06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.3. BELASO, THE UNKNOWN AND PORTA, THE GREAT 113<br />

(4) Decipher FFFHVFR. 5<br />

⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄<br />

The influence <strong>of</strong> this system was great, in part because <strong>of</strong> Trithemius’ notoriety<br />

and in part because his was the first published book on cryptology.<br />

Letter-by-letter enciphering quickly became common and the basis for many<br />

cipher systems.<br />

In some ways this system is better than Alberti’s because a new alphabet<br />

is used with each letter. Even very recognizable words like Mississippi will<br />

become well-enciphered. (Alberti’s method with key F gives FRNXXNXXNUUN,<br />

putting the keyletter first, while Trithemius’ method gives MJUVMXYPXYS.)<br />

It also has clear weaknesses. For example, if the plaintext contains alphabetically<br />

anti-consecutive letters, as in pon <strong>of</strong> pontoon or fed <strong>of</strong> federal then<br />

the cipher text will contain a consecutive copies <strong>of</strong> the same letter. 6 While not<br />

terribly common, this allows easy entries to decrypting the cipher. (This last<br />

is Porta’s idea.) Nonetheless, Trithemius contributed the idea <strong>of</strong> changing the<br />

key with each letter.<br />

7.3 Belaso, the Unknown and Porta, the Great<br />

Giovan Batista Belaso, unlike the others appearing in this chapter, is someone<br />

we know little about. He was from Brescia, Italy and lived during the 1500’s.<br />

What we do know is that in 1553 he published La cifra del. Sig. Giovan Balista<br />

Belaso in which he described a ciphersystem with an easily remembered and<br />

easily changed key. He called the key a countersign, although we will just<br />

call it the keyword. His cipher became known as the Vigenère cipher and is<br />

the most important and most used cipher in history. (Vigenère will appear in<br />

Chapter 8.)<br />

Belaso’s idea is an extension <strong>of</strong> Trithemius’s: to encipher pick a keyword<br />

and use its letters cyclically as the key in a Caesar cipher to encipher the text.<br />

Example: Encipher eek, eek, I saw a mouse near that computer using<br />

the keyword TYPE. 7<br />

plaintext e e k e e k i s a w a m o u s e n e a r t h a t c o m p u t e r<br />

key T Y P E T Y P E T Y P E T Y P E T Y P E T Y P E T Y P E T Y P E<br />

ciphertext X C Z I X I X W T U P Q H S H I G C P V M F P X V M B T N R T V<br />

Answer: XCZIX IXWTU PQHSH IGCPV MFPXV MBTNR TV.<br />

⋄<br />

5 (2) RFEWESMSM, (3) diagonal, (4) federal.<br />

6 pontoon is enciphered as PPPWSTT.<br />

7 Belaso was careful to use longer keywords, or better, phrases, like OPTARE MELIORA and<br />

BIRTUTI OMNIA PARENT.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!