This is a basic transpositional cipher . My question above was to determine if it was a transpose cipher or a substitution cipher. Cryptanalysis of such systems is quite simple. Others have already referred to basic methods. Optimal approaches will try to first place the most complex and rare letters, as they will seek to uniquely identify the letters around them, which greatly reduces the subsequent search space. Just finding a place to put βaβ (not a pun intended) is not difficult, but finding a place to place βqβ, βzβ, or βxβ is a bit more work.
The main goal of the quality of the algorithm is not to decrypt the text, since it can be done better than brute force methods, and just be quick, but it should eliminate the possibilities as quickly as possible.
Since you can use multiple lines at the same time, trying to create words from the rarest characters will allow you to test attacks on words in parallel. Finding the correct placement of the rarest terms in each line will decrypt this encrypted PLUS text of all the others at the same time as quickly as possible.
If you are looking for cryptanalysis of transposition ciphers, you will find a link to genetic algorithms. They are designed to advance the research circle of people working in GA, because they are actually not optimal in practice. Instead, you should look at some basic optimization methods, such as branch and bound, A * and many statistical methods. (How deep you should go depends on your level of knowledge in algorithms and statistics. :) I have switched several times between deterministic methods and statistical optimization methods.)
In any case, the calculations should be cheap and fast, because the scale of the initial guesses can be quite large. Itβs best to have a cheap way to filter out a lot of possible placements first, and then spend more CPU time sifting through the best candidates. To this end, it is good to have a way of describing the processing steps and the computational effort for each step. (At least what I would expect if I gave this as an interview question.)
You can even buy a fairly reliable guide to deciphering double transposition ciphers.
Update 1: Browse through these slides for more ideas on iterative improvements. This is not a great slide set, but it is easily accessible. Moreover, although the slides relate to GA and simulated annealing (methods that come a lot in search results for cryptanalysis of transpositional encryption), the author advocates such methods when you can use A * or other methods. :)
Iterator
source share