Substitution and Transposition Ciphers
Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process.
Substitution ciphers
Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time.
The Caesar Cipher was an early substitution cipher. In the Caesar Cipher, each character is shifted three places up. Therefore, A becomes D and B becomes E, etc…
This table shows “VOYAGER” being encrypted with the Caesar substitution cipher:
Plaintext | V | O | Y | A | G | E | R |
---|---|---|---|---|---|---|---|
Key | +3 | +3 | +3 | +3 | +3 | +3 | +3 |
Ciphertext | Y | R | B | D | J | H | U |
A more complex substitution cipher would be created if, instead of incrementing each character by three, we used a more complex key. This table shows a simple substitution cipher with a key of “123”.
Plaintext | V | O | Y | A | G | E | R |
---|---|---|---|---|---|---|---|
Key | +1 | +2 | +3 | +1 | +2 | +3 | +1 |
Ciphertext | W | Q | B | B | I | H | S |
An even more complex substitution cipher can be made by having each character of the alphabet correspond to a different letter of the alphabet, without a set pattern.
Plaintext | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Key | T | O | E | U | N | Z | I | A | G | X | P | Q | Y | R | H | V | S | M | D | F | C | J | W | B | K | L |
Using this substitution cipher to encrypt VOYAGER would give us these results:
Plaintext | V | O | Y | A | G | E | R |
---|---|---|---|---|---|---|---|
Ciphertext | J | H | K | T | X | N | M |
The Vernam Cipher, or one time pad, is a simple substitution cipher where the key length equals the message length.
ROT-1 is a simple substitution cipher used to encode messages on Usenet.
Transposition ciphers
Transposition ciphers encrypt plaintext by moving small pieces of the message around. Anagrams are a primitive transposition cipher.
This table shows “VOYAGER” being encrypted with a primitive transposition cipher where every two letters are switched with each other:
V | O | Y | A | G | E | R |
O | V | A | Y | E | G | R |
Substitution and transposition ciphers in modern times
Modern cryptanalysis makes simple substitution and transposition ciphers obsolete.
However, these techniques remain useful for understanding cryptography and the workings of more complex modern ciphers.
Comments - One Response to “Substitution and Transposition Ciphers”
Sorry but comments are closed at this time.