30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7<br />

Ciphers for spies<br />

A spy operating in country X on behalf of country Y has <strong>the</strong> problem<br />

of communicating with his controller in such a way as to protect both<br />

himself <strong>and</strong> <strong>the</strong> contents of his messages. No matter how he sends his messages<br />

<strong>the</strong>y will have to be ‘modified’ somehow so that <strong>the</strong>ir true meaning<br />

is hidden from anyone but <strong>the</strong> intended recipient. There are methods,<br />

such as <strong>the</strong> use of microdots or ‘invisible’ ink, which do not, per se, involve<br />

encipherment although some ‘modification’ of <strong>the</strong> text even in such cases<br />

would probably be used to provide extra security. When we say that a text<br />

has been ‘modified’ we do not necessarily mean that it has been enciphered<br />

but that <strong>the</strong> ‘secret’ text is not simply sent in an unaltered form: it<br />

might, for example, be hidden inside an apparently innocuous message.<br />

Hiding a secret text inside an innocuous one has <strong>the</strong> advantage that,<br />

being apparently unenciphered, it will not automatically attract <strong>the</strong> interest<br />

of unintended recipients or interceptors, such as <strong>the</strong> security forces of<br />

country X. A disadvantage is that it may not be too easy to construct a<br />

realistic non-secret text in which to embed it. Here is a simple illustration.<br />

Example 7.1 (‘Part of a letter from Agent 63’)<br />

As I was walking through <strong>the</strong> centre of town yesterday morning at about<br />

eleven thirty I chanced to see Ron Kingston. He was alone, driving a<br />

newish-looking ultramarine car, a Ford Escort. Previously he’s had only<br />

second-h<strong>and</strong> cars, not often less than three years old. Perhaps he has had<br />

an inheritance from some rich relative who has recently died?<br />

Secret message<br />

If we take <strong>the</strong> first letter of <strong>the</strong> message <strong>and</strong> <strong>the</strong> first letter of every fourth<br />

word after that, taking hyphenated words as two separate words, we get<br />

[72]<br />

ATTACKDUEONTHIRD

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!