2.13. Exercises

The first several exercises ask you to decrypt a piece of ciphertext. Each of these is an English prose quotation. More important than the precise quotation is the process you use to analyze the encryption. Justify your answer by describing the various tests you performed and the results you obtained for those tests.

1:Decrypt the following encrypted quotation.
fqjcb rwjwj vnjax bnkhj whxcq nawjv
nfxdu mbvnu ujbbf nnc
2:Decrypt the following encrypted quotation.
oczmz vmzor jocdi bnojv dhvod igdaz
admno ojbzo rcvot jprvi oviyv aozmo
cvooj ziejt dojig toczr dnzno jahvi
fdiyv xcdzq zoczn zxjiy
3:Decrypt the following encrypted quotation.
pbegu uymiq icuuf guuyi qguuy qcuiv
fiqgu uyqcu qbeme vp
4:Decrypt the following encrypted ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.