Skip to main content

Solutions F Solutions to Selected Exercises

Chapter 1 Caesar's Shifty Idea

Section 1.1 Simple Early Ciphers (and a little math)

Section 1.2 Arabic Numerical Ciphers

Exercises 1.3 How Shifty are You?

Chapter 2 Attacking the Alphabet

Exercises 2.4 Bringing it all Together

Chapter 3 Mixing Things Up

Section 3.1 Alberti's Great Idea

Subsection 3.1.2 Alberti's Polyalphabetic Cipher
Subsection 3.1.3 Vigenère's Cipher

Section 3.2 Variation on a Theme

Subsection 3.2.2 Pigpen Cipher

Section 3.3 An Automatic Hit

Subsection 3.3.2 The Autokey Cipher

Section 3.4 Stirring Things Up

Subsection 3.4.2 Transposition

Section 3.5 Presidential Secrets

Subsection 3.5.2 Thomas Jefferson and Vigenère's Cipher
Subsection 3.5.3 Thomas Jefferson's Wheel Cipher

Exercises 3.6 How Mixed Up Do You Feel?

Chapter 4 Triumphs of Logic and Statistics

Section 4.1 A Simple Solution

Subsection 4.1.1 The Power of Prime Factors
Subsection 4.1.2 But Really There's an Easier Way (sort of)

Section 4.3 Nineteenth Century Revelations

Subsection 4.3.1 Kasiski's Attack
Subsubsection 4.3.1.2 Determining the Key

Exercises 4.4 Do You Feel Logical?

Chapter 5 (*) An Industrial Revolution

Section 5.2 Perfect Secrecy

Subsection 5.2.2 Gilbert S. Vernam and His Great Plan
Subsubsection 5.2.2.2 Vernam's Plan

Chapter 6 Mathematics to the Rescue

Section 6.2 Affine Ciphers

Subsection 6.2.1 Affine Cipher: Encryption
Subsection 6.2.2 Affine Cipher: Decryption

Section 6.3 Hill's Cipher

Subsection 6.3.1 Matrices
Subsection 6.3.2 Hill's Cipher
Subsubsection 6.3.2.1 Enciphering with Matrices
Subsubsection 6.3.2.2 Matrix Inverses and Deciphering

Section 6.4 Decrypting Hill's Cipher

Subsection 6.4.1 Comments on Matrix Inverses
Subsection 6.4.2 Ciphertext Only Attack
Subsection 6.4.3 Known Plaintext Attack

Exercises 6.5 Up Hill struggle?

Chapter 7 (*) The Modern Age

Section 7.1 Symmetric Ciphers

Subsection 7.1.1 Binary
Subsection 7.1.2 Bitwise Addition
Subsection 7.1.4 Feistel Cipher
Checkpoint 7.1.27.
(a)
(b)
(c)
(d)

Section 7.2 Data Encryption Standard

Subsection 7.2.2 Overview Really Simple DES
Checkpoint 7.2.3. Expanding a Key Schedule.
Checkpoint 7.2.4. Finding Another Key Schedule.
Checkpoint 7.2.6. Encipher “hi”: Convert and Split.
Subsection 7.2.3 Permutation
Checkpoint 7.2.9. Encipher “hi”: Initial Permutation.
Subsection 7.2.4 Enciphering Function
Checkpoint 7.2.12. Encipher “hi”: Expansion and Key.
Checkpoint 7.2.16. Encipher “hi”: Finishing the Round.
Subsection 7.2.5 Finishing Enciphering
Checkpoint 7.2.18. Encipher “hi”: Completing Encryption.
Subsection 7.2.6 A Little More Practice
Checkpoint 7.2.22. Sample Decipherment.