Home | News | Hacking | Sciences | Technology | Ti 92 | Programming | Free articles | Links | Webmaster |
Simple encipherment techniques Encryption Jul 02 2002 - 00:25 EST | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
stand__sure writes: SIMPLE ENCIPHERMENT TECHNIQUES
Introduction This is the first article in what is planned to be a three article series on the subject of cryptography. I. Simple Encipherment Techniques, II. Advanced Encipherment Techniques, and III. Decryption Methods. The third article may be split into two articles (I still haven't decided/finished writing it). There may be a fourth article on compression as encryption and a fifth on well-known computer methods. If the community likes the first couple of papers, then I will probably write four and five. The concepts in this first article are very fundamental. My reasons for starting here are two-fold: 1) if you can't create an encryption scheme, you can't learn how to break one; and 2) although there are a lot of wonderful sources out there on encryption, I have seen very few that begin at the beginning. This first article deals with "pen and paper" methods. These may seem primitive, but they are used very frequently. Imagine a scenario where you don't have access to a computer and you are fearful of being caught -- what method do you use to encode your messages? The answer is normally one of the methods shown in this first article. Two good sources for further information on these types of codes are CRYPTANALYSIS: a study of ciphers and their solution by Helen Fouché Gains (Dover Publications, ©1939, ©1956, ISBN: 0-486-20097-3) and Codes, Ciphers & Other Cryptic & Clandestine Communication: Making and Breaking Secret Messages from Hieroglyphs to the Internet by Fred B. Wrixon (©1998, Black Dog & Leventhal Publishers, 1998, ISBN:1-57912-040-7) A quick note: As a rule, I use the terms "encipher" and "decipher" to refer to a method of encoding. I use the terms "decrypt" and "decryption" to refer to breaking codes. Disclaimers: The author is an enthusiast not an expert. Quotations are used for educational conveyance only. Simple Transposition
DID I HAVE A DREAM OR DID A DREAM HAVE ME -- RUSH
DEORE IAREM IRIMR HEDHU AAAAS VMDVH Of course, you can always write in a different order. For example, the same plain text can be written in a spiral
DADID IDRER DRUMO IESEM HAHVA AMHAW VEADR All that matters is that the approach being employed is agreed upon by both the sender and the receiver. The grid can have asmany columns as you wish. Using the same example, here's what six columns looks like. (NOTE: there is one empty spacewhich I have filled with a 'Q' -- the position of the filler character is up to you.)
DVADM EIEMA HQDAO DARID RRVUH RDEES AEIAM H Example
In God we trust; all others we monitor - Intercept Operators' Motto
Geometrical Transposition
DID I HAVE A DREAM OR DID A DREAM HAVE ME -- RUSH
DEOREVMDVHAAAASDDDAEIAREMIRIRM The key as used is called ataking-off key. The columns are taken off alphabetically from left to right with duplicates being assigned the next ordinal value. This is still pretty weak -- to solve it all one has to do is 'guess' the correct grid-size, fill the grid and then rearrange the columns (I have done this by cutting graph paper into strips and rearranging). To combat this weakness, one can employirregular transposition (if the grid is square, it is sometimes called theNihliist Transposition ). In this transposition, both the row- and column-order are varied. For example,
Although different encoders may do otherwise, I ignore the slack characters in the key -- thus, my row key becomes AMERI= 14253 . Working step-wise, (NOTE: I prefer to do rows first since the text is still readable left-to-right -- if one prefers columns, the result would be the same)
The "United States Army" Double Transposition The goal of multiple anagramming is to make the message more difficult to decrypt. As has been previously shown (supra), the enipherment process is not difficult. The so-called "United States Army" Double Transposition is a real-world example from WWI. It is shown here because it is a slightly different encipherment technique than shown previously. The goal of any "Pen and Paper" method is that it be easy enough to be done anywhere (even on the front lines of a battle). It must also be simple enough that almost anyone can do it with a minimum amount of training.
REGRET THE CHANGE IN SYSTEMS
This first block is not taken off directly. Rather, the columns written as rows in a new block of the same dimensions. For example,
The completed block is shown below.
Reading off by columns, the result is: ETECH NSIGR SHATY SGTEE ENRM
Simple Substitution
a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Security is mostly supersition. It does not exist in nature. -Helen Keller
Vhfxulwb lv prvwob vxshuvwlwlrq. Lw grhv qrw halvw lq qdxwuh. -Khohq Nhoohv
a b c d e f g h i j k l m n o p q r s t u v w x y z Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
Security is mostly supersition. It does not exist in nature. -Helen Keller
Hvxfirgb rh nlhgob hfkvihgrgrlm. Rg wlvh mlg vcrhg rm mzgfiv. -Svovm Pvoovi
a b c d e f g h i j k l m N O P Q R S T U V W X Y Z
a b c d e f g h i j k l m Z Y X W V U T S R Q P O N
h e l n a b c d f g i j k M O P Q R S T U V W X Y Z
H E L N A BC D F G I JK M O P Q RS T U V W XY Z
a b c d e f g h i j k l m n o p q r s t u v w x y z H C K S E D M T L F O U Y N G P V Z A I Q W B J R X
a b c d e f g h i j k l m n o p q r s t u v w x y z Q W E R T Y U I O P A S D F G H J K L Z X C V B N M
|