0% found this document useful (0 votes)
256 views3 pages

Transposition Ciphers Explained

This document discusses different types of transposition ciphers including the rail fence cipher and columnar transposition cipher. The rail fence cipher works by writing the plaintext in a zig-zag pattern on multiple lines and then reading the ciphertext off by those lines. Columnar transposition cipher writes the plaintext into a table with a number of columns determined by the key, and then reads out the ciphertext column by column in a specific order determined by the keyword. Examples are given to demonstrate how to encrypt and decrypt using these ciphers.

Uploaded by

Sukant Patra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
256 views3 pages

Transposition Ciphers Explained

This document discusses different types of transposition ciphers including the rail fence cipher and columnar transposition cipher. The rail fence cipher works by writing the plaintext in a zig-zag pattern on multiple lines and then reading the ciphertext off by those lines. Columnar transposition cipher writes the plaintext into a table with a number of columns determined by the key, and then reads out the ciphertext column by column in a specific order determined by the keyword. Examples are given to demonstrate how to encrypt and decrypt using these ciphers.

Uploaded by

Sukant Patra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Math 135 (Summer

2006) Transposition
Ciphers

A transposition cipher is one in which plaintext symbols are rearranged (i.e., t ransposed or
permuted) to produce ciphertext. The method of transposition may be either mathemat ical or
typographical in nature.

Rail Fence
Cipher
Example: We encipher NOTHING IS AS IT SEEMS by first writing it on two lines in a zig-zag
pattern (or rail fence). The ciphertext is produced by transcribing t he first row followed by the
second row.

N T I G S S T E M
O H N I A I S E
S

Ciphertext: NTIGS STEMO HNIAI


SES.

To decrypt, we write half the letters on one line, half on the second. (Note t hat if there are an
M include
odd number of letters, we H
K the middle S on the top Eline.)
letter
A E L W
Y A T
Example:
Plaintext: MAKEDecipher
HASTE MKHSE LWYAE S O
ATSOL.
SLOWLY. L

Solution:
ColumnarSince there are 15 letters, we write 8 on the top line and 7 on the bottom line so
that
Transposition
The number of columns is the key
information.

To encipher : Plaintext is written horizontally in k columns, and is then transcribed vertically


column- by-column,

To decipher : Suppose t hat t he length of the ciphertext is n and the key is k. T hen the let t ers
will fill n DIV k full rows, and there will be one partial row at the end with n MOD k letters.
Transcribing row-by-row will then yield the plaintext.

Example: Encrypt NOTHING IN THE WORLD IS MORE DANGEROUS THAN SINCERE IGNORANCE
AND
CONSCIENTIOUS STUPIDITY with a key of k = 9
columns.

Solution: We write the plaintext horizont ally in 9 columns as


follows:
N O T H I N G I N
T H E W O R L D I
S M O R E D A N G
E R O U S T H A N
S I N C E R E I G
N O R A N C E A N
D C O N S C I E N
T I O U S S T U P
I D I T Y

The cipher text is therefore: NTSES NDTIO HMRIO CIDTE OONRO OIHWR UCANU TIOES ENSSY
NRDTR CCSGL AHEEI TIDNA IAEUN IGNGN NP.

Example: Suppose the ciphertext is: GPSDO AILTI VRVAA WETEC NITHM EDLHE TALEA ONME. If
it is known that the key is k = 7, find the plaintext.

Solution: There are 39 let ters in t he ciphertext which means that there are 39 DIV 7 = 5 full rows
and one partial row with 39 MOD 7 = 4 letters.


Plaintext: * (*Archimedes)

Keyword Columnar Transposition


The order of t ranscription of the columns is determined by the alphabetical order of letters in
the keyword. If there are repeated letters in the keyword, the columns corresponding to t hose
letters are transcribed in order left-t o-right.

Example: Encrypt THE QUICK BROWN FOX JUMPED OVER THE LAZY DOG if the keyword is
CORNELL.

C O R N E L L

1 6 7 5 2 3 4
T H E Q U I C
K B R O W N F
O X J U M P E
D O V E R T H
E L A Z Y D O
G
Ciphertext: TKODE GUWMR YINPT DCFEH OQOUE ZHBXO
LERJV A
Thank you for using www.freepdfconvert.com service!

Only two pages are converted. Please Sign Up to convert all pages.

https://www.freepdfconvert.com/membership

You might also like