Welcome to Cryptology - Science and Mathematics Academy
Download
Report
Transcript Welcome to Cryptology - Science and Mathematics Academy
Classical
Transposition Ciphers
Objectives
Students will be able to…
…understand what transposition
ciphers are and how they are
implemented.
…encrypt and decrypt using classic
transposition ciphers.
…create and use transposition
ciphers of their own.
Transposition
ciphers
Rearrange the existing letters in
the plaintext.
Rail-Fence cipher
This is an example
t
i
h
s
i
e
s
n
a
tiephssnxmliaae
p
x
m
a
l
e
Permutation cipher
Key (d, f)
d is a fixed length
f is a permutation function
Example if d = 4 then f could be
(4, 2, 1, 3)
Break the plaintext up into blocks
of length d.
Shuffle each block according to d.
Permutation:
Example
4
d = _________
(4, 1, 2, 3)
f = ____________________
Plaintext
This is an example → this isan exam plex
________________________________________
Ciphertext
sthi nisa mexa xple → STHINISAMEXAXPLE
________________________________________
Column permutation
cipher
Select keyword
Determines the number of columns
Determines the order of the
columns
Column
permutation
cipher: Example
Plaintext: This is an
example of a
column
permutation
cipher.
Key: break
Key: (2,5,3,1,4)
HAMFURTIXIXEOPT
NEXINPAMMIPXTS
AOLEACRSELCNUO
HX
1 22 33 44 55
t
hh ii ss ii
s aa nn ee xx
a m
m pp ll ee
o ff aa cc oo
l
uu m
m nn pp
e rr m
m uu tt
a tt ii oo nn
c ii
pp hh ee
r xx xx xx xx
Column permutation
cipher: cryptanalysis
Determine possible underlying
rectangles. How?
Discover which of the possible
rectangles is correct (Note: vowels
account for about 40% of
characters.)
Determine the column order. How?
Column permutation
cipher: cryptanalysis –
centiban weight
Which columns are matched?
U.S. government studied a
collection of 5000 digrams
Calculated a value called a centiban
weight, for each digram
Columns that produced a sum total
of centiban values from the digrams
that are greater then other columns
have a higher probability of being
the correct column.
Column Cipher:
Example
NETEF
EEADU
RTCPJ
TSDDS
SOSYS
INR
LTDSR
OUUFI
AOEGE
OEOAC
TNNCG
TSSTF
RRRRS
WNLHO
EHNTL
EMETT
MDCET
NEROT
EPMWA
HFLAU
YDYRR
DRHXS
CFIEM
WERUV
RAEEN
NEOOE
WHOHO
EDSHA
AAINA
OTOTS
RESTH
(Spillman, 2005, p. 91)
Double-Transposition
Cipher
Perform a column transposition
cipher twice. You can use the same
keyword.
Makes it more difficult for
cryptanalysis.
Can be broken when you have
multiple ciphertext documents.
History of
Transposition Ciphers
Used by Greeks
Used by the U.S. during the Civil
war
Used by the Germans in WWI
(Turning grille)
Turning grille
Plaintext: This an example of a turning grille cipher
Ciphertext: HSNEMTIIE AXLFRGGLX IPANLCIHR
t
h
i
s
a
n
e
x
a
m
p
l
e
o
f
a
t
u
r
n
i
n
g
g
r
i
l
l
e
c
i
p
h
e
r
x
TAEOUNREP
Transposition
Assignment
Parts of this assignment are
independent and parts require a
partner.
Review
What is the principle behind
transposition ciphers?
Classically what was an
important skill for breaking a
transposition cipher?
How can mathematics be used
to break a column transposition
cipher.