Draft:Aristocrat Cipher

  • Comment: Can do a bit more cleaning up if you want it to be published into mainspace. Brachy08 (Talk) 00:47, 28 February 2024 (UTC)

The Aristocrat Cipher is a type of monoalphabetic substitution cipher in which plaintext is replaced with ciphertext and encoded into assorted letters, numbers, and symbols based on a keyword. The formatting of these ciphers generally includes a title, letter frequency, keyword indicators, and the encoders nom de plume.[1] The predecessor to these ciphers stems from the Caesar Cipher around 100. The Aristocrat Cipher also used a transposition of letters to encrypt a message.[2]

History edit

 
As depicted, the Caesar cipher uses a substitution method much like the Aristocrat, however, instead of inserting a keyword into the ciphertext, you shift the ciphertext by three to the left.

Coined in 1929 by a group of friends, a part of the American Cryptogram Association (ACA), the Aristocrat Cipher's name was a play on words intended to show the organization as high class and intellectual. The Aristocrat Cipher was termed the "Aristocrat of Puzzles" and was a change in the paradigm of cryptography.[3]

Substitution Ciphers and the Aristocrat Cipher are still used in many ways today including storage encryption, password encryption, cyber security, etc. The most common of these is data encryption, where using the Encryption Algorithms you convert plaintext to ciphertext, allowing your data to be stored without easy exfiltration.[4]

 
Lorenzo Alberti conceived of the first monoalphabetic rotating disks that allowed for encrypted messages using substitution ciphers.
Birthdate Place of Birth Historical Relevance
February 14, 1404 Genoa, Italy Developed Alberti Disk

History edit

Monoalphabetic substitution ciphers originated from a man named Leon Battista Alberti, who was born February 14, 1404 in Genoa, Italy. Alberti was the illegitimate son of Lorenzo Alberti, and at the age of 10, learnt Latin and studied mathematics. Alberti got a degree in law from the University of Bologna, however, he soon realized that he favored the arts and sciences. In 1432, he became the Papal Chancery, and in 1434, at a visit to Florence in the papal secretariat, he discovered an interest for cryptography. Alberti became friends with Leonardo Dati, who instructed him on the art of cryptology.[5]

In 1467, Alberti conceived of a disk which held 24 equal segments called cells that contained letters, and a movable inner circle which contained ciphertext symbols. This became known as the Alberti Disk and was the very first polyalphabetic cipher in history. Alberti's disk also helped develop the monoalphabetic ciphers, by compartmentalizing plaintext and ciphertext.[5]

Types of Aristocrat Ciphers edit

The Aristocrat Ciphers have four main types: K1, K2, K3, and K4.[6]

K1 Aristocrat Cipher - Being the most popular cipher, it uses a keyed plaintext to encrypt a message.

K2 Aristocrat Cipher - This type uses a keyed ciphertext in order to encrypt the message (Example in Encryption Section).

K3 Aristocrat Cipher - This type uses both a keyed plaintext and a keyed ciphertext, but the keys are the same for both.

K4 Aristocrat Cipher - This type also uses a keyed plaintext and ciphertext, but the keys are not the same for both.

These types allow cryptographers to diversify their encryption techniques and help prevent decryption of the message. Under the ACA guidelines, "No letter can map to itself".[6][7]

Homophones edit

Cite Reference: Substitution Ciphers

A homophone is a type of cipher in which each plaintext character translates to some ciphertext letters or symbols. Ciphers that use this method are called homophonic ciphers, some of these ciphers are the Hill Cipher and Playfair Cipher. Homophonic ciphers can be decrypted to multiple messages. Ciphers that include multiple messages are called High-Order Homophonic. High-order ciphers outline multiple keys for encryption and decryption, this means that depending on your key you'd receive a different message.[8]

Encryption edit

K2 Aristocrat Cipher Encryption edit

K2 Aristocrat would be the message "The quick brown fox jumped over the lazy dog", using the keyword "jumping".

The plaintext to ciphertext would translate to the letters in the box below, since you're inputting your keyword at the beginning and retyping the alphabet, but omitting the letters being used in your keyword. Also, if letters overlap at the end of the alphabets, so Z-Z or X-X, then move them to the front in order to make it more secure and follow ACA guidelines.[7]

Converted Plaintext to Ciphertext
Plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ciphertext V W X Y Z J U M P I N G A B C D E F H K L O Q R S T
Converted Message
Plaintext The quick brown fox jumped over the lazy dog
Ciphertext Kmz elpxn wfcqb jcr iladzy cozf kmz gvts ycu

Decryption edit

Security edit

The cypher can be broken using cryptanalysis methods, especially when using a keyword. If keywords were excluded, it would make the puzzle more secure, but there still are ways around the encryption. The most known way is frequency analysis, this uses the distribution of letters throughout texts to infer what the ciphertext would be. The method creates a chain-reaction when a letter is decrypted, this means that after decrypting a word, the letters of that word can be used to decrypt other words.[9]

Depending on the type of cipher, a brute force attack method can be used, which attempts to use all possible keys for the encryption.[10] David Kahn states in The Codebreakers, "If a cryptanalyst tried one of these (403,291,461,126,605,635,584,000,000 possible keys) every second, he or she would need 1.2788 x 109 years to run through them all."[11]

Frequency Analysis edit

There are many ways to decode these ciphers, the most common being frequency analysis. The process of frequency analysis can be complicated, and it uses educated analysis of the frequency of letters in texts to declassify the key. By calculating the frequency distribution for the K2 Aristocrat and comparing it to the English Distribution, the translation can be estimated.[9]

 
As seen, the most frequent letter is E, then T, etc. This means that the most likely translation would be either toward Z or C, since they have the highest frequency.
Frequency Distribution
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 1 4 1 1 1 1 X 1 1 2 2 2 1 1 1 1 X 1 1 1 1 1 1 2 4

This can be compared to the English Language Allocation Map. The most likely correlation would be toward Z or C for the letter E, since they have the highest frequencies.[12]

See Also edit

References edit

  1. ^ Abend, Sy, S. (January 2018). "The Cryptogram: Journal of the American Cryptogram Association" (PDF). cryptogram.org. Retrieved 2024-01-23.{{cite web}}: CS1 maint: date and year (link) CS1 maint: multiple names: authors list (link)
  2. ^ "The Story of Cryptography : Modern Cryptography". ghostvolt.com. Retrieved 2024-01-24.
  3. ^ Ahlen, Johan. "What is an aristocrat cipher?". Quora. Retrieved 2024-01-24.
  4. ^ "What is Data Encryption? The Ultimate Guide". Cloudian. Retrieved 2024-01-24.
  5. ^ a b Mollin, Richard, A. "Codes: The Guide to Secrecy From Ancient to Modern Times" (PDF). people.math.harvard.edu. pp. 2 & 3. Retrieved 2024-01-24.{{cite web}}: CS1 maint: multiple names: authors list (link)
  6. ^ a b "Aristocrats and Patristocrats – Refinements on solving". The Black Chamber. 2020-11-19. Retrieved 2024-01-24.
  7. ^ a b (ACA), American Cryptogram Association. "Chapter 8, ACA Guidelines". www.coursehero.com. Retrieved 2024-01-24.
  8. ^ "Homophonic Substitution Ciphers" (PDF). uobabylon.edu.iq. pp. 2 & 3. Retrieved 2024-01-26.
  9. ^ a b Clark, Daniel, Rodriguez. "Frequency Analysis: Breaking the Code". Crypto Corner. Retrieved 2024-01-24.{{cite web}}: CS1 maint: multiple names: authors list (link)
  10. ^ Christensen, Chris (Fall 2019). "Monoalphabetic Substitution Ciphers (MASCs)" (PDF). nku.edu. pp. 4–5. Retrieved 2024-01-24.
  11. ^ Kahn, David (1967). The Codebreakers - The Story of Secret Writing (1st ed.). The Macmillan Co (published January 1, 1967). p. 403. ISBN 0-684-83130-9.
  12. ^ "Frequency Analysis - 101 Computing". www.101computing.net. 2019-11-09. Retrieved 2024-01-24.

External Links edit