- Two-square cipher
The

**Two-square cipher**is a manual symmetricencryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in thefour-square cipher while still being slightly stronger than thePlayfair cipher .The technique encrypts pairs of letters ("digraphs"), and thus falls into a category of ciphers known as

polygraphic substitution cipher s. This adds significant strength to the encryption when compared withmonographic substitution cipher s which operate on single characters. The use of digraphs makes the two-square technique less susceptible tofrequency analysis attacks, as the analysis must be done on 676 possible digraphs rather than just 26 for monographic substitution. The frequency analysis of digraphs is possible, but considerably more difficult - and it generally requires a much larger ciphertext in order to be useful.**Using two-square**The two-square cipher comes in two varieties - horizontal and vertical. The vertical two-square uses two 5 by 5 matrices one above the other. The horizontal two-square has the two 5 by 5 matrices side by side. Each of the 5 by 5 matrices contains the letters of the alphabet (usually omitting "Q" or putting both "I" and "J" in the same location to reduce the alphabet to fit). The alphabets in both squares are generally

mixed alphabet s, each based on some keyword or phrase.To generate the 5 by 5 matrices, one would first fill in the spaces in the matrix with the letters of a keyword or phrase (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order (again omitting "Q" to reduce the alphabet to fit). The key can be written in the top rows of the table, from left to right, or in some other pattern, such as a spiral beginning in the upper-left-hand corner and ending in the center. The keyword together with the conventions for filling in the 5 by 5 table constitute the cipher key. The two-square algorithm allows for two separate keys, one for each matrix.

As an example, here are the vertical two-square matrices for the keywords "example" and "keyword:"

E X A M P L B C D F G H I J K N O R S T U V W Y Z K E Y W O R D A B C F G H I J L M N P S T U V X Z

**Algorithm**Encryption using two-square is basically the same as the system used in four-square, except that the plaintext and ciphertext digraphs use the same matrices.

To encrypt a message, one would Follow these steps:

* Split the payload message into digraphs. ("help me obi wan kenobi" becomes "he lp me ob iw an ke no bi")

* For a vertical two-square, the first character of both plaintext and ciphertext digraphs uses the top matrix, while the second character uses the bottom.

* For a horizontal two-square, the first character of both digraphs uses the left matrix, while the second character uses the right.* Find the first letter in the digraph in the upper/left text matrix. E X A M P

**"L**" B C D F G H I J K N O R S T U V W Y Z K E Y W O R D A B C F G H I J L M N P S T U V X Z* Find the second letter in the digraph in the lower-right plaintext matrix. E X A M P

**"L**" B C D F G H I J K N O R S T U V W Y Z K E Y W O R D A B C F G H I J L M N**"P**" S T U V X Z* A rectangle is defined by the two plaintext characters and the opposite corners define the ciphertext digraph. E X A M P

**L**B C**"D**" F G H I J K N O R S T U V W Y Z K E Y W O R D A B C F G H I J**"L**" M N**P**S T U V X ZUsing the vertical two-square example given above, we can encrypt the following plaintext:

Plaintext: he lp me ob iw an ke no bi Ciphertext: HE DL XW SD JY AN HO TK DG

Here is the same two-square written out again but blanking all of the values that aren't used for encrypting the digraph "LP" into "DL"

- - - - - L - - D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - L - - P - - - - - -

The rectangle rule used to encrypt and decrypt can be seen clearly in this diagram. The method for decrypting is identical to the method for encryption.

Just like Playfair (and unlike four-square), there are special circumstances when the two letters in a digraph are in the same column for vertical two-square or in the same row for horizontal two-square. For vertical two-square, a plaintext digraph that ends up with both characters in the same column gives the same digraph in the ciphertext. For horizontal two-square, a plaintext digraph with both characters in the same column gives (by convention) that digraph with the characters reversed in the ciphertext. In cryptography this is referred to as a transparency. (The horizontal version is sometimes called a reverse transparency.) Notice in the above example how the digraphs "HE" and "AN" mapped to themselves. A weakness of two-square is that about 20% of digraphs will be transparencies.

E X A M P L B C D F G

**H**I J K N O R S T U V W Y Z K**E**Y W O R D A B C F G H I J L M N P S T U V X Z**Two-square cryptanalysis**Like most pre-modern era ciphers, the two-square cipher can be easily cracked if there is enough text. Obtaining the key is relatively straightforward if both plaintext and ciphertext are known. When only the ciphertext is known, brute force

cryptanalysis of the cipher involves searching through the key space for matches between the frequency of occurrence of digraphs (pairs of letters) and the known frequency of occurrence of digraphs in the assumed language of the original message.Cryptanalysis of two-square almost always revolves around the transparency weakness. Depending on whether vertical or horizontal two-square was used, either the ciphertext or the reverse of the ciphertext should show a significant number of plaintext fragments. In a large enough ciphertext sample, there are likely to be several transparent digraphs in a row, revealing possible word fragments. From these word fragments the analyst can generate candidate plaintext strings and work backwards to the keyword.

A good tutorial on reconstructing the key for a two-square cipher can be found in chapter 7, "Solution to Polygraphic Substitution Systems," of [

*http://www.umich.edu/~umich/fm-34-40-2/ Field Manual 34-40-2*] , produced by the United States Army.**See also***

Topics in cryptography

*Playfair cipher

*Wikimedia Foundation.
2010.*

### См. также в других словарях:

**Four-square cipher**— The Four square cipher is a manual symmetric encryption technique. It was invented by famous French cryptographer Felix Delastelle.The technique encrypts pairs of letters ( digraphs ), and thus falls into a category of ciphers known as… … Wikipedia**Square**— may mean:Mathematics*Square (algebra), to multiply a number or other quantity by itself **Perfect square **Square matrix **Square number **Square root*Square (geometry), a polygon with four equal sides and angles **Unit square*Square wave, a… … Wikipedia**Cipher security summary**— This article summarizes publicly known attacks against ciphers. Note that not all entries may be up to date. Table color key No known successful attacks Theoretical break Attack demonstrated in practice The Best attack column lists the complexity … Wikipedia**Playfair cipher**— The Playfair cipher or Playfair square is a manual symmetric encryption technique and was the first literal digraph substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair who promoted the… … Wikipedia**Classical cipher**— A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical cipher is a type of cipher that was used… … Wikipedia**Substitution cipher**— In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia**Nihilist cipher**— In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher originally used by Russian Nihilists in the 1880s to organize terrorism against the czarist regime. The term is sometimes extended to several… … Wikipedia**Caesar cipher**— The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the p … Wikipedia**Transposition cipher**— In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia**Hill cipher**— Hill s cipher machine, from figure 4 of the patent In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was… … Wikipedia