CryptologyCryptanalysis of a Columnar TranspositionExample |
|
AEIMC TLITN SAAAV TNANO UHISA LPLII LWPTX OONMH WHNFU DUERE WMRSE ACATA OHSTO MSTAS ESAAD TNART TEOEN SIAAS POVTE EEEMC SALRI TNSET ROKMA LMAET GEUTS TRORN FHTVO EAAWT GAARN ELLES TNLGE HSHOC EHSTA AFIHT NNEYL OSRAH SLONI IAFOS EYHTS U
We follow the hypothesis that the ciphertext originates from a transposition of an English plaintext. The frequencies of the single letters support this hypothesis.
The length of the ciphertext is 196. The integer division by assumed key lengths 2, 3, 4, … are
196 = 98 × 2and so on.
196 = 65 × 3 + 1
196 = 49 × 4
196 = 39 × 5 + 1
196 = 32 × 6 + 4
196 = 28 × 7
196 = 24 × 8 + 4
Because 196 = 98 × 2 we have to consider two columns of length 98:
AEIMCTLITNSAAAVTNANOUHISALPLIILWPTXOONMHWHNFUDUEREWMRSEACATAOHSTOMSTASESAADTNARTTEOENSIAASPOVTEEEE MCSALRITNSETROKMALMAETGEUTSTRORNFHTVOEAAWTGAARNELLESTNLGEHSHOCEHSTAAFIHTNNEYLOSRAHSLONIIAFOSEYHTSUEven the first 30 bigrams give cBLW rates of 1.58 and (in reverse order) 1.63 that immediately let us reject the key length 2.
Because 196 = 65 × 3 + 1 we have to consider one column of length 66 and two columns of length 65. We pick the first and the last 65 letters from the ciphertext:
AEIMCTLITNSAAAVTNANOUHISALPLIILWPTXOONMHWHNFUDUEREWMRSEACATAOHSTO HTVOEAAWTGAARNELLESTNLGEHSHOCEHSTAAFIHTNNEYLOSRAHSLONIIAFOSEYHTSUMoving the first of these along the ciphertext we get one good cBLW rate:
ATAOHSTOMSTASESAADTNARTTEOENSIAASPOVTEEEEMCSALRITNSETROKMALMAETGE, cBLW rate: 1.48This is at position 58, absolutely incompatible with the column lengths of 66 or 65. Therefore we reject this possibility. (In fact if we had started with position 66 as the general method suggests, we hadn't encountered this »solution« at all!)
If we do the same for the last 65 letters we find no cBLW rate greater than 1.72. Thus we may reject 3 as the key length.
Because 196 = 49 × 4 we have to consider four columns of length 49:
AEIMCTLITNSAAAVTNANOUHISALPLIILWPTXOONMHWHNFUDUER EWMRSEACATAOHSTOMSTASESAADTNARTTEOENSIAASPOVTEEEE MCSALRITNSETROKMALMAETGEUTSTRORNFHTVOEAAWTGAARNEL LESTNLGEHSHOCEHSTAAFIHTNNEYLOSRAHSLONIIAFOSEYHTSUWe could compare these columns pairwise. But let's consistently follow the general method and pick the first and the last 49 letters. Moving these along the ciphertext we get one good cBLW rate for each, and both of them at impossible positions.
Therefore we also reject 4 as possible key length.
Integer division yields 196 = 39 × 5 + 1. We have to consider one column of length 40 and four columns of length 39. The first and the last 39 letters from the ciphertext are:
AEIMCTLITNSAAAVTNANOUHISALPLIILWPTXOONM HOCEHSTAAFIHTNNEYLOSRAHSLONIIAFOSEYHTSUMoving the first of these along the ciphertext we get one good cBLW rate:
CATAOHSTOMSTASESAADTNARTTEOENSIAASPOVTE, cBLW rate: 1.92This is at position 57, incompatible with the column lengths of 40 or 39. Therefore we reject this finding.
If we do the same for the last 39 letters we find no cBLW rate greater than 1.77. Thus we may also reject 5 as the key length.
Integer division yields 196 = 32 × 6 + 4. We have to consider four columns of length 33 and two columns of length 32. The first and the last 32 letters from the ciphertext are:
AEIMCTLITNSAAAVTNANOUHISALPLIILW AAFIHTNNEYLOSRAHSLONIIAFOSEYHTSUMoving the first of these along the ciphertext we get one good cBLW rate:
CATAOHSTOMSTASESAADTNARTTEOENSIA, cBLW rate: 1.93again at position 57, incompatible with the column lengths of 33 or 32. Therefore we reject this finding.
If we do the same for the last 32 letters we find no cBLW rate greater than 1.77. Thus we may also reject 6 as the key length.
Integer division yields 196 = 28 × 7. We have to consider seven columns of length 28. The first and the last 28 letters from the ciphertext are:
AEIMCTLITNSAAAVTNANOUHISALPL HTNNEYLOSRAHSLONIIAFOSEYHTSUMoving the first of these along the ciphertext we get two good results:
CATAOHSTOMSTASESAADTNARTTEOE, cBLW rate: 1.89 TASESAADTNARTTEOENSIAASPOVTE, cBLW rate: 1.81The first one is at position 57, perfectly compatible with the column length 28. The second one is at the incompatible position 68.
If we do the same for the last 28 letters we even find two good results:
AEIMCTLITNSAAAVTNANOUHISALPL, Pos = 1, cBLW rate: 1.84 AADTNARTTEOENSIAASPOVTEEEEMC, Pos = 73, cBLW rate: 1.80The first of these occurs at the perfectly compatible position 1, the second one at the incompatible position 73.
Therefore we have a promising finding that is worth of pursuit.
The columns we identified as our favorites together yield the constellation:
(7) HTNNEYLOSRAHSLONIIAFOSEYHTSU (1) AEIMCTLITNSAAAVTNANOUHISALPL (3) CATAOHSTOMSTASESAADTNARTTEOEand the remaining columns are:
(2) IILWPTXOONMHWHNFUDUEREWMRSEA (4) NSIAASPOVTEEEEMCSALRITNSETRO (5) KMALMAETGEUTSTRORNFHTVOEAAWT (6) GAARNELLESTNLGEHSHOCEHSTAAFIWe try the possible neighbors of (3):
(3) with (2) has cBLW rate 1.35 ---> NO (3) with (4) has cBLW rate 1.45 ---> NO (3) with (5) has cBLW rate 1.87 ---> YES (3) with (6) has cBLW rate 1.43 ---> NOThis suggests the extended constellation:
(7) HTNNEYLOSRAHSLONIIAFOSEYHTSU (1) AEIMCTLITNSAAAVTNANOUHISALPL (3) CATAOHSTOMSTASESAADTNARTTEOE (5) KMALMAETGEUTSTRORNFHTVOEAAWTWe try possible neighbors of (5):
(5) with (2) has cBLW rate 1.91 ---> YES (5) with (4) has cBLW rate 1.59 ---> NO (5) with (6) has cBLW rate 1.17 ---> NOAgain we have a good continuation:
(7) HTNNEYLOSRAHSLONIIAFOSEYHTSU (1) AEIMCTLITNSAAAVTNANOUHISALPL (3) CATAOHSTOMSTASESAADTNARTTEOE (5) KMALMAETGEUTSTRORNFHTVOEAAWT (2) IILWPTXOONMHWHNFUDUEREWMRSEAFinally we try possible neighbors of (2):
(2) with (4) has cBLW rate 1.95 ---> YES (2) with (6) has cBLW rate 1.28 ---> NOThis gives the constellation:
(7) HTNNEYLOSRAHSLONIIAFOSEYHTSU (1) AEIMCTLITNSAAAVTNANOUHISALPL (3) CATAOHSTOMSTASESAADTNARTTEOE (5) KMALMAETGEUTSTRORNFHTVOEAAWT (2) IILWPTXOONMHWHNFUDUEREWMRSEA (4) NSIAASPOVTEEEEMCSALRITNSETROThe remaining column (6) fits at the end only.
Thus we have a solution:
(7) HTNNEYLOSRAHSLONIIAFOSEYHTSU (1) AEIMCTLITNSAAAVTNANOUHISALPL (3) CATAOHSTOMSTASESAADTNARTTEOE (5) KMALMAETGEUTSTRORNFHTVOEAAWT (2) IILWPTXOONMHWHNFUDUEREWMRSEA (4) NSIAASPOVTEEEEMCSALRITNSETRO (6) GAARNELLESTNLGEHSHOCEHSTAAFIor, written in row form,
HACKING TEAMISA NITALIA NMALWAR ECOMPAN YTHATSE LLSEXPL OITTOOL STOGOVE RNMENTS ASSUMET HATTHEN SAASWEL LASTHEG OVERNME NTSOFCH INARUSS IAANDAH ANDFULO FOTHERC OUNTRIE SHAVETH EIROWNS YSTEMST HATAREA TLEASTA SPOWERF ILETAOISplit into words this reads:
HACKING TEAM IS AN ITALIAN MALWARE COMPANY THAT SELLS EXPLOIT TOOLS TO GOVERNMENTS ASSUME THAT THE NSA AS WELL AS THE GOVERNMENTS OF CHINA RUSSIA AND A HANDFUL OF OTHER COUNTRIES HAVE THEIR OWN SYSTEMS THAT ARE AT LEAST AS POWERFUL [ETAOI]with a padding of 5 letters at the end.
The plaintext is from Bruce Schneier's Cryptogram, July 15, 2014.