is a type of encoding
based on the differences in layout of a QWERTY keyboard
and a Dvorak keyboard
. There are two main variations: One is achieved by typing in the Dvorak layout on a QWERTY keyboard, and the other is similarly achieved by typing in the QWERTY layout on a Dvorak keyboard. This effectively makes Dvorak encoding into a monoalphabetic substitution cipher
and the Caesar Cipher
, since each one character translates to one other character in a consistent pattern.
Several layers of Dvorak encoding may be added on top of each other for a variance of the translation table, which adds an obfuscating effect. The one where the Dvorak layout is used on a QWERTY keyboard can be added to the one where a QWERTY layout is used on a Dvorak keyboard, since they are not each other's opposites in terms of decoding. When decoding, the correct order of the severally applied translation tables must happen in the correct order.
Dvorak encoding, like other monoalphabetic encryption ciphers, is a very simple encoding and may provide a weak level of security. It may be useful in combination with other encodings. The security involved is in no way comparable to modern encryption algorithms which advocate security, and the advantages with this encoding can as such be summarised to encompass:
- Dvorak encoding is an unavoidable consequence of typing on a non-Dvorak keyboard using the Dvorak layout, for instance when using a software driver to compensate for the lack of rerouting of signals in the keyboard. This is the most common practice because it doesn't require a purchase of a special Dvorak keyboard.
- Dvorak encoding can be typed real-time by anyone proficient with the Dvorak keyboard layout, allowing for very fast encoding by hand.
- Dvorak encoding may make it harder for physically present surveillance to find out what the user is typing since it happens very fast. In some cases, it can even be hard for a physical keylogger to probably guess what is being written, but since most keyloggers save the logged data for later retrieval and analysis, the original cryptographic weakness of the encoding apply.
Variations in the use of left- and right-hand Dvorak keyboard layouts also provide an additional subset of encodings. The left and right variants are slightly better because the number keys are changed as well as the character keys – in this respect, the left-hand Dvorak encoding change the most keys. Notably, the a and m keys never change in the default Dvorak keyboard layout.
Use in literature
In the hacker fiction
book Stealing the Network: How to Own an Identity
, a hacker by the name of Bl@ckTo//3r
effectively uses the Dvorak keyboard layout as a layer of confusion when intruders are trying to get into his computer. A free chapter
is available online.
- Keyser, Andrew Dvorak Encoding. Dvorak Encoding: A Simple Encoding Mechanism. (2006). Retrieved on 2006-03-19..