generated from mwc/lab_encryption
Finished checkpoint 2
1. Writing my own code definitely helped me understand the problem better. It was kind of lucky that the most common character in each of the secret texts was in fact " ". It made me understand the work that the cipher is doing better. 2. I watched like 3 different youtube videos about the Kasiski examination process after reading the wiki page. I quickly used "the" to get a difference to the next "the" that mapped the same as 42, so I knew the keyword had to be a multiple of 2,3, or 7. I tried the process with 3 and got nowhere, so I tried it with 6 on a whim. I got the first two letters of the code to be PY, then I couldn't figure out the third so I skipped it, and got the 4th letter to be H, so I made the guess that the keyword was PYTHON and I was right!
This commit is contained in:
@@ -31,5 +31,9 @@
|
||||
|
||||
5. What is the polyalphabetic secret word?
|
||||
|
||||
PYTHON (this literally took me so long but it was also so fun omg)
|
||||
|
||||
6. Decrypt this message, which was encrypted using the same secret word:
|
||||
"EbZhdaV[h^bTpchhQnhig]X[VmhhRP]ftXVnRfjVY]fgtO_X]("
|
||||
|
||||
'The treasure is a worthless ball of aluminum foil.' (anticlimatic, lol)
|
||||
Reference in New Issue
Block a user