Evolution of Cryptography

Published: Sep 28, 2019 by Ivana Žemberi

The art of writing and solving codes was a necessary skill even in ancient times. Even though that was the time where most of the population was still illiterate, powerful leaders could not risk their tactics being revealed to the enemy.

The solution to that problem was coming up with a cypher to encode the messages. That way they were sure their tactics, hidden in the messages, would not fall into the wrong hands.

That being said, we can assume that the cypher that Caesar used when he was a powerful leader, is not very secure nowadays. The main reason he got away with it, was that the illiteracy was common in his time.

The Caesar Cypher

The Caesar Cypher is a classical substitution and historically the oldest cypher. It is based on shifting each letter of the Latin alphabet by a predetermined number.

Example:

The message we want to send is: “ATTACK AT DAWN”, and the predetermined number is 3.

Shifting the alphabet when the predetermined number is 3

“ATTACK AT DAWN” → “DWWDFN DW GDZQ”

There are a few problems with this cypher. First of all, there is a limited number of keys to use. One could try them all in a day and decode the message. Secondly, with the letter frequency analysis, the key can be found even faster. Also, the word constraints are making it easier to find the key. But again, this cypher was used in the time illiteracy was common.

The Polybius Square

Similarly to Caesar’s Cypher, there is The Polybius Square which uses a 5x5 grid that shows the coordinates of the letters. Due to the Latin alphabet having 26 numbers, “I” and “J” are on the same coordinates.

Example:

We want to send the same message, “ATTACK AT DAWN”, but using this cypher:

The Polybius Square

“ATTACK AT DAWN” → “1144111325 1144 14115233”, but to make it a bit harder to decode it is better to remove the spaces, so the message should look like this: “1144111325114414115233”.

Of course, this cypher also has its problems. Considering that each number is numbered from 1 to 5, the antagonist can easily conclude that the cypher is based on some kind of grid. Once he/she sees that, decoding becomes trivial. Today, a modern computer could do it in a millisecond.

Some cyphers are used purely for fun, for example, The Pigpen Cypher, FonCode, ROT13, etc. Even though each is different from the next, they are mostly used for fun, by kids in school or on Internet forums.

All these cyphers I mentioned before have one thing in common. They are easily breakable. Opposed to that, there is The Vigenere Cypher.

The Vigenere Cypher

The Vigenere Cypher is best described as many Caesar shift cyphers combined at once. The timing of the shifts is usually determined by a keyword, and the user of a Vigenere Cypher usually carries on him a cypher wheel or a Vigenere square.

Example: Encoding “ATTACK AT DAWN” using The Vigenere Cypher

Plaintext: ATTACKATDAWN

Key: MEDIUM

Keystream: MEDIUMMEDIUM

Cyphertext: MXWIWWMXGIQY

The Vigenere Square

To understand the encryption it is important to know:

  • All involved must agree upon a key to use, and the key is typically one, easy to remember word.
  • The keystream is as long as the text we want to encode. That is why our keystream is long 12 letters, “mediummedium”.
  • The upper alphabet signifies the letters from plaintext, and the one on the left signifies the letters from the keystream. Marked red, are the coordinates of the letters that are used in the cyphertext.
Conclusion

Due to the increase in the level of education, and of course, the advancement of technology, it is logical that cryptography is constantly evolving. Today we have a lot of encryption methods and algorithms that are used in coding to secure sensitive data.

The thing about these particular cyphers is that they all share some similarities. Each cypher I described is at least a few centuries old. Moreover, they also show the process of evolution, from Caesar’s Cypher being the easiest to break, Polybius Square which is a tad more difficult, and finally, the Vigenere Cypher which is almost impossible to break without having the key.

Share

Latest Posts

Using LottieFiles Animations in Adobe XD
Using LottieFiles Animations in Adobe XD

Published in Bootcamp

LottieFiles offers lightweight, scalable animations for all your needs. From ads and social media to websites and apps.

The journey of designing a logo
The journey of designing a logo

When designing a logo, there are quite a few things to consider. In this post, I will lead you through those rules and principles.

Keeping up Appearances in Figma
Keeping up Appearances in Figma

Figma is a top-notch tool for making designers’ lives easier. It allows a variety kinds of plugins for almost every situation.