I recently finished reading the book Secret Warfare: The Battle of Codes & Ciphers by Bruce Norman. It consists of 187 pages in 17 chapters. The book used news accounts and anecdotes to tell the history of codes, ciphers, and intelligence work in general. However, at least one-half of the book described techniques and historical narrative from the 20th century (this book was written prior to 2000).
Cryptography was defined by the author as “the science of
secret writing,” (p. 13). It’s
etymology is the Greek words kryptos
(secret) and graphos (writing). In practical terms, Norman explained, “cryptography is the art of
sending messages in such a way that the real meaning is hidden from everyone
but the sender and the subject.”
The cryptographer has two means by which he may accomplish
his work: codes and ciphers. A code is a system of words that represents other
words for secrecy and/or brevity. A
cipher is the same as a code, except, rather than operating at the level of
whole words, ciphers work on single letters.
Then, there are two kinds of ciphers: transposition and
substitution. Transposition is a technique
where the cryptographer, analyst, or spy “jumbles” the letters (i.e. “secret”
becomes something like “resect”). When
the cryptographer uses substitution, letters are replaced with other letters,
numbers, or symbols. Finally, to build
the most complex kind of cipher, the cryptographer may combine both
transposition and substitution.
One of the first people to use cryptography to obtain
knowledge for the battlefield was General Lysander of Sparta in 405 BCE. Lysander had allied himself with the Persians
as he fought Athens
victoriously. However, the Persians
became envious of him and seemed poised to turn on him and attack Sparta. Lysander felt he was in a bind. A slave came with a message and Lysander read
it. Then, he asked for the slave’s belt. Down the length of the slave’s belt was a
string of meaningless letters. He took a
baton and wrapped the slave’s belt in a spiral around it, bringing the letters
into alignment such that a message was revealed: The Persians were false and
plotting against Lysander. The general
sailed against the Persians quickly and was victorious.
The obvious point of all of this work enciphering and
deciphering is “to disguise the message in such a way that someone who has the
code or knows the cipher can understand it whereas someone who does not know
the secret, cannot,” (p. 14).
Julius Caesar wrote to Cicero
using a substitution cipher. Caesar
would take his message and move every letter three places down the
alphabet. Today, this simple cipher
would offer almost no security. Adding a
it of complexity, however, can yield a useful cipher system. The following cipher is of Greek origin. The letters of the alphabet are arranged into
a square and numbers substituted for letters.
There are five columns by five rows, with the letters I and J put in the
same placeholder. It looks like this:
1 2 3 4 5
1 L B O S F
2 E V U G R
3 X A M C Y
4 N T D Z K
5 W H I/J Q P
Thus, to encode the message “charge,” first write the number
from the row, then the column. So, for
letter C, use 34. The full word/message: 34 52 32 25 24 21. You can see that leaving the numbers with the
same spacing, etc. makes the cipher vulnerable to being “cracked.” Therefore, to confuse codebreakers coded
messages are written in five-figure groups called code groups. Then, use zero
(called nulls) to complete the five-figure group for ay remaining digits. So, the previous message would be written: 34523 22524 21000.
Author Norman
populated the text with numerous examples of codes and ciphers in various
historical periods. One interesting example was from the Renaissance. Abbot Trithemius, a Benedictine monk, wrote
the first book on cryptography titled Polygraphia
in 1518. Trithemius’s method was quite interesting to me. It is a simple substitution cipher, but
instead of using letters or other characters, each letter of the text to be
enciphered is replaced by an entire word or phrase. There are several words or
phrases for each letter and any can be used (from a pre-determined list).
Another interesting chapter discussed Captain Frederick
Marryat’s development of a system of colored flags for naval signals which he
called semaphore. It also discussed S.F.B. Morse’s electromagnetic telegraph
and his famous alphabetic system of signals called “Morse Code.” But perhaps my favorite cipher in the entire
text was the “Pig-Pen Cipher,” which was used by Union prisoners held in
Confederate prison camps during the Civil War.
With the Pig-Pen Cipher, the alphabet is written in a nine-cell diagram.
ABC
|
DEF
|
GHI
|
JKL
|
MNO
|
PQR
|
STU
|
VWX
|
YZ
|
Then each letter of your message indicated by drawing the
section you are using plus one dot to indicate the second letter of the group,
two dots to represent the third letter of the group, and no dots to indicate
the first letter in the group. Thus, the
word “student” is given as:
___ ___ ___ ____ ___
| *
| ** | |___| |_*_| |_*_| * |
At least, that’s the best I can render for now.
This is just a small sample of the coding and ciphering
techniques demonstrated in Norman’s
book. As I indicated earlier, it is a
bit of an older book and I have several other books on codes and cryptography
(some of which I may review here as I complete them). Secret Warfare is, on balance, well written and rich with
historical context. The chapters
describing codes and code breaking activity during World War II are
particularly enlightening. It is amazing
to realize the extent to which code breaking and code security contributed to
outcomes on the battlefield.
As always, happy learning!
No comments:
Post a Comment
Comments, criticisms, or corrections? Let me know what you think!