Transposition is a method of changing the position (while
example is a jumble. The word "attack" is transposed to "takact". However, this
is not a strict transposition method since there isn't a system (key) to the
re-arrangement, thus, the intended receiver possesses no greater chance of
recovering the original word than the cryptanalytic attacker. In other words,
from a security viewpoint, the cipher is not secure since the cryptanalytic
attacker possesses *no lesser* chance of recovering the original word than the
intended receiver.
and dropping every other letter, as so;
T
|
|
I
|
|
A
|
|
E
|
|
R
|
|
E
|
|
M
|
|
S
|
|
A
|
|
E
|
|
|
H
|
|
S
|
|
S
|
|
C
|
|
E
|
|
T
|
|
E
|
|
S
|
|
G
|
|
|
and then writing the top and then the bottom row to produce the ciphertext
message:
T I I A E R T E S G H S S S C E M S A E
- divide the message into a matrix of two rows and n-columns. If the cipher
system is known (in this case, the secrecy of the message was dependent on the
secrecy of the method, not the secrecy of a key) the clear text is easily re-
coverable (in fact, it is weaker than the Caesar Cipher since there are only two
possible translations, and only one is ciphered!).
The matrix, or columnar, cipher is more complex and therefore
text units [spaces and / or punctuation may or may not be included] and then
figuring out factor-sets [number pairs that when multiplied equal the number of
clear-text units]. If this number is prime, the clear-text may be padded ac-
cordingly. Next, a factor set is chosen and the factors are used to create a
grid or matrix of rows and columns. The message is input row by row (or column
by column) and output column by column (or row by row, if input column by
column).
Clear-Text: T H I S I S A S E C R E T M E S S A G E
Characters: 20
Factor Sets: {2, 10}, {4, 5}, {5, 4}, {10, 2}
Chosen Set: {4, 5}
Matrix:
T
|
H
|
I
|
S
|
I
|
S
|
A
|
S
|
E
|
C
|
R
|
E
|
T
|
M
|
E
|
S
|
S
|
A
|
G
|
E
|
Cipher Text: T S R S H A E S I S T A S E M G I C E E
matrix tends to diffuse the letters more [letters that are adjacent in the
plain text message and also in the cipher text message can make the transposed
message easier to decipher]. For example, if the {2, 10} matrix were chosen:
T
|
H
|
I
|
S
|
I
|
S
|
A
|
S
|
E
|
C
|
R
|
E
|
T
|
M
|
E
|
S
|
S
|
A
|
G
|
E
|
Cipher Text: T R H E I T S M I E S S A S S A E G C E
message column-by-column then output row-by-row, we would have the exact en-
cipherment as the Rail Cipher example!
Next in level of complexity, within the class of "simple trans-
matrix used) is the route transposition cipher.
Again: THIS IS A SECRET MESSAGE
T
|
H
|
I
|
S
|
I
|
S
|
A
|
S
|
E
|
C
|
R
|
E
|
T
|
M
|
E
|
S
|
S
|
A
|
G
|
E
|
down the fifth. yielding:
Cipher-Text: TSRS SEAH ISTA GMES ICEE
point and path you follow. You could have started in the lower-right corner
and went up, or did any combination of routes that produced the ciphertext.
simple route, you have to figure out the particular route as well (including
the starting point!).
Lastly, in complexity of the simple transpositions, is the
T
|
H
|
I
|
S
|
I
|
S
|
A
|
S
|
E
|
C
|
R
|
E
|
T
|
M
|
E
|
S
|
S
|
A
|
G
|
E
|
down to the 'e', across (right) to 'm', up to 'e', then left to 's'.
Cipher-Text: TSRS SAGE ECIS IHAE TMES
inner letter and spiral outwards). Again, that elevates the cipher to a complex
route transposition. A generalized cryptanalzer against all the above forms of
simple transposition ciphers would have to yield many, many permutations.
and design is everything.