30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Stencil <strong>ciphers</strong><br />

The example above is a very simple, <strong>and</strong> insecure, case of a stencil<br />

cipher. In such a cipher certain letters on a page are part of <strong>the</strong> secret<br />

message <strong>and</strong> all <strong>the</strong> o<strong>the</strong>r letters are merely ‘fillers’ which are used to<br />

compose a mundane-looking communication. The ‘stencil’ in <strong>the</strong><br />

example is far too regular to be satisfactory; a more suitable stencil<br />

would use letters which are separated from each o<strong>the</strong>r by irregular<br />

intervals <strong>and</strong> which are not necessarily <strong>the</strong> first letters of words. To add<br />

fur<strong>the</strong>r security <strong>the</strong> letters of <strong>the</strong> secret text would probably not occur in<br />

<strong>the</strong>ir correct order in <strong>the</strong> overall text. If <strong>the</strong> overall text is typed in a<br />

regular format <strong>the</strong> sender <strong>and</strong> recipient may have identical cards with<br />

holes punched in <strong>the</strong>m at <strong>the</strong> positions of <strong>the</strong> letters of <strong>the</strong> secret<br />

message. Hence <strong>the</strong> name of this type of cipher. Each hole would have a<br />

number underneath it giving <strong>the</strong> position of its corresponding letter in<br />

<strong>the</strong> message.<br />

Such a cipher would be much harder to solve unless <strong>the</strong> same stencil<br />

was used repeatedly in which case, given enough messages, it might be<br />

possible for a cryptanalyst to recover part of <strong>the</strong> stencil <strong>and</strong> from that<br />

gradually to recover <strong>the</strong> rest. If, however, <strong>the</strong> stencil changed regularly it<br />

would be extremely difficult, if not impossible without fur<strong>the</strong>r information,<br />

to solve <strong>the</strong> system. To get some idea of <strong>the</strong> difficulty consider<br />

this.<br />

Example 7.2 (stencil cipher)<br />

Text of message:<br />

Some of Shakespeare’s plays such as<br />

SSSS 10SSSS 6SSSSSSSSS SSSSSS 8SS 1<br />

Anthony <strong>and</strong> Cleopatra are performed<br />

SS2SSSS S11SSSS9SSS3SS SSS SS15 SSS7<br />

less frequently than o<strong>the</strong>rs, Macbeth<br />

SSSS SSSSSSS12SS SS4S SSSSSS SSS5SSS13<br />

King Lear <strong>and</strong> Hamlet, in particular.<br />

S14SS SSSS SS16<br />

Ciphers for spies 73<br />

The numbers show where <strong>the</strong> holes in <strong>the</strong> stencil were placed <strong>and</strong> give <strong>the</strong><br />

order in which <strong>the</strong> visible letters are to be read; where a two-digit number<br />

is needed <strong>the</strong> letter above <strong>the</strong> first digit is <strong>the</strong> one where <strong>the</strong> hole occurs;<br />

<strong>the</strong> letter has been underlined for clarity, though of course it would not

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!