ZFSZB YESUK SQYDJ SQGVK SGZBJ WBSWG IZXWF UVDYZ TZVKW
JJSUQ JJTDQ KCSPI QKQFP FZYBW FPWFU QYWIC SYZFW Y
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.The ciphertext looks like it does not keep the original divisions of the words. Being a substitution cipher, it is very likely to not respect a general pattern of exchanging characters (unlike Caesar, Vigenere, Affine).The used approach is based on cryptanalysis and especially on the checking the letter frequencies, patterns’ frequencies (2-3 letters), the analysis of initial and final letter of ciphertext by comparing with statistics gathered from the regular English language (based on the standard alphabet of 26 letters).
We start with checking of letter frequencies from the provided ciphertext, compared with the frequency of letters from English language. By using any letter frequency tool, we obtain a table like below.
We now focus on the found digraphs and trigraphs.
In English, besides common short words, the digraphs and trigraphs suggest the presence of well-known patterns. The most common of these are THE, THAT, ING, TION, OR etc.
If we suppose that WFU stands for THE, this would mean U is the encryption of E. Or this is false, since we identified S as being the encryption of E.
So we can take the second pattern ING as corresponding to WFU.
This assumption leads to identification of three new letters, namely I->W, N->F and G->U (the first letter is in plaintext English and the second is the correspondent from ciphertext).
In this case the ciphertext becomes:
ZNEZB YEEGK EQYDJ EQGVK EGZBJ IBEIG IZXIN GVDYZ TZVKI
JJEGQ JJTDQ KCEPI QKQNP NZYBI NPING QYIIC EYZNI Y...