This activity will introduce you to a selection of transposition ciphers.
The aim is to start building an understanding of encryption and decryption on a basic level before moving on to the more complex forms required for computing.
Transposition is the act of rearranging objects.
We could rearrange the letters in a word to create an anagram, this would be a basic example of letter transposition.
Exercise: Can you solve the below anagrams? Rearrange the letters to create a word related to computing.
To make the transposition of letters a cipher, it has to be done to a regular system or pattern known to both the sender and receiver of the message.
The above exercise was to highlight that one worded or short messages using any form of transposition cipher could be easily intercepted and read by a third party. Therefore, the message needs to be put into larger blocks of text to increase the difficulty of someone else reading it without knowing the system used.
We shall now look at a selection of different transposition ciphers
Let us start with the message 'The target is on the move Please advise action'
The Rail Fence cipher involves putting this message on a fence like structure, see below
T | . | . | . | a | . | . | . | t | . | . | . | n | . | . | . | m | . | . | . | P | . | . | . | s | . | . | . | v | . | . | . | a | . | . | . | o | . |
. | h | . | t | . | r | . | e | . | i | . | o | . | t | . | e | . | o | . | e | . | l | . | a | . | e | . | d | . | i | . | e | . | c | . | i | . | n |
. | . | e | . | . | . | g | . | . | . | s | . | . | . | h | . | . | . | v | . | . | . | e | . | . | . | a | . | . | . | s | . | . | . | t | . | . | . |
Notice how the message travels in a zig-zag across three rows or 'rails' in a fence-like pattern.
The next step is to then read off the letters to produce the following:
TatnmPsvaohtreioteoelaediecinegshveast
It is good practice to but code into easier to read blocks to avoid missing letters during decryption at the other end. So what we will send is this message:
Tatnm Psvao htrei oteoe laedi ecine gshve ast
For the receiver to decrypt this message they will need to know how many rails were used to reorganise the letters back to the original message.
Use the Rail Fence cipher to encrypt the following using the number of rails specified in the brackets.
Use the Rail Fence cipher to decrypt the following using the number of rails specified in the brackets.
Extension challenge:
Decrypt the following by putting it through a 3 rail cipher, twice. The underscores represent spaces in the original message.
Ys_oo thfpw ehaa_ rcr__ _ar__ lncee mfi_n tir_o aeuee
Extension:
Ys_oo thfpw ehaa_ rcr__ _ar__ lncee mfi_n tir_o aeuee -----> You_are_now_a_master_of_the_rail_fence_cipher
This is an ancient cipher technique recorded as being used by the Military of Greece and Sparta
It involved wrapping a strap of leather around a rod of a set thickness/number of sides to encrypt and decrypt messages on it
So if you needed to write the message 'We are surrounded Send reinforcements fast' using a four sided scytale (this is what the rod was called), you would wrap the leather around the scytale and write the message along each side. See below:
| | | | | | | | | | | | | | | | | | | | | | ||||||||||||
| | W | | | e | | | a | | | r | | | e | | | s | | | u | | | r | | | r | | | | | |||
_ | | | o | | | u | | | n | | | d | | | e | | | d | | | S | | | e | | | n | | | _ | | | |
| | | | d | | | r | | | e | | | i | | | n | | | f | | | o | | | r | | | c | | | |||
| | | | m | | | e | | | n | | | t | | | s | | | f | | | a | | | s | | | t | | | |||
| | | | | | | | | | | | | | | | | | | | | |
Then, when you unwrap the leather the message strip reads: "WodmeureanenrditeenssdffuSoarersrnct".
This cipher is not rewritten into blocks for simplification because then, the cipher would not work.
This method was good for high speed messages in military conflicts, however they were easy to identify as using the Scytale Cipher. This meant officers would have to vary the size and sides of their scytales regularly to stop messages being intercepted and decrypted too easily.
Extension Activity
These exercises show the theory behind the Scytale Cipher. Now, let's try it in practice. Get some long strips of paper and something to wrap them around to produce your own messages and then look at how easy or hard it is to find a different object that would allow your message to be read. How could you make it harder for the message to be cracked by someone else?
Coming Soon: Route cipher, Columnar transposition and Myszkowski transposition.