Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Transposition cipher
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Another example === As an example, we can take the result of the irregular columnar transposition in the previous section, and perform a second encryption with a different keyword, {{mono|STRIPE}}, which gives the permutation "564231": 5 6 4 2 3 1 E V L N A C D T E S E A R O F O D E E C W I R E E As before, this is read off columnwise to give the ciphertext: CAEEN SOIAE DRLEF WEDRE EVTOC If multiple messages of exactly the same length are encrypted using the same keys, they can be anagrammed simultaneously. This can lead to both recovery of the messages, and to recovery of the keys (so that every other message sent with those keys can be read). During [[World War I]], the German military used a double columnar transposition cipher, changing the keys infrequently. The system was regularly solved by the French, naming it Γbchi, who were typically able to quickly find the keys once they'd intercepted a number of messages of the same length, which generally took only a few days. However, the French success became widely known and, after a publication in ''[[Le Matin (France)|Le Matin]]'', the Germans changed to a new system on 18 November 1914.<ref>Kahn, pp. 301-304.</ref> During World War II, the double transposition cipher was used by [[Netherlands in World War II#Oppression and resistance|Dutch Resistance]] groups, the French [[Maquis (World War II)|Maquis]] and the British [[Special Operations Executive]] (SOE), which was in charge of managing underground activities in Europe.<ref>Kahn, pp. 535 and 539.</ref> It was also used by agents of the American [[Office of Strategic Services]]<ref>Kahn, p. 539.</ref> and as an emergency cipher for the German Army and Navy. Until the invention of the [[VIC cipher]], double transposition was generally regarded as the most complicated cipher that an agent could operate reliably under difficult field conditions.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)