06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

118 CHAPTER 7.<br />

VIGENÈRE CIPHERS<br />

unbreakable. So how finally was the Vigenère Cipher broken By turning the<br />

power <strong>of</strong> the keyword against the cipher.<br />

Let’s start by backing up. What enabled us to decrypt a Caesar cipher<br />

We knew that every letter in the message was enciphered using the same key<br />

letter. And we could detect this key letter from the frequency habits <strong>of</strong> normal<br />

English. Why can’t we do this with a Vigenère cipher Because not all <strong>of</strong> the<br />

letters are enciphered using the same key letter. In other words, a Caesar cipher<br />

is monoalphabetic, a Vigenère cipher is polyalphabetic.<br />

Now suppose we did know which letters were enciphered by the same letters<br />

<strong>of</strong> the keyword. Then we could split up the ciphertext into groups in such a way<br />

that all the letters in each group would be enciphered with the same keyletter.<br />

Each group <strong>of</strong> letters would be like a (different) Caesar cipher. And we know<br />

how to break Caesar ciphers. Since we could decrypt each <strong>of</strong> these groups <strong>of</strong><br />

letters, then we could decrypt all <strong>of</strong> the letters in the ciphertext, thus breaking<br />

the message.<br />

So (perhaps) we don’t actually need to know the keyword, but we do need to<br />

determine which ciphertext letters have been enciphered with the same letter <strong>of</strong><br />

the keyword. How can we do this Imagine rewriting the ciphertext downward<br />

into columns, with as many letters per column as there are letters in the keyword.<br />

Of course, we’d need to know how many letters there are in the keyword,<br />

but pretend for a moment we know that. Then the letters in the first row <strong>of</strong> our<br />

re-written ciphertext would all have been enciphered using the first letter <strong>of</strong> the<br />

keyword. And the letters in the second row <strong>of</strong> the re-written ciphertext would<br />

all have been enciphered using the second letter <strong>of</strong> the keyword. Similarly for<br />

the other rows. We would be left with several Caesar ciphers to break.<br />

To make this a bit less abstract, let’s suppose the keyword contained 5<br />

letters, and we number them k 1 k 2 k 3 k 4 k 5 , and similarly number the ciphertext<br />

letters ct 1 ct 2 ct 3 · · · . Then the complex <strong>of</strong> rows and columns from the previous<br />

paragraph takes the form<br />

k 1 ct 1 ct 6 ct 11 ct 16 . . .<br />

k 2 ct 2 ct 7 ct 12 ct 17 . . .<br />

k 3 ct 3 ct 8 ct 13 ct 18 . . .<br />

k 4 ct 4 ct 9 ct 14 ct 19 . . .<br />

k 5 ct 5 ct 0 ct 15 ct 10 . . .<br />

The letters ct 1 , ct 6 , ct 11 , ct 16 , . . . all have been enciphered by the key k 1 . So we<br />

can treat ct 1 ct 6 ct 11 ct 16 . . . as a Caesar cipher with unknown key k 1 . Likewise,<br />

ct 2 , ct 7 , ct 12 , ct 17 , . . . all have been enciphered by k 2 , so ct 2 ct 7 ct 12 ct 17 . . . can<br />

be treated as a Caesar cipher.<br />

So to decrypt a Vigenère-enciphered message, assuming we know the length<br />

<strong>of</strong> the keyword, first rewrite the ciphertext in columns with as many letters per<br />

column as letters in the keyword. Then the letters <strong>of</strong> each row will constitute a<br />

Caesar cipher that can be broken with our techniques from Chapter 1.<br />

To summarize, from what does the Vigenère cipher get its security Ob-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!