The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Rate it:
Open Preview
2%
Flag icon
It has been said that the First World War was the chemists’ war, because mustard gas and chlorine were employed for the first time, and that the Second World War was the physicists’ war, because the atom bomb was detonated. Similarly, it has been argued that the Third World War would be the mathematicians’ war, because mathematicians will have control over the next great weapon of war—information.
2%
Flag icon
In a code, a word or phrase is replaced with a word, number or symbol.
2%
Flag icon
The alternative to a code is a cipher, a technique that acts at a more fundamental level, by replacing letters rather than whole words.
2%
Flag icon
More often than not, though, crypto-jargon is quite transparent: for example, plaintext is the message before encryption, and ciphertext is the message after encryption.
3%
Flag icon
First, Mary was a Scottish queen, and many questioned whether an English court had the authority to execute a foreign head of state. Second, executing Mary might establish an awkward precedent—if the state is allowed to kill one queen, then perhaps rebels might have fewer reservations about killing another, namely Elizabeth.
4%
Flag icon
Secret communication achieved by hiding the existence of a message is known as steganography, derived from the Greek words steganos, meaning “covered,” and graphein, meaning “to write.”
4%
Flag icon
Many organic fluids behave in a similar way, because they are rich in carbon and therefore char easily. Indeed, it is not unknown for modern spies who have run out of standard-issue invisible ink to improvise by using their own urine.
4%
Flag icon
Hence, in parallel with the development of steganography, there was the evolution of cryptography, derived from the Greek word kryptos, meaning “hidden.” The aim of cryptography is not to hide the existence of a message, but rather to hide its meaning, a process known as encryption.
4%
Flag icon
German agents in Latin America would photographically shrink a page of text down to a dot less than 1 millimeter in diameter, and then hide this microdot on top of a full stop in an apparently innocuous letter.
4%
Flag icon
Of the two branches of secret communication, cryptography is the more powerful because of this ability to prevent information from falling into enemy hands.
5%
Flag icon
In transposition each letter retains its identity but changes its position, whereas in substitution each letter changes its identity but retains its position.
5%
Flag icon
It was definitively stated in 1883 by the Dutch linguist Auguste Kerckhoffs von Nieuwenhof in his book La Cryptographie militaire: “Kerckhoffs’ Principle: The security of a cryptosystem must not depend on keeping secret the crypto-algorithm. The security depends only on keeping secret the key.”
6%
Flag icon
Instead of randomly rearranging the plain alphabet to achieve the cipher alphabet, the sender chooses a keyword or keyphrase.
6%
Flag icon
Codemakers had evolved a system for guaranteeing secure communication, so there was no need for further development-without necessity, there was no need for further invention.
6%
Flag icon
The Abbasid caliphs were less interested than their predecessors in conquest, and instead concentrated on establishing an organized and affluent society. Lower taxes encouraged businesses to grow and gave rise to greater commerce and industry, while strict laws reduced corruption and protected the citizens.
6%
Flag icon
The monoalphabetic substitution cipher is the general name given to any substitution cipher in which the cipher alphabet consists of either letters or symbols, or a mix of both.
7%
Flag icon
They in fact invented cryptanalysis, the science of unscrambling a message without knowledge of the key.
7%
Flag icon
Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics and linguistics.
7%
Flag icon
At the same time as acquiring knowledge, the Islamic civilization was able to disperse it, because it had procured the art of papermaking from the Chinese.
7%
Flag icon
The theologians were interested in establishing the chronology of the revelations, which they did by counting the frequencies of words contained in each revelation. The theory was that certain words had evolved relatively recently, and hence if a revelation contained a high number of these newer words, this would indicate that it came later in the chronology.
7%
Flag icon
This was done by studying the etymology of words and the structure of sentences, to test whether particular texts were consistent with the linguistic patterns of the Prophet.
7%
Flag icon
Al-Kindī’s technique, known as frequency analysis, shows that it is unnecessary to check each of the billions of potential keys. Instead, it is possible to reveal the contents of a scrambled message simply by analyzing the frequency of the characters in the ciphertext.
7%
Flag icon
In general, short texts are likely to deviate significantly from the standard frequencies, and if there are less than a hundred letters, then decipherment will be very difficult.
9%
Flag icon
If O represents a vowel it should appear before and after most of the other letters, whereas if it represents a consonant, it will tend to avoid many of the other letters.
9%
Flag icon
In the English language, the letter h frequently goes before the letter e (as in the, then, they, etc.), but rarely after e.
10%
Flag icon
Between A.D. 800 and 1200, Arab scholars enjoyed a vigorous period of intellectual achievement. At the same time, Europe was firmly stuck in the Dark Ages.
10%
Flag icon
However, this may have been a ploy to lull the Vatican cryptographers into a false sense of security-Soro might have been reluctant to point out the weaknesses of the Papal cipher, because this would only have encouraged the Vatican to switch to a more secure cipher, one that Soro might not have been able to break.
10%
Flag icon
Toward the end of the sixteenth century the French consolidated their codebreaking prowess with the arrival of François Viète, who took particular pleasure in cracking Spanish ciphers. Spain’s cryptographers, who appear to have been naive compared with their rivals elsewhere in Europe, could not believe it when they discovered that their messages were transparent to the French. King Philip II of Spain went as far as petitioning the Vatican, claiming that the only explanation for Viète’s cryptanalysis was that he was an “archfiend in league with the devil.” Philip argued that Viète should be ...more
14%
Flag icon
In 1577, Philip of Spain was using ciphers to correspond with his half-brother and fellow Catholic, Don John of Austria, who was in control of much of the Netherlands.
14%
Flag icon
The correct use of a strong cipher is a clear boon to sender and receiver, but the misuse of a weak cipher can generate a very false sense of security.
17%
Flag icon
In a polyalphabetic cipher, a plaintext letter will also be represented by different symbols, but, even more confusingly, these symbols will represent different letters during the course of an encipherment. Perhaps the fundamental reason why the homophonic cipher is considered monoalphabetic is that once the cipher alphabet has been established, it remains constant throughout the process of encryption.
18%
Flag icon
Bazeries viewed the letters as the ultimate challenge, and he spent the next three years of his life attempting to decipher them.
19%
Flag icon
Morse used an electromagnet to enhance the signal, so that upon arriving at the receiver’s end it was strong enough to make a series of short and long marks, dots and dashes, on a piece of paper.
20%
Flag icon
Although Babbage was a brilliant innovator, he was not a great implementer.
20%
Flag icon
When Babbage abandoned his first machine, the government lost confidence in him and decided to cut its losses by withdrawing from the project—it had already spent £17,470, enough to build a pair of battleships.
20%
Flag icon
In fact, the Analytical Engine provided the template for modern computers. The design included a “store” (memory) and a “mill” (processor), which would allow it to make decisions and repeat instructions, which are equivalent to the “IF … THEN …” and “LOOP” commands in modern programming.
20%
Flag icon
Unfortunately, as with many other of his grand plans, the book was never completed.
23%
Flag icon
Being a keen statistician and compiler of mortality tables, Babbage was irritated by the lines “Every moment dies a man, Every moment one is born,” which are the last lines of the plaintext above.
23%
Flag icon
He certainly had a habit of not finishing projects and not publishing his discoveries, which might suggest that this is just one more example of his lackadaisical attitude.
23%
Flag icon
It is quite possible that British Intelligence demanded that Babbage keep his work secret, thus providing them with a nine-year head start over the rest of the world.
23%
Flag icon
Morse operators could send plain English at speeds of up to 35 words per minute because they could memorize entire phrases and transmit them in a single burst, whereas the jumble of letters that make up a ciphertext was considerably slower to transmit, because the operator had to continually refer back to the sender’s written message to check the sequence of letters.
23%
Flag icon
However, newspapers could be posted free of charge, and this provided a loophole for thrifty Victorians. Instead of writing and sending letters, people began to use pinpricks to spell out a message on the front page of a newspaper.
24%
Flag icon
The public’s growing fascination with cryptographic techniques meant that codes and ciphers soon found their way into nineteenth-century literature.
24%
Flag icon
In 1843, keen to exploit the interest he had generated, Poe wrote a short story about ciphers, which is widely acknowledged by professional cryptographers to be the finest piece of fictional literature on the subject.
27%
Flag icon
A false line of attack will sometimes generate a few tantalizing words within a sea of gibberish, which then encourages the cryptanalyst to devise a series of caveats to excuse the gibberish.
27%
Flag icon
According to Hammer, “the Beale ciphers have occupied at least 10% of the best cryptanalytic minds in the country. And not a dime of this effort should be begrudged. The work—even the lines that have led into blind alleys—has more than paid for itself in advancing and refining computer research.”
27%
Flag icon
You might be surprised by the strength of the unbroken Beale ciphers, especially bearing in mind that when we left the ongoing battle between codemakers and codebreakers, it was the codebreakers who were on top.
27%
Flag icon
Creating a keytext for a message is much more secure than using a key based on a published book, but it is practical only if the sender has the time to create the keytext and is able to convey it to the intended recipient, requirements that are not feasible for routine, day-to-day communications.
27%
Flag icon
An alternative theory for explaining the indecipherability of the Beale ciphers is that the author of the pamphlet deliberately sabotaged them before having them published.
27%
Flag icon
For example, according to the pamphlet, Beale’s letter, which was locked in the iron box and supposedly written in 1822, contains the word “stampede,” but this word was not seen in print until 1834. However, it is quite possible that the word was in common use in the Wild West at a much earlier date, and Beale could have learned of it on his travels.
« Prev 1 3 7