Criptología

Principal > Docencia >Criptología > Trabajos

 

 

CURSO 2007-2008

TRABAJO 1

CRIPTOGRAMA 1:

XNTNÑNZNNOXNYNÑNNNZNXNPNYNYNFNSNEÑNPNYNFNRNYNPNNYNÑNNNZNÑ
XNFSNXNZNFNMONÑNXGNXNYNÑNOTNOGNFNNGNXNLNCNFNÑNZXNESNFNXÑ
NFCNENNZNCNENÑXNFYNFZNPNNXONZMNÑNZONFNEGENGNÑNZYNFTNXXNÑN
ZNINENFNXNFTNPNFCNENPNESENGNNZPNZMNNGNXCXNZXNCXNMNXXNYNPNN
EYNFPNÑNONFNNXNPNYNÑXNFXNTNÑXNÑNONPNYNANZNYNFXNYNYNXXNYNPN
YNEGNNXÑNEZNPNNXONZMNÑNXNGNXYNYNGENGNÑNVNYNFONFNENNZNTNFG
NTNXXNESENZSNXNZONFNNXGNNZOTNNEONCNENNCNANEXNESNCXNGNCNENN
SNEENENPNTNXNFÑENINFNSNXXNFYNFÑNFGNÑNGNXONÑNXNZNPNONZNPNÑNF
GNNGNVNEXNXXNYNPNNRXNYNPNNZNNXMNÑNXNONYNNXNOXNENEÑXNFXNTN
XXNÑNLNCNENPNNXNÑNVNPNXNFSENPNFONXXNÑNZXNFNXTNENONFNPNCGNPN
FNNXYNFGNZNÑENFNPNFNXXNTNXNSNPNFRNMNRNMCNOGNÑNZTNFGNXNCNEO
NNYNEÑXNFNNZNNZNNÑXNFNTENRNSNFOXNENFÑNVNPNFNXNFNXYNFNEENFGE
NPNFNNYNESENGNFCNFNZCNENNCNXNYÑENEXNFYNFCNENOXNINEXNNMNSNLN
NXNXYNLNZNPNTNÑENONCNMNNEENZONEXNCNFNÑNZXNFNANPNFNONÑNPNXN
YNEONPNCNENPNEÑXNFNNZNXNFFNSENPNFNEENFGENGNÑNZTNÑXNENYNEGNC
NENNRENZONENNZNTNÑXNENXNÑNPNÑNFGNEFNLNYNZGNFNÑNZNFONYNNXTN
VNEONFNONZNPNRNXGNÑNCNENNZPNENXNXGNE


CRIPTOGRAMA 2:

KWGDCMHDJCDQOWGBHTHCDCÑQZHCQOSCWCOGBZGBCJQDRQOKWHC
ZGIGZHCSWGDJCBHKHSQSACDDHTQHGOZCBCDZGDCDZGQOKWQDKHO
TBGDZHNQOZHGWCOJCWKGBGXHDHCORBQGTCGOBGKWGWCDGBHOIH
OGOKGWHGDTCZGICWHWJCWZGDOQKWHSHCOJWHIGWCDGJGODCGOQ
OIGWCWQICWGBGIGOKCDOCSHXCDDGTQOZHÑGWCOJGWCGBJQGMBCD
GBCSWGRCKCZCDDGJWCXGRGWCOZGQODCBHZCNQDKGPQGWGICDSCI
GWTWHKCJGWDHDKGOKGIGOKGGBJQGMBCJWCNHWHGOZCXHKQJGWH
CDDCMWGÑGNGDWHSCDRJCZGWGDJQMBHSCDJCWZCPQHGWDGQWZG
WCOSCIJBCKDGHOKGOKCDZGDQMXGWDHCOBCDJCBHDKQXHGWCOIHG
ZCZGBCDKQWOCDZGOCSAGGOMCQWTGOMWGDDGDGKCICQODHKHCJQ
MBHSCGOTWGOCMBGDGWCMCQODKCSUMCOHKCBGSAGUHBCDZGZQB
SGDICOKCOGDZGKWHTCJGWCKCZCJCZWHZC


CRIPTOGRAMA 3:

GK RTKIQNTCOK IK NP RINTOKQCTK, IC UI PRCINQNPTK RINPQNPCTK, IC UI PKUVNICÑ ONG UICVNÑPK, PCIK NG LÑNERTCK ON UIR LÑKENTCR. IK NP LRÑR NHKTCKIRÑ R IROCN, LNÑK UI TRHCKINÑK, LRVKÑKPK Y VRLKÑKPK, NPQR PNHAÑRIOK NI WRPBCISQKI NG LRICTK, Y GN TKLCRI NI QKOK NG HUIOK. UI ANGCTKPK NI GR TCUORO ONG KANGCPTK. UI RLKGCQCTK NI GR PNON ONG TRLCQKGCK. UI RIRÑMUCTK LRÑR RTKMUCIRÑ R QKOKP. ¿UI TRHCKI NI UI TRHCIK, K UI PKÑQNROKÑ PKQNÑÑROK PUAHRÑCIK NI NG UÑARICPHK? HNQKOK TRÑQNPCRIK: NPQRTCKIRÑ Y HRQRÑ. GR GKTUÑR KTUGRÑ ON VNÑ TRNÑ R PU VCTQCHR. LÑNSUIQR LUÑSRIQN: ¿QU LKOÑCRP TKIQNHLGRÑ NG OCPLRÑK? GR ANPQCRGCORO TKI UIR NPQRACGCORO CHLÑKLCR.
PKGK LKÑ PU GKTURTCORO BR TGRUOCTROK: NP UI TKIVNÑPROKÑ TKIPNÑVROKÑ. PCI VRTCGRTCKI IC TRVCGRTCKI, BRTN PU QRPRTCKI NG PRQRICTK: OCNZ HCGGKINP LKÑ IK HRQRÑ. NP PU LÑNPULUNPQK PULNÑLUNPQK R PU ROHKICTCKI ON OKHCIRTCKI. IKP TKIVCNÑQN NI HRÑCKINQRP HKINQRÑCRP, UI LÑRSHRQCTK LCTQKSÑRHR IC LKIONÑRAGN IC LNÑOKIRAGN. CÑKICTRHNIQN NG ÑNIRTCHCNIQK HNOCKTÑN Y HNÑNTCOK, PUSNÑCOKÑ Y ÑNPUÑSCOK, ERVKÑNTCOK Y VKTCENÑROK, ONG ÑNPUHCOK PUHCONÑK Y ON GR PULUÑRTCKI ON GR UPUÑLRTCKI ONG ACNI LKÑ NG HRG. NP LRÑR RISUPQCRÑPN Y PRIQCSURÑPN.

CRIPTOGRAMA 4:

CAAOFNQSRCEOPNFSRAGOONHSDAFOWNKSJBTREYELRFTAEPESDAUOE
NQSSLTHKNOSEAMODOETRLNOONPSSAVVEOXSKATIEXEQRPTHEÑEFCA
LUEFEDSAMEEEESEAJOVNFDRSFOWZEVRAEQEZDSSAGQEFEKLRTIEÑEF
DAMVEXOSSAGOZNVSKAEOWTEVRSJOVNHSJGLOXNEFUAGÑENXSCPEO
QXEICASOOXEERDTOVYELUAUOGNWSRLTREYETCAMZETETCAUOGNHS
DAHOQNPSKLTAEYEDCAFOHNPSJTTOOÑEKEAWOEXGSEZTPEXEMRLFOP
NXKRTTPEVEERSVOWNVSRNTVEFXSYAEZEEKKRNZOONQURSTOOGESEC
AOEEGSHALOECEGRREOVSEICANOTNVSRGTGVNVSUAAOONWTJAOOWN
KSCLTHPNWTRSNOFNXSCCTPEXEFRDTQEZEVRBTHXNEMRJTGONODRMT
RENJDRMTRENQSRLSOFNOSTAFOEXEUCALOVÑOSKLTVEXOSSAROTNVS
UATZEÑEBRDTZEFKKRDTHGNODRBTBONWSCHTGEOELRDTEXNHSKATZ
PNWMRNTPVNWSUAMOOXEZRLTUEPELWASOJNDIRCNOFNQZRSNOONTS
JCTOPNVTCAMOEZESEATPONWSYRTTESELTLTGEFFSAAWOWNOSKAEAE
FEKJAMIVNHSKATAEEKKRTTHTNWSEPTGENTSCAFPVNVDRSFOWCEKRC
EOZNVDRASOKNCSRLTZPNCSEAWOLNFKRCTEEMESJRTBGNVDRPTHEÑE
FCAMORNHSKAVOFNHSCAFOVOEVRPTGEPEKSLTHENQSCAMHESVSUAM
OVEELLRTIEÑEFYAUZEEEERRNOTNVSRFLOQOEKRAGOLNFDRRTZEÑEVR
BTHXNVLRYTAEZXSKAUOQNWURMTOOTEBRRVOWNGSEAWOJNOMRBT
EEEESEDTGEXEDLAL

 

CIFRADO EN BLOQUE:

Matriz de cifrado: M:=matrix(3,3, [1,4,6,2,0,7,3,3,8]);