Abstract
Introductory books on cryptography often start by studying a range of historical ciphers. This is attractive for two reasons: first, because there is some interesting related history (their success or failure is often aligned with an important event), and, second, because they are simple enough to understand without a significant background in Mathematics.
This chapter has a similar premise. The goal is to demonstrate the two sides of cryptography: the constructive side where new schemes (in this case for encryption) are designed and used, and the destructive side where said schemes are attacked and broken. By using simple programs available on every UNIX-based computer, the chapter demonstrates how historical cryptanalysts were able to decrypt messages their sender would probably have thought as secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wikipedia: Brute-force attack. http://en.wikipedia.org/wiki/Brute_force_attack
Wikipedia: Caesar cipher. http://en.wikipedia.org/wiki/Caesar_cipher
Wikipedia: Ciphertext-only attack. http://en.wikipedia.org/wiki/Ciphertext-only_attack
Wikipedia: Frequency analysis. http://en.wikipedia.org/wiki/Frequency_analysis
Wikipedia: Kerckhoffs’ principle. http://en.wikipedia.org/wiki/Kerckhoffs’_principle
Wikipedia: Mary I of Scotland. http://en.wikipedia.org/wiki/Mary_I_of_Scotland
Wikipedia: Modular arithmetic. http://en.wikipedia.org/wiki/Modular_arithmetic
Wikipedia: N-gram. http://en.wikipedia.org/wiki/N-gram
Wikipedia: Permutation. http://en.wikipedia.org/wiki/Permutation
Wikipedia: ROT13. http://en.wikipedia.org/wiki/ROT13
Wikipedia: Substitution cipher. http://en.wikipedia.org/wiki/Substitution_cipher
Wikipedia: The Adventure of the Dancing Men. http://en.wikipedia.org/wiki/The_Adventure_of_the_Dancing_Men
Wikipedia: words. http://en.wikipedia.org/wiki/Words_(Unix)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Page, D., Smart, N. (2014). Using Short Programs to Make and Break Historical Ciphers. In: What Is Computer Science?. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04042-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-04042-4_6
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04041-7
Online ISBN: 978-3-319-04042-4
eBook Packages: Computer ScienceComputer Science (R0)