
- •Table of Contents
- •BackCover
- •Cryptography-A Very Short Introduction
- •Chapter 1: Introduction
- •Using this book
- •Chapter 2: Understanding Cryptography
- •The basic concepts
- •Chapter 3: Historical Algorithms: Simple Examples
- •Caesar Cipher
- •Simple Substitution Ciphers
- •The statistics of the English language
- •The Playfair Cipher
- •Homophonic Coding
- •Polyalphabetic Ciphers
- •Vigenère Ciphers
- •Transposition Ciphers
- •Super-encryption
- •Some conclusions
- •Appendix
- •Chapter 4: Unbreakable Ciphers?
- •Perfect secrecy
- •The one-time pad
- •Chapter 5: Modern Algorithms
- •Bit-strings
- •Stream ciphers
- •Block ciphers (ECB mode)
- •Hash functions
- •Public key systems
- •Chapter 6: Practical Security
- •Realistic security
- •Practical exhaustive key searches
- •Attacks on public key systems
- •Chapter 7: Uses of Cryptography
- •Using symmetric algorithms for confidentiality
- •Authentication
- •Using symmetric algorithms for authentication and data integrity
- •Digital signatures
- •Certification authorities
- •Public Key Infrastructure
- •The need for trust
- •Chapter 8: Key Management
- •The key life cycle
- •Key hierarchies
- •Managing keys in networks
- •Using a trusted management centre
- •Key recovery and key back-up
- •Chapter 9: Cryptography in Everyday Life
- •A cash withdrawal from an ATM
- •Pretty Good Privacy (PGP)
- •Secure web browsing
- •Using a GSM mobile phone
- •References and further reading

Transposition Ciphers
Team-Fly
Transposition Ciphers
So far all the examples given have taken the message and substituted letters, or blocks of letters, with other letters or blocks. Thus they all come under the general heading of Substitution Ciphers. There are, however, other families of ciphers which are based on the idea of transposing the order in which the letters are written. These are known as Transposition Ciphers. We give a very simple example.
In our example the key is a small number. We use 5 as the key. In order to encrypt a message using this key, we write the key in rows of 5 letters and encrypt by writing the letters of the first column first, then the second column etc. If the length of the message is not a multiple of 5 then we add the appropriate number of Zs at the end before we encrypt. The process is most easily understood by working through a small example.
We encrypt the message WHAT WAS THE WEATHER LIKE ON FRIDAY. Since the key is 5 the first step involves writing the message in rows of 5 letters. This is:
WHATW
ASTHE
WEATH
ERLIK
EONFR
IDAY
Since the length of the message is not a multiple of 5, we must add one Z to get:
WHATW
ASTHE
WEATH
ERLIK
EONFRIDAYZ
We now read down each column in turn to get the following cryptogram:
WAWEEIHSERODATALNATHUFYWEHKRZ
To obtain the decryption key we merely divide the length of the message by the key. In this case we divide 30 by 5 to get 6. The deciphering algorithm is then identical to encryption. So, for this example, we write the cryptogram in rows of 6 to get:
WAWEEI
HSEROD
ATALNA
THTIFY
WEHKRZ
It is now easy to verify that reading down each column in turn gives the original message.
file:///D|/1/4303/Fly0014.html (1 von 2) [08.10.2007 12:51:09]

Transposition Ciphers
Transposition Ciphers of the type given here are easy to break. Since the key must be a divisor of the cryptogram length, an attacker has only to count the length of the cryptogram and try each divisor in turn.
Team-Fly
file:///D|/1/4303/Fly0014.html (2 von 2) [08.10.2007 12:51:09]

Super-encryption
Team-Fly
Super-encryption
So far in this chapter we have provided a number of simple ciphers, most of which are easy to break. We now introduce a concept that can be used to combine two or more weak ciphers to obtain one that is considerably stronger than either. It is known as super-encryption. The basic idea is very simple. If, say, we want to super-encrypt using a Simple Substitution Cipher and a Transposition Cipher, then we first encrypt the message using the Simple Substitution Cipher, and then encrypt the resultant cryptogram using the Transposition Cipher. Once again a simple example should clarify the situation.
We encrypt the message ROYAL HOLLOWAYby super-encrypting a Caesar Cipher with key 2 with a Transposition Cipher with key 4. For the Caesar Cipher with key 2 we have:
Message: ROYAL HOLLOWAY
Cryptogram: TQACN JQNNQYCA
For the Transposition Cipher with key 4 we have:
Message: TQACN JQNNQYCA
Cryptogram: TNNAQ JQZAQYZCNCZ
Super-enciphering is a very important technique and many modern strong encryption algorithms can be regarded as resulting from superencryption using a number of comparatively weak algorithms.
Team-Fly
file:///D|/1/4303/Fly0015.html [08.10.2007 12:51:09]

Some conclusions
Team-Fly
Some conclusions
From the numerous examples discussed in the last sections it is clear that there are many factors that influence an attacker's chances of breaking a cipher system. We have also seen that, although the main prize for an attacker is knowledge of the decryption key, if the underlying language is highly structured then he may be able to determine a particular message without needing to discover the entire key. In fact our early examples indicate quite clearly that the structure of the underlying language is an extremely important factor when trying to assess an attacker's likelihood of success. For instance, it is clearly much easier to disguise random data than to successfully encrypt English text. It is also clearly true that, for English text, it is much easier to secure short messages than long ones. Indeed for a single short message, say three or four letters, there are many weak encryption algorithms that are probably sufficient.
Team-Fly
file:///D|/1/4303/Fly0016.html [08.10.2007 12:51:09]