Cryptography Reference
In-Depth Information
3.5. The key is
e
=
71
38
and the ciphertext is
XXVLGWCOCEVHXHOBBKRXKCMJ
This is a quote from
Ralph Waldo Emerson (1803-1882)
. Emerson was
an American poet, Unitarian minister, and philosopher.
In Exercises 2.6-2.9, we got some practical experience with the ADFGVX
cipher. What is hidden in that cipher is that it is a substitution followed
by a transposition. Our experience with the Hill cipher above, as well
as Exercise 1.13, provided applications of substitution ciphers. Now we
get more experience with transposition/permutation ciphers, discussed in
detail on pages 114 and 115. In Exercises 3.6-3.11, use the key given in
Example 3.3 on page 114 to decrypt the given ciphertext.
3.6.
DEWYSAEGIRRDR
Hint: Use the inverse permutation given by
e
−
1
=
123456789 0 1 2 3
591071236131 8 11 2 4
3.7.
IAESAAGDLLERT
This and its conclusion in Exercise 3.8 is a quote from the Irish writer,
Oscar Wilde (1854-1900)
. Wilde's name was actually
Fingall O'Flahertie
Wills
.
3.8.
RSNZAGDOREUAE
3.9.
FRODITNFCAONA
This and its completion in Exercises 3.10 and 3.11 is a quote from
Louis
Agassiz (1807-1873)
, taken from a letter in which he refused an offer to
give a lecture course. Agassiz, known formally as
Jean Louis Rodolphe
Agassiz
was a Swiss-born American naturalist.
3.10.
YMTETEATOWISM
3.11.
NZGZMMIEAKYNO
Exercises 3.12-3.18 are applications of S-DES described in Section 3.2.
3.12. Apply the initial permutation
IP
, described on page 118 to the input
m
= (10101011).
Search WWH ::
Custom Search