A Brief History of Cryptology and Cryptographic Algorithms by John F. Dooley
Author:John F. Dooley
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
5.4 Ciphers in the Great War: The Playfair
While all the combatants in World War I reverted to trench codes for much of their tactical communications, ciphers were not totally forgotten. In particular, the British used a field cipher as their tactical communications system for at least the first two years of the war, and the Germans used a complex field cipher for their high-level communications till the end of the war.
Sir Charles Wheatstone, the physicist, mathematician, and engineer, invented the British system, known as the Playfair cipher, in 1854. It acquired its name from Baron Lyon Playfair, who spent years popularizing the cipher and attempting to get the British government to adopt it. The British Army finally adopted the Playfair in the 1890s as their field cipher. It saw its first use during the Boer War (1899â1902) and was still used as the field cipher down to the company level during the first years of World War I [3, pp. 198â202, 1, pp. 166â178].
The Playfair cipher is a digraphic substitution cipher that encrypts two letters at a time. Every plaintext digraph is encrypted into a ciphertext digraph. It is based on a five by five Polybius square that uses a keyword to map 25 of the 26 letters of the Latin alphabet (I and J are either mapped together in a single cell, or J is just dropped). The keyword is dropped in row-by-row, deleting any repeated letters, and then the rest of the alphabet is filled into complete the square. For example, if the keyword is MONARCHY, then the Playfair square looks like Fig. 5.1.
Fig. 5.1Example of a Playfair cipher square
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Modelling of Convective Heat and Mass Transfer in Rotating Flows by Igor V. Shevchuk(6412)
Weapons of Math Destruction by Cathy O'Neil(6224)
Factfulness: Ten Reasons We're Wrong About the World – and Why Things Are Better Than You Think by Hans Rosling(4718)
A Mind For Numbers: How to Excel at Math and Science (Even If You Flunked Algebra) by Barbara Oakley(3266)
Descartes' Error by Antonio Damasio(3253)
Factfulness_Ten Reasons We're Wrong About the World_and Why Things Are Better Than You Think by Hans Rosling(3218)
TCP IP by Todd Lammle(3162)
Fooled by Randomness: The Hidden Role of Chance in Life and in the Markets by Nassim Nicholas Taleb(3084)
Applied Predictive Modeling by Max Kuhn & Kjell Johnson(3047)
The Tyranny of Metrics by Jerry Z. Muller(3035)
The Book of Numbers by Peter Bentley(2945)
The Great Unknown by Marcus du Sautoy(2667)
Once Upon an Algorithm by Martin Erwig(2629)
Easy Algebra Step-by-Step by Sandra Luna McCune(2608)
Lady Luck by Kristen Ashley(2559)
Practical Guide To Principal Component Methods in R (Multivariate Analysis Book 2) by Alboukadel Kassambara(2520)
Police Exams Prep 2018-2019 by Kaplan Test Prep(2520)
All Things Reconsidered by Bill Thompson III(2375)
Linear Time-Invariant Systems, Behaviors and Modules by Ulrich Oberst & Martin Scheicher & Ingrid Scheicher(2350)