30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

80<br />

chapter 7<br />

Table 7.4 Letter frequencies in unenciphered<br />

English <strong>and</strong> in book cipher<br />

Frequency (per 1000)<br />

Letter Normal English Book cipher<br />

A 64 31<br />

B 14 30<br />

C 27 29<br />

D 35 55<br />

E 100 40<br />

F 20 32<br />

G 14 39<br />

H 42 46<br />

I 63 34<br />

J 3 26<br />

K 6 36<br />

L 35 37<br />

M 20 45<br />

N 56 38<br />

O 56 28<br />

P 17 26<br />

Q 4 37<br />

R 49 46<br />

S 56 52<br />

T 71 38<br />

U 31 26<br />

V 10 39<br />

W 18 34<br />

X 3 32<br />

Y 18 25<br />

Z 2 52<br />

Space etc. 166 47<br />

Source: The data in <strong>the</strong> left-h<strong>and</strong> column are<br />

quoted in [1.2, Appendix 2]; <strong>the</strong> data in <strong>the</strong><br />

right-h<strong>and</strong> column were derived<br />

ma<strong>the</strong>matically from those in <strong>the</strong> left-h<strong>and</strong><br />

column (for <strong>the</strong> details see M6).<br />

<strong>the</strong> cipher might have helped him to <strong>the</strong> conclusion that a book cipher is<br />

being used, <strong>the</strong> individual letter frequencies will not be so different from<br />

r<strong>and</strong>om that <strong>the</strong>y will be of much help, nor will <strong>the</strong> digraphs etc. There is,<br />

however, an attack to which a book cipher is vulnerable: it might be called<br />

‘crib-dragging’. Suppose that ei<strong>the</strong>r <strong>the</strong> message or <strong>the</strong> key text contains<br />

some common English word such as THE. This is added to 3 letters of<br />

ano<strong>the</strong>r English word in <strong>the</strong> o<strong>the</strong>r text to produce 3 letters of <strong>the</strong> cipher.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!