Polyalphabetic cipher
From Wikipedia, the free encyclopedia
A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The Enigma machine is more complex but still fundamentally a polyalphabetic substitution cipher.
The first published polyalphabetic cipher was invented by Leon Battista Alberti around 1467. Alberti used a Caesar cipher to encrypt a message, but whenever he wanted to he would switch to a different alphabet, indicating that he had done so by capitalizing the first letter encrypted with the new alphabet. Alberti also invented a decoder device, his encryption disk, which implemented a cipher equivalent to the one published later by Johannes Trithemius.
Johannes Trithemius, in a book published after his death, invented a progressive key polyalphabetic cipher. Unlike Alberti's cipher, which switched alphabets at random intervals, Trithemius switched alphabets for each letter of the message. He started with a tabula recta, a square with 26 alphabets in it (Trithemius, writing in Latin, used 24 alphabets). Each alphabet was shifted one letter to the left from the one above it, and started again with A after reaching Z (see image).
Trithemius's idea was to encipher the first letter of the message using the first shifted alphabet, so A became B, B became C, etc. The second letter of the message was enciphered using the second shifted alphabet, etc. Alberti's cipher disk implemented the same scheme. It had two alphabets, one on a fixed outer ring, and the other on the rotating disk. A letter is enciphered by looking for that letter on the outer ring, and encoding it as the letter underneath it on the disk. The disk started with A underneath B, and the user rotated the disk by one letter after encrypting each letter.
Trithemius' cipher was trivial to break, and Alberti's machine implementation not much more difficult. Key progression in both cases was poorly concealed from attackers. Even Alberti's implementation of his polyalphabetic cipher was rather easy to break (the capitalized letter is a major clue to the cryptanalyst). For most of the next several hundred years, the significance of using multiple substitution alphabets was missed by almost everyone. Polyalphabetic substitution cipher designers seem to have concentrated on obscuring the choice of a few such alphabets (repeating as needed), not on the increased security possible by using many and never repeating any.
The principle (particularly Alberti's unlimited additional substitution alphabets) was a major advance -- the most significant in the several hundred years since frequency analysis had been developed. A reasonable implementation would have been (and, when finally achieved, was) vastly harder to break. It was not until the mid-1800s (in Babbage's secret work during the Crimean War) and Friedrich Kasiski's generally equivalent public disclosure some years later, that cryptanalysis of well-implemented polyalphabetic ciphers got anywhere at all.
[edit] Recent Discoveries
Although Alberti is usually considered the father of polyalphabetic cipher, Prof. Ibrahim A. Al-Kadi's 1990 paper ( ref- 2) to the Swedish Royal Institute of Technology in Stockholm regarding the Arabic contributions to cryptology reported (based on a recently discovered ancient script) the knowledge of polyalphabetic ciphers 500 years before Alberti.
Dr. Al-Kadi reported on the Arabic scientist by the name of Abu Yusuf Yaqub ibn Is-haq ibn as Sabbah ibn 'omran ibn Ismail Al-Kindi, who authored a book on cryptology the "Risalah fi Istikhraj al-Mu'amma" (Manuscript for the Deciphering Cryptographic Messages) circa 750 AD. Al-Kindi introduced cryptanalysis techniques (including those for polyalphabetic ciphers) , classification of ciphers, Arabic Phonetics and Syntax and most importantly described the use of several statistical techniques for cryptanalysis. [This book apparently antedates other cryptology references by 300 years.] [It also predates writings on probability and statistics by Pascal and Fermat by nearly 800 years.]
[edit] References
- Helen Fouché Gaines, "Cryptanalysis", 1939, Dover. ISBN 0-486-20097-3
- Ibrahim A. Al-Kadi "The origins of cryptology: The Arab contributions”, Cryptologia, 16(2) (April 1992) pp. 97–126.
[edit] See also
Classical cryptography
|
---|
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex |
Ciphers: ADFGVX | Affine | Alberti | Atbash | Autokey | Bifid | Book | Caesar | Four-square | Hill | Keyword | Nihilist | Permutation | Pigpen | Playfair | Polyalphabetic | Polybius | Rail Fence | Reihenschieber | Reservehandverfahren | ROT13 | Running key | Scytale | Solitaire | Straddling checkerboard | Substitution | Tap Code | Transposition | Trifid | Two-square | VIC cipher | Vigenère |
Cryptanalysis: Frequency analysis | Index of coincidence |
Misc: Cryptogram | Bacon | Polybius square | Scytale | Straddling checkerboard | Tabula recta |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |