Sha256: cb15886f2b7131b5a7e08ab5042899ba0481403f8efae246dd116676c9504d37

Contents?: true

Size: 1.64 KB

Versions: 83

Compression:

Stored size: 1.64 KB

Contents

Implement encoding and decoding for the rail fence cipher.

The Rail Fence cipher is a form of transposition cipher that gets its name from
the way in which it's encoded. It was already used by the ancient Greeks.

In the Rail Fence cipher, the message is written downwards on successive "rails"
of an imaginary fence, then moving up when we get to the bottom (like a zig-zag).
Finally the message is then read off in rows.

For example, using three "rails" and the message "WE ARE DISCOVERED FLEE AT ONCE",
the cipherer writes out:
```
W . . . E . . . C . . . R . . . L . . . T . . . E
. E . R . D . S . O . E . E . F . E . A . O . C .
. . A . . . I . . . V . . . D . . . E . . . N . .
```

Then reads off:
```
WECRLTEERDSOEEFEAOCAIVDEN
```


To decrypt a message you take the zig-zag shape and fill the ciphertext along the rows.
```
? . . . ? . . . ? . . . ? . . . ? . . . ? . . . ?
. ? . ? . ? . ? . ? . ? . ? . ? . ? . ? . ? . ? .
. . ? . . . ? . . . ? . . . ? . . . ? . . . ? . .
```

The first row has seven spots that can be filled with "WECRLTE".
```
W . . . E . . . C . . . R . . . L . . . T . . . E
. ? . ? . ? . ? . ? . ? . ? . ? . ? . ? . ? . ? .
. . ? . . . ? . . . ? . . . ? . . . ? . . . ? . .
```

Now the 2nd row takes "ERDSOEEFEAOC".
```
W . . . E . . . C . . . R . . . L . . . T . . . E
. E . R . D . S . O . E . E . F . E . A . O . C .
. . ? . . . ? . . . ? . . . ? . . . ? . . . ? . .
```

Leaving "AIVDEN" for the last row.
```
W . . . E . . . C . . . R . . . L . . . T . . . E
. E . R . D . S . O . E . E . F . E . A . O . C .
. . A . . . I . . . V . . . D . . . E . . . N . .
```

If you now read along the zig-zag shape you can read the original message.

Version data entries

83 entries across 83 versions & 1 rubygems

Version Path
trackler-2.2.1.39 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.38 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.37 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.36 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.35 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.34 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.33 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.32 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.31 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.30 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.29 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.28 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.27 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.26 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.25 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.24 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.23 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.22 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.21 problem-specifications/exercises/rail-fence-cipher/description.md
trackler-2.2.1.20 problem-specifications/exercises/rail-fence-cipher/description.md