30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2<br />

chapter 1<br />

buy or sell a large number of shares at once or, in war, an order by an army<br />

comm<strong>and</strong>er to attack in a certain direction at dawn next day. On o<strong>the</strong>r<br />

occasions <strong>the</strong> information may have long term value <strong>and</strong> must be kept<br />

secret for as long as possible, such as a message which relates to <strong>the</strong> planning<br />

of a large scale military operation.<br />

The effort required by a rival, opponent or enemy to read <strong>the</strong> message<br />

is <strong>the</strong>refore relevant. If, using <strong>the</strong> best known techniques <strong>and</strong> <strong>the</strong> fastest<br />

computers available, <strong>the</strong> message can’t be read by an unauthorised recipient<br />

in less time than that for which secrecy or confidentiality is essential<br />

<strong>the</strong>n <strong>the</strong> sender can be reasonably happy. He cannot ever be entirely happy<br />

since success in reading some earlier messages may enable <strong>the</strong> opponent<br />

to speed up <strong>the</strong> process of solution of subsequent messages. It is also possible<br />

that a technique has been discovered of which he is unaware <strong>and</strong><br />

consequently his opponent is able to read <strong>the</strong> message in a much shorter<br />

time than he believed possible. Such was <strong>the</strong> case with <strong>the</strong> German<br />

<strong>Enigma</strong> machine in <strong>the</strong> 1939–45 war, as we shall see in Chapter 9.<br />

<strong>Julius</strong> <strong>Caesar</strong>’s cipher<br />

The problem of ensuring <strong>the</strong> security of messages was considered by <strong>the</strong><br />

ancient Greeks <strong>and</strong> by <strong>Julius</strong> <strong>Caesar</strong> among o<strong>the</strong>rs. The Greeks thought of<br />

a bizarre solution: <strong>the</strong>y took a slave <strong>and</strong> shaved his head <strong>and</strong> scratched <strong>the</strong><br />

message on it. When his hair had grown <strong>the</strong>y sent him off to deliver <strong>the</strong><br />

message. The recipient shaved <strong>the</strong> slave’s head <strong>and</strong> read <strong>the</strong> message. This<br />

is clearly both a very insecure <strong>and</strong> an inefficient method. Anyone<br />

knowing of this practice who intercepted <strong>the</strong> slave could also shave his<br />

head <strong>and</strong> read <strong>the</strong> message. Fur<strong>the</strong>rmore it would take weeks to send a<br />

message <strong>and</strong> get a reply by this means.<br />

<strong>Julius</strong> <strong>Caesar</strong> had a better idea. He wrote down <strong>the</strong> message <strong>and</strong> moved<br />

every letter three places forward in <strong>the</strong> alphabet, so that, in <strong>the</strong> English<br />

alphabet, A would be replaced by D, B by E <strong>and</strong> so on up to W which would<br />

be replaced by Z <strong>and</strong> <strong>the</strong>n X by A, Y by B <strong>and</strong> finally Z by C. If he had done<br />

this with his famous message<br />

VENI. VIDI. VICI.<br />

(I came. I saw. I conquered.)<br />

<strong>and</strong> used <strong>the</strong> 26-letter alphabet used in English-speaking countries<br />

(which, of course, he would not) it would have been sent as<br />

YHQL. YLGL. YLFL.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!