Solved

addition to: What is the best way to go about using Cryptanalysis to decrypt a message?

Posted on 2009-07-12
6
343 Views
Last Modified: 2012-06-21
I am glad that I found this thread, as I now have the same assignment. I am having a problem with this.. I have followed the instructions and have solved most of the assignment. However, the addition to the assignment is to find the KEYWORD. I am having a problem with that part of it.

Can anyone point me in the right direction to find the keyword?

Thank you in advance
Wrvl jrvspflyo dyl glzeq jdiilk psre fr slymryv vdeb elx mpejfzreo zejipkzeq fwl jreopvsfzre rm wrvlxryn mryvlyib ldfle gb fwl krq

Open in new window

0
Comment
Question by:moosedude
6 Comments
 
LVL 10

Expert Comment

by:Korbus
Comment Utility
Sounds like you are refereing to another post, can you please provide a link to it?
0
 

Author Comment

by:moosedude
Comment Utility
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
Comment Utility
Do you know what kind of encryption was used?
if it is a simple substituton cypher, you might start with a frequency analysis and compare it the frequency distributions of plaintext strings.
If it is a Vigenère cipher, you might compute the index of coincidence at various shifts to get an idea of the length of the key, and do separate frequency analysis for each column
If you have an idea of some if the words that may be included in the message, you might try crib dragging, to see if it fits anywhere, and if that produces some clues
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Expert Comment

by:NYGiantsFan
Comment Utility
You might want to try a software application called CypTool.  It allows you try to play with different algorithms.  

As for decrypting that, if it is AES or similar, I doubt you will be able to crack it with publicly  available tools.

0
 

Expert Comment

by:NYGiantsFan
Comment Utility
Do you have any decrypted text?  Or only the cyphertext?
0
 

Author Comment

by:moosedude
Comment Utility
I figured it out.  It was a substituton cipher.  The keyword was embeded in the cipher.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
Healthcare providers, insurance companies and other covered entities trust eFax Corporate to transmit their most sensitive documents. eFax Corporate can help your organization implement a HIPAA compliant cloud faxing solution.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now