[JoGu]

Cryptology

I.7 Aperiodic Polyalphabetic Ciphers

a7Hzq .#5r<
kÜ\as TâÆK$
ûj(Ö2 ñw%h:
Úk{4R f~`z8
¤˜Æ+Ô „&¢Dø

Contents

  1. Running-Text Ciphers [mathematical version]
  2. Cryptanalytic Approaches to Running-Text Ciphers [mathematical version]
  3. Cryptanalysis According to FRIEDMAN
  4. Other Applications of Running-Text Analysis [mathematical version]
  5. Random Keys [mathematical version]
  6. Autokey Ciphers [mathematical version]
  7. Example: Cryptanalysis of an Autokey Cipher
  8. Similarity of Ciphers [mathematical version only]

Here is the complete mathematical part as PDF.


Overview Over Polyalphabetic Ciphers

Monoalphabetic
Substitution
Periodic
Polyalphabetic
Substitution
Aperiodic
Polyalphabetic
Substitution
Standard Alphabet Shift Cipher
(CAESAR)
BELLASO Cipher
(»Vigenère«)
Running-Text Cipher[*]
Non-Standard Alphabet General
Monoalphabetic
Substitution
PORTA's Disk
Cipher[*]
Stream Cipher[*]

[*] Not completely exact. The running-text cipher is only one (although the most important) special case of an aperiodic polyalphabetic substitution using the standard alphabet. An analogous statement holds for PORTA's disk cipher and a general periodic polyalphabetic substitution. In contrast by stream cipher we denote an even more general construct.


Author: Klaus Pommerening, 2000-Jan-14; last change: 2021-Jan-14.