2. Transposition Ciphers
Transposition cipher – reorders (rearrange) symbols but does not disguise
them. It is also called permutation
With transposition, the cryptography aims for diffusion
◦ Widely spreading the information from the message or the key across the ciphertext
◦ Transpositions try to break established patterns
2
5. Transposition Ciphers
3. Columnar Transposition
Plaintext written in rows
Number of columns = key length
Key is used to number the columns
Ciphertext reads out by columns, starting with column whose key letter is
lowest
5
6. Transposition Ciphers
3. Columnar Transposition
For example:
◦ Assume we used ZEBRAS as keyword
◦ Plaintext (M): WE ARE DISCOVERED FLEE AT
ONCE
◦ Key (K): 6 3 2 4 1 5
◦ Ciphertext(C): EVLNE ACDTK ESEAQ ROFOJ DEECU
WIREE
6