Cryptography
1) The following text is the result of
encrypting a message using a substitution cipher (found at http://25yearsofprogramming.com/fun/ciphers.htm):
LT
LY TQO TQOYLY RX TQLY HRRC TQZT YRBLOTP BZG RGUP HO SGKOIYTRRK TQIRSWQ Z YTSKP
RX TQO VOYYZWOY ZGK TQO BRVVSGLBZTLRG XZBLULTLOY EQLBQ HOURGW TR LT; ZGK TQZT
LG TQO XSTSIO KOJOURAVOGT RX TQOYO VOYYZWOY ZGK BRVVSGLBZTLRG XZBLULTLOY,
VOYYZWOY HOTEOOG VZG ZGK VZBQLGOY, HOTEOOG VZBQLGOY ZGK VZG, ZGK HOTEOOG
VZBQLGO ZGK VZBQLGO, ZIO KOYTLGOK TR AUZP ZG OJOI-LGBIOZYLGW AZIT. LGXRIVZTLRG LY VRIO Z VZTTOI RX AIRBOYY
TQZG RX YTRIZWO. TQZT BRSGTIP ELUU
QZJO TQO WIOZTOYT YOBSILTP EQRYO LGXRIVZTLRGZU ZGK YBLOGTLXLB YLTSZTLRG LY
ZKOFSZTO TR VOOT TQO KOVZGKY TQZT VZP HO AST RG LT – TQO BRSGTIP LG EQLBQ
LT LY XSUUP IOZULNOK TQZT LGXRIVZTLRG LY LVARITZGT ZY Z YTZWO LG TQO BRGTLGSRSY
AIRBOYY HP EQLBQ EO RHYOIJO TQO RSTOI ERIUK, ZGK ZBT OXXOBTLJOUP SARG LT. LG RTQOI ERIKY, GR ZVRSGT RX YBLOGTLXLB
IOYOZIBQ, BZIOXSUUP IOBRIKOK LG HRRCY ZGK AZAOIY, ZGK TQOG AST LGTR RSI
ULHIZILOY ELTQ UZHOUY RX YOBIOBP, ELUU HO ZKOFSZTO TR AIRTOBT SY XRI ZGP UOGWTQ
RX TLVO LG Z ERIUK EQOIO TQO OXXOBTLJO UOJOU RX LGXRIVZTLRG LY AOIAOTSZUUP ZKJZGBLGW. TQOIO LY GR VZWLGRT
ULGO RX TQO HIZLG. UOT SY
IOVOVHOI TQZT TQO ZSTRVZTLB VZBQLGO, EQZTOJOI EO TQLGC RX ZGP XOOULGWY LT VZP
QZJO RI VZP GRT QZJO, LY TQO AIOBLYO OBRGRVLB OFSLJZUOGT RX YUZJO UZHRI. ZGP UZHRI EQLBQ BRVAOTOY ELTQ YUZJO
UZHRI VSYT ZBBOAT TQO OBRGRVLB BRGKLTLRGY RX YUZJO UZHRI. LT LY AOIXOBTUP BUOZI TQZT TQLY ELUU
AIRKSBO ZG SGOVAURPVOGT YLTSZTLRG, LG BRVAZILYRG ELTQ EQLBQ TQO AIOYOGT
IOBOYYLRG ZGK OJOG TQO KOAIOYYLRG RX TQO TQLITLOY ELUU YOOV Z AUOZYZGT
MRCO. …
TQSY TQO GOE LGKSYTILZU IOJRUSTLRG LY
Z TER-OKWOK YERIK. LT VZP HO SYOK XRI TQO HOGOXLT RX
QSVZGLTP, HST RGUP LX QSVZGLTP YSIJLJOY URGW OGRSWQ TR OGTOI Z AOILRK LG EQLBQ
YSBQ Z HOGOXLT LY ARYYLHUO. LT VZP
ZUYR HO SYOK TR KOYTIRP QSVZGLTP, ZGK LX LT LY GRT SYOK LGTOUULWOGTUP LT BZG WR
JOIP XZI LG TQZT KLIOBTLRG.
Your
job is to decipher the text.
There’s a tool at http://www.simonsingh.net/The_Black_Chamber/substitutioncrackingtool.html
that you may find useful. It works
well except that there is a critical error in the instructions that it
gives. It says that if, you think
that a plain text E is represented as X in the cipher text, then
you should enter X in the box above E.
In fact what you need to do is to enter E in the box next to X.
You’ll
find that letter frequencies are your most powerful tool. But you can also take advantage of the
fact that the substitution that was used to create the cipher text leaves
blanks as blanks. So you know where
the word boundaries are. This means
you can exploit things such as the fact that the only one-letter words in
English are “I” and “a”. Another thing you may consider is that
some letters can occur as duplicated letters in English, but others
cannot. So “tt” and “nn”
are possible, but “oo” is not.
2) Read “War in the Fifth Domain”. Write a Notecard-style paragraph about
it.