Dvorak encoding

Dvorak encoding

Dvorak encoding is a type of encoding based on the differences in layout of a QWERTY keyboard and a Dvorak keyboard. There are two main variations: One is achieved by typing in the Dvorak layout on a QWERTY keyboard, and the other is similarly achieved by typing in the QWERTY layout on a Dvorak keyboard. This effectively makes Dvorak encoding into a monoalphabetic substitution cipher like ROT13 and the Caesar Cipher, since each one character translates to one other character in a consistent pattern.

Several layers of Dvorak encoding may be added on top of each other for a variance of the translation table, which adds an obfuscating effect. The one where the Dvorak layout is used on a QWERTY keyboard can be added to the one where a QWERTY layout is used on a Dvorak keyboard, since they are not each other's opposites in terms of decoding. When decoding, the correct order of the severally applied translation tables must happen in the correct order. If encoding or decoding in one direction (for example, from Dvorak to QWERTY), it only takes 210 layers of encoding for the original Dvorak string to be encoded back to itself.[1]

Dvorak encoding, like other monoalphabetic encryption ciphers, is a very simple encoding and may provide a weak level of security. It may be useful in combination with other encodings. The security involved is in no way comparable to modern encryption algorithms which advocate security, and the advantages with this encoding can as such be summarised to encompass:

  • Dvorak encoding is an unavoidable consequence of typing on a non-Dvorak keyboard using the Dvorak layout, for instance when using a software driver to compensate for the lack of rerouting of signals in the keyboard. This is the most common practice because it doesn't require a purchase of a special Dvorak keyboard.
  • Dvorak encoding can be typed real-time by anyone proficient with the Dvorak keyboard layout, allowing for very fast encoding by hand.
  • Dvorak encoding may make it harder for physically present surveillance to find out what the user is typing since it happens very fast. In some cases, it can even be hard for a physical keylogger to probably guess what is being written, but since most keyloggers save the logged data for later retrieval and analysis, the original cryptographic weakness of the encoding applies.

Variations in the use of left- and right-hand Dvorak keyboard layouts also provide an additional subset of encodings. The left and right variants are slightly better because the number keys are changed as well as the character keys – in this respect, the left-hand Dvorak encoding changes the most keys. Notably, the a and m keys never change in the default Dvorak keyboard layout.

Use in literature

In the hacker fiction book Stealing the Network: How to Own an Identity, a hacker by the name of Bl@ckTo\/\/3r effectively uses the Dvorak keyboard layout as a layer of confusion when intruders are trying to get into his computer.

References

  1. ^ "Dvorak Fun". Angela Gong. 2011-07-01. http://www.its.caltech.edu/~agong/dvorak.html. Retrieved 2011-07-15. 

Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Dvořák — or Dvorak may refer to: Contents 1 People 1.1 Dvořák or Dvorak 1.2 Dvorakova or Dvořáková …   Wikipedia

  • Dvorak Simplified Keyboard — The modern Dvorak Simplified Keyboard (US layout) Typing a text excerpt at 115 WPM with the Canadian French Dvorak keyboard layout. The Dvorak Simplified Keyboard is a k …   Wikipedia

  • Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… …   Wikipedia

  • Keyboard layout — QWERTY keyboard on a laptop. A keyboard layout is any specific mechanical, visual, or functional arrangement of the keys, legends, or key–meaning associations (respectively) of a computer, typewriter, or other typographic keyboard. Mechanical… …   Wikipedia

  • Vorbis — This article is about the audio compression codec. For the Discworld character, see Discworld characters. Vorbis Xiph.org Logo Filename extension .ogg .oga …   Wikipedia

  • Mouse (computing) — A computer mouse with the most common standard features: two buttons and a scroll wheel, which can also act as a third button In computing, a mouse is a pointing device that functions by detecting two dimensional motion relative to its supporting …   Wikipedia

  • ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev …   Wikipedia

  • Apple II series — The Apple II (often written as Apple ] [ or Apple //) was the first mass produced microcomputer product, manufactured by Apple Computer (now Apple Inc.). It was among the first home computers on the market, and became one of the most recognizable …   Wikipedia

  • Caron — Hacek redirects here. For the group of bacteria, see HACEK endocarditis. For other uses, see Caron (disambiguation). ̌ Caron Diacritics accent …   Wikipedia

  • 5-HT2A receptor — The mammalian 5 HT2A receptor is a subtype of the 5 HT2 receptor which belongs to the serotonin receptor family and is a G protein coupled receptor (GPCR).cite journal | author = Cook EH, Fletcher KE, Wainwright M, Marks N, Yan SY, Leventhal BL | …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”