Stuck on cryptology problem(vigenere cipher)

In summary, the conversation discusses a cipher text that needs to be decrypted using various tests and methods. The Kasiski test is not helpful due to the frequencies being too close together. The Index of Coincidence and Friedman test suggest a key length of 10, but frequency analysis does not yield satisfactory results. The conversation ends with a suggestion to try other methods such as hill-climbing or the genetic algorithm, or to break the cipher text into smaller chunks and solve them separately.
  • #1
FYAD
5
0
I was assigned to decrypt this cipher text:

EWPW DRAPO MGTGT EXVAH RPSWI LSFUN RZVSE FOIWJ
NYOU MHSER EFBMB VANHA LOOXI VPBIF FIFMA BFGRH
GARE TLKLF NZQXQ DWGKP UWNWQ QFRZL VROOP UGBQQ
HVKS CDOPW LSGTE JMFSE MLZMD TNDED VVGRO UUMLV
NLHA KWASO ITAPR DTBBG CHDSH TNSFM NGWMF CASWM
WGKD RWJRN UNDVV SFFAE TAGUF HLAUC AETLB MHVAN
WJHU QUQQL SQETD BWGBR APMJW PM

the kasiski test is of no real help; the frequencies are to close together.

highest frequencies of 2 and 3 letter substrings
(higher substrings have almost no discrepancies of frequency):


et: 0.01544402 (132,12,20)
aet: 0.007751938 = 12

kasiski yields 4 as gcd, which suggests 4 as the keylength.

Index of Coincidence is 0.04110484 ; this value is much closer to 0.038 than 0.065, which suggests that the encipherment scheme is polyalphabetic(confirmed by professor to be vigenere).

using the friedman test yields:
(.027*260)/((259*.04110484)-(.038*260+.065)) = 10.01

suggesting that the keylength is 10, which is definitely a better guess than 4(our professor supplied the hint that the keyword was of length 7,8,9 or 10).

going on the guess that the keylength is 10, i split the cipher text into 10 subsequences:

egpzybofrxwosedokdtcwflhqg
wtsvomxmeqqpcjtuwtnajfavqb
pgwsubiatdqudmnuabssraualr
wtiemvvblwfgofdmsbfwnecnsa
delfhapfkgrbpselogmmutawqp
rxsosnbglkzqwedvicnwnaejem
avfiehirfplqlmvnthggdgthtj
pauwrafhnuvhslvladwkvuludw
ohnjelfgzwrvgzghpsmdvfbqbp
mrrnfoiaqnoktmrarhfrshmuwm

with respective ic's of:
0.02461538
0.03384615
0.05538461
0.03692308
0.02769231
0.02461538
0.04
0.06153846
0.02769231
0.06461538

which isn't very much help, as only 3 of the 10 are closer to .065 than .038. supposing that the keylength guess of 10 was incorrect, i split the message into subsequences of 7,8 and 9, and calculated their ic's only to be equally disappointed in the results.

now, going by the results of the friedman test, i stick with a keylength of 10 and use frequency analysis on the results of the split, starting with column ten as its ic was closest to .065 than the others, and i figured it would be easiest.

this netted frequency results of:
r: 0.1923077
m: 0.1538462
a: 0.07692308
f: 0.07692308
h: 0.07692308
n: 0.07692308
o: 0.07692308
i: 0.03846154
k: 0.03846154
q: 0.03846154
s: 0.03846154
t: 0.03846154
u: 0.03846154
w: 0.03846154

suggesting that e mapped to r, and t mapped to m. however, this implies a shift of 13 and 19 respectively, which is inconsistent. i play around with the most commonly used letters(e,t,a,i,n), and i find a shift that looks possible:4.

n to r = 4
i to m = 4
e to a = 4
b to f = 4
d to h = 4
j to n = 4
k to o = 4
a to w = 4

so e mapps to a and presumably the last letter of the keyword is w. trying similar methods on the other subsequences doesn't yield any satisfactory results, and I'm stuck. I've tried asking other people in my class, but none have gotten any farther than i! my professor said this was a somewhat difficult problem and I'm getting fustrated. I'm thinking about writing a brute force program; try every possible combination of ten characters for the keyword - ignoring keywords with repeated letters - and using those keywords to decipher the message and searching the output for the most common digraphs and trigraphs. I'm not exactly sure how feasible this is (26^10 possible combinations?) but I'm going crazy here.
 
Physics news on Phys.org
  • #2
That does sound like a difficult problem. Maybe you can try some other methods like the hill-climbing method or the genetic algorithm. You could also try to break it up into smaller chunks and solve each chunk separately. If you are writing a brute force program, make sure to check out existing implementations and see if they can help you. Good luck!
 
  • #3



It seems like you have made a lot of progress in your attempts to decrypt the cipher text, but you have hit a roadblock. It can be frustrating when you have tried different methods and still can't find the solution. I would suggest taking a step back and looking at the problem from a different perspective. Have you tried looking for patterns in the cipher text? Are there any repeated words or phrases that could give you a clue about the keyword? Also, have you considered using a different approach such as frequency analysis on the whole text instead of just individual columns? It may also be helpful to consult with your professor again and see if they can provide any additional hints or tips. And, while a brute force program may be an option, it may be time-consuming and not guaranteed to give you the correct keyword. Keep trying different methods and don't give up. Sometimes the solution comes when you least expect it. Good luck!
 

1. What is a Vigenere cipher?

A Vigenere cipher is a type of polyalphabetic substitution cipher that uses a keyword to encrypt a message. It was invented by Giovan Battista Bellaso in the 16th century and was later popularized by Blaise de Vigenere in the 19th century.

2. How does a Vigenere cipher work?

A Vigenere cipher works by using a table, known as a Vigenere square, to encrypt a message. The table consists of 26 rows and 26 columns, with each row and column containing the letters of the alphabet in a specific order. The keyword is then repeated to match the length of the message and is used to determine which row of the table to use for each letter of the message. The letter at the intersection of the keyword row and the message column is the encrypted letter.

3. Is a Vigenere cipher secure?

No, a Vigenere cipher is not considered secure as it can be easily cracked by using frequency analysis and other cryptanalysis techniques. However, it was considered to be unbreakable for many centuries and is still used as a learning tool for understanding more complex ciphers.

4. Can a Vigenere cipher be decrypted without the key?

Yes, a Vigenere cipher can be decrypted without the key, but it requires advanced cryptanalysis techniques and a significant amount of ciphertext. Without the key, it is difficult to determine the length of the keyword and the specific keyword used, making it a time-consuming process.

5. Are there any real-world applications for the Vigenere cipher?

While the Vigenere cipher is not used for secure communication, it does have some practical applications. It is used in some historical books and documents to conceal sensitive information, and it is also used in puzzles and games for entertainment purposes.

Similar threads

Replies
12
Views
9K
  • Advanced Physics Homework Help
Replies
4
Views
7K
  • Calculus and Beyond Homework Help
Replies
6
Views
6K
Replies
2
Views
7K
Back
Top