Skip to main content

Simple Ciphers

  • Chapter
  • First Online:
Fundamentals of Cryptography

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 2904 Accesses

Abstract

Until the computer age, making and breaking ciphers was a task that required extreme concentration and care. Search trees based on guesses can be programmed on computers and run at high speed, where we can use the computer’s speed and the ease of keeping track of the data in data structures to allow us not to care too much about following low probability paths. The cost in time and effort to search using pencil and paper would have demanded much better guesses as to the correct path down the tree. Cryptanalysis in the first half of the twentieth century required knowledge of language patterns and frequency statistics, and both encryption and decryption had to be processes that could easily be remembered and followed. In this chapter we will describe some classical ciphers (that would be easily attacked with a program running on a desktop computer) as well as some statistical characteristics of language that could be used to attack these now-outdated ciphers. There are two basic forms of simple cipher. In a substitution cipher , one substitutes for each letter in the underlying alphabet another symbol (perhaps a different letter in the same alphabet, or sometimes another symbol entirely). In a transposition cipher , the letters of the underlying alphabet remain the same, but their order is transposed into a different order. In this, one can take the term “letter” to mean a single letter or perhaps a pair of letters. We distinguish at the outset a codebook from a cipher, although the two can be closely related. Traditional codebooks were a form of making communications secret by substituting a fixed length (often five) sequence of numbers for each of the individual words in the message. One can think of such a codebook as a substitution cipher in which the symbols are words (of variable length, of course) for which one substitutes numerical symbols. We will also mention only briefly (right here) the notion of steganography, where a message is hidden in some seemingly innocuous communication. One version of this would be a letter in which the hidden message was the sequence of first letters of words of the text. A more modern reverse version of steganography is digital watermarking, in which a digital pattern is inserted into a document, usually an image document, so that the provenance of the image can be authenticated if it is illegally taken without attribution or royalty. This is not unlike the apparent inclusion of intentional errors in maps, say, so that the owner of the map’s copyright could argue that the map had been illegally copied. The author wishes very much that he had kept the road map of Louisiana (where he grew up) that showed a road south from Venice, Louisiana, and a bridge across the Mississippi to reach Pilottown. No such road or bridge has ever existed; Pilottown is where the Mississippi River pilots meet the incoming vessels and take the conn on the way up the river to the Port of New Orleans, and where on the outward voyage they turn over the conn to the seagoing pilots. The “city” can only be reached by water; there is no road south from Venice and no bridge across the Mississippi.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In the 1992 movie “Sneakers” the cryptanalysis takes place on a computer screen, with blank spaces separating words. This was the cause of some serious derision among the various cryppies of my acquaintance.

  2. 2.

    We certainly admit that there could appear in plaintext something like “the letter b” but these are infrequent.

  3. 3.

    Years prior to Shannon’s work on entropy, Mark Twain published his humorous piece “A Plan for the Improvement of Spelling in the English Language”, part of which was to combine letters with similar purpose and pronunciation; this would have increased the entropy, although we are unaware that a formal computation has ever been done.

  4. 4.

    Brute force and ignorance.

References

  1. Cornell University, English letter frequency, http://pi.math.cornell.edu/~mec/2003-2004/cryptography/subs/frequencies.html

  2. Project Gutenberg, The Gutenberg Project, https://www.gutenberg.org

  3. R. W. Hamming, Coding and Information Theory, 2nd edn. (Prentice-Hall, Hoboken, 1986), p. 103ff

    Google Scholar 

  4. Natural Language Tool Kit, Brown Corpus, http://www.nltk.org

  5. The Crypto Museum, The Vernam cipher, https://www.cryptomuseum.com/crypto/vernam.htm. Accessed 24 Jan 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Duncan Buell .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Buell, D. (2021). Simple Ciphers. In: Fundamentals of Cryptography. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-73492-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-73492-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-73491-6

  • Online ISBN: 978-3-030-73492-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics