You should hand in your answers in the form of a TeX file (or a processed version for example a PostScript file). You can create a suitable TeX file by downloading the template and editing it.
All the following problems can be done by hand. You can also use Maple if you want to, here are Maple programs for the shift cipher, cryptograms and counting characters in a piece of text. If you are a programmer you can also create your own programs.
In exercises that involve decryption you will get 50 percent credit for a correct decryption, and 50 percent for a clear description of the procedure which you followed.
In this cryptogram whitespace and punctuation has been left untouched, only the English letters have been permuted.
GPQZC, GEZF Z, "JTZSN UR CUEJTZSN -- GPQZC, RMLP ZS QZLF'G XCUJTZSN! QP NUF'G LEFZESJ AZSNFUD GUUJTZSN ECC DES'G BMLNEJULZEC BEZS, ZSRULD JTZG GUMC CEZF CUY YZJT GULLUY ZR MBUS E FZGJESJ DULLUY ZJ GTECC RZSF JTEJ GPDQUC RUL -- UT RUL ZJG JUU CUSN MSWUZS'F XTEZS -- RZSF JTEJ BZXJUNLEBTZX GPDQUC, DZGGZSN RLUD ZJG MSWUZS'F XTEZS' HMUJT JTEJ QCEXA QZLF, 'SUJ ENEZS'" "ESF DP QCEXA QZLF, GJZCC SUJ HMZJJZSN, GJZCC ZG GZJJZSN, GJZCC ZG GZJJZSN US JTEJ BECCZF QMGJ -- GJZCC RCZJJZSN JTLUMNT DP FUCULUMG FUDEZS; QMJ ZJ XESSUJ GJUB RLUD NEVZSN RUL ZJ JLMCP RZSFG EDEVZSN JTEJ, QP ELJRMC BELEBTLEGZSN, Z GMXT LTPDZSN XES GMGJEZS -- SUJYZJTGJESFZSN DP CUGJ GPDQUC Z GMXT LTPDZSN GJZCC GMGJEZS-- JTUMNT Z GTES'J JLP ZJ ENEZS!"