CEMC Banner

Grade 6 Math Circles
Cryptography - Solutions

Exercise Solutions

Exercise 1

Encrypt and decrypt the respective plaintext and ciphertext using the Atbash cipher.

  1. SLICE OF PI

  2. HRTNZ HFNNZGRLM

Exercise 1 Solution

  1. SLICE OF PI = HORXV LU KR

  2. HRTNZ HFNNZGRLM = SIGMA SUMMATION

Exercise 2

Encrypt or decrypt the following messages using the shift number given in parentheses.

  1. MY SALAD NEEDS DRESSING (8)

    plaintext A B C D E F G H I J K L M
    ciphertext I

    plaintext N O P Q R S T U V W X Y Z
    ciphertext

  2. GUR YRGGHPR UNF R PBYV (13)

    plaintext A B C D E F G H I J K L M
    ciphertext N

    plaintext N O P Q R S T U V W X Y Z
    ciphertext

Exercise 2 Solution

  1. MY SALAD NEEDS DRESSING (8)

    plaintext A B C D E F G H I J K L M
    ciphertext I J K L M N O P Q R S T U

    plaintext N O P Q R S T U V W X Y Z
    ciphertext V W X Y Z A B C D E F G H

    Encrypting the plaintext gives UG AITIL VMMLA LZMAAQVO.

  2. GUR YRGGHPR UNF R PBYV (13)

    plaintext A B C D E F G H I J K L M
    ciphertext N O P Q R S T U V W X Y Z

    plaintext N O P Q R S T U V W X Y Z
    ciphertext A B C D E F G H I J K L M

    The decrypted ciphertext gives THE LETTUCE HAS E COLI.

Exercise 3

Consider the ciphertext

RXHX GX WF UWUYK

What is the most common letter in the ciphertext? Assuming that the plaintext is in English, what letter in the ciphertext likely corresponds to the plaintext letter E?

Note that you do not have to decode this cipher.

Exercise 3 Solution

If we assume that the most frequent letter in the plaintext is E, then the most frequent letter in the ciphertext, X, is probably E. This is not certain, as messages can contain letters that have lower frequencies of the letter E.

Exercise 4

Complete the Vigenère encryption from Example 5. Note, the final ciphertext will have spaces at the same locations as the plaintext:

TIME FOR COOKIE

keyword C O D E C O D E C O D E C
shift number 2 14 3 4 2 14 3 4 2 14 3 4 2
plaintext T I M E F O R C O O K I E
ciphertext V W

Exercise 4 Solution

TIME FOR COOKIE

keyword C O D E C O D E C O D E C
shift number 2 14 3 4 2 14 3 4 2 14 3 4 2
plaintext T I M E F O R C O O K I E
ciphertext V W P H H C U F Q C N L G

The ciphertext that we get is

VWPH HCU FQCNLG

Problem Set Solutions

  1. Agenṫ Alice and Agent Bob are sitting on a park bencḣ. Alicė puts down heṙ nėwspaper and leaves the park. Bob pckṡ up the ṅewspaper, reads the secret message, stands up, walks in the ȯpposiṫe direction, and finally tosses tḣe newspaper a recyclṅġ bin on the way out.

    Evil Eve was watching this scene unfold from a distance. When the coast is clear, she rummages through the recycling bin and retrieves the paper. She flips through the pages but there is only yesterday’s news; nothing else is written down on any of the pages. The only thing that Eve can find are tiny holes on the front page.

    Agent Alice and Agent Bob are using a cipher we have not yet discussed. Alice has poked a hole above different letters found in the frontpage article. Bob mentally noted the letters with holes above them in order, which then spell out the secret message that Alice was trying to convey.

    Determine the name of this cipher (Hint: The first paragraph of the Cryptography lesson hides the answer).

    Solution:

    In the lesson, these letters have dots above them.

    Crytography is the study of hdde writing, or reading and writing secret messages or codes. The word cryptograpy cȯmes from the Greek word kryptos (\(\kappa \rho \upsilon \tau \varsigma\)), meaning "hidden", and graphein (\(\gamma \rho \alpha \phi \omega\)), meaning "writing". There are some key words that wil come up frequently in today’s lėsson.

    This is known as a pinhole cipher. Besides poking the paper with a pin, you could also place dots above the letters in pen for example.

  2. Recall the Atbash cipher:

    1. Use the Atbash cipher to encrypt or decrypt the following:

      1. YOU ARE A WIZARD

      2. SZIIB KLGGVI

      3. OVER AND UNDER

    2. Compare and contrast the Atbash cipher and the Caesar cipher.

    Solution:

      1. YOU ARE A WIZARD = BLF ZIV Z DRAZIW. Notice how DRAZIW is WIZARD spelled backwards.

      2. SZIIB KLGGVI = HARRY POTTER

      3. OVER AND UNDER = LEVI ZMW FMWVI

    1. Answers may vary.

      For similarities, they are both substitution ciphers, so by definition they replace letters of the alphabet with other letters of the alphabet. If we wanted to discuss security, both the Atbash and Caesar ciphers can be decrypted by brute force with the right computer program or very determined codebreaker.

      For differences, mainly the Atbash cipher is always the same, whereas you have up to 26 unique shift numbers for the Caesar cipher.

  3. Use the Caesar cipher to encrypt or decrypt the following messages using the shift number given in parentheses. You can complete the shift tables below if it helps.

    1. ONCE UPON A TIME (2)

      plaintext A B C D E F G H I J K L M
      ciphertext C

      plaintext N O P Q R S T U V W X Y Z
      ciphertext

    2. GL Y EYJYVW DYP YUYW (24)

      plaintext A B C D E F G H I J K L M
      ciphertext Y

      plaintext N O P Q R S T U V W X Y Z
      ciphertext

    Solution:

    1. If you know the alphabet really well you could go two letters forwards in the alphabet.

      ONCE UPON A TIME (2)

      plaintext A B C D E F G H I J K L M
      ciphertext C D E F G H I J K L M N O

      plaintext N O P Q R S T U V W X Y Z
      ciphertext P Q R S T U V W X Y Z A B

      The final ciphertext will be QPEG WRQP C VKOG.

    2. If you know the alphabet really well you could go two letters backwards in the alphabet.

      GL Y EYJYVW DYP YUYW (24)

      plaintext A B C D E F G H I J K L M
      ciphertext Y Z A B C D E F G H I J K

      plaintext N O P Q R S T U V W X Y Z
      ciphertext L M N O P Q R S T U V W X

      The initial plaintext was IN A GALAXY FAR AWAY.

  4. Consider the Caesar cipher and the following ciphertext: BWQS XCP.

    1. What would happen if we were to apply a shift number of \(26\) to the ciphertext?

    2. What would happen if we were to apply a shift number of \(30\) to the ciphertext?

    3. What would happen if we were to apply a shift number of \(-4\) to the ciphertext?

    4. Challenge: What would happen if we were to apply a shift number of \(1000\) to the ciphertext?

    Solution:

    1. With a shift of \(26\), the ciphertext does not change (still BWQS XCP). Shifting \(26\) letters by \(26\) spaces does not affect it.

    2. The first \(26\) shifts do not change the ciphertext. But the remaining \(30 - 26 = 4\) shifts will change BWQS XCP into FAUW BGT.

    3. A shift of \(-4\) can be interpreted as a backwards shift of \(4\) or equivalently as a shift of \(26 - 4 = 22\). The ciphertext would then become XSMO TYL

    4. A shift of \(1000\) is equivalent to a shift of \(12\) because of math! With a shift of \(12\) the ciphertext becomes NICE JOB!

      Solutions to getting this may vary!

      If you are familiar with Modular Arithmetic (or a modulus function in Computer Science), then you might have found that \(1000 \equiv 12 \text{ (mod } 26\text{)}\), and therefore a shift of \(1000\) is equivalent to a shift of \(12\).

      If you are unfamiliar with the above method, then imagine that everytime we shift 26 letters, nothing about the cipher changes. If we divide \(1000\) by \(26\) we get \(1000 \div 26 = 38\) with remainder \(12\). This remainder of \(12\) is what actually shifts the numbers.

      If you didn’t use division you can subtract each and every shift of \(26\) from \(1000\) to ignore them. Our calculations will end up as follows: \[1000 - 26 = 974\text{, } 974 - 26 = 948\text{, } \dotsb \text{, } 38 - 26 = 12\]

  5. Consider frequency analysis as a means to break a substitution cipher.

    1. One way to determine which letters are most commonly used is to parse a dictionary; we can count how many times each letter is used for every word in the language.

      What might this method assume? What limitations might this method have?

    2. How might the length of a ciphertext affect its security? Is it easier to break a cipher when the length of the ciphertext is shorter or longer?

    Solution:

    Answers may vary.

    1. This method of parsing a dictionary assumes that every word in the English language is equally likely to be used in a phrase/sentence/message. This is a limitation because the assumption is simply not true; we have to consider which words are frequently used in each language.

      For example, consider the words "there" and "wagon". How many times in your daily life do you use the word "there" compared to "wagon"? Is it unfair to say that the letters T, H, and R are equally as common as the letters W, G, and N?

    2. In general a longer ciphertext provides more information than a shorter ciphertext. A longer ciphertext provides more data to perform an accurate frequency analysis on, and so generally a longer ciphertext is more easily broken (even if it takes much more time).

      For example, compare the word "STOP" to the entirety of the novel The Hitchhiker’s Guide to the Galaxy by Douglas Adams. Which message/text is more likely to have the letter "E" appear most frequently?

  6. This question deals with the Vigenère cipher. The numbers correlating to letters given below.

    Letter (A-M) A B C D E F G H I J K L M
    Number \(0\) \(1\) \(2\) \(3\) \(4\) \(5\) \(6\) \(7\) \(8\) \(9\) \(10\) \(11\) \(12\)

    Letter (N-Z) N O P Q R S T U V W X Y Z
    Letter (A-M) \(13\) \(14\) \(15\) \(16\) \(17\) \(18\) \(19\) \(20\) \(21\) \(22\) \(23\) \(24\) \(25\)

    1. Encrypt the plaintext given below using the Vigenère cipher and keyword ADVIL. Note, the final ciphertext will have spaces at the same locations as the plaintext.

      I HAVE A HEADACHE

      keyword A D V I L A D V I L A D V I
      shift number
      plaintext I H A V E A H E A D A C H E
      ciphertext

    2. Another way of making an encrypted message really difficult to decipher is to apply an encryption multiple times.

      Encrypt your ciphertext from part (a), this time with the keyword PAIN. Note, the final ciphertext will have spaces at the same locations as the plaintext.

      keyword P A I N P A I N P A I N P A
      shift number
      plaintext
      ciphertext

    Solution:

    1. The plaintext is I HAVE A HEADACHE with keyword ADVIL.

      keyword A D V I L A D V I L A D V I
      shift number 0 3 21 8 11 0 3 21 8 11 0 3 21 8
      plaintext I H A V E A H E A D A C H E
      ciphertext I K V D P A K Z I O A F C M

      The ciphertext with spaces is then I KVDP A KZIOAFCM.

    2. The plaintext is now I KVDP A KZIOAFCM with the keyword PAIN.

      keyword P A I N P A I N P A I N P A
      shift number 15 0 8 13 15 0 8 13 15 0 8 13 15 0
      plaintext I K V D P A K Z I O A F C M
      ciphertext X K D Q E A S M X O I S R M

      The final ciphertext with spaces is then X KDQE A SMXOISRM.

  7. We will now work on decrypting the following message using the Vigenère cipher.

    KONFQCPQFCGCQRILS

    1. Complete the second row of shift numbers as you would have when encrypting a Vignière cipher.

      keyword Y O U Y O U Y O U Y O U Y O U Y O
      shift number
      plaintext
      ciphertext K O N F Q C P Q F C G C Q R I L S

      If only there were online tools for creating Caesar Shift Tables quickly.

    2. Apply an appropriate reverse shift to each letter of the cipher.

    3. Determine the original plaintext by adding spaces in the right places.

    4. Were there any shortcuts or tricks that were helpful in the decryption process of part (c)?

    Solution:

    1. It won’t fit on the page but you should get the following second row.

      Y O U Y O U Y O U Y O U Y O U Y O
      24 14 20 24 14 20 24 14 20 24 14 20 24 14 20 24 14
      \(\phantom{.}\)
      K O N F Q C P Q F C G C Q R I L S

    2. There are multiple ways correct that you could do a reverse shift, but you should get the following in the end.

      Y O U Y O U Y O U Y O U Y O U Y O
      24 14 20 24 14 20 24 14 20 24 14 20 24 14 20 24 14
      M A T H C I R C L E S I S D O N E
      K O N F Q C P Q F C G C Q R I L S

    3. The intended plaintext is MATH CIRCLES IS OVER.

    4. Answers may vary. For example, if you have already decoded MATHCIR, you might have guessed that the next 4 letters are CLES based on context clues.

  8. Alana, Blaire, and Julio have entered a cryptography competition. In the first round, the contestants are asked to break a Vigenère cipher, given only a page ciphertext. They each come up with a different plan to succeed.

    Which contestant do you think has the best strategy?

    Solution:

    Answers will vary!

    • Blaire’s strategy is actually how one might break a Vigenère cipher. We first determine a possible length for the keyword (there is a mathematical formula for this but it is complicated); guessing is an option.

      For example, we can guess length 5. You would then have to do 5 separate frequency analyses. One on the 1st, 6th, 11th, 16th, ... letters, another of the 2nd, 7th, 12th, 17th, ..., letters, and so on. This is because the 1st, 6th, 11th, 16th, ... letters will have a common shift number, the 2nd, 7th, 12th, 17th, ..., letters will have a common shift number, etc.

      Then you do have to just try different shift numbers given by different keywords until something works. This is still not an easy thing to do without any technology, and even then, computer programs made to decode Vigenère ciphers might still have some sort of manual input to them.

    • Julio might be able to solve it the fastest if he gets extremely lucky with his guess. Luck, coincidence, and context clues are all less mathematical but more practical components of cryptography. If he gets unlucky, then he will have a great computer program but no actual strategy beyond it.

    • Alana is trying her best! She seems to know about the different components of breaking ciphers but misses the mark in the order that she uses them. Frequency analysis on the first step is not particularly helpful. As we saw in the lesson’s Vigenère cipher, duplicate letters in the plaintext might have different ciphertext counterparts (e.g. the two O’s in COOKIE can become two different letters). While this strategy is not proven to be good, Alana might still win with a lucky guess like Julio.