06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.1. THE REMAINDER OPERATOR 33<br />

Example: Encipher <strong>St</strong>op Turn Back with a multiplication <strong>of</strong> 3.<br />

We start as usual, by listing the letters <strong>of</strong> the message as well as their<br />

numerical values. But rather than adding three, we multiply these values by<br />

three.<br />

plaintext s t o p t u r n b a c k<br />

plainnumbers 19 20 15 16 20 21 18 14 2 1 3 11<br />

ciphernumbers 57 60 45 48 60 63 54 42 6 3 9 33<br />

ciphertext E H S V H K B P F C I G<br />

Turning this ciphernumbers back into letters takes a bit <strong>of</strong> work. Replacing 6<br />

by F and 3 by C was easy. Replacing 42 and 45 by G and J demands some<br />

counting, and figuring out what to do with 54, 57, 60 and 63 means we have<br />

to count through the alphabet two-and-a-half times. It’s a good thing we only<br />

multiplied by 3 and not 13!<br />

The answer is EHSV HKBP FCIG.<br />

⋄<br />

Was all the counting worth it Remember that a Caesar cipher is a weak<br />

cipher because <strong>of</strong> a lack <strong>of</strong> mixing – letters that are adjacent in the alphabet<br />

move to letters that are also adjacent. In the two <strong>St</strong>op Turn Back examples<br />

the letters rstu from the message became UVWX and YZAB, respectively, and<br />

abc similarly became DEF and HIJ. (In fact, I picked these words because <strong>of</strong><br />

the many consecutive letters.) A Caesar cipher succeeds only in shifting the<br />

aei, no, and rst-uvwxyz patterns, but does not destroy them. A better cipher<br />

should destroy these patterns and move the letters away from their neighbors.<br />

And our multiplication example did exactly this: the letters rstu became BEHK,<br />

and abc became CFI. Based on this one example, it appears that multiplication<br />

will provide more security than addition. 1<br />

So multiplication can produce a cipher system that is better than the Caesar<br />

ciphers – if we can find a quick way <strong>of</strong> turning large numbers into the equivalent<br />

letters <strong>of</strong> the alphabet. This must be our next goal.<br />

3.1 The Remainder Operator<br />

Which ciphernumbers will be converted to the cipherletter A Of course 1. Also<br />

27, since 27 is one more than once through the alphabet. Similarly 53 which is<br />

one more than twice through the alphabet. And 79, 105, . . . In fact, we could<br />

1 You may have wondered why <strong>Cryptology</strong> belongs to the field <strong>of</strong> Mathematics, rather than<br />

that <strong>of</strong> English. After all, a cipher is supposed the hide the meaning <strong>of</strong> the message, and<br />

surely English is about detecting the meanings <strong>of</strong> letters and words. Well, we’ve just seen the<br />

answer. The translation a=1, b=2, c=3, ... z=26, turns the subject <strong>of</strong> <strong>Cryptology</strong> into an area<br />

<strong>of</strong> mathematics. Similarly, once we’ve tried “add three” and “multiply by three”, almost any<br />

mathematical device that turns one number into another may be tried out as a enciphering<br />

method.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!