Crypto Corner
  • Home
    • Crypto Corner Challenges
    • Glossary
    • Help with Activities
    • Educational Uses
    • Downloadable Resources
  • Introduction to Cryptography
    • Steganography
    • Codes and Ciphers
    • Conventions in Cryptography
  • Monoalphabetic Substitution Ciphers
    • Atbash Cipher
    • Pigpen Cipher
    • Caesar Shift Cipher
    • Affine Cipher
    • Mixed Alphabet Cipher
    • Other Examples
    • Frequency Analysis: Breaking the Code
    • Homophonic Substitution
  • Simple Transposition Ciphers
    • Rail Fence Cipher
    • Route Cipher
    • Columnar Transposition Cipher
    • Myszkowski Transposition Cipher
    • Permutation Cipher
    • Anagramming: Jumbling words
    • Combining Monoalphabetic and Simple Transposition Ciphers
  • Polyalphabetic Substitution Ciphers
    • Vigenère Cipher
    • Kasiski Analysis: Breaking the Code
    • Autokey Cipher
    • Other Examples
  • Fractionating Ciphers
    • Polybius Square
    • Straddling Checkerboard
    • Transposing Fractionated Text
    • Other ways to Alter Fractionated Text
  • Digraph Substitution Ciphers
    • Playfair Cipher
    • Two-Square Cipher
    • Four-Square Cipher
    • Hill Cipher

Other ways to alter Fractionated Ciphertext

  1. Cipher Activity
  2. Introduction
  3. Encryption
  4. Decryption
  5. Discussion
  6. Exercise

Another way to alter the numbers after we have fractionated the text is to add (or subtract) something to each number after the fractionation. This changes the identity of each digit and so the letters they represent. We shall look at the simple plaintext "a simple example", and we shall use a standard Polybius Square with no key. Using this we get the string of digits "11 344223531351 51351123531351". We can now add to each digit any number we like, we shall add 2. Obviously, if we add 2 to 5 we get 7, and we cannot use this in the Polybius Square, so we have to take each number modulo 5, that is a 6 becomes a 1, a 7 becomes a 2 etc (not strictly modular arithmetic in this case, but there is no 0 so we modify slightly).
Picture
Changing the fractionated digits by addition
We now use the Polybius Square to turn this back into the ciphertext "N EQYWXM MKNYWXM". However, notice that this is simply a monoalphabetic substitution.
We can get round this by adding a different digit at each point, and in this case the number we are going to add is our key.
Encryption
To encrypt we first turn our plaintext into a string of digits using the fractionation method of choice. We then repeat the key number beneath this string until it is the same length as the fractionated digits. We add or subtract the key digit to/from the fractionated digit, and take the number we get to the correct modulo. If using a Polybius Square, this is the number of columns. If using a Straddling Checkerboard it is always modulo 10.
As an example, we shall encrypt the plaintext "escape now" with keyword luck and key number 9274.
We start by generating the Polybius Square using keyword luck and converting the plaintext into fractionated digits. Doing this we get "324431511432 435325".
Picture
The Polybius Square with keyword luck
Now we have the fractionated digits, we write out the key number 9274 repeating beneath these digits, and add down each column. Finally we take each of then totals modulo 5 to get the final digits.
Picture
The process of adding the key number, and taking the totals modulo 5
With this string of digits we now convert back to ciphertext using the same Polybius Square to get "QHIWAA XDB".
Notice that the two "e"s in the plaintext encipher to "Q" and "A", and also that the "pe" in "escape" encodes to "AA". This is clearly not a monoalphabetic substitution cipher now.
In the second example, we shall encrypt the plaintext "when shall we meet?" using a single keyword secret and a Straddling Checkerboard (with key numbers 1 and 7). We shall subtract this time.
Picture
The Straddling Checkerboard with keyword secret and key numbers 1 and 7.
First we use the Straddling Checkerboard to get a string of digits, which in this case is
"76142708014918188762819225"
Now we need to convert the keyword secret into a key number. To do this, we simply replace each letter by the number which represents it. So a becomes 0, b becomes 1, etc. Doing this gives us 184217419. We then repeat this under the fractionated digits, and take the key digit from the fractionated digit in each column. We then take these modulo 10.
Picture
The fractionated digits with the converted keyword
Finally we convert these back into the ciphertext using the same Straddling Checkerboard to get "#8PB#7B#5AURYTRRA T R", or omiting the numeric escapes we get "8PB7B5AURYTRRA T R".
Decryption
The decryption process is identical to the encryption process, except we use the inverse operation. That is, if we added whilst enciphering, then we subtract in deciphering, and vice versa. We shall see that this works using the same two examples from above.
Starting with the ciphertext "QHIWAA XDB", using the keyword luck in the Polybius Square, and key number 9274, we first convert the ciphertext into digits. We get "241323255151 352212".
Picture
With the fractionated digits, since we added the key to encrypt, we must subtract the key to decrypt, which gets us the following.
Picture
Finally, we must convert this back to plaintext using the Polybius Square to get "escape now".
Similarly, with the ciphertext "8PB7B5AURYTRRA T R", knowing we used a Straddling Checkerboard with key numbers 1 and 7, and a single keyword of secret. We start by again converting this to digits using the Straddling Checkerboard.
We have to add some numeric escape characters first to get "#8PB#7B#5AURYTRRA T R", and then this converts to "68721067106597447854498584"
Picture
We then use the keyword converted into a key nnumber, and add the digits together, before taking the answer modulo 10.
Picture
Finally we convert this back into plaintext using the Straddling Checkerboard "when shall we meet".
Discussion
In many ways this is a much easier process that the Transposition of Fractionated text, especially if doing it by hand. However, the level of security is similar, since you are still manipulating the components of each letter individually.
As with transposing fractionated text, it is possible that the very last digit could be one of the key numbers in the Straddling Checkerboard. This is dealt with in the same way, and we insert "^" before the number, and then a 0 on the end to give us an actual letter. When decrypting, if we see a "^", we know to ignore the very last digit.
Unfortunately, as with the Vigenère Cipher, the repeating nature of the key number is the biggest weakness here. We can help avoid some of this by using a non-repeating sequence of numbers, such as the decimal expansion of π.
As with transposition ciphers, it is also possible to iterate the process more than once. That is, you could add on the key number several times. This does not really make the cipher much more secure, as you are still just adding a number to each digit, but does make it hard to break by pen and paper methods.
Questions
1.       Encrypt the following messages using the given ciphers, alphabet and keys in brackets
           (a)          "Meet me at the docks" (Polybius Square with addition, standard alphabet of 26 letters combining "i" and "j", keyword = james)
           (b)          "True wisdom is knowing you know nothing" (Straddling Checkerboard with Myszkowski Transposition, standard alphabet with numeric escape and space, Checkerboard keyword = estoniar, Transposition keyword = socrates, key numbers = 3 and 8)
2.        Decrypt the following ciphertext messages using the given ciphers, alphabet and keys in brackets.
           (a)          "LNEFUUMACAETPHESQQOUXMKCRANCES" (Polybius Square with Permutation, standard alphabet of 26 letters combining "i" and "j", Polybius keyword = square, Permutation keyword = circle, with null key 1)
           (b)          "I EY 3IEQLF LENN IETAPFSTITABTHESIN FGNTHPESQINSASGPE L N SAIIMNW" (Straddling Checkerboard with Columnar Transposition, standard alphabet with numeric escape and space, keyword = einstein, key numbers = 1 and 5)

Previous Page: Transposing Fractionated Text
Next Page: Digraph Ciphers
Information
  • About Me
  • Contact Me
  • Legal
  • Glossary
  • Help with Activities
  • Educational Uses
  • Downloadble Resources
Crypto Corner is a subsiduary of www.interactive-maths.com
©2013 - 2022 Daniel Rodriguez-Clark
All rights reserved
If you have found Crypto Corner useful, then please help to keep it a free site by donating using the button below. Thanks!
  • Home
    • Crypto Corner Challenges
    • Glossary
    • Help with Activities
    • Educational Uses
    • Downloadable Resources
  • Introduction to Cryptography
    • Steganography
    • Codes and Ciphers
    • Conventions in Cryptography
  • Monoalphabetic Substitution Ciphers
    • Atbash Cipher
    • Pigpen Cipher
    • Caesar Shift Cipher
    • Affine Cipher
    • Mixed Alphabet Cipher
    • Other Examples
    • Frequency Analysis: Breaking the Code
    • Homophonic Substitution
  • Simple Transposition Ciphers
    • Rail Fence Cipher
    • Route Cipher
    • Columnar Transposition Cipher
    • Myszkowski Transposition Cipher
    • Permutation Cipher
    • Anagramming: Jumbling words
    • Combining Monoalphabetic and Simple Transposition Ciphers
  • Polyalphabetic Substitution Ciphers
    • Vigenère Cipher
    • Kasiski Analysis: Breaking the Code
    • Autokey Cipher
    • Other Examples
  • Fractionating Ciphers
    • Polybius Square
    • Straddling Checkerboard
    • Transposing Fractionated Text
    • Other ways to Alter Fractionated Text
  • Digraph Substitution Ciphers
    • Playfair Cipher
    • Two-Square Cipher
    • Four-Square Cipher
    • Hill Cipher