06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

202 CHAPTER 10. TRANSPOSITION CIPHERS<br />

keyword bombs gives AKLLT AUTKC TOFNN TYEAO CRFAE. Guessing that this was<br />

a 5×5 square would lead to almost immediate decryption. But if we re-encipher<br />

it with the same keyword we get AATTC LKNAA LTFEF KUOYR TCNOE.<br />

Suppose we try to decrypt this cipher, and for ease we grant ourselves the<br />

knowledge that it is 5 × 5. Arranging it gives<br />

1 2 3 4 5<br />

A L L K T<br />

A K T U C<br />

T N F O N<br />

T A E Y O<br />

C A F R E<br />

There are only 7 vowels out <strong>of</strong> 25 letters, or 28%, which is a smaller percentage<br />

than normal, but it still stands out that there is only one vowel in each <strong>of</strong> the<br />

first two rows. Cheating (by looking at the previous paragraph) how will we<br />

guess that AUTKC is the correct ordering <strong>of</strong> the second row<br />

The purpose <strong>of</strong> a transposition is to mix-up the position <strong>of</strong> the letters. A single<br />

columnar transposition cipher can be broken because this mixing is far from<br />

complete. The second enciphering causes many more <strong>of</strong> the letter connections to<br />

be shredded, making decryption very difficult. If the cryptanalyst has a number<br />

<strong>of</strong> messages, all enciphered with the same key, and all <strong>of</strong> exactly the same length,<br />

then, by moving from one message to another and back again, it is possible to<br />

decrypt the whole set. (This is the trick that the brilliant French cryptanalyst<br />

Georges Jean Painvin used to break the German ÜBCHI double transposition<br />

cipher <strong>of</strong> World War I.) However, even the experts cannot routinely decrypt a<br />

single message carefully enciphered with a double transposition.<br />

10.9 Transposition during the Civil War<br />

The Civil War turned out to be an interesting test <strong>of</strong> Kerckh<strong>of</strong>f’s maxim that<br />

the enemy knows the system being used. Not only did the two armies speak<br />

the same language, but most <strong>of</strong> the trained <strong>of</strong>ficers knew each other, having<br />

attended West Point together, and some even had fought together during the<br />

Mexican–American War <strong>of</strong> 1848. We have already seen that the South put their<br />

trust largely in polyalphabetic ciphers, with rather little success. The North<br />

would turn to transposition.<br />

Anton <strong>St</strong>ager was born in 1833, in New York, and worked in a printer’s <strong>of</strong>fice<br />

and as a bookkeeper before becoming a telegraph operator in Pennsylvania. He<br />

was rapidly promoted and by his early thirties he was the general superintendent<br />

<strong>of</strong> the Western Union Telegraph Company, head-quartered in Cleveland. After<br />

the outbreak <strong>of</strong> hostilities in the Civil War, Governor Denison <strong>of</strong> Ohio gave him<br />

responsibility for all telegraph lines in the Ohio military district, and asked him<br />

to prepare a cipher so that the governors <strong>of</strong> Ohio, Indiana and Illinois could

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!