by A. A. Albert
1. Introduction
The idea of connecting cryptography with mathematics is not new, but it has not been exploited in the literature of either subject to the extent of the present paper. Our topic should be a timely one not only because of the present public interest in anything connected with our war effort, but also because of the current ever increasing use by scientists1 of the concepts of modern abstract algebra.
We shall present here a mathematical formulation of a general theory of cryptology2 with detailed application to cryptography. In this, we shall see that cryptography is more than a subject permitting mathematical formulation, for indeed it would not be an exaggeration to state that abstract cryptography is identical with abstract mathematics.
Our formulation will permit a rapid presentation of the methods of cryptography in common use, and we shall show that all of these methods are very special cases of the so-called algebraic cipher systems. These latter cipher systems are entirely practical in the simple cases, and we hope that our presentation will destroy the belief of many cryptologists that they are “only practical providing a machine is used.”3
2. Cryptography as a theory of non-singular mappings
The function concept has been described frequently as a unifying concept for collegiate mathematics. Elementary functions are usually given by formulas
Consider a set
Thus, a function of
Suppose that there is also a mapping
Cryptography is the study of all non-singular mappings
There are many mathematical situations in which it is possible to
determine a mapping
3. Cipher systems on components, and codes
It is clear from what we have said that the most primitive cipher
system would be simply a list of all the messages to be used and an
adjacent list of corresponding cryptograms. However, some more
sophisticated cipher systems are describable, as is the case for some
mathematical functions, by formulas. These formulas will express the
cryptogram
The term message has not been interpreted thus far but we now conceive
of it as any sequence of a finite number of symbols which are either
letters, periods, or commas and the like. We now partition the
message into blocks of symbols called components. The message
Suppose now that a message
The most primitive formula for a cipher system in terms of
In describing cipher systems where more of a cipher system is to be
given by the formula and less by auxiliary mapping, the nature of the
components
We have now seen how to limit our study to cipher systems on
messages
4. Transposition ciphers
A transposition cipher is simply a cipher system given by
To decipher such as message, we read up in the cipher system to obtain its inverse, and then have:
There are many devices for accomplishing transformations of this kind but none of them can do more than what we have indicated above. They may need to be studied in cryptanalysis but surely are not worthwhile additions to cryptography. It would seem that their only possible value in this latter subject is that they may be relatively easy to remember. However, the most primitive of them are worthless, and the more complicated ones are not as easy to remember as the following device.
Let us memorize any sentence and write it with a number below each
letter from 1 to the number
5. Products of cipher systems
If
In cryptography it is frequently possible to think of cryptograms
themselves as being messages, and thus study cipher systems which are
non-singular mappings on
It is also possible frequently to break down a cipher system into a product of simpler ones. This is usually done in analyzing cipher systems, and much of our discussion will be concerned with a description of these simpler systems rather than the more complicated systems derivable from them by the product operation described above.
It should be observed that the operation of product of mappings is
associative, that is,
6. The role of the ring in a cipher alphabet
It is frequently desirable in cryptography to use an intermediate set
The cipher alphabet is introduced to simplify the description of
The only sets
In every ring, there is a unique zero quantity 0 such that
The familiar number systems consisting of all rational numbers, of all
real numbers, and of all complex numbers are examples of commutative rings.
These rings are all fields, that is, commutative rings
The set of all integers, and the set of all polynomials
7. Residue class rings in cipher alphabets
Let us now suppose that the components
The quantities of our new rings will not be ordinary integers but
classes of integers. The reader is already familiar with the
classification of integers into two classes, namely, the class of all even
integers, and the class of all odd integers. For these classes we have
the rules that
We shall define similarly a ring
Let us now put all integers into a set of residue classes, each
of which will be designated by
It is a simple matter to verify the identities
In actual use we omit the braces and compute with integers in the normal
way but always drop off multiples of
To facilitate computations we use the table of products
8. The finite field in the construction of cipher systems
We shall construct cipher systems as in equations
The fact that the cipher system just described is singular arises from the
property that the mappings
The finite rings
There are also other finite fields obtained from our finite
fields
The fields
9. Simple and multiple alphabet substitution ciphers
A substitution cipher is a non-singular mapping
10. Special multiple alphabet substitution ciphers
The so-called Caesar cipher is the case where
The Vigenère, Gronsfield, Porta, and Beaufort
cipher systems are all variants of our cipher systems determined
by
The Saint-Cyr cipher is also a true Vigenère cipher and its
mechanism need not be described. The Gronsfield ciphers differs only from
the Vigenère in that
The Porta cipher is fundamentally the Vigenère but with the cipher
alphabet given by
11. Autoencipherment
A polygram substitution cipher is a cipher system given by the use
of a cipher alphabet and non-singular mapping
12. The cipher systems of Hill
Let us suppose that a cipher alphabet involving a finite ring
If
It must be evident by now that the common substitution ciphers of
Sections 10 and 11 are all special cases
of the systems given by the use of
13. The Hill systems in matrix form
A rectangular array
For every two
We now let
Equations
One may now set up what appears to be a generalization of the
equations
However, the form
14. Fractional substitutions
We have now seen how to carry a sequence of letters in a
message into a corresponding array of what we may call the
numbers of a ring and how to carry each such array into
another by the use of a system of linear equations returning to a
cryptogram consisting of a corresponding sequence of letters. This
may be complicated further by the use of non-linear equations and
such substitution cipher systems are known.4
Fractional cipher systems do not differ at all from the substitution cipher
systems already considered in respect to the nature of the mappings defined
by
15. Involutorial cipher systems
A substitution cipher system defined by a cipher alphabet and a
non-singular mapping
16. Special ciphers
Let us use the alphabet given by
Using the same
The two systems above may be combined and thus we write
There are over 600,000 distinct non-singular two-rowed matrices with elements
in