0% found this document useful (0 votes)
129 views10 pages

Transposition Tec

Transposition ciphers rearrange the position of letters in plaintext without changing the letters. This document describes the Rail Fence and Columnar Transposition ciphers. The Rail Fence cipher writes plaintext in diagonals of a virtual fence and reads in rows. Columnar Transposition writes plaintext in a grid by key-determined column order and reads out column-by-column. Double Columnar Transposition applies simple Columnar Transposition twice with different or same keys to strengthen security.

Uploaded by

asha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views10 pages

Transposition Tec

Transposition ciphers rearrange the position of letters in plaintext without changing the letters. This document describes the Rail Fence and Columnar Transposition ciphers. The Rail Fence cipher writes plaintext in diagonals of a virtual fence and reads in rows. Columnar Transposition writes plaintext in a grid by key-determined column order and reads out column-by-column. Double Columnar Transposition applies simple Columnar Transposition twice with different or same keys to strengthen security.

Uploaded by

asha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10

TRANSPOSITION CIPHER

 In the transposition technique the positions of


letters/numbers/symbols in plain text is changed with one
another.
1 2 3 4 5 6 4 2 1 6 3 5
M E E T M E T E M E E M
A F T E R P E F A P T R
A R T Y Y R A T

Visit for more Learning Resources


TRANSPOSITION CIPHER
TECHNIQUES
1. Rail Fence Cipher
2. Columnar Transposition
 Simple Columnar Transposition
 Double Columnar Transposition
1. RAIL FENCE CIPHER

• In this method plain text is written downwards on “rails


of fence “ , starting a new column when bottom is
reached.
• Algorithm:
1. First write down plain text message as a sequence of
diagonals.
2. Read the plain text written in first step as a sequence of
rows.
1. RAIL FENCE CIPHER

Example:
Plain text: come home tomorrow

Cipher text: cmhmtmrooeoeoorw


1. Simple Columnar Transposition
• In this method the message is written in rows of fixed length and
then read out column by column
• Column are selected in some in some scrambled order.
• The number of columns are defined by the length of key.
• Algorithm:
1. Write the plain text message row by row in a rectangle of predefined
size.(length of key)
2. Read the message column by column according t the selected order
thus obtained message is a cipher text.
1. SIMPLE COLUMNAR TRANSPOSITION
Key: ZEBRAS
plain text: welcome home
Order : 6 3 2 4 1 5

Cipher text: MLOEHCMWEOE


2.Double Columnar Transposition

• Single columnar transposition can be attack by guessing


possible column lengths.
• Therefore to make it stronger double transposition is used.
• This is simple columnar transposition technique applied twice.
• Here same key can be used for transposition or two different
keys can be used.
2.DOUBLE COLUMNAR
TRANSPOSITION

• First apply simple columnar transposition


Key: ZEBRAS
plain text: welcome home
Order : 6 3 2 4 1 5

Cipher text: MLOEHCMWEOE


2.DOUBLE COLUMNAR TRANSPOSITION

Cipher text 1: MLOEHCMWEOE


Order : 6 3 2 4 1 5

Final Cipher Text: COELWEOMMHE


Substitution Cipher Transposition Cipher
A substitution technique is one in which the In the transposition technique the positions
letters/number/symbols of plain text are of letters/numbers/symbols in plain text is
replaced by other letters/numbers/symbols. changed with one another.

It is easy to understand. It is difficult to understand.

Methods: Methods:
1.Caesar's Cipher 1.Rail Fence Cipher
2.Mono-Alphabetic Cipher 2.Columnar Transposition
3.A Homophonic Substitution Cipher  Simple Columnar
4.A Polygram Substitution Cipher
Transposition
5.A Polyalphabetic Substitution Cipher
 Double Columnar
1. e.g.Vigenere Cipher
6. One time Pad(Vernam Cipher) Transposition

For more detail contact us

You might also like