## Cryptography

#### Tag: amateur cryptography (Page 1 of 2)

With sophisticated and detailed research on statistics, al-Kindī invented his system of cryptanalysis, later known as the frequency analysis. It’s not surprised that he was considered as the greatest scientist in the ninth century when many disciplines including mathematics, statistics and linguistics that are well developed today were still in their rudimentary stages; thus his research was undoubtedly remarkable. More importantly, the public, especially amateur cryptanalysts were not educated as well as those in today’s education system; few people were likely to have the opportunity to master, or even learn mathematics. Therefore those attempting to decipher encrypted messages had to depend merely on al-Kindī’s approach. However, things have changed.

Today’s schooling system guarantees the educational opportunity for almost everyone to learn basic mathematics and statistics, and to have personal perspectives on languages. As long as we comprehend the linguistic rules, do the math and then go through the process of trial and error, all of us can crack codes in our own ways.

The easy access to various resources and information should not be understated as well. Simply searching ‘cryptography’ on the Internet, even high school students are probably capable of decrypting substitution cipher. For those who want to dedicate more time and truly dive into code breaking, thousands of books will be available if they are willing to reach them. Learning new theories and grasping the nature of any discipline without instructions are no longer the missions impossible; in other words, self-study is relatively more feasible than ever before.

Generally, the simple truth is, we are getting more knowledgeable and everything is getting more accessible. Though code breaking is hard, the actual barrier for amateur cryptanalyst today may be their willingness to reach the resources and their persistence as well as patience when deciphering codes with complex encryption.

During the talk Elonka gave to the class on Friday, I found myself fixating on one thing, Kryptos. I was so surprised by the fact that there was a statue located on the grounds of the CIA, which has an unsolved code written on it. The CIA are supposed to be some of the greatest minds of our time, and they can't solve a cipher that is quite literally sitting right in front of them.

To give a little more information, Kryptos is a large sculpture which contains four codes. Each of these codes was placed onto the sculpture by stamping through the metal, so that the letters are holes in the metal. The four codes were created by Ed Scheidt, who at the time was the Chairman of the CIA Cryptographic Center.  The first three codes have been solved, by the public and from within the CIA, but the fourth remains a mystery.

The connection between Kryptos and our course is fairly obvious. Four encrypted messages, or codes, in a class about codemaking and codebreaking? Sounds like exactly what we're looking for I think. It's also worth mentioning that the first codes use a Vigenere cipher, something that we were discussing in class at the time Elonka came to visit. Vigenere ciphers were the code standard for quite some time, so it doesn't surprise me at all that they were used for a sculpture as famous as Krpytos.

Many famously unsolved codes were solved at a much later time. With this famous code sitting in front of some of the world's best codebreakers, I am sure that Kryptos will soon be cracked. Maybe Elonka will be the one to solve Kryptos, or maybe even one of the students of our course.

Here's a link to her Kryptos page: http://elonka.com/kryptos/

When the frequency analysis first emerged as a tool to decrypt substitution cyphers, it was the epitome of modern technology at the time.  Under the growing Islamic rule of the Arab nations there was, for the first time in history, the opportunity for the collection of mass amounts of diverse knowledge in one place and one time. Revolutionary at the time, in modern society this same concept of data collection is relatively commonplace. Worldwide schooling systems teach the basics of linguistics, mathematics, and statistics to children from young ages, giving them the platform upon which it is easier to compute the complicated nature of cryptography. Even more recently, information of all types has become increasingly available to any who have access to the internet. A place for data collection and collaboration of thought like no where else, the internet has revolutionized cryptography once again. No longer is a formal education entirely necessary to access the tools needed to decipher codes. One can simply study complex theories of statistical analysis taught to them through Yahoo Answers, or watch explanations of multivariable calculus on YouTube. While information is still being gathered, just as it was in ancient Arab nations, it is no longer limited to a single society, or even to formal education. There is no reason to say that the modern codebreaker is somehow inherently more adept at decryption; rather the skills which are needed to decrypt are accessible without advanced study.  Thanks to the internet, the only requirement in cryptography is the desire to seek out the tools necessary to decrypt.

It is not surprising that using frequency analysis to solve substitution required a sophisticated level of scholarship in the 9th century. It might take decades of textual study, statistics knowledge and mathematical insights for the Arabian cryptanalysts to successfully find this method. In The Code Book, Singh also suggests that the Muslim civilization provided an ideal cradle because “every Muslim is obliged to pursue knowledge in all its forms” and the scholars “had the time, money and materials required to fulfill their duty.” (Singh 16)

Today’s amateur cryptanalysts seem to still fulfill these “requirements”. Nowadays people with only a few years of education would already have certain level of knowledge in such fields. The resources are so accessible now that they no longer need to be“scholars” but indeed anyone with any intention or interest about cryptography. Undoubtedly only a small amount of people will be trained as professional cryptanalysts, but it’s incredibly easy for anyone to search about cryptography, share thoughts with others about the ciphers they write, or take an online cryptography course.

Today’s generation is a group of people that are taught to solve puzzles when little and raised with films or literature talking about cryptography often in one form or another. With the emerging technologies in hand and a broad access to the subject, people nowadays have entirely new perspective on cryptography. On the other hand, people back in time were strictly limited by the resources they had and the little exposure to the knowledge. Politics might also come into play since a large proportion of citizens interested in inventing or breaking codes might not be the best interest of a monarchical government at that time.

I believe that, while a high level of scholarship was required to develop the frequency analysis approach, it is not critical to the use of this approach. When the world was new to this subject--when it had just discovered ciphers and keys and cryptanalysis--all of the knowledge was completely new. It was the cutting edge, so not many people understood it yet. It was essential to attain a high level of education to comprehend the mysteries of cryptology. However, with the modern education system, and modern technology, people have the information necessary more readily available. People can access the "mathematics, statistics, and linguistics" necessary to equip themselves for code making and codebreaking. Also, the easy access means that the information surrounds the human population. We have billions of pieces of data sitting at our fingertips, just waiting in that ever-present "cloud." Because of this access, and as a result of the heightened academic expectations, "amateur" cryptanalysts can use previously lengthy and difficult methods of analysis with much more ease. The civilization has reached a "sufficiently sophisticated level of scholarship in several disciplines," and therefore the people of that civilization may achieve the same accomplishments which the Islamic civilization discovered. However, as a result of the constant inundation of information prevalent in our society, and the resultant size of the body of common knowledge, amateur cryptanalysts can now use approaches such as frequency analysis, which was so arduously sought out, without any formal training.

Information is at a premium in the 21st century. Any person of any age can discover the necessary information in seconds with the click of a button. Throughout history, as technology evolved, cryptanalysis became progressively simpler. The sophisticated level of mathematics, statistics, and linguistics required to be a good frequency analyst became more accessible with the evolution of the internet. It is so simple now for an amateur cryptanalyst to use an application such as Microsoft Word to count the frequency of each character in a ciphertext and to use Google Translate to help decrypt a message in a different language. Amateur cryptanalysts have so many useful tools to help them find shortcuts in almost any decryption methods. Codebreakers no longer have to work long, tedious hours just to verify that their theories are correct. Decryption methods that took the mathematicians days to work on now take hours, which gives amateur cryptanalysts much more time to test different theories. Now, as the new age of codebreakers begins to perfect frequency analysis which has been around for centuries, they can go forward and discover completely new ways to analyze encrypted messages. As technology evolves, so will cryptanalysis because the accessibility of information will get more efficient.

Each an art form of its own, cryptanalysis and cryptography demonstrate opposing counterparts focused on accomplishing the same common goal—the understanding of a hidden message. These two techniques highlight the competitive battle between codemakers and codebreakers. Although cryptography requires a distinct level of skill and secrecy, the practice of cryptanalysis encounters even greater obstacles as the codebreaker must determine the meaning of the hidden message as well as the technique necessary to break it. Arguably, the mastery of one skill can lead to an expertise in the other as the making of a complex cipher derives the further logic and creativity necessary to uncover these intricate codes.

Singh cites the frequency analysis technique as an “innocuous observation” by Muslim cryptanalysts that became “the first great breakthrough in cryptanalysis” (17). Nowadays, this code-breaking method is quickly and easily used by first-time cryptanalysts with no previous instruction, almost as if by second nature. While the frequency analysis technique was undoubtedly a major breakthrough in the seventh century, the vast amount of education and technology provided to our society today allows this method to become an obvious first step towards discovering the unknown.

As time has gone on and technology has expanded, the human mind has reached a common intelligence almost unimaginable even one hundred short years ago. Education has taught us to not only focus on how to put things together, but also on how to take them apart. Practices such as cryptanalysis have become more applicable to the average man as common knowledge typically requires an understanding of both how and why things work. The fifteenth century Western world is a prime example of the human tendency to discover how something functions as immediately after cryptography was introduced “already there were individuals attempting to destroy this security” (27).

While in the past cryptanalysis was labeled as an expertise only accessible to those in higher society with the finest education, its ability to be understood by even the most amateur cryptanalyst emphasizes the incredible expansion of knowledge in our society today.

In a world enveloped by constant communication and endless data transfer, the necessity for privacy remains a top priority. With the aid of cryptography, society hopes to maintain secrecy in various interests, ranging from personal matters to governmental espionage. Yet how secure can we ever truly become?

As human civilizations advanced, the intricacies of cryptography drastically changed over time. New solutions resulted in the drive to develop more difficult codes. When discussing cryptography, one must also closely analyze the circumstances surrounding a particular time period. Cryptanalysis methods and current information in one period can quickly become obsolete in only a few decades. Historical events may also cause rapid advances, such as in the Islamic golden age, or slowed progress, such as during the dark ages in Europe.

In The Code Book, Simon Singh notes that "Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics" (Singh 15). Despite this, amateur cryptanalysts today can easily begin deciphering messages thought impervious in previous times. This can make Singh's statement seem contradictory, as these individuals develop the same approach as previous crpytanalysts without being taught.

However, Singh's statement still remains true. Today's individuals enter the world surrounded by a highly sophisticated society, much different than that of the previous societies. Many factors can influence the intellectual capacity of these amateurs, such as income level, access to necessities, or even parental support. Yet one thing remains certain - today's amateurs prove much more equipped to tackle these difficult ciphers than the best of the ancient world. While young students in previous centuries worried immensely over the seemingly constant political warfare, risk of being drafted into the army, or strong possibility of suffering from diseases, today's cryptanalysts can focus their minds strictly on their studies. Thus, despite never having learned about cryptography, the mere rigor and new advances of modern education and technology equips these individuals to quickly process and develop possible solutions to decipher these codes.

In the prologue of The Code Book, Singh introduced the “evolution of codes” and explained how codes are becoming more impactful in today’s society (Singh xiv). From encrypting simple user passcodes to concealing entire online databases, cryptographic methods are evidently becoming more and more widespread.

Along with the evolution of codes, we can also see an explosive evolution in technology and similarly in the media, which is one of the vital reasons why so many people, despite their lack of training in cryptanalysis, are able to utilize frequency analysis to solve substitution ciphers. For example, the many online resources that teach people about cryptography are easily more accessible today than they were decades ago.

Furthermore, considering the long history of cryptography, it is no surprise that methods of substitution cyphers, especially those that are elementary, are made public and passed on from generation to generation, and thus has become common knowledge to even the amateur cryptanalyst. Take The Code Book itself as an example; anyone who reads the book is exposed to, at the very least, the most basic frequency analysis approach in solving substitution cyphers. They can even be completely oblivious to what cryptography was before reading the book, but by simply comprehending the first chapter, the person has enough knowledge to create and solve simple substitution ciphers. Of course, the degree to how complex the ciphers they’ve created or can solve is probably not as high as what an expert cryptanalyst can achieve.

Nonetheless, the technology today allows even amateurs to be able to solve substitution ciphers despite their lack of a “sufficiently sophisticated level of scholarship” (Singh 15).

The continuous tug-of-war between cryptographers and cryptanalysts has triggered the expansion and prominence of cryptography in the world today. Just as quickly as new encryption methods are developed, new decryption strategies are implemented, creating a state of equilibrium in cryptography.

The art of secret writing dates back to Herodotus (Singh 3) and has had various uses in history, including military communication and murder plots. In more recent years, the explosion of technology has propelled the expansion and necessity of cryptography to the point where it has an effect, either direct or indirect, on every individual. Cryptography has a range of important functions, such as keeping bank account information private and ensuring that government information is kept secret.

Cryptanalysis was not invented until the Islamic golden age under the Abbasid caliphate (Singh 14). According to Singh, cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics (15). The Muslim civilization provided an ideal cradle for cryptanalysis because the Muslims were educated in a variety of fields and pursued knowledge in all of its forms (Singh 15).

This breadth of knowledge associated with the Muslim civilization is valued in most modern society today. Most individuals are at least somewhat proficient in an assortment of disciplines. Primary education sets the field by educating children about a variety of different subjects in order to equip them with a large intellectual toolset. Many secondary education institutions stress a liberal education in which students obtain an educational background in the humanities as well as the math and science fields.

Because of this, it is no longer necessary to undergo formal education in cryptanalysis in order to use elementary strategies such as frequency analysis. With the broad education that modern citizens receive, combined with the availability of abundant resources, especially those on the Internet, many of the older, simpler codes can be decrypted by the layperson. However, modern encryptions are much more complex than those of the past and may require serious study.

During the past few centuries, cryptography has exploded due to the expansion of technology. Cryptography affects numerous fields ranging from government information to banking, and brings in knowledge from a variety of areas including mathematics, logic, linguistics, and statistics. Modern education allows us to engage in the world of cryptography even as the complexity and number of cryptographic techniques increase exponentially.

Page 1 of 2