Keepers of secrets

11
Keepers of secrets


For centuries, ciphers have been used to preserve secrets. One of the most ancient cipher systems, the information about which is brought to us story, is a wander. It was used by the ancient Greeks in the fifth century BC. In those days, Sparta, supported by Persia, waged war against Athens. Spartan commander Lysander began to suspect the Persians in a double game. He urgently needed true information about their intentions. At the most critical moment of the Persian camp arrived slave-messenger with an official letter. After reading the letter, Lysander demanded a belt from the rider. It turns out that on this belt a true friend (now we would say “secret agent”) Lysandra wrote an encrypted message. Various letters were written in disorder on the belt of the messenger, which did not add up to any words. Moreover, the letters were not written along the belt, but across. Lysander took a wooden cylinder of a certain diameter (wandered), wrapped the belt of the messenger in such a way that the edges of the belt's turns closed, and on the belt a message lined up along the cylinder lined up which he was waiting for. It turned out that the Persians were plotting to inflict an unexpected stab on the back of the Spartans and killed the supporters of Lysander. Having received this message, Lysander unexpectedly and covertly landed near the location of the Persian troops and with a sudden blow defeated them. This is one of the first known case histories in which encryption played a crucial role.



It was a permutation cipher, the ciphertext of which consists of letters of plaintext permuted according to a certain, but not known, extraneous law. The cipher system here is a permutation of the letters, actions are the winding of the belt on the wander. The cipher key is the diameter of the wanderings. It is clear that the sender and recipient of the message must have wanders of the same diameter. This corresponds to the rule that the key during encryption must be known to both the sender and the recipient. Skital is the simplest type of cipher. It is enough to pick up a few wanderings of various diameters, and after winding the belt on one of them would be a clear text. This encryption system was decrypted in ancient times. The belt was wound on a conical wander with a small taper. Where the cross-sectional diameter of the conical skitals is close to the diameter used for encryption, the message is partially read, after which the belt is wound on the wander of the desired diameter.

He used a different type of cipher (replacement cipher) by Julius Caesar, who is even considered the inventor of one of these ciphers. The idea of ​​Caesar's cipher was that on paper (papyrus or parchment) two alphabets of the language are written one under another, in which the message will be written. However, the second alphabet is written under the first with a definite (known only to the sender and the recipient, the shift). For the Caesar cipher, this shift is equal to three positions. Instead of the corresponding letter of the plaintext, which is taken from the first (upper) alphabet, the sign of the lower alphabet under the letter is written in the message (ciphertext). Naturally, now such a cipher system is elementarily opened even by a non-specialist, but at that time Caesar's cipher was considered untransferable.



The Greeks invented a somewhat more complex cipher. They wrote out the alphabet in the form of a table of size 5 x 5, denoted by symbols with rows and columns (ie, they were numbered) and instead of the letter of the plaintext two symbols were written. If these symbols are issued in a message as a single block, then with short messages on one particular table, such a cipher is very resistant even by modern concepts. This idea, which is about two thousand years old, was used in the complex codes of the First World War.

The collapse of the Roman Empire was accompanied by the decline of cryptography. History has not retained any noticeable information about the development and application of cryptography in the early and middle Middle Ages. And only a thousand years later, cryptography is being revived in Europe. The sixteenth century in Italy is a century of intrigue and conspiracy. The Borgia and Medici clans are fighting for political and financial power. In such an atmosphere, ciphers and codes become vital.

In 1518, Abbot Trithemius, a Benedictine monk who lived in Germany, published a book in Latin called “Printing”. It was the first book on the art of secret writing, and soon it was translated into French and German.

In 1556, the doctor and mathematician from Milan Girolamo Cardano published a work describing the encryption system he invented, which went down in history as the Cardano lattices. It is a piece of hard cardboard with holes cut in a random order. Cardano's lattice was the first use of the permutation cipher.



It was considered an absolutely stable cipher even in the second half of the last century, with a sufficiently high level of mathematics development. So, in the novel by Jules Verne "Matias Shandor" dramatic events develop around the cipher letter sent with a pigeon, but accidentally falling into the hands of a political opponent. In order to read this letter, he entered as a servant to the author of the letter in order to find a cipher grid in his house. In the novel, no one has the thought of trying to decrypt a letter without a key, based only on the knowledge of the applied cipher system. By the way, the intercepted letter was in the form of an 6 x 6 alphabetic table, which was a cryptographic blunder. If the same letter were written in a line without spaces and the total number of letters using the addition did not equal 36, the decryptor would still have to test hypotheses about the encryption system used.

You can count the number of encryption options provided by the 6 x 6 Cardano lattice. If you solve the problem "in the forehead" (sort through all possible options and try to read the plaintext), then even checking one option per second and continuously working 24 hours a day, you will have to decipher such a grid for several tens of millions of years! Invention Cardano was extremely tenacious. On its basis, during the Second World War, one of the most resistant naval ciphers of Great Britain was created.

However, to date, methods have been developed that allow, under certain conditions, to decipher such a system fairly quickly.

The disadvantage of this lattice is the need to reliably hide the lattice from outsiders. Although in some cases it is possible to remember the location of the slots and the order in which they are numbered, but experience shows that it is impossible to rely on a person’s memory, especially with rare use of the system. In the novel Mathias Shandor, the transfer of the grid into the hands of the enemy had the most tragic consequences for the author of the letter and for the entire revolutionary organization of which he was a member. Therefore, in some cases, less robust, but simpler encryption systems that are easily recovered from memory may be preferable.

The title of "father of modern cryptography" with the same success could claim two people. This is the Italian Giovanni Battista Porta and the Frenchman Blaise de Vigener.

In the 1565 year, Giovanni Porta, a mathematician from Naples, published a replacement-based cipher system that allowed any plaintext character to be replaced with a cipher-book with eleven different ways. To do this, 11 cipher alpha is taken, each of them is identified by a pair of letters, which determine which alphabet should be used to replace the letter of the plaintext with the cipher alphabet. When using cryptographs Ports, in addition to the presence of 11 alphabets, you also need to have a keyword defining the corresponding code alphabet at each encryption step.

Giovanni Porta table

Usually the ciphertext in the message is written together. On the technical lines of communication, it is usually transmitted in the form of five-digit groups separated by a space of ten groups in a row.

The Ports system has a very high resistance, especially with arbitrary selection and writing of alphabets, even according to modern criteria. But it also has drawbacks: both correspondents must have rather cumbersome tables that must be kept from prying eyes. In addition, you need to somehow agree on a keyword that must also be secret.

These problems were solved by the diplomat Vizhener. In Rome, he became acquainted with the works of Trithemia and Cardano, and in 1585 he published his work The Treatise on Ciphers. Like the Ports method, the Vigenère method is based on a table. The main advantage of the Vigenera method is its simplicity. Like the Ports system, the Vigenere system requires a keyword (or phrase) to encrypt, the letters of which determine by which 26 cipher alphabets each specific letter of the plaintext will be encrypted. The letter of the key text defines the column, i.e. concrete cipherphrase. The letter of the ciphertext is inside the table corresponding to the letter of the plaintext. The Visioner system uses all 26 encryption and is inferior in performance to the Ports system. But the Vigenere table is easily restored from memory before encryption, and then destroyed. The resilience of the system can be enhanced by agreeing not on a key word, but on a long key phrase, then the period of using cipher-alpha will be much more difficult to determine.

Vigenera cipher

All encryption systems until the twentieth century were manual. With a weak ciphering intensity, this was not a drawback. Everything changed with the advent of telegraph and radio. With the increase in the intensity of the exchange of cipher communications via technical communication means, the access of unauthorized persons to the transmitted messages was greatly facilitated. Requirements for the complexity of ciphers, the speed of encryption (decryption) of information have increased dramatically. There was a need to mechanize this work.

After the First World War, the rapid development of the encryption business begins. New cipher systems are being developed, machines are invented to speed up the process of encryption (decryption). The most famous was the Hagelin mechanical cipher. The company for the production of these machines was founded by the Swede Boris Hagelin and still exists. Hagelin was compact, easy to use, and provided high cipher strength. This cipher machine implemented the replacement principle, and the number of cipher-alphabets used exceeded that of the Ports system, and the transition from one cipher-alphabet to another was carried out in a pseudo-random manner.

Machine Hagellin C-48

Technologically, the operation of the machine used the principles of work of automatic machines and mechanical automatic machines. Later, this machine has undergone improvements, both in mathematical and mechanical terms. This significantly increased the system durability and usability. The system was so successful that when switching to computer technology, the principles embodied in Hagelin were modeled electronically.

Another option for implementing the replacement cipher is disk machines, which have been electromechanical since their introduction. The principal encryption device in the car was a set of disks (from 3 to 6 pieces), planted on one axis, but not rigidly, and so that the disks could rotate around the axis independently of one another. The disk had two bases made of bakelite, into which contact terminals were pressed according to the number of letters of the alphabet. In this case, the contacts of one base were electrically internally connected to the contacts of the other base in pairs in an arbitrary way. The output contacts of each disk, with the exception of the latter, are connected through fixed contact plates to the input contacts of the next disk. In addition, each disk has a flange with protrusions and valleys, which together determine the nature of the stepping movement of each disk on each encryption cycle. At each clock cycle, encryption is performed by pulsing the voltage through the input contact of the switching system corresponding to the letter of the plaintext. At the output of the switching system, the voltage appears on the contact, which corresponds to the current letter of the ciphertext. After the implementation of one encryption cycle, the disks are independently rotated one or more steps (at the same time, some disks in each particular step may be completely idle). The law of motion is determined by the configuration of disk flanges and can be considered pseudo-random. These machines were very widely distributed, and the ideas embodied in them were also modeled electronically during the era of electronic computers. The durability of the ciphers produced by such machines was also exceptionally high.



During the Second World War, the Enigma disk machine was used to encrypt Hitler's correspondence with Rommel. One of the cars for a short time fell into the hands of British intelligence. Having made an exact copy of it, the British got the opportunity to decrypt secret correspondence.

This question is relevant: is it possible to create an absolutely strong cipher, i.e. one that would not even open theoretically. Cybernetics father Norbert Wiener stated: “Any sufficiently long piece of ciphertext can always be decrypted, provided that the opponent has enough time for this ... Any cipher can be decrypted, if only it is an urgent need and the information you expect to get is worth it means of effort and time. " If we are talking about a cipher generated in accordance with any precisely and unambiguously determined algorithm, no matter how complicated it is, then this is indeed the case.

However, the American mathematician and information processing specialist Claude Shannon showed that an absolutely strong cipher could be created. At the same time there is no practical difference between an absolutely strong cipher and so-called cipher codes (realized with the help of specially developed complex algorithms). An absolutely strong cipher should be generated and used as follows:

- the cipher is not generated using any algorithm, but completely randomly (throwing a coin, opening a card at random from a well-mixed deck, generating a sequence of random numbers using a random number generator on a noise diode, etc.);

- the length of the ciphertext should not exceed the length of the developed cipher, i.e. A single cipher character must be used to encrypt a single plaintext character.

Naturally, all the conditions for correct handling of ciphers should be fulfilled and, above all, it is impossible to re-encrypt the text with the cipher once used.

Absolutely strong ciphers are used in cases where the absolute impossibility of decrypting the correspondence by the enemy must be guaranteed. In particular, such ciphers are used by illegal agents acting on the territory of the enemy and using cipher block notes. A notepad consists of pages with columns of numbers selected completely randomly and called block cipher.



The encryption methods are different, but one of the easiest is the following. The letters of the alphabet are numbered in two-digit numbers A - 01, B - 02 ... I - 32. Then the message “Ready for meeting” looks like this:

plain text - READY FOR THE MEETING;

open digital text - 0415191503 11 03181917062406;

block cipher - 1123583145 94 37074189752975;

Ciphertext - 1538674646 05 30155096714371.

In this case, the ciphertext is obtained by the significant addition of the open digital text and the block cipher modulo 10 (that is, the transfer unit, if any, is not taken into account). The ciphertext, intended for transmission via technical means of communication, has the form of five-digit groups, in this case it should be: 15386 74648 05301 5509671437 16389 (the last 4 digits are written arbitrarily and are not taken into account). Naturally, it is necessary to notify the recipient which page is used cipher block. This is done in a prearranged place in plain text (numbers). After encryption, the used cipherblock page is pulled out and destroyed. When decrypting the received cryptogram from the ciphertext, the same cipher must be subtracted by the 10 module. Naturally, such a notebook should be kept very well and secretly, since the very fact of its presence if it becomes known to the enemy means failure of the agent.

The arrival of electronic computing devices, especially personal computers, meant a new era in the development of secret writing. Among the many advantages of computer-type devices are the following:

a) extremely high speed of information processing,

b) the ability to quickly enter and encrypt previously prepared text,

c) the possibility of using complex and extremely strong encryption algorithms,

d) good compatibility with modern means of communication,

e) fast text visualization with the possibility of its fast printing or erasing,

e) the possibility to have different encryption programs with access lock on one computer
unauthorized persons using a password system or internal cryptographic protection,

g) universality of encrypted material (i.e., under certain conditions, a computer encryption algorithm can encrypt not only alphanumeric information, but also telephone conversations, photographic documents and video materials).



However, it should be noted that the organization of information security in its development, storage, transmission and processing should follow a systematic approach. There are many possible ways to leak information, and even good cryptographic protection does not guarantee its security, unless other measures are taken to protect it.

Использованная литература:
Adamenko M. Fundamentals of classical cryptology. Secrets of ciphers and codes. M .: DMK press, 2012. C. 67-69, 143, 233-236.
Simon C. The Book of Ciphers. M .: Avanta +, 2009. C. 18-19, 67, 103, 328-329, 361, 425.
Our news channels

Subscribe and stay up to date with the latest news and the most important events of the day.

11 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +8
    23 January 2015 06: 50
    Thanks to the author. Cognitive (but difficult in the morning) feel
    1. 0
      25 January 2015 18: 35
      The lecture is very informative. And very short. It seems that it is intended for a scientific company of cadets-students. Plus - definitely!
  2. +5
    23 January 2015 08: 02
    Very interesting stuff. Thank you for pointing out the literature used. It will be necessary to read.
    1. +6
      23 January 2015 10: 14
      "" In May 1942, the first 29 Navajo Indians arrived at a special base and started developing a code. Their main task was to transmit combat information and orders by telephone and radio. The examinations showed that the Navajos could encrypt, transmit and decrypt a three-line message in English in 20 seconds - 90 times faster than the machines of the time needed.

      The Navajo language was ideal for encryption. Extremely complex, it also had no written language. Nobody has fixed any grammatical rules, or even an elementary alphabet. Therefore, it was almost impossible for a person who did not belong to the Navajo tribe to learn the language.
      http://www.cryptohistory.ru/information/v-kongresse-ssha-nagradili-indejskih-voe
      nnyh-shifrovalshikov /
  3. +4
    23 January 2015 08: 44
    About ciphers well in Hasek's "The Adventures of the Gallant Soldier Schweik" laughing .
    More serious - Umberto Eco "Foucault's Pendulum".
    Thanks to the author, morning exercises for the mind.
  4. +1
    23 January 2015 08: 51
    Try decrypting:

    77-60=17.50 33+02=33,2 08+04+07=1,9.06

    11 people are already thinking, while there is no answer.
  5. +5
    23 January 2015 08: 59
    If you are interested in this topic, you can read about the Soviet Enigma on Wikipedia:
    https://ru.wikipedia.org/wiki/Фиалка_М-125
  6. +3
    23 January 2015 09: 16
    There is a book "Cryptonomicon", there it is written quite interestingly about cryptography, although the book is fictional.
  7. Soldier
    0
    23 January 2015 10: 36
    In this case, the ciphertext is obtained by adding the clear digital text and the block cipher modulo 10 (i.e., the transfer unit, if any, is not taken into account). This is called the geometric addition rule. Greetings to Arzamas and Zagoryanka hi (who walked, will understand) soldier
  8. +2
    23 January 2015 10: 51
    Speaking about the use of computers in cryptography, the author for some reason did not mention a word about RSA - the modern asymmetric public key encryption algorithm.

    PS
    A good popular science book on cryptography: Singh S. "The Book of Ciphers", which tells about the history of encryption from ancient times to the present day. (At the end of the article, she is mentioned in the bibliography, but for some reason, instead of the surname Singh, the author's name is written - Simon).
    1. 0
      23 January 2015 17: 06
      Quote: alebor
      about RSA, a modern asymmetric public key encryption algorithm.

      this RSA nonsense, on a habr there was an article about its vulnerability
  9. +2
    23 January 2015 11: 47
    Informative, but, IMHO, not exactly about "Enigma".
    ".. During the Second World War, the Enigma disk machine was used to encrypt the correspondence between Hitler and Rommel. One of the machines for a short time fell into the hands of British intelligence. By making an exact copy of it, the British were able to decrypt secret correspondence ..."
    The machine itself, without documentation, regulating cipher exchange, was of little use.
    Blair wrote quite a lot about the Enigma in Hitler's Submarine War. Including an episode is described how the commander of one of the boats, during interrogation in captivity, realizing that the intelligence was interested in the machine, mocked the British: "... if I knew that she interests you so much, I would definitely grab it for you ... ". It also claims that Enigma in Germany was on the free market that way until 1938, since it was originally developed to encrypt commercial correspondence.
  10. +2
    24 January 2015 08: 58
    Thank you, informative and very interesting!
  11. 0
    24 January 2015 18: 27
    I recommend the book "Burn after reading". Although artistic, the operation to kidnap a Japanese encryption machine before WW2 is described in detail and how it was used until December 7, 1941.

    I found it here (I have it in paper version) http://modernlib.ru/books/kim_roman/po_prochtenii_szhech/
  12. 0
    25 January 2015 16: 06
    Quite informative article. I read somewhere, I can no longer remember that the British received the Enigma cipher machine at the beginning of the Second World War from the Poles, who, in turn, seized it from the Germans, or in some consulate. or on a captured ship (!!!). However, there is also information that the British themselves captured this machine on a German submarine surrendered to them during the Norwegian operation in 1940. The fact is that at that time the British had a very well prepared and effective radio interception and decryption service. However, it is enough to recall the activities of the famous British Room 40 at the Admiralty, thanks to which, at the end of World War I, the Grand Fleet went out to intercept German ships from the Hoch See Flotte earlier than the Germans went out to sea from Wilhelmshaven or Yade Bay. And for the British, tradition comes first.
    I have the honor.
    1. 0
      25 January 2015 17: 39
      Watch Enigma 2001 movie of the year. About Enigma encryption machine and decryption service. Very reliable. And the material http://www.krasfun.ru/images/2013/11/b4f8f_1383431844_kw-7.jpg
  13. The comment was deleted.
  14. 0
    26 January 2015 04: 33
    Wandering and Caesar almost canonical examples of encryption. Probably everyone who studied programming had laboratory work on this topic.

"Right Sector" (banned in Russia), "Ukrainian Insurgent Army" (UPA) (banned in Russia), ISIS (banned in Russia), "Jabhat Fatah al-Sham" formerly "Jabhat al-Nusra" (banned in Russia) , Taliban (banned in Russia), Al-Qaeda (banned in Russia), Anti-Corruption Foundation (banned in Russia), Navalny Headquarters (banned in Russia), Facebook (banned in Russia), Instagram (banned in Russia), Meta (banned in Russia), Misanthropic Division (banned in Russia), Azov (banned in Russia), Muslim Brotherhood (banned in Russia), Aum Shinrikyo (banned in Russia), AUE (banned in Russia), UNA-UNSO (banned in Russia), Mejlis of the Crimean Tatar people (banned in Russia), Legion “Freedom of Russia” (armed formation, recognized as terrorist in the Russian Federation and banned), Kirill Budanov (included to the Rosfinmonitoring list of terrorists and extremists)

“Non-profit organizations, unregistered public associations or individuals performing the functions of a foreign agent,” as well as media outlets performing the functions of a foreign agent: “Medusa”; "Voice of America"; "Realities"; "Present time"; "Radio Freedom"; Ponomarev Lev; Ponomarev Ilya; Savitskaya; Markelov; Kamalyagin; Apakhonchich; Makarevich; Dud; Gordon; Zhdanov; Medvedev; Fedorov; Mikhail Kasyanov; "Owl"; "Alliance of Doctors"; "RKK" "Levada Center"; "Memorial"; "Voice"; "Person and law"; "Rain"; "Mediazone"; "Deutsche Welle"; QMS "Caucasian Knot"; "Insider"; "New Newspaper"