Presentation is loading. Please wait.

Presentation is loading. Please wait.

Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.

Similar presentations


Presentation on theme: "Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon."— Presentation transcript:

1 Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon by the sender and receiver. –In transposition ciphers, no new alphabet is created. The letters of the plaintext are just rearranged in some fashion…

2 Simple Types of Transposition Ciphers Rail Fence Cipher – The plaintext is written in a zig-zag pattern in two rows and form the ciphertext by reading off the letters from the first row followed by the second row. Example 1: Encipher “CHUCK NORRIS IS A TOUGH GUY” –Row 1: CUKORSSTUHU –Row 2: HCNRIIAOGGY –ciphertext: CUKORSSTUHUHCNRIIAOGGY To decipher a rail fence cipher, we divide the ciphertext in half and reverse the order of the steps of encipherment, that is, write the ciphertext in two rows and read off the plaintext in zig-zag fashion. (Note: if there are an odd number of letters, the first row has one more letter then the second) Example 2: Decipher the message “CITAT ODABT UHROE ELNES WOMYE OGEHW VR…Example 2

3 Simple Types of Transposition Ciphers Simple Columnar Transpositions – The Rail Fence Cipher is a special case of this. (The Rail Fence has n / 2 or n / 2 + 1 columns) You use two or more columns to do the same thing. You first agree on the number of columns. Example 3: Encipher “THE JOKER SAID THAT IT WAS ALL PART OF THE PLAN” as a 5 column transposition cipher.Example 3 Example 4: Decipher TOTBA AUJAA KMHKO ANTAU FKEEE LTTYR SRLHJ RDMHO ETEII which was enciphered using a 4 column transposition:Example 4 In general, given a simple column transposition with n letters and c columns, then there are n / c rows if the remainder is 0, and n / c + 1 rows, with r columns have n / c + 1 entries, and c – r columns having n / c. –Example 5: Suppose n = 50, c = 9. Then there are 50 / 9 + 1 = 6 rows. The last row will have 5 letters in it. The first 5 columns will each have 6 letters, and the last 4 columns will have 5…

4 Keyword Columnar Transposition Suppose that we use the keyword TUCKER (student from 2011 class). –This keyword has six letters in it. That means that there are six columns, and each column must have the same number of letters. (See below about what to do if letters repeat) Therefore, we may need to add fill letters at the end of the message so that the length of the message is divisible by 6. Let us suppose that we want to transmit the message: “THE STUDENT MENTIONED ABOVE IS A SENIOR AT PULASKI HIGH SCHOOL.” –This message has 52 letters in it. To be divisible by six we must add 2 letter to the message as fill letters. We will use ZZ. –Write the message in rows with 6 letters for each row. (The word document explains how to handle repeated letters).message The message sent is: “ENIBARAGOTMNVETKSZSTOOSASHLUEEENPICZTDNDIIUHHHETASOLIO”. To decipher, given that you know the keyword: –Write out the keyword. –Divide the ciphertext into columns of equal letters (use the keyword to get the length of each column). –Put the first column of letters under the letter in the keyword that comes alphabetically first. –Put the second column of letters under the letter in the keyword that comes second. Etc...

5 ADFGX During World War 1 most of the world was using either substitution or transposition ciphers to encrypt messages. –In March 1918 Germany began using ADFGX. It was invented by Colonel Fritz Nebel a Signals Officer… These particular letters were chosen because they were very different and could not be confused when using Morse Code.

6 ADFGX Two step process: –Step 1: Create a 5x5 table with ADFGX along the top and similarly along the side. Example: (See below and to the right) This table was created randomly. The letters I and J are interchangeable. (There are 26 letters and only 25 slots.) –Step 2: Apply a substitution or transposition cipher. Example…Example

7 ADFGX Historically –Germans thought the code was unbreakable. –It was broken by French Army Lieutenant Georges Painvin. –Probably contributed to Germany’s ill-fated 1918 Sring Offensive. –Painvin (who was already slender) spent many hours during a 3 month period breaking ADFGX and ADFGVX codes. He lost 33 pounds and had to go through rehabilitation…

8 ADFGVX Similar to ADFGX except now you use 6 x 6 table. This allows for all letters and the digits 0-9. Assignments: 3.1 #1,4,8, and one of 9-11. 3.2 #1, 5 3.3 #1, 3 3.5 #3…!


Download ppt "Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon."

Similar presentations


Ads by Google