Introduction to Cryptography Lecture 7. Transposition Cipher Letters stay the same Order is...
-
Upload
angel-perry -
Category
Documents
-
view
229 -
download
0
Transcript of Introduction to Cryptography Lecture 7. Transposition Cipher Letters stay the same Order is...
Introduction to Cryptography
Lecture 7
Transposition Cipher
Letters stay the same Order is different
Rail Fence Cipher
Definition: Write the plaintext downwards on successive "rails" of an imaginary fence. When you get to the bottom start moving up. Write the message line by line.
Example:
The message:
WRIORFEOEEESVELANADCEDETC.
Rail Fence Cipher
W R I O R F E O E
E E S V E L A N
A D C E D E T C
Columnar Transposition
Definition: Write the message in rows of a fixed length, and then read out again column by column. The columns are chosen in some scrambled order. Both the length of the rows and the permutation of the columns are usually defined by a keyword.
Key Columnar Transposition
Example: Let the key word be: ZEBRA.
The message:
EODAEASRENEIELORCEECWDVFT.
Z E B R A
W E A R E
D I S C O
V E R E D
F L E E A
T O N C E
Route Cipher
Definition: The plaintext is first written out in a grid of given dimensions, then we read it off in a pattern given in the key.
Route CipherExample: The key say: read message from
top right corner down and to the left.
The message:
TONCEADOEFLEEECRVERSADIEW.
W D V F T
E I E L O
A S R E N
R C E E C
E O D A E
Double Transposition
By guessing the block size it can be easy to decrypt the message
Is it more secure to use transposition cipher twice?
Should we use same key word?
Permutations Can be used as key word for a key
transposition cipher.
Example: Let the message be: WE ARE DISCOVERED FLEE AT ONCE. Let permutation be:
The message:
EIELORCEECWDVFTEODAEASREN.
x 1 2 3 4 5
p(x) 3 1 5 2 4
Incomplete Columns
How can we handle incomplete columns? We will write some letters at the end to
complete the row/column. Should it be same letter or different letters?
Will the person who gets it understand what the original message said?
Will it make attack more complicated?
Polyalphabetic Substitutions
Definition: Let be different substitution ciphers. Then to encrypt the message apply .
If the length of the message is longer than number of different ciphers, then repeat same ciphers in the same order.
nEEE ,...,, 21
nppp ,...,, 21 )( ii pE
Homework
Read pg.96-105. Exercises: 2, 6, 7 on pg.106- 107. Those questions will be a part of your
collected homework.