Wr wkh vwxghqw doo ri dfdghpld lv d frgh zdlwlqj wr eh fudfnhg.
The multiple human needs and desires that demand privacy among two or more people in the midst of social life must inevitably lead to cryptology wherever men thrive and wherever they write. Cultural diffusion seems a less likely explanation for its occurrence in so many areas, many of them distant and isolated" (David Kahn The Codebreakers: The Story of Secret Writing 1967, p. 84).
First Surgeon General of what becomes the US
American, Harvard & London trained
Big wheel in Boston society
London, 1772.
I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty's subjects. This is in connection with the discussion of the role of "metadata" in certain recent events and the assurances of various respectable parties that the government was merely "sifting through this so-called metadata" and that the "information acquired does not include the content of any communications". I will show how we can use this "metadata" to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner.
StAndrewsLodge LoyalNine NorthCaucus LongRoomClub TeaParty Bostoncommittee LondonEnemies
Adams.John 0 0 1 1 0 0 0
Adams.Samuel 0 0 1 1 0 1 1
Allen.Dr 0 0 1 0 0 0 0
Appleton.Nathaniel 0 0 1 0 0 1 0
Ash.Gilbert 1 0 0 0 0 0 0
Austin.Benjamin 0 0 0 0 0 0 1
Austin.Samuel 0 0 0 0 0 0 1
Avery.John 0 1 0 0 0 0 1
Baldwin.Cyrus 0 0 0 0 0 0 1
Ballard.John 0 0 1 0 0 0 0
a code: 'variable sized elements that have meaning in the plaintext language' - syllables, words, phrases (Dooley, 5); thousands of substitutions
a cipher: a transformation from plaintext according to some transformation (Dooley, 5-6); 'small fixed number of substitution elements'
Dooley, John F. History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. Springer International Publishing AG, 2018. via our library
Polybius book 10 (P lived ca 200 - ca 118 BC)
One way to solve an encrypted message, if we know its language, is to find a different plaintext of the same language long enough to fill one sheet or so, and then we count the occurrences of each letter.
We call the most frequently occurring letter the "first", the next most occurring letter the "second", the following most occurring letter the "third", and so on, until we account for all the different letters in the plaintext sample.
Then we look at the cipher text we want to solve and we also classify its symbols. We find the most occurring symbol and change it to the form of the "first" letter of the plaintext sample, the next most common symbol is changed to the form of the "second" letter, and the following most common symbol is changed to the form of the "third" letter, and so on, until we account for all symbols of the cryptogram we want to solve.
##
the sort of thing that also gives rise to conspiracy theories
Now is the winter of our discontent
similar to Vignette, but:
key has to be as long as the message
key has to be absolutely mathematically random
you can never reuse the key in whole or in part
the key has to be kept completely secret
Let's say you have a keypad, and on today's page the key is XMCKL. This is the only time you use this page; destroy after use!
letters are associated with their number position in the alphabet. Add your message to the key. If the value is greater than 26, use the remainder value
h e l l o message
7 (h) 4 (e) 11 (l) 11 (l) 14 (o) message
+ 23 (X) 12 (M) 2 (C) 10 (K) 11 (L) key
= 30 16 13 21 25 message + key
= 4 (E) 16 (Q) 13 (N) 21 (V) 25 (Z) (message + key) mod 26
E Q N V Z → ciphertext
You've received a secret message! Find today's page & key, and subtract
(If a number is negative, add 26 to make positive)
E Q N V Z ciphertext
4 (E) 16 (Q) 13 (N) 21 (V) 25 (Z) ciphertext
− 23 (X) 12 (M) 2 (C) 10 (K) 11 (L) key
= −19 4 11 11 14 ciphertext – key
= 7 (h) 4 (e) 11 (l) 11 (l) 14 (o) ciphertext – key (mod 26)
h e l l o → message
Ok, what about the media for all these codes?
With a visual semaphore, the medium is light. With a wired telegraph, the medium is electricity.
What the hell is this stuff?
Can we store this stuff?
Hey, how fast/far does this stuff go?
or, the fun you can have with 200 monks & 1 mile's worth of metal rods
you'd think there'd be a good illustration, but there isn't, so this'll have to do
1838 Edward Davy
1838 William Cooke and Charles Wheatstone