Information Security. Mark Stamp

Чтение книги онлайн.

Читать онлайн книгу Information Security - Mark Stamp страница 22

Information Security - Mark Stamp

Скачать книгу

but, with this insight, the permutations were easily recovered. The codebook was then deduced from context and also with the aid of some unencrypted messages that provided additional context for the ciphertext messages.

      And what did these decrypted messages reveal? The reporters who broke the messages were amused to discover that Tilden's supporters had tried to bribe officials in the disputed states. The irony here—or not, depending on your perspective—is that Tilden's people were guilty of precisely the same crime of which they had accused Hayes.

      By any measure, this cipher was poorly designed and weak. One lesson is that the overuse of a key can be an exploitable flaw. In this case, each time a permutation was reused, it gave the cryptanalyst more information that could be collated to recover the permutation. In modern cipher systems, we try to limit the use of a key so that we do not allow a cryptanalyst to accumulate too much information, and to limit the damage if a particular key is exposed.

      2.4.2 Zimmermann Telegram

Plaintext Ciphertext
Februar 13605
fest 13732
finanzielle 13850
folgender 13918
Frieden 17142
Friedenschluss 17149
vertical-ellipsis vertical-ellipsis
Schematic illustration of the reproduction of the Zimmermann Telegram.

      2.4.3 Project VENONA

      The so‐called VENONA project [130] provides an interesting example of a real‐world use of the one‐time pad. In the 1930s and 1940s, spies from the Soviet Union who entered the United States brought with them one‐time pad keys. When it was time to report back to their handlers in Moscow, these spies used the one‐time pads to encrypt their messages, which were then sent. These spies were extremely successful, and their messages dealt with the most sensitive U.S. government secrets of the time. In particular, the development of the first atomic bomb was a focus of much of the espionage. The Rosenbergs, Alger Hiss, and many other well‐known traitors—and many who were never identified—figure prominently in VENONA messages.

      The Soviet spies were well trained and never reused the key, yet many of the intercepted ciphertext messages were eventually decrypted by American cryptanalysts. How can that be, given that the one‐time pad is provably secure? In fact, there was a flaw in the method used to generate the pads, so that, in effect, long stretches of the keys were repeated. As a result, many messages were in depth, which allowed for successful cryptanalysis of about 3000 VENONA messages.

Скачать книгу

[C% Ruth] learned that her husband [v] was called up by the army
but he was not sent to the front. He is a mechanical engineer
and is now working at the ENORMOUS [ENORMOZ] [vi] plant in
SANTA FE, New Mexico.