Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
92<br />
chapter 7<br />
Table 7.7<br />
6 1 10 4 8 11 3 7 12 2 9 5<br />
D O L Q Q P<br />
T C E T A R T D C X V D<br />
C A W F M X I X Y G D O<br />
Q Y Y X T W N N O I A G<br />
I W Q O R C G E<br />
We now use <strong>the</strong> transposition box again. Since <strong>the</strong> day of transmission is<br />
Tuesday (<strong>the</strong> date is irrelevant in this simplified form of garbo’s cipher)<br />
we begin writing <strong>the</strong> text under <strong>the</strong> column headed 3: see Table 7.7.<br />
Finally, we take <strong>the</strong> text out column by column, starting with <strong>the</strong> column<br />
numbered 1, <strong>and</strong> write it out in five-letter groups ready for transmission:<br />
CAYWQ XGIDT INGTF XOPDO GTCQI ODXNE AMTRQ<br />
VDAEW YQRXW CLCYO.<br />
Decipherment in this system is a tedious process in which it is easy to<br />
make mistakes. To begin <strong>the</strong> decipherment <strong>the</strong> receiver has to work out,<br />
from <strong>the</strong> day of <strong>the</strong> week <strong>and</strong> <strong>the</strong> length of <strong>the</strong> message, which columns of<br />
<strong>the</strong> transposition box will have an extra letter <strong>and</strong> which <strong>the</strong>y are. In <strong>the</strong><br />
example above since <strong>the</strong> message contains 50 characters <strong>the</strong>re will be 10<br />
columns of 4 letters <strong>and</strong> 2 columns of 5 letters. Since <strong>the</strong> day of <strong>the</strong> week is<br />
Tuesday (�3) <strong>the</strong> columns headed 3 <strong>and</strong> 7 will be <strong>the</strong> ‘long’ columns <strong>and</strong><br />
<strong>the</strong> o<strong>the</strong>rs will be ‘short’. The same analysis will have to be used when <strong>the</strong><br />
transposition is used again; in this case <strong>the</strong> month is May (�5) so <strong>the</strong> long<br />
columns will be those headed 5 <strong>and</strong> 6 (since <strong>the</strong> column headed 6 happens<br />
to follow <strong>the</strong> column headed ‘5’).<br />
For more details of garbo’s cipher systems see [7.1].<br />
One-time pad<br />
The basic weakness of <strong>the</strong> book cipher as used above is that both <strong>the</strong><br />
message <strong>and</strong> <strong>the</strong> key were in English <strong>and</strong> by dragging cribs based upon<br />
common English words which might occur in ei<strong>the</strong>r we were able to<br />
recover both. Had <strong>the</strong> key not been in English, decryption would certainly<br />
have been more difficult for <strong>the</strong> cryptanalyst but <strong>the</strong> messages<br />
would never<strong>the</strong>less be read eventually once he had discovered that this<br />
was <strong>the</strong> case, since cribs from <strong>the</strong> o<strong>the</strong>r language could also be used. If, on<br />
<strong>the</strong> o<strong>the</strong>r h<strong>and</strong>, <strong>the</strong> key was not based upon a natural language but was