You are on page 1of 6

Running Head: Cryptography Concepts 1

Cryptography Concepts

LaRon Walker

Master of Information Technology and Internet Security

May, 2010
2

Cryptography Concepts

LaRon Walker

Master of Information Technology and Internet Security

May, 2010

There are many different Cryptology techniques that can be used to encrypt data. Transposition

cipher techniques are methods that messages can be manipulated so they are not in plaintext. These

messages can only be read if the receiving party has the proper key that the messages’ ciphertexts were

originally based on. Per Pell (2010), “Transposition ciphers rearrange the letters of the plaintext without

changing the letters themselves”.

Two of the more commonly used transposition cipher techniques are the rail fence method and

the stage transposition method. In the rail fence method, messages are sent in rows based on a pre-

determined matrix that is shared by the sender and its intended recipient(s). These are also known as

route ciphers. An example of a rail fence transposition cipher is as follows:

Rail Fence Transposition Cipher:

Message: I love Cryptography

I O E R P O R P Y
L V C Y T G A H

Ciphertext: IOERPORPYLVCYTGAH
3

The above example is a two-row n-column (n meaning “next”) style routing matrix reading from the top

row to lower row then moving to the next row until you reach the end. This is a very simple

transposition cipher, and may be easily deciphered due to its simplicity. To help strengthen this cipher,

a more complex route can be applied.

The development of key words has helped in creating easy ways to apply more complicated

routes to transposition ciphers. These key words are commonly referred to as ciphers. In these types of

transposition ciphers, per Pell (2010), the “plaintext is written into the columns from left to right as

normal, and the ciphertext will be formed by reading down the columns. The order in which the

columns are written to form the ciphertext is determined by the key.” Below is an example of a two

staged transposition cipher based on a key word of “2315746”:

First Stage Transposition Cipher Matrix

Key: 2315746

Plaintext:

T H E T R A N
S P O S I T I
O N C I P H E
R T E C H N I
Q U E W O R K
S B Y P E R M
U T I N G T H
E L E T T E R
S O F T H E P
L A I N T E X
T I T I S N O
T V E R Y S E
C U R E B U T
I S G R E A T
F O R L E A R
N I N G A B O
4

U T C R Y P T
O G R P H Y

Ciphertext for First Stage Transposition Cipher:

EOCEEYIEFITERGRNCRTSORQSUESLTTCIFNUOHPNTUBTLOAIVUSOITGATHNRRTEEENSUAABPYTSICWPN

TTNIRERLGRPNIEIKMHRPXOETTROTRIPHOEGTHTSYBEEAYH

Second Stage Transposition Cipher

Key: 2315746

Input:

E O C E E Y I
E F I T E R G
R N C R T S O
R Q S U E S L
T T C I F N U
O H P N T U B
T L O A I V U
S O I T G A T
H N R R T E E
E N S U A A B
P Y T S I C W
P N Y Y N I R
E R L G R P N
I E I K M H R
P X O E T T R
O T R I P H O
E G T H T S Y
B E E A Y H

Output (second stage of ciphertext):


5

CICSCPOIRSTYLIORTEEERRTOTSHEPPEIPOEBOFNQTHLONNYNREXTGEYRSSNUVAEACIPHTHSHETRUINA

TRUSYGKEIHAIGOLUBUTEBWRNRROYEETEFTIGTAINRMTPTY

Using a two stage transposition cipher adds more complexity to a routing matrix. However, using this

method may not be enough to protect the data. This method is now commonly used in conjunction

with other cipher techniques, to add more layers of complexity when creating a multi-tier encryption

strategy or Product Cipher.

In the above two-stage transposition cipher, the message has the potential to be deciphered by

a different key. Due to the theory behind using number-based key words, if the length of the key word

was known and the key uses the first sequential numbers as in the above example, the messaged may

be easily deciphered. Below is how this may be possible.

Original Key:

2 3 1 5 7 4 6

Please note the original key encompasses the first seven numbers when counting (e.g. 1, 2, 3, 4, 5, 6,

and 7)

Potential New Key

9 10 8 12 14 11 13

Please note that the new key encompasses the next sequential numbers when counting (e.g. 8, 9, 10,

11, 12 , 13, and 14)

Legend on number relations:


6

 1=8
 2=9
 3 = 10
 4 = 11
 5 = 12
 6 = 13
 7 = 14

When matching the exact numbers to their respective counterparts, and in the same sequence, one

could use the same technique to decipher the same message, as the routing matrices are identical.

There are applications such as CoPATTY, Air-crack, along with other algorithm based cracking programs

that can calculate these types of routing matrices.

I agree with the message "The Transposition cipher technique works by permuting the letters of

the plaintext. It is not very secure, but it is great for learning about cryptography". This is due to the art

and science of Cryptanalysis. Because of the evolution of Cryptanalysis and Cryptanalytic Attacks,

transposition ciphers are vulnerable if not used in conjunction with other techniques. Transposition

cipher techniques use ciphertexts, which are subject to ciphertext only attacks and chosen ciphertext

attacks, which are very possible, and some consider very easy to perform. As stated previously,

transposition ciphers should be used at more complication to the routing matrices of ciphering

techniques. Transposition ciphers alone are not very secure, however using them along with other

cipher techniques can help add multiple layers of complexity to the product cipher group.

References

Pell, O. (2010) Cryptology. Retrieved May 1, 2010 from

http://www.ridex.co.uk/cryptology/#_Toc439908887

You might also like