Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Cryptanalyze the text below. This is a ciphertext produced by mono alphabetic substitution cipher. Ideally you should find the plaintext. Method used to cryptanalyze: Frequency

Cryptanalyze the text below. This is a ciphertext produced by mono alphabetic substitution cipher. Ideally you should find the plaintext.

Method used to cryptanalyze: Frequency Analysis

You may use the following resources.

First, the page https://norvig.com/mayzner.html gives you the frequency distribution of letters, commonly used English words etc.

The second is a frequency analysis tool: https://math.dartmouth.edu/~awilson/tools/frequency_analysis.html

You may use the tool to find out the frequency of characters and make substitutions to try out if they work.

YXY IGFHA, GC UIIFIHUKH RBXDBUGGLB, PUK UJMUCI YL NXSKT

AUBT UH MXBV FK AFI PSYFPJL. YXY MXBVI FKTLRLKTLKHJC, MFHAXSH

MUIHFKD PXGRUKC HFGL HUJVFKD HX PXJJLUDSLI. YXY KLWLB

HAFKVI HMFPL UYXSH UIIFIHFKD NLJJXM LGRJXCLLI, UKT AL UJMUCI

NFKFIALI DFWLK UIIFDKGLKHI XK HFGL. XNHLK YXY HUVLI LQHLKTLT

GLUISBLI HX PXGRJLHL AFI MXBV, IXGLHFGLI IVFRRFKD PXNNLL

YBLUVI. YXY FI U TLTFPUHLT FKTFWFTSUJ MAX AUI UYIXJSHLJC KX

WUKFHC FK IRFHL XN AFI AFDA UPPXGRJFIAGLKHI UKT RBXNXSKT

VKXMJLTDL FK AFI NFLJT. F NFBGJC YLJFLWL HAUH YXY PUK YL

PJUIILT UI U AFDA-PUJFYLB LGRJXCLL, HAL HCRL MAFPA PUKKXH YL

TFIRLKILT MFHA. PXKILESLKHJC, F TSJC BLPXGGLKT HAUH YXY YL

RBXGXHLT HX LQLPSHFWL GUKUDLGLKH, UKT U RBXRXIUJ MFJJ YL

ILKH UMUC UI IXXK UI RXIIFYJL.

IFKPLBLJC,

RBXOLPH JLUTLB

-------------------------------------------------------------------

HAL NXJJXMFKD GLGX MUI IXXK ILKH NXJJXMFKD "HAL JLHHLB"

HAUH IHSRFT TXJH MUI BLUTFKD XWLB GC IAXSJTLB MALK F MBXHL HAL BLRXBH ILKH HX CXS LUBJFLB HXTUC. VFKTJC BLUT LWLBC ILPXKT JFKL (F.L.. 1, 3, 5, 7, 9, ..) NXB GC HBSL UIILIIGLKH XN AFG.

BLDUBTI,

TLBLV PBUYY RBXOLPH JLUTLB

(IXSBPL: FKHLBKLH. KXHL UJIX, BLUT LWLBC XHALB JFKL - IHUBHFKD NBXG HAL NFBIH JFKL. HAUH'I NFIH JFKL, HAFBT JFKL, NFNHA JFKL, LHP.)

Submit the following:

1) Method you used to cryptanalyze the ciphertext

2) Plaintext recovered

3) Key recovered

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases And Information Systems 22nd European Conference Adbis 2018 Budapest Hungary September 2 5 2018 Proceedings Lncs 11019

Authors: Andras Benczur ,Bernhard Thalheim ,Tomas Horvath

1st Edition

3319983970, 978-3319983974

More Books

Students also viewed these Databases questions

Question

sharing of non-material benefits such as time and affection;

Answered: 1 week ago