Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Classical Cryptology

Concealment Cipher
Worthie Sir John:- Hope, that is ye beste comfort of ye afflicted, cannot much, I fear me, help you now. That I would saye to you, is this only: if ever I may be able to requite that I do owe you, stand not upon asking me. 'Tis not much that I can do: but what I can do, bee ye verie sure I wille. I knowe that, if dethe comes, if ordinary men fear it, it frights not you, accounting it for a high honor, to have such a rewarde of your loyalty. Pray yet that you may be spared this soe bitter, cup. I fear not that you will grudge any sufferings; only if bie submission you can turn them away, 'tis the part of a wise man. Tell me, an if you can, to do for you anythinge that you wolde have done. The general goes back on Wednesday. Restinge your servant to command. R.T.

Concealment Cipher
Worthie Sir John:- Hope, that is ye beste comfort of ye afflicted, cannot much, I fear me, help you now. That I would saye to you, is this only: if ever I may be able to requite that I do owe you, stand not upon asking me. 'Tis not much that I can do: but what I can do, bee ye verie sure I wille. I knowe that, if dethe comes, if ordinary men fear it, it frights not you, accounting it for a high honor, to have such a rewarde of your loyalty. Pray yet that you may be spared this soe bitter, cup. I fear not that you will grudge any sufferings; only if bie submission you can turn them away, 'tis the part of a wise man. Tell me, an if you can, to do for you anythinge that you wolde have done. The general goes back on Wednesday. Restinge your servant to command. - R.T.

Russian Nihilist

Russian Nihlist

Bacon's Bi-literal Cipher


Another example of this type is the Francis Bacon Biliteral cipher where two slightly different typefaces are used to conceal a binary code of length 5. At the end of the 19th century, a Mrs. Gallup studied the first edition of one of Bacon's early works, and on the titlepage, hidden under two sets of italics, she discovered the name of William Rowley - Bacon's chief secretary.

Bacon's Bi-literal Cipher


Another example of this type is the Francis Bacon aabbb abaaa aabaa aabaa aaabb ababb abbaa aaabb H I D D E N M E Bi-literal cipher where two slightly baaab baaab aaaaa aabab aaabb......... S S A G E
A - aaaaa B - aaaab C - aaaba D - aabaa E - aaabb F - aabba G - aabab H - aabbb IJ - abaaa K - abaab L - ababa M- abbaa N - ababb O - abbba P - abbab Q - abbbb R - baaaa S - baaab T - baaba UV - babaa W- baabb X- babba Y- babab Z -babbb

Transposition Ciphers
THIS IS A PHONY MESSAGE BUT IT SERVES ITS PURPOSE, (40 letters). We write the letters in an 85 array (one choice amongst many possible sizes) to get: T H I S S A P H N Y M E S A G E U T I T E RV E I T S P R P O S I O S B S S U E

By columns: TSNSU EIRHA YATRT PIPMG IVSOS HEETE PSIOS BSSUE By diagonals: TSHNA ISYPS UAMHI ETGEO IRIES RTVTB PSESO PSSUE

Substitution (Freemason) Cipher

M AR Y

L OVE

YOU

TOM

The Lost Symbol


S A C V O T S U E U A N U N S J

The Lost Symbol

The Lost Symbol

Isaacus Neutonuus

Substitution Ciphers
Caesar's (Shift) Cipher Graph Theory rots JUDSK WKHRUB URWV General Shift Cipher: x x + a (mod 26) Affine Cipher: x ax + b (mod 26) 0 a 25 (a,26) = 1

ABCDEFGHIJ K L MN O P Q R S T U V WX Y Z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Substitution Ciphers
Monoalphabetic: Any permutation of the letters can be used for the substitution. The "trick" is trying to remember the permutation.
Using a keyword or phrase: Keyphrase: Dave Brown eats it
ABCDEFGHIJ K L MN O P Q R S T U V WX Y Z d av e b ro wnt s i c f g h j k l m p q u x y z

Substitution Ciphers
Polygraph (Playfair): Arrange alphabet in a 55 grid and replace pairs by: 1) in same row, use letters to the right. 2) in same column, use letters below. 3) else, use letters in same row in opposite corners.
Message: Just kidding dave

A B C D E

P O N M Q Y X L R Z W K S T UV J F G H I

JU ST KI DX DI NG DA VE dj tu jm ub je oh eb dh
Enciphered: djtuj mubje ohebd h

Polyalphabetic (Vigenre - 1586)

Substitution Ciphers

In this type of substitution cipher, a letter is not fl inki sinf or itnowflinkis infori t nowfli nk isi NY BUSA LGCJ CW ANOGPNEDGSWF KVUVVZ T YSPYPZ VC VGB always replaced by the same letter. This procedure nforit nowflink is inf orit nowfli nkis inforitno NQKRGL ESLQLKRN JQ BUJ GRUX YSPYPZ GRQK XETQVLNES distorts the statistical frequencies of the original wflinkis inf oritnowflin kisinforitn ow fli nkisinfo ZNDBBBBK BUJ GKIMVGPNNIY PZWYHJBTQXF FB YSM BBQYQAFZ message. A keyword or phrase is used, and duplicate ritnowf l inkisin fo ritnow fl inki nfo ritnowfli DMLFOCJ L SRJEGZQ TF GPKNGA ND CFOL NSR UCIYWYFEM

ABCDEFGHIJ K L MN O P Q R S T U V WX Y Z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

You might also like