30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The <strong>Enigma</strong> cipher machine 123<br />

The method initially adopted by <strong>the</strong> Germans for letting <strong>the</strong> recipient<br />

know <strong>the</strong> starting positions of <strong>the</strong> three wheels was based upon <strong>the</strong> use<br />

of a common ground setting <strong>and</strong> <strong>the</strong> procedure for <strong>the</strong> sender was as<br />

follows.<br />

(1) Choose a ‘r<strong>and</strong>om’ set of three letters for <strong>the</strong> actual wheel settings to be<br />

used for <strong>the</strong> encipherment of <strong>the</strong> message; let us suppose that this is<br />

FMZ (say).<br />

(2) Look up <strong>the</strong> list provided to all users of <strong>the</strong> ‘net’ <strong>and</strong> note <strong>the</strong> ground<br />

setting for <strong>the</strong> day (or period, if <strong>the</strong> ground setting is changed more<br />

than once a day); let us suppose that this is BLE (say).<br />

(3) Turn <strong>the</strong> wheels to <strong>the</strong> ground setting, BLE.<br />

(4) Encipher <strong>the</strong> three letters of your chosen r<strong>and</strong>om setting twice; that is,<br />

encipher <strong>the</strong> six letters FMZFMZ <strong>and</strong> note <strong>the</strong> six resulting cipher<br />

letters; suppose that <strong>the</strong>se are LOCWHQ (say).<br />

(5) Turn <strong>the</strong> wheels to <strong>the</strong> chosen r<strong>and</strong>om setting, FMZ, <strong>and</strong> encipher <strong>the</strong><br />

message.<br />

(6) Precede <strong>the</strong> cipher text of <strong>the</strong> message with <strong>the</strong> six cipher letters of <strong>the</strong><br />

enciphered double indicator, LOCWHQ.<br />

(7) Transmit <strong>the</strong> cipher message with <strong>the</strong> enciphered double indicator at<br />

<strong>the</strong> front.<br />

On receiving <strong>the</strong> cipher message <strong>the</strong> recipient would proceed as follows.<br />

(1) Set <strong>the</strong> three wheels to <strong>the</strong> ground setting for <strong>the</strong> day or period, BLE.<br />

(2) Type in <strong>the</strong> six letters, LOCWHQ, of <strong>the</strong> enciphered double indicator.<br />

(Remember that it is a characteristic of <strong>the</strong> <strong>Enigma</strong> that encipherment<br />

<strong>and</strong> decipherment are equivalent. Thus, since F in <strong>the</strong> first encipherment<br />

became L so L would have become F, which is what happens when we<br />

decipher L.)<br />

(3) This should yield <strong>the</strong> chosen r<strong>and</strong>om indicator twice, viz: FMZFMZ. If<br />

this does not happen <strong>the</strong>re has been a mistake <strong>and</strong> <strong>the</strong> message may<br />

have to be re-sent; a dangerous situation which may cause a breach of<br />

security.<br />

(4) If <strong>the</strong> six letters do decipher to <strong>the</strong> same repeated trigraph, FMZ in this<br />

case, turn <strong>the</strong> wheels to <strong>the</strong>se positions <strong>and</strong> decipher <strong>the</strong> text of <strong>the</strong><br />

message.<br />

Note that <strong>the</strong> word ‘twice’ is in italics. As we shall see, it was this operational<br />

procedure, introduced to ensure correct receipt of <strong>the</strong> three-letter<br />

settings, that proved to be <strong>the</strong> Achilles heel of <strong>the</strong> <strong>Enigma</strong>. We begin by<br />

noting that

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!