# Cryptography and Linguistics. A Research on Linguistic Cryptosystems. ![rw-book-cover](https://readwise-assets.s3.amazonaws.com/static/images/article2.74d541386bbf.png) URL:: https://dranaxum.wordpress.com/2007/11/02/cryptography-and-linguistics-a-research-on-linguistic-cryptosystems/ Author:: November ## Highlights > Let’s take a function f:A → B , where A is the collection of plain text words, and B is the collection of the encrypted words. We will take for each word in A, a word y from another language. This way “this” is “atunci”, where “atunci” means “then” in Romanian language. The words in the Romanian language corresponding to words in A collection, form the cipher’s key. > The problem of this algorithm is that it is vulnerable to frequency attack (we can make a statistics of frequent used words in a “big” plain text and confront them with the statistics of the frequent used words in English). > We will make a change: instead of encoding each word with another word, let’s encode each letter with a precise word. This is still vulnerable to frequency attack (we can make a statistics of frequent used words and confront them with the statistics of the frequent used letters in English). > After the last step, A is the collection of plain text letters, and B is the collection of encrypted letters, using words. > The last idea is to choose specific words in the key, so we can permute them after a certain rule, this way to form a text with a certain topic in the key’s language. > For example we have the text: “ab cd” > We choose z language, and choose > “a” to be “z1z2” > “b” to be “z3z4z5” > “c” to be “z3z1” > “d” to be “z2z5” > z1,z2,z3,z4,z5 are letters in z language. > The encrypted text after this step will look like this: “z1z2 z3z4z5 z3z1 z2z5”. > Let’s permute them after a u rule and we will have: > “z2z5 z3z1 z1z2 z3z4z5”, where this text can be read, and has a topic and meaning in z language. > Practical Usage: > To write this algorithm is pretty challenging and it will work very slow because you need to try every single language, and for each language to verify a set of words for the key and to find a u rule so that the encrypted text following the algorithm above will have a meaning in z language. For the algorithm to check the meaning implies that you have a strong basis of AI knowledge. > Though, this algorithm can prove to be a secure one because of one important thing: when the cryptanalyst sniffs the encrypted text he will have in front of him a text with a “real” meaning, so this will make him think that the “line” from where he got it is insecure. Which is false, but he will not bother to decrypt it. --- Title: Cryptography and Linguistics. A Research on Linguistic Cryptosystems. Author: November Tags: readwise, articles date: 2024-01-30 --- # Cryptography and Linguistics. A Research on Linguistic Cryptosystems. ![rw-book-cover](https://readwise-assets.s3.amazonaws.com/static/images/article2.74d541386bbf.png) URL:: https://dranaxum.wordpress.com/2007/11/02/cryptography-and-linguistics-a-research-on-linguistic-cryptosystems/ Author:: November ## AI-Generated Summary None ## Highlights > Let’s take a function f:A → B , where A is the collection of plain text words, and B is the collection of the encrypted words. We will take for each word in A, a word y from another language. This way “this” is “atunci”, where “atunci” means “then” in Romanian language. The words in the Romanian language corresponding to words in A collection, form the cipher’s key. > The problem of this algorithm is that it is vulnerable to frequency attack (we can make a statistics of frequent used words in a “big” plain text and confront them with the statistics of the frequent used words in English). > We will make a change: instead of encoding each word with another word, let’s encode each letter with a precise word. This is still vulnerable to frequency attack (we can make a statistics of frequent used words and confront them with the statistics of the frequent used letters in English). > After the last step, A is the collection of plain text letters, and B is the collection of encrypted letters, using words. > The last idea is to choose specific words in the key, so we can permute them after a certain rule, this way to form a text with a certain topic in the key’s language. > For example we have the text: “ab cd” > We choose z language, and choose > “a” to be “z1z2” > “b” to be “z3z4z5” > “c” to be “z3z1” > “d” to be “z2z5” > z1,z2,z3,z4,z5 are letters in z language. > The encrypted text after this step will look like this: “z1z2 z3z4z5 z3z1 z2z5”. > Let’s permute them after a u rule and we will have: > “z2z5 z3z1 z1z2 z3z4z5”, where this text can be read, and has a topic and meaning in z language. > Practical Usage: > To write this algorithm is pretty challenging and it will work very slow because you need to try every single language, and for each language to verify a set of words for the key and to find a u rule so that the encrypted text following the algorithm above will have a meaning in z language. For the algorithm to check the meaning implies that you have a strong basis of AI knowledge. > Though, this algorithm can prove to be a secure one because of one important thing: when the cryptanalyst sniffs the encrypted text he will have in front of him a text with a “real” meaning, so this will make him think that the “line” from where he got it is insecure. Which is false, but he will not bother to decrypt it.