Homework Number One - Part Three

 

Part Three: A mixed bag

 

You should hand in your answers in the form of a TeX file (or a processed version for example a PostScript file). You can create a suitable TeX file by downloading the template and editing it.

All the following problems can be done by hand. You can also use Maple if you want to, here are Maple programs for the shift cipher, cryptograms and counting characters in a piece of text. If you are a programmer you can also create your own programs.

In exercises that involve decryption you will get 50 percent credit for a correct decryption, and 50 percent for a clear description of the procedure which you followed.

  1. Exercise 1.1.12 from page 5.
  2. Exercise 1.2.17 from Page 9.
  3. Exercise 2.1.12 from Page 21
  4. Exercise 2.2.12 from Page 30
  5. Exercise 3.1.01 from Page 42
  6. The following text was obtained by encrypting a statistically peculiar sample of English using a cryptogram cipher. Decrypt it and explain what was peculiar about the plaintext. A small amount of extra credit if you can identify the author :-)

    In this cryptogram whitespace and punctuation has been left untouched, only the English letters have been permuted.

    GPQZC, GEZF Z, "JTZSN UR CUEJTZSN -- GPQZC, RMLP ZS QZLF'G XCUJTZSN!
    QP NUF'G LEFZESJ AZSNFUD GUUJTZSN ECC DES'G BMLNEJULZEC BEZS,
    ZSRULD JTZG GUMC CEZF CUY YZJT GULLUY ZR MBUS E FZGJESJ DULLUY
    ZJ GTECC RZSF JTEJ GPDQUC RUL -- UT RUL ZJG JUU CUSN MSWUZS'F XTEZS --
    RZSF JTEJ BZXJUNLEBTZX GPDQUC, DZGGZSN RLUD ZJG MSWUZS'F XTEZS'
    HMUJT JTEJ QCEXA QZLF, 'SUJ ENEZS'"
    
    
    
    
    "ESF DP QCEXA QZLF, GJZCC SUJ HMZJJZSN, GJZCC ZG GZJJZSN, GJZCC ZG GZJJZSN
     US JTEJ BECCZF QMGJ -- GJZCC RCZJJZSN JTLUMNT DP FUCULUMG FUDEZS;
     QMJ ZJ XESSUJ GJUB RLUD NEVZSN RUL ZJ JLMCP RZSFG EDEVZSN
     JTEJ, QP ELJRMC BELEBTLEGZSN, Z GMXT LTPDZSN XES GMGJEZS --
     SUJYZJTGJESFZSN DP CUGJ GPDQUC Z GMXT LTPDZSN GJZCC GMGJEZS--
     JTUMNT Z GTES'J JLP ZJ ENEZS!"