Spartan use of the Scytale (a tapered rod on which a papyrus strip is wound and the message written - the message must be rewound on the same size rod to be read). Biblical references.
Another ancient, if somewhat ludicrous, means of sending secret messages was devised by an ingenious Histiæus, when he was at the Persian court. He wished to send word to Aristagoras, his son-in-law who was in Greece, to revolt. It was, of course, vital that the message should not be intercepted. To assure secrecy Histiæus shaved the head of his most trusted slave, tattooed it with his message [the slave was told that this was the start of a cure for his failing eyesight], and waited until the hair grew. The slave was instructed to say to Aristagoras, "Shave my head and look thereon." [this was to be the final part of the cure]. Aristagoras revolted.
This is an example of a concealment cipher, the message is present but concealed in some way. There are many examples of such. The security of such messages is wholly dependent upon the concealment trick. These are easily broken if one is looking for such devices and they do not lend themselves to fast ciphering and deciphering, so they are not used in any serious applications.
Ex: In England, during the days of Cromwell, Sir John Trevanion, a cavalier of distinction, having fallen from grace was locked up in Colcester Castle. He had every reason to believe that he would be put to death just as had been his friends and fellow Royalists, Sir Charles Lucas and Sir George Lisle. While awaiting his doom, however, he was one day handed the following letter by his jailer.
Worthie Sir John:- Hope, that is ye beste comfort of ye afflicted, cannot much, I fear me, help you now. That I would saye to you, is this only: if ever I may be able to requite that I do owe you, stand not upon asking me. 'Tis not much that I can do: but what I can do, bee ye verie sure I wille. I knowe that, if dethe comes, if ordinary men fear it, it frights not you, accounting it for a high honor, to have such a rewarde of your loyalty. Pray yet that you may be spared this soe bitter, cup. I fear not that you will grudge any sufferings; only if bie submission you can turn them away, 'tis the part of a wise man. Tell me, an if you can, to do for you anythinge that you wolde have done. The general goes back on Wednesday. Restinge your servant to command. - R.T.If you do what Sir John did - that is, read the third letter after every punctuation mark - you may not feel the same degree of relief, but you will know that the
PANEL AT EAST END OF CHAPEL SLIDES
The prisoner asked to be allowed to pass an hour in private repentance in the chapel. But apparently being less devout than his jailers believed, he spent the hour not in prayer, but in flight.
Ex: Another example that uses concealment is the Russian Nihilist secret writing. This method is a combination of concealment and a substitution cipher.
Consider this innocent looking note:
Ex: Another example of this type is the Francis Bacon Bi-literal cipher where two slightly different typefaces are used to conceal a binary code of length 5. At the end of the 19th century, a Mrs. Gallup studied the first edition of one of Bacon's early works, and on the title-page, hidden under two sets of italics, she discovered the name of William Rowley - Bacon's chief secretary.
She went on with the work of deciphering and wrote several books on the subject. She claimed to have found this cipher not only in the books of Bacon himself but also in the early editions of works by Greene, Marlowe, Shakespeare, and Ben Jonson. But her startling claim was that the enciphered story thus hidden proved that Bacon was the author of all Shakespeare's plays, and , furthermore, that he was the eldest son of Queen Elizabeth by her first marriage to the Earl of Leicester, which took place while she was imprisoned in the Tower by Queen Mary.
In any case, in the first edition of Shakespeare's works, published by Isaac Jaggard in 1623, Mrs. Gallup claims to have found the following message, enciphered in the 'L. Digges' Poem.
'Francis of Verulam is the author of all the plays heretofore published by Marlowe, Greene, Peele and Shakespeare, and of the twenty-two (plays) now put out for the first time. Some are altered to continue his history. Fr. St. A'The difference between the two sets of italic fonts being very small, it is an extremely difficult matter to decipher these messages.
A aaaaa IJ abaaa R baaaa B aaaab K abaab S baaab C aaaba L ababa T baaba etc....The two main classes of ciphers are the transposition ciphers and the substitution ciphers.
Ex: A simple columnar transposition. The letters of the message are written in a rectangular array by rows and then "read out" by columns. Variations: alter the method of writing the message into the array, or alter the method of reading out the encrypted message.
For instance, the "clear" message, THIS IS A PHONY MESSAGE BUT IT SERVES ITS PURPOSE, contains 40 letters. We write the letters in an 8 x 5 array (one choice amongst many possible sizes) to get:
Ex: The Nihilist transposition using a keyword. In this type of transposition, a keyword (of length equal to the number of columns) is used to permute the order that the columns are read out. In the above example if the keyword is SPIKE, we use order 5 4 2 3 1 to read out the columns (the numbers correspond to the relative positions of the letters in the keyword in the natural lexicographical order of the alphabet) to get:
Recognizing transposition ciphers is easily done by considering the fact that the vowel percentage in English is 40% and almost never varies outside of the range 35% - 45%.
Transposition ciphers are easily recognized by their letter frequencies but remain hard to decipher since there are many ways to systematically encrypt. With patience they can all be broken.
Caesar's Cipher (Simple shift - monoalphabetic) In this classical cipher, each letter is replaced by the letter that is 3 positions further along in the usual lexicographical ordering. Thus, "A" is replaced by "D", "B" is replaced by "E", and so on. In general, a shift cipher replaces the letters by some cyclic shift of the alphabet. This is most easily done by assigning the letters numbers from 0 to 25. Each letter of the clear message is replaced by the letter whose number is obtained by adding the key (a number from 0 to 25) to the letter's number modulo 26. In the Caesar cipher the key is 3.
Morse Code provides another example of a substitution cipher where letters are replaced by sequences of dots and dashes. This code was developed for use by telegraph operators, and adopted internationally. The international distress signal (SOS) which in Morse code is ... --- ..., was first used by the radio operator of the Titanic.
|A||. -||J||. - - -||S||. . .||Ä||. - . -||5||. . . . .||;||- . - . - .|
|B||- . . .||K||- . -||T||-||É||. . - . .||6||- . . . .||:||- - - . . .|
|C||- . - .||L||. - . .||U||. . -||Ñ||- - . - -||7||- - . . .||/||- . . - .|
|D||- . .||M||- -||V||. . . -||Ö||- - - .||8||- - - . .||-||- . . . . -|
|E||.||N||- .||W||. - -||Ü||. . - -||9||- - - - .||'||. - - - - .|
|F||. . - .||O||- - -||X||- . . -||1||. - - - -||0||- - - - -||( or )||- . - - . -|
|G||- - .||P||. - - .||Y||- . - -||2||. . - - -||,||- - . . - -||_||. . - - . -|
|H||. . . .||Q||- - . -||Z||- - . .||3||. . . - -||.||. - . - . -|
|I||. .||R||. - .||Á||. - - . -||4||. . . . -||?||. . - - . .|
Decrypting uses the same procedure except that the matrix M-1 is used.
Example Cryptanalysis of a Substitution Cipher
For an example of breaking a Playfair cipher we refer to: Helen Fouchè Gaines, Cryptanalysis, a study of ciphers and their solution, Dover, 1956
Kasiski Test (1863 - Major F.W. Kasiski, German cryptologist): Length of keyword is a divisor of the gcd of the distances between identical strings of length at least 3.
Friedman Test (1925, Colonel William Frederick Friedman (1891-1969)) also called the Kappa Test:
The index of coincidence of a message is the probability that a randomly chosen pair of letters in the message are equal. If the message has length n and ni denotes the number of occurrences of the ith letter then the index, denoted by I, is given by:
Now we can also calculate this index for any language source if we know the probabilities of occurrence of each of the letters. Thus, if pa is the probability of occurrence of the letter a, for example, then we get:
Using our knowledge of these probabilities we can easily calculate that IEnglish ~ 0.065 and if we had a random source of English letters then IRandom ~ 0.038 (= 1/26).
This index can give information about a message. For instance, if a ciphered message was either a transposition or a monoalphabetic substitution then one would expect to have IMessage ~ IEnglish , but if a polyalphabetic substitution was used then this value should decrease (but no lower than 0.038) since the polyalphabetic procedure tends to randomize the occurrences of the letters.
Let us now apply this index to a Vigenère ciphertext. If the ciphertext has length n and the keyword has length k (and n >> k) then in the positions corresponding to the same letter of the keyword, the ciphertext has been created with a monoalphabetic substitution, so if one were to calculate the index of just those positions, we should get 0.065. On the other hand if one were to calculate the index using only pairs from different letters of the keyword, the index would be much lower (0.038 if the keyword letters were randomly chosen). We may therefore calculate the expected number (A) of pairs of equal letters in the following way:
Pick a letter from the ciphertext (n choices), there are (n/k - 1) remaining letters that have used the same keyword letter [we are neglecting round-off error] and so,
pairs of this type. There are (n - n/k) remaining letters that have used a different keyword letter [assuming the keyword letters are all distinct], and so there are
pairs of this type. Therefore,
from which we may solve for k (keyword length):
Kerckhoffs' Principle: The security of a cryptosystem must not depend on keeping secret the crypto-algorithm. The security depends only on keeping secret the key.