Codes and cryptograms: From yesterday to today. Part 1o & competition

Let us here again for another fascinating journey into the world secrets and encryption! As we have seen there has been interest in articles dedicating to Alan Turing, on the occasion of the eponymous movie. Based on your interest and the initiative of both me and iGuru, we will travel (to what else?) Between secrets, mysteries, codes and ways to decipher them through the centuries! 

Also, the most enthusiastic readers, that is, those who will be most excited and spend some of their time, will be able to participate in a game and the first five will win licenses (one license each) for a program . The game; You will find out later. :)

 

crypto encryption encryption

 

Let's start our tour now! As you all know and inform every day now, in the modern world everything around us is encrypted. For every call on our mobile, for every cable TV channel we watch, for every cash withdrawal from an ATM, we rely on sophisticated electronic encryption to block access to indistinguishable ears and eyes.

The Phaistos disk.
The Phaistos disk.

This need for "secrecy", however, is not a phenomenon of our time, for 2.000 years codes and cryptocurrencies have played a key role in politics, military operations, assassinations and the fight against crime. Secret messages determine the outcome of wars, build or dismantle empires, rescue or condemn people.

The success of cryptanalysts is determined by their motivation. Nothing fascinates a man more than secrets, and for some cryptographers the “revelation” is the only motivation. There are also other motives, patriotism, revenge, greed or the desire for knowledge.

The disclosure of codes and encryption requires constant interest. Although today it is easy to break the ancient cryptographic method used by Julius Caesar, at that time his opponents showed endless persistence until they understood the alphabetical transposition and discovered his secrets

Decryption requires . Το κρυπτόγραμμα R.S.A είναι κλασικό παράδειγμα, βασίζεται στην ιδιορρυθμία ότι ο πολλαπλασιασμός of prime numbers takes very little time, however uncovering the first two numbers that were multiplied to produce that particular number may take forever, even with the use of a computer.

The codes that were created and then broken, determined the course of history. The secret and its revelation capture imagination and explain the regular appearance of decryptors in television and cinematic films.

Her world It doesn't look like the world of everyday life, it is at least stranger than the script of the most attractive thriller.

Next we will take a look back at the ancient forms of cryptography, the ancient Pharaohs, Julius Caesar, the Spartans and more. And we will get to the current forms of cryptography in future dedications.

4.000 years ago…

4.000 years ago, the ancient Egyptian scribes carved on the walls of great monuments their religious rites or events of their daily lives. For some strange reason, some elements changed, altering the meaning of the "hieroglyphic" history they engraved.

Their purpose was not to conceal the meaning; instead, they wanted to surprise or entertain the reader, or potentially increase the mystery and magic of religious texts.

Instigated by this practice, they pre-dated the real encryption developed in the next millennium.

Caesar's Secret Writing

Caesar was the most famous leading figure of ancient Rome. He was famous for his courage, his insightful intelligence and his tendency to risk everything. In his military memoirs (Galactic Wars), Caesar describes his skill in "hiding" the content of a message, so that it seems incomprehensible in the hands of the enemy.

When the Roman legions attacked the military forces of present-day France, Belgium and Switzerland, Caesar's officer Cicero was besieged and nearly captured. Caesar wanted to let him know (without the enemy knowing) that help would soon be coming. He sent him in Latin but using Greek characters (something like our familiar Greekish).

The Secret of Polybius

Polybius placed the letters of the alphabet on a 5 × 5 board and put numbers from 1 to 5 in each column and in each row.

CRYPTO1
Example from a table of Polybius.

 

This allows each letter to be represented by two numbers. The letter C, for example, is the 13While W is 52. My name would be "2215344222243443"That is"GEORGIOS".

Caesar's Transcriptional Cryptogram

By the time Suetonius was writing about Julius Caesar, the secrets of his cryptocurrencies were already known. Anyone who wants to decrypt his letters and read them, Suetonius wrote, "must replace the fourth letter of the alphabet, that is, D with A and so on."encryption

This type of cryptographic substituting letters is known as the transitive cryptogram of Caesar. For example, if we want to write Caesar's favorite statement "I came, I saw, I livedUsing its cryptography, the result would be "CYCLIS, THEMIS, IMSNC".

The Combination of Polybius and Caesar

What will happen now if we try to place Caesar's transposition on a board?

We will see with an example! Someone wants to send the message "the ship will sail the dawn in the east".

The first thing we do is put the letters in a table as follows.

encryption

This gives the encrypted message starting from the first column and reading from top to bottom the “Tendencialcontroldigitalandconsultants". Nonsense indeed, for one who is unsuspecting. Then we can make it even harder. Taking the result of the table, we permute by 4 positions as we saw above. That is to say τ is done Χ, the ι is done Μ coke. The result will be: “XHTMLThisSWSWLDXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX".

If the “Tendencialcontroldigitalandconsultants"Was once incoherent, with"XHTMLThisSWSWLDXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX” you really don't know where to start. Coincidentally, if anyone notices, the cryptogram contains only 2 vowels.. Just looking at it is confusing!

So the “the ship will sail the dawn in the east"In a few minutes and in two simple ways it turned into"XHTMLThisSWSWLDXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX".

Challenge For Cod Breakers

As we said at the beginning, the article will contain a game . The game will be about combining the above examples with some small differences that the participants will have to figure out in order to solve the puzzle! Solving the puzzle requires an understanding of the above and a little imagination! :)

The coded proposal is as follows:

OBSBUSNFPSVOEBSLVHIHIWLVSADAAATLLLLLLFNHHSUHAIWPSFLNNWPSWWWWWWWWWWWWWWWWWW

The first five to email us (at georgios.koliou [at] ) the solution to the encrypted sentence, they will each win a license for an antivirus program.

*** A little help for those who are involved. The letters of the encrypted proposal are 72, so try to find what table they will get. The multiplication of which numbers makes us 72? So x * y table. After that, you need to understand how many positions we have moved the alphabet as in the example of Caesar's transfer.

Good luck!

 

1th winner: Panayiotou Petros

2th winner: Ioannidis Lazaros

3th winner: Aivazoglou Christos

4th winner: Alibertis Giannis

 

Solution

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).