06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

208 CHAPTER 10. TRANSPOSITION CIPHERS<br />

To find the ciphertext pull out the columns <strong>of</strong> this array in the alphabetical<br />

order <strong>of</strong> the letters <strong>of</strong> the keyword. Deciphering is the reverse process, with the<br />

bit <strong>of</strong> complication that the length <strong>of</strong> the ciphertext and length <strong>of</strong> the keyword<br />

must first be used to determine how many letters each column contains.<br />

Recognizing transposition ciphers is easy – the frequency chart <strong>of</strong> a ciphertext<br />

appears to be that <strong>of</strong> normal English. Breaking transposition ciphers is,<br />

obviously, a matter <strong>of</strong> putting the letters back into their proper positions. For<br />

columnar transposition one first decides upon a guess <strong>of</strong> the size <strong>of</strong> the ciphertext<br />

rectangle and then creates the proposed columns <strong>of</strong> the plaintext. By knowing<br />

which letters are more likely to contact which one then proceeds by putting the<br />

columns next to their proper neighbors.<br />

The North used columnar transposition <strong>of</strong> words to great success during the<br />

Civil War. Keeping the words largely prevented Morse Code-based garbles, and<br />

the extensive use <strong>of</strong> code words, for proper names and locations, prevented the<br />

South from having any easy entry into the messages.<br />

10.12 Topics and Techniques<br />

1. From what do transposition cipher receive their security<br />

2. What is the main difference between transposition ciphers and substitution<br />

ciphers<br />

3. What is a route cipher What does its name mean<br />

4. What is a geometrical cipher<br />

5. What is a turning grille Explain how to construct one.<br />

6. Explain how to use a keyword to set up a columnar transposition.<br />

7. In a columnar transposition, how is the plaintext entered<br />

8. In a columnar transposition, how is the ciphertext removed<br />

9. Given the number <strong>of</strong> letters in the ciphertext and the length <strong>of</strong> the keyword,<br />

how are the lengths <strong>of</strong> the columns used that transposition determined<br />

10. How does one decipher a columnar transposition cipher<br />

11. How does one recognize that a cipher is a transposition<br />

12. How does one decide whether a ciphertext is from a substitution cipher or<br />

from a transposition cipher<br />

13. Explain how to break a columnar transposition ciphertext.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!