0% found this document useful (0 votes)
2K views

The Double Transposition Cipher

The Double Transposition Cipher was a secure cipher used during World War II by both Allies and Axis forces. It involved encrypting a message using columnar transposition encryption twice, with potentially different keys, making it difficult to break without multiple ciphertexts. While secure if only one message was sent per key, it required care to implement correctly without introducing decryption errors.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views

The Double Transposition Cipher

The Double Transposition Cipher was a secure cipher used during World War II by both Allies and Axis forces. It involved encrypting a message using columnar transposition encryption twice, with potentially different keys, making it difficult to break without multiple ciphertexts. While secure if only one message was sent per key, it required care to implement correctly without introducing decryption errors.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

The Double Transposition Cipher

Back to Crack the Ciphers


This was one of the most secure hand ciphers used in the Second World War. It wa
s used by both the Allies and the Axis, and served both well. Its main weakness
was that if the attacker intercepted two or more messages of the same length usi
ng the same key, they could be compared by a tedious process known as "multiple
anagramming," finding solutions to both. This weakness was not important if only
one message was sent using each key. It had an additional problem: Executing it
correctly requires considerable care, leading to difficulties in decryption if
an error is made at a sensitive point. In the United States, information about c
ryptanalysis of the cipher remained classified until a few years ago.
Double Transposition consists of two applications of columnar transposition to a
message. The two applications may use the same key for each of the two steps, o
r they may use different keys.
Columnar transposition works like this: First pick a keyword, such as DESCRIBE,
then write the message under it in rows:
D E S C R I B E
---------------
Y O U R M O T H
E R W A S A H A
M S T E R A N D
Y O U R F A T H
E R S M E L T O
F E L D E R B E
R R I E S

Now number the letters in the keyword in alphabetical order.


3 4 8 2 7 6 1 5
D E S C R I B E
---------------
Y O U R M O T H
E R W A S A H A
M S T E R A N D
Y O U R F A T H
E R S M E L T O
F E L D E R B E
R R I E S

Then read the cipher off by columns, starting with the lowest-numbered column: C
olumn 1 is THNTTB, followed by RAERMDE YEMYEFR ORSORER HADHOE OAAALR MSRFEES UWT
USLI. This completes the first columnar transposition. Next, select and number a
second keyword, and write this intermediate ciphertext under it in rows:
2 7 1 8 9 5 4 6 3
C O A S T L I N E
-----------------
T H N T T B R A E
R M D E Y E M Y E
F R O R S O R E R
H A D H O E O A A
A L R M S R F E E
S U W T U S L I

Finally, take it off by columns again and put it into five-letter groups for tra
nsmission.
NDODR WTRFH ASEER AERMR OFLBE OERSA YEAEI
HMRAL UTERH MTTYS OSU

To decrypt a double transposition, construct a block with the right number of ro


ws under the keyword, blocking off the short columns. Write the cipher in by col
umns, and read it out by rows. Lather, rinse, repeat.

You might also like