, he and ha.<br />

(3) t acts like a vowel in that it likes to mate with many other letters. It has a<br />

very strong desire to make th’s, and will make tt’s.<br />

(4) r will appear next to any vowel, and likes the company <strong>of</strong> the other highfrequency<br />

letters.<br />

(5) n and s act behave the reverse <strong>of</strong> h. They prefer to follow vowels and precede<br />

consonants. It can be hard to tell whether nst are vowels or consonants.<br />

We summarize some <strong>of</strong> this information in Figure 6.1, using x and X to<br />

indicate strong and stronger behaviors.<br />

a e i o t r n h s<br />

common x X x x x<br />

starting words x x x X x<br />

ending words X x x x x<br />

lots <strong>of</strong> mates x X x x x<br />

doubles x x x x<br />

Figure 6.1: Some Basic Letter Behaviors<br />

6.2 Decrypting Monoalphabetic Ciphers<br />

Now its time we get decrypting. What do we do<br />

1) Make a frequency chart.<br />

2) Does the frequency count suggest a Caesar cipher Look for e and t, the aei<br />

and rst triples, the uvwxyz string, either forwards or backwards. If you find<br />

two or three <strong>of</strong> these patterns it may be a Caesar cipher and we can decrypt<br />

these. If not, continue with step 3.<br />

3) Find the most common letters: these are probably etaoinshr.<br />

4) Develop a digraph table for the probable etaoinshr letters. For each<br />

appearance <strong>of</strong> a common ciphertext letter list the letter that precedes it and<br />

the letter that follows it in the cipher. These tables are a bit time consuming<br />

to construct, but are very helpful, especially for ciphers without word breaks.<br />

5) Use the letter behaviors table, Figure 6.1, to make initial guesses.<br />

6) Work hard and be persistent.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!