Book contents
- Frontmatter
- Contents
- Preface to the First Edition
- Preface to the Second Edition
- 1 Monoalphabetic Ciphers Using Additive Alphabets
- 2 General Monoalphabetic Substitution
- 3 Polyalphabetic Substitution
- 4 Polygraphic Systems
- 5 Transposition
- 6 RSA Encryption
- 7 Perfect Security—One-time Pads
- Appendix A Tables
- Appendix B ASCII Codes
- Appendix C Binary Numbers
- Solutions to Exercises
- Further Readings
- Index
- About the Authors
Solutions to Exercises
- Frontmatter
- Contents
- Preface to the First Edition
- Preface to the Second Edition
- 1 Monoalphabetic Ciphers Using Additive Alphabets
- 2 General Monoalphabetic Substitution
- 3 Polyalphabetic Substitution
- 4 Polygraphic Systems
- 5 Transposition
- 6 RSA Encryption
- 7 Perfect Security—One-time Pads
- Appendix A Tables
- Appendix B ASCII Codes
- Appendix C Binary Numbers
- Solutions to Exercises
- Further Readings
- Index
- About the Authors
Summary
Chapter 1
1. COWARDS DIE MANY TIMES BEFORE THEIR DEATHS
2. THE EVIL THAT MEN DO LIVES AFTER THEM
3. (a) Wednesday (b) 1/4
4. x = 6
5. y = 2
6. (a) AOL MHBSA KLHY IYBABZ PZ UVA PU VBY ZAHYZ IBA PU VBYZLSCLZ
(b) THERE IS A TIDE IN THE AFFAIRS OF MEN WHICH TAKEN AT THE FLOOD LEADS ON TO FORTUNE
7. K = 9
8. K = 21
9. K = 14
10. K = 5
11. (a) y = 10 (b) x = 2, 5, 8
12. 3
13. Any multiple of 2 or 3
Any number having a factor in common with n
14. (a) Interval 7
(b) Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher GNUBIPWDKRYFMTAHOVCJQXELSZ
(c) ORDER IS HEAVENS FIRST LAW
15. C = 9P
- Type
- Chapter
- Information
- Elementary CryptanalysisA Mathematical Approach, pp. 197 - 204Publisher: Mathematical Association of AmericaPrint publication year: 2009