Officers: President, T. F. Judd. Secretary-Treasurer, J. J. Dever. Ordained Ministers: T. F. Judd, Cyril Pascoe, Patavaki,. Ragopitu, Simi, Tati. Licensed Ministers: Are, Baugasi, Beni, J. J. Dever, H. A. Dickens, Ereman, R. A. Harrison, ...... Direc
Happiness doesn't result from what we get, but from what we give. Ben Carson
Idea Transcript
Ugrás a tartalomhoz (#sdt_slot_Layout_Page_Main)
Search (http://www.tankonyvtar.hu/en)
Login (http://www.tankonyvtar.hu/Shibboleth.sso/Login?target=http://www.tankonyvtar.hu/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s06.html) Information (/en/informacio) Contact (/en/kapcsolat) Magyar (/hu/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s06.html) (#)
A- (#) A (#) A+ (#) Front page (/en) News (/en/hirek/tankonyvtar/cikkek) Browsing (/en/bongeszes) Main page (/en) > TAMOP 4.2.5 Book Database > Books (/en/bongeszes/konyvek) > Sciences (/en/bongeszes/konyvek/termeszettudomanyok) > Mathematics (/en/bongeszes/konyvek/termeszettudomanyok/matematika) (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s05.html) (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch03.html)
Cryptography Kálmán Liptai Kempelen Farkas Hallgatói Információs Központ Tweet
Share Beágyazás
Exercises 1. Encrypt the term ”The die has been cast” with Caesar cipher, by using the word CRYPTO as the key. 2. Use affin cipher to encrypt the following phrase ”Sapienti sat” where
and
.
3. Encrypt the quote ”Be great in act, as you have been in though” (W. Shakespeare) with the help of the Hill cipher.
4. Design Polybius cipher by using geometrical formations. 5. Decrypt the document in the file szidd2.txt (prog/szidd2.txt) with the help of the attached statistic maker program stat.exe (prog/stat.exe). The encryption has been made by Caesar cipher and the original text is from Herman Hesse’s book, Siddharta. table of contents (#) data sheet (#) Cryptography (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/index.html) Acknowledgements (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/pr01.html) Historical Overview (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch01.html)
Introduction (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch01.html) Basic Notions (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch01s02.html) Monoalphabetic substitution (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02.html) Ceasar cipher (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02.html) Caesar shift cipher (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s02.html) Polybius square cipher (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s03.html) Hill method (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s04.html) Affin cipher (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s05.html) Exercises (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch02s06.html) Polyalphabetic substitution (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch03.html) Playfair cipher (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch03.html) Vigenére cryptosystem (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch03s02.html) Autoclave system (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch03s03.html) Exercises (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch03s04.html) Mathematical Preliminaries (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch04.html) Divisibility (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch04.html) Primes (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch04s02.html) Congruences (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch04s03.html) Finite fields (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch04s04.html) Exercises (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch04s05.html) DES (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05.html) Feistel cipher (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05.html) The DES algorithm (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05s02.html) Coding the inner block (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05s03.html) S-boxes (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05s04.html) Keys (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05s05.html) Example for DES (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05s06.html) The security of DES (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch05s07.html) AES crypto-system (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch06.html) Basics (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch06.html) Layers of rounds (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch06s02.html) Secret communication (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch06s03.html) Exercises (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch06s04.html) Knapsack (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch07.html) The Knapsack Problem (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch07.html) RSA (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch08.html) RSA (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch08.html) Pragmatic comments (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch08s02.html) Digital signiture (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch08s03.html) Exercises (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch08s04.html) Primality tests and factorization (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch09.html) Primality tests (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch09.html) Factorization of integers (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch09s02.html) Exercises (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch09s03.html) Elliptic Curves (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch10.html) Elliptic Curves (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch10.html) Operations on Curve Points (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch10s02.html) Elliptic curves over the field of rational numbers (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch10s03.html) Elliptic curve over finite fields (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch10s04.html) Modular operations on curve points (/en/tartalom/tamop425/0038_matematika_Kalman_Liptai-Cryptography/ch10s05.html)