Rail fence cipher

It derives its name from the manner in which encryption is performed, in analogy to a fence built with horizontal rails.

In the rail fence cipher, the plaintext is written downwards diagonally on successive "rails" of an imaginary fence, then moving up when the bottom rail is reached, down again when the top rail is reached, and so on until the whole plaintext is written out.

The ciphertext is then read off in rows.

For example, to encrypt the message 'WE ARE DISCOVERED.

with 3 "rails", write the text as: (Spaces and punctuation are omitted.)

Then read off the text horizontally to get the ciphertext: Let

be the number of rails used during encryption.

Observe that as the plaintext is written, the sequence of each letter's vertical position on the rails varies up and down in a repeating cycle.

) the vertical position repeats with a period of 4.

In general the sequence repeats with a period of

and the length of each intermediate string is

, so we split the ciphertext as follows: Write each string on a separate line with spaces after each letter in the first and last line: Then one can read off the plaintext down the first column, diagonally up, down the next column, and so on.

, the determination of how to split up the ciphertext is slightly more complicated than as described above, but the basic approach is the same.

Alternatively, for simplicity in decrypting, one can pad the plaintext with extra letters to make its length a multiple of

If the ciphertext has not been padded, but you either know or are willing to brute-force the number of rails used, you can decrypt it using the following steps.

be the number of rails used during encryption.

= the number of diagonals in the decrypted Rail Fence, and

= the number of empty spaces in the last diagonal.

algebraically, where both values are the smallest number possible.

Consider the example cipher, modified to use 6 rails instead of 3.

The resulting cipher text is: We know that

Or, 6 rails, 5 diagonals (4+1), and 2 empty spaces at the end.

By blocking out the empty spaces at the end of the last diagonal, we can simply fill in the Rail Fence line by line using the ciphertext.

Therefore the number of usable keys is low, allowing the brute-force attack of trying all possible keys.

As a result, the rail-fence cipher is considered weak.

[citation needed] The term zigzag cipher may refer to the rail fence cipher as described above.

However, it may also refer to a different type of cipher described by Fletcher Pratt in Secret and Urgent.

It is "written by ruling a sheet of paper in vertical columns, with a letter at the head of each column.

A dot is made for each letter of the message in the proper column, reading from top to bottom of the sheet.

The letters at the head of the columns are then cut off, the ruling erased and the message of dots sent along to the recipient, who, knowing the width of the columns and the arrangement of the letters at the top, reconstitutes the diagram and reads what it has to say.

Rail fence