30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

48<br />

chapter 4<br />

<strong>and</strong> <strong>the</strong> cipher text is<br />

E F D K L J B C A N O M H I G<br />

which is quite different from <strong>the</strong> first version.<br />

O<strong>the</strong>r forms of transposition<br />

So far we have written <strong>the</strong> text in rectangles row by row but <strong>the</strong>re are<br />

alternatives available <strong>and</strong> some of <strong>the</strong>m would make it harder for a cryptanalyst<br />

to solve <strong>the</strong> system. In each case <strong>the</strong> text of <strong>the</strong> message is broken<br />

up into blocks of <strong>the</strong> appropriate length to fit <strong>the</strong> transposition box.<br />

Regular transposition boxes<br />

By a regular transposition box we mean a box that has columns of predictable<br />

length. The text can be written into <strong>the</strong> box in various ways but care needs<br />

to be taken, o<strong>the</strong>rwise weaknesses may be introduced. Here are some<br />

examples, not all of which can be recommended.<br />

Table 4.10<br />

A B C D E<br />

P Q R S F<br />

O X Y T G<br />

N W V U H<br />

M L K J I<br />

(i) We could use a rectangle but write <strong>the</strong> text around <strong>the</strong> rectangle in a<br />

‘spiral’ fashion (Table 4.10). Unfortunately this is definitely not recommended.<br />

No matter what ordering of <strong>the</strong> columns is used in <strong>the</strong> transposition<br />

<strong>the</strong> pentagraph EFGHI <strong>and</strong> <strong>the</strong> trigraph STU will appear in<br />

unchanged form in <strong>the</strong> ‘cipher’. So, for example, if <strong>the</strong> message is<br />

THISXMETHODXISXNOTXSECURE<br />

<strong>and</strong> <strong>the</strong> transposition is 3-1-5-2-4 <strong>the</strong> box is as shown in Table 4.11,<br />

Table 4.11<br />

3 1 5 2 4<br />

T H I S X<br />

N O T X M<br />

X R E S E<br />

S U C E T<br />

I X D O H

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!