HOME

TheInfoList



OR:

In
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, a scytale (; also transliterated skytale, ''skutálē'' "baton, cylinder", also ''skútalon'') is a
tool A tool is an Physical object, object that can extend an individual's ability to modify features of the surrounding environment or help them accomplish a particular task. Although many Tool use by animals, animals use simple tools, only human bei ...
used to perform a
transposition cipher In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units ...
, consisting of a cylinder with a strip of parchment wound around it on which is written a message. The
ancient Greeks Ancient Greece () was a northeastern Mediterranean civilization, existing from the Greek Dark Ages of the 12th–9th centuries BC to the end of classical antiquity (), that comprised a loose collection of culturally and linguistically re ...
, and the
Sparta Sparta was a prominent city-state in Laconia in ancient Greece. In antiquity, the city-state was known as Lacedaemon (), while the name Sparta referred to its main settlement in the Evrotas Valley, valley of Evrotas (river), Evrotas rive ...
ns in particular, are said to have used this cipher to communicate during
military A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. Militaries are typically authorized and maintained by a sovereign state, with their members identifiable by a d ...
campaigns. The recipient uses a rod of the same
diameter In geometry, a diameter of a circle is any straight line segment that passes through the centre of the circle and whose endpoints lie on the circle. It can also be defined as the longest Chord (geometry), chord of the circle. Both definitions a ...
on which the parchment is wrapped to read the message.


Encrypting

Suppose the rod allows one to write four letters around in a circle and five letters down the side of it. The
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
could be: "I am hurt very badly help". To encrypt, one simply writes across the leather:
_____________________________________________________________
       ,    ,    ,    ,    ,    ,   , 
       ,  I ,  a ,  m ,  h ,  u ,   , 
     __,  r ,  t ,  v ,  e ,  r , __, 
    ,   ,  y ,  b ,  a ,  d ,  l , 
    ,   ,  y ,  h ,  e ,  l ,  p , 
    ,   ,    ,    ,    ,    ,    , 
_____________________________________________________________
so the
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext ...
becomes, "Iryyatbhmvaehedlurlp" after unwinding.


Decrypting

To decrypt, all one must do is wrap the leather strip around the rod and read across. An example ciphertext is: "Iryyatbhmvaehedlurlp". Every fourth letter will appear on the same line. After the re-insertion of spaces, the plaintext becomes: "I am hurt very badly help".


History

From indirect evidence, the scytale was first mentioned by the Greek poet
Archilochus Archilochus (; ''Arkhílokhos''; 680 – c. 645 BC) was a Iambus (genre) , iambic poet of the Archaic Greece, Archaic period from the island of Paros. He is celebrated for his versatile and innovative use of poetic meters, and is the earliest ...
, who lived in the 7th century BC. Other Greek and Roman writers during the following centuries also mentioned it; however, it was not until
Apollonius of Rhodes Apollonius of Rhodes ( ''Apollṓnios Rhódios''; ; fl. first half of 3rd century BC) was an ancient Greek literature, ancient Greek author, best known for the ''Argonautica'', an epic poem about Jason and the Argonauts and their quest for the Go ...
(middle of the 3rd century BC) that a clear indication of its use as a cryptographic device appeared. A description of how it operated is not known from before
Plutarch Plutarch (; , ''Ploútarchos'', ; – 120s) was a Greek Middle Platonist philosopher, historian, biographer, essayist, and priest at the Temple of Apollo (Delphi), Temple of Apollo in Delphi. He is known primarily for his ''Parallel Lives'', ...
(50–120 AD): Due to difficulties in reconciling the description of Plutarch with the earlier accounts, and circumstantial evidence such as the cryptographic weakness of the device, several authors have suggested that the scytale was used for conveying messages in
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
and that Plutarch's description is mythological.


Message authentication hypothesis

An alternative hypothesis is that the scytale was used for message authentication rather than encryption. Only if the sender wrote the message around a scytale of the same diameter as the receiver's would the receiver be able to read it. It would therefore be difficult for enemy spies to inject false messages into the communication between two commanders. Nonetheless, any person intercepting a scytale message, and having heard about the method, could with little difficulty find out the rod size needed (a kind of
brute-force attack In cryptography, a brute-force attack or exhaustive key search is a cryptanalytic attack that consists of an attacker submitting many possible keys or passwords with the hope of eventually guessing correctly. This strategy can theoretically be ...
); once knowing that, it would be easy to supplant the sender and forge new messages.


See also

* Caesar cipher


References


Further reading

* * () {{Cryptography navbox , machines , classical Classical ciphers Encryption devices Military history of Sparta