Cryptography Reference
In-Depth Information
3.5. The key is
e = 71
38
and the ciphertext is
XXVLGWCOCEVHXHOBBKRXKCMJ
This is a quote from Ralph Waldo Emerson (1803-1882) . Emerson was
an American poet, Unitarian minister, and philosopher.
In Exercises 2.6-2.9, we got some practical experience with the ADFGVX
cipher. What is hidden in that cipher is that it is a substitution followed
by a transposition. Our experience with the Hill cipher above, as well
as Exercise 1.13, provided applications of substitution ciphers. Now we
get more experience with transposition/permutation ciphers, discussed in
detail on pages 114 and 115. In Exercises 3.6-3.11, use the key given in
Example 3.3 on page 114 to decrypt the given ciphertext.
3.6.
DEWYSAEGIRRDR
Hint: Use the inverse permutation given by
e 1 = 123456789 0 1 2 3
591071236131 8 11 2 4
3.7.
IAESAAGDLLERT
This and its conclusion in Exercise 3.8 is a quote from the Irish writer,
Oscar Wilde (1854-1900) . Wilde's name was actually Fingall O'Flahertie
Wills .
3.8.
RSNZAGDOREUAE
3.9.
FRODITNFCAONA
This and its completion in Exercises 3.10 and 3.11 is a quote from Louis
Agassiz (1807-1873) , taken from a letter in which he refused an offer to
give a lecture course. Agassiz, known formally as Jean Louis Rodolphe
Agassiz was a Swiss-born American naturalist.
3.10.
YMTETEATOWISM
3.11.
NZGZMMIEAKYNO
Exercises 3.12-3.18 are applications of S-DES described in Section 3.2.
3.12. Apply the initial permutation IP , described on page 118 to the input
m = (10101011).
Search WWH ::




Custom Search