ZFSZB YESUK SQYDJ SQGVK SGZBJ WBSWG IZXWF UVDYZ TZVKW
JJSUQ JJTDQ KCSPI QKQFP FZYBW FPWFU QYWIC SYZFW Y
These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.The ciphertext looks like it does not keep the original divisions of the words. Being a substitution cipher, it is very likely to not respect a general pattern of exchanging characters (unlike Caesar, Vigenere, Affine).The used approach is based on cryptanalysis and especially on the checking the letter frequencies, patterns’ frequencies (2-3 letters), the analysis of initial and final letter of ciphertext by comparing with statistics gathered from the regular English language (based on the standard alphabet of 26 letters).
We start with checking of letter frequencies from the provided ciphertext, compared with the frequency of letters from English language. By using any letter frequency tool, we obtain a table like below.
We now focus on the found digraphs and trigraphs.
In English, besides common short words, the digraphs and trigraphs suggest the presence of well-known patterns. The most common of these are THE, THAT, ING, TION, OR etc.
If we suppose that WFU stands for THE, this would mean U is the encryption of E. Or this is false, since we identified S as being the encryption of E.
So we can take the second pattern ING as corresponding to WFU.
This assumption leads to identification of three new letters, namely I->W, N->F and G->U (the first letter is in plaintext English and the second is the correspondent from ciphertext).
In this case the ciphertext becomes:
ZNEZB YEEGK EQYDJ EQGVK EGZBJ IBEIG IZXIN GVDYZ TZVKI
JJEGQ JJTDQ KCEPI QKQNP NZYBI NPING QYIIC EYZNI Y...
By purchasing this solution you'll be able to access the following files: