Linguistics 17 Lecture 010711

Linguistics 17 Lecture 010711 - Linguistics 17 Lecture...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Linguistics 17 Lecture 01/07/11 # rows: N = 3 Cryptography: Transposition How to decrypt message? RFEHAAOAAECERSBKINIREYRLCPSETE N = 2 30 characters write in two rows, there’ll be 15 in each row RFEHAAOAAECERSB KINIREYRLCPSETE Doesn’t work N = 3 30 characters, 10 in each row RFEHAAOAAE CERSBKINIR EYRLCPSETE Doesn’t work N = 4 30 characters, 28 characters, 8 character in 1 st row, 30 character in 2 nd row RFEHAAOA AECERSBK INIREYR LCPSETE RAILFENCECIPHERSAREEASYTOBREAK Cryptography: Substitution - positions stay the same, identities change Sender: Alice has message she wants to encrypt (plaintext) and she has the key. She will feed those two things to algorithm ciphertext
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Recipient: Bob knows what algorithm was used, so there’ll be some that’s unused to take ciphertext and the key again will give the
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

Linguistics 17 Lecture 010711 - Linguistics 17 Lecture...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online