Cryptography Reference
In-Depth Information
sage and show the user the regained plaintext. Use only uppercase English characters
for your alphabet.
The following text was produced using a Caesar cipher on a message consisting of only
uppercase English letters. Determine the shift value and recover the plaintext.
MXXFT QQHUX WMDYM QHQDO DQMFQ PNKYQ EUZOQ ARAXP AZMOO AGZFA RYKNQ
SUZZU ZSXQE ESDQQ PTMFD QPMZP USZAD MZOQN ADZAR YKOAZ PGOFE BQQOT
MZPFT AGSTF UZAIO AZRQE EABQZ XKMZP RGXXK
3.
2.
The following text was produced using a simple Vigenere cipher. Use the Kaisiski
method to determine probable key length, then do a frequency analysis to determine the
keyword, and recover the plaintext.
SSQYN ASXES RBFOR SOUYK VTAKO QVKSZ WOQSF VNOBB BRWKB BRCQS
QSOSF WJYSX FHKYS YGODI FSUMD BJJOD FQCWN IBSDO HSPBW XBDIL
MWQGP FZNVD DOSGO NEZSB JJSBQ FSXUW QOIOZ VLBIN TSBTP VBKUV
OXKOJ KDFMZ UCUBB DVITS PKTHC ZPZCB FWZVZ YCLMW HJOSO VBQCE
SGSSO BIWCS FDISC BZOBN DFMZU CUBBD VIORS NJHWY OBSGZ CFUTD
FSOUS BWSFV BUAOO SNOTO ZPSSR FBBCY SGQRP HDKVZ OXEJO XTHCX
FGQYU HVKOR PYPYC PBDDV JSRMS MDDPU FKQVM MSQDB FGGBP GSXLS
BXFHV OMSAO OHOBZ BIWCS FDISC BZOBN JHGKQ DZSDO HSPBG LPGHY
OORNJ GCXXS GVFMF YTWBQ NWQRB SZSND ZONSB DJBUO MZWZU WQMVF
JODFM ZUCUB BDVIH FSOOK WMIAO XOWBQ TAWDI FWMIO FNJBH OSBSD
DFMZU CUBBD VICCG DPBON EWGYO KSCMS MCUOZ VJBUC XWZVJ OAMSM
DDPUF KQVMK ORBOU KCBLG SMVFW DZBRO EWHSP BIZQS FCBRR VFFWF
FFDBF BHSDS VKMZG DFDSX TCBXF OZMSM DDPBC WJQCX OSKIP FYZFF
SXOWO VUFOZ QSKKE SOXEK OCIWB QUCBV BKFOO QSSOH FYEIQ DJCBD
PQFIQ HCQSO DRZKW DIQCN JBUDI SCBZI DZFFG KERZO SWJOS DFOOH
WMFVO VMKOI OSFZF HSBEW GKQDS KSWBQ DFMZU CUBBD VIDVS CUBID
IWZVB DDBPT SCTWC XBZ
4.
The following text was produced using an auto-key Vigenere cipher. Attempt to recover
the priming key, and hence the plaintext.
TVWFP VVHZD PZXLX ADBSS SSWBW KAABS DXZFG ANWTZ PWEKV AEOEA
PIOBZ TALSV XUIFW AYEMU MFWAY EMWLT AMMNL HGAHX QILIG PPXFQ
ZMEAD XUXCM RSJHZ XLXCW HKNEH YKZMB OEDXZ FGANW TZPWE MOGWO
EAPKH HRTAL SVXUI FWAYE MUMFW AYEMW LTAMM NLHGA HXQIL IGPPX
FSSSW BWKAA BS
5.
The following text was produced using a monoalphabetic substitution cipher, which
maps the alphabet A . . . Z to a permutation of that alphabet. Using frequency analysis,
attempt to recover the plaintext.
ULNEA YTWPX TFNUR WBPHN BPEXE YRKXB PANXE YRKFX HNENW WPETF
NUULN BKRFN YZNKU LNSXW LYSUL NWNPP ETULN GXKTW YSULN PXKYZ
NKULN FXZNW UYIHY ZNKPF FULNN PKULP ETYZN KPFFU LNIKN PURKN
WULPU BYZNP FYEAU LNAKY RETWY AYTIK NPUNT BPEXE LXWYD EXBPA
NXEUL NXBPA NYSAY TLNIK NPUNT LXBBP FNPET SNBPF NLNIK NPUNT
ULNBA YTGFN WWNTU LNBPE TWPXT UYULN BGNSK RXUSR FPETX EIKNP
Search WWH ::




Custom Search