0% found this document useful (0 votes)
7 views4 pages

Homework 2

Uploaded by

Ashvik Mandhani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Homework 2

Uploaded by

Ashvik Mandhani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Codes, Ciphers, and Cryptography

Homework 2 - July 19th, 2023


Printable Version on Page 2-4

Directions: Complete each problem and show all of the work associated. You may use the
internet to look at keys but you may not use any encoding or decoding platforms. You are
encouraged to work together but do not copy and you must submit your own work. If you have any
questions, please email me!

1. Decode the message “TECT HHSO WEEM NIRT ATTO IKAH AREC TD” that was made
using the Scytale cipher and a cylinder with a radius of 5 letters.

2. We have studied about 7 different symbolic and transposition ciphers over the past two
days. However, that is only a small part of all the symbolic and transposition ciphers out in
the world!
a. Find a symbolic or transposition cipher either online or in a book that we didn’t learn
about in class. (Basically, any cipher that either changes the message into symbols or
changes the placement of the letters but not the letters themselves.)
b. Write the name and a short description.
c. Summarize the steps for encryption and decryption or provide a key.
i. Some website will not say the decryption process outright but you might be
able to reverse engineer it. If not, find another cipher.
d. Use these steps/key to encrypt AND decrypt a message.
i. You can create this or use “you are the eyes of the world”.

3. Optional Challenge: Using the same method from the afternoon session, stack 3 or more
ciphers together and use them to encrypt and decrypt a message. Make sure to write the
names of the ciphers you stacked.
a. You can create your own message or use “roll away the dew”.
Name: Codes, Ciphers, and Cryptography
Homework 2 - July 19th, 2023
Printable Version

Directions: Complete each problem and show all of the work associated. You may use the
internet to look at keys but you may not use any encoding or decoding platforms. You are
encouraged to work together but do not copy and you must submit your own work. If you have any
questions, please email me!

1. Decode the message “TECT HHSO WEEM NIRT ATTO IKAH AREC TD” that was made
using the Scytale cipher and a cylinder with a radius of 5 letters.
2. We have studied about 7 different symbolic and transposition ciphers over the past two
days. However, that is only a small part of all the symbolic and transposition ciphers out in
the world!
a. Find a symbolic or transposition cipher either online or in a book that we didn’t learn
about in class. (Basically, any cipher that either changes the message into symbols or
changes the placement of the letters but not the letters themselves.)
b. Write the name and a short description.
c. Summarize the steps for encryption and decryption or provide a key.
i. Some website will not say the decryption process outright but you might be
able to reverse engineer it. If not, find another cipher.
d. Use these steps/key to encrypt AND decrypt a message.
i. You can create this or use “you are the eyes of the world”.
3. Optional Challenge: Using the same method from the afternoon session, stack 3 or more
ciphers together and use them to encrypt and decrypt a message. Make sure to write the
names of the ciphers you stacked.
a. You can create your own message or use “roll away the dew”.

You might also like