30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9<br />

The <strong>Enigma</strong> cipher machine<br />

Historical background<br />

In Chapter 2 we looked at simple substitution <strong>ciphers</strong> <strong>and</strong> we saw how<br />

<strong>the</strong>se can be solved by <strong>the</strong> use of frequency counts if ‘sufficient’ cipher text<br />

is available. How many letters are always ‘sufficient’ is a matter for debate,<br />

but it is probably true that 200 letters will normally suffice whereas 50<br />

might not. For our purposes let us assume that if only 25 letters of cipher<br />

are available <strong>the</strong>n <strong>the</strong> cipher is safe. Since a limitation of message lengths<br />

to no more than 25 letters would be too restrictive we conclude that <strong>the</strong><br />

use of a simple substitution cipher is impractical. If, however, we use not<br />

one but several different simple substitution alphabets, switching between<br />

<strong>the</strong> alphabets every time we encipher a letter, we can increase <strong>the</strong> security<br />

of <strong>the</strong> system. As a rough guide: if we use N different alphabets it should<br />

be possible to make <strong>the</strong> cipher safe for single messages of up to 25N cipher<br />

letters; but this simple rule needs qualification. If <strong>the</strong> substitution alphabets<br />

are related in some way <strong>the</strong> recovery of any one of <strong>the</strong>m may lead to<br />

recovery of <strong>the</strong> o<strong>the</strong>rs. On <strong>the</strong> o<strong>the</strong>r h<strong>and</strong>, in some systems, additional features<br />

may ensure that cipher messages of much greater length than 25N<br />

are secure. In <strong>the</strong> specific case of Jefferson’s cylinder, for example, <strong>the</strong><br />

sender <strong>and</strong> receiver could<br />

ei<strong>the</strong>r agree that <strong>the</strong> cipher text will be read from <strong>the</strong> row of letters at a<br />

specified distance from <strong>the</strong> row of plaintext letters (<strong>the</strong> distance<br />

possibly being given by some form of indicator),<br />

or have no indicator, <strong>and</strong> use a different distance each time a row is<br />

enciphered.<br />

Whilst <strong>the</strong> latter procedure involves <strong>the</strong> recipient in looking at all 25<br />

rows of <strong>the</strong> cylinder to see which of <strong>the</strong>m makes sense, <strong>the</strong> security of <strong>the</strong><br />

[110]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!