Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers

被引:0
|
作者
Relkin, Paul W. [1 ]
机构
[1] Mapscall LLC, 53 Eckerson Rd, Harrington Pk, NJ 07640 USA
关键词
Transposition cipher; decryption algorithm; rotating key; Manhattan Project; Richard Feynman; Paul Olum;
D O I
10.1080/01611194.2021.1992686
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Olum 2 is one of two ciphers created more than 75 years ago by mathematician Paul Olum to challenge his Manhattan Project officemate, physicist Richard Feynman. In this manuscript, I describe the first successful decryption of Olum 2 using a novel approach to cryptanalysis of transposition ciphers. To decrypt Olum 2, I generated the bigrams and trigrams for all possible transposition intervals. I then identified transposition intervals with multiple bigrams and trigrams that occur frequently in English. I calculated the ratios of their English frequencies to the frequencies of bigrams and trigrams generated by a random reordering of the ciphertext. This enabled me to identify letter sequences with the highest probability of being true cipher message components rather than occurring by chance. In Olum 2, Professor Olum divided the message into sections of thirty-five letters and applied a rotating key to change the order of transposition for each successive section. His strategy not only confounded Professor Feynman but also proved impervious to several decryption programs in use today that assume a uniform transposition has been applied throughout the cipher. The decryption methods described in this manuscript can assist in the decryption of other ciphers employing a variety of transposition methods.
引用
收藏
页码:38 / 47
页数:10
相关论文
共 50 条
  • [21] A CHARACTERISTIC SET METHOD FOR SOLVING BOOLEAN EQUATIONS AND APPLICATIONS IN CRYPTANALYSIS OF STREAM CIPHERS
    Fengjuan CHAI Xiao-Shan GAO Chunming YUAN Key Laboratory of Mathematics Mechanization
    Journal of Systems Science & Complexity, 2008, (02) : 191 - 208
  • [22] A CHARACTERISTIC SET METHOD FOR SOLVING BOOLEAN EQUATIONS AND APPLICATIONS IN CRYPTANALYSIS OF STREAM CIPHERS
    Fengjuan CHAI XiaoShan GAO Chunming YUAN Key Laboratory of Mathematics MechanizationInstitute of Systems ScienceAcademy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing China
    JournalofSystemsScienceandComplexity, 2008, 21 (02) : 191 - 208
  • [23] A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers
    Chai, Fengjuan
    Gao, Xiao-Shan
    Yuan, Chunming
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2008, 21 (02) : 191 - 208
  • [24] Multiple text encryption, Key entrenched, distributed cipher using pairing functions and transposition ciphers
    Krishna, B. Hari
    Reddy, I. Raja Sekhar
    Kiran, S.
    Reddy, R. Pradeep Kumar
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1059 - 1061
  • [25] A new quantum cryptanalysis method on block cipher Camellia
    Li, Yanjun
    Lin, Hao
    Liang, Meng
    Sun, Ying
    IET INFORMATION SECURITY, 2021, 15 (06) : 487 - 495
  • [26] BDD-based cryptanalysis of stream cipher: a practical approach
    Sahu, Harish Kumar
    Gupta, Indivar
    Pillai, N. Rajesh
    Sharma, Rajendra Kumar
    IET INFORMATION SECURITY, 2017, 11 (03) : 159 - 167
  • [27] On the resistance of new lightweight block ciphers against differential cryptanalysis
    Chan, Yen Yee
    Khor, Cher-Yin
    Khoo, Boo Tap
    Teh, Je Sen
    Teng, Wei Jian
    Jamil, Norziana
    HELIYON, 2023, 9 (04)
  • [28] A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers
    Jain, Ashish
    Chaudhari, Narendra S.
    NEURAL INFORMATION PROCESSING, PT II, 2015, 9490 : 206 - 215
  • [29] New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
    Khazaei, Shahram
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 15 - +
  • [30] Cryptanalysis of the stream cipher ABC v2
    Wu, Hongjun
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4356 : 56 - +