193:
These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name of the measure.
1572:
27:
192:
The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while they give the other to their envoy.
220:
An alternative hypothesis is that the scytale was used for message authentication rather than encryption. Only if the sender wrote the message around a scytale of the same diameter as the receiver's would the receiver be able to read it. It would therefore be difficult for enemy spies to inject
167:
To decrypt, all one must do is wrap the leather strip around the rod and read across. The ciphertext is: "Iryyatbhmvaehedlurlp" Every fourth letter will appear on the same line, so the plaintext (after re-insertion of spaces) becomes: "I am hurt very badly help".
207:
Due to difficulties in reconciling the description of
Plutarch with the earlier accounts, and circumstantial evidence such as the cryptographic weakness of the device, several authors have suggested that the scytale was used for conveying messages in
151:
_____________________________________________________________ | | | | | | | | I | a | m | h | u | | __| r | t | v | e | r |__| | | y | b | a | d | l | | | y | h | e | l | p | | | | | | | |
1552:
1382:
809:
655:
372:
1235:
224:
Nonetheless, any person intercepting a scytale message, and having heard about the method, could with little difficulty find out the rod size needed (a kind of
184:(middle of the 3rd century BC) that a clear indication of its use as a cryptographic device appeared. A description of how it operated is not known from before
802:
1610:
365:
180:, who lived in the 7th century BC. Other Greek and Roman writers during the following centuries also mentioned it, but it was not until
1228:
278:
795:
1431:
358:
1221:
1605:
1547:
1502:
1315:
98:
1600:
1426:
1542:
751:
670:
1532:
1522:
1377:
435:
20:
660:
141:
Suppose the rod allows one to write four letters around in a circle and five letters down the side of it. The
84:
1527:
1517:
1320:
1280:
1273:
1263:
1258:
736:
460:
455:
395:
1268:
597:
79:
1575:
1421:
1367:
1146:
837:
731:
726:
701:
506:
501:
114:, consisting of a cylinder with a strip of parchment wound around it on which is written a message. The
1071:
1537:
1461:
1177:
1081:
1035:
1025:
1020:
1015:
1007:
764:
450:
410:
181:
111:
1300:
1196:
1191:
1105:
939:
759:
645:
1406:
1390:
1337:
1172:
1091:
997:
929:
225:
860:
1466:
1456:
1327:
1141:
1061:
1030:
924:
855:
316:
274:
1401:
818:
308:
45:
962:
919:
888:
870:
445:
1476:
1396:
1357:
1305:
1290:
1181:
1076:
957:
850:
845:
546:
531:
496:
440:
400:
115:
228:); once knowing that, it would be easy to supplant the sender and forge new messages.
1594:
1557:
1512:
1471:
1451:
1347:
1310:
1285:
1133:
987:
967:
947:
898:
878:
592:
387:
237:
1507:
1352:
1342:
1332:
1295:
1244:
1066:
977:
883:
612:
329:
35:
1486:
1151:
1118:
1113:
982:
650:
516:
177:
1446:
1416:
1411:
1372:
1185:
1167:
972:
903:
625:
312:
156:
320:
1436:
1123:
209:
142:
176:
From indirect evidence, the scytale was first mentioned by the Greek poet
1481:
1441:
893:
774:
769:
185:
130:
123:
92:
680:
665:
620:
572:
122:
in particular, are said to have used this cipher to communicate during
1362:
1086:
952:
826:
741:
721:
685:
675:
602:
475:
470:
465:
425:
405:
119:
26:
1056:
1051:
992:
716:
711:
706:
640:
635:
587:
582:
577:
567:
541:
526:
511:
480:
430:
415:
25:
630:
536:
521:
420:
107:
1217:
791:
354:
221:
false messages into the communication between two commanders.
152:
_____________________________________________________________
66:
63:
96:
57:
133:
on which the parchment is wrapped to read the message.
1383:
Cryptographically secure pseudorandom number generator
299:
Kelly, Thomas (July 1998). "The Myth of the
Skytale".
16:
Encryption tool used to perform a transposition cipher
330:"Les Langages Secrets Dans l'Antiquité Gréco-Romaine"
54:
51:
342:
60:
1495:
1251:
1160:
1132:
1104:
1044:
1006:
938:
912:
869:
836:
825:
750:
694:
611:
560:
489:
386:
48:
148:To encrypt, one simply writes across the leather:
212:and that Plutarch's description is mythological.
159:becomes, "Iryyatbhmvaehedlurlp" after unwinding.
190:
332:(in French). Universite Catholique de Louvain.
1229:
803:
366:
8:
1236:
1222:
1214:
833:
810:
796:
788:
373:
359:
351:
347:
343:
336:Secret Languages in Graeco-Roman Antiquity
271:Information Gathering in Classical Greece
249:
145:could be: "I am hurt very badly help".
256:
202:(Lysander 19), ed. Bernadotte Perrin.
129:The recipient uses a rod of the same
7:
307:(3). Taylor & Francis: 244–260.
273:. U. Michigan Press. p. 117.
14:
216:Message authentication hypothesis
1571:
1570:
44:
1432:Information-theoretic security
1:
1548:Message authentication code
1503:Cryptographic hash function
1316:Cryptographic hash function
1627:
1611:Military history of Sparta
1427:Harvest now, decrypt later
328:Collard, Brigitte (2004).
97:
83:
18:
1566:
1543:Post-quantum cryptography
1213:
787:
350:
346:
335:
313:10.1080/0161-119891886902
1533:Quantum key distribution
1523:Authenticated encryption
1378:Random number generation
21:Scytale (disambiguation)
1528:Public-key cryptography
1518:Symmetric-key algorithm
1321:Key derivation function
1281:Cryptographic primitive
1274:Authentication protocol
1264:Outline of cryptography
1259:History of cryptography
1269:Cryptographic protocol
819:Classical cryptography
598:Siemens and Halske T52
269:Russel, Frank (1999).
205:
74:; also transliterated
31:
1422:End-to-end encryption
1368:Cryptojacking malware
661:Sectéra Secure Module
29:
1538:Quantum cryptography
1462:Trusted timestamping
1178:Index of coincidence
1082:Reservehandverfahren
765:Intel SHA extensions
182:Apollonius of Rhodes
112:transposition cipher
19:For other uses, see
1301:Cryptographic nonce
1197:Kasiski examination
1192:Information leakage
760:AES instruction set
1606:Encryption devices
1407:Subliminal channel
1391:Pseudorandom noise
1338:Key (cryptography)
1173:Frequency analysis
1072:Rasterschlüssel 44
259:, pp. 244–260
226:brute-force attack
188:(50–120 AD):
110:used to perform a
32:
1601:Classical ciphers
1588:
1587:
1584:
1583:
1467:Key-based routing
1457:Trapdoor function
1328:Digital signature
1209:
1208:
1205:
1204:
1100:
1099:
783:
782:
752:Computer hardware
497:Bazeries cylinder
1618:
1574:
1573:
1402:Insecure channel
1238:
1231:
1224:
1215:
834:
812:
805:
798:
789:
375:
368:
361:
352:
348:
344:
337:
333:
324:
285:
284:
266:
260:
254:
203:
102:
101:
87:
73:
72:
69:
68:
65:
62:
59:
56:
53:
50:
1626:
1625:
1621:
1620:
1619:
1617:
1616:
1615:
1591:
1590:
1589:
1580:
1562:
1491:
1247:
1242:
1201:
1156:
1128:
1096:
1040:
1002:
934:
908:
871:Polybius square
865:
829:
821:
816:
779:
746:
690:
607:
593:Lorenz SZ 40/42
556:
485:
382:
381:Cipher machines
379:
341:
327:
298:
294:
292:Further reading
289:
288:
281:
268:
267:
263:
255:
251:
246:
234:
218:
204:
197:
174:
165:
153:
139:
47:
43:
24:
17:
12:
11:
5:
1624:
1622:
1614:
1613:
1608:
1603:
1593:
1592:
1586:
1585:
1582:
1581:
1579:
1578:
1567:
1564:
1563:
1561:
1560:
1555:
1553:Random numbers
1550:
1545:
1540:
1535:
1530:
1525:
1520:
1515:
1510:
1505:
1499:
1497:
1493:
1492:
1490:
1489:
1484:
1479:
1477:Garlic routing
1474:
1469:
1464:
1459:
1454:
1449:
1444:
1439:
1434:
1429:
1424:
1419:
1414:
1409:
1404:
1399:
1397:Secure channel
1394:
1388:
1387:
1386:
1375:
1370:
1365:
1360:
1358:Key stretching
1355:
1350:
1345:
1340:
1335:
1330:
1325:
1324:
1323:
1318:
1308:
1306:Cryptovirology
1303:
1298:
1293:
1291:Cryptocurrency
1288:
1283:
1278:
1277:
1276:
1266:
1261:
1255:
1253:
1249:
1248:
1243:
1241:
1240:
1233:
1226:
1218:
1211:
1210:
1207:
1206:
1203:
1202:
1200:
1199:
1194:
1189:
1175:
1170:
1164:
1162:
1158:
1157:
1155:
1154:
1149:
1144:
1138:
1136:
1130:
1129:
1127:
1126:
1121:
1116:
1110:
1108:
1102:
1101:
1098:
1097:
1095:
1094:
1089:
1084:
1079:
1077:Reihenschieber
1074:
1069:
1064:
1059:
1054:
1048:
1046:
1042:
1041:
1039:
1038:
1033:
1028:
1023:
1018:
1012:
1010:
1004:
1003:
1001:
1000:
995:
990:
985:
980:
975:
970:
965:
960:
955:
950:
944:
942:
936:
935:
933:
932:
927:
922:
916:
914:
910:
909:
907:
906:
901:
896:
891:
886:
881:
875:
873:
867:
866:
864:
863:
858:
853:
848:
842:
840:
838:Polyalphabetic
831:
823:
822:
817:
815:
814:
807:
800:
792:
785:
784:
781:
780:
778:
777:
772:
767:
762:
756:
754:
748:
747:
745:
744:
739:
734:
729:
724:
719:
714:
709:
704:
698:
696:
692:
691:
689:
688:
683:
678:
673:
668:
663:
658:
653:
648:
643:
638:
633:
628:
623:
617:
615:
609:
608:
606:
605:
600:
595:
590:
585:
580:
575:
570:
564:
562:
558:
557:
555:
554:
549:
547:Reihenschieber
544:
539:
534:
532:Jefferson disk
529:
524:
519:
514:
509:
504:
499:
493:
491:
487:
486:
484:
483:
478:
473:
468:
463:
458:
453:
448:
443:
438:
433:
428:
423:
418:
413:
408:
403:
398:
392:
390:
388:Rotor machines
384:
383:
380:
378:
377:
370:
363:
355:
340:
339:
325:
295:
293:
290:
287:
286:
279:
261:
248:
247:
245:
242:
241:
240:
233:
230:
217:
214:
195:
173:
170:
164:
161:
150:
138:
135:
116:ancient Greeks
15:
13:
10:
9:
6:
4:
3:
2:
1623:
1612:
1609:
1607:
1604:
1602:
1599:
1598:
1596:
1577:
1569:
1568:
1565:
1559:
1558:Steganography
1556:
1554:
1551:
1549:
1546:
1544:
1541:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1521:
1519:
1516:
1514:
1513:Stream cipher
1511:
1509:
1506:
1504:
1501:
1500:
1498:
1494:
1488:
1485:
1483:
1480:
1478:
1475:
1473:
1472:Onion routing
1470:
1468:
1465:
1463:
1460:
1458:
1455:
1453:
1452:Shared secret
1450:
1448:
1445:
1443:
1440:
1438:
1435:
1433:
1430:
1428:
1425:
1423:
1420:
1418:
1415:
1413:
1410:
1408:
1405:
1403:
1400:
1398:
1395:
1392:
1389:
1384:
1381:
1380:
1379:
1376:
1374:
1371:
1369:
1366:
1364:
1361:
1359:
1356:
1354:
1351:
1349:
1348:Key generator
1346:
1344:
1341:
1339:
1336:
1334:
1331:
1329:
1326:
1322:
1319:
1317:
1314:
1313:
1312:
1311:Hash function
1309:
1307:
1304:
1302:
1299:
1297:
1294:
1292:
1289:
1287:
1286:Cryptanalysis
1284:
1282:
1279:
1275:
1272:
1271:
1270:
1267:
1265:
1262:
1260:
1257:
1256:
1254:
1250:
1246:
1239:
1234:
1232:
1227:
1225:
1220:
1219:
1216:
1212:
1198:
1195:
1193:
1190:
1187:
1183:
1179:
1176:
1174:
1171:
1169:
1166:
1165:
1163:
1161:Cryptanalysis
1159:
1153:
1150:
1148:
1145:
1143:
1140:
1139:
1137:
1135:
1134:Steganography
1131:
1125:
1122:
1120:
1117:
1115:
1112:
1111:
1109:
1107:
1103:
1093:
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1063:
1060:
1058:
1055:
1053:
1050:
1049:
1047:
1043:
1037:
1034:
1032:
1029:
1027:
1024:
1022:
1019:
1017:
1014:
1013:
1011:
1009:
1008:Transposition
1005:
999:
996:
994:
991:
989:
986:
984:
981:
979:
976:
974:
971:
969:
966:
964:
961:
959:
956:
954:
951:
949:
946:
945:
943:
941:
937:
931:
928:
926:
923:
921:
918:
917:
915:
911:
905:
902:
900:
897:
895:
892:
890:
887:
885:
882:
880:
877:
876:
874:
872:
868:
862:
859:
857:
854:
852:
849:
847:
844:
843:
841:
839:
835:
832:
828:
824:
820:
813:
808:
806:
801:
799:
794:
793:
790:
786:
776:
773:
771:
768:
766:
763:
761:
758:
757:
755:
753:
749:
743:
740:
738:
735:
733:
730:
728:
725:
723:
720:
718:
715:
713:
710:
708:
705:
703:
700:
699:
697:
693:
687:
684:
682:
679:
677:
674:
672:
669:
667:
664:
662:
659:
657:
654:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
627:
624:
622:
619:
618:
616:
614:
610:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
565:
563:
559:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
494:
492:
488:
482:
479:
477:
474:
472:
469:
467:
464:
462:
459:
457:
454:
452:
449:
447:
444:
442:
439:
437:
434:
432:
429:
427:
424:
422:
419:
417:
414:
412:
409:
407:
404:
402:
399:
397:
394:
393:
391:
389:
385:
376:
371:
369:
364:
362:
357:
356:
353:
349:
345:
331:
326:
322:
318:
314:
310:
306:
302:
297:
296:
291:
282:
280:0-472-11064-0
276:
272:
265:
262:
258:
253:
250:
243:
239:
238:Caesar cipher
236:
235:
231:
229:
227:
222:
215:
213:
211:
201:
194:
189:
187:
183:
179:
171:
169:
162:
160:
158:
149:
146:
144:
136:
134:
132:
127:
125:
121:
117:
113:
109:
105:
100:
94:
90:
86:
81:
80:Ancient Greek
77:
71:
41:
37:
28:
22:
1508:Block cipher
1353:Key schedule
1343:Key exchange
1333:Kleptography
1296:Cryptosystem
1245:Cryptography
1067:One-time pad
940:Substitution
613:Secure voice
551:
406:M-125 Fialka
304:
300:
270:
264:
252:
223:
219:
206:
199:
191:
175:
166:
154:
147:
140:
128:
103:
88:
75:
39:
36:cryptography
33:
1496:Mathematics
1487:Mix network
1119:Code talker
998:Running key
930:Four-square
561:Teleprinter
517:Cipher disk
301:Cryptologia
178:Archilochus
126:campaigns.
1595:Categories
1447:Ciphertext
1417:Decryption
1412:Encryption
1373:Ransomware
1168:Cryptogram
1062:Kama Sutra
1031:Rail fence
1026:Myszkowski
973:Chaocipher
925:Two-square
904:VIC cipher
856:Trithemius
626:FASCINATOR
490:Mechanical
334:(English:
257:Kelly 1998
244:References
198:Plutarch,
163:Decrypting
157:ciphertext
137:Encrypting
118:, and the
1437:Plaintext
1092:Solitaire
830:by family
321:1558-1586
210:plaintext
143:plaintext
30:A scytale
1576:Category
1482:Kademlia
1442:Codetext
1385:(CSPRNG)
1180:(Units:
1016:Columnar
963:Beaufort
920:Playfair
894:Tap code
889:Nihilist
861:Vigenère
775:IBM 4764
770:IBM 4758
737:Pinwheel
232:See also
196:—
186:Plutarch
131:diameter
124:military
120:Spartans
104:skútalon
99:σκύταλον
95:", also
93:cylinder
91:"baton,
1252:General
958:Autokey
846:Alberti
827:Ciphers
681:STU-III
666:SIGSALY
621:BID 150
573:BID 770
552:Scytale
476:Singlet
436:Mercury
172:History
155:so the
106:) is a
89:skutálē
85:σκυτάλη
76:skytale
40:scytale
1363:Keygen
1147:Grille
1087:Slidex
1021:Double
988:Pigpen
968:Caesar
953:Atbash
948:Affine
913:Square
899:Trifid
879:ADFGVX
851:Enigma
742:Rockex
732:Purple
722:Noreen
686:VINSON
676:STU-II
646:NESTOR
603:SIGTOT
471:SIGCUM
466:SIGABA
426:Lacida
411:Hebern
401:Enigma
319:
277:
1393:(PRN)
1142:Bacon
1106:Codes
1057:DRYAD
1052:BATCO
1045:Other
1036:Route
993:ROT13
978:Great
884:Bifid
717:KL-51
712:KL-43
707:KG-84
695:Other
641:KY-68
636:KY-58
588:KW-37
583:KW-26
578:DUDEK
568:5-UCO
542:M-209
527:Kryha
512:CD-57
481:Typex
461:SG-41
456:SG-39
431:M-325
416:HX-63
200:Lives
1184:and
1152:Null
1124:Poem
1114:Book
983:Hill
702:JADE
656:SCIP
651:OMNI
631:KY-3
537:M-94
522:HC-9
507:C-52
502:C-36
441:NEMA
421:KL-7
317:ISSN
275:ISBN
108:tool
38:, a
1186:Nat
1182:Ban
727:Red
671:STE
451:RED
446:OMI
396:CCM
309:doi
34:In
1597::
315:.
305:22
303:.
82::
78:,
67:iː
64:əl
1237:e
1230:t
1223:v
1188:)
811:e
804:t
797:v
374:e
367:t
360:v
338:)
323:.
311::
283:.
70:/
61:t
58:ɪ
55:k
52:s
49:ˈ
46:/
42:(
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.