Classical cipher

Last updated

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

Contents

In contrast, modern strong cryptography relies on new algorithms and computers developed since the 1970s.

Types of classical ciphers

Classical ciphers are often divided into transposition ciphers and substitution ciphers , but there are also concealment ciphers .

Substitution ciphers

In a substitution cipher, letters (or groups of letters) are systematically replaced throughout the message for other letters (or groups of letters).

A well-known example of a substitution cipher is the Caesar cipher. To encrypt a message with the Caesar cipher, each letter of message is replaced by the letter three positions later in the alphabet. Hence, A is replaced by D, B by E, C by F, etc. Finally, X, Y and Z are replaced by A, B and C respectively. So, for example, "WIKIPEDIA" encrypts as "ZLNLSHGLD". Caesar rotated the alphabet by three letters, but any number works.

Another method of substitution cipher is based on a keyword. All spaces and repeated letters are removed from a word or phrase, which the encoder then uses as the start of the cipher alphabet. The end of the cipher alphabet is the rest of the alphabet in order without repeating the letters in the keyword. For example, if the keyword is CIPHER, the cipher alphabet would look like this:

normal alphabeta b c d e f g h i j k l m n o p q r s t u v w x y z
cipher alphabetc i p h e r a b d f g j k l m n o q s t u v w x y z

The previous examples were all examples of monoalphabetic substitution ciphers, where just one cipher alphabet is used. It is also possible to have a polyalphabetic substitution cipher, where multiple cipher alphabets are used. The encoder would make up two or more cipher alphabets using whatever techniques they choose, and then encode their message, alternating what cipher alphabet is used with every letter or word. This makes the message much harder to decode because the codebreaker would have to figure out both cipher alphabets.

Another example of a polyalphabetic substitution cipher that is much more difficult to decode is the Vigenère square, an innovative encoding method. With the square, there are 26 different cipher alphabets that are used to encrypt text. Each cipher alphabet is just another rightward Caesar shift of the original alphabet. This is what a Vigenère square looks like:

                A B C D E F G H I J K L M N O P Q R S T U V W X Y Z                 B C D E F G H I J K L M N O P Q R S T U V W X Y Z A                 C D E F G H I J K L M N O P Q R S T U V W X Y Z A B                 D E F G H I J K L M N O P Q R S T U V W X Y Z A B C                 E F G H I J K L M N O P Q R S T U V W X Y Z A B C D                 F G H I J K L M N O P Q R S T U V W X Y Z A B C D E                 G H I J K L M N O P Q R S T U V W X Y Z A B C D E F                 H I J K L M N O P Q R S T U V W X Y Z A B C D E F G                 I J K L M N O P Q R S T U V W X Y Z A B C D E F G H                 J K L M N O P Q R S T U V W X Y Z A B C D E F G H I                 K L M N O P Q R S T U V W X Y Z A B C D E F G H I J                 L M N O P Q R S T U V W X Y Z A B C D E F G H I J K                 M N O P Q R S T U V W X Y Z A B C D E F G H I J K L                 N O P Q R S T U V W X Y Z A B C D E F G H I J K L M                 O P Q R S T U V W X Y Z A B C D E F G H I J K L M N                 P Q R S T U V W X Y Z A B C D E F G H I J K L M N O                 Q R S T U V W X Y Z A B C D E F G H I J K L M N O P                 R S T U V W X Y Z A B C D E F G H I J K L M N O P Q                 S T U V W X Y Z A B C D E F G H I J K L M N O P Q R                 T U V W X Y Z A B C D E F G H I J K L M N O P Q R S                 U V W X Y Z A B C D E F G H I J K L M N O P Q R S T                 V W X Y Z A B C D E F G H I J K L M N O P Q R S T U                 W X Y Z A B C D E F G H I J K L M N O P Q R S T U V                 X Y Z A B C D E F G H I J K L M N O P Q R S T U V W                 Y Z A B C D E F G H I J K L M N O P Q R S T U V W X                 Z A B C D E F G H I J K L M N O P Q R S T U V W X Y

To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:

PlaintextATTACKATDAWN
KeyLEMONLEMONLE
CiphertextLXFOPVEFRNHR

Some substitution ciphers involve using numbers instead of letters. An example of this is the Great Cipher, where numbers were used to represent syllables. There is also another number substitution cipher[ which? ] that involves having four different number pair options for a letter based on a keyword.

Instead of numbers, symbols can also be used to replace letters or syllables. One example of this is Zodiac alphabet, where signs of the zodiac were used to represent different letters, for example, the symbols for the sun stood for A, Jupiter stood for B, and Saturn stood for C. Dots, lines, or dashes could also be used, one example of this being Morse Code, which is not a cipher, but uses dots and dashes as letters nonetheless. The pigpen cipher uses a grid system or lines and dots to establish symbols for letters. There are various other methods that involve substituting letters of the alphabet with symbols or dots and dashes.

Transposition ciphers

In a transposition cipher, the letters themselves are kept unchanged, but their order within the message is scrambled according to some well-defined scheme. Many transposition ciphers are done according to a geometric design. A simple (and once again easy to crack) encryption would be to write every word backwards. For example, "Hello my name is Alice." would now be "olleH ym eman si ecilA." A scytale is a machine that aids in the transposition of methods.

In a columnar cipher, the original message is arranged in a rectangle, from left to right and top to bottom. Next, a key is chosen and used to assign a number to each column in the rectangle to determine the order of rearrangement. The number corresponding to the letters in the key is determined by their place in the alphabet, i.e. A is 1, B is 2, C is 3, etc. For example, if the key word is CAT and the message is THE SKY IS BLUE, the message would be arranged thus:

                         C A T                          3 1 20                          T H E                          S K Y                          I S B                          L U E

Next, the letters are taken in numerical order and that is how the message is transposed. The column under A is taken first, then the column under C, then the column under T, as a result the message "The sky is blue" has become: HKSUTSILEYBE

In the Chinese cipher's method of transposing, the letters of the message are written from right to left, down and up columns to scramble the letters. Then, starting in the first row, the letters are taken in order to get the new ciphertext. For example, if the message needed to be enciphered was THE DOG RAN FAR, the Chinese cipher would look like this:

                           R R G T                            A A O H                            F N D E

The cipher text then reads: RRGT AAOH FNDE

Many transposition ciphers are similar to these two examples, usually involving rearranging the letters into rows or columns and then taking them in a systematic way to transpose the letters. Other examples include the Vertical Parallel and the Double Transposition Cipher.

More complex algorithms can be formed by mixing substitution and transposition in a product cipher; modern block ciphers such as DES iterate through several stages of substitution and transposition.

Concealment ciphers

Put simply, a concealment, or null, cipher is any cipher which involves a number of nulls, or decoy letters. A null cipher could be plaintext words with nulls placed in designated areas or even a plaintext message broken up in different positions with a null at the end of each word. [1] [2] However, a message with only a couple nulls (for example, one at the beginning and one at the end) is not a null cipher.

For example, during England's Civil War Royalist Sir John Trevanian was aided in his escape from a Puritan castle in Colchester by this message: [3]

WORTHIE SIR JOHN, HOPE, THAT IS YE BESTE COMFORT OF YE AFFLICTED, CANNOT MUCH, I FEAR ME, HELP YOU NOW. THAT I WOULD SAY TO YOU, IS THIS ONLY: IF EVER I MAY BE ABLE TO REQUITE THAT I DO OWE YOU, STAND NOT UPON ASKING ME. TIS NOT MUCH THAT I CAN DO; BUT WHAT I CAN DO, BEE YE VERY SURE I WILL. I KNOW THAT, IF DETHE COMES, IF ORDINARY MEN FEAR IT, IT FRIGHTS NOT YOU, ACCOUNTING IT FOR A HIGH HONOUR, TO HAVE SUCH A REWARDE OF YOUR LOYALTY. PRAY YET YOU MAY BE SPARED THIS SOE BITTER, CUP. I FEAR NOT THAT YOU WILL GRUDGE ANY SUFFERINGS; ONLY IF BIE SUBMISSIONS YOU CAN TURN THEM AWAY, TIS THE PART OF A WISE MAN. TELL ME, AN IF YOU CAN, TO DO FOR YOU ANYTHINGE THAT YOU WOLDE HAVE DONE. THE GENERAL GOES BACK ON WEDNESDAY. RESTINGE YOUR SERVANT TO COMMAND.

The third letter after each punctuation reveals "Panel at East end of Chapel slides".

A dot or pinprick null cipher is a common classical encryption method in which dot or pinprick is placed above or below certain letters in a piece of writing. [4] An early reference to this was when Aeneas Tacticus wrote about it in his book On the Defense of Fortifications. [5]

Cryptanalysis of classical ciphers

Classical ciphers are commonly quite easy to break. Many of the classical ciphers can be broken even if the attacker only knows sufficient ciphertext and hence they are susceptible to a ciphertext-only attack. Some classical ciphers (e.g., the Caesar cipher) have a small key space. These ciphers can be broken with a brute force attack, that is by simply trying out all keys. Substitution ciphers can have a large key space, but are often susceptible to a frequency analysis, because for example frequent letters in the plaintext language correspond to frequent letters in the ciphertexts. Polyalphabetic ciphers such as the Vigenère cipher prevent a simple frequency analysis by using multiple substitutions. However, more advanced techniques such as the Kasiski examination can still be used to break these ciphers.

On the other hand, modern ciphers are designed to withstand much stronger attacks than ciphertext-only attacks. A good modern cipher must be secure against a wide range of potential attacks including known-plaintext attacks and chosen-plaintext attacks as well as chosen-ciphertext attacks. For these ciphers an attacker should not be able to find the key even if they know any amount of plaintext and corresponding ciphertext and even if they could select plaintext or ciphertext themselves. Classical ciphers do not satisfy these much stronger criteria and hence are no longer of interest for serious applications.

Some techniques from classical ciphers can be used to strengthen modern ciphers. For example, the MixColumns step in AES is a Hill cipher. [6]

See also

Related Research Articles

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

The poem code is a simple, and insecure, cryptographic method which was used during World War II by the British Special Operations Executive (SOE) to communicate with their agents in Nazi-occupied Europe.

Some Buddhist terms and concepts lack direct translations into English that cover the breadth of the original term. Below are given a number of important Buddhist terms, short definitions, and the languages in which they appear. In this list, an attempt has been made to organize terms by their original form and give translations and synonyms in other languages along with the definition.

<span class="mw-page-title-main">VIC cipher</span> Complex Soviet pencil and paper cipher

The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR".

<span class="mw-page-title-main">Slovene alphabet</span>

The Slovene alphabet is an extension of the Latin script used to write Slovene. The standard language uses a Latin alphabet which is a slight modification of the Croatian Gaj's Latin alphabet, consisting of 25 lower- and upper-case letters:

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion. It was invented around 1901 by Felix Delastelle.

Lewis Carroll published "The Alphabet-Cipher" in 1868, possibly in a children's magazine. It describes what is known as a Vigenère cipher, a well-known scheme in cryptography. While Carroll calls this cipher "unbreakable", Friedrich Kasiski had already published in 1863 a volume describing how to break such ciphers and Charles Babbage had secretly found ways to break polyalphabetic ciphers in the previous decade during the Crimean War.

<span class="mw-page-title-main">Rail fence cipher</span> Type of transposition cipher

The rail fence cipher is a classical type of transposition cipher. It derives its name from the manner in which encryption is performed, in analogy to a fence built with horizontal rails.

The four-square cipher is a manual symmetric encryption technique. It was invented by the French cryptographer Felix Delastelle.

The Two-square cipher, also called double Playfair, is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four-square cipher while still being slightly stronger than the single-square Playfair cipher.

The grill method, in cryptology, was a method used chiefly early on, before the advent of the cyclometer, by the mathematician-cryptologists of the Polish Cipher Bureau in decrypting German Enigma machine ciphers. The Enigma rotor cipher machine changes plaintext characters into cipher text using a different permutation for each character, and so implements a polyalphabetic substitution cipher.

The Smithy code is a series of letters embedded, as a private amusement, within the April 2006 approved judgement of Mr Justice Peter Smith on The Da Vinci Code copyright case. It was first broken, in the same month, by Dan Tench, a lawyer who writes on media issues for The Guardian, after he received a series of email clues about it from Justice Smith.

ACE is the collection of units, implementing both a public key encryption scheme and a digital signature scheme. Corresponding names for these schemes — «ACE Encrypt» and «ACE Sign». Schemes are based on Cramer-Shoup public key encryption scheme and Cramer-Shoup signature scheme. Introduced variants of these schemes are intended to achieve a good balance between performance and security of the whole encryption system.

References

  1. Travis, Falcon; Hindley, Judy; Thomson, Ruth; Amery, Heather; Rawson, Christopher; Harper, Anita (1978). The Spy's Guidebook. Usborne Pocketbooks.
  2. Moore, Gareth (2019). Explorer Academy Codebreaking Activity Adventure. National Geographic Books. ISBN   9781426333071.
  3. Janeczko, Paul B. (2004). Top Secret: a Handbook of Codes, Ciphers, and Secret Writing. Candlewick Press. ISBN   9780763629724.
  4. Janeczko, Paul B. (2004). Top Secret: a Handbook of Codes, Ciphers, and Secret Writing. Candlewick Press. ISBN   9780763629724.
  5. "Aeneas Tacticus • Siege Defense, XXI‑XXXI". penelope.uchicago.edu. Retrieved 2022-05-28.
  6. Xintong, Kit Choy. "Understanding AES Mix-Columns Transformation Calculation" (PDF). Retrieved 2016-10-26.