06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.5. TRANSPOSITION VS. SUBSTITUTION 195<br />

Examples:<br />

(1) Encipher some spots are simply skipped using the keyword START with<br />

the interruptions as given:<br />

S T A R T<br />

∗<br />

∗<br />

∗<br />

∗<br />

∗<br />

Enciphering is almost the same as before: put the message into the array,<br />

skipping the designated spots. Then when pulling out the columns,<br />

remember to forget to write down the ∗’s.<br />

(2) Decipher STPAR STEIA GPSTC NUTMN RNRIU SEENH IRSID EOUET. The keyword<br />

is EXPLODE and the interruption pattern is<br />

∗<br />

∗<br />

∗<br />

∗<br />

∗<br />

∗<br />

∗<br />

∗<br />

∗<br />

7<br />

⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄<br />

10.5 Transposition vs. Substitution<br />

How do we recognize that a cipher is possibly from a columnar transposition,<br />

rather than from some form <strong>of</strong> substitution A message enciphered with a any<br />

transposition consists <strong>of</strong> exactly the same letters as the plaintext message. A<br />

frequency analysis <strong>of</strong> the ciphertext will thus result in a chart that matches the<br />

a-e-i, no, rst, and uvwxyz patterns exactly, and in their natural positions. So it<br />

is easy to detect a transposition cipher: its frequency chart will look like one from<br />

common English but the text won’t be readable. 8 Conversely, a substitution<br />

7 (1) MPAIS ORMKE STSLP OSSYP EEPID. (2) Missed interruptions cause anger eruptions.<br />

8 Since position and not identity is now what is important, we probably want to make any<br />

nulls we use to be similar to the other letters in the plaintext, in the hope that the enemy<br />

will be confused as to which letters are meaningful. So, while in a substitution cipher we use<br />

letters like jkxqz as nulls to try to make frequency analysis harder, in a transposition cipher<br />

we use etaoinshr letters to add insignificant significant-looking letters to the ciphertext.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!