

(c) Use your decryption table from (b) to decrypt the following message.

(b) Make a decryption table, that is, make a table in which the ciphertext alphabet is in order from A to Z and the plaintext alphabet is mixed up. (a) Encrypt the plaintext message The gold is hidden in the garden. For this exercise, use the simple substitution table given in Table 1.11. inbaitingamousetrapwithcheesealwaysleaveroomforthemouse (c) BGUTBMBGZTFHNLXMKTIPBMAVAXXLXTEPTRLEXTOXKHHFYHKMAXFHNLX In baiting a mousetrap with cheese, always leave room for the mouse. This quote is due to William Shakespeare, Sonnet 116. loveisnotlovewhichalterswhenitalterationfinds (b) UXENRBWXCUXENFQRLQJUCNABFQNWRCJUCNAJCRXWORWMB Love is not love which alters when it alteration finds. This quote is due to Ogden Nash, Many Long Years Ago (1945), Song of the Open Road. ithinkthatishallneverseeabillboardlovelyasatree (a) LWKLQNWKDWLVKDOOQHYHUVHHDELOOERDUGORYHOBDVDWUHH I think that I shall never see, a billboard lovely as a tree. (a) LWKLQNWKDWLVKDOOQHYHUVHHDELOOERDUGORYHOBDVDWUHH (b) UXENRBWXCUXENFQRLQJUCNABFQNWRCJUCNAJCRXWORWMB (c) BGUTBMBGZTFHNLXMKTIPBMAVAXXLXTEPTRLEXTOXKHHFYHKMAXFHNLX Solution to Exercise 1.2. Decrypt each of the following Caesar encryptions by trying the various possible shifts until you obtain readable text. This quote is due to Thomas Jefferson, A Decalogue of Canons. Warren’s Profession (1893) 1Įxercises for Chapter 1 whenangrycounttenbeforeyouspeakifveryangryanhundred XJHRFTNZHMZGAHIUETXZJNBWNUTRHEPOMDNBJMAUGORFAOIZOCC When angry, count ten before you speak if very angry, an hundred. This quote is due to George Bernard Shaw, Mrs. therearenosecretsbetterthanthesecretsthateverybodyguesses (b) AOLYLHYLUVZLJYLAZILAALYAOHUAOLZLJYLAZAOHALCLYFIVKFNBLZZLZ There are no secrets better than the secrets that everybody guesses. apageofhistoryisworthavolumeoflogic (a) LALRPZQSTDEZCJTDHZCESLGZWFXPZQWZRTN This quote is in a court decision of Oliver Wendell Holmes, Jr. XJHRFTNZHMZGAHIUETXZJNBWNUTRHEPOMDNBJMAUGORFAOIZOCC Solution to Exercise 1.1. AOLYLHYLUVZLJYLAZILAALYAOHUAOLZLJYLALZAOHALCLYFIVKFNBLZZLZ (c) Decrypt the following message, which was encrypted by rotating 1 clockwise for the first letter, then 2 clockwise for the second letter, etc. “A page of history is worth a volume of logic.” (b) Decrypt the following message, which was encrypted with a rotation of 7 clockwise. (For your convenience, there is a cipher wheel that you can print and cut out at edu/~jhs/MathCrypto/CipherWheel.pdf.) (a) Encrypt the following plaintext using a rotation of 11 clockwise. Build a cipher wheel as illustrated in Figure 1.1, but with an inner wheel that rotates, and use it to complete the following tasks. Silverman July 31, 2008Īn Introduction to Cryptography Exercises for Chapter 1 Section. An Introduction to Mathematical Cryptography Solution Manual Jeffrey Hoffstein, Jill Pipher, Joseph H.
