Cryptography began thousands years ago, before the invention of computers. Modern or not, they have the same purpose - to secure communication in the presence of third parties.
Chris received this piece of encrypted text. Who is most likely to be the author?
1 2 3 4 5 6 |
|
Details and Assumption
_
denotes a space
This section requires Javascript.
You are seeing this because something didn't load right. We suggest you, (a) try
refreshing the page, (b) enabling javascript if it is disabled on your browser and,
finally, (c)
loading the
non-javascript version of this page
. We're sorry about the hassle.
This is a substitution cipher. That means that the ciphertext has been formed by replacing each symbol (or letter) of the plaintext with a definite symbol (or letter) to form the ciphertext.
How many such rules for substitution could be there on a 26 letter alphabet? That's easy: it's 26!
Thankfully, we do not have to bruteforce through all the possible 26! keys to see if we are getting a meaningful plaintext. We have Letter Frequency Analysis to the rescue. It turns out that the occurences of the letters follow a frequency distribution depending on the used language.
Given this, it is easy to guess that most frequent symbol is a substitute for
e
, the next most frequent symbol is a substitution fort
and so on.This is what the decrypted text looks like