Page 125 - The Secret War in the Italian front in WWI (1915-1918)
P. 125

CHAPTER SIX




                                                                          In   substitution  methods,   the
                                                                          plaintext  elements are  replaced  by
                                                                          another conventional sign. The most
                                                                          famous and ancient among them is
                                                                          the  Caesar  cipher, where alphabet
                                                                          letters are replaced by letters of the
                                                                          same  alphabet  shifted  by  a  fixed
                                                                          interval (A is replaced by C and B
                                                                          by D, etc.).  Those simple  mono-
                                                                          alphabetic  ciphers  were  mostly
                                                                          substituted,  as  far  back  as  the  15
                                                                                                          th
                                                                          century, by poly-alphabetic systems
                                                                          where replacing  alphabets  are
                                                                          numerous and chosen, for each letter
                                                                          or group of letters  of the original
                                                                          message, according to a numerical or
                                                                          alphabetic key. The first application
                                                                          of a poly-alphabetical code is Leon
                                                                          Battista Alberti’s ciphering disc and
                  6.12 Specimen of a Vigenère table                       perhaps the most famous one is
                                                                          the  Vigenère  square, including  26
                                                                          alphabets  written  out in different
                  rows, each alphabet shifted cyclically by one letter compared to the previous one (picture 6.12) .
                                                                                                         28
                  With  the  transposition  method, the  plaintext  elements  are scrambled  by different  means. For
                  instance, the letters of a plaintext dispatch are written line by line on a rectangle of an agreed size
                  and then read by columns for transcribing them in the cryptogram. In case one wishes to apply
                  a key made of an unordered digits sequence, the latter are written on the first line of the table,
                  which includes a columns number equal to the digits of the key. Then, columns are not read in a
                  sequence, but according to the numbers of the key. If the key is a word or a sentence, letters are
                  converted into numbers in accordance with the alphabetic progression, as shown in picture 6.13.
                  The transposition can also be multiple, namely repeated more than one time.

















                      6.13 Example of transposition cipher with a short mnemonic key




                  28  To encode by means of this table, a letter of the plaintext is read in the first line, and the corresponding letter of the key
                  is read in the first column on the left. The letter of the coded text is where the line and the column intersect. To decode, the
                  reverse proceeding is applied.


                                                                                                     123
   120   121   122   123   124   125   126   127   128   129   130