Professional Documents
Culture Documents
Classical Encryption Techniques: Substitutiontechniques
Classical Encryption Techniques: Substitutiontechniques
Substitution Techniques
Caesar Cipher
Monoalphabetic Ciphers
Polyalphabetic Ciphers
Playfair Cipher
Hill Cipher
Transposition Techniques
Rotor Machines
Steganography
Solution
When Eve tabulates the frequency of letters in this ciphertext, she
gets: I =14, V =13, S =12, and so on. The most common character is I
with 14 occurrences.This means key = 4.
The first subkey can be only one of 25 values (1 to 25), i.e. small key domain.
It was used for tactical purposes by British forces in the Second Boer
War and in World War I and for the same purpose by the British and
Australians during World War II.
KEYWORD or PHRASE
To generate the key table, one would first fill in the spaces in the table (a
modified Polybius square) with the letters of the keyword (dropping any
duplicate letters),
Then fill the remaining spaces with the rest of the letters of the alphabet in
order (usually omitting "J" or "Q" to reduce the alphabet to fit; other
versions put both "I" and "J" in the same space).
If both letters are the same (or only one letter is left), add an
"X" after the first letter.
Encrypt the new pair and continue. Some variants of Playfair use "Q" instead
of "X", but any letter, itself uncommon as a repeated pair, will do.
If the letters are not on the same row or column, replace them
with the letters on the same row respectively but at the other
pair of corners of the rectangle defined by the original pair.
The order is important – the first letter of the encrypted pair is the one that
lies on the same row as the first letter of the plaintext pair.
Ciphertext: BM OD ZB XD NA BE KU DM UI XM MO UV IF
Thus the message "Hide the gold in the tree stump" becomes
"BMODZ BXDNA BEKUD MUIXM MOUVI F".
The matrix used for encryption is the cipher key and it should be
chosen randomly from the set of invertible n × n matrices (modulo 26).
Since 'A' is 0, 'C' is 2 and 'T' is 19, the message is the vector:
So, modulo 26, the determinant is 25. Since this has no common factors
with 26, this matrix can be used for the Hill cipher.
The second character in the plaintext has moved to the fifth position in the
ciphertext;
The third character has moved to the ninth position; and so on. Although
the characters are permuted,
There is a pattern in the permutation: (01, 05, 09, 13), (02, 06, 10, 13), (03, 07,
11, 15), and (08, 12).
In each section, the difference between the two adjacent numbers is 4.
The key used for encryption and decryption is a permutation key, which
shows how the characters are permuted.
In the above Example a single key was used in two directions for the
column exchange: downward for encryption, upward for decryption.