Professional Documents
Culture Documents
Decryption
Deciphering is carried out by the relation
Pi =Ci –bi (mod26)
TRANSPOSITION CIPHERS
Firstly,if nulls have been used, then you start by writing out the
keyword and the alphabetical order of the letters of the
keyword. You must then divide the length of the cipher text by
the length of the keyword. The answer to this is the number of
rows you need to add to the grid. You then write the cipher text
down the first column until you reach the last row. The next
letter becomes the first letter in the second column (by the
alphabetical order of the keyword), and so on.
The same methodology as for Columnar Transposition is
used, where the plaintext is written out in rows under the
keyword. The only difference is that when there are repeated
Letters in the keyword, rather than number them from left to
right, give all the same letters the same number.
Then read across columns which have the same number in
the keyword.
Encryption
We have to choose our keyword for the encryption process first.
We then write out the plaintext in a grid, where the number of
columns in the grid is the number of letters in the keyword. We
then number each letter in the keyword with its alphabetical
position, giving repeated letters the same numbers. We then start at
number 1 (the first letter alphabetically in the keyword), and if it is
the only appearance of 1, we read down the column just like
in Columnar Transposition. If, however, the number 1 appears
more than once, we read from left to right all the first letters of the
columns headed by 1. Then we move to the next row, and read
across, left to right, the letters in the rows headed by 1. Once
complete, we move on to the number 2, and so on.
Decryption
The decryption process is very similar to Columnar
Transposition. We shall go through how to do it if nulls have
been used to fill spaces. By comparing this method with that
given in Columnar Transposition when nulls are not used, you
should be able to work out what to do.
We start by writing out the keyword, and the alphabetical order
of the letters, remembering to give repeated letters the same
number. We then divide the length of the cipher text by the
length of the keyword to work out how many rows we need to
add to our grid. We then have to systematically put the cipher
text back in to the grid. Start at number 1, and continue to the
highest number. If the number only appears once, we fill down
the column. If the number appears twice, we move from left to
right across the columns with that number heading them.