30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

86<br />

chapter 7<br />

been enciphered using a book as key, a fact that is not immediately apparent.<br />

Indicators<br />

These have already been referred to in Chapter 3 but <strong>the</strong>y are sufficiently<br />

important to warrant mention again, since provision of <strong>the</strong> indicator may<br />

prove to be <strong>the</strong> Achilles heel of any cipher system. When a book cipher is<br />

used <strong>the</strong> sender has to let <strong>the</strong> receiver know at what line on what page of<br />

<strong>the</strong> key book he is beginning <strong>the</strong> encipherment. If, for example, he begins<br />

with line 15 of page 216 he may preface <strong>the</strong> message with <strong>the</strong> number<br />

15216. This is, however, ra<strong>the</strong>r too obvious <strong>and</strong> he would be more likely<br />

to disguise it. There are numerous ways of doing this such as:<br />

(1) transposing <strong>the</strong> digits according to an agreed rule so that 15216<br />

becomes, say,<br />

65121;<br />

(2) adding an agreed number, such as 59382, digit by digit, thus<br />

producing<br />

64598;<br />

(3) converting <strong>the</strong> digits of <strong>the</strong> indicator to letters <strong>and</strong> hiding <strong>the</strong><br />

resulting five-letter group at an agreed place within <strong>the</strong> cipher text of<br />

<strong>the</strong> message; thus 15216 becomes<br />

BFCBG;<br />

(4) a combination of any of <strong>the</strong>se.<br />

Provision of an indicator is not, of course, unique to book <strong>ciphers</strong>; it is<br />

an essential part of many cipher systems, but <strong>the</strong> basic principle is <strong>the</strong><br />

same: <strong>the</strong> sender must somehow communicate it to <strong>the</strong> receiver in such a<br />

way as to make it as difficult as possible for a cryptanalyst to find it. The<br />

cryptanalyst, conversely, will give high priority to identifying <strong>the</strong> location<br />

of <strong>the</strong> indicator <strong>and</strong> discovering its method of encryption .<br />

Disastrous errors in using a book cipher<br />

A significant risk for <strong>the</strong> sender of a book cipher message is that if he<br />

makes a mistake <strong>and</strong> has to re-send <strong>the</strong> message he may provide <strong>the</strong> cryptanalyst<br />

with a relatively simple route into decryption. Such a crucial

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!