Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Polyalphabetic cipher
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Multiple-substitution writing system cipher}} A '''polyalphabetic cipher''' is a [[substitution cipher|substitution]], using multiple substitution alphabets. The [[Vigenère cipher]] is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The [[Enigma machine]] is more complex but is still fundamentally a polyalphabetic substitution cipher. ==History== The work of [[Al-Qalqashandi]] (1355–1418), based on the earlier work of [[Ibn al-Durayhim]] (1312–1359), contained the first published discussion of the substitution and transposition of ciphers, as well as the first description of a polyalphabetic cipher, in which each plaintext letter is assigned more than one substitute.<ref>{{cite book |last1=Lennon |first1=Brian |title=Passwords: Philology, Security, Authentication |date=2018 |publisher=[[Harvard University Press]] |isbn=9780674985377 |page=26 |url=https://books.google.com/books?id=jbpTDwAAQBAJ&pg=PT26}}</ref> However, it has been claimed that polyalphabetic ciphers may have been developed by the Arab cryptologist [[Al Kindi]] (801–873) centuries earlier.<ref>{{Citation |last=Maclean |first=Donald |title=Al-Kindi |date=20 February 2012 |url=http://donaldmaclean.wordpress.com/2012/02/20/al-kindi/ |access-date=13 April 2012}}</ref> The [[Alberti cipher]] by [[Leon Battista Alberti]] around 1467 was an early polyalphabetic cipher. Alberti used a mixed alphabet to encrypt a message, but whenever he wanted to, he would switch to a different alphabet, indicating that he had done so by including an uppercase letter or a number in the cryptogram. For this encipherment Alberti used a decoder device, his ''[[cipher disk]]'', which implemented a polyalphabetic substitution with mixed alphabets. [[Johannes Trithemius]]—in his book ''Polygraphiae libri sex'' (Six books of polygraphia), which was published in 1518 after his death—invented a ''progressive key'' polyalphabetic cipher called the [[Trithemius cipher]].<ref>Johann Tritheim, ''Polygraphiae libri sex'' … (Basel, Switzerland: Michael Furter and Adam Petri, 1518), ''Liber quintus'' (fifth book), pages 461-462; the ''Recta transpositionis tabula'' (square table of transpositions, or "Vigenère table") appears on [http://lcweb2.loc.gov/cgi-bin/ampage?collId=rbc3&fileName=rbc0001_2009fabyan12345page.db&recNum=470 page 463.]</ref> Unlike Alberti's cipher, which switched alphabets at random intervals, Trithemius switched alphabets for each letter of the message. He started with a [[tabula recta]], a square with 26 letters in it (although Trithemius, writing in [[Latin]], used 24 letters). Each alphabet was shifted one letter to the left from the one above it, and started again with A after reaching Z (see table). [[File:Vigenère square shading.svg|thumbnail|right|320px|Tabula recta]] Trithemius's idea was to encipher the first letter of the message using the first shifted alphabet, so A became B, B became C, etc. The second letter of the message was enciphered using the second shifted alphabet, etc. Alberti's cipher disk implemented the same scheme. It had two alphabets, one on a fixed outer ring, and the other on the rotating disk. A letter is enciphered by looking for that letter on the outer ring, and encoding it as the letter underneath it on the disk. The disk started with A underneath B, and the user rotated the disk by one letter after encrypting each letter. The cipher was trivial to break, and Alberti's machine implementation not much more difficult. ''Key progression'' in both cases was poorly concealed from attackers. Even Alberti's implementation of his polyalphabetic cipher was rather easy to break (the capitalized letter is a major clue to the cryptanalyst). For most of the next several hundred years, the significance of using multiple substitution alphabets was missed by almost everyone. Polyalphabetic substitution cipher designers seem to have concentrated on obscuring the choice of a few such alphabets (repeating as needed), not on the increased security possible by using many and never repeating any. The principle (particularly Alberti's unlimited additional substitution alphabets) was a major advance—the most significant in the several hundred years since [[frequency analysis]] had been developed. A reasonable implementation would have been (and, when finally achieved, was) vastly harder to break. It was not until the mid-19th century (in [[Charles Babbage|Babbage]]'s secret work during the [[Crimean War]] and [[Friedrich Kasiski]]'s generally equivalent public disclosure some years later) that [[cryptanalysis]] of well-implemented polyalphabetic ciphers got anywhere at all. ''See'' [[Kasiski examination]]. [[Abramo Colorni]] described polyalphabetic ciphers in his 1593 work, ''Scotographia''.<ref>{{Citation |last=Strasser |first=Gerhard F. |title=The rise of cryptology in the European Renaissance |date=2007 |work=The History of Information Security |pages=277–325 |url=https://linkinghub.elsevier.com/retrieve/pii/B9780444516084500122 |access-date=2024-10-20 |publisher=Elsevier |language=en |doi=10.1016/b978-044451608-4/50012-2 |isbn=978-0-444-51608-4}}</ref> ==Notes== {{reflist}} == References == * {{Citation | last = Alberti | first = Leon Battista | author-link = Leon Battista Alberti | title = A Treatise on Ciphers, trans. A. Zaccagnini. Foreword by [[David Kahn (writer)|David Kahn]] | place = Torino | publisher = Galimberti | year = 1997 }} * {{Citation | last = Churchhouse | first = Robert | title = Codes and Ciphers: Julius Caesar, the Enigma and the Internet | place = Cambridge | publisher = Cambridge University Press | year = 2002 | isbn = 978-0-521-00890-7 | url-access = registration | url = https://archive.org/details/codesciphersjuli0000chur }} * {{Citation | last = Gaines | first = Helen Fouché | author-link = Helen Fouché Gaines | title = Cryptanalysis | publisher = Dover | year = 1939 | isbn = 0-486-20097-3 | url-access = registration | url = https://archive.org/details/cryptanalysis00hele }} == See also == * [[Topics in cryptography]] {{Cryptography navbox | classical}} {{DEFAULTSORT:Polyalphabetic Cipher}} [[Category:Classical ciphers]] [[es:Cifrado de Trithemius]] [[fr:Chiffrement de Vigenère]] [[tr:Vigenere tablosu]]
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Templates used on this page:
Template:Citation
(
edit
)
Template:Cite book
(
edit
)
Template:Cryptography navbox
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Search
Search
Editing
Polyalphabetic cipher
Add topic