This preview shows page 1. Sign up to view the full content.
Unformatted text preview: where the addition is taken “mod 26” (for the key k, we map x to (x+k)%26). • This is easy to encode and decode by hand, but not very secure. Even if your enemy does not know the key, they can quickly determine which of the 26 possible keys you are using. And even an arbitrary mapping of letters to letters is subject to frequency analysis the most common ciphertext letter is likely to be the translation of E, the most common pair is TH, and so forth....
View
Full
Document
This note was uploaded on 11/22/2011 for the course COMPSCI 187 taught by Professor Barrington during the Fall '11 term at UMass (Amherst).
 Fall '11
 barrington
 Data Structures, Julius Caesar, Julius Caesar

Click to edit the document details