Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers

被引:0
|
作者
Relkin, Paul W. [1 ]
机构
[1] Mapscall LLC, 53 Eckerson Rd, Harrington Pk, NJ 07640 USA
关键词
Transposition cipher; decryption algorithm; rotating key; Manhattan Project; Richard Feynman; Paul Olum;
D O I
10.1080/01611194.2021.1992686
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Olum 2 is one of two ciphers created more than 75 years ago by mathematician Paul Olum to challenge his Manhattan Project officemate, physicist Richard Feynman. In this manuscript, I describe the first successful decryption of Olum 2 using a novel approach to cryptanalysis of transposition ciphers. To decrypt Olum 2, I generated the bigrams and trigrams for all possible transposition intervals. I then identified transposition intervals with multiple bigrams and trigrams that occur frequently in English. I calculated the ratios of their English frequencies to the frequencies of bigrams and trigrams generated by a random reordering of the ciphertext. This enabled me to identify letter sequences with the highest probability of being true cipher message components rather than occurring by chance. In Olum 2, Professor Olum divided the message into sections of thirty-five letters and applied a rotating key to change the order of transposition for each successive section. His strategy not only confounded Professor Feynman but also proved impervious to several decryption programs in use today that assume a uniform transposition has been applied throughout the cipher. The decryption methods described in this manuscript can assist in the decryption of other ciphers employing a variety of transposition methods.
引用
收藏
页码:38 / 47
页数:10
相关论文
共 50 条
  • [31] Cube Cryptanalysis of Hitag2 Stream Cipher
    Sun, Siwei
    Hu, Lei
    Xie, Yonghong
    Zeng, Xiangyong
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 15 - +
  • [32] Impossible differential cryptanalysis on cipher E2
    Wei, Yuechuan
    Yang, Xiaoyuan
    Li, Chao
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (08): : 1477 - 1489
  • [33] Biclique cryptanalysis of block cipher SHACAL2
    Zheng, Yafei, 1600, Science Press (51):
  • [34] Cryptanalysis of a new substitution-diffusion based image cipher
    Rhouma, Rhouma
    Solak, Ercan
    Belghith, Safya
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (07) : 1887 - 1892
  • [35] New differential cryptanalysis results for the lightweight block cipher BORON
    Teh, Je Sen
    Tham, Li Jing
    Jamil, Norziana
    Yap, Wun-She
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [36] NEW APPROACHES FOR ROUND-REDUCED PRINCE CIPHER CRYPTANALYSIS
    Posteuca, Raluca
    Duta, Cristina-Loredana
    Negara, Gabriel
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2015, 16 : 253 - 264
  • [37] Cryptanalysis of the energy efficient stream ciphers SSC2
    Liu, Yunyi
    Qin, Tuanfa
    Ni, Wansun
    Zhang, Shuyi
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 144 - 157
  • [38] Predictive Cipher-Suite Negotiation For Boosting Deployment of New Ciphers
    Heftrig, Elias
    Seifert, Jean-Pierre
    Shulman, Haya
    Waidner, Michael
    Wisiol, Nils
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2423 - 2425
  • [39] Cryptanalysis of a reduced version of the block cipher E2
    Matsui, M
    Tokita, T
    FAST SOFTWARE ENCRYPTION, 1999, 1636 : 71 - 80
  • [40] Securing Private Key using New Transposition Cipher Technique
    Fernando, Maricel Grace Z.
    Sison, Ariel M.
    Medina, Ruji P.
    PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE), 2019, : 490 - 493