... key.1
In many cryptosystems, the decryption key is ``easy'' to compute from the encryption key. Therefore, the encryption key must be hidden for the cryptosystem to be secure. However, there are some cryptosystems where it is (believed to be) infeasible to compute the decryption key from the encryption key, in which case it is OK for the encryption key to be public. So-called public key cryptosystems have this property, e.g. PGP/RSA.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...'q'.2
Why not always? Because of typos, abbreviations, words borrowed from other languages, and people in advertising that like to mess around with spelling.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... languages.3
See http://www.cs.wright.edu/people/faculty/fdgarber/740/ascii/ascii2freq.html for an example of frequencies in just words.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... frequencies.4
Ouvroir de Litterature Potentielle (``Potential Literature Workshop'') is a group about game-like methods of writing. Member Georges Perec wrote La Disparition without using the letter 'e'. The English translation, A Void, by Gilbert Adair also has no 'e'. Besides as a gimmick, Perec wrote without 'e' for plot/thematic reasons. Le Ton Beau De Marot: In Praise of the Music of Language, by Douglas R. Hofstadter, discusses both the original and the translation.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... example,5
These distances belong to the class of Lp (pronounced ``ell-pee'') norms: the pth root of the sum of the pth powers of the magnitudes. The limit as p goes to infinity is the $L^\infty$ norm.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... distances?6
When you do Project 7, you will discover that 70% does count as close. Although 70% does sound high, keep in mind that it is still relatively far away from the maximum possible distance of 200%.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... work.7
Actually, since different letters probably do have at least slightly different intrinsic unigram frequencies, if we have ``large enough'' training and ciphertexts, then their frequencies will converge to identical, intrinsic frequencies, in which case sorting unigram frequencies would work. The problem is, our experiments show that ``large enough'' appears to be on the order of multiple books or more.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... ciphertext.8
Conceptually, we have said to compute the table of bigram frequencies for each key by transforming ciphertext and then counting. We will see in Section 6.3 how we instead rearrange the frequencies in the original bigram table, thereby allowing us to omit the step of transforming ciphertext.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... frequencies.9
A human could visually inspect the hoped-for-plaintext and simply choose the one that is readable. However, without more complex algorithms that involve pattern recognition, a computer program has ``trouble'' visually inspecting text. Therefore, we stick to our idea of bringing the frequencies as close as possible to intrinsic frequencies.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... key.10
However, it is true that hill-climbing can get ``stuck'' at a local optimum, where all the ``local'' neighbors are farther away from training frequencies, so we will not reach the global optimum, the solution that is closest overall to training frequencies.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Thomas Yan
2000-05-01