Cryptography Club Practice Ciphers

advertisement
Cryptography Club Practice Ciphers
9-27-2003
1. To those friends considering, it is always news, but all filled ciphers disturb
happiness with varied answers!
By TRYIT
--This is a concealment cipher. There is a message hidden within this sentence, the key
is figuring out how to read off the letters. The following cipher was taken from
Cryptanalysis [a study of ciphers and their solution] by Helen Fouche Gaines. This book
offers a very good introduction to elementary cipher systems and their cryptanalysis.
You can find a copy of this book in the UCF library.
2.
TADOHSFWEURLRROEEEMDITUGSOSEMBE.UEL.CGEBHAS.PISRLNK.EEN.
--This is a columnar transposition cipher. There is a message hidden within the
letters. The key is figuring out how many letters to skip when reading off the
letters. Another method is to write the cipher into columns. Try using two
columns and see if any text can be read, if that doesn’t work, try using three
and so forth. A variation of this cipher, the Double Columnar Transposition
Cipher was the official field cipher of the United States Army during WWII.
3.
VXMDUJAJARCQVNCRLLXDUMKNLXWBRMNANMANVJRWMNAARCQVNCRL
--This is called a shift cipher. Each letter has been shifted up the alphabet by the
same number. The key to solving this cipher is to determine the amount each character
has been shifted by. The following cipher was taken from Elementary Cryptanalysis by
Abraham Sinkov. This book offers a very good introduction to elementary cipher systems
and the mathematical notation involved. You can find a copy of this book in the UCF
library.
--Hint: _______ Ball
4.
The Playfair cipher system works with a table and three rules.
- If two letters are in the same row, shift them one unit to the right and wrap
around the row if necessary.
- If two letters are in the same column, shift them one unit downward and wrap around
the column if necessary.
- If two letters are not in the same row or column, replace each letter by
the letter that is in its row and in the column of the other letter.
Using the table below, decipher the following ciphertext:
P
L
A
Y
F
IJ
R
B
C
D
E
G
H
K
M
N
O
Q
S
T
U
V
W
X
Z
EG MN FQ QM KN BK SV VR GQ XN KU.
Download