Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
208 CHAPTER 10. TRANSPOSITION CIPHERS<br />
To find the ciphertext pull out the columns <strong>of</strong> this array in the alphabetical<br />
order <strong>of</strong> the letters <strong>of</strong> the keyword. Deciphering is the reverse process, with the<br />
bit <strong>of</strong> complication that the length <strong>of</strong> the ciphertext and length <strong>of</strong> the keyword<br />
must first be used to determine how many letters each column contains.<br />
Recognizing transposition ciphers is easy – the frequency chart <strong>of</strong> a ciphertext<br />
appears to be that <strong>of</strong> normal English. Breaking transposition ciphers is,<br />
obviously, a matter <strong>of</strong> putting the letters back into their proper positions. For<br />
columnar transposition one first decides upon a guess <strong>of</strong> the size <strong>of</strong> the ciphertext<br />
rectangle and then creates the proposed columns <strong>of</strong> the plaintext. By knowing<br />
which letters are more likely to contact which one then proceeds by putting the<br />
columns next to their proper neighbors.<br />
The North used columnar transposition <strong>of</strong> words to great success during the<br />
Civil War. Keeping the words largely prevented Morse Code-based garbles, and<br />
the extensive use <strong>of</strong> code words, for proper names and locations, prevented the<br />
South from having any easy entry into the messages.<br />
10.12 Topics and Techniques<br />
1. From what do transposition cipher receive their security<br />
2. What is the main difference between transposition ciphers and substitution<br />
ciphers<br />
3. What is a route cipher What does its name mean<br />
4. What is a geometrical cipher<br />
5. What is a turning grille Explain how to construct one.<br />
6. Explain how to use a keyword to set up a columnar transposition.<br />
7. In a columnar transposition, how is the plaintext entered<br />
8. In a columnar transposition, how is the ciphertext removed<br />
9. Given the number <strong>of</strong> letters in the ciphertext and the length <strong>of</strong> the keyword,<br />
how are the lengths <strong>of</strong> the columns used that transposition determined<br />
10. How does one decipher a columnar transposition cipher<br />
11. How does one recognize that a cipher is a transposition<br />
12. How does one decide whether a ciphertext is from a substitution cipher or<br />
from a transposition cipher<br />
13. Explain how to break a columnar transposition ciphertext.