[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: a simple cypher scheme



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 17 Sep 1996, stuart johnson wrote:

>    i've been on cypherpunks for about a year a half now, and have wacthed
> many interesting threads pass by but i've never posited anything.  what has
> brought me out into the open is this : i work for an engineering firm doing
> asic design, i use pgp ( as do all rational persons ), a co-worker here has
> come up with a 'cypher' scheme that he would like to use to send code to our
> clients.  the scheme is this : he would take the file of code and pad all
> lines to the length of the longest line, he would then preform column swaps,
> and then row swaps, to 'mix up' the file. the person receiving the file
> would then preform the opposite functions to recover the file.  it seems so
> simple that it can't be good. i've convenced him to use pgp, but i would
> like some input if possible on why his cypher scheme is not a good one.

This is a transposition cipher.  The problem with this cipher is that it does
not obscure patterns in the plaintext.  There is no substitution function in
this algorithm.  Secure ciphers have several rounds with both a substitution
and transposition function.  In other words, there is no way this could be
secure.  Tell your co-worker to stick with triple-DES.

- -- Mark

PGP encrypted mail prefered.
Key fingerprint = d61734f2800486ae6f79bfeb70f95348
http://www.voicenet.com/~markm/

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3
Charset: noconv

iQEVAwUBMkBsASzIPc7jvyFpAQH6Pwf+Jyla3LZADlkaurIapmusjvR5w1xjZ9Oa
1I90YzyKOUmBVzn4ZYabrc4AW4zDAQL6nCuwxy0mR3Zo5cRHMyQ3r2xCZpizgkPu
liJmMvKBOfIv9s5I9+BwE+SwG+Hkp7wEOEyk/t3i1yGzRUTQDj26tZKN4HGQUXt/
ufeCVtHqHIhncak+NEkzlz/VaJ9yMMVWZynp14Ip+S9yB8ztM8LueMp8mCJXSujw
I2ajThu3dCgTaeypVPGnHAipLwuGtxsfuNhBkRPb/XCu/mN3ua6aj52Mp6NUwmwv
rdy0KMuY6W93m9WX8Z+O89R5zBYX9gY7deq8H9BgJXMyVGkkqPvWMA==
=CzZl
-----END PGP SIGNATURE-----