Polybius Square
   HOME

TheInfoList



OR:

The Polybius square, also known as the Polybius checkerboard, is a device invented by the
ancient Greeks Ancient Greece ( el, Ἑλλάς, Hellás) was a northeastern Mediterranean civilization, existing from the Greek Dark Ages of the 12th–9th centuries BC to the end of classical antiquity ( AD 600), that comprised a loose collection of cultu ...
Cleoxenus and Democleitus, and made famous by the
historian A historian is a person who studies and writes about the past and is regarded as an authority on it. Historians are concerned with the continuous, methodical narrative and research of past events as relating to the human race; as well as the stu ...
and scholar
Polybius Polybius (; grc-gre, Πολύβιος, ; ) was a Greek historian of the Hellenistic period. He is noted for his work , which covered the period of 264–146 BC and the Punic Wars in detail. Polybius is important for his analysis of the mixed ...
. The device is used for fractionating
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
characters so that they can be represented by a smaller set of symbols, which is useful for
telegraphy Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas p ...
,
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
, and
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
. The device was originally used for fire signalling, allowing for the coded transmission of any message, not just a finite amount of predetermined options as was the convention before.


Basic form

According to Polybius' ''Histories,'' the device was invented by Cleoxenus and Democleitus, and further developed by Polybius himself. The device partitioned the alphabet into five tablets with five letters each (except for the last one with only four). There are no surviving tablets from antiquity. Letters are represented by two numbers from one to five, allowing the representation of 25 characters using only 5 numeric symbols. The original square used the
Greek alphabet The Greek alphabet has been used to write the Greek language since the late 9th or early 8th century BCE. It is derived from the earlier Phoenician alphabet, and was the earliest known alphabetic script to have distinct letters for vowels as we ...
laid out as follows: With the modern
Latin alphabet The Latin alphabet or Roman alphabet is the collection of letters originally used by the ancient Romans to write the Latin language. Largely unaltered with the exception of extensions (such as diacritics), it used to write English and the o ...
, this is the typical form: Each letter is then represented by its coordinates in the grid. For example, "BAT" becomes "12 11 44". The 26 letters of the Latin/English alphabet do not fit in a 5 × 5 square, two letters must be combined (usually I and J as above, though C and K is an alternative). Alternatively, a 6 × 6 grid may be used to allow numerals or special characters to be included as well as letters. A 6 × 6 grid is also usually used for the
Cyrillic alphabet , bg, кирилица , mk, кирилица , russian: кириллица , sr, ћирилица, uk, кирилиця , fam1 = Egyptian hieroglyphs , fam2 = Proto-Sinaitic , fam3 = Phoenician , fam4 = G ...
(the most common variant has 33 letters, but some have up to 37) or Japanese
hiragana is a Japanese syllabary, part of the Japanese writing system, along with ''katakana'' as well as ''kanji''. It is a phonetic lettering system. The word ''hiragana'' literally means "flowing" or "simple" kana ("simple" originally as contrast ...
(see
cryptography in Japan The cipher system that the Uesugi_clan, Uesugi are said to have used is a simple substitution usually known as a Polybius square or "checkerboard." The iroha, i-ro-ha alphabet contains forty-eight letters, so a seven-by-seven square is used, with ...
). A
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (map ...
could be used to reorder the alphabet in the square, with the letters (without duplicates) of the key being placed at the beginning and the remaining letters following it in alphabetical order. For example, the key phrase "''polybius cipher"'' would lead to the reordered square below.


Applications


Telegraphy

In his ''Histories,'' Polybius outlines the need for effective signalling in warfare, leading to the development of the square. Previously, fire-signalling was useful only for expected, predetermined messages, with no way to convey novel messages about unexpected events. According to Polybius, in the 4th century BCE,
Aeneas Tacticus Aeneas Tacticus ( grc-gre, Αἰνείας ὁ Τακτικός; fl. 4th century BC) was one of the earliest Greek writers on the art of war and is credited as the first author to provide a complete guide to securing military communications. Po ...
devised a hydraulic semaphore system consisting of matching vessels with sectioned rods labelled with different messages such as "Heavy Infantry", "Ships", and "Corn". This system was slightly better than the basic fire-signalling, but still lacked the ability to convey any needed message. The Polybius square was used to aid in telegraphy, specifically fire-signalling. To send a message, the sender would initially hold up two torches and wait for the recipient to do the same to signal that they were ready to receive the message. The sender would then hold up the first set of torches on his left side to indicate to the recipient which tablet (or row of the square) was to be consulted. The sender would then raise a set of torches on his right side to indicate which letter on the tablet was intended for the message. Both parties would need the same tablets, a telescope (a tube to narrow view, no real magnification), and torches. The Polybius square has also been used in the form of the "
knock code The tap code, sometimes called the knock code, is a way to encode text messages on a letter-by-letter basis in a very simple way. The message is transmitted using a series of tap sounds, hence its name. The tap code has been commonly used by pri ...
" to signal messages between cells in
prisons A prison, also known as a jail, gaol (dated, standard English, Australian, and historically in Canada), penitentiary (American English and Canadian English), detention center (or detention centre outside the US), correction center, correcti ...
by tapping the numbers on pipes or walls. It is said to have been used by
nihilist Nihilism (; ) is a philosophy, or family of views within philosophy, that rejects generally accepted or fundamental aspects of human existence, such as objective truth, knowledge, morality, values, or meaning. The term was popularized by Ivan ...
prisoners of the
Russian Russian(s) refers to anything related to Russia, including: *Russians (, ''russkiye''), an ethnic group of the East Slavic peoples, primarily living in Russia and neighboring countries *Rossiyane (), Russian language term for all citizens and peo ...
Czars Tsar ( or ), also spelled ''czar'', ''tzar'', or ''csar'', is a title used by East Slavs, East and South Slavs, South Slavic monarchs. The term is derived from the Latin word ''Caesar (title), caesar'', which was intended to mean "emperor" i ...
and also by US
prisoners of war A prisoner of war (POW) is a person who is held Captivity, captive by a belligerent power during or immediately after an armed conflict. The earliest recorded usage of the phrase "prisoner of war" dates back to 1610. Belligerents hold priso ...
during the
Vietnam War The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
. 
Arthur Koestler Arthur Koestler, (, ; ; hu, Kösztler Artúr; 5 September 1905 – 1 March 1983) was a Hungarian-born author and journalist. Koestler was born in Budapest and, apart from his early school years, was educated in Austria. In 1931, Koestler join ...
describes the code being used by political prisoners of
Stalin Joseph Vissarionovich Stalin (born Ioseb Besarionis dze Jughashvili; – 5 March 1953) was a Georgian revolutionary and Soviet political leader who led the Soviet Union from 1924 until his death in 1953. He held power as General Secretar ...
in the 1930s in his anti-totalitarian novel ''
Darkness at Noon ''Darkness at Noon'' (german: link=no, Sonnenfinsternis) is a novel by Hungarian-born novelist Arthur Koestler, first published in 1940. His best known work, it is the tale of Rubashov, an Old Bolshevik who is arrested, imprisoned, and tried f ...
''. (Koestler had been a prisoner-of-war during the
Spanish Civil War The Spanish Civil War ( es, Guerra Civil Española)) or The Revolution ( es, La Revolución, link=no) among Nationalists, the Fourth Carlist War ( es, Cuarta Guerra Carlista, link=no) among Carlists, and The Rebellion ( es, La Rebelión, lin ...
.) Indeed, it can be signalled in many simple ways (flashing lamps, blasts of sound,
drums A drum kit (also called a drum set, trap set, or simply drums) is a collection of drums, cymbals, and other Percussion instrument, auxiliary percussion instruments set up to be played by one person. The player (drummer) typically holds a pair o ...
,
smoke signal The smoke signal is one of the oldest forms of long-distance communication. It is a form of visual communication used over a long distance. In general smoke signals are used to transmit news, signal danger, or to gather people to a common area ...
s) and is much easier to learn than more sophisticated codes like the
Morse code Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called ''dots'' and ''dashes'', or ''dits'' and ''dahs''. Morse code is named after Samuel Morse, one of ...
. However, it is also somewhat less efficient than more complex codes.


Steganography

The simple representation also lends itself to
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
. The figures from one to five can be indicated by
knot A knot is an intentional complication in cordage which may be practical or decorative, or both. Practical knots are classified by function, including hitches, bends, loop knots, and splices: a ''hitch'' fastens a rope to another object; a ' ...
s in a string, stitches on a quilt, contiguous letters before a wider space or many other ways.


Cryptography

The Polybius square is also used as a basic cipher called the Polybius cipher. This cipher is quite insecure by modern standards, as it is a
substitution cipher In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, trip ...
with characters being substituted for pairs of digits, which is easily broken through
frequency analysis In cryptanalysis, frequency analysis (also known as counting letters) is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers. Frequency analysis is based on t ...
.


Adaptations

The Polybius square and the Polybius cipher can be combined with other cryptographic methods such as the
ADFGVX cipher In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher ca ...
, Homophonic cipher and more.


Hybrid Polybius Playfair cipher

The Playfair cipher is a polyalphabetic substitution cipher invented by
Charles Wheatstone Sir Charles Wheatstone FRS FRSE DCL LLD (6 February 1802 – 19 October 1875), was an English scientist and inventor of many scientific breakthroughs of the Victorian era, including the English concertina, the stereoscope (a device for di ...
and promoted by
Lyon Playfair Lyon Playfair, 1st Baron Playfair (1 May 1818 – 29 May 1898) was a British scientist and Liberal politician who was Postmaster-General from 1873 to 1874. Early life Playfair was born at Chunar, Bengal, the son of George Playfair (1782-1846) ...
based on a 5 x 5 square which accommodates the alphabet in a manner similar to the Polybius square. The letters in the square are arranged by first inserting the letters of a key (without repetition), before the remaining letters (which appear subsequently in normal alphabetical order). A message is divided into pairs of letters, with a filler letter "x" inserted at the end if the message was of odd length. If both letters of a pair are the same, a filler "x" is inserted between them with an extra "x" inserted at the end of the message to compensate for this. Each pair of letters are then encrypted using the Playfair key table through "mapping rules". The mapping rules are: 1. If the letters of the pair appear in the same row of the table, replace them with the letters to their immediate right respectively (if a letter of the plaintext pair is the rightmost letter in the row, wrap around to the left side of the row). 2. If the letters of the pair appear in the same column of the table, replace them with the letters immediately below respectively (if a letter in the plaintext pair is on the bottom of the column, wrap around to the top of the column). 3. If the letters of the pair are not on the same row or column, replace them with the letters in the same row of the letter and on the column of the other letter of the pair. The order here is important: the first letter of the encrypted pair is the one that sits in the same row as the first letter and on the column of the second letter of the plaintext pair. Plaintext message:  HELLO WORLD Playfair message:  HE  LX  LO  WO  RL  DX Playfair cipher:  KG  YV  RV  VQ  GR  CZ The decryption rules are the same as the encryption. The cipher message is mapped with the same Playfair matrix for decryption, and gives the plaintext message back. For a hybrid Polybius-Playfair cipher, a new and bigger table is used, with messages being encrypted and decrypted twice. The plaintext is encrypted using the Playfair cipher first, and then using the Polybius cipher. Plaintext message:  HELLO WORLD Playfair message:  HE  LX  LO  WO  RL  DX Playfair cipher:  KG  YV  RV  VQ  GR  CZ Polybius cipher:  3432  1452  2252  5243  3222  2455


See also

*
Phryctoria Phryctoria ( el, φρυκτωρία) was a semaphore system used in Ancient Greece. The ''phryctoriae'' were towers built on selected mountaintops so that one tower (''phryctoria'') would be visible to the next tower (usually 20 miles away). The ...
* Straddling checkerboard *
Tap code The tap code, sometimes called the knock code, is a way to encode text messages on a letter-by-letter basis in a very simple way. The message is transmitted using a series of tap sounds, hence its name. The tap code has been commonly used by pri ...
*
Topics in cryptography The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer scienc ...


References


External links


Online modular converter offering Polybius square, Bifid cipher and tap code
{{DEFAULTSORT:Polybius Square Classical ciphers History of telecommunications Steganography Ancient Arcadia