Encryption is used to pass information from one person to another person in a way that ensures the confidentiality of the information.
Encryption can be very difficult to break since the person performing the encryption could have used many different techniques to encrypt the data. Once approach to encryption which is based on simple substitution replacement of each letter, is to use the fact that certain letters in English prose, occurs more often than other letters.
This module will provide a lecture on cryptography, a module showing the decryption, and some follow-up discussion questions for the student”.
In English prose there is a certain frequency with which letters occur. The table below gives an example of this.
E | 1215 |
T | 808 |
A | 651 |
R | 641 |
O | 637 |
S | 585 |
N | 560 |
I | 557 |
H | 449 |
L | 436 |
C | 294 |
D | 281 |
F | 272 |
U | 255 |
G | 219 |
P | 205 |
M | 203 |
Y | 136 |
V | 117 |
B | 94 |
W | 92 |
K | 33 |
X | 22 |
J | 13 |
Z | 11 |
Q | 5 |
Using this information, we can perform a frequency analysis of encrypted text to determine the frequency of letters in the encrypted text. Using these two tables we will be able to determine what substitutions were made to obtain the encrypted text.
Giraffe Frequency Table VS. Encrypted Frequency Table
E | 1215 |
T | 808 |
A | 651 |
R | 641 |
O | 637 |
S | 585 |
N | 560 |
I | 557 |
H | 449 |
L | 436 |
C | 294 |
D | 281 |
F | 272 |
U | 255 |
G | 219 |
P | 205 |
M | 203 |
Y | 136 |
V | 117 |
B | 94 |
W | 92 |
K | 33 |
X | 22 |
J | 13 |
Z | 11 |
Q | 5 |
I | 1215 |
X | 808 |
E | 651 |
V | 641 |
S | 637 |
W | 585 |
R | 560 |
M | 557 |
L | 449 |
P | 436 |
G | 294 |
H | 281 |
J | 272 |
Y | 255 |
K | 219 |
T | 205 |
Q | 203 |
C | 136 |
Z | 117 |
F | 94 |
A | 92 |
O | 33 |
B | 22 |
N | 13 |
D | 11 |
U | 5 |
Lecture Topics:
Lecture of module 2 will focus on: Frequency analysis in social science research, frequency distribution table creation with Excel, SPSS, Cryptography, & frequency analysis & encryption.