Cryptography

The History and Mathematics of Codes and Code Breaking

Author: kims46

Old Man Yells at Cloud

“In her New York Magazine article describing people’s willingness to express themselves publicly, Emily Nussbaum articulated a concern about youth that is widespread: “Kids today. They have no sense of shame. They have no sense of privacy. They are show-offs, fame whores, pornographic little loons who post their diaries, their phone numbers, their stupid poetry—for God’s sake, their dirty photos!—online.”” (pg. 55-56)

As it happens with every generation to the next, adults are constantly criticizing the younger generations and rejecting the advancements that come with them. Popular culture is constantly demonized in a way that can redistribute the blame for modern problems in our society – whether or not they are actually authentic. Regardless of why this is, perhaps because of a reluctance to change and to technology, or because of greater political implications, this attitude will always have real consequences in the ways youth navigate their daily lives. The privacy of teenagers is chronically under an inspective microscope while teenagers are simultaneously under fire for “not respecting privacy”: a little hypocritical, isn’t it? As the author discusses further into the chapter, what is shared on social media is selectively chosen by the user. And as intuitive as this concept should already be, it seems that people expect “privacy” to be a strict definition and expression for every individual. The value my privacy is not what someone else deems it to be, it is what I deem it to be. What I choose not to share with others – that is my “private” life. And because social media is a powerful medium for teenagers to choose who understands what, who reads what, who sees what, they are able to comfortably navigate the perhaps intricate stratification that exists within the very idea of privacy.

Progression is Activism

Although at first I was a little miffed about the idea of reading an entire novel over break, but it was actually a pretty relaxing read and some points the author made were really thought provoking. Sometimes I felt he was trying to be too hip – I suppose this is a common occurrence in a lot of teen fiction – every time I read “total horn-dog” I was thinking, “what?” But that’s neither here nor there. There were a number of quotes that I really thought about, like when Marcus was arguing for the absolute protection of the Bill of Rights, and the total non-professionalism some of the authority figures in the book seemed to exude, but Marcus also pointed out something very important. “I can’t go underground for a year, ten years, my whole life, waiting for freedom to be handed to me. Freedom is something you have to take for yourself.” Inspiring, isn’t it?

Truly, nothing will be accomplished by passivity. The constant activism and solving problems is what propels movements forward – awareness will get something started, but there must be steps taken beyond that. Cryptography is similarly a constantly evolving subject, requiring analysis that is always considering different options and perspectives. It couldn’t progress so efficiently if cryptanalysts were always waiting for other cryptanalysts to decipher notes themselves – and in many cases, that’s exactly what they don’t want to happen.

German Cryptography is still Human Cryptography

During WWII, Germans sent out thousands of messages encrypted using the supposedly unbreakable Enigma machine. It was discovered after the war that German intelligence knew that these messages could be captured by the Allies, but they could not think anyone would have the time or resources to possibly decipher them. This strongly held idea that Enigma was unbreakable was perhaps the greatest mistake of Germany.

Another factor, besides German overconfidence, that allowed the Allies to decipher German messages were the patterns discovered when Enigma was used. These patterns were precisely the result of non-randomness that describes human nature. Some keys were easily guessed because the letters on the Enigma keyboard were next to each other. Other keys may have been similarly predictable because they resembled German names, or they were used repeatedly. These were called “cillies.” Ironically, an effort to consciously combat human un-randomness was also a mistake on Germany’s part. By avoiding “obvious” plugboard settings and arranging rotors to avoid repeated positions, the amount of possible settings were drastically reduced.

Human nature in and of itself is never truly random; this is a basic fact we learn in our statistics classes. If you asked a population to randomly choose a number between 1 and 4, would a fourth of the people choose each of the numbers? Polls have shown that, instead, a clear majority would choose the number 3. In the same manner, cipher keys are not always a random garble of letters. They are often derived from meaningful words or phrases that may be pertinent to the message or the receiver/sender of the message.

The Moral Question: Does Intention Matter?

Trade-offs between decisions that secure immediate safety versus the “overall good” – whether that means a quicker end to war, more net lives saved, keeping the upper hand – are often made during wars. They’re made in our everyday lives as well, though, of course, the consequences of choosing between those two options are on a much less significant scale. I thought reading about the deliberate withholding of the Zimmerman Note from Wilson was very interesting, as it was the first time I was exposed to this information. It didn’t particularly incite a strong reaction from me, however, in the sense that I felt very pro- or against the decision Admiral Hall made.

At the same time, someone might argue that it was based on similar principles as those during the bombing of Nagasaki and Hiroshima, an event that I do have a strong opinion on. In order to end the war quickly, thus the “greater good” aspect of it, America decided to end 129,000–246,000+ innocent lives in Japan. While this death toll was not pre-estimated nor maliciously and intentionally predicted by any means, the result is still reality.

This differs from the Zimmerman event in that rather than deliberately taking lives, Hall put at risk the potential of danger from unrestricted U-boat warfare. I think the argument that his decision was reasonable can easily be made by stating that the reality of the situation was that the United States kept an upper hand and many lives were saved. It seems that the consequence was favorable. Taking that into mind, both these decisions – regarding the bombing and the Zimmerman note information – are probably considered ethical or reasonable almost overwhelmingly by looking at the result, rather than by looking at the initial intentions. If we looked at intentions, then both cases would un-controversially be deemed fair, which is clearly not true.

So by mulling over this event where we are in 2015, I too would most likely say (perhaps hypocritically, since I don’t support the bombing decisions) that Hall made a logical decision to withhold the information he was keeping. Even knowing to consider his intentions, it is simply impossible not to look at the result when we’re peering into the past from almost a hundred years into the future.

The Trade-Off of Privacy for Security

I am thinking the scenario in which is presented by Michael Morris’s essay stands analogous to many trade-offs both relevant and not to internet privacy. This particular situation of proposed student surveillance is, however, of direct interest to us who would be affected first-hand by such policies (were they implemented). Interestingly, my initial reaction to this essay was one of disagreement and a bit of confusion. I was surprised that this sentiment seemed to be backed by many of the comments posted on this page in reaction, as well as many notes that existing attempts at data mining has proved to spit out many false positives, and on rare occasion, a useful prediction. I would love to further study these examples. This essay also introduced to me the notion that as a country, we could address these disturbingly frequent school shootings by this method of compromising internet privacy rather than the more headline ideas of gun control or mental health management. I hope that while I write my own essay, I can ponder the practicality and the ethics of mining student data if it were to be integrated into university policy across the nation.

A Developing Familiarity Throughout History

Fundamental development in the disciplinary topics of mathematics, statistics, and linguistics was procured from a comparative ground-level hundreds of years ago as opposed to what we have unearthed today. The advantages and resources currently available to the vast public are, of course, the most they have ever been in history. This goes without saying. “Discovering” tactics to break codes and ciphers that were once considered the most advanced techniques by exceptional cryptanalysts is certainly not as easy a task without the long history of code breaking (in the colloquial meaning of the term) that had come before us.

The ability to learn methods such as frequency analysis from a quick Google search is much less arduous a task than inventing them without any previous notion of such a possibility. Even assuming that today’s amateur cryptanalysts aren’t explicitly searching “how to’s” from public databases, the idea of frequency analysis and any analogous general form of use is very comfortable and familiar. Perhaps teachers from grade school distributed puzzles aimed to unscramble words and phrases or your classmate used a simple cipher as a way to ask out their prom date. Experiencing or seeing a number of similar events throughout our lives inevitably ingrains the technique somewhere in the back of our minds, at least implicitly.

Noting the above, it is truly incredible to acknowledge how commonplace once incredible and cutting-edge discoveries are considered in the present day. This will always be observed, even beyond subjects regarding cryptography, as a natural progression of time.

Powered by WordPress & Theme by Anders Norén