Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
9<br />
The <strong>Enigma</strong> cipher machine<br />
Historical background<br />
In Chapter 2 we looked at simple substitution <strong>ciphers</strong> <strong>and</strong> we saw how<br />
<strong>the</strong>se can be solved by <strong>the</strong> use of frequency counts if ‘sufficient’ cipher text<br />
is available. How many letters are always ‘sufficient’ is a matter for debate,<br />
but it is probably true that 200 letters will normally suffice whereas 50<br />
might not. For our purposes let us assume that if only 25 letters of cipher<br />
are available <strong>the</strong>n <strong>the</strong> cipher is safe. Since a limitation of message lengths<br />
to no more than 25 letters would be too restrictive we conclude that <strong>the</strong><br />
use of a simple substitution cipher is impractical. If, however, we use not<br />
one but several different simple substitution alphabets, switching between<br />
<strong>the</strong> alphabets every time we encipher a letter, we can increase <strong>the</strong> security<br />
of <strong>the</strong> system. As a rough guide: if we use N different alphabets it should<br />
be possible to make <strong>the</strong> cipher safe for single messages of up to 25N cipher<br />
letters; but this simple rule needs qualification. If <strong>the</strong> substitution alphabets<br />
are related in some way <strong>the</strong> recovery of any one of <strong>the</strong>m may lead to<br />
recovery of <strong>the</strong> o<strong>the</strong>rs. On <strong>the</strong> o<strong>the</strong>r h<strong>and</strong>, in some systems, additional features<br />
may ensure that cipher messages of much greater length than 25N<br />
are secure. In <strong>the</strong> specific case of Jefferson’s cylinder, for example, <strong>the</strong><br />
sender <strong>and</strong> receiver could<br />
ei<strong>the</strong>r agree that <strong>the</strong> cipher text will be read from <strong>the</strong> row of letters at a<br />
specified distance from <strong>the</strong> row of plaintext letters (<strong>the</strong> distance<br />
possibly being given by some form of indicator),<br />
or have no indicator, <strong>and</strong> use a different distance each time a row is<br />
enciphered.<br />
Whilst <strong>the</strong> latter procedure involves <strong>the</strong> recipient in looking at all 25<br />
rows of <strong>the</strong> cylinder to see which of <strong>the</strong>m makes sense, <strong>the</strong> security of <strong>the</strong><br />
[110]