You are on page 1of 6

Military Cryptography

Jitendra Oza

Khushali Tripathi

Information and Network Security, Institute Of Technology,


Nirma University, Ahmadabad, Gujarat, India
Email: 15mcei18@nirmauni.ac.in

Information and Network Security, Institute Of Technology,


Nirma University, Ahmadabad, Gujarat, India
Email: 15mcei29@nirmauni.ac.in

AbstractMilitary have many information that must be secret


without fail. If any of the information leak during transmission
then it will be most dangerous thing. You cannot imagine effect of
that. So cryptography in military is very much important. Today
when we talk with anyone about military then their reaction will
always be military means war, fights, soldiers, border thats it.
Nothing else. But the fact is, there is lots of things we should
know about military. One of the important thing is military
cryptography.
KeywordsMilitary Cryptography, Transposition System, Substitution Systems

I.

I NTRODUCTION

Military cryptography uses many different methods for


encryption and decryption. In this paper, we have explained
transposition and substitution techniques. Transposition system
contains some methods such as, monophase transposition,
polyphase transposition, true double transposition, and grillers
and so on. Where in substitution system, methods are polygraphic system, checkboard diagraphic substitution, complex
substitution, repetitive system etc. here we have explained all
methods with example.
II.

T RANSPOSITION S YSTEM

Permutation method

Transposition using special Figures

1) Transposition system employing geometric designs:


Generally we use square or rectangle shape for transposition
methods. In military cryptography, it was stated that triangles,
trapezoids, and polygons of various symmetrical shape can
be employed. Figures of these types form connecting links
between the methods that use simple rectangular designs and
the more complicated methods that use figures in which
transposition takes place along diagonals.
2) Trapezoidal design: This method, we use trapezoidal
shape for re-arrangement of message. We use key, number of
letters in the key will be base of the trapezoidal. As par the
base we construct our message trapezoidal.
For example,
We have plaintext and key,
Plaintext: Bridge at five hundred-l has broken downs top
imperative that it be repaired before seven am October first.
Key: NO CANDY FOR ISSUE
Here our key has 15 letters, so that trapezoidal will have
base 15.

Transposition system means arrangement of the message in


different manner. We apply key on the message and re-arrange
the message as per the given key. We do not add or remove
any message. Some transposition systems are as following,

Monophase Transposition System

Polyphase Transposition System

True Double Transposition

Grillers

Miscellaneous Transposition System

A. Monophase Transposition System


Monophase transposition system has different designing
methods. They are as following,

Transposition system employing geometric designs

Trapezoidal design

Triangular design

Diagonal design

Interrupted keyword transposition

Fig. 1.

Trapezoidal

Now Ciphertext is,


ODAIK AEDME HPODV ITEIP NHUET BOBRO
HDTFS EISHI ETBEF BCBTM ESHGA RTORD IRERE
AWARR ERTNS IEPVR VASEO FTEDL NA.
3) Triangular design: In this method we use triangle shape
for re-arrangement. Equilateral triangle is used for it. First of
all we decide the length of the triangle. Here we have use 9
side equilateral triangle.

Fig. 4.

Diagonal

ARTILLERY STOP THEY ARE FIRING AT RATE OF


THREE ROUNDS PER MINUTE FOR THE BATTERY
XWILLS, MAJ
Fig. 2.

Triangle Page

Key: MIDNIGHT RIDE OF PAUL REVERE.

Now we will construct our triangle as per given keyword,


Our keyword, numerical key, and plaintext is,
Keyword: D I A G O N A L S D I A G O N A L
Key: 5-9-1-7-15-13-2-11-17-6-10-3-8-16-14-4-12
Plaintext :- PROCEED TO CARRY OUT INSTRUCTIONS AS SIGNED IN ORDERS

Fig. 5.

Interrupted

6) Permutation method: In this method, set of permutation


digits is selected. As per those digits we arrange our message.
Here we have selected digits 1 to 5. Here we have 120
combination, but we have taken only four of them for this
example
Fig. 3.

Triangle

4) Diagonal Design: In this method, we also construct


triangle as per above method. But in this we construct our
cipher text using key and diagonals of the triangle. We do not
use base of the triangle. For example,

Message: RECOMMENDATIONS FOR LOCATIONS OF


NEW BALLOON POSITIONS MUST BE SUBMITTED BEFORE 12TH AIRDROME COMPANY CHANGES COMMAND POST TOMORROW

Keyword: T R I A N G L E S T R I A N G L E S
Key: 17-13-7-1-11-5-9-3-15-18-14-8-2-12-6-10-4-16
Plaintext :- PROCEED TO CARRY OUT INSTRUCTIONS AS SIGNED IN ORDERS
5) Interrupted keyword transposition: In this method, we
re-arrange our message as per given key. And we construct
our cipher text as per key using zigzag type. For example,
Message: ENEMY BATTERY LOCATED AT WOODS
1,000 YARDS SOUTHEAST OF MUMMASBURG HEAVY

Fig. 6.

permutation

7) Transposition using special Figures: In this method we


use more complex figures for message re-arrangement. So that
our cipher text will be more complicated and more secure.
For example,
Message: FOUR TRANSPORTS WILL BE COMPLETED
BY END OF APRIL AND SIX MORE BY EN OF JULY.

Fig. 7.

Fig. 8.

True and False Polyphase-1

Fig. 9.

True and False Polyphase-2

Special Figures

B. Polyphase Transposition System


Polyphase transposition system has different methods.
They are as following,

Polyphase transposition methods in general

True and false polyphase transpositions

True double transposition

1) Polyphase transposition methods in general: In this


transposition two or more processes of rearrangement are
involved. It was stated that only a very limited number of
such transposition methods are practicable for military use, but
that the degree of security afforded by them is considerably
greater than that afforded by certain much more complicated
substitution methods. Polyphase transposition method may
involve 2, 3 more successive transpositions of the letters of
the plain text.
2) True and false polyphase transpositions: In this method
we apply different transposition on the message. First we apply
true transposition as per given key and then we apply wrong
transposition taking a wrong key.
For example, Message: DELIVER ALL AMMUNITION
TO 4TH DIVISION DUMP
Key1: S C H E D U L E

3) True double transposition: In the form of double transposition mention above. It is only entire columns or entire rows
are transposed. In true double transposition this is no longer
the case, for here the letters of columns and rows become so
thoroughly rearranged that the final text presents a complete
scrambling almost as though the letters of the message had
been tossed into a hat and then drawn out at random.
C. True Double Transposition
In this method we use given key twice. It will create two
double transposition output. and make the encryption process
stronge. First key is used to select column and second key is
used for selecting a row of the table that we created using first
key and then ciphertext is generated from the table using the
key 1.
For example,
Message: OUR ATTACK SLOWING UP IN FRONT
OF HILL 1000 YARDS SOUTHEAST OF GOLDENVILLE
STOP REQUEST PROMPT REENFORCEMENT.
Key: I N T E R N A T I 0 N A L
4-7-12-3-11-8-1-13-5-10-9-2-6
After the table True Double-1 is created. We use it to create
table True Double-2.
Encrypted Message: PTRUT OGTTI RLOPP DUSVO
SOSAU AOREA CORSH EEDNF WTULC NNEST QOFOY
KFFHR PUORA NTLTE LNLES GLOER OMONA IHIES
ENETN MDIT

7-1-5-3-2-8-6-4
Key2: B R E A K
2-5-3-1-4

D. Grillers
Grilles are sheets of paper, cardboard, or thin metal in
which perforations have been made for the uncovering of

Fig. 10.

Fig. 11.

True Double-1

Fig. 12.

Simple Griller

Fig. 13.

Simple Griller Example

True Double-2

spaces in which letters (or groups of letters, syllables, entire


words) may be written on another sheet of paper upon which
the grille is superimposed. This latter sheet, usually made
also of cross-section paper, will here-after be designated for
purposes of brevity in reference as the grille grid, or grid. Its
external dimensions are the same as those of the grille.

Simple Grillers

Revolving Grillers

Grilles of other geometric forms

Polyphase transposition by grilles

Nonperforated grilles

Rectangular or post card grilles

Indefinite or continuous grilles

1) Simple Grillers: Grilles are sheets of paper, cardboard,


or thin metal in which perforations have been made for the
uncovering of spaces in which letters (or groups of letters,
syllables, entire words) may be written on another sheet of
paper upon which the grille is superimposed.
This latter sheet, usually made also of cross-section paper, will here after be designated for purposes of brevity in
reference as the grille grid, or grid.
Here we have message, Message: ALL DESTROYER
OUTSIDE
Encrypted Message: LRTAD TSSER YOIDS ELOEU

2) Grilles of other geometric forms: Grilles are not limited


to square-shaped figures. They may be equilateral triangles,
pentagons, hexagons, and so on. Any figure which can be pivoted upon a central point and which when revolved upon this
pivot can be placed in a succession of homologous positions
over a grid corresponding to the grille will serve equally well.
A triangle affords three grille positions, a pentagon, five, and
so on.
3) Polyphase transposition by grilles: One grille may be
employed to inscribe the letters of the message on the grid,
and a second, and different, grille employed to transcribe them
from the grid to form the formal text of the cryptogram. This
would constitute a real double transposition method of great
complexity. Polyphase transposition by a series of grilles is of
course possible.
4) Nonperforated grilles: Here we have plaintext,
Message: WAR DECLARED TODAY
Encrypted text: EWCRA EOLDA RDDAT Y

Fig. 14.

Nonperforated Griller

5) Rectangular or post card grilles: This griller papper


is in rectangle size

Fig. 17.

Complex Route

2) Disguised transposition methods: In this method the


message to be conveyed is inserted in a series of non significant
words constructed with the purpose of avoiding or evading
suspicion.
3) Cipher machines for effecting transposition: These may
be dismissed with the brief statement that if any exist today
they are practically unknown.
III.

S UBSTITUTION S YSTEM

In substitution system, we substitute letters instead of


letters of the message. Some substitution techniques are as
following,

Fig. 15.

Rectangular Griller

Polygraphic Systems

Checkerboard Digraphic Substitution

Complex Substitution Systems

Repetitive Systems

Combined Substitution transposition Systems

Cryptographs

A. Polygraphic Systems
In monoalphabatic and polyalphabetic, we use combination
of one-to-one encryption. But in military polygraphic system,
combination of two or more letters are to be treated as a unit.
They are called as ligatures.
For example,
Key1: WESTINGHOUSE AIR BRAKE
Key2 GENERAL ELECTRIC COMPANY
Fig. 16.

Indefinite Griller

Plaintext: FIRE

6) Indefinite or continuous grilles: Message: AM RECEIVING HEAVY MACHINE GUN FIRE FROM HILL SIX TWO
ZERO
E. Miscellaneous Transposition System
There are three types of miscellaneous transposition system.

Complex route transposition

Disguised transposition methods

Cipher machines for effecting transposition

1) Complex route transposition:

Fig. 18.

Polygraphic

Cipher text will be: KIQA.

B. Checkerboard Digraphic Substitution


In this method we use 8*8 checkerboard to represent our
key and message. We arrange key in the board as per playfair
technique we already know.
For example,
Plaintext: THERE ARE BETTER CRYPTOGRAM

D. Repetitive Systems

Key1: TWOHUNDRED

In this system, we repeat our key. For example, We have


keys 4-1-2-3 and 5-2-6-1-4-3

Key2: ONETHOUSAND

E. Combined Substitution transposition Systems


In this system, we will combine two different methods.
One method of substitution system and another method is
transposition system.
Message: ALL ACTION AT LANDING BEACH HAS
CEASED
Fig. 19.

Checkboard

Step-1

Plain: TH ER EA RE BE TT ER CR YP TO GR AM
Cipher: YX BE BK CR ER LX BE RE HC ZX RH IB
C. Complex Substitution System
In this system, we will use reverse standard alphabets. So
that,

Step-2

A=26 B=25 C=24 D=23 Z=1


1) Continuous or non repeating-key systems: HEAVY INTERDICTION FIRE FALLING AT
Key text: ASANE XAMPL EOFTH EMETH ODOFC
RYPTO
Plaintext: HEAVY INTER DICTI ONFIR EFALL INGAT
Crypto: TOASG PNTLU BGDAZ QZZLQ KYOUR
JLJTV
2) Auto-key systems: Key text: TRUE
Plaintext: HEAVY INTER DICTI ONFIR EFALL INGAT

IV.

C ONCLUSION

Thus using this different techniques that are discuss in this


paper, we can make our ciphertext so strong and make difficult
to crack. Also it is not so difficult to implement practically. so
we can use them in the digital communication also.

Crypto: MNUJ
Key text: TRUEM NUJOF HQKOE IIVWU VQODR
LOSGD
Plaintext: HEAVY INTER DICTI ONFIR EFALL INGAT
Crypto : MNUJO FHQKO EIIVW UVQOD RLOSG DBMGK
Another example is,
It uses key and numerical value for encryption

R EFERENCES
[1]

William F. FriedmanAdvanced-military-cryptography, Aegean Park Pr,


1996.

You might also like