30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

44<br />

chapter 4<br />

Likewise <strong>the</strong> second cipher row<br />

becomes<br />

G I N L W<br />

N G W I L<br />

<strong>and</strong> <strong>the</strong> rest of <strong>the</strong> message confirms <strong>the</strong> decryption.<br />

This is a very simple example in that <strong>the</strong> key was short <strong>and</strong> its length<br />

was <strong>the</strong> first obvious one to try, but it illustrates <strong>the</strong> method of solution.<br />

It also indicates that access to a table of digraph frequencies, though not<br />

strictly essential, will make <strong>the</strong> task much easier. Had <strong>the</strong> cipher text<br />

not been a multiple of 5 it would not have been so likely that <strong>the</strong> key<br />

length might be 5 (or 7, in this case) <strong>and</strong> o<strong>the</strong>r key lengths might have to<br />

be tried. For keys of length no longer than 5 even a brute force attack is<br />

feasible since <strong>the</strong>re are only a moderate number of possible orderings of<br />

<strong>the</strong> columns (120 when <strong>the</strong> key length is 5). As key lengths increase<br />

beyond 5 a brute force attack soon becomes very tedious <strong>and</strong>, eventually,<br />

impractical by h<strong>and</strong>, whereas <strong>the</strong> digraph method used above is realistic<br />

for all key lengths that are likely to be encountered in practice. The<br />

cryptographer, knowing all this, would <strong>the</strong>refore attempt to disguise<br />

<strong>the</strong> key length as far as possible <strong>and</strong> might also resort to o<strong>the</strong>r measures,<br />

such as<br />

Double transposition<br />

The weakness of <strong>the</strong> simple transposition method is that when <strong>the</strong> cipher<br />

message is written out column by column ‘on <strong>the</strong> width of <strong>the</strong> key’, i.e. in<br />

rows containing as many letters as <strong>the</strong> key length, letters which were adjacent<br />

in <strong>the</strong> plaintext will tend to fall in <strong>the</strong> same row <strong>and</strong> a search for<br />

‘good’ digraphs may reveal <strong>the</strong> transposition order of <strong>the</strong> columns.<br />

This becomes very obvious if we replace <strong>the</strong> plaintext in <strong>the</strong> example<br />

above by <strong>the</strong> numbers 1, 2, 3, ..., 35, underlining <strong>the</strong> first five numbers for<br />

ease of identification, <strong>and</strong> apply <strong>the</strong> transposition key that we used<br />

before, thus (see Table 4.4) we get <strong>the</strong> ‘cipher’ text<br />

12 7 12 17 22 27 32 4 9 14 19 24 29 34 1 6 11 16 21 26<br />

31 5 10 15 20 25 30 35 3 8 13 18 23 28 33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!