Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Ciphers for spies 93<br />
simply a ‘r<strong>and</strong>om’ string of letters, taken from a page of ‘r<strong>and</strong>om letters’<br />
which is destroyed after use so that it can never be used again, <strong>the</strong>n we have what<br />
is known as a one-time pad <strong>and</strong> <strong>the</strong> resulting cipher cannot be solved. This<br />
may seem to be a very bold assertion, but it is a ma<strong>the</strong>matical fact [M7].<br />
Since one-time pads provide total security why are <strong>the</strong>y not used for all<br />
encipherments? Basically because a different pad has to be provided for<br />
every pair of people who need to communicate, each of whom has one of<br />
<strong>the</strong> only two copies produced, <strong>and</strong> although this is feasible for a few<br />
hundred pairs, such as ambassadors communicating with <strong>the</strong>ir governments,<br />
it is out of <strong>the</strong> question for large numbers of military units in<br />
wartime. It must also be realised that <strong>the</strong> situation changes dramatically<br />
if a ‘one-time’ pad is used more than once. We <strong>the</strong>n have a ‘depth’ of two,<br />
or more, cipher messages enciphered with <strong>the</strong> same additive key. By subtracting<br />
one text from ano<strong>the</strong>r <strong>the</strong> key is eliminated <strong>and</strong> <strong>the</strong> resulting differenced<br />
text is now <strong>the</strong> difference of two unenciphered texts <strong>and</strong> a<br />
‘crib-dragging’ or similar technique may lead to <strong>the</strong>ir decryption. If a<br />
one-time pad is used to encipher code groups, ra<strong>the</strong>r than natural language,<br />
<strong>the</strong> cryptanalyst’s task is much harder since he must have some knowledge<br />
of <strong>the</strong> code itself in order to use <strong>the</strong> crib-dragging attack, but <strong>the</strong><br />
method is essentially <strong>the</strong> same.<br />
For a variety of reasons, including <strong>the</strong> provision of one-time pads,<br />
cryptographers are very interested in methods by which ‘r<strong>and</strong>om’ letters<br />
(or numbers) can be generated. We look at some of <strong>the</strong> methods of doing<br />
this in <strong>the</strong> next chapter.