Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    LABORATORY EXERCISE

    • Home
    • Modules
    • Elementary Statistics
    • Using Frequency Analysis and the English Language to Decrypt a File
    • LABORATORY EXERCISE

    Laboratory Exercise for Module 2

    1. Start the frequency counting software.

    2. Click on the start icon in the bottom left hand corner of the screen.

         

         3. Inside the search box type, “Character and Letter Frequency Count Software”

          4  .      Once the program opens click on the, “Add text or word doc file(s)

    5.      Go to the Module 2 folder.

    6.      Once in the folder find the document named, “encrypted code” and double click on it

    7.      Then find the, Start counting character frequency in word document(s)

    8. The program constructs a frequency table for you. Using this frequency table, construct a bar graph.

    9. Below is a frequency table based on English letters. Using this table and the one computed by the software, compare and see which letters appear at the same frequency and then determine what the encrypted code message says.

    E 1215
    T 808
    A 651
    R 641
    O 637
    S 585
    N 560
    I 557
    H 449
    L 436
    C 294
    D 281
    F 272
    U 255
    G 219
    P 205
    M 203
    Y 136
    V 117
    B 94
    W 92
    K 33
    X 22
    J 13
    Z 11
    Q 5

    Encrypted code message

    KMVEJJIW EVI SRI SJ XLI ASVPH’W XEPPIWX QEQQEPW. XLIC EVI ORSAR JSV XLIMV PSRK RIGOW, PIKW, ERH FVSAR WTSXXIH TEXXIVRW. KMVEJJIW LEZI WTSXW GSZIVMRK XLIMV IRXMVI FSHMIW, IBGITX XLIMV YRHIVFIPPMIW, AMXL IEGL KMVEJJI LEZMRK E YRMUYI TEXXIVR SJ WTSXW. XLIWI KMERXW EVI JSYRH PMZMRK MR XLI WEZERREW SJ EJVMGE, ALIVI XLIC VSEQ JVIIPC EQSRK XLI XEPP XVIIW, EVMH PERH, HIRWI JSVIWXW ERH STIR TPEMRW MR GIRXVEP, IEWXIVR ERH WSYXLIVR EJVMGE. XLIC LEZI WQEPP LSVRW WSQIXMQIW GEPPIH ORSFW SR XST SJ XLIMV LIEHW XLEX EVI EFSYX JMZI MRGLIW PSRK. KMVEJJIW YWI XLIMV ORSFW EW AIETSRW ALIR JMKLXMRK LIEH SR AMXL SRI ERSXLIV. QEPI KMVEJJIW EVI PEVKIV XLER JIQEPIW. XLIC EVI 19 JIIX XEPP ERH RIEVPC 3,000 TSYRHW. JIQEPI KMVEJJIW AIMKL RIEVPC 2,600 TSYRHW ERH WXERH EX 16 JIIX XEPP. (KMVEJJI JEGX WLIIX) LIEPXLC KMVEJJIW PMZI EFSYX 25 CIEVW MR XLI AMPH, LSAIZIV MR GETXMZMXC LEZI FIIR VIGSVHIH XS PMZI YT XS 40 CIEVW. KMVEJJIW IEX PIEZIW JVSQ XEPP XVIIW, XCTMGEPPC EGEGME XVIIW AMXL XLI LIPT SJ XLIMV PSRK RIGO ERH MJ RIGIWWEVC GER KS WIZIVEP HECW AMXLSYX AEXIV. MRWXIEH SJ HVMROMRK, KMVEJJIW WXEC LCHVEXIH FC XLI QSMWXYVI JVSQ PIEZIW. KMVEJJIW EVI RSR-XIVVMXSVMEP, WSGMEP ERMQEPW. XLIC XVEZIP MR PEVKI LIVHW XLEX EVI RSX SVKERMDIH MR ERC AEC. LIVHW QEC GSRWMWX SJ ERC GSQFMREXMSR SJ WIBIW SV EKIW. XLI KMVEJJI HIJIRHW MXWIPJ EKEMRWX XLVIEXW FC OMGOMRK AMXL E KVIEX JSVGI. “E WMRKPI AIPP TPEGIH OMGO SJ ER EHYPX KMVEJJI GER WLEXXIV E PMSR’W WOYPP SV FVIEO MXW WTMRI.” EGGSVHMRK XS XLI ASVPH ERMQEP JSYRHEXMSR XLI KMVEJJI LEW SRI SJ XLI WLSVXIWX WPIIT VIUYMVIQIRXW SJ ERC QEQQEP, ALMGL MW FIXAIIR 20 QMRYXIW ERH XAS LSYVW MR E 24 LSYV TIVMSH (KMVEJJI JEGX).

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved