Professional Documents
Culture Documents
1. Morse Code:
A. Succession:
B. Reverse Dots and Dashes:
C. Groups:
2. NATO Alphabet:
3. Vigenère Cipher:
A. Encoding:
ATTACKATDAWN
The person sending the message chooses a keyword and repeats it until it
matches the length of the plaintext, for example, the keyword "LEMON":
LEMONLEMONLE
The first letter of the plaintext, A, is enciphered using the alphabet in row L,
which is the first letter of the key. This is done by looking at the letter in row
L and column A of the Vigenère square, namely L. Similarly, for the second
letter of the plaintext, the second letter of the key is used; the letter at row E
and column T is X. The rest of the plaintext is enciphered in a similar fashion:
Plaintext ATTACKATDA
: WN
LEMONLEMON
Key: LE
Cipherte LXFOPVEFRN
xt: HR
B. Decoding:
The phrase “Hi, how are you?” becomes “Ij,ipx bsf zpv?” by using the simple shift of
A=B.
The word “Scout” would be encrypted as “14 24 10 16 15” by using the Cassis shift.
5. Sémaphore:
6. Other Forms:
A. Code Carré et Rectangle:
B. Invisible Ink: Most likely lemon juice, onion water, milk, and even urine.
Jeu
Decipher the following codes:
1. Morse:
2. Morse:
4. Sémaphore: