06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

66 CHAPTER 4. THE EUCLIDEAN ALGORITHM<br />

As we saw in Chapter 3 this is not a Caesar cipher; none <strong>of</strong> the standard hill and<br />

valley patterns can be found in the frequency count. Are there any new patterns<br />

that might replace our old ones To find out, study carefully the following two<br />

plaintext/ciphertext alphabet pairs:<br />

Key k = 5 :<br />

plaintext<br />

ciphertext<br />

a b c d e f g h i j k l m n o p q r s t u v w x y z<br />

E J O T Y D I N S X C H M R W B G L Q V A F K P U Z<br />

Key k = 3m + 4:<br />

plaintext<br />

ciphertext<br />

a b c d e f g h i j k l m n o p q r s t u v w x y z<br />

E H K N Q T W Z C F I L O R U X A D G J M P S V Y B<br />

In the first, we have a → E, b→ J, c→ O, and while abc are consecutive, EJO<br />

are not; they are 5 letters apart. In fact, any two consecutive plaintext letters<br />

are sent to ciphertext letters five letters apart. The multiplicative key <strong>of</strong> 5<br />

apparently spreads out the letters by a factor <strong>of</strong> 5. Why is this Two consecutive<br />

plaintext letters will have plainnumbers that differ by one, say α and α + 1.<br />

When enciphered the (unreduced) ciphernumbers are 5α and 5α + 5, which<br />

differ by 5.<br />

Does the same work for the linear cipher k = 3m + 4 (Check it and<br />

see!) 6 At first glance it seems that Decimation and Linear ciphers do a good<br />

job <strong>of</strong> “unordering” the plain alphabet, mixing it up well. But these examples<br />

should convince us that this is not so. In fact, the rule is that the distance<br />

consecutive plain alphabet letters are spread apart equals the multiplicative key<br />

<strong>of</strong> the cipher.<br />

We can use this idea to decrypt our ciphertext. In our unsolved cipher, B<br />

and U are the two most common letters in the ciphertext: perhaps they are e<br />

and t, respectively Since a linear cipher has the formula mk + c, so guessing<br />

that B = e tells us 5k + c ≡ 2 and guessing U = t gives us 2km + c ≡ 21, both<br />

equations modulo 26. So c ≡ 2 − 5k and c ≡ 21 − 20k. Setting these equal gives<br />

20k − 21 ≡ 5k − 2 or 15k ≡ 19. From Figure 3.2 the inverse <strong>of</strong> 15 is 7. So if<br />

we multiply both sides <strong>of</strong> 15k ≡ 19 by 7, since 15 × 7 ≡ 1 and 19 × 7 ≡ 3, we<br />

are left with k ≡ 3. Finally, from 5k + c ≡ 2 and k = 3, we can substitute and<br />

solve to see that c = 13. Thus the original cipher was a linear cipher with rule<br />

3k + 13. We can then simply decipher the message. 7<br />

Now this only worked because we were lucky enough to guess both e and<br />

t. However, a cipher that is easily broken once your enemy correctly guesses<br />

only two letters is probably not a very strong one. Just as Caesar ciphers<br />

proved to be weak because they do not separate adjacent letters in the plaintext<br />

alphabet, Decimation and Linear ciphers are weak because the plaintext letters<br />

are enciphered using an easily recognized pattern.<br />

6 Yes. The letters are spread out by a factor <strong>of</strong> 3 and then shifted 4 more letters down the<br />

alphabet.<br />

7 We can only say that the decryptment <strong>of</strong> any cipher, even the simplest, will<br />

at times include a number <strong>of</strong> wonderings. Helen Fouché Gaines.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!