Dvorak encoding

Dvorak encoding is a type of encoding based on the differences in layout of a QWERTY keyboard and a Dvorak keyboard. There is one main variation: One is achieved by typing in the Dvorak layout on a QWERTY keyboard, and the other is similarly achieved by typing in the QWERTY layout on a Dvorak keyboard. This effectively makes Dvorak encoding into a monoalphabetic substitution cipher like ROT13 and the Caesar Cipher, since each one character translates to one other character in a consistent pattern.

Several layers of Dvorak encoding may be added on top of each other for a variance of the translation table, which adds an obfuscating effect. The one where the Dvorak layout is used on a QWERTY keyboard can be added to the one where a QWERTY layout is used on a Dvorak keyboard, since they are not each other's opposites in terms of decoding. When decoding, the correct order of the severally applied translation tables must happen in the correct order. If encoding or decoding in one direction (for example, from Dvorak to QWERTY), it takes only 210 layers of encoding for the original Dvorak string to be encoded back to itself.[1]

Dvorak encoding, like other monoalphabetic encryption ciphers, is a very simple encoding and provides a very weak level of security. It may be useful in combination with other encodings. The security involved is in no way comparable to modern encryption algorithms which advocate security, and the advantages with this encoding can as such be summarised to encompass:

Variations in the use of left- and right-hand Dvorak keyboard layouts also provide an additional subset of encodings. The left and right variants are slightly better because the number keys are changed as well as the character keys in this respect, the left-hand Dvorak encoding changes the most keys. Notably, the a and m keys never change in the default Dvorak keyboard layout.

Conversion table

Here is the translation from Qwerty to Dvorak (U.S. Simplified, Standard). Ordering is based on a US 104 Key keyboard from left to right, top row to bottom row, then shifted keys.

Qwerty: `1234567890-=qwertyuiop[]\asdfghjkl;'zxcvbnm,./~!@#$%^&*()_+QWERTYUIOP{}|ASDFGHJKL:"ZXCVBNM<>?
Dvorak: `1234567890[]',.pyfgcrl/=\aoeuidhtns-;qjkxbmwvz~!@#$%^&*(){}"<>PYFGCRL?+|AOEUIDHTNS_:QJKXBMWVZ

Here are two simplified tables, ordered nearly-alphabetically and so the top one can be used in a regular expression pattern class (between brackets []).

Qwerty: ][abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ;',./_+{}:"<>?=-
Dvorak: =/axje.uidchtnmbrl'poygk,qf;AXJE>UIDCHTNMBRL"POYGK<QF:s-wvz{}?+S_WVZ][

and

Dvorak: ][abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ;',./_+{}:"<>?=-
Qwerty: =-anihdyujgcvpmlsrxo;kf.,bt/ANIHDYUJGCVPMLSRXO:KF><BT?zqwe["}_+ZQWE{]'

Note that the digits 0-9, the letters amAM, and the symbols `~!@#$%^&*()\| are the same for both Qwerty and Dvorak Standard layouts. Symmetric pairs that convert the same in either direction include: ] and =, w and ,(comma), W and <. There is a cycle of 15 characters starting with B and of 14 characters starting with C. The reason text returns to its original after 210 conversions in the same direction is that 210 is the lowest common multiple of the cycle lengths 1, 2, 14, and 15.

Use in literature

In the hacker fiction book Stealing the Network: How to Own an Identity, a hacker by the name of Bl@ckTo\/\/3r effectively uses the Dvorak keyboard layout as a layer of confusion when intruders are trying to get into his computer.

See also

References

  1. "Dvorak Fun". Angela Gong. 2011-07-01. Archived from the original on October 2, 2012. Retrieved 2011-07-15.
This article is issued from Wikipedia - version of the 10/11/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.