The Playfair Cipher

advertisement
The Playfair Cipher
The Playfair cipher was promoted by Lyon Playfair in the 1800's, but invented by his
friend Charles Wheatstone - a pioneer in the telegraph. It was eventually used by the
British War Office, using it first in the Boer War. But it can be attacked successfully.
Indeed, Kerkhoff first wrote about a systematic method to break the Playfair Cipher.
The key is a 5 by 5 square of 25 letters. (We eliminate J, using I if it occurs in the
plaintext.) For example,
G
E
Q
U
W
A
L
N
S
V
B
C
H
O
T
R
X
D
K
P
I
Z
Y
F
M
Next the plaintext is broken up into digraphs. The two letters of each digram must be
different so an x is usually inserted between double lettered digraphs. For instance, the
message:
MEET ME AT CHAPEL WALK NOON
is broken into digraphs:
ME ET ME AT CH AP EL WA LK NO ON
An additional dummy letter may need to be added to the end.
Each digraph is then encrypted. Each digraph is one of three types: both letters in same
row, both in same column, or neither. If both letters are in the same row, they are replaced
by the letters to the immediate right of each, wrapping around the row if necessary. For
example, EL is replaced by LC, and NY is replaced by HQ. If both letters are in the same
column, they are replaced with the letters immediately beneath each, For example, MF is
replaced by IM.
If neither, then take the first letter and look along its row until you come to the column of
the second letter. Replace the first letter with what is there. Now do the same for the
second letter. For example, AT is replaced by BV.
Decryption is just the inverse of these operations.
Thus the ciphertext for our message would be:
WZ CW WZ BV HO RV LC VG XS HS SH
(Of course these letters would usually be written in groups of five.)
Homework: Using the above square, decrypt the message: HOLSE QUXNF KIQUW QHVZN
The ADFGVX Cipher
The ADFGVX Cipher was the most famous cipher used in WW I. Introduced by the
Germans in March 1918 before their big push to Paris in June, the Allies were in total
ignorance of their plans until Frenchman Georges Painvin broke it after many weeks of
continual effort. The Allies then found the point of the offensive, reinforced their lines
and repelled the attack, effectively ending any further serious German threat and
hastening the end of the war.
The ADFGVX Cipher double-encrypts messages - first with a form of substitution cipher,
then with a transposition.
The first key is a 6 by 6 grid of the 26 letters and 10 digits. Each row and column is
identified by one of the letters ADFGVX. For example:
A
D
F
G
V
X
A
8
l
7
j
x
9
D
p
t
k
u
s
e
F
3
4
b
6
v
y
G
d
o
c
w
i
0
V
1
a
5
g
r
f
X
n
h
z
m
2
q
Each letter of the plaintext is replaced by the pair of letters indicating the row and
column. For example, c would be replaced by FG.
For example the plaintext: attack at dawn
would be encrypted first as: DV DD DD DV FG FD DV DD AG DV GG AX
If that were it, this would be easy to break. (How?) But this cipher has a second stage,
which is columnar transposition. Suppose the second key is RHINO. We arrange the
letters from the first phase in columns under the 5 letters, rearrange the columns so the
letters in the key are in alphabetical order and print out the ciphertext in columns:
R
D
D
F
D
G
H
V
D
D
A
G
I
D
V
D
G
A
N
D
F
V
D
X
O
D
G
D
V
H
V
D
D
A
G
I
D
V
D
G
A
N
D
F
V
D
X
O
D
G
D
V
R
D
D
F
D
G
So, the ciphertext would be: VDDAG DVDGA DFVDX DGDVD DFDG
Decryption is simply the reverse operations.
Homework: Using the above square and the key ROCKY, decrypt GDXGD DVAVG DDGDX VGDDV
XVXXG VVDVD XDFDD DDDAV FVXX
Download