Information Security. Mark Stamp

Чтение книги онлайн.

Читать онлайн книгу Information Security - Mark Stamp страница 21

Information Security - Mark Stamp

Скачать книгу

and consequently, significantly more data must be collected before the statistical information can rise above the noise.

      As late as World War II, codebooks were in widespread use. Cryptographers realized that these ciphers were subject to statistical attack, so codebooks needed to be periodically replaced with new codebooks. Since this was an expensive and risky process, techniques were developed to extend the life of a codebook. To accomplish this, a so‐called additive was generally used.

      Suppose that for a particular codebook cipher, the codewords are all five‐digit numbers. Then the corresponding additive book would consist of a long list of randomly generated five‐digit numbers. After a plaintext message had been converted to a series of five‐digit codewords, a starting point in the additive book would be selected and beginning from that point, the sequence of five‐digit additives would be added to the codewords to create the ciphertext. To decrypt, the same additive sequence would be subtracted from the ciphertext before looking up the codeword in the codebook. Note that the additive book—as well as the codebook itself—is required to encrypt or decrypt a message.

      Often, the starting point in the additive book was selected at random by the sender and sent in the clear (or in a slightly obfuscated form) at the start of the transmission. This additive information was part of the message indicator, or MI. The MI included any non‐secret information needed by the intended recipient to decrypt the message.

      Modern block ciphers use complex algorithms to generate ciphertext from plaintext (and vice versa), but at a higher level, a block cipher can be viewed as a codebook, where each distinct key determines a distinct codebook. That is, a modern block cipher consists of an enormous number of codebook ciphers, with the codebooks indexed by the key. The concept of an additive also lives on, in the form of an initialization vector, or IV, which is often used with block ciphers (and sometimes with stream ciphers as well). Modern block ciphers are discussed in detail in the next chapter.

       The trouble with quotes on the Internet is that it's difficult to determine whether or not they're real.

      —Abraham Lincoln

      In this section, we take a brief look at three instances where classic ciphers played a role in historical events. First, we look at a weak cipher that was used during the controversial U.S. presidential election of 1876. Then we consider the Zimmermann Telegram, which played a pivotal role in World War I. The Zimmermann Telegram was encrypted with a classic codebook cipher. Finally, we discuss the VENONA messages, where Soviet spies in the United States used one‐time pad encryption. This system was used over a long period of time, but most notably for atomic espionage in the 1940s.

      2.4.1 Ciphers of the Election of 1876

      The U.S. presidential election of 1876 was a virtual dead heat. At the time, the Civil War was still fresh in people's minds, Radical Reconstruction was ongoing in the former Confederacy, and the nation was still bitterly divided.

Plaintext Ciphertext
Greenbacks Copenhagen
Hayes Greece
votes Rochester
Tilden Russia
telegram Warsaw
vertical-ellipsis vertical-ellipsis

      The permutation used for a message of 10 words was

9 comma 3 comma 6 comma 1 comma 10 comma 5 comma 2 comma 7 comma 4 comma 8 period

      One actual ciphertext message was

StartLayout 1st Row monospace Warsaw they read all unchanged last are idiots cant prime situation EndLayout

      which was decrypted by undoing the permutation and substituting telegram for Warsaw to obtain

StartLayout 1st Row 1st Column Can prime t read last telegram period 2nd Column Situation unchanged period 2nd Row 1st Column They are all idiots period EndLayout

Скачать книгу