


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A transposition cipher is one in which plaintext symbols are rearranged (i.e., transposed or permuted) to produce ciphertext. The method of transposition may ...
Typology: Study notes
1 / 4
This page cannot be seen from the preview
Don't miss anything!
Math 135 (Summer 2006) Transposition Ciphers
A transposition cipher is one in which plaintext symbols are rearranged (i.e., transposed or permuted) to produce ciphertext. The method of transposition may be either mathematical or typographical in nature.
Example: We encipher NOTHING IS AS IT SEEMS by first writing it on two lines in a zig-zag pattern (or rail fence). The ciphertext is produced by transcribing the first row followed by the second row.
N T I G S S T E M O H N I A I S E S
Ciphertext: NTIGS STEMO HNIAI SES.
To decrypt, we write half the letters on one line, half on the second. (Note that if there are an odd number of letters, we include the “middle” letter on the top line.)
Example: Decipher MKHSE LWYAE ATSOL.
Solution: Since there are 15 letters, we write 8 on the top line and 7 on the bottom line so that
M K H S E L W Y A E A T S O L
Plaintext: MAKE HASTE SLOWLY.
The number of columns is the key information.
To encipher : Plaintext is written horizontally in k columns, and is then transcribed vertically column- by-column,
To decipher : Suppose that the length of the ciphertext is n and the key is k. Then the letters will fill n DIV k full rows, and there will be one partial row at the end with n MOD k letters. Transcribing row-by-row will then yield the plaintext.
Example: Encrypt NOTHING IN THE WORLD IS MORE DANGEROUS THAN SINCERE IGNORANCE AND CONSCIENTIOUS STUPIDITY with a key of k = 9 columns.
Solution: We write the plaintext horizontally in 9 columns as follows:
The cipher text is therefore: NTSES NDTIO HMRIO CIDTE OONRO OIHWR UCANU TIOES ENSSY NRDTR CCSGL AHEEI TIDNA IAEUN IGNGN NP.
Example: Suppose the ciphertext is: GPSDO AILTI VRVAA WETEC NITHM EDLHE TALEA ONME. If it is known that the key is k = 7, find the plaintext.
Solution: There are 39 letters in the ciphertext which means that there are 39 DIV 7 = 5 full rows and one partial row with 39 MOD 7 = 4 letters.
Plaintext: * (*Archimedes)
The order of transcription of the columns is determined by the alphabetical order of letters in the keyword. If there are repeated letters in the keyword, the columns corresponding to those letters are transcribed in order left-to-right.
Example: Encrypt THE QUICK BROWN FOX JUMPED OVER THE LAZY DOG if the keyword is CORNELL.
Ciphertext: TKODE GUWMR YINPT DCFEH OQOUE ZHBXO LERJV A
Love at the lips was touch As sweet as I could bear; And once that seemed too much; I lived on air —Robert Frost (from To Earthward )