06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.5. SUMMARY 101<br />

our ciphertext much longer than it would otherwise have been. Nonetheless, all<br />

modern cipher techniques involve the use <strong>of</strong> nulls.<br />

Salting the message. Many messages begin and end with similar, repeated<br />

information. It is standard practice to begin the message with whom it is for,<br />

and who is sending it: “From: Capt. Thomas, USS Lexington. To: Admiral<br />

Nelson, Enterprise Carrier Group, US South Pacific Force.” To prevent an<br />

adversary from guessing such a stereotyped beginning <strong>of</strong> a message, one salts<br />

the message by adding a meaningless strings to the beginning and/or end <strong>of</strong> the<br />

plaintext before it is enciphered.<br />

A different method with the same purpose is Russian Copulation. Cut<br />

the message approximately in half and the swap the two halves. This hides the<br />

beginning and ending somewhere in the middle <strong>of</strong> the message. Hopefully, this<br />

is <strong>of</strong> no bother to the person who will decipher the message, but will prevent<br />

the enemy from using information about the stereotyped beginning and ending<br />

<strong>of</strong> the message. Unfortunately, it is a very small leap from guessing that<br />

“Enterprise” or “Naval Task Force” appears at the beginning and/or end <strong>of</strong> a<br />

message to using such words and phrases as cribs for the entire message. Cribs<br />

are words or phrases thought to be part <strong>of</strong> the message. If, say, “carrier” is<br />

thought to appear in a monoalphabetic cipher, a quick scan for its distinctive<br />

letter pattern **XX**X, where X represents any particular letter, should be able<br />

to determine this. And if it is found, the codebreaker has an immediate decryption<br />

<strong>of</strong> 5 letters <strong>of</strong> the code! We will not study them further, but clearly cribs<br />

are a very powerful tool to have when decrypting ciphers.<br />

6.5 Summary<br />

Decrypting shift ciphers involved only frequency analysis, really, just counting<br />

the letters. For more general monoalphabetic ciphers we need additional information<br />

about how the letters relate to one another. For example, while e and t<br />

both are very common letters, and both are among the most frequent final letters<br />

<strong>of</strong> words, e seldom starts words whereas t very frequently does. When the<br />

ciphertext is presented with word breaks, this information alone usually allows<br />

the identification <strong>of</strong> e and t, with h quickly following.<br />

Even without word breaks, vowels are much happier mating with consonants<br />

than with other vowels. We can thus use e and t as wedges to separate the vowels<br />

<strong>of</strong> aonirsh from the consonants. Using the differences in letter behavior should<br />

then give enough guesses at substitutions that we can then try out our guesses,<br />

fixing and revising as we make progress.<br />

Despite tricks like these, monoalphabetic ciphers simply are not very secure,<br />

and have not been for a very long time.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!