Question
Cryptanalyze the text below. This is a ciphertext produced by mono alphabetic substitution cipher. Ideally you should find the plaintext. Method used to cryptanalyze: Frequency
Cryptanalyze the text below. This is a ciphertext produced by mono alphabetic substitution cipher. Ideally you should find the plaintext.
Method used to cryptanalyze: Frequency Analysis
You may use the following resources.
First, the page https://norvig.com/mayzner.html gives you the frequency distribution of letters, commonly used English words etc.
The second is a frequency analysis tool: https://math.dartmouth.edu/~awilson/tools/frequency_analysis.html
You may use the tool to find out the frequency of characters and make substitutions to try out if they work.
YXY IGFHA, GC UIIFIHUKH RBXDBUGGLB, PUK UJMUCI YL NXSKT
AUBT UH MXBV FK AFI PSYFPJL. YXY MXBVI FKTLRLKTLKHJC, MFHAXSH
MUIHFKD PXGRUKC HFGL HUJVFKD HX PXJJLUDSLI. YXY KLWLB
HAFKVI HMFPL UYXSH UIIFIHFKD NLJJXM LGRJXCLLI, UKT AL UJMUCI
NFKFIALI DFWLK UIIFDKGLKHI XK HFGL. XNHLK YXY HUVLI LQHLKTLT
GLUISBLI HX PXGRJLHL AFI MXBV, IXGLHFGLI IVFRRFKD PXNNLL
YBLUVI. YXY FI U TLTFPUHLT FKTFWFTSUJ MAX AUI UYIXJSHLJC KX
WUKFHC FK IRFHL XN AFI AFDA UPPXGRJFIAGLKHI UKT RBXNXSKT
VKXMJLTDL FK AFI NFLJT. F NFBGJC YLJFLWL HAUH YXY PUK YL
PJUIILT UI U AFDA-PUJFYLB LGRJXCLL, HAL HCRL MAFPA PUKKXH YL
TFIRLKILT MFHA. PXKILESLKHJC, F TSJC BLPXGGLKT HAUH YXY YL
RBXGXHLT HX LQLPSHFWL GUKUDLGLKH, UKT U RBXRXIUJ MFJJ YL
ILKH UMUC UI IXXK UI RXIIFYJL.
IFKPLBLJC,
RBXOLPH JLUTLB
-------------------------------------------------------------------
HAL NXJJXMFKD GLGX MUI IXXK ILKH NXJJXMFKD "HAL JLHHLB"
HAUH IHSRFT TXJH MUI BLUTFKD XWLB GC IAXSJTLB MALK F MBXHL HAL BLRXBH ILKH HX CXS LUBJFLB HXTUC. VFKTJC BLUT LWLBC ILPXKT JFKL (F.L.. 1, 3, 5, 7, 9, ..) NXB GC HBSL UIILIIGLKH XN AFG.
BLDUBTI,
TLBLV PBUYY RBXOLPH JLUTLB
(IXSBPL: FKHLBKLH. KXHL UJIX, BLUT LWLBC XHALB JFKL - IHUBHFKD NBXG HAL NFBIH JFKL. HAUH'I NFIH JFKL, HAFBT JFKL, NFNHA JFKL, LHP.)
Submit the following:
1) Method you used to cryptanalyze the ciphertext
2) Plaintext recovered
3) Key recovered
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started