Classical cipher

From Wikipedia, the free encyclopedia

In cryptography, a classical cipher is a type of cipher used historically but which now have fallen, for the most part, into disuse. In general, classical ciphers operate on an alphabet of letters (such as "A-Z"), and are implemented by hand or with simple mechanical devices. By contrast, modern schemes use computers or other digital technology, and operate on bits and bytes. Classical schemes are often susceptible to ciphertext-only attacks, sometimes even without knowledge of the system itself, using tools such as frequency analysis. Sometimes classed with classical ciphers are more advanced mechanical or electro-mechanical cipher machines, such as the Enigma machine.

Classical ciphers are often divided into transposition ciphers and substitution ciphers. In a substitution cipher, letters (or groups of letters) are systematically replaced throughout the message for other letters (or groups of letters). For instance a simple (and therefore easy to crack) encryption would be to substitute each letter for the next letter in the alphabet (a to b, b to c, and so on with z being substituted by a). Using this encryption the sentence "Hello my name is Bob." would be encrypted as "Ifmmp nz obnf jt Cpc."

It is possible to list all substitution ciphers where the order of the alphabet is preserved on a grid such that each column holds every possible substitution for the letter on the first row of that column. This is shown here:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y

In a transposition cipher, the letters themselves are kept unchanged, but their order within the message is scrambled according to some well-defined scheme. A simple (and once again easy to crack) encryption would be to write every word backwards. For example "Hello my name is Bob." would now be "olleH ym eman si boB."

More complex algorithms can be formed by mixing substitution and transposition in a product cipher; modern block ciphers such as DES iterate through several stages of substitution and transposition.

[edit] See also

[edit] External links