30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

34<br />

chapter 3<br />

Thus in <strong>the</strong> example above <strong>the</strong> key, 7-5-11, would need to be provided<br />

somewhere, ei<strong>the</strong>r in information sent in advance, or enciphered in some<br />

pre-arranged cipher <strong>and</strong> perhaps hidden in <strong>the</strong> message at some specified<br />

place. In this case <strong>the</strong> key itself, 7-5-11, can serve as <strong>the</strong> indicator, but it is<br />

unlikely to be sent in that form.<br />

Depths<br />

When two or more messages are enciphered by <strong>the</strong> same system with<br />

identical parameters (components, keys, parts, settings etc.) <strong>the</strong>y are said<br />

to be in depth. So, if two Vigenère messages are sent using <strong>the</strong> same<br />

keyword <strong>the</strong>y are in depth; but if <strong>the</strong>y are sent using different keywords,<br />

even if <strong>the</strong> keywords are of <strong>the</strong> same length, <strong>the</strong>y are not in depth. If,<br />

however, two Vigenère messages have keywords which are of <strong>the</strong> same<br />

length <strong>and</strong> which have some identical letters in corresponding positions<br />

<strong>the</strong> cipher messages will be in partial depth. This would not necessarily be<br />

true of o<strong>the</strong>r systems of encipherment where <strong>the</strong> slightest change in <strong>the</strong><br />

indicator puts <strong>the</strong> messages out of depth. Whe<strong>the</strong>r a cryptanalyst can take<br />

advantage of finding two or more messages in depth depends upon <strong>the</strong><br />

system which has been used for enciphering <strong>the</strong>m. In some cases, such as<br />

simple substitution or Vigenère systems, he should certainly be able to do<br />

so but in o<strong>the</strong>rs, such as <strong>the</strong> two-letter cipher systems described in<br />

Chapter 5, depths are of much less use. Broadly speaking, if <strong>the</strong> encipherment<br />

system is done on a letter-by-letter basis <strong>the</strong>n depths may be identifiable<br />

<strong>and</strong> useful to <strong>the</strong> cryptanalyst but if <strong>the</strong> encipherment involves<br />

two or more letters at a time <strong>the</strong> depths, if recognisable at all, may not be<br />

of much use.<br />

Recognising ‘depths’<br />

How would a cryptanalyst recognise a depth? If two or more messages<br />

were sent on <strong>the</strong> same system <strong>and</strong> were found to have <strong>the</strong> same indicators<br />

<strong>the</strong>y are probably in depth. We must say ‘probably’, not ‘certainly’,<br />

because <strong>the</strong> interval between <strong>the</strong> two transmission times may have overlapped<br />

a change-over time when some part of <strong>the</strong> enciphering system<br />

may have been changed. Such a situation would occur, for example, with<br />

two <strong>Enigma</strong> messages sent just before <strong>and</strong> just after midnight (see<br />

Chapter 9).<br />

If <strong>the</strong> indicators are hidden <strong>the</strong>re may be no external evidence that <strong>the</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!