Cryptography Reference
In-Depth Information
The Attacking Method by Viaris
Let
the
probable
word
be
CHIFFRE,
and
the
ciphertext
VIWSHQTLUFT-
WDTZ.
The ciphering cylinder should consist of ten disks with the following settings (to be
read from top to bottom; connecting the first row with the last row to form a ring):
1 2 3 4 5 6 7 8 9 10
(disk number)
NXFVMSXUTP
BJCXXAIBVM
AELITGLJGG
CQGGYJFWFZ
RNBDKVCRAX
VPTEDRVVXI
UTRCBDWMES
HBATLQDLLV
DZDREOJFUL
QHVFFLPOKJ
WVMQRHSPJW
MIHSHCRKWC
KGSNQIEYQA
ZAOZAUGQST
PSZKWETGZU
LRUWJZOAON
FYIHUYAHID
TKXUIMYSBO
SFWYOBNIRB
OOJMGXMCHY
JCYJNWBZCR
GWPACNUXNK
YMEPZKHTMF
XDQOVFZNYE
IUNLSTQEDQ
ELKBPPKDPH
We look at the first generatrix, i.e., the ciphertext is read from one row underneath
the plaintext row. This turns 'C' into 'R', 'H' into 'D', 'I' into 'E', and so on, in
the first disk. We write this result in the first row of a matrix. We fill the second
row analogously for the second disk. We obtain the following 10 × 7 matrix:
1 RDETTVN
2 WVGOOYQ
Figure 3.8: Using the Viaris method to attack ciphering cylinders.
Search WWH ::




Custom Search