Professional Documents
Culture Documents
Jitendra Oza
Khushali Tripathi
I.
I NTRODUCTION
T RANSPOSITION S YSTEM
Permutation method
Grillers
Trapezoidal design
Triangular design
Diagonal design
Fig. 1.
Trapezoidal
Fig. 4.
Diagonal
Triangle Page
Fig. 5.
Interrupted
Triangle
Keyword: T R I A N G L E S T R I A N G L E S
Key: 17-13-7-1-11-5-9-3-15-18-14-8-2-12-6-10-4-16
Plaintext :- PROCEED TO CARRY OUT INSTRUCTIONS AS SIGNED IN ORDERS
5) Interrupted keyword transposition: In this method, we
re-arrange our message as per given key. And we construct
our cipher text as per key using zigzag type. For example,
Message: ENEMY BATTERY LOCATED AT WOODS
1,000 YARDS SOUTHEAST OF MUMMASBURG HEAVY
Fig. 6.
permutation
Fig. 7.
Fig. 8.
Fig. 9.
Special Figures
3) True double transposition: In the form of double transposition mention above. It is only entire columns or entire rows
are transposed. In true double transposition this is no longer
the case, for here the letters of columns and rows become so
thoroughly rearranged that the final text presents a complete
scrambling almost as though the letters of the message had
been tossed into a hat and then drawn out at random.
C. True Double Transposition
In this method we use given key twice. It will create two
double transposition output. and make the encryption process
stronge. First key is used to select column and second key is
used for selecting a row of the table that we created using first
key and then ciphertext is generated from the table using the
key 1.
For example,
Message: OUR ATTACK SLOWING UP IN FRONT
OF HILL 1000 YARDS SOUTHEAST OF GOLDENVILLE
STOP REQUEST PROMPT REENFORCEMENT.
Key: I N T E R N A T I 0 N A L
4-7-12-3-11-8-1-13-5-10-9-2-6
After the table True Double-1 is created. We use it to create
table True Double-2.
Encrypted Message: PTRUT OGTTI RLOPP DUSVO
SOSAU AOREA CORSH EEDNF WTULC NNEST QOFOY
KFFHR PUORA NTLTE LNLES GLOER OMONA IHIES
ENETN MDIT
7-1-5-3-2-8-6-4
Key2: B R E A K
2-5-3-1-4
D. Grillers
Grilles are sheets of paper, cardboard, or thin metal in
which perforations have been made for the uncovering of
Fig. 10.
Fig. 11.
True Double-1
Fig. 12.
Simple Griller
Fig. 13.
True Double-2
Simple Grillers
Revolving Grillers
Nonperforated grilles
Fig. 14.
Nonperforated Griller
Fig. 17.
Complex Route
S UBSTITUTION S YSTEM
Fig. 15.
Rectangular Griller
Polygraphic Systems
Repetitive Systems
Cryptographs
A. Polygraphic Systems
In monoalphabatic and polyalphabetic, we use combination
of one-to-one encryption. But in military polygraphic system,
combination of two or more letters are to be treated as a unit.
They are called as ligatures.
For example,
Key1: WESTINGHOUSE AIR BRAKE
Key2 GENERAL ELECTRIC COMPANY
Fig. 16.
Indefinite Griller
Plaintext: FIRE
6) Indefinite or continuous grilles: Message: AM RECEIVING HEAVY MACHINE GUN FIRE FROM HILL SIX TWO
ZERO
E. Miscellaneous Transposition System
There are three types of miscellaneous transposition system.
Fig. 18.
Polygraphic
D. Repetitive Systems
Key1: TWOHUNDRED
Key2: ONETHOUSAND
Checkboard
Step-1
Plain: TH ER EA RE BE TT ER CR YP TO GR AM
Cipher: YX BE BK CR ER LX BE RE HC ZX RH IB
C. Complex Substitution System
In this system, we will use reverse standard alphabets. So
that,
Step-2
IV.
C ONCLUSION
Crypto: MNUJ
Key text: TRUEM NUJOF HQKOE IIVWU VQODR
LOSGD
Plaintext: HEAVY INTER DICTI ONFIR EFALL INGAT
Crypto : MNUJO FHQKO EIIVW UVQOD RLOSG DBMGK
Another example is,
It uses key and numerical value for encryption
R EFERENCES
[1]