Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Polyalphabetic cipher
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Multiple-substitution writing system cipher}} A '''polyalphabetic cipher''' is a [[substitution cipher|substitution]], using multiple substitution alphabets. The [[Vigenère cipher]] is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The [[Enigma machine]] is more complex but is still fundamentally a polyalphabetic substitution cipher. ==History== The work of [[Al-Qalqashandi]] (1355–1418), based on the earlier work of [[Ibn al-Durayhim]] (1312–1359), contained the first published discussion of the substitution and transposition of ciphers, as well as the first description of a polyalphabetic cipher, in which each plaintext letter is assigned more than one substitute.<ref>{{cite book |last1=Lennon |first1=Brian |title=Passwords: Philology, Security, Authentication |date=2018 |publisher=[[Harvard University Press]] |isbn=9780674985377 |page=26 |url=https://books.google.com/books?id=jbpTDwAAQBAJ&pg=PT26}}</ref> However, it has been claimed that polyalphabetic ciphers may have been developed by the Arab cryptologist [[Al Kindi]] (801–873) centuries earlier.<ref>{{Citation |last=Maclean |first=Donald |title=Al-Kindi |date=20 February 2012 |url=http://donaldmaclean.wordpress.com/2012/02/20/al-kindi/ |access-date=13 April 2012}}</ref> The [[Alberti cipher]] by [[Leon Battista Alberti]] around 1467 was an early polyalphabetic cipher. Alberti used a mixed alphabet to encrypt a message, but whenever he wanted to, he would switch to a different alphabet, indicating that he had done so by including an uppercase letter or a number in the cryptogram. For this encipherment Alberti used a decoder device, his ''[[cipher disk]]'', which implemented a polyalphabetic substitution with mixed alphabets. [[Johannes Trithemius]]—in his book ''Polygraphiae libri sex'' (Six books of polygraphia), which was published in 1518 after his death—invented a ''progressive key'' polyalphabetic cipher called the [[Trithemius cipher]].<ref>Johann Tritheim, ''Polygraphiae libri sex'' … (Basel, Switzerland: Michael Furter and Adam Petri, 1518), ''Liber quintus'' (fifth book), pages 461-462; the ''Recta transpositionis tabula'' (square table of transpositions, or "Vigenère table") appears on [http://lcweb2.loc.gov/cgi-bin/ampage?collId=rbc3&fileName=rbc0001_2009fabyan12345page.db&recNum=470 page 463.]</ref> Unlike Alberti's cipher, which switched alphabets at random intervals, Trithemius switched alphabets for each letter of the message. He started with a [[tabula recta]], a square with 26 letters in it (although Trithemius, writing in [[Latin]], used 24 letters). Each alphabet was shifted one letter to the left from the one above it, and started again with A after reaching Z (see table). [[File:Vigenère square shading.svg|thumbnail|right|320px|Tabula recta]] Trithemius's idea was to encipher the first letter of the message using the first shifted alphabet, so A became B, B became C, etc. The second letter of the message was enciphered using the second shifted alphabet, etc. Alberti's cipher disk implemented the same scheme. It had two alphabets, one on a fixed outer ring, and the other on the rotating disk. A letter is enciphered by looking for that letter on the outer ring, and encoding it as the letter underneath it on the disk. The disk started with A underneath B, and the user rotated the disk by one letter after encrypting each letter. The cipher was trivial to break, and Alberti's machine implementation not much more difficult. ''Key progression'' in both cases was poorly concealed from attackers. Even Alberti's implementation of his polyalphabetic cipher was rather easy to break (the capitalized letter is a major clue to the cryptanalyst). For most of the next several hundred years, the significance of using multiple substitution alphabets was missed by almost everyone. Polyalphabetic substitution cipher designers seem to have concentrated on obscuring the choice of a few such alphabets (repeating as needed), not on the increased security possible by using many and never repeating any. The principle (particularly Alberti's unlimited additional substitution alphabets) was a major advance—the most significant in the several hundred years since [[frequency analysis]] had been developed. A reasonable implementation would have been (and, when finally achieved, was) vastly harder to break. It was not until the mid-19th century (in [[Charles Babbage|Babbage]]'s secret work during the [[Crimean War]] and [[Friedrich Kasiski]]'s generally equivalent public disclosure some years later) that [[cryptanalysis]] of well-implemented polyalphabetic ciphers got anywhere at all. ''See'' [[Kasiski examination]]. [[Abramo Colorni]] described polyalphabetic ciphers in his 1593 work, ''Scotographia''.<ref>{{Citation |last=Strasser |first=Gerhard F. |title=The rise of cryptology in the European Renaissance |date=2007 |work=The History of Information Security |pages=277–325 |url=https://linkinghub.elsevier.com/retrieve/pii/B9780444516084500122 |access-date=2024-10-20 |publisher=Elsevier |language=en |doi=10.1016/b978-044451608-4/50012-2 |isbn=978-0-444-51608-4|url-access=subscription }}</ref> ==Notes== {{reflist}} == References == * {{Citation | last = Alberti | first = Leon Battista | author-link = Leon Battista Alberti | title = A Treatise on Ciphers, trans. A. Zaccagnini. Foreword by [[David Kahn (writer)|David Kahn]] | place = Torino | publisher = Galimberti | year = 1997 }} * {{Citation | last = Churchhouse | first = Robert | title = Codes and Ciphers: Julius Caesar, the Enigma and the Internet | place = Cambridge | publisher = Cambridge University Press | year = 2002 | isbn = 978-0-521-00890-7 | url-access = registration | url = https://archive.org/details/codesciphersjuli0000chur }} * {{Citation | last = Gaines | first = Helen Fouché | author-link = Helen Fouché Gaines | title = Cryptanalysis | publisher = Dover | year = 1939 | isbn = 0-486-20097-3 | url-access = registration | url = https://archive.org/details/cryptanalysis00hele }} == See also == * [[Topics in cryptography]] {{Cryptography navbox | classical}} {{DEFAULTSORT:Polyalphabetic Cipher}} [[Category:Classical ciphers]] [[es:Cifrado de Trithemius]] [[fr:Chiffrement de Vigenère]] [[tr:Vigenere tablosu]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Citation
(
edit
)
Template:Cite book
(
edit
)
Template:Cryptography navbox
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)