30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

If <strong>the</strong>n we try subtracting THE from <strong>the</strong> cipher at every possible position<br />

<strong>and</strong> look at <strong>the</strong> trigraphs obtained we might find plausible looking parts<br />

of English words which we might <strong>the</strong>n be able to complete, thus adding a<br />

few more letters in <strong>the</strong> o<strong>the</strong>r text, preceding or following THE. O<strong>the</strong>r<br />

common trigraphs can be tried <strong>and</strong> so <strong>the</strong> two texts might begin to<br />

‘unravel’, so to speak. If X is used as a separator we can extend THE to<br />

THEX, or possibly even to XTHEX, although in doing so we might fail to<br />

pick up a word such as THERE. Even a short word, such as A, might be<br />

helpful if it occurs as XAX.<br />

If some unusual words can be found in <strong>the</strong> key text it might be possible<br />

to deduce <strong>the</strong> type of book being used <strong>and</strong> even to identify <strong>the</strong> book,<br />

which would make subsequent cryptanalysis much easier. In practice we<br />

might at first only be able to recover occasional words or parts of words in<br />

<strong>the</strong> two texts but even partial recovery could be informative <strong>and</strong> subsequent<br />

messages might provide fur<strong>the</strong>r useful ‘cribs’. As an indication of<br />

<strong>the</strong> method, on a small scale (just 50 letters):<br />

Example 7.4<br />

The following 10 groups have been enciphered using a book cipher. Use<br />

<strong>the</strong> technique of crib-dragging to try to recover <strong>the</strong> texts of <strong>the</strong> key <strong>and</strong><br />

message.<br />

FLIQT NYQFK VACEH UCUAC MOXRG EYYQJ BNOEQ<br />

FJXUL ILREJ ATVQB<br />

Ciphers for spies 81<br />

We try some common words as possible cribs, THE being <strong>the</strong> most<br />

obvious. Crib-dragging is undeniably tedious since we must try <strong>the</strong> crib<br />

at all possible positions of <strong>the</strong> cipher text. Since any of <strong>the</strong> letters that we<br />

try, T, H <strong>and</strong> E in this case, may occur in o<strong>the</strong>r cribs we might save some<br />

effort overall if we first see what <strong>the</strong> resultant plain letter would be if we<br />

assume that T is <strong>the</strong> letter to be subtracted from <strong>the</strong> cipher at each position,<br />

<strong>the</strong>n if H is <strong>the</strong> letter <strong>and</strong> finally if E is <strong>the</strong> letter. If we now write out<br />

<strong>the</strong> three resulting streams of ‘putative plaintext’ with <strong>the</strong> first line (corresponding<br />

to T) offset two places to <strong>the</strong> right <strong>and</strong> <strong>the</strong> second line ( <strong>the</strong> ‘H’<br />

line) offset one place to <strong>the</strong> right relative to <strong>the</strong> third (‘E’) line <strong>the</strong>n any<br />

possible ‘words’ will appear as three letters in a vertical line; thus:<br />

Cipher BHFLIQT NYQFK VACEH UCUAC MOXRG EYYQJ BNOEQ FJXUL ILREJ ATVQB<br />

Tline BHMSPXA UFXMR CHJLO BJBHJ TVEYN LFFXQ IUVLX MQEBS PSYLQ HACXI<br />

Hline HYEBJMG RJYDO TVXAN VNTVF HQKZX RRJCU GHXJY CQNEB EKXCT MOJUH<br />

Eline BHEMPJU MBGRW YADQY QWYIK TNCAU UMFXJ KAMBF TQHEH NAFWP RMXHH

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!