30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cryptanalytic aspects of Playfair<br />

Playfair encipherment has certain properties that a cryptanalyst might<br />

exploit including <strong>the</strong> following.<br />

(i) A letter cannot encipher to itself.<br />

(ii) A letter can only encipher to one of 5 o<strong>the</strong>r letters which are <strong>the</strong> 4 o<strong>the</strong>r<br />

letters in its row <strong>and</strong> <strong>the</strong> letter below it in its column.<br />

(iii) A letter is twice as likely to encipher to <strong>the</strong> letter immediately to its<br />

right than to any o<strong>the</strong>r letter. So, for example, in <strong>the</strong> square used in<br />

Example 5.6 (Table 5.5), if <strong>the</strong> second letter of a digraph beginning<br />

with M is not in <strong>the</strong> same row or column as M <strong>the</strong>n M en<strong>ciphers</strong> as E, F, H<br />

or O. If <strong>the</strong> second letter of <strong>the</strong> digraph is in <strong>the</strong> same row as M <strong>the</strong>n M<br />

en<strong>ciphers</strong> as O <strong>and</strong> if <strong>the</strong> second letter is in <strong>the</strong> same column as M <strong>the</strong>n M<br />

en<strong>ciphers</strong> as S. It follows that of <strong>the</strong> 24 possibilities for letters which<br />

can follow M in <strong>the</strong> plaintext (since J is not included <strong>and</strong> M would cause<br />

a dummy to be introduced) E, F, H, O, I, D, T <strong>and</strong> Z each cause O to<br />

occur as <strong>the</strong> cipher letter whereas <strong>the</strong> o<strong>the</strong>r 16 letters will cause E, F, H,<br />

<strong>and</strong> S each to occur four times. So in this case M will encipher to O twice<br />

as often as to any o<strong>the</strong>r letter <strong>and</strong> <strong>the</strong> same feature will hold for any<br />

o<strong>the</strong>r letter.<br />

(iv) There is reciprocity between plain <strong>and</strong> cipher digraphs unless <strong>the</strong><br />

letters are in <strong>the</strong> same row or column; that is, if CR, say, en<strong>ciphers</strong> to PJ<br />

<strong>the</strong>n PJ en<strong>ciphers</strong> to CR <strong>and</strong>, fur<strong>the</strong>rmore, RC en<strong>ciphers</strong> to JP <strong>and</strong> vice<br />

versa.<br />

The usual method of attack on a Playfair cipher is via <strong>the</strong> digraphs.<br />

With a sufficiently long text a count of <strong>the</strong> cipher digraphs should reveal<br />

likely c<strong>and</strong>idates for <strong>the</strong> cipher equivalents of high frequency plaintext<br />

digraphs such as TH, HE, IN <strong>and</strong> ER <strong>and</strong> since <strong>the</strong> reversals of two of <strong>the</strong>se<br />

digraphs, HT <strong>and</strong> EH, have very low frequencies identification is made that<br />

much easier. Having identified <strong>the</strong> relative positions of some letters it<br />

may be possible to deduce which letters are in <strong>the</strong> keyword <strong>and</strong> <strong>the</strong>n to<br />

reconstruct <strong>the</strong> Playfair square. An example of such a solution using a<br />

text of over eleven hundred digraphs is given in [5.3].<br />

Double Playfair<br />

Two-letter <strong>ciphers</strong> 61<br />

Playfair encipherment was used by <strong>the</strong> British for some of <strong>the</strong>ir military<br />

<strong>ciphers</strong> up to <strong>and</strong> including <strong>the</strong> 1914–18 war <strong>and</strong> <strong>the</strong> Germans had considerable<br />

success in reading <strong>the</strong> messages. In World War II <strong>the</strong> German<br />

Army, knowing <strong>the</strong> weakness of <strong>the</strong> single Playfair cipher, used a double

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!