6-342-30-2-132 / 420-72-30 /
12-240-20-30 / 420-240 /
342-30-506-30-2-156 / 2 /
42-2-182-240-462-380 /
272-72-342-2-380-30 / 2-210-20 /
90-420-380 / 2-462-420-72-240-342:
420-240 / 6-30 / 240-342 /
210-240-420 / 420-240 / 6-30;
420-72-2-420 / 90-380 / 420-72-30 /
306-462-30-380-420-90-240-210.
~552-90-156-156-90-2-182 /
380-72-2-132-30-380-272-30-2-342-30
Note: Each letter of every word is separated by a dash and each word is separated by a slash.
(In reply to
An unusual approach by draistal)
Frequency analysis is a very well known cryptographic technique. Interestingly, I was taught (as a schoolboy...) some very important rules that remain absolutely valid:
If you want a code to remain secure:
change your substitution key after every 22 letters, not more.
regroup the cypher text into blocks of 5 letters.
these two rules on their own almost entirely defeat your (otherwise completely reasonable) analysis.
|
Posted by Hew BG
on 2004-07-16 09:29:19 |