| Line 63: |
Line 63: |
| | Using this rule, the sentence "Jack and Jill went up the hill" is changed to "Etar tzn Evmm gkzc dw cuk uvmm". The [[Caesar cipher]] is one example of a substitution cipher. | | Using this rule, the sentence "Jack and Jill went up the hill" is changed to "Etar tzn Evmm gkzc dw cuk uvmm". The [[Caesar cipher]] is one example of a substitution cipher. |
| | | | |
| − | Substitution ciphers are not safe enough to use for important messages. Substitution ciphers can be broken by an idea called ''frequency analysis''. Some letters are more common than others in English sentences: ''E'' is the most common, then ''T'', then ''A'', and so on. A message that has been changed by a substitution cipher will have different common letters, but this gives a hint about the rule. The most common letters in the changed message are likely to be the most common letters in English. | + | Substitution ciphers are not safe enough to use for important messages. Substitution ciphers can be broken by an idea called ''frequency analysis''. Some letters are more common than others in English sentences: ''E'' is the most common, then ''T'', then ''A'', and so on. A message that has been changed by a substitution cipher will have different common letters, but this gives a hint about the rule. The most common letters in the changed message are likely to be the most common letters in English. Breaking ''cryptograms'' (messages hidden with a substitution cipher) is a common [[puzzle]] often found in newspapers. |
| − | | |
| − | Breaking ''cryptograms'' (messages hidden with a substitution cipher) is a common [[puzzle]] often found in newspapers. | |
| | | | |
| | == Example == | | == Example == |
| Line 119: |
Line 117: |
| | At this point, we can insert spaces and punctuation: | | At this point, we can insert spaces and punctuation: |
| | | | |
| − | ''Here upon le grand arose with a grave and stately air and brought me the beetle
| + | ''Here upon le grand arose with a grave and stately air and brought me the beetle<br />from a glass case in which it was enclosed. It was a beautiful scarabaeus and<br />at that time unknown to naturalists of course; a great prize in a scientific<br />point of view. There were two round black spots near one extremity of the back<br />and a long one near the other. The scales were exceedingly hard and glossy with<br />all the appearance of burnished gold. The weight of the insect was very<br />remarkable and taking all things into consideration I could hardly blame jupiter<br />for his opinion respecting it.'' ([[The Gold-Bug]]) |
| − | from a glass case in which it was enclosed. It was a beautiful scarabaeus and
| |
| − | at that time unknown to naturalists of course; a great prize in a scientific
| |
| − | point of view. There were two round black spots near one extremity of the back
| |
| − | and a long one near the other. The scales were exceedingly hard and glossy with
| |
| − | all the appearance of burnished gold. The weight of the insect was very
| |
| − | remarkable and taking all things into consideration I could hardly blame jupiter
| |
| − | for his opinion respecting it.'' ([[The Gold-Bug]])
| |
| | | | |
| | If we had made a wrong guess, we would have found out at some point, and could go back and make a new guess. | | If we had made a wrong guess, we would have found out at some point, and could go back and make a new guess. |
| | | | |
| − | [[Category:Cryptography | + | [[Category:Cryptography]] |