Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Basic form  





2 Encryption Principle  



2.1  Method 1  





2.2  Method 2  





2.3  Method 3  







3 Applications  



3.1  Telegraphy  





3.2  Steganography  





3.3  Cryptography  







4 Adaptations  





5 See also  





6 References  














Polybius square






العربية
Български
Català
Čeština
Deutsch
Ελληνικά
Español
Esperanto
فارسی
Français

Italiano
Magyar
Nederlands

Polski
Русский
Türkçe
Українська
Tiếng Vit
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


The Greek letters of a Polybius square

The Polybius square, also known as the Polybius checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius.[1] The device is used for fractionating plaintext characters so that they can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire signalling, allowing for the coded transmission of any message, not just a finite number of predetermined options as was the convention before.[1]

Basic form[edit]

According to Polybius' Histories, the device was invented by Cleoxenus and Democleitus, and further developed by Polybius himself. The device partitioned the alphabet into five tablets with five letters each (except for the last one with only four). There are no surviving tablets from antiquity. Letters are represented by two numbers from one to five, allowing the representation of 25 characters using only 5 numeric symbols.

The original square used the Greek alphabet laid out as follows:

1 2 3 4 5
1 Α Β Γ Δ Ε
2 Ζ Η Θ Ι Κ
3 Λ Μ Ν Ξ Ο
4 Π Ρ Σ Τ Υ
5 Φ Χ Ψ Ω

Modern Greek still uses that same alphabet, as do implementations of the Polybius square in that language.

With the Latin alphabet, this is the typical form:

1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z

This alphabet, and this latter form of the Polybius square, is used when implementing the square in other Western European languages such as English, Spanish, French, German, Italian, Portuguese, and Dutch.

Each letter is then represented by its coordinates in the grid. For example, "BAT" becomes "12 11 44". The 26 letters of the Latin/English alphabet do not fit in a 5 × 5 square, two letters must be combined (usually I and J as above, though C and K is an alternative). Alternatively, a 6 × 6 grid may be used to allow numerals or special characters to be included as well as letters.

A 6 × 6 grid is also usually used for the Cyrillic alphabet (the most common variant has 33 letters, but some have up to 37) [citation needed] or Japanese hiragana (see cryptography in Japan).

Akey could be used to reorder the alphabet in the square, with the letters (without duplicates) of the key being placed at the beginning and the remaining letters following it in alphabetical order.[2] For example, the key phrase "polybius cipher" would lead to the reordered square below.

1 2 3 4 5
1 P O L Y B
2 I/J U S C H
3 E R A D F
4 G K M N Q
5 T V W X Z

Encryption Principle[edit]

There are several encryption methods using the Polybius square. Three of them are described below.

1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z

Method 1[edit]

Let's encrypt the word "SOMETEXT" with a Caesar cipher using a shift equal to the side of our square (5). To do it, locate the letter of the text and insert the one immediately below it in the same column for the ciphertext. If the letter is in the bottom row, take the one from the top of the same column.

Letter of the text s o m e t e x t
Cipher text letter x t r k y k c y

Thus, after encryption, we get:

Before encryption: sometext
After encryption: xtrkykcy

Method 2[edit]

A more complicated method involves a Bifid cipher without a key (or, in other words, with a key of plain alphabet):

1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z

The message is transformed into coordinates on the Polybius square, and the coordinates are recorded vertically:

Letter s o m e t e x t
Horizontal coordinate: 3 4 2 5 4 5 3 4
Vertical coordinate: 4 3 3 1 4 1 5 4


Then the coordinates are read row by row:

34  25  45  34  43  31  41  54  

Next, the coordinates are converted into letters using the same square:

Horizontal coordinate: 3 2 4 3 4 3 4 5
Vertical coordinate: 4 5 5 4 3 1 1 4
Letter s w y s o c d u

Thus, after encryption, we get:

Before encryption: sometext
After encryption: swysocdu

Method 3[edit]

1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z

An advanced variation, which involves the following: the obtained primary ciphertext (result From Method2) is encrypted again. In this case, it is written out without being split into pairs.

3425453443314154

The resulting sequence of digits is cyclically shifted to the left by one step (an odd number of steps (move 3 to the end)):

4254534433141543

This sequence is again divided into groups of two:

42 54 53 44 33 14 15 43

And is replaced with the final ciphertext according to the table:

Horizontal coordinate: 4 5 5 4 3 1 1 4
Vertical coordinate: 2 4 3 4 3 4 5 3
Letter i u p t n q v o

Thus, after encryption, we get:

Before encryption: sometext
After encryption: iuptnqvo


Applications[edit]

Telegraphy[edit]

Diagram of a fire signal using the Polybius cipher

In his Histories, Polybius outlines the need for effective signalling in warfare, leading to the development of the square. Previously, fire-signalling was useful only for expected, predetermined messages, with no way to convey novel messages about unexpected events.[1] According to Polybius, in the 4th century BCE, Aeneas Tacticus devised a hydraulic semaphore system consisting of matching vessels with sectioned rods labelled with different messages such as "Heavy Infantry", "Ships", and "Corn".[1] This system was slightly better than the basic fire-signalling, but still lacked the ability to convey any needed message. The Polybius square was used to aid in telegraphy, specifically fire-signalling. To send a message, the sender would initially hold up two torches and wait for the recipient to do the same to signal that they were ready to receive the message.[1] The sender would then hold up the first set of torches on his left side to indicate to the recipient which tablet (or row of the square) was to be consulted. The sender would then raise a set of torches on his right side to indicate which letter on the tablet was intended for the message.[1] Both parties would need the same tablets, a telescope (a tube to narrow view, no real magnification), and torches.[1]

The Polybius square has also been used in the form of the "knock code" to signal messages between cells in prisons by tapping the numbers on pipes or walls.[2] It is said to have been used by nihilist prisoners of the Russian Czars and also by US prisoners of war during the Vietnam War.[3]

Arthur Koestler describes the code being used by political prisoners of Stalin in the 1930s in his anti-totalitarian novel Darkness at Noon. (Koestler had been a prisoner-of-war during the Spanish Civil War.) Indeed, it can be signalled in many simple ways (flashing lamps, blasts of sound, drums, smoke signals) and is much easier to learn than more sophisticated codes like the Morse code. However, it is also somewhat less efficient than more complex codes.

Steganography[edit]

The simple representation also lends itself to steganography. The figures from one to five can be indicated by knots in a string, stitches on a quilt, contiguous letters before a wider space or many other ways.[3]

Cryptography[edit]

The Polybius square is also used as a basic cipher called the Polybius cipher. This cipher is quite insecure by modern standards, as it is a substitution cipher with characters being substituted for pairs of digits, which is easily broken through frequency analysis.[2]

Adaptations[edit]

The Polybius square and the Polybius cipher can be combined with other cryptographic methods such as the ADFGVX cipher,[2] Homophonic cipher [2] and more.

See also[edit]

References[edit]

  1. ^ a b c d e f g "Polybius • Histories — Book 10". penelope.uchicago.edu. Retrieved 2020-04-13.
  • ^ a b c d e Salomon, D. (David), 1938- (2011). Data privacy and security : encryption and information hiding. Springer. ISBN 978-1-4419-1816-1. OCLC 752480143.{{cite book}}: CS1 maint: multiple names: authors list (link) CS1 maint: numeric names: authors list (link)
  • ^ a b Daniel Rodriguez-Clark. "Cryptography Worksheet — Polybius Square" (PDF). Crypto Corner. pp. 1–3. 


  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Polybius_square&oldid=1204869792"

    Categories: 
    Classical ciphers
    History of telecommunications
    Steganography
    Ancient Arcadia
    Hidden categories: 
    CS1 maint: multiple names: authors list
    CS1 maint: numeric names: authors list
    Articles with short description
    Short description is different from Wikidata
    All articles with unsourced statements
    Articles with unsourced statements from January 2023
     



    This page was last edited on 8 February 2024, at 06:40 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki