Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Background

    • Home
    • Modules
    • Elementary Statistics
    • Using Frequency Analysis and the English Language to Decrypt a File
    • Background

    Encryption is used to pass information from one person to another person in a way that ensures the confidentiality of the information.

    Encryption can be very difficult to break since the person performing the encryption could have used many different techniques to encrypt the data. Once approach to encryption which is based on simple substitution replacement of each letter, is to use the fact that certain letters in English prose, occurs more often than other letters.

    This module will provide a lecture on cryptography, a module showing the decryption, and some follow-up discussion questions for the student”.

    In English prose there is a certain frequency with which letters occur. The table below gives an example of this.

    E 1215
    T 808
    A 651
    R 641
    O 637
    S 585
    N 560
    I 557
    H 449
    L 436
    C 294
    D 281
    F 272
    U 255
    G 219
    P 205
    M 203
    Y 136
    V 117
    B 94
    W 92
    K 33
    X 22
    J 13
    Z 11
    Q 5

    Using this information, we can perform a frequency analysis of encrypted text to determine the frequency of letters in the encrypted text. Using these two tables we will be able to determine what substitutions were made to obtain the encrypted text.

     

    Giraffe Frequency Table VS. Encrypted Frequency Table

     

    E 1215
    T 808
    A 651
    R 641
    O 637
    S 585
    N 560
    I 557
    H 449
    L 436
    C 294
    D 281
    F 272
    U 255
    G 219
    P 205
    M 203
    Y 136
    V 117
    B 94
    W 92
    K 33
    X 22
    J 13
    Z 11
    Q 5

     

    I 1215
    X 808
    E 651
    V 641
    S 637
    W 585
    R 560
    M 557
    L 449
    P 436
    G 294
    H 281
    J 272
    Y 255
    K 219
    T 205
    Q 203
    C 136
    Z 117
    F 94
    A 92
    O 33
    B 22
    N 13
    D 11
    U 5

     

    Lecture Topics:

    Lecture of module 2 will focus on: Frequency analysis in social science research, frequency distribution table creation with Excel, SPSS, Cryptography, & frequency analysis & encryption.

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved