SUNY Geneseo Department of Mathematics

Book Ciphers

Wednesday, December 1

INTD 105 17
Fall 2021
Prof. Doug Baldwin

Return to Course Outline

Previous Lecture

Anything You Want to Talk About?

(No.)

Book Ciphers

The kind of cipher used in The Beale Papers. See Monday’s notes for a description of how these ciphers work.

Practice

In groups of 1 or 2, pick a document to use as a key for a book cipher. Then come up with some message and encrypt it using your key. Write the ciphertext in a shared Google doc

When you have posted ciphertext to this document, find some way to securely exchange keys with another group. Verify that you can decrypt that team’s ciphertext.

Finally, time permitting, see if you can decrypt the ciphertext from some team that did not deliberately share their key with you. As the “...did not deliberately share their key…” wording suggests, this will probably entail guessing or surreptitiously acquiring their key.

Discussion

For example, how did people come up with and devise their cipher? How easy are book ciphers to use? Are they secure? What can go wrong with them? Other reactions?

Next

Modern (since 1976) cryptography.

Next Lecture