06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9.5. SUMMARY 179<br />

9.5 Summary<br />

Polygraphic ciphers, or block ciphers, work by enciphering groups <strong>of</strong> letters at<br />

a time, rather than one letter at a time. In particular, digraphic ciphers treat<br />

pairs <strong>of</strong> letters, or bigrams, as units when enciphering and deciphering. Since<br />

there are 676 pairs <strong>of</strong> letters, enciphering and deciphering tables for digraphic<br />

ciphers are large and cumbersome, and hence never used (outside <strong>of</strong> introductory<br />

examples).<br />

Digraphic ciphers are the “monoalphabetic” ciphers for bigrams. That is,<br />

each plaintext bigram is replaced by the same ciphertext bigram throughout<br />

the entire message. Hence frequency analysis may be used to attack a digraphic<br />

cipher. But whereas e and t, the two most common single letters, make up<br />

nearly 20% <strong>of</strong> all letters, the two most common bigrams, th and in, make up less<br />

than 5% <strong>of</strong> bigrams. So using frequency analysis only to break digraphic ciphers<br />

is difficult unless one has a very large amount <strong>of</strong> ciphertext. In particular, a<br />

good digraphic system is much more secure than a good monoalphabetic system.<br />

The Hill Cipher System enciphers by treating the block <strong>of</strong> letters as a matrix<br />

with only one column and multiplying the column by another matrix. Using a<br />

2 × 2 involution, a matrix with 2 columns and 2 rows that is its own multiplicative<br />

inverse, is most common, but non-involutions may be used, as may 3 × 3,<br />

4 × 4 or larger matrices. Hill Ciphers can be thought <strong>of</strong> as a digraphic version<br />

<strong>of</strong> Decimation Ciphers. In particular, once one knows the plaintext equivalents<br />

<strong>of</strong> two ciphertext bigrams, then one can use some simple mathematics to determine<br />

the enciphering matrix, and hence break the message. The importance<br />

<strong>of</strong> the Hill Cipher is that it indicates that by the middle <strong>of</strong> the 20th century<br />

cryptography was almost entirely a mathematical subject.<br />

Playfair Ciphers were invented by Charles Wheatstone and are the most<br />

common digraphic ciphers, being used in both World Wars. After setting up a<br />

rectangular array <strong>of</strong> letters, enciphering proceeds by replacing pairs <strong>of</strong> letters<br />

with the pair to the right if they are in the same column, underneath if they are<br />

in the same row, or the opposite corners <strong>of</strong> the rectangle produced otherwise.<br />

The strengths <strong>of</strong> Playfair are its ease <strong>of</strong> use, its rapidity, and its use <strong>of</strong> a keyword.<br />

Conversely, each letter can be replaced by only 6 others, and this allows entries<br />

into the system.<br />

9.6 Topics and Techniques<br />

1. What is a digraphic cipher How does it differ from a mono-graphic<br />

cipher<br />

2. What does the use <strong>of</strong> “di” in digraphic refer to<br />

3. Is a digraphic cipher monoalphabetic or polyalphabetic Explain.<br />

4. What is the general appearance <strong>of</strong> a digraphic cipher That is, explain

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!