Professional Documents
Culture Documents
Cybersecurity.
Name: ______________________ Date: ____________ Period: ______
Lab Cryptography.
1. Using the Caesar Cipher, encode the name of your school. Use a key=5. Check
with a classmate to see if your answers are the same.
3. Frequency analysis
Perform frequency analysis on the following ciphertext. You may use an online
frequency analysis tool such as this one .
Hvs Qosgof qwdvsf wg boasr othsf Xizwig Qosgof, kvc, oqqcfrwbu hc Gishcbwig,
igsr wh kwhv o gvwth ct hvfss hc dfchsqh asggousg ct awzwhofm
gwubwtwqobqs. KvWt vs vor obmhvwbu qcbtwrsbhwoz hc gom, vs kfchs wh wb
qwdvsf, hvoh wg, pm gc qvobuwbu hvs cfrsf ct hvs zshhsfg ct hvs ozdvopsh,
hvoh bch o kcfr qcizr ps a—Gishcbwig, Zwts ct Xizwig Qosgof 56Vwg bsdvsk,
Oiuighig, ozgc igsr hvs qwdvsf, pih kwhv o fwuvh gvwth ct cbs, obr wh rwr bch
kfod ofcibr hc hvs psuwbbwbu ct hvs ozdvopsh:Kvsbsjsf vs kfchs wb qwdvsf, vs
kfchs P tcf O, Q tcf P, obr hvs fsgh ct hvs zshhsfg cb hvs goas dfwbqwdzs, igwbu
OO tcf L.—Gishcbwig, Zwts ct Oiuighig 88Hvsfs wg sjwrsbqs hvoh Xizwig
Qosgof igsr acfs qcadzwqohsr gmghsag og kszz, obr cbs kfwhsf, Oizig Uszzwig,
fstsfg hc o (bck zcgh) hfsohwgs cb vwg qwdvsfg:Hvsfs wg sjsb o fohvsf
wbusbwcigzm kfwhhsb hfsohwgs pm hvs ufoaaofwob Dfcpig qcbqsfbwbu hvs
gsqfsh asobwbu ct zshhsfg wb hvs qcadcgwhwcb ct Qosgof'g sdwghz—Oizig
Uszzwig, Ohhwq BwuvhgWh wg ibybckb vck sttsqhwjs hvs Qosgof qwdvsf kog
oh hvs hwas, pih wh wg zwyszm hc vojs pssb fsogcbopzm gsqifs, bch zsogh
psqoigs acgh ct Qosgof'g sbsawsg Qosgsf_qwdvsf, Kwywdsrwo
6. Assume that a simple cipher that shifts all characters by a fixed number was
used to create the ciphertext (a Caesar cipher). Given the results of the
frequency analysis, what would the shift key have been (the shift to go from
plaintext to ciphertext)?
Don’t be proud; you can use your fingers to count.
What is the key of the ciphertext, counting forwards?
Hash the following plaintext using multiple hashing algorithms. Use the following
online tool. Modular conversion, encoding and encryption online - cryptii
11. Encrypt the following plaintext using the Vigenère cipher “The quick brown fox
jumps over the lazy dog”.
Use the key=bghs
Key Mode=repeat
Case Strategy=ignore case