Nerdy creations with numbers, words, sounds, and pixels

Science

Bridgeman

Bridgeman - manual encryption method by Anton Hoyer based on a card deck

This encryption method is based on a standard deck of 52 cards and can be used with pen and paper or a computer. The default order of the deck is clubs (♣), diamonds (♦), hearts (♥), spades (♠). Within each suit, the cards are ordered as ace (A), two (2), three (3), four (4), five (5), six (6), seven (7), eight (8), nine (9), ten (0), jack (J), queen (Q), king (K).

Sorted card deck

The key is obtained by randomly shuffling the deck, resulting in roughly 8 · 1067 permutations.

Shuffled card deck

Plain text

“I built you a shrine behind a secret door. I’m gonna make you mine because I need you more. But something is amiss and that thing is you.”

Encryption

To achieve maximum obfuscation, the cipher consists of two steps: rearrangement and substitution. First, the plaintext is cleared of all spaces and punctuation, divided into chunks of 52 letters, and padded with random letters if necessary. Each chunk is then written to a 4 × 13 grid, which represents the shuffled deck, and rearranged to match the sorted deck.

Letter rearrangement

Subsequently, in the substitution step, each letter is shifted by the value of the corresponding key card, similar to a Caesar or Vigenère cipher. The card values can comply with any card game, but I sort them from ace = 1 to king = 13 to give each card a different value. Additionally, black suits (♣ & ♠) shift in a positive direction, while red suits (♦ & ♥) shift in a negative direction, for example: Y & ♦8 = 25 – 8 = 17 = Q.

Letter substitution

QEEDVCUNQBCDYGJBEUFMKSVCVCDDLRLEVOQHQFLSHAPKXPHISUSW
AKYBUROKGWGPYRTEZLWTGTBYZONOAFXBCRRBCJLGAUDXNPORWKRA
EXOIXTMBELVGDOHQPOQAQQEVGHWRQJHKYWJNSFXIDNEDQBBNMIIA

Decryption

Decryption follows the same steps in reverse order. With proper practice, one only needs to hold onto an inconspicuous card deck and ensure that it is not accidentally shuffled.

IBUILTYOUASHRINEBEHINDASECRETDOORIMGONNAMAKEYOUMINEB
ECAUSEINEEDYOUMOREBUTSOMETHINGISAMISSANDTHATTHINGISY
OUBJOKADQMNHFYHWRYBPRJUNFZUFSCJVYQGPRYJKHXYFRKUIPJOF

Unfortunately, this encryption method has very low key sensitivity. That means, if two key cards are swapped, the corresponding plaintext letters are swapped in the same fashion. This makes the cipher very succeptible to hill climbing attacks, for which the key is incrementally changed while the deciphered text is scanned for an increasing number of letter groups that resemble actual words.

← Return to “Cryptology”

← Return to “Science”

Leave a Reply