textfiles/programming/CRYPTOGRAPHY/cryptloj.txt
2021-04-15 13:31:59 -05:00

220 lines
12 KiB
Plaintext

Copyright - 1992 Grolier Electronic Publishing, Inc.
cryptology
Cryptology, the branch of knowledge that concerns secret writing
or communications in code or cipher, originated in human desire
to communicate secretly and is as old as writing itself. The word
derives from the Greek kryptos ("hidden") and logos ("word").
EARLY HISTORY OF SECRET WRITING
Methods of secret communication were developed by many ancient
societies, including those of Egypt, Mesopotamia, India, and
China, but details regarding the origins and early evolution of
cryptology are unknown. About 400 BC the Spartans used a system
of secret writing, the scytale, a cylindrical rod around which
the sender wrapped a length of parchment or papyrus in a spiral.
Words were then written lengthwise along the rod, one letter on
each revolution of the strip. Once unrolled, the strip showed
nothing but a succession of meaningless letters; to be read, the
strip had to be wrapped around a rod of exactly the same diameter
as the first.
Julius Caesar is said to have used a simple letter substitution
method of secret writing in his correspondence. Caesar's method
consisted of writing the ordinary alphabet from left to right,
and beneath, another normal alphabet shifting three letters. The
letter A was replaced by D, the letter B by E, and so on. Thus
the Latin word omnia appeared as RPQLD. This method is still
called the Julius Caesar cipher, regardless of how many letters
the lower alphabet is shifted.
In the latter part of the Middle Ages the use of secret writing
increased. For example, The Equatorie of the Planetris (c.1390),
a work attributed to Geoffrey Chaucer, contains passages in
cipher.
In 1470, Leon Battista Alberti published Trattati in cifra, in
which he described a cipher disk capable of enciphering a small
code. Most authorities, however, consider Johannes Trithemius,
abbot of Spanheim in Germany, to be the father of modern
cryptography. In 1510, Trithemius wrote Polygraphia, the first
printed work on cryptology. He introduced for the first time the
concept of a square table, or tableau, in which the normal
alphabet was successively shifted.
Each alphabet in turn was used to encipher successive letters.
For example, if the first letter is enciphered with the first
alphabet, the second letter with the second alphabet, and so on,
the word secret would be enciphered as SFEUIY.
TECHNICAL ASPECTS OF CRYPTOLOGY
Cryptology is divided into two general fields, cryptography and
cryptanalysis. Cryptography concerns the methods of converting
plaintext (also known as cleartext) into ciphertext. Ciphertext
messages are called cryptograms. Cryptanalysis concerns the
methods of solving or reading cryptograms without their keys.
Today, experienced and knowledgeable cryptologists agree that a
number of cryptographic systems are unsolvable by analytic
techniques. Cryptographic systems in which a key is used only
once, known as holocryptic systems, can be mathematically proven
to be analytically unsolvable. Other cryptographic systems,
especially those using electrical devices, can often be
completely secure from a practical viewpoint against
cryptanalytic attack. Even so-called paper and pencil systems
can be constructed in which analytic solutions are virtually
impossible. Nonetheless, the most theoretically secure
cryptographic system can be vulnerable to solution if the system
is incorrectly used in some manner or if there is a partial or
complete physical compromise of the system.
Cryptographic systems invented by amateurs or nonexperts will
almost always be either nonpractical or cryptographically weak.
The amateur usually overlooks the problems inherent in electrical
or telegraphic transmission, such as whether messages received
with many erroneous letters, or even with missing letters, can
still be read by recipients. With any new cryptographic system,
it must be assumed that the enemy, or adversary cryptanalyst,
knows everything about the general system. Only specific keys
can be presumed unknown.
Codes
When cryptographic treatment is applied to plaintext elements of
irregular length, the cryptographic system is called a code. The
letters or digits that replace the irregular length plaintext
elements in a code are termed code groups. The plaintext
elements with their accompanying code groups are found in a code
book. If both the plaintext elements and the code groups run
simultaneously in alphabetic or numerical order in the code book,
the code is said to be a one-part code. If, however, the
plaintext elements are in alphabetic order, and the code groups
are not in order, or vice versa, the code is said to be a
two-part code. In a one-part code the same book is used for both
encoding and decoding. In a two-part code, two sections are
required, one for encoding and one for decoding. A two-part code
is normally more secure than a one-part code.
Ciphers
When cryptographic treatment is applied to plaintext elements of
regular length, usually single letters or pairs of letters
(digraphs), the cryptographic system is called a cipher. In a
transposition cipher the plaintext letters are transposed
following a prearranged plan decided upon by the correspondents.
To facilitate transmission, the ciphertext is usually written in
five-letter groups: TIIAR NPSTO CPEHS STASO IINIH R. This kind
of a transposition is a railfence cipher. Transposition ciphers
may use geometrical figures of all types; the rectangle is used
most often. Thus, writing the plaintext normally into a
rectangle, then reading the ciphertext down the columns from left
to right.
The ciphertext is TNXFP NHOAA OCITM TSISH PRIPI ELATH SRENI EAEOS
OR. In a substitution cipher the plaintext letters are replaced
by other, usually different, letters. In the Julius Caesar
cipher the letters follow a normal progression, D for A, E for B,
and so on. If the symmetry is broken and plaintext letters are
replaced by mixed letters, the increased security is apparent.
Such a system is called a monoalphabetic substitution cipher or
simple substitution cipher.
A message may be enciphered with more than one ciphertext
alphabet, using perhaps a cipher square or tableau, such as the
square table of Trithemius. Such a system is called a
polyalphabetic substitution cipher.
Cryptanalysis
Cryptanalysis is the analytic solution of cryptographic systems
without knowledge of the key. Most governments attempt to read
the secret messages of their enemies or potential enemies because
the "reading" of such messages provides a wealth of intelligence
information. Cryptanalytic successes are rarely revealed because
to do so would cause the enemies to change their cryptographic
systems. Perhaps one of the most important cryptanalytic
successes ever revealed was that of the British naval
intelligence, which in early 1917 transmitted to the United
States the text of a German message known as the Zimmermann
telegram. In this message, the German ambassador in Mexico City
was asked to approach the Mexican government with an offer of an
alliance, the reward for which was Mexican possession of Texas,
New Mexico, and Arizona. The Zimmermann telegram was possibly
one of the most significant events leading to U.S. entry into
World War I.
Enigma, the cryptographic machine used by the Germans during
World War II, was broken by means of cryptanalysis. The code
word "Ultra" was used by the Allies to designate information
derived from German secret messages. In addition, the success of
the United States in reading Japanese codes during World War II
helped shorten the war and save American lives.
Cryptanalysis is successful principally because plaintext is not
random. Not only do individual letters and words occur with
definite frequencies, but certain letters and words appear
together with predictable frequencies.
As cryptographic systems become more complicated, however,
sophisticated cryptanalytic techniques are required. Today the
computer's ability to store millions of pieces of information is
both an invaluable aid in cryptanalysis and itself an incentive
to the development of high complex cryptographic systems, because
of the wide range of sensitive information that now exists in
computer databanks and is transmitted through computer networks.
Such data are stored in ciphers so complex that only other
computers can decipher them. Governments, banks, and
manufacturers primarily make use of encryption systems that are
based on the difficulty involved in factoring large numbers, as
compared with the difficulty in finding out whether those numbers
are primes (see PRIME NUMBER). Primes are used in coding systems
by computer networks, which encrypt their data so that only those
authorized users who have the proper "key" can decode the
transmitted information. A "key," which determines the
relationship between the plaintext and the ciphertext, is made up
of a certain number of binary digits, or BITS--the basic units of
digital computer data.
The DES (data encryption standard) system developed by IBM and
approved in 1976 by the U.S. National Bureau of Standards for
governmental use employs a variable 56-bit "key." In DES, which
has been widely adopted commercially, plaintext is converted into
ciphertext by the encrypting operations of substitution and
transposition, repeating the operations several times by means of
special techniques that make the codes particularly hard to
break. DES, however, shares with earlier systems the
vulnerability inherent in a key exchange between a sender and a
receiver. Other new systems, such as the so-called public-key
systems, bypass the problem by making use of both a public
encryption key and a secret decryption key that can be generated
locally by the authorized receiver of the data. The public-key
systems also depend upon large complex numbers for coding.
In 1988 a group of U.S. researchers using hundreds of computers
was able to factor a 100-digit number in just 26 days, a feat
thought to be impossible a decade earlier. The ever-increasing
power of computers and the development of more sophisticated
factoring methods are forcing cryptographers to choose even
larger and more cumbersome numbers on which to base code keys.
Wayne G.
Barker
Bibliography: Barker, Wayne G., Manual of Cryptography (1981);
Danning, Dorothy E., Cryptography and Protection (1982);
Friedman, W. F., Elements of Cryptanalysis (1976); Gardner,
Martin, Codes, Ciphers, and Secret Writing (1984); Kahn, David,
Kahn on Codes (1983); Konheim, A. G., Cryptography: A Primer
(1981); Mayer, Carl, and Matyas, Stephen, Cryptography: New
Dimensions in Computer Security (1982); Meyer, C., and Matyas,
S., Cryptography (1982); Pierce, C. C., Crypto-privacy (1988);
Sinkov, Abraham, Cryptanalysis: A Mathematical Approach (1980);
Winterbotham, F. W., The Ultra Secret (1978); Wolfe, James R.,
Secret Writing: The Craft of the Cryptographer (1970).