06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

162 CHAPTER 8. POLYALPHABETIC CIPHERS<br />

Which text is in German, and which is in French (Compute Φ <strong>of</strong><br />

each and, remembering that monoalphabetic encipherments do not<br />

change the Φ value <strong>of</strong> the text, use part (a).)<br />

21. Here is a variant on the auto-key method. Rather than use the message<br />

as the key, which perhaps seems rather dangerous, instead use the secret<br />

message<br />

Encipher mysterious with priming key m and use your answer to help you<br />

discuss the security <strong>of</strong> this method.<br />

22. Joseph Willard Brown wrote<br />

“Ciphers are undiscoverable in proportion as their changes are frequent,<br />

and as the messages in each change are brief. When alphabetic<br />

ciphers are used, the aim should be never to allow any letter to appear<br />

twice alike. The number <strong>of</strong> letters under each key is to be as<br />

small as possible [Brown page 99].”<br />

Explain the meaning <strong>of</strong> this quote.<br />

23. On March 8, 1913, the Secretary <strong>of</strong> <strong>St</strong>ate, William Jennings Bryan, sent<br />

the following message to all American Diplomatic and Consular Officers.<br />

“Gentleman:<br />

For the purpose <strong>of</strong> affording a means <strong>of</strong> direct secret communication<br />

between <strong>of</strong>ficers <strong>of</strong> the Army and Navy and the Diplomatic and<br />

Consular Service, the respective Departments are providing the necessary<br />

<strong>of</strong>ficers with the Larrabee Cipher Code, a copy <strong>of</strong> which is<br />

transmitted herewith.<br />

The following arrangements as to key words will be observed:<br />

(1) Key words may be arranged between <strong>of</strong>ficers using code either<br />

directly or through their Departments in Washington, when more<br />

direct secret communication is not possible.<br />

(2) In the absence <strong>of</strong> other agreement, the key word is to be the name<br />

<strong>of</strong> the month in which the message is sent.<br />

The Navy Department is supplying the Larrabee Cipher to the commanding<br />

<strong>of</strong>ficers <strong>of</strong> all ships in the service.”<br />

Enclosed with this letter was a chart, Figure 8.2, and instructions:<br />

“Write down the words, message, or cipher to be converted, and write<br />

over them, letter for letter, the key word agreed upon, repeating<br />

the key word as <strong>of</strong>ten as necessary. For each letter to be converted<br />

enter the table with the letter <strong>of</strong> the key word found above it, as a<br />

marginal letter. If converting message into cipher [read] in the upper<br />

line abreast the marginal letter, the letter <strong>of</strong> the message, the letter<br />

<strong>of</strong> the cipher is [then] directly below it. If converting cipher into<br />

message [read] the lower line abreast the marginal letter [, then] the<br />

letter <strong>of</strong> the cipher the letter <strong>of</strong> the message is directly above it.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!