30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

74<br />

chapter 7<br />

have been underlined in <strong>the</strong> message as sent! Thus <strong>the</strong> message reads,<br />

after insertion of spaces,<br />

as before.<br />

ATTACK DUE ON THIRD<br />

If a stencil is used several times it might be possible for a cryptanalyst to<br />

discover where <strong>the</strong> holes are placed, <strong>and</strong> in what order <strong>the</strong>y are used,<br />

but it would depend on whe<strong>the</strong>r any likely plaintext phrases or words<br />

were available <strong>and</strong> on <strong>the</strong> number <strong>and</strong> length of <strong>the</strong> messages. If<br />

<strong>the</strong> stencil was changed after every page it would be impossible to read<br />

<strong>the</strong> messages unless <strong>the</strong>re was some relationship between <strong>the</strong> make-up<br />

of a message stencil <strong>and</strong> its successor, for without knowing <strong>the</strong> stencil<br />

many possible messages might be found within a page as is illustrated<br />

by<br />

Problem 7.1<br />

Verify that all but one of <strong>the</strong> following messages can be found within <strong>the</strong><br />

text of <strong>the</strong> example above <strong>and</strong> so are ‘possible solutions’ given an appropriate<br />

stencil:<br />

(1) MERRY CHRISTMAS;<br />

(2) COME AT ONCE;<br />

(3) GO AWAY QUICKLY;<br />

(4) THE AUTHOR OF OTHELLO IS BACON.<br />

Hundreds of o<strong>the</strong>r ‘possible solutions’ could be found within <strong>the</strong> text<br />

since it contains over a hundred letters <strong>and</strong> any anagram of any subset<br />

could be picked out with an appropriate stencil. Without fur<strong>the</strong>r information<br />

such as, for example, that a stencil will not have more than one<br />

hole in any row or column, such a message is ‘unbreakable’ since many<br />

solutions are possible. The same situation can apply to o<strong>the</strong>r cipher<br />

systems where insufficient material is available to provide a unique solution.<br />

Even a simple substitution system is unbreakable if it is used only<br />

once for a single short message. In <strong>the</strong> extreme case of a ‘one-time pad’<br />

<strong>the</strong> system is unbreakable no matter how many messages of any lengths<br />

are sent, as we shall see later. If <strong>the</strong> same system (simple substitution,<br />

transposition, stencil) is used more than once it may cease to be<br />

‘unbreakable’; even a ‘one-time pad’ may lose its security if <strong>the</strong> same pad is<br />

used twice.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!