06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

40 CHAPTER 3. THE INTRODUCTION OF NUMBERS<br />

Why this happens is a very interesting question, but one that we will leave<br />

unanswered for the moment. What we do need to take away from this example<br />

instead is simply that division is more complicated in modular arithmetic. That<br />

is not to say that it cannot be done, but rather that we will have to be careful<br />

when we do it.<br />

3.3 Decimation Ciphers<br />

Before getting caught up with remainders and equivalence we were trying to<br />

build a cipher built on multiplication rather than addition, but had difficulty<br />

with translating the ciphernumbers back into cipherletters. With our work with<br />

the remainder operator, this is now easy.<br />

To use a Decimation Cipher:<br />

1) Choose a proper keynumber k.<br />

2) Convert the plaintext to plainnumbers.<br />

3) Multiply each number by k to produce ciphernumbers.<br />

4) Find the remainder %n <strong>of</strong> each ciphernumber.<br />

5) Convert the reduced cipher numbers back into letters.<br />

(We will study the meaning <strong>of</strong> “proper” in Chapter 4.)<br />

Examples: Enciphering using a Decimation 7 Cipher.<br />

(1) Encipher About Face using k = 5. (k for “key”.)<br />

We follow the steps given in the definition:<br />

plaintext a b o u t f a c e<br />

plain numbers 1 2 15 21 20 6 1 3 5<br />

multiplied numbers 5 10 75 105 100 30 5 15 25<br />

%26 5 10 23 1 22 4 5 15 25<br />

ciphertext E J W A V D E O Y<br />

The ciphertext is EJWAV DEOY.<br />

(2) Encipher Midnight using k = 5.<br />

(3) Encipher Revolution using k = 19. 8<br />

⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄<br />

Recall that the weakness in the shift ciphers was that adjacent letters in<br />

the plaintext alphabet remained adjacent even after being enciphered. The<br />

7 Why “Decimation” It is not clear. In Roman times, to decimate your troops meant<br />

to have the troops choose one-tenth <strong>of</strong> their numbers by lots, and then kill those soldiers.<br />

Hopefully this cipher will not be that painful.<br />

8 (2) MSTRS INV, (3) DQBYT IPOYF

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!