30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The <strong>Enigma</strong> cipher machine 111<br />

system would be considerably enhanced. With <strong>the</strong> ‘fixed distance’ system<br />

<strong>and</strong> a cylinder of, say, 40 discs, cipher letters 40 positions apart would<br />

come from identical simple substitution alphabets. It follows that a collection<br />

of messages containing more than, say, 2000 letters would be vulnerable<br />

to attack based upon monograph frequency counts, since all <strong>the</strong><br />

messages would be ‘in depth’ <strong>and</strong> we would have a sample of 50 cipher<br />

letters from each alphabet. In <strong>the</strong> variable distance system <strong>the</strong> messages<br />

would not be ‘in depth’ <strong>and</strong> thous<strong>and</strong>s more cipher characters might be<br />

needed to solve <strong>the</strong> system; <strong>the</strong> number needed would obviously depend<br />

upon how r<strong>and</strong>omly <strong>the</strong> variable distances were selected.<br />

Evidently, a system based upon N substitution alphabets has a security<br />

level that increases with N but, on <strong>the</strong> o<strong>the</strong>r h<strong>and</strong>, if <strong>the</strong> encipherment is<br />

to be done by h<strong>and</strong> <strong>the</strong> tediousness of using <strong>the</strong> system, <strong>and</strong> <strong>the</strong> possibility<br />

of error, would also increase with N. So, as so often happens in life, we<br />

have conflicting requirements. In this case we would like to make N large<br />

to increase <strong>the</strong> security, but we would also like to keep N small for ease of<br />

use, <strong>and</strong> we can’t do both.<br />

During <strong>the</strong> 1914–18 war radio began to be used by military units for<br />

sending messages to each o<strong>the</strong>r <strong>and</strong> to <strong>the</strong>ir headquarters. Radio transmission<br />

had <strong>the</strong> advantage that communication with units at considerable distances<br />

from base, including ships <strong>and</strong> submarines at sea, could be achieved<br />

almost immediately, but <strong>the</strong> disadvantage that <strong>the</strong> messages could also be<br />

intercepted by <strong>the</strong> enemy. It was <strong>the</strong>refore essential to encipher such messages<br />

in a secure system <strong>and</strong> cipher systems of some complexity were<br />

devised; unfortunately, <strong>the</strong> more complex <strong>the</strong> system <strong>the</strong> greater <strong>the</strong><br />

burden on <strong>the</strong> cipher clerks, <strong>and</strong> <strong>the</strong> greater <strong>the</strong> risk of errors with, possibly,<br />

disastrous consequences. Some ‘user-friendly’ but highly secure<br />

cipher systems were needed if <strong>the</strong> conflicting requirements were to be met.<br />

Following <strong>the</strong> War a number of people in various countries decided<br />

that <strong>the</strong> only way of providing a high level of security without obliging<br />

cipher clerks to carry out lengthy, tedious <strong>and</strong> error-prone processes was<br />

to use machines to do <strong>the</strong> encipherment/decipherment. One such person<br />

was Arthur Scherbius, co-founder of a German engineering firm. In <strong>the</strong><br />

early 1920s Scherbius designed a number of cipher machines, all of which<br />

were intended to provide a very large number of substitution alphabets. A<br />

different alphabet would automatically be used every time a letter was<br />

enciphered, <strong>and</strong> no substitution alphabet would recur until thous<strong>and</strong>s of<br />

letters had been processed. Having decided upon a particular design he<br />

constructed <strong>the</strong> machine <strong>and</strong> called it <strong>Enigma</strong>.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!