Straddling checkerboard

Straddling checkerboard

In cryptography, a straddling checkerboard is a device for converting an alphabetic plaintext into digits whilst simultaneously achieving fractionation (a simple form of information diffusion) and homophony (a simple method for suppressing peaks of the frequency distribution). It also is known as a monome-dinome cipher.

A straddling checkerboard is set up something like this:

01234 56789
ET AO N RIS
2BCDFG HJKLM
6PQ/UV WXYZ.

The first row is set up with the eight highest frequency letters (mnemonic ESTONIA-R), leaving two blank spots. It has no row label. The second and third rows are labelled with whichever two digits didn't get a letter in the top row, and then filled out with the rest of the alphabet. (This can be scrambled by a key word, or simply done in order - relying on another stage of the cipher for security). Since there are 30 slots in our grid, and we missed two letters in the first row, there will end up being two spare in the other rows. It doesn't matter where these spares go, so long as sender and receiver use the same system.

To encipher, a letter on the top row is simply replaced by the number labelling its column. Letters on the other rows are replaced by their row number, then column number. Like so:

ATTACK ATDAWN
3 1 1 3 21273 1 22 3 655

The resulting message, 3113212731223655, may be sent directly (if the table was set up with a key word), but usually is first input into a second cipher stage, such as transposition or substitution. As a simple example, we will add a secret key number (say, 0452) by non-carrying addition:

3113 2127 3122 3655
+ 0452 0452 0452 0452
= 3565 2579 3574 3007

then use the same straddling checkerboard to turn it back into letters:

3565257 93574 3007
ANWHR SANRO AEER

Deciphering is simply the reverse of this process. Although the size of groups can vary, deciphering is unambiguous because whenever the next element to be deciphered starts with a 2 or a 6, it is a pair; otherwise, it is a singleton.

Ciphers that use a straddling checkerboard are the VIC cipher and [http://users.telenet.be/d.rijmenants/en/secom.htm SECOM]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Nihilist cipher — In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher originally used by Russian Nihilists in the 1880s to organize terrorism against the czarist regime. The term is sometimes extended to several… …   Wikipedia

  • One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit …   Wikipedia

  • Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… …   Wikipedia

  • Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… …   Wikipedia

  • ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev …   Wikipedia

  • Caesar cipher — The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the p …   Wikipedia

  • Cryptogram — For other uses, see Cryptogram (disambiguation). Not to be confused with cryptogam, the plants which reproduce by using spores. Example cryptogram. A cryptogram is a type of puzzle which consists of a short piece of encrypted text. Generally the… …   Wikipedia

  • Index of coincidence — In cryptography, coincidence counting is the technique (invented by William F. Friedman[1]) of putting two texts side by side and counting the number of times that identical letters appear in the same position in both texts. This count, either as …   Wikipedia

  • Book cipher — A book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden… …   Wikipedia

  • Classical cipher — A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical cipher is a type of cipher that was used… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”