Crypto Corner
  • Home
    • Crypto Corner Challenges
    • Glossary
    • Help with Activities
    • Educational Uses
    • Downloadable Resources
  • Introduction to Cryptography
    • Steganography
    • Codes and Ciphers
    • Conventions in Cryptography
  • Monoalphabetic Substitution Ciphers
    • Atbash Cipher
    • Pigpen Cipher
    • Caesar Shift Cipher
    • Affine Cipher
    • Mixed Alphabet Cipher
    • Other Examples
    • Frequency Analysis: Breaking the Code
    • Homophonic Substitution
  • Simple Transposition Ciphers
    • Rail Fence Cipher
    • Route Cipher
    • Columnar Transposition Cipher
    • Myszkowski Transposition Cipher
    • Permutation Cipher
    • Anagramming: Jumbling words
    • Combining Monoalphabetic and Simple Transposition Ciphers
  • Polyalphabetic Substitution Ciphers
    • Vigenère Cipher
    • Kasiski Analysis: Breaking the Code
    • Autokey Cipher
    • Other Examples
  • Fractionating Ciphers
    • Polybius Square
    • Straddling Checkerboard
    • Transposing Fractionated Text
    • Other ways to Alter Fractionated Text
  • Digraph Substitution Ciphers
    • Playfair Cipher
    • Two-Square Cipher
    • Four-Square Cipher
    • Hill Cipher

Glossary

This glossary gives a brief description of some of the most important words used in the site. It is a place you can refer to if you have forgotten what a word means from a previous section, without having to look through all the previous bits.
Alphabet
The alphabet is the set of characters which will be affected by the encryption process. This is usually the set of 26 letters, but could also be enlarged to contain punctuation and numbers to make a cipher more secure.
Break
To break a code is to work out what the original message of an intercepted text is. This is done using a variety of ways and a large amount of human input is required.
Brute Force Attack
A brute force attack is a method of breaking a code by using all possible keys for a given cipher. Although this was very time consuming in the past, with computers these can be completed in a matter of seconds on simple substitution ciphers.
Cipher
A cipher is an algorithm which somehow changes the letters within a message.
Cipher Disc
A cipher disc is a tool used to aid in encrypting and decrypting messages that use a Caesar Shift. This includes many polyalphabetic ciphers. It consists of two concentric discs, each split into 26 equal parts, and labelled with the letters of the alphabet. The inner disc can be twisted in relation to the outer disc, so that different letters pair up.
Ciphertext
The ciphertext is the encrypted message that is sent to the recipient. It is always written in uppercase, and surounded by quotation marks.
Ciphertext Alphabet
A ciphertext alphabet is a way to quickly manually encrypt a message using a monoalphabetic substitution. It can be represented as a table where the top row shows the plaintext letter, and the bottom row shows the ciphertext letter which is used to replace it.
Code
A code is a system where whole words and phrases are replaced by other words and phrases to hide their meaning.
Codebook
A codebook is an extensive book that contains all the words and phrases to be used in a code system. It is a bit like a foreign language dictionary, as it displays the codeword for each normal word to encrypt the message, and the normal word for each codeword for when decrypting.
Crib
A crib is a portion of ciphertext which is known or assumed to be an encryption of a specific phrase of plaintext. It is a very useful technique to use in cryptanalysis, and was fundamental to the breaking of many ciphers in periods of war. Examples might by the inclusion of the date at the beginning of a message, starting with "Dear ..." in a letter, or finishing a message with a standard ending such as "Heil Hitler".
Cryptanalysis
Cryptanalysis is the study of revealing the hidden meaning of an encrypted text, when you do not know what method has been used to encrypt it. We often talk about "breaking the code".
Cryptography
Cryptography is the study of hidding the meaning of a message by changing the content of the message by some rule. This includes ciphers and codes.
Cryptology
Cryptology is the study of hidden writtings, or writtings with hidden meanings. It is the use of any means to send a secret message. This includes cryptography and steganography
Decrypt/Decipher
To decrypt (or decipher) a message is to use revert the ciphertext back into the plaintext using the cipher and key.
Digraph
A digraph is a pair of letters or characters. It is useful to look at common digraphs in frequency analysis, and they appear regularly in ciphers that use a fractionation.
Encrypt/Encipher
To encrypt (or encipher) a message is to take the original message and perform the necessary changes to the text to create the ciphertext according to the cipher and key chosen.
Fractionation
A fractionation method is one that represents single characters by a digraph (or pair of characters). Usually this involves using the digits 0-9, but not always. It also allows us to use a substantially smaller set of characters than were in the original message.
Frequency Analysis
A method used by cryptanalysts to break substitution ciphers. It relies on the fact that in any given language, each letter has its own "personality", and in particular, certain letters appear more frequently than others. By analysing which letters appear frequently in an intercept, you can make educated guesses as to which letter they might represent.
Homophones
Using homophones is a way to disrupt the natural frequency of letters in a piece of text, and thus make frequency analysis more complex. It involves assigning multiple symbols to the higher frequency letters to even out the distribution.
Indicator Block
An indicator block is a block of ciphertext that is used to hide a part of the key within the message itself. This is used in the Running Key Cipher to identify the page and line number to use within the key text as the start of the keystream.
Intercept
An intercept is a piece of encrypted text for which you do not know the cipher or key used in the encryption process.
Interceptor
An interceptor is any person who comes across an encrypted message who was not the intended recipient of the message. An interceptor would need to break the code, as they would not know the key or cipher used.
Iterations
Iterations are how many times a particular cipher is applied. Some ciphers can be applied multiple times to make the encryption more secure (transposition ciphers), whereas for others it has no effect (monoalphabetic substitution ciphers).
Kerckhoffs's Principle
In 1883, Auguste Kerckhoffs wrote an article where he stated six principles for military ciphers. With the advent of computers, many are now redundant, but the second is one of the most important ideas in cryptography. It states that a cryptosystem must remain secure if the algorithm of the cipher is known publicly, and that the strength of a cipher relies on keeping the key secret.
Key
A key is a piece of information which makes the encryption process unique and more secure.
Keyword/Keyphrase
A keyword is a key which takes the form of a word. A keyphrase is similar, but consists of a phrase instead of a word. They are written in lowercase and in italics.
Keystream
A keystream is a string of letters that is as long as the plaintext. Each letter is used to identify which column of a tabula recta should be used in the encryption process of a polyalphabetic cipher.
Modulo
Working modulo is a mathematical idea that is key to many ciphers. The basic principal is that items repeat after you reach the modulo number. In ciphers, this is usually the length of the alphabet (normally 26). So when you are counting, and you get to 24 then 25 and finally 26, you then start counting again (so instead of 27, we go back to 1, or alphabetically, after "z" we go back to "a"). To take a number modulo another number is to take the remainder when you divide the first number by the second. For example, to work out 19 modulo 8, we work out that 2 x 8 = 16, and we need 3 more to get from 16 to 19. So 19 modulo 8 is 3 (the remainder). For a more in depth discussion see Wolfram Alpha.
Monoalphabetic Substitution Cipher
A monoalphabetic substitution cipher is a cipher where each letter in the plaintext is replaced by the same letter or symbol everytime.
Null
A null is a letter or symbol used as a placeholder in a message. It has no meaning, and is easily recognised by the recipient as a letter of no meaning. Usually the letter "X" is used. It is often needed to make a message the right length for a particular cipher algorithm to be performed.
Numeric Escape Character
A numeric escape character is really useful in ciphers which convert letters to numbers. This character, usually # or \, is used to indicate that the next number is actually a number, and not a piece of enciphered text.
Perfect Secrecy
An idea in cryptography that all codes and ciphers aim for, perfect secrecy means that the cipher is truly unbreakable. Claude Shannon devised the idea that a piece of cipher text is perfectly secret if it provides no information about the original plaintext. The only known example of a cipher that has perfect secrecy is the One-Time Pad, but there are considerable practical issues with using this cipher.
Plaintext
The plaintext is the original message before encryption. It is what will be retrieved from the ciphertext after a successful decryption. It is written in lowercase, and surounded by quotation marks.
Polyalphabetic Substitution Cipher
A polyalphabetic substitution cipher is one where the ciphertext alphabet changes according to some rule. That means that the same plaintext letter will not always encrypt to the same ciphertext letter, and also that the same ciphertext letter could represent different plaintext letters. This is a way to overcome frequency analysis.
Polygraphic Substitution Cipher
A polygraphic substitution cipher replaces groups of letters or characters at a time. for example, in a Digraph Substitution Cipher, the plaintext "at" could be enciphered to "GD". This encryption is the same everytime, but it is different to Monoalphabetic Substituiton Ciphers in that it doesn't act on individual letters, but rather groups of letters of the same length.
Recipient
The recipient of a message is the intended recipient when the message was sent. This person will know both the cipher and key used, and will be able to decrypt the ciphertext using these.
Secure/Security
The security of cipher is a measure of how hard it is to break the code. We do not have a strict scale of security, but we talk in terms of ciphers previously encountered.
Sender
The sender of a message is the person who writes the original message and encrypts this for security before sending the information to the recipient.
Shannon's Maxim
This is a reformulation of Kerckhoffs's Principle which states "the enemy knows the system". That is, assume that an enemy will immediately gain a full working familiarity with any cryptographic system you employ.
Steganography
Steganography is the study of physical means to hide a message, such as invisible inks and microdots. There is no actual change made to the message, it is simply hid in a (usually) inventive way.
Substitution Cipher
A cipher where each letter (or groups of letters) of the plaintext is replaced by another letter or symbol in some predetermined way.
Tabula Recta
A tabula recta is a table which shows all the possible shifts of a given alphabet in one place. You choose the letter from the keystream across the top, and the plaintext letter down the left hand side, and the ciphertext letter is the column and row that represents these two pieces of information.
Transparency
A transparency is when a character (or group of characters) encipher to themselves. When a cipher does not allow for transparencies, its strength is compromised as this allows cryptanalysts to ascertain information about what it is not. However, a system that produces a lot of transparencies is also less secure. Ideally they can and do happen, but not regularly.
Transposition Cipher
A cipher where the order of the letters in the message is changed. The same letters appear, but they are mixed up in a non-sensical way.

Previous Page: Quantum Cryptography
Information
  • About Me
  • Contact Me
  • Legal
  • Glossary
  • Help with Activities
  • Educational Uses
  • Downloadble Resources
Crypto Corner is a subsiduary of www.interactive-maths.com
©2013 - 2022 Daniel Rodriguez-Clark
All rights reserved
If you have found Crypto Corner useful, then please help to keep it a free site by donating using the button below. Thanks!
  • Home
    • Crypto Corner Challenges
    • Glossary
    • Help with Activities
    • Educational Uses
    • Downloadable Resources
  • Introduction to Cryptography
    • Steganography
    • Codes and Ciphers
    • Conventions in Cryptography
  • Monoalphabetic Substitution Ciphers
    • Atbash Cipher
    • Pigpen Cipher
    • Caesar Shift Cipher
    • Affine Cipher
    • Mixed Alphabet Cipher
    • Other Examples
    • Frequency Analysis: Breaking the Code
    • Homophonic Substitution
  • Simple Transposition Ciphers
    • Rail Fence Cipher
    • Route Cipher
    • Columnar Transposition Cipher
    • Myszkowski Transposition Cipher
    • Permutation Cipher
    • Anagramming: Jumbling words
    • Combining Monoalphabetic and Simple Transposition Ciphers
  • Polyalphabetic Substitution Ciphers
    • Vigenère Cipher
    • Kasiski Analysis: Breaking the Code
    • Autokey Cipher
    • Other Examples
  • Fractionating Ciphers
    • Polybius Square
    • Straddling Checkerboard
    • Transposing Fractionated Text
    • Other ways to Alter Fractionated Text
  • Digraph Substitution Ciphers
    • Playfair Cipher
    • Two-Square Cipher
    • Four-Square Cipher
    • Hill Cipher