• Friedrich L. Bauer


Transpositions were for a while the favorites of the military, particularly in the late 18th and early 19th century in France, Germany, Austria, and elsewhere. They seemed to be suitable above all as field ciphers (‘trench codes’) above all for the lower ranks. Bazeries, around 1900, made fun of this and generally ascribed to transposition systems that seemed difficult at first sight a complication illusoire. Cryptanalysts usually loved adversaries that used simple transpositions (like the German Abwehr hand ciphers) because they promised to be easy prey; likewise the literature treats cryptanalysis of transpositions as relatively unsophisticated.


Contact Method Cyclic Shift Bigram Frequency Easy Prey Simple Transposition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Friedrich L. Bauer
    • 1
  1. 1.Department of Computer ScienceMunich Institute of TechnologyMunichGermany

Personalised recommendations