Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Classical cipher
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Types of classical ciphers== Classical ciphers are often divided into ''[[transposition cipher]]s'' and ''[[substitution cipher]]s'', but there are also ''[[Null cipher|concealment ciphers]]''. ===Substitution ciphers=== {{Main article|Substitution cipher}} In a substitution cipher, letters, or groups of letters, are systematically replaced throughout the message for other letters, groups of letters, or symbols. A well-known example of a substitution cipher is the [[Caesar cipher]]. To encrypt a message with the Caesar cipher, each letter of message is replaced by the letter three positions later in the alphabet. Hence, A is replaced by D, B by E, C by F, etc. Finally, X, Y and Z are replaced by A, B and C respectively. So, for example, "WIKIPEDIA" encrypts as "ZLNLSHGLD". Caesar rotated the alphabet by three letters, but any number works. Another method of substitution cipher is based on a keyword. All spaces and repeated letters are removed from a word or phrase, which the encoder then uses as the start of the cipher alphabet. The end of the cipher alphabet is the rest of the alphabet in order without repeating the letters in the keyword. For example, if the keyword is CIPHER, the cipher alphabet would look like this: {| class="wikitable" ! normal alphabet | {{mono|a b c d e f g h i j k l m n o p q r s t u v w x y z}} |- ! cipher alphabet | {{mono|c i p h e r a b d f g j k l m n o q s t u v w x y z}} |} The previous examples were all examples of monoalphabetic substitution ciphers, where just one cipher alphabet is used. It is also possible to have a [[polyalphabetic cipher|polyalphabetic substitution cipher]], where multiple cipher alphabets are used. The encoder would make up two or more cipher alphabets using whatever techniques they choose, and then encode their message, alternating what cipher alphabet is used with every letter or word. This makes the message much harder to decode because the codebreaker would have to figure out both cipher alphabets. Another example of a polyalphabetic substitution cipher that is much more difficult to decode is the [[Vigenere square|Vigenère square]], an innovative encoding method. With the square, there are 26 different cipher alphabets that are used to encrypt text. Each cipher alphabet is just another rightward Caesar shift of the original alphabet. This is what a Vigenère square looks like: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q R S T U V W X Y Z A B C D E F G H I J K L M N O P R S T U V W X Y Z A B C D E F G H I J K L M N O P Q S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z A B C D E F G H I J K L M N O P Q R S T U V W X Y To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If {{mono|LEMON}} is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is {{mono|LEMON}} and the message to encode is {{mono|ATTACKATDAWN}}, then the encoding is: {| class="wikitable" ! Plaintext | {{mono|ATTACKATDAWN}} |- ! Key | {{mono|LEMONLEMONLE}} |- ! Ciphertext | {{mono|LXFOPVEFRNHR}} |} Some substitution ciphers involve using numbers instead of letters. An example of this is the [[Great Cipher]], where numbers were used to represent syllables. There is also another number substitution cipher{{which|date=April 2022}} that involves having four different number pair options for a letter based on a keyword. Instead of numbers, symbols can also be used to replace letters or syllables. One example of this is [[Zodiac]] alphabet, where signs of the zodiac were used to represent different letters, for example, the symbols for the sun stood for A, Jupiter stood for B, and Saturn stood for C. Dots, lines, or dashes could also be used, one example of this being [[Morse Code]], which is not a cipher, but uses dots and dashes as letters nonetheless. The [[pigpen cipher]] uses a grid system or lines and dots to establish symbols for letters. There are various other methods that involve substituting letters of the alphabet with symbols or dots and dashes. ===Transposition ciphers=== {{Main article|Transposition cipher}} In a transposition cipher, the letters themselves are kept unchanged, but their order within the message is scrambled according to some well-defined scheme. Many transposition ciphers are done according to a geometric design. A simple (and once again easy to crack) encryption would be to write every word backwards. For example, "Hello my name is Alice." would now be "olleH ym eman si ecilA." A [[scytale]] is a machine that aids in the transposition of methods. In a columnar cipher, the original message is arranged in a rectangle, from left to right and top to bottom. Next, a key is chosen and used to assign a number to each column in the rectangle to determine the order of rearrangement. The number corresponding to the letters in the key is determined by their place in the alphabet, i.e. A is 1, B is 2, C is 3, etc. For example, if the key word is CAT and the message is THE SKY IS BLUE, the message would be arranged thus: C A T 3 1 20 T H E S K Y I S B L U E Next, the letters are taken in numerical order and that is how the message is transposed. The column under A is taken first, then the column under C, then the column under T, as a result the message "The sky is blue" has become: HKSUTSILEYBE In the Chinese cipher's method of transposing, the letters of the message are written from right to left, down and up columns to scramble the letters. Then, starting in the first row, the letters are taken in order to get the new [[ciphertext]]. For example, if the message needed to be enciphered was THE DOG RAN FAR, the Chinese cipher would look like this: R R G T A A O H F N D E The cipher text then reads: RRGT AAOH FNDE Many transposition ciphers are similar to these two examples, usually involving rearranging the letters into rows or columns and then taking them in a systematic way to transpose the letters. Other examples include the Vertical Parallel and the Double Transposition Cipher. More complex [[algorithm]]s can be formed by mixing substitution and transposition in a [[product cipher]]; modern [[block cipher]]s such as [[Data Encryption Standard|DES]] iterate through several stages of substitution and transposition. === Concealment ciphers === {{Main article|Null cipher}} Put simply, a concealment, or null, cipher is any cipher which involves a number of ''nulls,'' or decoy letters. A null cipher could be [[plaintext]] words with nulls placed in designated areas or even a plaintext message broken up in different positions with a null at the end of each word.<ref name=":4">{{Cite book |last1=Travis |first1=Falcon |title=The Spy's Guidebook |last2=Hindley |first2=Judy |last3=Thomson |first3=Ruth |last4=Amery |first4=Heather |last5=Rawson |first5=Christopher |last6=Harper |first6=Anita |publisher=Usborne Pocketbooks |year=1978}}</ref><ref>{{Cite book |last=Moore |first=Gareth |title=Explorer Academy Codebreaking Activity Adventure |year=2019 |publisher=National Geographic Books |isbn=9781426333071}}</ref> However, a message with only a couple nulls (for example, one at the beginning and one at the end) is ''not'' a null cipher. For example, during [[English Civil War|England's Civil War]] Royalist Sir John Trevanian was aided in his escape from a Puritan castle in [[Colchester]] by this message:<ref name=":1">{{Cite book |last=Janeczko |first=Paul B. |title=Top Secret: a Handbook of Codes, Ciphers, and Secret Writing |publisher=Candlewick Press |year=2004 |isbn=9780763629724}}</ref><blockquote>WORTHIE SIR JOHN, HOPE, THAT IS YE BESTE COMFORT OF YE AFFLICTED, CANNOT MUCH, I FEAR ME, HELP YOU NOW. THAT I WOULD SAY TO YOU, IS THIS ONLY: IF EVER I MAY BE ABLE TO REQUITE THAT I DO OWE YOU, STAND NOT UPON ASKING ME. TIS NOT MUCH THAT I CAN DO; BUT WHAT I CAN DO, BEE YE VERY SURE I WILL. I KNOW THAT, IF DETHE COMES, IF ORDINARY MEN FEAR IT, IT FRIGHTS NOT YOU, ACCOUNTING IT FOR A HIGH HONOUR, TO HAVE SUCH A REWARDE OF YOUR LOYALTY. PRAY YET YOU MAY BE SPARED THIS SOE BITTER, CUP. I FEAR NOT THAT YOU WILL GRUDGE ANY SUFFERINGS; ONLY IF BIE SUBMISSIONS YOU CAN TURN THEM AWAY, TIS THE PART OF A WISE MAN. TELL ME, AN IF YOU CAN, TO DO FOR YOU ANYTHINGE THAT YOU WOLDE HAVE DONE. THE GENERAL GOES BACK ON WEDNESDAY. RESTINGE YOUR SERVANT TO COMMAND.</blockquote>The third letter after each punctuation reveals "Panel at East end of Chapel slides". A dot or pinprick null cipher is a common classical encryption method in which dot or pinprick is placed above or below certain letters in a piece of writing.<ref name=":13">{{Cite book |last=Janeczko |first=Paul B. |title=Top Secret: a Handbook of Codes, Ciphers, and Secret Writing |publisher=Candlewick Press |year=2004 |isbn=9780763629724}}</ref> An early reference to this was when [[Aeneas Tacticus]] wrote about it in his book ''On the Defense of Fortifications.''<ref name=":3">{{Cite web |title=Aeneas Tacticus • Siege Defense, XXI‑XXXI |url=https://penelope.uchicago.edu/Thayer/E/Roman/Texts/Aeneas_Tacticus/E*.html |access-date=2022-05-28 |website=penelope.uchicago.edu}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)