罕见是什么意思| 女人人中深代表什么| 仲夏是什么意思| 什么多腔| 轩尼诗是什么酒| 什么什么什么花| 针眼是什么样子的图片| 益生菌什么时间吃最好| 梦见大胖小子是什么意思| 什么品牌油烟机好| cooh是什么基| 什么是执念| 大豆是什么| 什么叫慢阻肺| 担担面是什么面| 看痘痘挂什么科| 丙二醇是什么| 地贫吃什么补血最快| 突然头晕冒虚汗什么原因| 动脉斑块是什么意思| 咳嗽吃什么好| 佯装是什么意思| 星期一左眼皮跳是什么预兆| 右肩膀疼痛是什么原因| 矫正视力是指什么| 癫是什么意思| 八月十三什么星座| 孕妇适合吃什么鱼| 肉桂是什么| 扑炎痛又叫什么| 鹅拉绿色粪便是什么病| 经期适合什么运动| 男神是什么意思| 兵马俑是什么意思| 考科目二紧张吃什么药| 男朋友生日送什么礼物| cto是什么意思| 来大姨妈不能吃什么水果| charleskeith什么牌子| 三加一是什么意思| 蜻蜓点水是什么行为| 险象环生是什么意思| 血管夹层是什么病| 正常白带什么样| 转述句是什么意思| coa是什么| e是什么单位| 女人梦见狼是什么预兆| 成佛是什么意思| 炒菜用什么油比较好| 吃什么长内膜最快最有效| 酒后吐吃什么可以缓解| 胎芽是什么意思| 血精是什么原因| 油面筋是什么做的| 为什么牙齿晚上痛白天不痛| 寄什么快递最便宜| 痛风用什么药| 房水是什么| 心神不宁是什么意思| 梦见老公怀孕什么预兆| 处女座女生和什么星座男生最配| 嘴唇为什么会干| 平安果什么时候吃| 花枝是什么食材| 左胸上方隐痛什么原因| 总打嗝是什么原因| 为什么会扁桃体发炎| 创伤弧菌用什么抗生素| 生气过度会气出什么病| 潜血十一是什么意思| 梦到自己快要死了是什么意思| 智齿前面一颗牙叫什么| 粟是什么农作物| 为什么打哈欠会流眼泪| 欧珀莱属于什么档次| 息斯敏是什么药| 爱是什么结构| 波立维是什么药| 孩子打嗝是什么原因| 什么症状是怀孕了| 独在异乡为异客的异是什么意思| 见利忘义是什么意思| 阑尾有什么作用| 为什么没有| oo什么意思| 脸上长痘痘用什么药膏效果好| 腱鞘炎吃什么药好| 喉咙痛可以吃什么水果| 胃经常胀气是什么原因| 荷花的花语是什么| 皮肤过敏挂什么科| 一什么花瓣| 窦性心律过速吃什么药| 神经衰弱有什么症状| gap是什么品牌| 场合是什么意思| 条索灶是什么意思| 吃中药忌口都忌什么| s代表什么| 什么的事| 突然勃不起来是什么原因| 什么什么各异| gmp认证是什么意思| 北京是什么省| 蛋白粉有什么用| 病毒的繁殖方式是什么| 香油是什么| 为什么人一瘦就会漂亮| 嗔什么意思| lov是什么意思| 字母圈是什么意思| 家里有小蜘蛛预示什么| 九月底是什么星座| 14数字代表什么意思| 凉白开是什么水| 1989年是什么年| 戒断反应什么意思| 为什么闭眼单脚站不稳| 夜深人静是什么意思| 红红的太阳像什么| 什么是精神出轨| 做馒头用什么面粉好| 事业有成是什么意思| 指甲挂什么科| 煜什么意思| 兵工厂属于什么单位| hazzys是什么牌子价格| 无蒂息肉是什么意思| 头发晕是什么病的征兆| 蕞是什么意思| 腰椎滑脱是什么意思| 同房肚子痛是什么原因| 什么痣不能点| 舌苔厚黄吃什么药| 2.20什么星座| 什么程度算精神出轨| 什么减肥最快不反弹| 澳门什么时候回归的| 挑灯夜战是什么意思| 卵泡生成素高是什么原因| 24D是什么激素| 04年是什么生肖| 骨密度检查是查什么| 平板支撑练什么| 什么是电解水| cbb电容是什么电容| 缺铁吃什么补得最快| 乳酸杆菌少或无是什么意思| 肋骨骨折吃什么食物好得快| 蹶是什么意思| 突然想吃辣是什么原因| 婴儿黄疸母亲忌口什么| 为什么不建议吃大豆油| 傍大款是什么意思| 一心向阳下一句是什么| 葡萄什么时候成熟| 什么是情绪| 劣质是什么意思| 梦见红薯是什么意思| 为什么会得风湿| 防晒衣什么颜色最防晒| 错构瘤是什么| 为什么女追男没好下场| 新疆人是什么民族| 肚子胀气老放屁是什么原因| 中筋面粉是什么粉| 胃不好吃什么水果最好| 蒲公英有什么作用和功效| 锁骨窝疼可能是什么病| 汤圆和元宵有什么区别| 遐龄是什么意思| 女性排卵期一般在什么时候| 备孕要注意什么| 痰多吃什么药好| ppi是什么药| 红细胞高是什么意思| 中国最毒的蛇是什么蛇| 重楼有什么功效| 糖化血红蛋白偏高是什么意思| 噻虫高氯氟治什么虫| 一是什么意思| 乳酸脱氢酶高是什么原因| 海参有什么营养价值| up是什么意思| 嗣子是什么意思| 胖大海和什么搭配最好| 医院特需号是什么意思| 尤甚是什么意思| 称谓是什么意思| 纵欲过度是什么意思| 黄五行属性是什么| anker是什么牌子| 细菌感染是什么引起的| 吃什么补充维生素b6| 早孕反应最早什么时候出现| 全身痒是什么原因| 夏天吃羊肉有什么好处| 指甲变形是什么原因| 一什么水花| 做nt需要准备什么| 眩晕是什么原因引起的| 鸡肉和什么不能一起吃| 夏天都有什么花| 一直吐是什么原因| 尿隐血是什么问题| 谷维素是治疗什么的| 梦见马是什么意思| 上午十点到十一点是什么时辰| vd是什么| 脸色发黑发暗是什么原因| 本卦和变卦是什么关系| 蛋白粉是什么| 蜂蜜的主要成分是什么| 2月10日什么星座| 痣挂什么科| 肚子疼应该挂什么科| 卤米松软膏主治什么| 周公解梦掉牙齿意味着什么| 望眼欲穿什么意思| 乌鸡汤放什么材料| 甲状腺腺体回声欠均匀是什么意思| 测怀孕的试纸叫什么| 什么样的人容易得抑郁症| 感冒吃什么食物| 做梦梦见掉牙齿是什么意思| 四个月是什么字| 鸡蛋和什么炒好吃| 九地是什么中药| 甘油三酯高吃什么食物降得快| 山海经是什么| 弥漫性病变是什么意思| 梦见别人买房子是什么预兆| 自律性是什么意思| 脚肿是什么原因引起的| 竹马是什么意思| 女人什么血型最聪明| 到底是什么意思| 老母鸡炖什么好吃又有营养价值| 喜筵和喜宴是什么意思| hcho是什么意思| 李宁是什么运动员| 痛风吃什么水果好| 11月24是什么星座| 心率过慢有什么危害| 夏天适合喝什么茶| 肺结节是什么病| 小麦什么时候播种| 低钠盐是什么意思| 25属什么生肖| 什么口罩| 什么是cpi| 牛羊成群是什么生肖| 额头长闭口是什么原因| 锁骨发适合什么脸型| 男性结扎是什么意思| 什么洗面奶好用| 优甲乐是什么药| 智齿不拔有什么危害| 梦见煤是什么意思| hpv是什么检查| 金利来皮带属于什么档次| 女人梦到蛇是什么意思| 今年什么时候暑伏| 百度Jump to content

小伙患高血压却不知 5分钟"平板撑"撕裂大血管

From Wikipedia, the free encyclopedia
Step-by-step process for the double columnar transposition cipher.
百度 CDR(ChinaDepositaryReceipt中国存托凭证)指存券机构将在海外上市企业的股份存放于当地托管机构后,在中国发行代表这些股份的凭证。

In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext (typically characters or groups of characters) according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

General principle

[edit]

Plaintexts can be rearranged into a ciphertext using a key, scrambling the order of characters like the shuffled pieces of a jigsaw puzzle. The resulting message is hard to decipher without the key because there are many ways the characters can be arranged.

For example, the plaintext "THIS IS WIKIPEDIA" could be encrypted to "TWDIP SIHII IKASE". To decipher the encrypted message without the key, an attacker could try to guess possible words and phrases like DIATHESIS, DISSIPATE, WIDTH, etc., but it would take them some time to reconstruct the plaintext because there are many combinations of letters and words. By contrast, someone with the key could reconstruct the message easily:

C I P H E R     Key
1 4 5 3 2 6     Sequence (key letters in alphabetical order)
T H I S I S     Plaintext
W I K I P E
D I A * * *

Ciphertext by column:
  #1 TWD, #2 IP, #3 SI, #4 HII, #5 IKA, #6 SE
Ciphertext in groups of 5 for readability:
  TWDIP SIHII IKASE

In practice, a message this short and with a predictable keyword would be broken almost immediately with cryptanalysis techniques.

Transposition ciphers have several vulnerabilities (see the section on "Detection and cryptanalysis" below), and small mistakes in the encipherment process can render the entire ciphertext meaningless.

However, given the right conditions - long messages (e.g., over 100–200 letters), unpredictable contents, unique keys per message, strong transposition methods, and so on - guessing the right words could be computationally impossible without further information. In their book on codebreaking historical ciphers, Elonka Dunin and Klaus Schmeh describe double columnar transposition (see below) as "one of the best manual ciphers known".[1]

Rail Fence cipher

[edit]

The Rail Fence cipher is a form of transposition cipher that gets its name from the way in which it is encoded. In the rail fence cipher, the plaintext is written downward and diagonally on successive "rails" of an imaginary fence, then moves up when it gets to the bottom. The message is then read off in rows. For example, using three "rails" and a message of 'WE ARE DISCOVERED FLEE AT ONCE', the encrypter writes out:

W . . . E . . . C . . . R . . . L . . . T . . . E
. E . R . D . S . O . E . E . F . E . A . O . C .
. . A . . . I . . . V . . . D . . . E . . . N . .

Then reads off:

WECRL TEERD SOEEF EAOCA IVDEN

(The cipher has broken this ciphertext up into blocks of five to help avoid errors. This is a common technique used to make the cipher more easily readable. The spacing is not related to spaces in the plaintext and so does not carry any information about the plaintext.)

Scytale

[edit]

The rail fence cipher follows a pattern similar to that of the scytale, (pronounced "SKIT-uhl-ee") a mechanical system of producing a transposition cipher used by the ancient Greeks. The system consisted of a cylinder and a ribbon that was wrapped around the cylinder. The message to be encrypted was written on the coiled ribbon. The letters of the original message would be rearranged when the ribbon was uncoiled from the cylinder. However, the message was easily decrypted when the ribbon recoiled on a cylinder of the same diameter as the encrypting cylinder.[2] Using the same example as before, if the cylinder has a radius such that only three letters can fit around its circumference, the cipherer writes out:

W . . E . . A . . R . . E . . D . . I . . S . . C
. O . . V . . E . . R . . E . . D . . F . . L . .
. . E . . E . . A . . T . . O . . N . . C . . E .

In this example, the cylinder is running horizontally and the ribbon is wrapped around vertically. Hence, the cipherer then reads off:

WOEEV EAEAR RTEEO DDNIF CSLEC

Route cipher

[edit]

In a route cipher, the plaintext is first written out in a grid of given dimensions, then read off in a pattern given in the key. For example, using the same plaintext that we used for rail fence:

W R I O R F E O E 
E E S V E L A N J 
A D C E D E T C X 

The key might specify "spiral inwards, clockwise, starting from the top right". That would give a cipher text of:

EJXCTEDEC DAEWRIORF EONALEVSE

Route ciphers have many more keys than a rail fence. In fact, for messages of reasonable length, the number of possible keys is potentially too great to be enumerated even by modern machinery. However, not all keys are equally good. Badly chosen routes will leave excessive chunks of plaintext, or text simply reversed, and this will give cryptanalysts a clue as to the routes.

A variation of the route cipher was the Union Route Cipher, used by Union forces during the American Civil War. This worked much like an ordinary route cipher, but transposed whole words instead of individual letters. Because this would leave certain highly sensitive words exposed, such words would first be concealed by code. The cipher clerk may also add entire null words, which were often chosen to make the ciphertext humorous. [citation needed]

Columnar transposition

[edit]

Encryption

[edit]

In a columnar transposition, the message is written out in rows of a fixed length, and then read out again column by column, and the columns are chosen in some scrambled order. Both the width of the rows and the permutation of the columns are usually defined by a keyword. For example, the keyword ZEBRAS is of length 6 (so the rows are of length 6), and the permutation is defined by the alphabetical order of the letters in the keyword. In this case, the order would be "6 3 2 4 1 5".

In a regular columnar transposition cipher, any spare spaces are filled with nulls; in an irregular columnar transposition cipher, the spaces are left blank. Finally, the message is read off in columns, in the order specified by the keyword. For example, suppose we use the keyword ZEBRAS and the message WE ARE DISCOVERED. FLEE AT ONCE. In a regular columnar transposition, we write this into the grid as follows:

6 3 2 4 1 5
W E A R E D
I S C O V E 
R E D F L E 
E A T O N C 
E Q K J E U 

providing five nulls (QKJEU), these letters can be randomly selected as they just fill out the incomplete columns and are not part of the message. The ciphertext is then read off as:

EVLNE ACDTK ESEAQ ROFOJ DEECU WIREE

In the irregular case, the columns are not completed by nulls:

6 3 2 4 1 5
W E A R E D 
I S C O V E 
R E D F L E 
E A T O N C 
E 

This results in the following ciphertext:

EVLNA CDTES EAROF ODEEC WIREE

Decryption

[edit]

To decipher it, the recipient has to work out the shape of the enciphering grid by dividing the message length by the key length to find the number of rows in the grid. The length of the grid's last line is given by the remainder. The key is written above the grid, and the ciphertext is written down the columns of the grid in the order given by the letters of the key. The plaintext appears on the rows. A partial decipherment of the above ciphertext, after writing in the first column:

6 3 2 4 1 5
. . . . E .
. . . . V .
. . . . L .
. . . . N .
.

In a variation, the message is blocked into segments that are the key length long and to each segment the same permutation (given by the key) is applied. This is equivalent to a columnar transposition where the read-out is by rows instead of columns.

History

[edit]

In the middle of the 17th century, Samuel Morland introduced an early form of columnar transposition. [citation needed] The technique was developed further over the next two centuries and became widely used in the late 19th and 20th centuries, notably by French military services, Japanese diplomats, and Soviet intelligence agencies.

John Falconer's Cryptomenysis Patefacta (1685) contains one of the earliest known English-language explanations of a keyed columnar transposition. Falconer gives no account of the cipher's origin, but he does explain how to write the plaintext into a rectangular grid, pad the final row with null letters, and extract the columns in a secret order determined by a keyword.[3]

Even more importantly, Falconer offers a worked method of cryptanalysis. He shows that an analyst can test different grid heights and reorder the columns by trial and error until readable text emerges, noting that the cipher preserves normal letters frequencies and is therefore susceptible to detection. He indicates that such letter frequencies can be used to detect the likely language of the text, even without knowing its contents, as letter frequencies differ between languages. Falconer does not discuss double transposition or how to solve ciphers where nulls are not provided in the final column, which suggests these were not widespread at the time.

Columnar transposition was subsequently incorporated into more elaborate systems—most famously the double transposition used by French military and diplomatic services, Japanese and German ciphers of the First and Second World Wars, and Soviet agents—remaining in serious use into the 1950s. Falconer’s analysis anticipates many of the systematic attacks later refined against those double-stage versions, making Cryptomenysis Patefacta a landmark in the early literature of cryptanalysis.

Double transposition

[edit]

A single columnar transposition could be attacked by guessing possible column lengths, writing the message out in its columns (but in the wrong order, as the key is not yet known), and then looking for possible anagrams. Thus to make it stronger, a double transposition was often used. This is simply a columnar transposition applied twice. The same key can be used for both transpositions, or two different keys can be used.

Visual demonstration of double transposition

[edit]

In the following example, we use the keys JANEAUSTEN and AEROPLANES to encrypt the following plaintext: "Transposition ciphers scramble letters like puzzle pieces to create an indecipherable arrangement."

The colors show how the letters are scrambled in each transposition step. While a single step only causes a minor rearrangement, the second step leads to a significant scrambling effect if the last row of the grid is incomplete.

Another example

[edit]

As an example, we can take the result of the irregular columnar transposition in the previous section, and perform a second encryption with a different keyword, STRIPE, which gives the permutation "564231":

5 6 4 2 3 1 
E V L N A C
D T E S E A
R O F O D E
E C W I R E
E

As before, this is read off columnwise to give the ciphertext:

CAEEN SOIAE DRLEF WEDRE EVTOC

If multiple messages of exactly the same length are encrypted using the same keys, they can be anagrammed simultaneously. This can lead to both recovery of the messages, and to recovery of the keys (so that every other message sent with those keys can be read).

During World War I, the German military used a double columnar transposition cipher, changing the keys infrequently. The system was regularly solved by the French, naming it übchi, who were typically able to quickly find the keys once they'd intercepted a number of messages of the same length, which generally took only a few days. However, the French success became widely known and, after a publication in Le Matin, the Germans changed to a new system on 18 November 1914.[4]

During World War II, the double transposition cipher was used by Dutch Resistance groups, the French Maquis and the British Special Operations Executive (SOE), which was in charge of managing underground activities in Europe.[5] It was also used by agents of the American Office of Strategic Services[6] and as an emergency cipher for the German Army and Navy.

Until the invention of the VIC cipher, double transposition was generally regarded as the most complicated cipher that an agent could operate reliably under difficult field conditions.

Cryptanalysis

[edit]

The double transposition cipher can be treated as a single transposition with a key as long as the product of the lengths of the two keys.[7]

In late 2013, a double transposition challenge, regarded by its author as undecipherable, was solved by George Lasry using a divide-and-conquer approach where each transposition was attacked individually.[8]

Myszkowski transposition

[edit]

A variant form of columnar transposition, proposed by émile Victor Théodore Myszkowski in 1902, requires a keyword with recurrent letters. In usual practice, subsequent occurrences of a keyword letter are treated as if the next letter in alphabetical order, e.g., the keyword TOMATO yields a numeric keystring of "532164."

In Myszkowski transposition, recurrent keyword letters are numbered identically, TOMATO yielding a keystring of "432143."

4 3 2 1 4 3
W E A R E D
I S C O V E
R E D F L E
E A T O N C
E

Plaintext columns with unique numbers are transcribed downward; those with recurring numbers are transcribed left to right:

ROFOA CDTED SEEEA CWEIV RLENE

Disrupted transposition

[edit]

A disrupted transposition cipher[9] further complicates the transposition pattern with irregular filling of the rows of the matrix, i.e. with some spaces intentionally left blank (or blackened out like in the Rasterschlüssel 44), or filled later with either another part of the plaintext or random letters.[9]

Comb approach

[edit]

This method (attributed to Gen. Luigi Sacco[10]) starts a new row once the plaintext reaches a column whose key number is equal to the current row number. This produces irregular row lengths. For example,

F  O  R  E  V  E  R  J  I  G  S  A  W     < Key
4  8  9  2 12  3 10  7  6  5 11  1 13     Blanks after no.:
C  O  M  P  L  I  C  A  T  E  S  T  *     1
H  E  T  R  *  *  *  *  *  *  *  *  *     2
A  N  S  P  O  S  *  *  *  *  *  *  *     3
I  *  *  *  *  *  *  *  *  *  *  *  *     4
T  I  O  N  P  A  T  T  E  R  *  *  *     5
N  L  I  K  E  A  C  O  M  *  *  *  *     6
B  _  _  _  _  _  _  _  *  *  *  *  *     7

The columns are then taken off as per regular columnar transposition: TPRPN, KISAA, CHAIT, NBERT, EMATO, etc.

Numerical sequence approach

[edit]

Another simple option[11] would be to use a password that places blanks according to its number sequence. E.g. "SECRET" would be decoded to a sequence of "5,2,1,4,3,6" and cross out the 5th field of the matrix, then count again and cross out the second field, etc. The following example would be a matrix set up for columnar transposition with the columnar key "CRYPTO" and filled with crossed out fields according to the disruption key "SECRET" (marked with an asterisk), whereafter the message "we are discovered, flee at once" is placed in the leftover spaces. The resulting ciphertext (the columns read according to the transposition key) is "WCEEO ERET RIVFC EODN SELE ADA".

C R Y P T O
1 4 6 3 5 2
W E A R * E
* * D I S *
C O * V E R
E D * F L E
E * A * * T
O N * C E *

Grilles

[edit]

Another form of transposition cipher uses grilles, or physical masks with cut-outs. This can produce a highly irregular transposition over the period specified by the size of the grille, but requires the correspondents to keep a physical key secret. Grilles were first proposed in 1550, and were still in military use for the first few months of World War One.

Detection and cryptanalysis

[edit]

Since transposition does not affect the frequency of individual symbols, simple transposition can be easily detected by the cryptanalyst by doing a frequency count. If the ciphertext exhibits a frequency distribution very similar to plaintext, it is most likely a transposition.

In general, transposition methods are vulnerable to anagramming—sliding pieces of ciphertext around, then looking for sections that look like anagrams of words in English or whatever language the plaintext was written in, and solving the anagrams. Once such anagrams have been found, they reveal information about the transposition pattern, and can consequently be extended. Simpler transpositions often suffer from the property that keys very close to the correct key will reveal long sections of legible plaintext interspersed by gibberish. Consequently, such ciphers may be vulnerable to optimum seeking algorithms such as genetic algorithms[12] and hill-climbing algorithms.[13][14]

There are several specific methods for attacking messages encoded using a transposition cipher. These include:

  1. Known-plaintext attack: Using known or guessed parts of the plaintext (e.g. names, places, dates, numbers, phrases) to assist in reverse-engineering the likely order of columns used to carry out the transposition and/or the likely topic of the plaintext.
  2. Brute-force attack: If keys are derived from dictionary words or phrases from books or other publicly available sources, it may be possible to brute-force the solution by attempting billions of possible words, word combinations, and phrases as keys.
  3. Depth attack: If two or more messages of the same length are encoded with the same keys, the messages can be aligned and anagrammed until the messages show meaningful text in the same places, without needing to know the transposition steps that have taken place.
  4. Statistical attack: Statistics about the frequency of 2-letter, 3-letter, etc. combinations in a language can be used to inform a scoring function in an algorithm that gradually reverses possible transpositions based on which changes would produce the most likely combinations. For example, the 2-letter pair QU is more common than QT in English text, so a cryptanalyst will attempt transpositions that place QU together.

The third method was developed in 1878 by mathematician Edward S. Holden and New-York Tribune journalists John R. G. Hassard and William M. Grosvenor who managed to deciphere telegrams between the Democratic Party and their operatives in the Southern states during the 1876 presidential election and thus prove facts of vote buying, influencing the 1878-1879 congressional elections.[15]

A detailed description of the cryptanalysis of a German transposition cipher can be found in chapter 7 of Herbert Yardley's "The American Black Chamber."

A cipher used by the Zodiac Killer, called "Z-340", organized into triangular sections with substitution of 63 different symbols for the letters and diagonal "knight move" transposition, remained unsolved for over 51 years, until an international team of private citizens cracked it on December 5, 2020, using specialized software.[16]

Combinations

[edit]

Transposition is often combined with other techniques such as evaluation methods. For example, a simple substitution cipher combined with a columnar transposition avoids the weakness of both. Replacing high frequency ciphertext symbols with high frequency plaintext letters does not reveal chunks of plaintext because of the transposition. Anagramming the transposition does not work because of the substitution. The technique is particularly powerful if combined with fractionation (see below). A disadvantage is that such ciphers are considerably more laborious and error prone than simpler ciphers.

Fractionation

[edit]

Transposition is particularly effective when employed with fractionation – that is, a preliminary stage that divides each plaintext symbol into two or more ciphertext symbols. For example, the plaintext alphabet could be written out in a grid, and every letter in the message replaced by its co-ordinates (see Polybius square and Straddling checkerboard).[17] Another method of fractionation is to simply convert the message to Morse code, with a symbol for spaces as well as dots and dashes.[18]

When such a fractionated message is transposed, the components of individual letters become widely separated in the message, thus achieving Claude E. Shannon's diffusion. Examples of ciphers that combine fractionation and transposition include the bifid cipher, the trifid cipher, the ADFGVX cipher and the VIC cipher.

Another choice would be to replace each letter with its binary representation, transpose that, and then convert the new binary string into the corresponding ASCII characters. Looping the scrambling process on the binary string multiple times before changing it into ASCII characters would likely make it harder to break. Many modern block ciphers use more complex forms of transposition related to this simple idea.

See also

[edit]

Notes

[edit]
  1. ^ Elonka, Dunin; Schmeh, Klaus (2020). Codebreaking: A Practical Guide. Robinson. p. 247. ISBN 978-1-4721-4421-8. OCLC 1158165142.
  2. ^ Smith, Laurence Dwight (1955) [1943], Cryptography / The Science of Secret Writing, New York: Dover, pp. 16, 92–93
  3. ^ Falconer, John (1685). Cryptomenysis Patefacta; or, The Art of Secret Information Disclosed Without a Key. London: Daniel Brown. p. 62.
  4. ^ Kahn, pp. 301-304.
  5. ^ Kahn, pp. 535 and 539.
  6. ^ Kahn, p. 539.
  7. ^ Barker, Wayne (1995). Cryptanalysis of the Double Transposition Cipher: Includes Problems and Computer Programs. Aegean Park Press.
  8. ^ Lasry, George (2025-08-14). "Solving the Double Transposition Challenge with a Divide-and-Conquer Approach". Cryptologia. 38 (3): 197–214. doi:10.1080/01611194.2014.915269. S2CID 7946904.
  9. ^ a b Mahalakshmi, B. (June 2016). "An Overview on Disrupted Transposition Cipher for Security Enhancement" (PDF). International Journal of Computer Applications. 143 (13): 9–12. doi:10.5120/ijca2016910308. Archived (PDF) from the original on 2025-08-14. Retrieved 7 January 2021.
  10. ^ Savard, John. "Methods of Transposition". A Cryptographic Compendium. Retrieved 27 June 2023.
  11. ^ jdege (11 November 2014). "A simple disrupted transposition". Retrieved 7 January 2021.
  12. ^ Matthews, Robert A. J. (April 1993). "The Use of Genetic Algorithms in Cryptanalysis". Cryptologia. 17 (2): 187–201. doi:10.1080/0161-119391867863.
  13. ^ Lasry, George; Kopal, Nils; Wacker, Arno (2025-08-14). "Solving the Double Transposition Challenge with a Divide-and-Conquer Approach". Cryptologia. 38 (3): 197–214. doi:10.1080/01611194.2014.915269. ISSN 0161-1194. S2CID 7946904.
  14. ^ Lasry, George; Kopal, Nils; Wacker, Arno (2025-08-14). "Cryptanalysis of columnar transposition cipher with long keys". Cryptologia. 40 (4): 374–398. doi:10.1080/01611194.2015.1087074. ISSN 0161-1194. S2CID 21179886.
  15. ^ "[3.0] The Rise Of Field Ciphers". vc.airvectors.net. Retrieved 2025-08-14.
  16. ^ "Zodiac Killer cipher is cracked after eluding sleuths for 51 years". arstechnica.com. 2025-08-14. Retrieved 2025-08-14.
  17. ^ Daniel Rodriguez-Clark. "Transposing Fractionated Ciphertext".
  18. ^ James Lyons. "Fractionated Morse Cipher".

References

[edit]
  • Kahn, David. The Codebreakers: The Story of Secret Writing. Rev Sub. Scribner, 1996.
  • Yardley, Herbert. The American Black Chamber. Bobbs-Merrill, 1931.
什么是植物蛋白 牙齿酸痛吃什么药 地位是什么意思 鱼子酱是什么鱼的鱼子 梦见和老公结婚是什么意思
智多星是什么意思 nacl是什么 嫁给香港人意味着什么 ppm是什么单位 婴儿八个月可以吃什么辅食
apgar评分是什么意思 胆汁反流是什么意思 慢阻肺吃什么药最有效最好 rosa是什么意思 生气胸口疼是什么原因
射手座有什么特点 salomon是什么牌子 高丽参和红参有什么区别 脚真菌感染用什么药最好 申请低保需要什么条件
吃月饼是什么节日hcv9jop7ns9r.cn 风湿吃什么药hcv8jop4ns4r.cn 多多保重是什么生肖hcv8jop6ns8r.cn 相见不如怀念是什么意思hcv9jop3ns9r.cn 脚趾头发麻什么原因zhongyiyatai.com
三朵花代表什么意思hcv7jop4ns5r.cn 脚有酸臭味是什么原因hcv9jop2ns1r.cn 惊弓之鸟告诉我们什么道理dayuxmw.com 蚊子为什么要吸血hcv9jop6ns9r.cn 儿童心肌酶高有什么症状inbungee.com
脚抽筋什么原因hcv8jop9ns3r.cn 晚上8点是什么时辰hcv9jop0ns0r.cn 宫颈ecc是什么意思hcv9jop8ns1r.cn 监视居住是什么意思hcv9jop4ns2r.cn 美甲什么颜色显手白hcv8jop7ns8r.cn
胃不好适合吃什么食物hcv8jop4ns7r.cn 神仙是什么生肖hcv8jop2ns7r.cn 其他垃圾有什么hcv9jop4ns9r.cn 国窖1573是什么香型hcv7jop6ns4r.cn 命宫是什么意思hcv9jop2ns8r.cn
百度