30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Ciphers for spies 93<br />

simply a ‘r<strong>and</strong>om’ string of letters, taken from a page of ‘r<strong>and</strong>om letters’<br />

which is destroyed after use so that it can never be used again, <strong>the</strong>n we have what<br />

is known as a one-time pad <strong>and</strong> <strong>the</strong> resulting cipher cannot be solved. This<br />

may seem to be a very bold assertion, but it is a ma<strong>the</strong>matical fact [M7].<br />

Since one-time pads provide total security why are <strong>the</strong>y not used for all<br />

encipherments? Basically because a different pad has to be provided for<br />

every pair of people who need to communicate, each of whom has one of<br />

<strong>the</strong> only two copies produced, <strong>and</strong> although this is feasible for a few<br />

hundred pairs, such as ambassadors communicating with <strong>the</strong>ir governments,<br />

it is out of <strong>the</strong> question for large numbers of military units in<br />

wartime. It must also be realised that <strong>the</strong> situation changes dramatically<br />

if a ‘one-time’ pad is used more than once. We <strong>the</strong>n have a ‘depth’ of two,<br />

or more, cipher messages enciphered with <strong>the</strong> same additive key. By subtracting<br />

one text from ano<strong>the</strong>r <strong>the</strong> key is eliminated <strong>and</strong> <strong>the</strong> resulting differenced<br />

text is now <strong>the</strong> difference of two unenciphered texts <strong>and</strong> a<br />

‘crib-dragging’ or similar technique may lead to <strong>the</strong>ir decryption. If a<br />

one-time pad is used to encipher code groups, ra<strong>the</strong>r than natural language,<br />

<strong>the</strong> cryptanalyst’s task is much harder since he must have some knowledge<br />

of <strong>the</strong> code itself in order to use <strong>the</strong> crib-dragging attack, but <strong>the</strong><br />

method is essentially <strong>the</strong> same.<br />

For a variety of reasons, including <strong>the</strong> provision of one-time pads,<br />

cryptographers are very interested in methods by which ‘r<strong>and</strong>om’ letters<br />

(or numbers) can be generated. We look at some of <strong>the</strong> methods of doing<br />

this in <strong>the</strong> next chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!