Cryptography Reference
In-Depth Information
1.14. Using the description of atbash given on page 23, decipher the following:
WZMRVO
XIBKGZMZOBAVW
RG
.
(
Hint: You may visualize the atbash methodology via the following cipher
table.
)
Plain
a
b
c
d
e
f
g
h
i
j
k
l
m
Cipher
Z
Y
X
W
V
U
T
S
R
Q
P
O
N
Plain
n
o
p
q
r
s
t
u
v
w
x
y
z
Cipher
M
L
K
J
I
H
G
F
E
D
C
B
A
1.15. Using the above table, decipher the following
GSV
DRHV
NVM
XLFOW
MLG
.
1.16. Consider the Alberti disk position as illustrated in Figure 1.22 on page
48. Using this position, decipher
DOLZYIB
. Then assume that the disk
is rotated so that the
z
sits over the
C
, and decipher
SSIB RGBZRNPV
,
keeping in mind that since there is no
w
on the disk, we use a double
v
to
denote it.
In Exercises 1.17-1.20, use the Trithemius tableau on page 51 to decrypt
each ciphertext.
1.17.
MPPREQWPILPFWQ
.
1.18.
WFOYXZTWCPPMETTQI
.
This is a quote from
St. Francois De Sales (1567-1622), who was Bishop
of Geneva.
1.19.
YPXFESTWCCSMXSXQEWMQEQFZCMGQGNLLOSDF
.
This is a quote from
Indira Gandhi (1917-1984)
, who was prime minister
of India until her assassination.
1.20.
LPQNMTSMEKCPNBWUC
.
This is line 163 of “Lycidas”
(1637)
, written by the English poet
John
Milton (1608-1674)
.
In Exercises 1.21-1.24, use the Bellaso polyalphabetic cipher on page 53
employing the keyphrase
quintessential
to decipher each cryptogram.
1.21.
HZURFFXKYUTCTTCZRFFSFXC
.
This is a quote from
Benjamin Franklin (1706-1790)
taken from
“Advice
to Young Tradesmen” (1748)
. Franklin was an American scientist, diplo-
mat, and publisher.
Search WWH ::
Custom Search