addition to: What is the best way to go about using Cryptanalysis to decrypt a message?

Posted on 2009-07-12
Last Modified: 2012-06-21
I am glad that I found this thread, as I now have the same assignment. I am having a problem with this.. I have followed the instructions and have solved most of the assignment. However, the addition to the assignment is to find the KEYWORD. I am having a problem with that part of it.

Can anyone point me in the right direction to find the keyword?

Thank you in advance
Wrvl jrvspflyo dyl glzeq jdiilk psre fr slymryv vdeb elx mpejfzreo zejipkzeq fwl jreopvsfzre rm wrvlxryn mryvlyib ldfle gb fwl krq

Open in new window

Question by:moosedude
LVL 10

Expert Comment

ID: 24834936
Sounds like you are refereing to another post, can you please provide a link to it?

Author Comment

ID: 24835019
LVL 84

Accepted Solution

ozo earned 500 total points
ID: 24836108
Do you know what kind of encryption was used?
if it is a simple substituton cypher, you might start with a frequency analysis and compare it the frequency distributions of plaintext strings.
If it is a Vigenère cipher, you might compute the index of coincidence at various shifts to get an idea of the length of the key, and do separate frequency analysis for each column
If you have an idea of some if the words that may be included in the message, you might try crib dragging, to see if it fits anywhere, and if that produces some clues
Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.


Expert Comment

ID: 24844143
You might want to try a software application called CypTool.  It allows you try to play with different algorithms.  

As for decrypting that, if it is AES or similar, I doubt you will be able to crack it with publicly  available tools.


Expert Comment

ID: 24844172
Do you have any decrypted text?  Or only the cyphertext?

Author Comment

ID: 24844223
I figured it out.  It was a substituton cipher.  The keyword was embeded in the cipher.

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now