Professional Documents
Culture Documents
Cryptography Concepts
LaRon Walker
May, 2010
2
Cryptography Concepts
LaRon Walker
May, 2010
There are many different Cryptology techniques that can be used to encrypt data. Transposition
cipher techniques are methods that messages can be manipulated so they are not in plaintext. These
messages can only be read if the receiving party has the proper key that the messages’ ciphertexts were
originally based on. Per Pell (2010), “Transposition ciphers rearrange the letters of the plaintext without
Two of the more commonly used transposition cipher techniques are the rail fence method and
the stage transposition method. In the rail fence method, messages are sent in rows based on a pre-
determined matrix that is shared by the sender and its intended recipient(s). These are also known as
I O E R P O R P Y
L V C Y T G A H
Ciphertext: IOERPORPYLVCYTGAH
3
The above example is a two-row n-column (n meaning “next”) style routing matrix reading from the top
row to lower row then moving to the next row until you reach the end. This is a very simple
transposition cipher, and may be easily deciphered due to its simplicity. To help strengthen this cipher,
The development of key words has helped in creating easy ways to apply more complicated
routes to transposition ciphers. These key words are commonly referred to as ciphers. In these types of
transposition ciphers, per Pell (2010), the “plaintext is written into the columns from left to right as
normal, and the ciphertext will be formed by reading down the columns. The order in which the
columns are written to form the ciphertext is determined by the key.” Below is an example of a two
Key: 2315746
Plaintext:
T H E T R A N
S P O S I T I
O N C I P H E
R T E C H N I
Q U E W O R K
S B Y P E R M
U T I N G T H
E L E T T E R
S O F T H E P
L A I N T E X
T I T I S N O
T V E R Y S E
C U R E B U T
I S G R E A T
F O R L E A R
N I N G A B O
4
U T C R Y P T
O G R P H Y
EOCEEYIEFITERGRNCRTSORQSUESLTTCIFNUOHPNTUBTLOAIVUSOITGATHNRRTEEENSUAABPYTSICWPN
TTNIRERLGRPNIEIKMHRPXOETTROTRIPHOEGTHTSYBEEAYH
Key: 2315746
Input:
E O C E E Y I
E F I T E R G
R N C R T S O
R Q S U E S L
T T C I F N U
O H P N T U B
T L O A I V U
S O I T G A T
H N R R T E E
E N S U A A B
P Y T S I C W
P N Y Y N I R
E R L G R P N
I E I K M H R
P X O E T T R
O T R I P H O
E G T H T S Y
B E E A Y H
CICSCPOIRSTYLIORTEEERRTOTSHEPPEIPOEBOFNQTHLONNYNREXTGEYRSSNUVAEACIPHTHSHETRUINA
TRUSYGKEIHAIGOLUBUTEBWRNRROYEETEFTIGTAINRMTPTY
Using a two stage transposition cipher adds more complexity to a routing matrix. However, using this
method may not be enough to protect the data. This method is now commonly used in conjunction
with other cipher techniques, to add more layers of complexity when creating a multi-tier encryption
In the above two-stage transposition cipher, the message has the potential to be deciphered by
a different key. Due to the theory behind using number-based key words, if the length of the key word
was known and the key uses the first sequential numbers as in the above example, the messaged may
Original Key:
2 3 1 5 7 4 6
Please note the original key encompasses the first seven numbers when counting (e.g. 1, 2, 3, 4, 5, 6,
and 7)
9 10 8 12 14 11 13
Please note that the new key encompasses the next sequential numbers when counting (e.g. 8, 9, 10,
1=8
2=9
3 = 10
4 = 11
5 = 12
6 = 13
7 = 14
When matching the exact numbers to their respective counterparts, and in the same sequence, one
could use the same technique to decipher the same message, as the routing matrices are identical.
There are applications such as CoPATTY, Air-crack, along with other algorithm based cracking programs
I agree with the message "The Transposition cipher technique works by permuting the letters of
the plaintext. It is not very secure, but it is great for learning about cryptography". This is due to the art
and science of Cryptanalysis. Because of the evolution of Cryptanalysis and Cryptanalytic Attacks,
transposition ciphers are vulnerable if not used in conjunction with other techniques. Transposition
cipher techniques use ciphertexts, which are subject to ciphertext only attacks and chosen ciphertext
attacks, which are very possible, and some consider very easy to perform. As stated previously,
transposition ciphers should be used at more complication to the routing matrices of ciphering
techniques. Transposition ciphers alone are not very secure, however using them along with other
cipher techniques can help add multiple layers of complexity to the product cipher group.
References
http://www.ridex.co.uk/cryptology/#_Toc439908887