30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

From a cryptographic point of view a one-part code offers <strong>the</strong> cryptanalyst<br />

too great an advantage by enabling him to guess at <strong>the</strong> meanings of<br />

as yet unidentified code groups simply by looking for plausible words in a<br />

dictionary which are close to identified words. This weakness can be<br />

removed by making <strong>the</strong> numerical ordering of <strong>the</strong> code groups unrelated<br />

to <strong>the</strong> alphabetical or numerical order of <strong>the</strong> codewords. We <strong>the</strong>n have a<br />

two-part code <strong>and</strong> <strong>the</strong> users need two code-books, one for encipherment<br />

<strong>and</strong> one for decipherment. The codewords above might <strong>the</strong>n appear like<br />

Table 6.3 in <strong>the</strong> encipherment book, whilst <strong>the</strong> decipherment book might<br />

begin as in Table 6.4 <strong>and</strong> so on.<br />

Table 6.4<br />

0005 TOMORROW<br />

0009 ATTACK<br />

0014 COME<br />

In all cases, it is likely that very common codewords would be allocated<br />

more than one code group <strong>and</strong> <strong>the</strong> users instructed to use each of <strong>the</strong><br />

alternatives in a ‘r<strong>and</strong>om’ manner.<br />

Although codes which have not been subjected to fur<strong>the</strong>r encipherment<br />

do not offer a high level of security <strong>the</strong>y have been used in wartime;<br />

<strong>the</strong> Italian Navy used a one-part code, known as Mengarini [6.2], for some<br />

very low grade messages, <strong>and</strong> <strong>the</strong> Japanese Navy used a two-part code,<br />

known to <strong>the</strong>m as OTSU <strong>and</strong> to <strong>the</strong> British as JN4 [6.3], during <strong>the</strong> Second<br />

World War. A somewhat different code using two letters followed by four<br />

digits was used by U-boats of <strong>the</strong> German Navy to report <strong>the</strong>ir positions<br />

in <strong>the</strong> Atlantic <strong>and</strong> to receive instructions for attacking Allied convoys.<br />

The letters were subjected to digraph substitution tables <strong>and</strong> <strong>the</strong> digits<br />

could also be modified [6.4].<br />

<strong>Code</strong> plus additive<br />

No matter how many code groups a code contains, a cryptanalyst, given<br />

enough messages, will eventually find certain groups occurring more<br />

than once, even when <strong>the</strong> same plaintext word or phrase has several alternative<br />

code groups allocated to it. Also, if <strong>the</strong> code-book is captured by <strong>the</strong><br />

enemy, decryption of all messages becomes trivial. To overcome <strong>the</strong>se<br />

weaknesses <strong>the</strong> code groups <strong>the</strong>mselves are usually enciphered. A st<strong>and</strong>ard<br />

way of doing this is to apply an additive key to <strong>the</strong> code groups using<br />

non-carrying, or modular, addition. Although this has been mentioned<br />

<strong>Code</strong>s 67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!