Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers

被引:0
|
作者
Relkin, Paul W. [1 ]
机构
[1] Mapscall LLC, 53 Eckerson Rd, Harrington Pk, NJ 07640 USA
关键词
Transposition cipher; decryption algorithm; rotating key; Manhattan Project; Richard Feynman; Paul Olum;
D O I
10.1080/01611194.2021.1992686
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Olum 2 is one of two ciphers created more than 75 years ago by mathematician Paul Olum to challenge his Manhattan Project officemate, physicist Richard Feynman. In this manuscript, I describe the first successful decryption of Olum 2 using a novel approach to cryptanalysis of transposition ciphers. To decrypt Olum 2, I generated the bigrams and trigrams for all possible transposition intervals. I then identified transposition intervals with multiple bigrams and trigrams that occur frequently in English. I calculated the ratios of their English frequencies to the frequencies of bigrams and trigrams generated by a random reordering of the ciphertext. This enabled me to identify letter sequences with the highest probability of being true cipher message components rather than occurring by chance. In Olum 2, Professor Olum divided the message into sections of thirty-five letters and applied a rotating key to change the order of transposition for each successive section. His strategy not only confounded Professor Feynman but also proved impervious to several decryption programs in use today that assume a uniform transposition has been applied throughout the cipher. The decryption methods described in this manuscript can assist in the decryption of other ciphers employing a variety of transposition methods.
引用
收藏
页码:38 / 47
页数:10
相关论文
共 50 条
  • [41] Cryptanalysis of PKP: A new approach
    Jaulmes, E
    Joux, A
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 165 - 172
  • [42] Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
    Kim, Jongsung
    Lee, Changhoon
    Sung, Jaechul
    Hong, Seokhie
    Lee, Sangjin
    Lim, Jongin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 3047 - 3058
  • [43] Cryptanalysis of stream cipher COS (2,128) Mode I
    Wu, HJ
    Bao, F
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 154 - 158
  • [44] Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers
    Colburn, Michael
    Keliher, Liam
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 107 - 123
  • [45] Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2
    Amzaleg, Dor
    Dinur, Itai
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 57 - 85
  • [46] Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to Chaskey
    Xu, Yaqi
    Wu, Baofeng
    Lin, Dongdai
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 192 - 209
  • [47] New Biclique Cryptanalysis on Full-Round PRESENT-80 Block Cipher
    Jithendra K.B.
    Shahana T.K.
    SN Computer Science, 2020, 1 (2)
  • [48] New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4
    Liu, Yu
    Liang, Huicong
    Wang, Wei
    Wang, Meiqin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [49] Decrypting the Transposition Cipher Using a New Move Operator on Particle Swarm Optimization
    Demirci, Huseyin
    Yurtay, Nilufer
    Yildiz, Tuba Karagul
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 220 - 223
  • [50] Cryptanalysis cipher text using new modeling: Text Encryption using Elliptic Curve Cryptography
    Naji, Maitham Ali
    Hammood, Dalal Abdulmohsin
    Atee, Hayfaa Abdulzahra
    Jebur, Rusul Sabah
    Rahim, Hasliza A.
    Ahmad, R. Badlishah
    2ND INTERNATIONAL CONFERENCE ON APPLIED PHOTONICS AND ELECTRONICS 2019 (INCAPE 2019), 2020, 2203