06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.3. DECIMATION CIPHERS 41<br />

previous about face example shows that decimation ciphers apparently will<br />

not have this weakness. The adjacent letters ef and tu were enciphered to YD<br />

and VA, respectively, and the adjacent triple abc to EJO. In fact, if we go ahead<br />

and encipher the entire alphabet with key k = 5 we find the following cipher<br />

alphabet:<br />

plaintext<br />

ciphertext<br />

a b c d e f g h i j k l m n o p q r s t u v w x y z<br />

E J O T Y D I N S X C H M R W B G L Q V A F K P U Z<br />

None <strong>of</strong> the letters are next to their former neighbors. 9 Decimation ciphers<br />

destroy letter ordering!<br />

We have not explained how to “properly” choose our keynumbers, but to see<br />

that there must be some care taken consider enciphering anna or bob using a<br />

decimation cipher with k = 2. The ciphertexts are BBBB and DDD, respectively.<br />

How would anyone decipher BBBB It is impossible to tell which B is an a and<br />

which is an n. So no one would be able to decipher a message whose enciphering<br />

key was 2. Hence, only certain keys can be used to multiply. In this chapter<br />

you will be given only proper keys, so we can safely put <strong>of</strong>f solving this problem<br />

until Chapter 4.<br />

Thus far we have enciphered letters and only letters. What if we wish to<br />

keep spacing Or to add punctuation in our messages The next examples will<br />

do that.<br />

Examples:<br />

(1) Work modulo 28 with key k = 5 to encipher a space here. Use the usual<br />

plainnumbers with the addition that = 27, where the symbol means<br />

“space”.<br />

We do this as we did before, being careful to find the remainders using 28<br />

rather than 26.<br />

plaintext a s p a c e h e r e<br />

plain numbers 1 27 19 16 1 3 5 27 8 5 18 5<br />

multiplied numbers 5 135 95 80 5 15 25 135 40 25 90 25<br />

%28 5 23 11 24 5 15 25 23 12 25 6 25<br />

ciphertext E W K X E O Y W L Y F Y<br />

The answer is EQAXE OYWLY FY.<br />

(2) Encipher no one here using the same method with key k = 9.<br />

9 The careful reader may notice an oddity in the last plaintext–ciphertext alphabet pair.<br />

(If you didn’t, try enciphering zzz using any key before reading further.) Since we think <strong>of</strong><br />

a as the first letter <strong>of</strong> the alphabet, z is the 26th. But 26 times any keynumber will be a<br />

multiple <strong>of</strong> 26, and so when divided by 26 it will have a remainder <strong>of</strong> 0. Since 0 is just before<br />

1, 0 must represent Z. Hence, z will always be enciphered into Z. Fortunately z is uncommon<br />

enough that this doesn’t really threaten the security <strong>of</strong> this cipher.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!