Cryptography: Transposition Cipher

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
- WELCOME TO A LESSON ON TRANSPOSITION CIPHERS. ONE APPROACH TO CRYPTOGRAPHY IS USE OF A TRANSPOSITION CIPHER WHERE A TRANSPOSITION CIPHER IS ONE IN WHICH THE ORDER THE CHARACTERS IS CHANGED TO OBSCURE THE MESSAGE. AN EARLY VERSION OF A TRANSPOSITION CIPHER WAS AN -- IN WHICH PAPER WAS WRAPPED AROUND A STICK AND THE MESSAGE WAS WRITTEN. ONCE UNWRAPPED, THE MESSAGE WOULD BE UNREADABLE UNTIL THE MESSAGE WAS WRAPPED AROUND A SIMILAR SIZED STICK AGAIN. ONE MODERN TRANSPOSITION CIPHER IS DONE BY WRITING THE MESSAGE IN ROWS, THEN FORMING THE ENCRYPTED MESSAGE FROM THE TEXT IN COLUMNS. AS AN EXAMPLE, LET'S ENCRYPT THE MESSAGE, "MEET AT 3:00 P.M. TODAY AT THE USUAL LOCATION" USING ROWS OF SIX CHARACTERS. SO IF EACH ROW HAS SIX CHARACTERS, THAT MEANS WE SHOULD FORM A TABLE WITH SIX COLUMNS, ONE, TWO, THREE, FOUR, FIVE, SIX. NOTICE HOW EACH ROW WILL HAVE SIX CHARACTERS. NEXT WE'D WRITE THE MESSAGE FROM LEFT TO RIGHT COMPLETING EACH ROW. NOTICE HERE WE HAVE MEET AT 3:00 P.M. TODAY AT THE USUAL LOCATION. AND NOW TO ENCRYPT THE MESSAGE, WE'D WRITE THE CHARACTERS USING THE COLUMNS. SO USING THE COLUMNS, THE ENCRYPTED MESSAGE OR ENCODED MESSAGE WOULD BE M, T, M, "A,", S, C, WHICH WE SEE HERE, E, H, T, T, U, "A," WE SEE HERE, E, R, O T, "A," T HERE, T, E, D, H, L, "I" HERE "A," E, "A," E, L, O, AND FINALLY T, P, Y, U, O, N. BUT THERE IS ONE MORE THING. THE SPACES WOULD BE REMOVED OR REPOSITIONED TO HIDE THE SIZE OF THE TABLE USED SINCE THAT IS THE ENCRYPTION KEY IN THIS MESSAGE. SO WE WOULDN'T LEAVE IT IN THIS FORM HERE BECAUSE IF LEFT IN THIS FORM, IT COULD TELL THE MESSAGE WAS ENCRYPTED USING ROWS OF SIX CHARACTERS. LET'S TAKE A LOOK AT ANOTHER EXAMPLE, LET'S DECRYPT THE MESSAGE GIVEN HERE IF IT WAS ENCRYPTED USING A TABULAR TRANSPOSITION CIPHER WITH ROWS OF LINK FOUR. SO BECAUSE WE KNOW IT WAS FORMED WITH ROWS OF LINK FOUR CHARACTERS, WE'D FORM A TABLE WITH FOUR COLUMNS WHICH WE SEE HERE BUT BEFORE WE DECRYPT THE MESSAGE, WE DO HAVE TO KNOW HOW MANY ROWS THERE WERE. SO WE'LL FIND THE TOTAL NUMBER OF CHARACTERS WHICH IS 3 x 10 + THESE EXTRA TWO ARE 32 CHARACTERS. WE'RE GOING TO DIVIDE BY THE NUMBER OF CHARACTERS PER ROW WHICH IS FOUR, 32 DIVIDED BY 4 = 8 WHICH MEANS WE NOW KNOW WE'LL HAVE EIGHT ROWS. SO, ONE, TWO, THREE, FOUR, FIVE, SIX, SEVEN, EIGHT. SO WHEN DECRYPTING A MESSAGE USING THIS METHOD, IT IS IMPORTANT TO ALWAYS FIND OUT HOW MANY ROWS WE HAVE AND NOW BECAUSE THIS WAS FORMED BY READING THE CHARACTERS OFF IN COLUMNS, WE'LL WRITE THESE DOWN IN COLUMN ONE, TWO, THREE AND FOUR. TO HELP US DO THIS, LET'S COUNT OFF EIGHT CHARACTERS, SO WE HAVE THREE, SIX, SEVEN, EIGHT, FOUR, SEVEN, EIGHT, TWO, FIVE, EIGHT, AND THEN EIGHT AGAIN. SO THE FIRST COLUMN WILL CONSIST OF THESE CHARACTERS. THESE WILL BE IN THE SECOND COLUMN, THESE WILL BE IN THIRD AND SO ON. HERE WE HAVE "A," E, S, E, "A," O, O, "I." HERE WE HAVE T, V, U, "I," N, N, N, N, FOLLOWED BY E, E, R, L, C, F, T, E AND FINALLY L, N, V, L, E, R, L, S. NOW TO DECRYPT THIS, WE'LL READ THIS OFF GOING ROW BY ROW. SO THE ORIGINAL MESSAGE WAS AT 11, SURVEILLANCE ON FRONT LINES. AGAIN THE MESSAGE WAS AT 11, SURVEILLANCE ON FRONT LINES. MORE COMPLEX VERSIONS OF THIS ROWS AND COLUMN BASED TRANSPOSITION CIPHER CAN BE CREATED BY SPECIFYING AN ORDER IN WHICH THE COLUMNS SHOULD BE RECORDED. FOR EXAMPLE THE METHOD COULD SPECIFY THAT AFTER WRITING THE MESSAGE OUT IN ROWS, THAT YOU SHOULD RECORD THE THIRD COLUMN THEN THE FOURTH COLUMN, THEN THE FIRST, THEN THE SECOND. THIS ADDS ADDITIONAL COMPLEXITY THAT WOULD MAKE IT HARDER TO MAKE IT A BRUTE FORCE ATTACK. TO MAKE THE ENCRYPTION KEY EASIER TO REMEMBER, A WORD COULD BE USED. FOR EXAMPLE, IF THE KEY WORD WAS MATH, IT WOULD SPECIFY THAT ROWS SHOULD HAVE FOUR CHARACTERS EACH BECAUSE THERE IS FOUR LETTERS IN THE WORD. THE ORDER OF THE LETTERS IN THE ALPHABET WOULD DICTATE WHICH ORDER TO READ THE COLUMNS IN. SINCE "A" THE SECOND LETTER IN THE WORD, IS THE EARLIEST LETTER IN THE ALPHABET FROM THE WORD MATH, THE SECOND COLUMN WOULD BE USED FIRST FOLLOWED BY THE FOURTH COLUMN BECAUSE THAT'S H, THEN THE FIRST COLUMN BECAUSE OF THE M, THEN THE LAST COLUMN WOULD BE THE THIRD COLUMN BECAUSE OF THE T. LET'S TAKE A LOOK AT TWO MORE EXAMPLES. WE WANT TO ENCRYPT THE MESSAGE GIVEN HERE USING A TABULAR TRANSPOSITION CIPHER WITH ENCRYPTION KEY MAINE, IF NECESSARY PAD THE MESSAGE WITH "A'S." NOTICE HERE THERE ARE FIVE LETTERS IN MAINE, SO WE BEGIN BY MAKING ROWS OF FIVE CHARACTERS SO WE'LL HAVE FIVE COLUMNS, ONE, TWO, THREE, FOUR, FIVE. NOW WE'LL WRITE THE MESSAGE OUT IN ROWS. SO WE HAVE AT 4, SURVEILLANCE ON ENEMY CAMP, WE HAVE ONE EXTRA CHARACTER HERE WE FILL WITH "A" THAT WAY EACH ROW HAS EXACTLY FIVE CHARACTERS. BUT NOW WE'RE NOT GOING TO READ THE ROWS OFF FROM ROW ONE TO ROW FIVE, WE'RE GOING TO BASE IT UPON THE LETTERS IN THE WORD MAINE. IF WE ORDER THESE LETTERS ALPHABETICALLY NOTICE "A" WOULD BE THE FIRST LETTER WHICH REPRESENTS COLUMN TWO SO WE'LL READ OFF COLUMN TWO FIRST. THE NEXT LETTER WOULD BE E, THE FIFTH LETTER, SO WE'LL READ OFF COLUMN FIVE NEXT. THE NEXT LETTER IN THE ALPHABET WOULD BE "I" WHICH IS THE THIRD LETTER, SO WE'LL READ OFF COLUMN THREE FOLLOWED BY THE LETTER M WHICH REPRESENTS THE FIRST COLUMN SO THE FIRST COLUMN WOULD BE READ OFF FOURTH AND THEN FINALLY N IS THE LAST LETTER ALPHABETICALLY SO THE LAST COLUMN WILL BE COLUMN FOUR. SO WE'LL FIRST READ OFF COLUMN TWO, THIS COLUMN HERE, SO OUR ENCRYPTED MESSAGE WILL BE T, S, "I," C, N, "A," NEXT WE'LL READ OFF COLUMN FIVE, SO WE'LL HAVE U, V, "A," N, Y, "A," NEXT COLUMN THREE, SO WE HAVE F, U, L, E, E, M, THEN COLUMN ONE SO WE HAVE "A," R, E, N, E, C AND FINALLY COLUMN FOUR. SO WE HAVE O, R, L, O, M, P. AND AGAIN WE, AGAIN AS OUR LAST STEP, WE SHOULD REMOVE THE SPACES, REGROUP THESE LETTERS DIFFERENTLY NOT TO GIVE AWAY HOW THIS WAS ENCRYPTED. AS OUR LAST EXAMPLE, LET'S DECRYPT THE MESSAGE GIVEN HERE IF IT WAS ENCRYPTED USING A TABULAR TRANSPOSITION CIPHER WITH ENCRYPTION KEY PLAN. SO THIS TELLS US THAT WE HAVE FOUR CHARACTERS PER ROW, WE HAVE HERE, SO WE HAVE FOUR COLUMNS. NEXT WE HAVE TO DETERMINE HOW MANY ROWS WE WOULD HAVE BASED UPON THE NUMBER OF CHARACTERS WHICH IS 20, SO WE'LL TAKE 20, DIVIDE BY THE NUMBER OF CHARACTERS PER ROW WHICH IS FOUR, AND THEREFORE WE CAN SEE WE'LL HAVE A TOTAL OF FIVE ROWS EACH CONTAINING FOUR CHARACTERS. SO, ONE, TWO, THREE, FOUR, FIVE AND NOW WE'RE GOING TO COMPLETE THE COLUMNS USING THESE CHARACTERS BASED UPON THE LETTERS IN PLAN. SO ALPHABETICALLY "A" WOULD COME FIRST, SO WE'LL COMPLETE COLUMN 3 FIRST. NEXT WOULD BE THE LETTER L SO WE'LL COMPLETE COLUMN TWO, NEXT WOULD BE N, SO WE'LL COMPLETE COLUMN FOUR, AND THEN FINALLY WE'LL COMPLETE THE FIRST COLUMN FOR P LAST. AND AGAIN BECAUSE EACH COLUMN HAS FIVE CHARACTERS, LET'S BLOCK THIS INTO FIVES SO WE'D HAVE FIRST FIVE CHARACTERS HERE, THE NEXT FIVE, THE NEXT FIVE AND THE LAST FIVE. THE FIRST COLUMN WE'LL COMPLETE WILL BE COLUMN THREE BECAUSE OF THE "A" SO NOTICE HOW WE HAVE N, "A," C, S, M IN COLUMN THREE. THE SECOND COLUMN WE'LL COMPLETE WILL BE COLUMN TWO BECAUSE OF THE L, SO WE'LL HAVE T, N, "A," "A," "A" WHICH WE SEE HERE. THE THIRD WILL BE THE FOURTH COLUMN BECAUSE OF THE N, WE'LL HAVE O, T, K, E, P AND THEN FOURTH WILL BE THE FIRST COLUMN BECAUSE OF THE P WHICH WILL BE "A," O, T, B, C. AND NOW WE'LL USE THE ROWS TO DECRYPT THE MESSAGE. THE ORIGINAL MESSAGE WAS AT NOON, ATTACK BASE CAMP. UNFORTUNATELY, SINCE THE TRANSPOSITION CIPHER DOES NOT CHANGE THE FREQUENCY OF INDIVIDUAL LETTERS, IT IS STILL SUSCEPTIBLE TO FREQUENTLY ANALYSIS THOUGH THE TRANSPOSITION DOES ELIMINATE INFORMATION FROM LETTER PAIRS. I HOPE YOU FOUND THIS LESSON HELPFUL.
Info
Channel: Mathispower4u
Views: 164,905
Rating: undefined out of 5
Keywords: Cryptography, cryptology, transposition, rows, columns, cipher, code, message, decrypt, encrypt, math, society, james, sousa, mathispower4u
Id: sHsnH1u03e4
Channel Id: undefined
Length: 10min 23sec (623 seconds)
Published: Thu Oct 10 2013
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.