06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.10. THE BATTLE OF THE CIVIL WAR CIPHERS 207<br />

If [the jumble] were used twice or three times, I could, by comparison &<br />

trial, probably decipher the whole business. But if the jumble were not<br />

repeated, I could never decipher it without getting another message in the<br />

same jumble in order to compare the two. ... I found one pair <strong>of</strong> words<br />

which certainly belonged together, ‘Lambs’ & ‘ferry’ – for there was a<br />

‘Lamb’s Ferry’ on the Tennessee River. But it only made the demonstration<br />

absolute that the jumble ws not repeated [and so I could not make<br />

sense <strong>of</strong> it.] I afterward found that the Federals made their jumbles by<br />

means <strong>of</strong> diagrams <strong>of</strong> row & columns, writing up & down in different orders<br />

& then taking the words across ... They also used some blind words<br />

to further confuse the cipher. This made, indeed, a most excellent cipher,<br />

quick & easy, both to write & to decipher, which is a very great advantage.<br />

But there is one objection to it, in that it required a book, & that<br />

book might get into the wrong hands.<br />

⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄<br />

10.10 The Battle <strong>of</strong> the Civil War Ciphers<br />

The ciphers used during the Civil War give an interesting comparison. The<br />

North used relatively simple word transposition ciphers, which sends the plaintext,<br />

only jumbled. The South used what was thought to be the unbreakable<br />

Vigenére cipher. Why, then, did the North enjoy more success, cryptographically<br />

There are several reasons. The North’s use <strong>of</strong> meaningful word in their<br />

reduced the number <strong>of</strong> garbles, errors, while Vigenére ciphertexts, which have<br />

no context, had many more errors [<strong>Web</strong>er]. The extensive use <strong>of</strong> code words<br />

in <strong>St</strong>ager’s system generally prevented the South from getting any easy entries<br />

into a message. Conversely, the clumsy use <strong>of</strong> Vigenére (the failure to encipher<br />

the entire message, keeping word lengths) by the South gave the codebreakers<br />

<strong>of</strong> the North many clues about the message. Having a very few number <strong>of</strong> keys<br />

also contributed to the weakness <strong>of</strong> the South’s cryptography. “Judged by the<br />

standards <strong>of</strong> its own day, [<strong>St</strong>ager’s] cipher was adequate: it was not too complex<br />

to be practicable, and yet it delayed solution for a sufficient time.” [SSA2, page<br />

20].<br />

10.11 Summary<br />

Transposition Ciphers receive their security by the manner in which they mix<br />

the letters <strong>of</strong> the plaintext. There are many methods for providing this mixing;<br />

route ciphers, grilles and columnar transposition being the most famous, with<br />

the latter being by far the most popular.<br />

To perform a columnar transposition first select a keyword. Write the plaintext<br />

underneath the keyword, in as many columns as the keyword has letters.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!