Homework 2
Homework 2
Directions: Complete each problem and show all of the work associated. You may use the
internet to look at keys but you may not use any encoding or decoding platforms. You are
encouraged to work together but do not copy and you must submit your own work. If you have any
questions, please email me!
1. Decode the message “TECT HHSO WEEM NIRT ATTO IKAH AREC TD” that was made
using the Scytale cipher and a cylinder with a radius of 5 letters.
2. We have studied about 7 different symbolic and transposition ciphers over the past two
days. However, that is only a small part of all the symbolic and transposition ciphers out in
the world!
a. Find a symbolic or transposition cipher either online or in a book that we didn’t learn
about in class. (Basically, any cipher that either changes the message into symbols or
changes the placement of the letters but not the letters themselves.)
b. Write the name and a short description.
c. Summarize the steps for encryption and decryption or provide a key.
i. Some website will not say the decryption process outright but you might be
able to reverse engineer it. If not, find another cipher.
d. Use these steps/key to encrypt AND decrypt a message.
i. You can create this or use “you are the eyes of the world”.
3. Optional Challenge: Using the same method from the afternoon session, stack 3 or more
ciphers together and use them to encrypt and decrypt a message. Make sure to write the
names of the ciphers you stacked.
a. You can create your own message or use “roll away the dew”.
Name: Codes, Ciphers, and Cryptography
Homework 2 - July 19th, 2023
Printable Version
Directions: Complete each problem and show all of the work associated. You may use the
internet to look at keys but you may not use any encoding or decoding platforms. You are
encouraged to work together but do not copy and you must submit your own work. If you have any
questions, please email me!
1. Decode the message “TECT HHSO WEEM NIRT ATTO IKAH AREC TD” that was made
using the Scytale cipher and a cylinder with a radius of 5 letters.
2. We have studied about 7 different symbolic and transposition ciphers over the past two
days. However, that is only a small part of all the symbolic and transposition ciphers out in
the world!
a. Find a symbolic or transposition cipher either online or in a book that we didn’t learn
about in class. (Basically, any cipher that either changes the message into symbols or
changes the placement of the letters but not the letters themselves.)
b. Write the name and a short description.
c. Summarize the steps for encryption and decryption or provide a key.
i. Some website will not say the decryption process outright but you might be
able to reverse engineer it. If not, find another cipher.
d. Use these steps/key to encrypt AND decrypt a message.
i. You can create this or use “you are the eyes of the world”.
3. Optional Challenge: Using the same method from the afternoon session, stack 3 or more
ciphers together and use them to encrypt and decrypt a message. Make sure to write the
names of the ciphers you stacked.
a. You can create your own message or use “roll away the dew”.