BCA / B.Tech 15 min read

Transposition Techniques

Transposition Techniques:


Transposition techniques are an encryption method used in cryptography in which the position of the letters of the original message (plaintext) is changed to make the message difficult to understand. In this technique, apart from changing the position of the letters, their original form is not changed, i.e., the letters are not replaced by any other symbol or number, but only their order is changed. Transposition technique is an old and simple method of cryptography, which is used to create an encrypted message by rearranging the letters of the message. Although it is not very secure when used alone, it can be combined with other techniques to create an effective encryption technique. Its use in modern cryptography has become limited, but it is an important technique for understanding the basic principles of cryptography. Transposition technique is often also called a Permutation Cipher, because the letters of the message are rearranged in it. This technique is part of symmetric key cryptography, which means that the same key is used for both encryption and decryption.

Principle of Transposition Technique:
The main principle of the transposition technique is that all the letters of the message remain the same, but their position changes. Its purpose is to change the original message in such a way that no one can understand the message until the correct order is known. For example, if we have the plaintext: "HELLO", then under the transposition technique we can rearrange it as "OLEHL" or in any other order. Now, until the received message is put back in the correct order, it will be difficult to understand it.

Types of Transposition Techniques:
  • Simple Transposition: In simple transposition, the letters of the plaintext are rearranged according to a certain pattern. This pattern acts as the encryption key, and the same pattern is used for decryption.
  • Columnar Transposition: In the columnar transposition technique, the plaintext is written in a rectangular grid, and then it is rearranged according to the columns. To make this technique more effective, the columns of the grid are rearranged based on the encryption key. For example, suppose the plaintext is "ATTACKATDAWN" and the encryption key is 3-1-4-2. The plaintext is written in 4 columns: A T T A, C K A T, D A W N. Now it is written in the order of the columns according to the key: rearranging based on 3-1-4-2 will give: T A A T, A C N W, D K T A. And the encrypted text will become: "TAAACTNWADKTA".
  • Rail Fence Transposition: Rail fence transposition is a simple and popular transposition technique. In this, the plaintext is written in a zig-zag pattern and then it is read horizontally. For example, the plaintext "HELLO WORLD" will be written in two rows in the rail fence transposition technique: H L O W R D, E L O L. Now it will be read horizontally: "HLOWRD ELLOL". This is the encrypted text.
  • Vertical Transposition: In vertical transposition, the plaintext is written in vertical rows, and then that row is rearranged in a specific order. This is similar to columnar transposition, but here the order of the rows is changed.
  • Double Transposition: This technique is an advanced version of columnar transposition, in which transposition is applied twice. The first time the letters of the plaintext are rearranged into columns, and then the second time the rows are rearranged instead of the columns. This technique provides double security, which makes it difficult to break.

Features of Transposition Techniques:
  • The letters of the data remain the same: In the transposition technique, the original letters are not changed. Only their position is changed, which ensures that if the correct order is known at the time of decryption, the data can be easily retrieved.
  • Need for a key: A key is used in the transposition technique, which determines how the letters of the plaintext will be rearranged. This key is necessary for both encryption and decryption.
  • Related security: The transposition technique is not very secure when used alone. To make it more secure, it is combined with substitution techniques, such as the transposition-substitution hybrid cipher.

Advantages of Transposition Techniques:
  • Simplicity: The transposition technique is simple to understand and implement. It can also be easily done manually.
  • Concise data: This technique is used to change only the position of the data without changing its structure, so there is no change in the length of the data.
  • Fast processing: Transposition techniques are fast and do not require more complex calculations, so they can be used when simple encryption is needed.

Disadvantages of Transposition Techniques:
  • Low security: When the transposition technique is implemented alone, it is not very secure. It can be easily broken by cryptanalysis, especially if the attacker knows the transposition method.
  • Key determination: If the key is lost or incorrect, decryption may be impossible. Therefore, it is necessary to ensure the security of the key.
  • Unsuitable for long messages: Using the transposition technique for very large messages can be time-consuming. It is not considered effective for long messages.