Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers

被引:0
|
作者
Relkin, Paul W. [1 ]
机构
[1] Mapscall LLC, 53 Eckerson Rd, Harrington Pk, NJ 07640 USA
关键词
Transposition cipher; decryption algorithm; rotating key; Manhattan Project; Richard Feynman; Paul Olum;
D O I
10.1080/01611194.2021.1992686
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Olum 2 is one of two ciphers created more than 75 years ago by mathematician Paul Olum to challenge his Manhattan Project officemate, physicist Richard Feynman. In this manuscript, I describe the first successful decryption of Olum 2 using a novel approach to cryptanalysis of transposition ciphers. To decrypt Olum 2, I generated the bigrams and trigrams for all possible transposition intervals. I then identified transposition intervals with multiple bigrams and trigrams that occur frequently in English. I calculated the ratios of their English frequencies to the frequencies of bigrams and trigrams generated by a random reordering of the ciphertext. This enabled me to identify letter sequences with the highest probability of being true cipher message components rather than occurring by chance. In Olum 2, Professor Olum divided the message into sections of thirty-five letters and applied a rotating key to change the order of transposition for each successive section. His strategy not only confounded Professor Feynman but also proved impervious to several decryption programs in use today that assume a uniform transposition has been applied throughout the cipher. The decryption methods described in this manuscript can assist in the decryption of other ciphers employing a variety of transposition methods.
引用
收藏
页码:38 / 47
页数:10
相关论文
共 50 条
  • [1] Solving the Olum 1 Cipher
    Relkin, Paul W.
    CRYPTOLOGIA, 2022, 46 (04) : 291 - 301
  • [2] A New Approach to χ2 Cryptanalysis of Block Ciphers
    Nakahara, Jorge, Jr.
    Sekar, Gautham
    de Freitas, Daniel Santana
    Chiann, Chang
    de Souza, Ramon Hugo
    Preneel, Bart
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 1 - +
  • [3] Automated cryptanalysis of transposition ciphers
    Giddy, J.P.
    Safavi-Naini, R.
    Computer Journal, 1994, 37 (05): : 429 - 436
  • [4] AUTOMATED CRYPTANALYSIS OF TRANSPOSITION CIPHERS
    GIDDY, JP
    SAFAVINAINI, R
    COMPUTER JOURNAL, 1994, 37 (05): : 429 - 436
  • [5] Differential Evolution for the Cryptanalysis of Transposition Cipher
    Wulandari, Gia S.
    Rismawan, Wahyu
    Saadah, Siti
    2015 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2015, : 45 - 48
  • [6] A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers
    Sabonchi, AuthorArkan Kh Shakr
    Akay, Bahriye
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 39 (01): : 87 - 106
  • [7] An Automatic Cryptanalysis of Transposition Ciphers Using Compression
    Al-Kazaz, Noor R.
    Irvine, Sean A.
    Teahan, William J.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 36 - 52
  • [8] Cryptanalysis of columnar transposition cipher with long keys
    Lasry, George
    Kopal, Nils
    Wacker, Arno
    CRYPTOLOGIA, 2016, 40 (04) : 374 - 398
  • [9] Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms
    Boryczka, Urszula
    Dworak, Kamil
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, ICCCI 2014, 2014, 8733 : 623 - 632
  • [10] An Automatic Cryptanalysis of Arabic Transposition Ciphers using Compression
    Al-Kazaz, Noor R.
    Teahan, William J.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 738 - 745