Thursday, July 2, 2015

Ciphers

The earliest evidence we have of the use of cryptography dates back to around 1900 BC in a tomb in Egypt.  While many tombs had hieroglyphics written on the walls, this particular tomb used very unusual symbols in the place of those that are well known.  It is believed that the author was not trying to hide the message, rather project high status.  
Classic works from early civilizations describe espionage service,s particularly in India, where spies were given encrypted assignments.
It is presumed that the Egyptians as early as 1900 BC used cryptography in hieroglyphic writings to hide the meaning of a message.  The Greeks used a methods which involved a hexagonal prism shaped stick, called a scytale, wrapped in tape to write a message that, when unwound, had no meaning.  The recipient of the message would decrypt the message by re-wrapping the message around an identical scytale to read the message.  
Greek Scytale used to encrypt and decrypt messages.
Around 100 BC, Julius Caesar used encrypted messages to army generals during war times, giving us the most famous,  and uniquely named, substitution cipher, the Caesar Cipher.

A cipher is a secret way of sending a message by disguising the characters of your message with a code.
Substitution ciphers encrypt secret messages by switching one character for another.  For example, if a cipher was shifted by 4, the letter "A" would become "E" since it is 4 characters past "A" in the alphabet.  See the examples below:
Image result for caesar cipher
The cipher above has been shifted by 2.  So, If you wanted to say "HELLO", you would write "JGNNQ"

Image result for caesar cipher
This cipher split the alphabet so that each letter corresponds to another letter in the alphabet.
There are many more ways to create the key for a substitution cipher.
Decryption of a substitution cipher requires both the sending and receiving party to have a copy of the key.  Here in lies the problem.  Most keys throughout history have been compromised as a result of stolen keys.  In order to decrypt the message, you need to be told or given a copy of the key.  This leaves a lot of space for eaves droppers to overhear the key or physical copies left along for only a few moments can be taken by a thief.
Many people, have been able to crack the code by studying the encrypted message and looking for repeated characters.  Often the most common symbols substitute a space between words or most frequently used letters (think Wheel of Fortune's RSTLNE).  The ability to keep or crack codes have greatly altered the outcomes of wars, thus changing the course of history.
Try cracking theses Caesar Ciphers by examining repeated symbols. This applet only works when opened in Modzilla FireFox.  Warning:  Your computer must have Java installed.

Looking for something more challenging?  Check out this applet on Substitution Ciphers.  Can you crack these codes?  This applet only works when opened in Modzilla FireFox.  Warning:  Your computer must have Java installed.
Sources:                                                                            https://securityblog.redhat.com/2013/08/14/a-brief-history-of-cryptography/  http://www.studentpulse.com/articles/41/a-brief-history-of-cryptography 

No comments:

Super Secret Secret Agents - 33

Super Secret Secret Agents- 33 Authentication : The Alices sent all of the important information on the document, but only after the Bo...