HOME

TheInfoList



OR:

In the history of
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
, a grille cipher was a technique for encrypting a
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
by writing it onto a sheet of paper through a pierced sheet (of paper or
cardboard Cardboard is a generic term for heavy paper-based products. The construction can range from a thick paper known as paperboard to corrugated fiberboard which is made of multiple plies of material. Natural cardboards can range from grey to light b ...
or similar). The earliest known description is due to the
polymath A polymath ( el, πολυμαθής, , "having learned much"; la, homo universalis, "universal human") is an individual whose knowledge spans a substantial number of subjects, known to draw on complex bodies of knowledge to solve specific pro ...
Girolamo Cardano Gerolamo Cardano (; also Girolamo or Geronimo; french: link=no, Jérôme Cardan; la, Hieronymus Cardanus; 24 September 1501– 21 September 1576) was an Italian polymath, whose interests and proficiencies ranged through those of mathematician, ...
in 1550. His proposal was for a rectangular
stencil Stencilling produces an image or pattern on a surface, by applying pigment to a surface through an intermediate object, with designed holes in the intermediate object, to create a pattern or image on a surface, by allowing the pigment to reach ...
allowing single letters, syllables, or words to be written, then later read, through its various apertures. The written fragments of the plaintext could be further disguised by filling the gaps between the fragments with anodyne words or letters. This variant is also an example of
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
, as are many of the grille ciphers.


Cardan grille and variations

The Cardan grille was invented as a method of secret writing. The word ''cryptography'' became the more familiar term for secret communications from the middle of the 17th century. Earlier, the word ''steganography'' was common. The other general term for secret writing was ''cypher'' - also spelt ''cipher''. There is a modern distinction between cryptography and steganography Sir
Francis Bacon Francis Bacon, 1st Viscount St Alban (; 22 January 1561 – 9 April 1626), also known as Lord Verulam, was an English philosopher and statesman who served as Attorney General and Lord Chancellor of England. Bacon led the advancement of both ...
gave three fundamental conditions for ciphers. Paraphrased, these are: # a cipher method should not be difficult to use # it should not be possible for others to recover the plaintext (called 'reading the cipher') # in some cases, the presence of messages should not be suspected It is difficult to fulfil all three conditions simultaneously. Condition 3 applies to steganography. Bacon meant that a cipher message should, in some cases, not appear to be a cipher at all. The original Cardan Grille met that aim. Variations on the Cardano original, however, were not intended to fulfill condition 3 and generally failed to meet condition 2 as well. But, few if any ciphers have ever achieved this second condition, so the point is generally a cryptanalyst's delight whenever the grille ciphers are used. The attraction of a grille cipher for users lies in its ease of use (condition 1). In short, it's very simple.


Single-letter grilles

Not all ciphers are used for communication with others: records and reminders may be kept in cipher for use of the author alone. A grille is easily usable for protection of brief information such as a key word or a key number in such a use. In the example, a grille has eight irregularly placed (ideally randomly) holes – equal to the length of a key word TANGIERS. The grille is placed on a gridded sheet (not required in actual practice) and the letters written in from top to bottom. Removing the grille, the grid is filled with random letters and numbers. Then, one hopes, only the possessor of the grille or a copy can read out the hidden letters or numbers – which could, for example, be the key to a polyalphabetic cipher such as that proposed around the same time by
Giambattista della Porta Giambattista della Porta (; 1535 – 4 February 1615), also known as Giovanni Battista Della Porta, was an Italian scholar, polymath and playwright who lived in Naples at the time of the Renaissance, Scientific Revolution and Reformation. Giamba ...
. The grille and the grid are kept separately. If there is only one copy of the grille and one of the grid, the loss of either results is the loss of both. Clearly, in the case of communication by grille cipher, both sender and recipient must possess an identical copy of the grille. The loss of a grille leads to the probable loss of all secret correspondence encrypted with that grille. Either the messages cannot be read (i.e., decrypted) or someone else (with the lost grille) may be reading them. A further use for such a grille has been suggested: it is a method of generating pseudo-random sequences from a pre-existing text. This view has been proposed in connection with the
Voynich manuscript The Voynich manuscript is an illustrated codex hand-written in an otherwise unknown writing system, referred to as 'Voynichese'. The vellum on which it is written has been carbon-dated to the early 15th century (1404–1438), and stylistic anal ...
. It is an area of cryptography that David Kahn termed enigmatology and touches on the works of Dr John Dee and ciphers supposedly embedded in the works of Shakespeare proving that
Francis Bacon Francis Bacon, 1st Viscount St Alban (; 22 January 1561 – 9 April 1626), also known as Lord Verulam, was an English philosopher and statesman who served as Attorney General and Lord Chancellor of England. Bacon led the advancement of both ...
wrote them, which
William F. Friedman William Frederick Friedman (September 24, 1891 – November 12, 1969) was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. ...
examined and discredited.


Trellis ciphers

The Elizabethan spymaster
Sir Francis Walsingham Sir Francis Walsingham ( – 6 April 1590) was principal secretary to Queen Elizabeth I of England from 20 December 1573 until his death and is popularly remembered as her "spymaster". Born to a well-connected family of gentry, Wals ...
(1530–1590) is reported to have used a "trellis" to conceal the letters of a plaintext in communication with his agents. However, he generally preferred the combined code-cipher method known as a ''nomenclator'', which was the practical state-of-the-art in his day. The trellis was described as a device with spaces that was reversible. It appears to have been a transposition tool that produced something much like the Rail fence cipher and resembled a chess board. Cardano is not known to have proposed this variation, but he was a chess player who wrote a book on gaming, so the pattern would have been familiar to him. Whereas the ordinary Cardan grille has arbitrary perforations, if his method of cutting holes is applied to the white squares of a chess board a regular pattern results. The encipherer begins with the board in the wrong position for chess. Each successive letter of the message is written in a single square. If the message is written vertically, it is taken off horizontally and vice versa. After filling in 32 letters, the board is turned through 90 degrees and another 32 letters written (note that flipping the board horizontally or vertically is the equivalent). Shorter messages are filled with null letters (i.e.,
padding Padding is thin cushioned material sometimes added to clothes. Padding may also be referred to as batting when used as a layer in lining quilts or as a packaging or stuffing material. When padding is used in clothes, it is often done in an attempt ...
). Messages longer than 64 letters require another turn of the board and another sheet of paper. If the plaintext is too short, each square must be filled up entirely with nulls. J M T H H D L I S I Y P S L U I A O W A E T I E E N W A P D E N E N E L G O O N N A I T E E F N K E R L O O N D D N T T E N R X This transposition method produces an invariant pattern and is not satisfactorily secure for anything other than cursory notes. 33, 5, 41, 13, 49, 21, 57, 29, 1, 37, 9, 45, 17, 53, 25, 61, 34, 6, 42, 14, 50, 22, 58, 30, 2, 38, 10, 46, 18, 54, 26, 62, 35, 7, 43, 15, 51, 23, 59, 31, 3, 39, 11, 47, 19, 55, 27, 63, 36, 8, 44, 16, 52, 24, 60, 32, 4, 40, 12, 48, 20, 56, 28, 64 A second transposition is needed to obscure the letters. Following the chess analogy, the route taken might be the knight's move. Or some other path can be agreed upon, such as a reverse spiral, together with a specific number of nulls to pad the start and end of a message.


Turning grilles

Rectangular Cardan grilles can be placed in four positions. The trellis or chessboard has only two positions, but it gave rise to a more sophisticated turning grille with four positions that can be rotated in two directions. Baron Edouard Fleissner von Wostrowitz, a retired Austrian cavalry colonel, described a variation on the chess board cipher in 1880 and his grilles were adopted by the German army during World War I. These grilles are often named after Fleissner, although he took his material largely from a German work, published in Tübingen in 1809, written by Klüber who attributed this form of the grille to Cardano, as did
Helen Fouché Gaines Helen Fouché Gaines (October 12, 1888 – April 2, 1940) was a member of the American Cryptogram Association and editor of the book ''Cryptanalysis'' (originally ''Elementary Cryptanalysis'') first published in 1939. The book described the prin ...
. Bauer notes that grilles were used in the 18th century, for example in 1745 in the administration of the Dutch Stadthouder William IV. Later, the mathematician C. F. Hindenburg studied turning grilles more systematically in 1796. '
hey Hey or Hey! may refer to: Music * Hey (band), a Polish rock band Albums * ''Hey'' (Andreas Bourani album) or the title song (see below), 2014 * ''Hey!'' (Julio Iglesias album) or the title song, 1980 * ''Hey!'' (Jullie album) or the title s ...
re often called Fleissner grilles in ignorance of their historical origin.' One form of the Fleissner (or Fleißner) grille makes 16 perforations in an 8x8 grid – 4 holes in each quadrant. If the squares in each quadrant are numbered 1 to 16, all 16 numbers must be used once only. This allows many variations in placing the apertures. The grille has four positions – North, East, South, West. Each position exposes 16 of the 64 squares. The encipherer places the grille on a sheet and writes the first 16 letters of the message. Then, turning the grille through 90 degrees, the second 16 are written, and so on until the grid is filled. It is possible to construct grilles of different dimensions; however, if the number of squares in one quadrant is odd, even if the total is an even number, one quadrant or section must contain an extra perforation. Illustrations of the Fleissner grille often take a 6x6 example for ease of space; the number of apertures in one quadrant is 9, so three quadrants contain 2 apertures and one quadrant must have 3. There is no standard pattern of apertures: they are created by the user, in accordance with the above description, with the intention of producing a good mix. The method gained wide recognition when
Jules Verne Jules Gabriel Verne (;''Longman Pronunciation Dictionary''. ; 8 February 1828 – 24 March 1905) was a French novelist, poet, and playwright. His collaboration with the publisher Pierre-Jules Hetzel led to the creation of the ''Voyages extraor ...
used a turning grille as a plot device in his novel ''
Mathias Sandorf ''Mathias Sandorf'' is an 1885 adventure book by French writer Jules Verne. It was first serialized in ''Le Temps'' in 1885, and it was Verne's epic Mediterranean adventure. It employs many of the devices that had served well in his earlier novel ...
'', published in 1885. Verne had come across the idea in Fleissner's treatise ''Handbuch der Kryptographie'' which appeared in 1881. Fleissner Grilles were constructed in various sizes during World War I and were used by the German Army at the end of 1916. Each grille had a different code name:- 5x5 ANNA; 6X6 BERTA; 7X7 CLARA; 8X8 DORA; 9X9 EMIL; 10X10 FRANZ. Their security was weak, and they were withdrawn after four months. Another method of indicating the size of the grille in use was to insert a key code at the start of the cipher text: E = 5; F = 6 and so on. The grille can also be rotated in either direction and the starting position does not need to be NORTH. Clearly the working method is by arrangement between sender and receiver and may be operated in accordance with a schedule. In the following examples, two cipher texts contain the same message. They are constructed from the example grille, beginning in the NORTH position, but one is formed by rotating the grille clockwise and the other anticlockwise. The ciphertext is then taken off the grid in horizontal lines - but it could equally be taken off vertically. CLOCKWISE ITIT ILOH GEHE TCDF LENS IIST FANB FSET EPES HENN URRE NEEN TRCG PR&I ODCT SLOE ANTICLOCKWISE LEIT CIAH GTHE TIDF LENB IIET FONS FSST URES NEDN EPRE HEEN TRTG PROI ONEC SL&C In 1925
Luigi Sacco Luigi Sacco (1 August 1883 in Alba – 5 December 1970 in Rome) was an Italian general and cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems ...
of the Italian Signals Corps began writing a book on ciphers which included reflections on the codes of the Great War, ''Nozzioni di crittografia''. He observed that Fleissner's method could be applied to a fractionating cipher, such as a Delastelle
Bifid Bifid refers to something that is split or cleft into two parts. It may refer to: * Bifid, a variation in the P wave, R wave, or T wave in an echocardiogram in which a wave which usually has a single peak instead has two separate peaks * Bifid ci ...
or
Four-Square Four square is a team sport played among two teams with two players each on a square court divided into four quadrants: A, B, C, and D (usually numbers 3, 4, 2, and 1, respectively, depending on the court.) The square that a player gets to befo ...
, with considerable increase in security. Grille ciphers are also useful device for transposing Chinese characters; they avoid the transcription of words into alphabetic or syllabic characters to which other ciphers (for example,
substitution cipher In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, trip ...
s) can be applied. After World War I, machine encryption made simple cipher devices obsolete, and grille ciphers fell into disuse except for amateur purposes. Yet, grilles provided seed ideas for transposition ciphers that are reflected in modern cryptography.


Unusual possibilities


The d'Agapeyeff cipher

The unsolved D'Agapeyeff cipher, which was set as a challenge in 1939, contains 14x14 dinomes and might be based on Sacco's idea of transposing a fractionated cipher text by means of a grille.


A Third-Party Grille: the crossword puzzle

The distribution of grilles, an example of the difficult problem of
key exchange Key exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each m ...
, can be eased by taking a readily-available third-party grid in the form of a newspaper crossword puzzle. Although this is not strictly a grille cipher, it resembles the chessboard with the black squares shifted and it can be used in the Cardan manner. The message text can be written horizontally in the white squares and the ciphertext taken off vertically, or vice versa. CTATI ETTOL TTOEH RRHEI MUCKE SSEEL AUDUE RITSC VISCH NREHE LEERD DTOHS ESDNN LEWAC LEONT OIIEA RRSET LLPDR EIVYT ELTTD TOXEA E4TMI GIUOD PTRT1 ENCNE ABYMO NOEET EBCAL LUZIU TLEPT SIFNT ONUYK YOOOO Again, following Sacco's observation, this method disrupts a fractionating cipher such as Seriated Playfair. Crosswords are also a possible source of keywords. A grid of the size illustrated has a word for each day of the month, the squares being numbered.


Cryptanalysis

The original Cardano Grille was a literary device for gentlemen's private correspondence. Any suspicion of its use can lead to discoveries of hidden messages where no hidden messages exist at all, thus confusing the cryptanalyst. Letters and numbers in a random grid can take shape without substance. Obtaining the grille itself is a chief goal of the attacker. But all is not lost if a grille copy can't be obtained. The later variants of the Cardano grille present problems which are common to all transposition ciphers.
Frequency analysis In cryptanalysis, frequency analysis (also known as counting letters) is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers. Frequency analysis is based on t ...
will show a normal distribution of letters, and will suggest the language in which the plaintext was written. The problem, easily stated though less easily accomplished, is to identify the transposition pattern and so decrypt the ciphertext. Possession of several messages written using the same grille is a considerable aid. Gaines, in her standard work on hand ciphers and their cryptanalysis, gave a lengthy account of transposition ciphers, and devoted a chapter to the turning grille.


See also

*
Topics in cryptography The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer scienc ...


References


Further reading

* Richard Deacon, A'' History of the British Secret Service'', Frederick Mũller, London, 1969 * Luigi Sacco, ''Nozzioni di crittografia'', privately printed, Rome, 1930; revised and reprinted twice as ''Manuale di crittografia'' * Friedrich L. Bauer ''Decrypted Secrets - Methods and Maxims of Cryptology'', Springer-Verlag, Berlin Heidelberg, 1997,


External links

* * * * {{DEFAULTSORT:Grille Classical ciphers Perforation-based computational tools