1 / 8

Section 2.4 Transposition Ciphers

Section 2.4 Transposition Ciphers. Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon by the sender and receiver.

Télécharger la présentation

Section 2.4 Transposition Ciphers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Section 2.4 Transposition Ciphers • Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon by the sender and receiver. • In transposition ciphers, no new alphabet is created. The letters of the plaintext are just rearranged in some fashion…

  2. Simple Types of Transposition Ciphers • Rail Fence Cipher – The plaintext is written in a zig-zag pattern in two rows and form the ciphertext by reading off the letters from the first row followed by the second row. • Example 1: Encipher “CHUCK NORRIS IS A TOUGH GUY” • Row 1: CUKORSSTUHU • Row 2: HCNRIIAOGGY • ciphertext: CUKORSSTUHUHCNRIIAOGGY • To decipher a rail fence cipher, we divide the ciphertext in half and reverse the order of the steps of encipherment, that is, write the ciphertext in two rows and read off the plaintext in zig-zag fashion. (Note: if there are an odd number of letters, the first row has one more letter then the second) • Example 2: Decipher the message “CITAT ODABT UHROE ELNES WOMYE OGEHW VR…

  3. Simple Types of Transposition Ciphers • Simple Columnar Transpositions – The Rail Fence Cipher is a special case of this. (The Rail Fence has n / 2 or n / 2 + 1 columns) You use two or more columns to do the same thing. You first agree on the number of columns. • Example 3: Encipher “THE JOKER SAID THAT IT WAS ALL PART OF THE PLAN” as a 5 column transposition cipher. • Example 4: Decipher TOTBA AUJAA KMHKO ANTAU FKEEE LTTYR SRLHJ RDMHO ETEII which was enciphered using a 4 column transposition: • In general, given a simple column transposition with n letters and c columns, then there are n / c rows if the remainder is 0, and n / c + 1 rows, with r columns have n / c + 1 entries, and c – r columns having n / c. • Example 5: Suppose n = 50, c = 9. Then there are 50 / 9 + 1 = 6 rows. The last row will have 5 letters in it. The first 5 columns will each have 6 letters, and the last 4 columns will have 5…

  4. Keyword Columnar Transposition • Suppose that we use the keyword TUCKER (student from 2011 class). • This keyword has six letters in it. That means that there are six columns, and each column must have the same number of letters. (See below about what to do if letters repeat) • Therefore, we may need to add fill letters at the end of the message so that the length of the message is divisible by 6. • Let us suppose that we want to transmit the message: “THE STUDENT MENTIONED ABOVE IS A SENIOR AT PULASKI HIGH SCHOOL.” • This message has 52 letters in it. To be divisible by six we must add 2 letter to the message as fill letters. We will use ZZ. • Write the message in rows with 6 letters for each row. (The word document explains how to handle repeated letters). • The message sent is: “ENIBARAGOTMNVETKSZSTOOSASHLUEEENPICZTDNDIIUHHHETASOLIO”. • To decipher, given that you know the keyword: • Write out the keyword. • Divide the ciphertext into columns of equal letters (use the keyword to get the length of each column). • Put the first column of letters under the letter in the keyword that comes alphabetically first. • Put the second column of letters under the letter in the keyword that comes second. Etc...

  5. ADFGX • During World War 1 most of the world was using either substitution or transposition ciphers to encrypt messages. • In March 1918 Germany began using ADFGX. • It was invented by Colonel Fritz Nebel a Signals Officer… • These particular letters were chosen because they were very different and could not be confused when using Morse Code.

  6. ADFGX • Two step process: • Step 1: • Create a 5x5 table with ADFGX along the top and similarly along the side. Example: (See below and to the right) • This table was created randomly. • The letters I and J are interchangeable. (There are 26 letters and only 25 slots.) • Step 2: Apply a substitution or transposition cipher. • Example…

  7. ADFGX • Historically • Germans thought the code was unbreakable. • It was broken by French Army Lieutenant Georges Painvin. • Probably contributed to Germany’s ill-fated 1918 Sring Offensive. • Painvin (who was already slender) spent many hours during a 3 month period breaking ADFGX and ADFGVX codes. He lost 33 pounds and had to go through rehabilitation…

  8. ADFGVX • Similar to ADFGX except now you use 6 x 6 table. This allows for all letters and the digits 0-9. • Assignments: • 3.1 #1,4,8, and one of 9-11. • 3.2 #1, 5 • 3.3 #1, 3 • 3.5 #3…!

More Related