30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

columns in each case, are full of contradictions; so we reject <strong>the</strong> hypo<strong>the</strong>sis<br />

that R1 was set at position 1 at <strong>the</strong> encipherment of <strong>the</strong> indicators. If<br />

we now encipher <strong>the</strong> same pairs at settings (3 <strong>and</strong> 4) we get Table S.9, <strong>and</strong><br />

<strong>the</strong>se pairings are completely consistent. Any o<strong>the</strong>r combination of chain<br />

alignment <strong>and</strong> setting of R1 would lead to contradiction. We <strong>the</strong>refore<br />

conclude that R1 was set at position 3 at <strong>the</strong> start of <strong>the</strong> encipherment of<br />

<strong>the</strong> indicators at <strong>the</strong> ground setting. If this is so, <strong>the</strong> pairings in <strong>the</strong> composite<br />

reflector are (0, 5), (1, 3), (2, 8), (4, 7), <strong>and</strong> (6, 9).<br />

Table S.9<br />

Pair Setting 3 Pair Setting 4<br />

(5, 7) (6, 9) (5, 7) (9, 6)<br />

(1, 9) (4, 7) (1, 0) (2, 8)<br />

(8, 0) (3, 1) (8, 2) (0, 5)<br />

(4, 2) (8, 2) (4, 3) (1, 3)<br />

(6, 3) (5, 0) (6, 9) (7, 4)<br />

Chapter 10<br />

10.1 (Hagelin message)<br />

Since <strong>the</strong> cage is (0, 5, 5, 5, 5, 5) <strong>the</strong> only keys that can occur are 0, 5, 10, 15,<br />

20 <strong>and</strong> 25 with relative frequencies 1, 5, 10, 10, 5 <strong>and</strong> 1. We write down<br />

six lines showing what <strong>the</strong> ‘plaintext’ would be if <strong>the</strong> key value were 0, 5,<br />

10, 15, 20 or 25 at each position of <strong>the</strong> text using <strong>the</strong> Hagelin decipherment<br />

rule:<br />

plaintext letter�key�cipher letter.<br />

The cipher <strong>and</strong> six lines corresponding to <strong>the</strong> six keys are shown in Table<br />

S.10.<br />

Table S.10<br />

Cipher CBZPC CJXWY CXSHN IQUSR<br />

Key�0 YZBLY YRDEC YDITN SKGIJ<br />

Key�5 DEGQD DWIJH DINYS ^PLNO<br />

Key�10` IJLVI IBNOM INSD^ CUQST<br />

Key�15 NOQAN NGSTR NS^IC HZV^Y<br />

Key�20 STVFS SL^YW S^CNH MEACD<br />

Key�25 ^YAK^ ^UCDB ^CHSM RJFHI<br />

Solutions to problems 227

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!