这一节我们将通过一个实例来描述如果对维吉尼亚密码进行密码分析,下面是密文部分。
zpgdl rjlaj kpylx zpyyg lrjgd lrzhz qyjzq repvm swrzy rigzh zvreg kwivs saolt nliuw oldie aqewf iiykh bjowr hdogc qhkwa jyagg emisr zqoqh oavlk bjofr ylvps rtgiu avmsw lzgms evwpc dmjsv jqbrn klpcf iowhv kxjbj pmfkr qthtk ozrgq ihbmq sbivd ardym qmpbu nivxm tzwqv gefjh ucbor vwpcd xuwft qmoow jipds fluqm oeavl jgqea lrkti wvext vkrrg xani
s1 = zlxrhrrhwloehdweoklilwvlhphqbynwhwfjulrxx
s2 = pazjzezzitlwboamqbvuzpjpvmtiimiquptiqjkta
s3 = gjpgqpyvvndfjgjihjpagcqckfkhvqvvccqpmgtvn
s4 = dkydyvrrsliiocysoosvmdbfxkobdmxgbdmdoqiki
s5 = lpyljmiesieiwqarafrmsmrijrzmapmeoxoseewr
s6 = rygrzsggauayrhgzvrtsejnobqrqrbtfruofaavr
s7 = jllzqwzkowqkhkgqlygwvskwjtgsduzjvwwlvleg
zkhwkhulvkdoowxuqrxwwrehwkhkhurripbrzqolihruzkhwkh.
Whether I shall turn out to be the hero of my own life, or whether that station will be held by anybody else, these pages must show. To begin my life with the beginning of my life, I record that I was born (as I have been informed and believe) on a Friday, at twelve o’clock at night. It was remarked that the clock began to strike, and I began to cry, simultaneously.
原文始发于微信公众号(山石网科安全技术研究院):5.2.2 针对维吉尼亚密码的密码分析:实践部分