30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1<br />

Introduction<br />

Some aspects of secure communication<br />

For at least two thous<strong>and</strong> years <strong>the</strong>re have been people who wanted to<br />

send messages which could only be read by <strong>the</strong> people for whom <strong>the</strong>y<br />

were intended. When a message is sent by h<strong>and</strong>, carried from <strong>the</strong> sender<br />

to <strong>the</strong> recipient, whe<strong>the</strong>r by a slave, as in ancient Greece or Rome, or by<br />

<strong>the</strong> Post Office today, <strong>the</strong>re is a risk of it going astray. The slave might be<br />

captured or <strong>the</strong> postman might deliver to <strong>the</strong> wrong address. If <strong>the</strong><br />

message is written in clear, that is, in a natural language without any<br />

attempt at concealment, anyone getting hold of it will be able to read it<br />

<strong>and</strong>, if <strong>the</strong>y know <strong>the</strong> language, underst<strong>and</strong> it.<br />

In more recent times messages might be sent by telegraph, radio, telephone,<br />

fax or e-mail but <strong>the</strong> possibility of <strong>the</strong>m being intercepted is still<br />

present <strong>and</strong>, indeed, has increased enormously since, for example, a radio<br />

transmission can be heard by anyone who is within range <strong>and</strong> tuned to<br />

<strong>the</strong> right frequency whilst an e-mail message might go to a host of unintended<br />

recipients if a wrong key on a computer keyboard is pressed or if a<br />

‘virus’ is lurking in <strong>the</strong> computer.<br />

It may seem unduly pessimistic but a good rule is to assume that any<br />

message which is intended to be confidential will fall into <strong>the</strong> h<strong>and</strong>s of<br />

someone who is not supposed to see it <strong>and</strong> <strong>the</strong>refore it is prudent to take<br />

steps to ensure that <strong>the</strong>y will, at least, have great difficulty in reading it<br />

<strong>and</strong>, preferably, will not be able to read it at all. The extent of <strong>the</strong> damage<br />

caused by unintentional disclosure may depend very much on <strong>the</strong> time<br />

that has elapsed between interception <strong>and</strong> reading of <strong>the</strong> message. There<br />

are occasions when a delay of a day or even a few hours in reading a<br />

message nullifies <strong>the</strong> damage; for example, a decision by a shareholder to<br />

[1]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!