View a Sample Chapter

1
Ancient Roots*
Secrets are the very root of cool.
—William Gibson, Spook Country
op
C
h
ig
yr
1.1 Caveman
aveman Crypto
d
te
Various records from cultures before that of classical Greece are sometimes
included in texts as examples of cryptography, but the term must be used
loosely, as the methods are extremely primitive. How far back one looks for
the origins of cryptology depends on how far one is willing to stretch defini
definitions. Most authors would agree that Henry E. Langen went back a bit too far
in his Cryptanalytics—A Course in Cryptography:
Cryptography
ia
er
at
M
l-
Early cavemen may have developed a system of secret oral grunts or
mimetic signs to convey messages to one another.
Ta
Female
55–Antu
45–Ninlil
35–Ninki
25–Ningal
15–Inanna/Ishtar
5–Ninhursag
&
ci
an
Fr
s
Male
60–Anu
50–Enlil
40–Ea/Enki
30–Nanna/Sin
20–Utu/Shamash
10–Ishkur/Adad
or
yl
We shall be content to begin in ancient Sumer with an example of “protocryptography.” The Sumerians recognized many gods, but only 12 were part
of the “Great Circle.” Six of these were male and six female.
The number paired with the name of the god was sometimes used instead
of the name;† thus, we have a substitution cipher. In general, though, as
explained in the Introduction, when entire words or names are swapped out
for numbers or letters, we refer to that as a code rather than a cipher.
*
†
A link leading to exercises for this chapter may be found at http://www.crcpress.com/
product/isbn/9781466561861.
Röllig, Werner, and Götterzahlen, in Ebeling, E. and Meissner, B., Eds., Reallexikon der
Assyriologie und Vorderasiatischen Archäologie, Vol. 3, Walter de Gruyter & Co., Berlin, 1971,
pp. 499–500.
3
4
Secret History: The Story of Cryptology
op
C
h
ig
yr
Figure 1.1
A skytale reveals a message.
d
te
It seems that every culture that develops writing (which itself offers some
secrecy if nearly everyone is illiterate) develops cryptography soon thereaf
thereafter. Although many more examples could be included, we now move on to
the ancient Greeks’ use of cryptography.
l-
ia
er
at
M
or
yl
1.2.1 Skytale Cipher
Ta
1.2 Greek Cryptography
&
The skytale (pronounced to rhyme with “Italy”), shown in Figure 1.1, was
used in 404 B.C. by the Spartans. The message sent to Lysander warned of a
planned attack by Pharnabazus of Persia.* This warning provided Lysander
with sufficient time to prepare a successful defense.
Although this historical example has been recounted by many authors, a
dissenting view has been offered by Thomas Kelly, a professor of Greek histohisto
ry.† Kelly examined the earliest extant appearances of the word “skytale” and
concluded that it merely stood for “either a plaintext message or a device for
keeping records.” He claimed that later usage indicating a device for enciphering was a misinterpretation and that the skytale never had such a purpose.
In any case, the idea is to wrap a strip of paper‡ around a staff and then
write the message out in rows aligned with the staff. When the paper is
taken off the staff, the order of the letters changes. This is a transposition
cipher (the letters are not changed, only their order, in contrast to a substitution cipher). Anyone with a staff of diameter equal to the original can recover
ci
an
Fr
s
*
†
‡
Singh, S., The Code Book, Doubleday, New York, 1999, p. 9.
Kelly, T., The myth of the skytale, Cryptologia, 22(3), 244–260, 1998.
The Greeks reportedly used a leather strip, sometimes disguised as a belt.
5
Ancient Roots
Figure 1.2
American Cryptogram Association logo (www.cryptogram.org/).
op
C
the message. An alternate spelling of this simple device is “scytale.” These
variations are natural when one considers that the word is of Greek origin.
The original is σκυταλε. The American Cryptogram Association (which celebrated its 80th anniversary in 2010) uses a skytale in their logo (Figure 1.2).
It has been conjectured that the skytale marks the origin of the commander’s
baton, which became purely symbolic.
h
ig
yr
1.2.2 Polybius
olybius Cipher
d
te
Another example of Greek cryptography is the Polybius cipher.* This cipher
has the disadvantage of doubling the length of the message.
M
2
4
5
1
at
3
A
B
C
D
E
2
F
G
H
I&J
K
ia
er
1
M
R
5
V
W
N
O
P
S
T
U
Y
Z
X
or
yl
Ta
L
Q
l-
3
4
&
In the Polybius cipher, each letter is replaced by the position in which it
appears in the square, using first the row number and then the column num
number. An example is
Fr
ci
an
T H I S I S E A S Y T O B R E A K
44 23 24 43 24 43 15 11 43 54 44 34 12 42 15 11 25
s
This system was originally intended for signaling over long distances. To
send the first letter, T, one would hold 4 torches in the right hand and 4 in
the left. To send the next letter, H, one would hold 2 torches in the right hand
and 3 in the left. We will see how to break such a cipher in Chapter 2. It’s a
special case of a general class of ciphers known as monoalphabetic substitution
ciphers, where a given letter is always substituted for with the same symbol
wherever it appears.
The five-by-five square forced us to combine I and J as 24. The Greeks,
using a smaller alphabet, did not have this inconvenience. For us, though,
decipherment is not unique, but context should make clear which choice is
*
Polybius wrote about this system in Chapter 46 of his tenth book of history, circa 170 BC.
6
Secret History: The Story of Cryptology
correct. Of course, we could use a six-by-six square, which would allow for
26 letters and 10 digits. Alternatively, numbers can be spelled out. A six-bysix square would be used for languages written in the Cyrillic alphabet. The
Hawaiian alphabet, on the other hand, contains only 12 letters: 5 vowels (a, e,
i, o, u) and 7 consonants (h, k, l, m, n, p, w). Thus, for the Hawaiian alphabet,
a four-by-four square would suffice.
The Polybius square is sometimes called a Polybius checkerboard. The letters may be placed in the square in any order; for example, the keyword
DERANGEMENT could be used to rearrange the letters like so:
op
C
2
3
4
5
1
D
E
R
A
N
2
G
M
T
B
C
3
F
H
I&J
K
L
O
P
Q
S
U
d
h
ig
yr
1
W
X
Y
Z
te
4
5
V
M
l-
ia
er
at
Observe that repeated letters of the keyword are left out when they reappear.
Once the keyword is used up, the remaining letters of the alphabet are filled
in the square.
The term derangement has a technical meaning, in that it refers to a reor
reordering where no object occupies its original position. Thus, the scrambling
provided above is not a derangement, since the letters U, V, W, X, Y, and Z are
left in their original locations.
or
yl
Ta
&
an
Fr
1.3 Viking Cryptography
ci
Markings on the Swedish Rotbrunna stone, shown in Figure 1.3, may appear
meaningless, but they are actually an example of Viking cryptography. If
we note the numbers of long strokes and short strokes in each group, we get
the numbers 2, 4, 2, 3, 3, 5, 2, 3, 3, 6, 3, 5. Pairing these numbers gives us 24,
23, 35, 23, 36, 35. Now consider Figure 1.4. The Vikings used diagrams like
these to translate the numbers to runes; for example, 24 indicates the second
s
Figure 1.3
Example of Viking cryptography. (Redrawn from Franksen, O.I., Mr. Babbage’s Secret: The Tale of
a Cypher—and APL, Prentice Hall, Englewood Cliffs, NJ, 1984.)
7
Ancient Roots
member
1
2
3
4
5
6
7
8
f
u
(th)
a
r
k
g
w
2
member
3
4
5
6
f
u
(th)
a
r
k
h
n
i
a
s
t
b
m
l
R
1
1
aeht
1
2
h
n
i
j
p
E
R
aeht
s
2
3
3
t
b
e
m
l
(ng)
o
d
op
C
h
ig
yr
Figure 1.4
Examples of Pre-Viking (left) and Viking (right) cryptography.
d
te
row and fourth column. In the diagram on the left, this gives the rune for J.
Thus, this encryption system was essentially a Polybius cipher. This is just
one of the Viking systems; there are others. Secrecy must have been impor
important for these people from the beginning, for the word rune means “secret”
in Anglo-Saxon.
l-
ia
er
at
M
Ta
1.4 Early Steganography
or
yl
The Greeks also made use of steganography. In 480 BC, they received advance
warning of an attack by the Persians launched by King Xerxes. Herodotus
explained how this was achieved:*
&
ci
an
Fr
As the danger of discovery was great, there was only one way in which
he could contrive to get the message through: this was by scraping the
wax off a pair of wooden folding tablets, writing on the wood under
underneath what Xerxes intended to do, and then covering the message over
with wax again. In this way the tablets, being apparently blank, would
cause no trouble with the guards along the road. When the message
reached its destination, no one was able to guess the secret until, as I
understand, Cleomenes’ daughter Gorgo, who was the wife of Leonidas,
discovered it and told the others that, if they scraped the wax off, they
would find something written on the wood underneath. This was done;
the message was revealed and read, and afterwards passed on to the
other Greeks.
s
The warning, combined with the efforts of 300 Spartans who held off
the Persians for three days, allowed time to prepare a successful defense.
Leonidas was among those who died trying to gain the time necessary for
*
Herodotus, The Histories, Book 7: Polymnia, Section 239.
8
Secret History: The Story of Cryptology
op
C
the Greeks to build a stronger defense. Without the advance warning given
in this instance (or for the later attack, mentioned previously, where the
skytale was used to convey a warning), it’s conceivable that a lack of preparation could have led to a victory for Persia, in which case there would have
been no “cradle of Western civilization.”
Another steganographic trick was carried out by Histaieus. In 499 BC,
he had a slave’s head shaved for the purpose of tattooing a message on it
encouraging Aristagoras of Miletus to revolt against the Persian king. When
the slave’s hair grew back, concealing the message, the slave was dispatched
with instructions to tell the intended recipient to shave his head. This is not
a good method, though, if time is of the essence or if the message is long and
the slave’s head small!*
d
te
h
ig
yr
M
References and Further Reading
ia
er
at
Balliett, B., Chasing Vermeer,, Scholastic Press, New York, 2004. This is a young adult/
children’s novel that incorporates a Polybius cipher that mixes letters and num
numbers by using the following (non-square) rectangle for enciphering:
2
3
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or
yl
Ta
&
ci
an
Fr
s
A
B
C
D
E
F
G
H
I
J
K
L
l-
1
F
I
L
N
P
T
U
V
W
X
Y
Z
Thus, HELLO would become V1 P1 Z1 Z1 L2. The book promotes free thinking
and exploration in the spirit of Charles Fort, who is quoted at various points.
Bellovin, S.M., Compression, Correction, Confidentiality, and Comprehension: A Modern
Look at Commercial Telegraph Codes, Department of Computer Science, Columbia
University, NY, 2009 (http://www.usenix.org/events/sec09/tech/slides/bellovin.pdf). This PowerPoint® presentation on commercial code books provides
many entertaining examples, such as this excerpt from The Theatrical Cipher Code
(1905):
*
Herodotus, The Histories, Book 5: Terpsichore, Section 35.