Read More
Date: 5-2-2016
589
Date: 5-2-2016
756
Date: 5-2-2016
731
|
In an additive cipher, each letter is changed into another fixed letter. For example, in the Caesar cipher, every A becomes a D, every B becomes an E, and so on. To generalize this, we could make a fixed substitution for each letter, but use a more complicated rule than simple addition. You could write out the complete alphabet, and the list of substitutions, like
In this code the message “an elephant” becomes DWQGQPCDWT. (It is usual to omit spaces between words.) There are arithmetical ways to break codes such as this, based on the frequency of letters. For example, E is the most common letter in English, so if you think your message is written in English, try putting E for the most commonly occurring letter. This method only works for reasonably long messages; for short ones, you need the key (the whole substitution table).
One simplification of this method involves the use of a keyword. The second row of the table is constructed by writing first the keyword and then the rest of the alphabet in order. The keyword should not be too short; it should contain no repeated letters, and preferably one of the letters should be rather late in the alphabet. For example, keyword CRAZY produces the table
Sample Problem 1.1 Use the keyword CRAZY to encrypt the message “send troops tomorrow.”
Solution. Using the table, s becomes P, e becomes Y, and so on. The ciphertext is PYKZQOLLMPQLJLOOLU.
|
|
تفوقت في الاختبار على الجميع.. فاكهة "خارقة" في عالم التغذية
|
|
|
|
|
أمين عام أوبك: النفط الخام والغاز الطبيعي "هبة من الله"
|
|
|
|
|
قسم شؤون المعارف ينظم دورة عن آليات عمل الفهارس الفنية للموسوعات والكتب لملاكاته
|
|
|