Cryptography Reference
In-Depth Information
1.14. Using the description of atbash given on page 23, decipher the following:
WZMRVO
XIBKGZMZOBAVW
RG .
( Hint: You may visualize the atbash methodology via the following cipher
table. )
Plain
a
b
c
d
e
f
g
h
i
j
k
l
m
Cipher
Z
Y
X
W
V
U
T
S
R
Q
P
O
N
Plain
n
o
p
q
r
s
t
u
v
w
x
y
z
Cipher
M
L
K
J
I
H
G
F
E
D
C
B
A
1.15. Using the above table, decipher the following
GSV
DRHV
NVM
XLFOW
MLG .
1.16. Consider the Alberti disk position as illustrated in Figure 1.22 on page
48. Using this position, decipher DOLZYIB . Then assume that the disk
is rotated so that the z sits over the C , and decipher SSIB RGBZRNPV ,
keeping in mind that since there is no w on the disk, we use a double v to
denote it.
In Exercises 1.17-1.20, use the Trithemius tableau on page 51 to decrypt
each ciphertext.
1.17. MPPREQWPILPFWQ .
1.18. WFOYXZTWCPPMETTQI .
This is a quote from St. Francois De Sales (1567-1622), who was Bishop
of Geneva.
1.19. YPXFESTWCCSMXSXQEWMQEQFZCMGQGNLLOSDF .
This is a quote from Indira Gandhi (1917-1984) , who was prime minister
of India until her assassination.
1.20. LPQNMTSMEKCPNBWUC .
This is line 163 of “Lycidas” (1637) , written by the English poet John
Milton (1608-1674) .
In Exercises 1.21-1.24, use the Bellaso polyalphabetic cipher on page 53
employing the keyphrase quintessential to decipher each cryptogram.
1.21. HZURFFXKYUTCTTCZRFFSFXC .
This is a quote from Benjamin Franklin (1706-1790) taken from “Advice
to Young Tradesmen” (1748) . Franklin was an American scientist, diplo-
mat, and publisher.
Search WWH ::




Custom Search