Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Code and ciphers: Julius Caesar, the Enigma and the internet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
74<br />
chapter 7<br />
have been underlined in <strong>the</strong> message as sent! Thus <strong>the</strong> message reads,<br />
after insertion of spaces,<br />
as before.<br />
ATTACK DUE ON THIRD<br />
If a stencil is used several times it might be possible for a cryptanalyst to<br />
discover where <strong>the</strong> holes are placed, <strong>and</strong> in what order <strong>the</strong>y are used,<br />
but it would depend on whe<strong>the</strong>r any likely plaintext phrases or words<br />
were available <strong>and</strong> on <strong>the</strong> number <strong>and</strong> length of <strong>the</strong> messages. If<br />
<strong>the</strong> stencil was changed after every page it would be impossible to read<br />
<strong>the</strong> messages unless <strong>the</strong>re was some relationship between <strong>the</strong> make-up<br />
of a message stencil <strong>and</strong> its successor, for without knowing <strong>the</strong> stencil<br />
many possible messages might be found within a page as is illustrated<br />
by<br />
Problem 7.1<br />
Verify that all but one of <strong>the</strong> following messages can be found within <strong>the</strong><br />
text of <strong>the</strong> example above <strong>and</strong> so are ‘possible solutions’ given an appropriate<br />
stencil:<br />
(1) MERRY CHRISTMAS;<br />
(2) COME AT ONCE;<br />
(3) GO AWAY QUICKLY;<br />
(4) THE AUTHOR OF OTHELLO IS BACON.<br />
Hundreds of o<strong>the</strong>r ‘possible solutions’ could be found within <strong>the</strong> text<br />
since it contains over a hundred letters <strong>and</strong> any anagram of any subset<br />
could be picked out with an appropriate stencil. Without fur<strong>the</strong>r information<br />
such as, for example, that a stencil will not have more than one<br />
hole in any row or column, such a message is ‘unbreakable’ since many<br />
solutions are possible. The same situation can apply to o<strong>the</strong>r cipher<br />
systems where insufficient material is available to provide a unique solution.<br />
Even a simple substitution system is unbreakable if it is used only<br />
once for a single short message. In <strong>the</strong> extreme case of a ‘one-time pad’<br />
<strong>the</strong> system is unbreakable no matter how many messages of any lengths<br />
are sent, as we shall see later. If <strong>the</strong> same system (simple substitution,<br />
transposition, stencil) is used more than once it may cease to be<br />
‘unbreakable’; even a ‘one-time pad’ may lose its security if <strong>the</strong> same pad is<br />
used twice.