Вы находитесь на странице: 1из 7

Classical Transposition Cipher

By using classical cipher, we are going to conceal a massage of :

action speaks louder than words (27 letters)

We are going to use matrix transposition method.

Example, we are going to use 6 x 5 matrix.

a c t i o n
s p e a k s
l o u d e r
t h a n w o
r d s

So, the massage should be :

asltrcpohdteuasiadnokewnsro

How to crack matrix transposition method?

1. Count how many letters are in the ciphertext. For this example in this case, the
ciphertext is 27 letters long.

2. Make all of the matrices that would fit such a length. For example (1x27),
(2x15), (3x10), (4x7), (5x6), (6x5), and (7x4).

3. For each size matrix, write out the ciphertext across the rows on one copy. On
the other copy, write out the ciphertext down the columns.

4. At each stage, see if you can find anything legible, reading perpendicular to
how you put the ciphertext in.
Classical Substitution Ciphers

By using classical cipher, we are going to conceal a massage of :

action speaks louder than words (27 letters)

We are going to use simple substitution that can be demonstrated by writing out the
alphabet in some order to represent the substitution.

Fo example,the keyword that we are goin to use in this method is "love".

Plaintext alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ


Ciphertext alphabet: LOVEABCDFGHIJKMNPQRSTUWXYZ

So, the massage should be :

lvsfmkrnalhrimteaqsdlkwmqer

How to crack this substitution method?

1. People who want to crack this code should know the keyword that had been
using in this code.

2. List down the alphabet starting with the keyword and following with the
balance alphabet that never been use in the keyword and we call it ciphertext
alphabet.

3. At the bottom, write down alphabet starting A to Z and we call it plaintext


alphabet.

4. Lastly, crack the massage using the combination of plaintext alphabet and
ciphertext alphabet.
ESSAY

The history of cryptography begins thousands of years ago. Until recent decades,


it has been the story of what might be called classic cryptography — that is, of
methods of encryption that use pen and paper, or perhaps simple mechanical aids. In
the early 20th century, the invention of complex mechanical and electromechanical
machines, such as the Enigma rotor machine, provided more sophisticated and
efficient means of encryption; and the subsequent introduction of electronics and
computing has allowed elaborate schemes of still greater complexity, most of which
are entirely unsuited to pen and paper.

In cryptography, a cipher (or cypher) is an algorithm for


performing encryption or decryption — a series of well-defined steps that can be
followed as a procedure. An alternative, less common term is encipherment. In non-
technical usage, a “cipher” is the same thing as a “code”; however, the concepts are
distinct in cryptography. In classical cryptography, ciphers were distinguished from
codes. Codes operated by substituting according to a large codebook which linked a
random string of characters or numbers to a word or phrase. For example, “UQJHSE”
could be the code for “Proceed to the following coordinates”. When using a cipher the
original information is known asplaintext, and the encrypted form as ciphertext. The
ciphertext message contains all the information of the plaintext message, but is not in
a format readable by a human or computer without the proper mechanism to decrypt
it; it should resemble random gibberish to those not intended to read it.

The operation of a cipher usually depends on a piece of auxiliary information,


called a key or, in traditional NSA parlance, a cryptovariable. The encrypting
procedure is varied depending on the key, which changes the detailed operation of
the algorithm. A key must be selected before using a cipher to encrypt a message.
Without knowledge of the key, it should be difficult, if not nearly impossible, to
decrypt the resulting ciphertext into readable plaintext.

Most modern ciphers can be categorized in several ways

 By whether they work on blocks of symbols usually of a fixed size (block


ciphers), or on a continuous stream of symbols (stream ciphers).
 By whether the same key is used for both encryption and decryption
(symmetric key algorithms), or if a different key is used for each (asymmetric key
algorithms). If the algorithm is symmetric, the key must be known to the recipient
and sender and to no one else. If the algorithm is an asymmetric one, the
enciphering key is different from, but closely related to, the deciphering key. If one
key cannot be deduced from the other, the asymmetric key algorithm has the
public/private key property and one of the keys may be made public without loss
of confidentiality.

There are a lot of usages of the transposition and substitution cipher. For
example, in World War II (WWII), the mechanical and electromechanical cipher
machines were in wide use, although—where such machines were impractical—
manual systems continued in use. Great advances were made in both cipher design
and cryptanalysis, all in secrecy. Information about this period has begun to be
declassified as the official British 50-year secrecy period has come to an end, as US
archives have slowly opened, and as assorted memoirs and articles have appeared.
The Germans made heavy use, in several variants, of an electromechanical rotor
machine known as Enigma. Mathematician Marian Rejewski, at Poland's Cipher
Bureau, in December 1932 deduced the detailed structure of the German Army
Enigma, using mathematics and limited documentation supplied by Captain Gustave
Bertrand of French military intelligence. This was the greatest breakthrough in
cryptanalysis in a thousand years and more, according to historian David Kahn.
Rejewski and his mathematical Cipher Bureau colleagues, Jerzy Różycki and Henryk
Zygalski, continued reading Enigma and keeping pace with the evolution of the
German Army machine's components and encipherment procedures. As the Poles'
resources became strained by the changes being introduced by the Germans, and as
war loomed, the Cipher Bureau, on the Polish General Staff's instructions, on 25 July
1939, at Warsaw, initiated French and British intelligence representatives into the
secrets of Enigma decryption.

Beside that, in modern world, these kind of chipers also widely use. Even we do
not noticed when we use it. Almost everyday we use them. Modern ciphers like AES
and the higher quality asymmetric ciphers are widely considered unbreakable, poor
designs and implementations are still sometimes adopted and there have been
important cryptanalytic breaks of deployed crypto systems in recent years. Notable
examples of broken crypto designs include DES, the first Wi-Fi encryption
scheme WEP, the Content Scrambling System used for encrypting and controlling
DVD use, the A5/1 and A5/2 ciphers used in GSM cell phones, and
the CRYPTO1 cipher used in the widely deployed MIFARE Classic smart
cards fromNXP Semiconductors, a spun off division of Philips Electronics. All of
these are symmetric ciphers. Thus far, not one of the mathematical ideas underlying
public key cryptography has been proven to be 'unbreakable', and so some future
mathematical analysis advance might render systems relying on them insecure.
While few informed observers foresee such a breakthrough, the key size
recommended for security as best practice keeps increasing as increased computing
power required for breaking codes becomes cheaper and more available.

From all of the explaination, we know that chipers are related to our daily life. We
merely use them in almost of all kind of activity that we do. Because of that, it is
important to us to know what to do, and when to use the chipers because they are
very close to us.
REFLECTION

We had been given an assignment by En. Mazlan for the subject Application in
Mathematics. Based on the assignment, we had to create two codes by using the
method that we had learned in class. In order to complete the assignment, we had
chosen two methods to create the codes. The method that we choose were
transposition and substitution cipher.

Before doing the task, I was thinking that it is hard to do it. I had done many
discussions with my friends and my pair in order to gather information about the task.
First of all, I had to choose the method that I wanted to use. After making some
discussion with my pair, we had agreed that we wanted to use transposition and
substitution cipher method. We choose these methods because we think that they
were the easiest way to create and compile a code. Besides that, they also easy to
understand and elaborate.

When doing the task, I had started to understand a little bit more about the
usage of the codes and ciphers. The code and ciphers are used to communicate.
But, the communication that using the codes usually need to be secret. That’s why
the codes and ciphers were created. This can be seen when the usage of the code
and ciphers used in world war 2. The army need to communicate in secret ways and
because of that, they were using these codes as their way of communications. This
way of communication was very effective in order to secure the secret of ones
massage.

Besides the effectiveness of using these codes, there is some problems when
using these codes. For example, these codes based on their key to be breakdown. If
the key is not stated, the code cannot be break and the massage cannot be read.
This is one of the disadvantages of using codes. Besides that, in the war situation,
army always used these codes to send massage. When any army received the
codes, they need time to breakdown the code. To breakdown the code, they need
time to break and translate the code. This is when the army lost their focus on the
battle field and the cost is their live. So, I think that, in order to save time and live, a
code breaker should be invented. By using this code breaker, the code will be
breakdown in no time. This will save time and can make sure the army do not lost
their focus in the battle field.

Finally, code is provided for demonstration purpose only. We can only use
these codes as teaching aids or to be taught to pupils in classes.

Prepared by,

WAN AHMAD SHAHRUL AZWAN BIN CHE MOHD

PISMP SEM 8 2010

Вам также может понравиться