I have studied about the mono-alphabetic substitution cipher. With Character frequency graph, the encrypted text can be decoded. I am wondering how can be happen?
-
It seems that you have studied/searched not enough. This is Frequency analysis and the first record as 1000 years ago 9th century by Al-Kindi. It is still applicable to modern ciphers, too. See How can frequency analysis be applied to modern ciphers? – kelalaka Aug 20 '20 at 17:27
2 Answers
In each language there is an expected distribution of characters so you can use this to make reasonable estimate as to characters.
For example, E is by far the most common letter in English words, followed by T, then A then O etc. So in your substitution ciphertext, the most common letter is probably E.
From pi.math.cornell.edu:

- 685
- 1
- 12
- 22
Monoalphabetic cipher is a substitution cipher in which for a given key, the cipher alphabet for each plain alphabet is fixed throughout the encryption process. For example, if ‘A’ is encrypted as ‘D’, for any number of occurrence in that plaintext, ‘A’ will always get encrypted to ‘D’.
Here an example for how it can be decrypted with character frequency graph
Part of the plain text
Computer security, cybersecurity1 or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. The field is growing in importance due to increasing reliance on computer systems, the Internet2 and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.[3]
Part of the cipher text
XLNKFGVI HVXFIRGB, XBYVIHVXFIRGB1 LI RMULINZGRLM GVXSMLOLTB
HVXFIRGB (RG HVXFIRGB) RH GSV KILGVXGRLM LU XLNKFGVI HBHGVNH UILN
GSVUG LI WZNZTV GL GSVRI SZIWDZIV, HLUGDZIV LI VOVXGILMRX WZGZ, ZH
DVOO ZH UILN WRHIFKGRLM LI NRHWRIVXGRLM LU GSV HVIERXVH GSVB
KILERWV.
GSV URVOW RH TILDRMT RM RNKLIGZMXV WFV GL RMXIVZHRMT IVORZMXV
LM XLNKFGVI HBHGVNH, GSV RMGVIMVG2 ZMW DRIVOVHH MVGDLIPH HFXS
ZH YOFVGLLGS ZMW DR-UR, ZMW WFV GL GSV TILDGS LU "HNZIG" WVERXVH,
RMXOFWRMT HNZIGKSLMVH, GVOVERHRLMH ZMW GSV EZIRLFH GRMB
WVERXVH GSZG XLMHGRGFGV GSV RMGVIMVG LU GSRMTH. WFV GL RGH
XLNKOVCRGB, YLGS RM GVINH LU KLORGRXH ZMW GVXSMLOLTB, RG RH ZOHL
LMV LU GSV NZQLI XSZOOVMTVH LU GSV XLMGVNKLIZIB DLIOW.[3]
Five cipher text characters with the highest frequency and speculate on the mapping to the plaintext characters in the alphabet Ciphertext plaintext V E G T Z A R I I R
Basically this encryption is the reverse order of A-Z to Z-A A-Z B-Y C-X
For this method, we need original text and ciphertext.

- 126
- 3