06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 10<br />

Transposition Ciphers<br />

In one word, the transposition methods give a<br />

nice mess [salade] <strong>of</strong> cleartext letters.<br />

Etienne Bazeries<br />

So far each <strong>of</strong> the methods <strong>of</strong> ciphering we’ve studied have been substitution<br />

methods. They obtain their secrecy by hiding the meaning <strong>of</strong> the letter. In this<br />

chapter we turn to transposition ciphers, ciphers which obtain their secrecy<br />

by hiding the location <strong>of</strong> the letter. We start with a couple <strong>of</strong> simple classics.<br />

10.1 Route Ciphers<br />

Route ciphers are also called rail fence ciphers, for an obvious reason.<br />

Examples: Decipher the route ciphers.<br />

(1) Decipher AEICL BLNON.<br />

a e i c l<br />

b l n o n<br />

(2) Decipher TEIEP NDSR.<br />

(3) Decipher OBNN LAIECL DLO. (Hint: three rows.)<br />

(4) Decipher ILE ALPITR RST.<br />

(5) Decipher ILVGI IOIAE ITSRN MANHM NG. 1<br />

(Try three rows.)<br />

⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄<br />

1 (2) Two rows, read backwards: president, (3) Old Abe Lincoln, (4) rail splitter, (5)<br />

I am leaving this morning – from [HITT, page 28].<br />

189

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!