30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Example 5.1<br />

HAPPY BIRTHDAY<br />

en<strong>ciphers</strong> as<br />

BCAAC ECEED ABBDD BDDBC ADAAE D<br />

As it st<strong>and</strong>s this is a weak cipher but its security can be improved by two<br />

modifications<br />

(i) using a shuffled alphabet inside <strong>the</strong> 5� 5 box;<br />

(ii) applying a transposition to <strong>the</strong> enciphered text.<br />

The first of <strong>the</strong>se is sometimes partially achieved by choosing a keyword,<br />

writing this into <strong>the</strong> box <strong>and</strong> <strong>the</strong>n filling <strong>the</strong> rest of <strong>the</strong> box with <strong>the</strong><br />

unused letters of <strong>the</strong> alphabet, excluding J. If <strong>the</strong> keyword has any<br />

repeated letters <strong>the</strong>y are ignored.<br />

Example 5.2<br />

Repeat <strong>the</strong> example above using a box with <strong>the</strong> keyword THURSDAY <strong>and</strong><br />

apply <strong>the</strong> transposition 5-1-4-2-3 to <strong>the</strong> cipher text. The box is as shown<br />

in Table 5.2<br />

Table 5.2<br />

A B C D E<br />

A T H U R S<br />

B D A Y B C<br />

C E F G I K<br />

D L M N O P<br />

E Q V W X Z<br />

<strong>and</strong> HAPPY BIRTHDAY en<strong>ciphers</strong> to<br />

ABBBD EDEBC BDCDA DAAAB BABBB C<br />

Two-letter <strong>ciphers</strong> 55<br />

Since <strong>the</strong> transposition involves 5 numbers we write <strong>the</strong> cipher text into a<br />

box which has 5 columns. Note that since <strong>the</strong>re are 26 letters in <strong>the</strong> cipher<br />

one column in <strong>the</strong> box needs to have 6 letters in it.The recipient of <strong>the</strong><br />

message will need to know which, if any, are <strong>the</strong> ‘long’ columns so this<br />

will have been arranged beforeh<strong>and</strong>. We will make <strong>the</strong> arbitrary assumption<br />

that <strong>the</strong> ‘long’ columns are formed in <strong>the</strong> order of <strong>the</strong> transposition.<br />

In <strong>the</strong> case of this example <strong>the</strong>refore <strong>the</strong> solitary ‘long’ column is <strong>the</strong> one

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!