30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Book <strong>ciphers</strong><br />

A spy must avoid arousing suspicion <strong>and</strong> so any cipher equipment he has<br />

in his house must not be obvious. Even a single stencil might appear suspicious<br />

to an investigator <strong>and</strong> a stack of stencils could be incriminating.<br />

Likewise a spy would be unlikely to use a code if it meant having to have a<br />

large code-book in <strong>the</strong> house. A cipher that requires no unusual equipment<br />

is <strong>the</strong>refore a very attractive proposition so far as a spy is concerned<br />

<strong>and</strong> a book cipher is precisely that; all that is required is a book on any<br />

topic which does not employ non-Latin alphabetic characters. The book<br />

could, for example, be an English novel or a biography or historical work<br />

but probably not one dealing with organic chemistry.<br />

Using a book cipher<br />

In order to use a book cipher it is necessary to be able to ‘add <strong>and</strong> subtract’<br />

pairs of letters of <strong>the</strong> alphabet. This is done, as explained in Chapter 1, by<br />

numbering <strong>the</strong> letters of <strong>the</strong> alphabet A�0, B�1, C�2,..., Z�25 <strong>and</strong><br />

adding or subtracting (mod 26) <strong>and</strong> re-converting <strong>the</strong> answers to letters.<br />

Since this is a tedious process it is better to make up tables once <strong>and</strong> for all<br />

<strong>and</strong> look up <strong>the</strong> result of adding or subtracting in <strong>the</strong> appropriate table,<br />

but to show how to do it without such tables let us carry out <strong>the</strong> process on<br />

a few letters.<br />

Example 7.3<br />

Convert <strong>the</strong> alphabet to numbers beginning with A�0, B�1 etc. Then<br />

‘add’ toge<strong>the</strong>r <strong>the</strong> two texts below (mod 26) <strong>and</strong> re-convert <strong>the</strong> resulting<br />

numbers to letters.<br />

Text 1 THEXCURFEWXTOLLSX<br />

Text 2 ONCEXUPONXAXTIMEX<br />

Solution<br />

We repeat Table 1.1 as Table 7.1.<br />

Table 7.1<br />

Ciphers for spies 75<br />

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z<br />

00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!