Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
44<br />
chapter 4<br />
Likewise <strong>the</strong> second cipher row<br />
becomes<br />
G I N L W<br />
N G W I L<br />
<strong>and</strong> <strong>the</strong> rest of <strong>the</strong> message confirms <strong>the</strong> decryption.<br />
This is a very simple example in that <strong>the</strong> key was short <strong>and</strong> its length<br />
was <strong>the</strong> first obvious one to try, but it illustrates <strong>the</strong> method of solution.<br />
It also indicates that access to a table of digraph frequencies, though not<br />
strictly essential, will make <strong>the</strong> task much easier. Had <strong>the</strong> cipher text<br />
not been a multiple of 5 it would not have been so likely that <strong>the</strong> key<br />
length might be 5 (or 7, in this case) <strong>and</strong> o<strong>the</strong>r key lengths might have to<br />
be tried. For keys of length no longer than 5 even a brute force attack is<br />
feasible since <strong>the</strong>re are only a moderate number of possible orderings of<br />
<strong>the</strong> columns (120 when <strong>the</strong> key length is 5). As key lengths increase<br />
beyond 5 a brute force attack soon becomes very tedious <strong>and</strong>, eventually,<br />
impractical by h<strong>and</strong>, whereas <strong>the</strong> digraph method used above is realistic<br />
for all key lengths that are likely to be encountered in practice. The<br />
cryptographer, knowing all this, would <strong>the</strong>refore attempt to disguise<br />
<strong>the</strong> key length as far as possible <strong>and</strong> might also resort to o<strong>the</strong>r measures,<br />
such as<br />
Double transposition<br />
The weakness of <strong>the</strong> simple transposition method is that when <strong>the</strong> cipher<br />
message is written out column by column ‘on <strong>the</strong> width of <strong>the</strong> key’, i.e. in<br />
rows containing as many letters as <strong>the</strong> key length, letters which were adjacent<br />
in <strong>the</strong> plaintext will tend to fall in <strong>the</strong> same row <strong>and</strong> a search for<br />
‘good’ digraphs may reveal <strong>the</strong> transposition order of <strong>the</strong> columns.<br />
This becomes very obvious if we replace <strong>the</strong> plaintext in <strong>the</strong> example<br />
above by <strong>the</strong> numbers 1, 2, 3, ..., 35, underlining <strong>the</strong> first five numbers for<br />
ease of identification, <strong>and</strong> apply <strong>the</strong> transposition key that we used<br />
before, thus (see Table 4.4) we get <strong>the</strong> ‘cipher’ text<br />
12 7 12 17 22 27 32 4 9 14 19 24 29 34 1 6 11 16 21 26<br />
31 5 10 15 20 25 30 35 3 8 13 18 23 28 33