30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ciphers for spies 85<br />

that were necessary, to <strong>the</strong> decrypts obtained so far. The word IN in Text<br />

2 should be preceded by a space, so we decrypt X at that point, position<br />

35, where <strong>the</strong> cipher letter is Q, which produces T in Text 1. The full situation,<br />

<strong>the</strong>n, at this point is that we have decrypted positions 1 to 18<br />

<strong>and</strong> positions 35 to 50, two-thirds of <strong>the</strong> total, <strong>and</strong> <strong>the</strong> cipher <strong>and</strong> texts<br />

are<br />

FLIQTNYQFKVACEHUCUACMOXRGEYYQJBNOEQFJXULILREJATVQB<br />

THEXLASTXSYMPHONYXXXXXXXXXXXXXXXXXTXWASXTHEXJUPITE<br />

MEETINGXISXONXTHEXXXXXXXXXXXXXXXXXXINXCOPENHAGEN<br />

In Text 1 we are looking for <strong>the</strong> word MOZART <strong>and</strong> <strong>the</strong> T at position 35<br />

might be <strong>the</strong> last letter of it, so we try XMOZAR at positions 29 to 34 which<br />

give TXNOON in Text 2. The T is likely to be preceded by XA which yields<br />

BY in TEXT1 in positions 27 <strong>and</strong> 28 <strong>and</strong> our texts now read<br />

FLIQTNYQFKVACEHUCUACMOXRGEYYQJBNOEQFJXULILREJATVQB<br />

THEXLASTXSYMPHONYXXXXXXXXXBYXMOZARTXWASXTHEXJUPITE<br />

MEETINGXISXONXTHEXXXXXXXXXXATXNOONXINXCOPENHAGEN<br />

The word BY should be preceded by X which gives (E�X)�H in Text 2<br />

<strong>and</strong> since we would expect a date for this meeting we can reasonably try T<br />

as <strong>the</strong> letter before H which gives (G�T)�N in position 25 in Text 1. There<br />

are now only 6 letters to be deciphered <strong>and</strong> in TEXT2 <strong>the</strong>se are almost<br />

sure to represent a number, probably a date, which in its ordinal form<br />

ends in TH. ELEVEN, with 6 letters, is a good c<strong>and</strong>idate <strong>and</strong> subtracting<br />

<strong>the</strong>se 6 letters from <strong>the</strong> corresponding cipher letters, ACMOXR, produces<br />

WRITTE for Text 1. The decryption is now complete <strong>and</strong> reads<br />

FLIQTNYQFKVACEHUCUACMOXRGEYYQJBNOEQFJXULILREJATVQB<br />

THEXLASTXSYMPHONYXWRITTENXBYXMOZARTXWASXTHEXJUPITE<br />

MEETINGXISXONXTHEXELEVENTHXATXNOONXINXCOPENHAGEN<br />

The cryptanalyst has not only decrypted <strong>the</strong> message he has also discovered<br />

that <strong>the</strong> book being used as <strong>the</strong> key is probably a book ei<strong>the</strong>r<br />

about music or about Mozart, <strong>and</strong> this may be useful in decrypting later<br />

messages.<br />

This example, short <strong>and</strong> simple though it is, illustrates how <strong>the</strong> cryptanalyst<br />

needs a combination of analytical <strong>and</strong> linguistic skills, general<br />

knowledge, imagination <strong>and</strong> luck in order to achieve success. In addition,<br />

do not forget that he would first of all have to realise that <strong>the</strong> message had

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!