Cryptography

The History and Mathematics of Codes and Code Breaking

Category: Uncategorized Page 2 of 9

Math and Codes

There were many mathematical concepts related to modern cryptography introduced in this chapter. One topic I was familiar with already was the use of binary digits and modular arithmetic because we had learned about them in class. However, I was not aware of modular arithmetic prior to taking this course and I had only the most basic understanding of binary numbers. I still do not have much knowledge on either topic beyond an elementary level. For example, I was confused by the idea of the Y^x (mod P) function. I do not really understand how it works and how it relates to encryption and communication. I am not sure if this speaks to Singh’s ability (or lack of ability) to explain technical mathematical topics, or my ability (or lack of ability) to understand technical mathematical topics through words rather than examples and someone showing me how they work.

I was also confused about the concept of the mangler function as what the mangler function is exactly was never elaborated upon in the chapter. However, this might be because the function is too complicated or complex for the average individual to understand, so Singh didn’t even bother trying to break it down. I think Singh does a so-so job explaining the more technical sides to cryptography throughout his book, not just this chapter. Some explanations make sense, such as in the first chapter when he introduces the different types of historical ciphers. Others have me completely lost, such as his explanation for how the enigma machine functions. (I still don’t understand how it works!) I understand it is very difficult to explain such advanced and complex concepts to people with no knowledge on the topic, and this will be important to keep in mind when explaining how our cipher works for our podcasts.

With an advance in technology, the use of computers for encryption technology wasn’t just limited to the military and government. Increasingly, civilian businesses began using encryption and cryptography to encode their messages. In an attempt to standardize encryption across the United States, the National Bureau of Standards looked to Lucifer. This encryption system developed at IBM was so strong that it offered the possibility of cryptography that couldn’t be broken even by the NSA. The NSA didn’t want civilians to use encryptions that it couldn’t break, so the NSA successfully lobbied to weaken Lucifer by reducing the number of possible keys. The adoption of this weakened Lucifer meant that the civilian world had access to strong but not optimal security, meaning that the NSA could still break their encryptions if it needed to do.

The NSA was justified in pushing for the adoption of a mechanism that they could break even if it meant less security for the civilian world. Allowing civilians and businesses to gain strong encryption mechanisms that no one but them could decipher would have meant an increase in criminal activity that governments couldn’t even begin to monitor. This would have reduced the safety of the populace as a whole. When living in a society we often give up some rights for the greater good, and it should be noted that no right is absolute – my right to free speech doesn’t allow me to yell fire in a crowded theater for example. Thus by merely knowing that the NSA can still decrypt messages that businesses send can often be a deterrence to secretive or illegal activity.

Critics like to point out that giving the NSA the ability to decrypt any message they would like would be giving the government far too much power. But it should be noted that even while the NSA has the means to decipher an encryption, that doesn’t necessarily mean it will. There are billions of texts, emails, and calls exchanged each day in our world – the NSA has neither the means nor the resources to monitor every single message. Thus the NSA must prioritize by possible criminal activity: criminal activity they cannot detect and stop without the use of decryption. Thus, it is not only important but essential that the NSA be able to decrypt the messages of the business world in order to deter criminal activity and better protect our society.

 

Gender in the War

The history of World War Two is incomplete if one does not analyze two elements: cryptography and gender. While these items have been recounted and studied heavily on their own, rarely have they been discussed together. The women who played a huge role in cryptography in the second world war have rarely been credited, that is until the book Code Girls, a book by Liza Mundy about their history, came out. This book, specifically chapter three, discusses in depth the role gender played in the cryptography of world war two. In the general. cryptography opened up new opportunities for women in world war two, but gender dynamics were still very imbalanced in the working world.

In general, World War Two presented opportunities for women to enter the workplace, as vacant positions left by men in war needed to be filled. However, the willingness of bosses to hire women varied greatly. One pivotal element of the story of cryptography is that William Friedman, head of the U.S office of code breaking, was exceptionally willing to hire women. This gave many women who never were ever permitted to get graduate degrees or teach mathmatics to now be propelled to the forefront of some of the most important mathmatics in the world. These women, like Genieveve Grotjan, would make some of the most important accomplishments in World War Two cryptography, including the initial breaks into the Purple cipher. In this way, cryptography gave women new opportunities, and women seized this opportunities fully and propelled cryptography to new heights.

However, it must be acknowledged that not all was equal in the world of cryptography. The was the author visualizes Grotjan’s cracking of the purple machine explains this. She describes Grotjan standing in the corner of the room, hesitant to share. This helps the reader understand that it was still not easy for women in the workplace. They weren’t taken as seriously as they should have been, and we still had, and have, a long way to go.

The Rise of WAVES

Gender was extremely indicative of what role Americans played in the war. The men were given officer positions, extra privileges, and were able to be shipped overseas to fight in the trenches and on the islands. The women, meanwhile, were resigned to domestic jobs, and a select few were sent overseas to serve as nurses or in other support positions. By 1942 however, a domestic push had introduced women into the war effort as more than passive observers. The women initially were seamen who had fewer privileges than their male counterparts despite serving in the same positions. But eventually, as more men were shipped overseas, the female codebreakers(who had set up shop in Washington D.C.) outnumbered the male codebreakers, served in officer positions, and became more integral to the war effort as they deciphered a greater number of crucial Japanese messages.

Perhaps the most famous example of this rise of the WAVES unit(the female naval codebreakers), was the decryption of the itinerary. A greater number of Japanese messages began to be intercepted, and a group of women managed to decrypt parts of the itinerary of Admiral Yamamoto: the top Japanese commander who had orchestrated the attack on Pearl Harbor. As the days passed, the codebreakers were able to piece together the exact itinerary of the commander’s flight to certain Japanese islands, and Nimitz and other navy officials proposed a daring American plan, dubbed Operation vengeance, to intercept Yamamoto’s flight and kill him. On April 18, American jets managed to catch the Japanese by surprise, and in a turning point of the war, show down the Japanese bomber carrying Yamamoto.

The WAVES unit managed to keep quiet about their section of the war effort, and told outsiders that they merely worked in naval communication. Their persistence and effort eroded traditional gender stereotypes by proving that women could be capable in the military, and allowed women greater control and more freedom to participate in the war effort. Codebreaking was integral to the war, and female codebreakers especially played a crucial role in the Allied victory.

Analyzing Numbers Stations

What I found most interesting about the Numbers Station episode from 99% Invisible was the eerie fact that many of these numbers stations can still be widely heard today. Despite knowing that their message could be intercepted by a wide array of individuals and agencies, the transmitters of the numbers are confident enough in their encryption strength to broadcast their message on an open channel. The podcast producer kept the audience interested in the content in a variety of ways. They brought in other speakers to help analyze these seemingly-random messages, and most importantly employed seemingly-off/creepy music and other sound effects when talking about the number stations. This music helped keep the listener alert and interested in the material; this strategy particularly paid off when the producers began discussing the more technical aspects of the material.

When discussing the history of numbers stations or why they existed, the producers would have multiple people put forth their ideas and debate, and then intersperse bursts of odd music or a numbers station message. This helped provide a sense of variety to the reader, kept them alert with the odd music and seemingly-random messages, and provided them with more technical information on numbers stations. Based on this episode, I am interested in making a podcast that deals with some mysterious facet of cryptography, whether that be a specific example of cryptography gone wrong or just the secrecy behind encryptions. I would like to use multiple media, viewpoints, and stories to narrate my podcast, thereby keeping the content “fresh” with variety as well as offering more useful information and informative debates to my audience.

Zodiac Codes, Podcast Time!

For this assignment, I listened to “A Killer on the Loose: The Zodiac Ciphers,” a podcast by a Vanderbilt student about the story of the Zodiac killer and the cryptography involved in his crimes. This story first explained the Zodiac killer’s crimes and murders, then delved into the story of how he contacted the press with ciphers that supposedly contained his identity. The podcast explained what kind of ciphers these were, how they were cracked, what information was uncovered, and what is still unknown. 

What I found most interesting about this episode was purely the topic of discussion and the story. I think the creator of this podcast did an amazing job of picking an intriguing topic through which to educate people about cryptography. Cryptography itself may not be so interesting, but the story of a serial killer using obscure symbols and concealing his identity is enticing.

I think that the producer of this podcast made it interesting by matching the presentation of the information with the information being presented. In other words, she was telling the story of a serial killer, and she matched this by presenting the information in an eerie way. She used spooky cliffhangers, used gunshot sound effects, and had an ominous music playing in the background the whole time. This drew the listener in emotionally to the story.

Admittedly, this producer could have done a better job of making the technical aspects accessible. Someone with no cryptography experience would not come away from this podcast with an understanding of what a transposition cipher is or what a Caesar cipher is. Still, I think the producers did a good job of interjecting cryptography knowledge as an important part of the story, which held the listener’s attention. 

I think it would be really interesting for me to do a podcast on how cryptography is portrayed in movies. There is such a grand spectrum of how accurate or inaccurate code-breaking is in the movies, and I think it would be interesting to investigate why some movies fudge the details of cryptography more than others. Technically, I also think this would be interesting from a production standpoint as I could intereject the podcast with dialogue from the movies. 

Podcast Immersion

Vox encoding and speech compression is a common piece of technology that most people are completely unaware of. The podcast 99% invisible tells the entire story, from its inception in the form of a show act presented at a fair, to an integral part of World War II cryptography. The podcast medium plays well to this, as the narrator is able to tell a coherent story about this technology. What makes it interesting, is the examples that the studio is able to come up with. Imitating the encrypted talks between F.D.R. and Churchill while explaining each individual step plays well towards both providing a captivating story which places the listener into the middle of World War II, and also towards explaining technology that would otherwise require a diagram or a visual aid. A particular mark of the quality of the podcast is that since the subject matter deals with a recent time period, 99% are able to interview living people which were involved in the events, and sometimes they even were able to obtain recordings. However when they were unable to do so, they often supplemented with reenactments produced by the studio. This is sometimes difficult to distinguish where the actual event ends and the reenactment begins. It helps the listener to immerse themselves in the program, and makes the podcast feel less like a newscast, and more of an informative movie.

Not as Easy as it Looks

When reading Singh’s The Code Book, it can be easy to lose track of how difficult it can be to break a piece of ciphertext. Remember that a simple monoalphabetic substitution cipher took us a fair amount of time and careful consideration to break, even with all of the advantages we had as cryptanalysts: we knew, or at least were fairly sure of, the method used to encrypt the plaintext, we used methods that had already been invented and documented to break the ciphertext, and the plaintext was chosen specifically to be broken because its purpose was to teach us cryptography, not to communicate military secrets.

Contrast our situation with real-world cryptography and it makes a little more sense why cryptanalysis is so difficult. Firstly, when a new cipher is invented, cryptanalysts have no starting point, no angle from which to approach the problem, and no way to tell if the piece of ciphertext they’re working with is indeed ciphertext or if it’s just gibberish sent out to throw them off the scent. Secondly, even when the method of encryption is discovered, a way to crack it doesn’t just materialize out of thin air. Remember that it took more than a few centuries for the Arabs to invent frequency analysis. Thirdly, a good cryptographer will keep encrypted messages short or confusing or both in order to minimize the amount or the helpfulness of the reference material that cryptanalysts have to work with.

With the benefit of hindsight, any code can seem simple to crack, but we should remember that it often takes the best cryptanalysts in the world years or even centuries to defeat a good code.

Hall: Ruthless or Ethical?

Late into the first world war, top level German officer Arthur Zimmerman wanted to assert Germany dominance with a major offensive move. He wanted to start unrestricted U-Boat Warfare. He knew that a potential outcome of this would be the United States entering a war. His plan for combatting thisEthical was an alliance with Mexico. If the Americans entered the war, Mexico would ally with Germany and, using funds from the Germans, invade America to reclaim Texas, Arizona, and New Mexico. Zimmerman sent this message as a telegram that was intercepted by the British. This message was then quickly deciphered enough to crack its basic message, but not completely deciphered, and brought to British Admiral Hall. To the cryptographers’ surprise, Hall did nothing with the message. He believed that it was not worth it to convey these messages to the Americans because there could be vital information in the non-deciphered parts and because if America started reacting to Germany’s plans, it would be revealed that Germany’s encryption had been broken, compromising the Biriths’s intelligence position. It is important to wonder whether hall did the ethical  thing in this situation. I believe that Hall’s actions were ethical if he intended to do the most good for the most amount of people. 

I look at ethics in a utilitarian way. If an action is intended to accomplish  the most good possible for the most amount of people possible it is ethical. However, if an action is intended to benefit a small party but be harmful to the larger group, it is unethical. Hall’s position could have been unethical. By not sending America the decipher telegram, he was basically allowing America to be provoked by unrestricted U-Boat Warfare. Essentially, that means he was going to allow a deadly attack to happen for America to come into the war. If Hall was doing this just because he didn’t want to have to deal with Germany knowing that Britain had broken their encryption, this would be unethical.

However, the argument could be made that Hall actually was doing the most good for the most amount of people. It is possible that the British being able to decipher German messages was actually leading to lives being saved on a daily basis. It is possible that, had Germany stopped using their encryption because Britain could decipher it, more lives would be lost than in one unrestricted U-Boat attack. Additionally, Hall chose to hold the message rather than send it to the Americans because he thought that there may be vital information in the parts that hadn’t been deciphered. He did this on January 16th, leaving plenty of time for the whole code to be cracked before February 1st, when the U-boat attacks would begin. In this case, it seems that Hall is making sure everyone is safe and acting in the interests of the public. Therefore, I would argue that when Hall made this seemingly harmful decision, he was probably acting ethically by drying to do the most good for the most amount of people. 

Ethical Implications of Wartime Actions

When Zimmerman was sworn in, America rejoiced at what they thought was going to be a new era of German diplomacy, and the greater likelihood of peace in Europe.   But little did they realize that the new foreign minister was intent on increasing Germany’s aggression. Two years into the war, Zimmerman successfully lobbied for a lift on the ban on unrestricted submarine warfare. He believed that a new fleet of U-boats could lead to Britain’s surrender within six months; the only issue was America’s neutrality. This new move would almost certainly push America’s allegiance to the Allies, so Zimmerman devised a cunning plan: he would persuade Mexico to declare war on America, which would allow time for Germany to win in Europe and prepare for the American campaign. But thanks to a clever move by British ships, Germany’s underwater cables had been severed before the war, so Zimmerman’s encrypted telegram to Mexico was intercepted by the UK.

Admiral Hall’s cryptanalysis deciphered parts of the telegram, and correctly deduced what Zimmerman’s plan was. But Hall decided to not to tell America for two reasons: he did not want to miss vital information and give America an incomplete message, and he did not want the Germans to figure out that Britain had broken their encrypted messages. Admiral Hall was justified in his decision to not give the message immediately to America.

The decision to allow unrestricted U-boat warfare would have gone through in either scenario, and such a drastic move on Germany’s part might have been enough to push America to fight for the Allies. But the more important reason that Hall’s decision was justified was that Hall was sacrificing the short-term consequences for the long term gains. If the Germans knew that Britain could crack their codes, that would have been enough of an impetus for the Germans to develop a stronger encryption; thus, the British would have lost a major source of intelligence that would have proven disastrous, possibly fatal later in the war. The long-term effects of being able to know the plans of your enemy, their locations, and modes of attack are invaluable; either way, when America chose to remain neutral after the resuming of unrestricted boat warfare, Hall exploited the Zimmerman telegram to pull America into the war.

Although Hall’s decision may seem unethical on the surface, the long-term benefits significantly outweigh the short-term negatives.

Page 2 of 9

Powered by WordPress & Theme by Anders Norén