Cryptography

The History and Mathematics of Codes and Code Breaking

Author: youngar

200 Years of Strength

The first thing The Great Cipher used by Louis XIV did well was not being a monoalphabetic cipher. These ciphers are too susceptible to frequency analysis, making them crackable in a matter of hours at the most. Instead, the Great Cipher is more along the lines of a polyalphabetic cipher. Instead of letters, however, the cipher alphabets are compromised of numbers. But the thing that really makes this cipher a strong one is the fact that these numbers represent single syllables, letters, or even commands instead of just single letters. In doing this, deciphering The Great Cipher would take years.

This cipher took 200 years to decipher due to the odd nature of the cipher. No conventional ciphers substituted numbers for both syllables and letters, as well as having some traps lain within. Due to this, nobody knew how to begin deciphering it. It was only through the efforts of Bazeries that this cipher was eventually cracked. Even so, it took Bazeries 3 whole years to figure out the messages hidden behind the code. He was only able to crack the code as a result of his very out of the box thinking and pure determination. After trying polyalphabetic combinations, which are hard enough to crack on their own due to the pure number of possibilities that exist, and diagraphs, which also took a long time, Bazeries thought to try syllables. It was only after trying many different combinations that he found a single phrase which worked. He then used this word to painstakingly decipher the rest of the text. The pure creativeness of The Great Cipher led to its strength, and the only way it could be decoded was through equal creativity.

A Young Snowden

Whether or not he was willing to accept it, Marcus is the leader, the figurehead of a revolution against his own government. He created a secret network over which he could securely communicate with other defectors and used it to plot against the DHS, eventually getting them removed from San Francisco. As displayed during the scene at VampFest, Marcus garners at least 1,000 followers who trust him enough to partake in the event. These were people who would do anything for him. They idolize him. He embodies what they are fighting for.

 

"'Can I just say,' Nate said, 'can I just say that it is the biggest honor of my entire life to help you? Can I just say that?'

I was blushing now. There was nothing for it. These two were totally starstruck, even though I wasn't any kind of star, not in my own mind at least." (Doctrow 330)

To me, this passage shows how much Marcus means to the average Xnet user. They quite literally worship him, even after he insists time and time again that he is not the leader of any movement. The reason the idea of Marcus heading a revolution against the DHS interests me is because of how impressive it is. Marcus is just a humble 17-year-old high school student. After he was imprisoned by the government, he vows to take them down, to make things right again. All the while, he just views himself as an ordinary part of the machine he created.

I view Marcus as a leader in this novel. Time and time again, I found myself comparing him to the likes of Edward Snowden and others who fought government security agencies. He has no fear, accepting the inevitability of his own downfall.  The way he handles himself in the difficult situations he is put in, the passion for privacy which he displays, and his ability to remain anonymous despite the DHS's best efforts makes him great. I'd say that his followers are justified in viewing him as a hero, considering what he was able to accomplish against such a powerful organization.

A Sacrifice for the Greater Good

In Michael Morris's essay "Mining Student Data Could Save Lives," Morris argues that by allowing universities access to student's online histories, campuses become much safer. In accessing this data, colleges can tell if a student is planning to cause harm to themselves or others and then step in to prevent the student from taking any drastic actions. At one point, universities didn't have the right to access students' private data, but after the Virginia Tech massacre in 2007, schools sought to gain the right to access this information. The Family Educational Rights and Privacy Act (Ferpa) was revised to grant them this access. Morris believes that since universities have access to this information, they should use it to their advantage rather than just ignoring it.

I agree with Morris's argument. I am all for Vanderbilt monitoring our activity to keep us safe. Personally, I have nothing to hide, and even if I were about to do something drastic, I'd want to be stopped before it was too late. Our community and others can only benefit from this type of monitoring. I can understand how some people could be up in arms about the breach of privacy, but it serves the greater good and helps communities become safer than they were before monitoring was implemented.

A False Sense of Security

In saying "The cipher of Mary Queen of Scots clearly demonstrates that a weak encryption can be worse than no encryption at all.", I believe that Singh is implying that in using a cipher, Mary and her recipient felt much safer than if they had used no encryption at all. They believe their message is secure, so they do not feel the need to be discrete in their language. Had they not used any encryption, the content of their messages would not have been nearly as direct as it was with the encryption.
For those who attempt to keep their communication secret through encryption, this statement implies that their encryption method needs to be rather strong if they expect it to be effective at concealing their messages. One cannot hope to use a simple Caesar cipher effectively, as that encryption method is rather weak. It could be cracked by even the lowliest of amateur cryptographers in a small amount of time. The fact that Singh describes the cipher of Mary Queen of Scots, an encryption method that I couldn't hope to begin to comprehend, to be weak implies that for an encryption method to be effective, it must be very complex. This tells me that unless you and your recipient are seasoned cryptographers, you shouldn't bother trying to encrypt your messages, for one could decrypt them with ease. Instead, you should try to use more discrete language and keep in mind that your words could very well fall into the hands of your enemies.

Powered by WordPress & Theme by Anders Norén