SUNY Geneseo Department of Mathematics
Wednesday, December 1
INTD 105 17
Fall 2021
Prof. Doug Baldwin
(No.)
The kind of cipher used in The Beale Papers. See Monday’s notes for a description of how these ciphers work.
In groups of 1 or 2, pick a document to use as a key for a book cipher. Then come up with some message and encrypt it using your key. Write the ciphertext in a shared Google doc
When you have posted ciphertext to this document, find some way to securely exchange keys with another group. Verify that you can decrypt that team’s ciphertext.
Finally, time permitting, see if you can decrypt the ciphertext from some team that did not deliberately share their key with you. As the “...did not deliberately share their key…” wording suggests, this will probably entail guessing or surreptitiously acquiring their key.
For example, how did people come up with and devise their cipher? How easy are book ciphers to use? Are they secure? What can go wrong with them? Other reactions?
Modern (since 1976) cryptography.