Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
2<br />
chapter 1<br />
buy or sell a large number of shares at once or, in war, an order by an army<br />
comm<strong>and</strong>er to attack in a certain direction at dawn next day. On o<strong>the</strong>r<br />
occasions <strong>the</strong> information may have long term value <strong>and</strong> must be kept<br />
secret for as long as possible, such as a message which relates to <strong>the</strong> planning<br />
of a large scale military operation.<br />
The effort required by a rival, opponent or enemy to read <strong>the</strong> message<br />
is <strong>the</strong>refore relevant. If, using <strong>the</strong> best known techniques <strong>and</strong> <strong>the</strong> fastest<br />
computers available, <strong>the</strong> message can’t be read by an unauthorised recipient<br />
in less time than that for which secrecy or confidentiality is essential<br />
<strong>the</strong>n <strong>the</strong> sender can be reasonably happy. He cannot ever be entirely happy<br />
since success in reading some earlier messages may enable <strong>the</strong> opponent<br />
to speed up <strong>the</strong> process of solution of subsequent messages. It is also possible<br />
that a technique has been discovered of which he is unaware <strong>and</strong><br />
consequently his opponent is able to read <strong>the</strong> message in a much shorter<br />
time than he believed possible. Such was <strong>the</strong> case with <strong>the</strong> German<br />
<strong>Enigma</strong> machine in <strong>the</strong> 1939–45 war, as we shall see in Chapter 9.<br />
<strong>Julius</strong> <strong>Caesar</strong>’s cipher<br />
The problem of ensuring <strong>the</strong> security of messages was considered by <strong>the</strong><br />
ancient Greeks <strong>and</strong> by <strong>Julius</strong> <strong>Caesar</strong> among o<strong>the</strong>rs. The Greeks thought of<br />
a bizarre solution: <strong>the</strong>y took a slave <strong>and</strong> shaved his head <strong>and</strong> scratched <strong>the</strong><br />
message on it. When his hair had grown <strong>the</strong>y sent him off to deliver <strong>the</strong><br />
message. The recipient shaved <strong>the</strong> slave’s head <strong>and</strong> read <strong>the</strong> message. This<br />
is clearly both a very insecure <strong>and</strong> an inefficient method. Anyone<br />
knowing of this practice who intercepted <strong>the</strong> slave could also shave his<br />
head <strong>and</strong> read <strong>the</strong> message. Fur<strong>the</strong>rmore it would take weeks to send a<br />
message <strong>and</strong> get a reply by this means.<br />
<strong>Julius</strong> <strong>Caesar</strong> had a better idea. He wrote down <strong>the</strong> message <strong>and</strong> moved<br />
every letter three places forward in <strong>the</strong> alphabet, so that, in <strong>the</strong> English<br />
alphabet, A would be replaced by D, B by E <strong>and</strong> so on up to W which would<br />
be replaced by Z <strong>and</strong> <strong>the</strong>n X by A, Y by B <strong>and</strong> finally Z by C. If he had done<br />
this with his famous message<br />
VENI. VIDI. VICI.<br />
(I came. I saw. I conquered.)<br />
<strong>and</strong> used <strong>the</strong> 26-letter alphabet used in English-speaking countries<br />
(which, of course, he would not) it would have been sent as<br />
YHQL. YLGL. YLFL.