O'Reilly logo

Computer Security and Cryptography by Alan G. Konheim

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3.10 MONOALPHABETIC SUBSTITUTION PROBLEMS

3.10 MONOALPHABETIC SUBSTITUTION PROBLEMS

The ciphertext files cipherPr3.1-cipherPr3.6 and the table of one-gram probabilities (Table 3.6) may be downloaded from the following ftp address: ftp://ftp.wiley.com/public/sci_tech_med/computer_security.

3.1

cipherPr3.1 results from a Caesar substitution on plaintext written using the alphabet AB … Z. Find the key.

___________________________________________________

                   cipherPr3.1

___________________________________________________

znkyzgzksktzzngzznkqtgvygiqvxuhrksoyngxjotgtgyykxz

outghuazznkmktkxgrqtgvygiqvxuhrksgcuxyzigykgyykxzo

utznkyurazoutluxikxzgotirgyykyulqtgvygiqvxuhrksyoy

waozkyzxgomnzlucgxjluxkdgsvrkolznkqtgvygiqbkizux

___________________________________________________

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required