30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

part of <strong>the</strong> story of what has been one of <strong>the</strong> most remarkable technological<br />

advances of all time; see, for example, [12.2], [12.3], [12.4] <strong>and</strong> [12.5].<br />

Security issues<br />

Security became an issue from <strong>the</strong> start. Initially it was mainly a question<br />

of physical security: protecting <strong>the</strong> equipment from physical damage such<br />

as fire or flooding. Within a few years however <strong>the</strong>re were reports of disgruntled<br />

employees causing havoc by modifying or destroying key programs.<br />

One often cited case, possibly apocryphal but certainly credible,<br />

was of a programmer who had written a payroll program <strong>and</strong> who noticed<br />

that his employers had a habit of sacking <strong>the</strong>ir employees at very short<br />

notice. He <strong>the</strong>refore inserted a section of code into <strong>the</strong> program to check<br />

that his name was still on <strong>the</strong> payroll <strong>and</strong>, if it wasn’t, to delete <strong>the</strong> entire<br />

program. In due course he was sacked <strong>and</strong> <strong>the</strong> payroll program deleted<br />

itself. The story went on to say that <strong>the</strong> programmer had to be re-hired at<br />

an enhanced salary to put things right. This may or may not be true but it<br />

draws attention to a serious possibility, known later as a ‘Trojan horse’<br />

attack, <strong>and</strong> <strong>the</strong> need for a system of checking that programs had not been<br />

‘modified’ which, in turn, led to <strong>the</strong> development of ‘anti-virus software’.<br />

These problems still remain <strong>and</strong> computer viruses are regularly reported;<br />

many of <strong>the</strong>se are just a nuisance but some are potentially disastrous.<br />

Protection of programs <strong>and</strong> data<br />

Public key cryptography 163<br />

The integrity of programs <strong>and</strong> data can be protected ei<strong>the</strong>r with or<br />

without encipherment. Programs consist of blocks of code. Data are<br />

usually stored, or transmitted, in blocks or packets. If every block is converted<br />

into a set of numbers which are <strong>the</strong>n subjected to some ma<strong>the</strong>matical<br />

function <strong>the</strong> final result can be ei<strong>the</strong>r left as it is or enciphered. In<br />

ei<strong>the</strong>r case <strong>the</strong> final value of <strong>the</strong> function can be stored, as a check sum, at<br />

<strong>the</strong> end of <strong>the</strong> block. If someone wishes to change anything in <strong>the</strong> block he<br />

must be able to compute both <strong>the</strong> ma<strong>the</strong>matical function <strong>and</strong>, where relevant,<br />

its encipherment for <strong>the</strong> new block. If he can’t do this <strong>the</strong> check sum<br />

will fail <strong>and</strong> it will be obvious that <strong>the</strong> block has been modified. An early,<br />

<strong>and</strong> very simple, version of this approach was <strong>the</strong> use of parity checks on<br />

programs <strong>and</strong> data stored on magnetic tape on computers in <strong>the</strong> 1950s.In<br />

this case <strong>the</strong>re was no encipherment involved. A check sum, known as <strong>the</strong><br />

lateral parity check, was automatically generated for every six-bit (later,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!