Question: Cryptoanalysis Below given is the handout with cipher text and frequency analysis. We don't know anything about the encryption method. We do know that English

Cryptoanalysis
Below given is the handout with cipher text and frequency analysis. We don't know anything about the encryption method.
We do know that English text was encrypted. Please decrypt the text using the frequency information and your knowledge of English.
.[please check 2nd picture for cipher]
Cryptanalysing a Ciphertext
PCQ. VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPD KBXBJYUXJ LBJOO KCPK. CP LBO LBCMKXPV XPV TYJKL PYDBL, QBOP KBO, BXV OPVOV LBO LXRO CI SX'XJMI, KBO JCKO XPV EYKKOV LBO DJCMPV ZOICJO BYS, KXUYPD: 'DJOXL. EYPD, ICI X LBCMKXPV XPV CPO PYDBLK Y BXNO ZOOP JOACMPLYPD LC UCM LBO IXZROK' CI FXKL XDOK XPV LBO RODOPVK CI XPAYOPL EYPDE. SXU Y.SXEO KC ZCRV XK LC AXXNO X.DXNCMJ CI UCMJ SXGOKLU?'
OFYRCDMO, LXROK UCS LBO LBCMKXXV XPV CPO PYDBLK.
Table 2 Frequency anilyzis of enciphered mestage.
\table[[Letter,Frequency],[,Occurrences,Percentage],[A,3,0.9],[B,25,7.4],[C,27,8.0],[D,14,4.1],[E,5,1.5],[F,2,0.6],[G,1,0.3],[H,0,0.0],[I,11,3.3],[J,18,5.3],[K,26,7.7],[L,25,7.4],[M,1,11]]
\table[[Letter,Frequency],[Occurrences,Percentage],[N,3,0.9],[O,38,11.2],[P,31,9.2],[Q,2,0.6],[R,6,1.8],[S,7,2.1],[W,0,0.0],[U,6,1.8],[V,18,5.3],[W,1,0.3],[X,34,10.1],[Y,19,5.6],[Z,5,1.5]]
Table 1 This table of relatire frequencies is based on passages taken from newspapers and novels, and the total sample was 100,362 alphabetic characters. The table was compiled by H. Beker and F. Piper, and originally published in Cipher Systems: Tbe Frotection Of Commsorication.
\table[[Letter,Percentage],[a,8.2],[b,1.5],[c,2.8],[d,4.3],[e,12.7],[f,2.2],[g,2.0],[h,6.1],[i,7.0],[j,0.2]
Cryptoanalysis Below given is the handout with

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!