Codes: the Guide to Secrecy from Ancient to Modern Times Richard A

Total Page:16

File Type:pdf, Size:1020Kb

Codes: the Guide to Secrecy from Ancient to Modern Times Richard A Codes The Guide to Secrecy from Ancient to Modern Times DISCRETE MATHEMATICS and ITS APPLICATIONS Series Editor Kenneth H. Rosen, Ph.D. Juergen Bierbrauer, Introduction to Coding Theory Kun-Mao Chao and Bang Ye Wu, Spanning Trees and Optimization Problems Charalambos A. Charalambides, Enumerative Combinatorics Charles J. Colbourn and Jeffrey H. Dinitz, The CRC Handbook of Combinatorial Designs Steven Furino, Ying Miao, and Jianxing Yin, Frames and Resolvable Designs: Uses, Constructions, and Existence Randy Goldberg and Lance Riek, A Practical Handbook of Speech Coders Jacob E. Goodman and Joseph O’Rourke, Handbook of Discrete and Computational Geometry, Second Edition Jonathan Gross and Jay Yellen, Graph Theory and Its Applications Jonathan Gross and Jay Yellen, Handbook of Graph Theory Darrel R. Hankerson, Greg A. Harris, and Peter D. Johnson, Introduction to Information Theory and Data Compression, Second Edition Daryl D. Harms, Miroslav Kraetzl, Charles J. Colbourn, and John S. Devitt, Network Reliability: Experiments with a Symbolic Algebra Environment Derek F. Holt with Bettina Eick and Eamonn A. O’Brien, Handbook of Computational Group Theory David M. Jackson and Terry I. Visentin, An Atlas of Smaller Maps in Orientable and Nonorientable Surfaces Richard E. Klima, Ernest Stitzinger, and Neil P. Sigmon, Abstract Algebra Applications with Maple Patrick Knupp and Kambiz Salari, Verification of Computer Codes in Computational Science and Engineering William Kocay and Donald L. Kreher, Graphs, Algorithms, and Optimization Donald L. Kreher and Douglas R. Stinson, Combinatorial Algorithms: Generation Enumeration and Search Charles C. Lindner and Christopher A. Rodgers, Design Theory Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography Continued Titles Richard A. Mollin, Algebraic Number Theory Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times Richard A. Mollin, Fundamental Number Theory with Applications Richard A. Mollin, An Introduction to Cryptography Richard A. Mollin, Quadratics Richard A. Mollin, RSA and Public-Key Cryptography Kenneth H. Rosen, Handbook of Discrete and Combinatorial Mathematics Douglas R. Shier and K.T. Wallenius, Applied Mathematical Modeling: A Multidisciplinary Approach Jörn Steuding, Diophantine Analysis Douglas R. Stinson, Cryptography: Theory and Practice, Second Edition Roberto Togneri and Christopher J. deSilva, Fundamentals of Information Theory and Coding Design Lawrence C. Washington, Elliptic Curves: Number Theory and Cryptography DISCRETE MATHEMATICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN Codes The Guide to Secrecy from Ancient to Modern Times Richard A. Mollin Boca Raton London New York Singapore C4703_Discl.fm Page 1 Friday, April 8, 2005 1:36 PM Published in 2005 by Chapman & Hall/CRC Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2005 by Taylor & Francis Group, LLC Chapman & Hall/CRC is an imprint of Taylor & Francis Group No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10987654321 International Standard Book Number-10: 1-58488-470-3 (Hardcover) International Standard Book Number-13: 978-1-58488-470-5 (Hardcover) Library of Congress Card Number 2005041403 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Mollin, Richard A., 1947- Codes: the guide to secrecy from ancient to modern times / Richard A. Mollin. p. cm. Includes bibliographical references and index. ISBN 1-58488-470-3 (alk. paper) 1. Computer security. 2. Data encryption (Computer science) I. Title. QA76.9.A25M67 2005 005.8'2--dc22 2005041403 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com Taylor & Francis Group and the CRC Press Web site at is the Academic Division of T&F Informa plc. http://www.crcpress.com Preface This book has been written with a broad spectrum of readers in mind, which includes anyone interested in secrecy and related issues. Thus, this is a tome for the merely curious, as well as history-minded readers, amateur mathemati- cians, engineers, bankers, academics, students, those practitioners working in cryptography, specialists in the field, and instructors wanting to use the book for a text in a course on a variety of topics related to codes. We will look at this topic from all aspects including not only those related to cryptography (the study of methods for sending messages in secret), but also the notion of codes as removal of noise from telephone channels, satellite signals, CDs and the like. The uninitiated reader may consider the following. Imagine a world where you can send a secret message to someone, and describe to anyone listening in precise detail how you disguised the message. Yet that person could not remove the disguise from that message no matter how much time or how many resources are available. Well, that world exists in the here and now, and the methodology is called public-key cryptography. It permeates our lives, from the use of a bank card at an automated teller machine ATM to the buying of items or bank transactions over the Internet. You can even purchase items over the Internet and do so anonymously, as you would using hard cash. In this book, you will find out how this is done. Do you ever wonder how secure your private conversation is over a cell phone? In general, they are not secure at all. In this book, you will find out how they can be made secure. And those transactions over the Internet, just how secure are they? Can these methods be trusted? In this text, you will learn which methodologies are secure and which are not. Here is an excerpt from the end of Chapter 2 that is apt. “What made all of the above not just possible, but rather a necessity — that good old mother of invention — was the advent of the Internet. While information secrecy, as we have seen throughout history, was strictly the purview of governments and their agents, the Internet, and its associated e-mail and e-commerce activities, demanded a mechanism for the ordinary citizen to have their privacy concerns addressed. ... Few of us actually understand the mechanisms behind all of these protocols that we use every day (although this book will foster that understanding), yet cryptography has become everybody’s business, hence everybody’s concern. Therefore it is almost a personal duty that each of us learn as much as possible about the underlying mechanisms that affect our security, our privacy, and therefore our well-being.” What are smart cards and how do they affect your life? This book reveals the answers. What are biometrics and how do they affect you? Several of your identity characteristics such as fingerprints, retinal data, voice prints, and facial geometry, to mention a few, can be embedded in smart cards to identify you to a bank, for instance. Perhaps you have allergies to some medicines, such as penicillin, and this information can be embedded in a medical smart card so that in the event of an accident, appropriate measures can be taken that may save your life. Read this book to find out how this is done. vii viii How did all this begin and where is it headed? Read Chapter 1 to learn about the rumblings of the art of secrecy carved in stone almost four millennia ago and how it evolved to the present where it permeates nearly every aspect of your life. N Features of This Text • The text is accessible to virtually anyone who wishes to learn the issues surrounding secrecy. To this end, Appendix A contains all necessary mathe- matical facts for the novice, or as a fingertip reference for the initiated. Other appendices, such as Appendix E, contain the requisite probability theory for background needed to understand Information and Coding Theory in Chapter 11, for instance. Moreover, the main text is geared to gently introduce the necessary concepts as they arise. The more difficult or advanced topics are marked with the pointing hand symbol for the more advanced (or adventur- ous)reader. • There are nearly 200 examples, diagrams, figures, and tables throughout the text to illustrate the history and concepts presented. • More than 200 footnotes pepper the text as further routes for information- gathering. Think of these as analogues of hyperlinks in the Internet (see page 328), where you can click on a highlighted portion to get further information about a given topic, or ignore it if you already have this knowledge or are not interested. These links provide avenues to pursue information about related topics that might be of separate interest to a wide variety of readers.
Recommended publications
  • Download The
    MAS Context Issue 22 / Summer ’14 Surveillance MAS Context Issue 22 / Summer ’14 Surveillance 3 MAS CONTEXT / 22 / SURVEILLANCE / 22 / CONTEXT MAS Welcome to our Surveillance issue. This issue examines the presence of surveillance around us— from the way we are being monitored in the physical and virtual world, to the potential of using the data we generate to redefine our relationship to the built environment. Organized as a sequence of our relationship with data, the contributions address monitoring, collecting, archiving, and using the traces that we leave, followed by camouflaging and deleting the traces that we leave. By exploring different meanings of surveillance, this issue seeks to generate a constructive conversation about the history, policies, tools, and applications of the information that we generate and how those aspects are manifested in our daily lives. MAS Context is a quarterly journal that addresses issues that affect the urban context. Each issue delivers a comprehensive view of a single topic through the active participation of people from different fields and different perspectives who, together, instigate the debate. MAS Context is a 501(c)(3) not for profit organization based in Chicago, Illinois. It is partially supported by a grant from the Graham Foundation for Advanced Studies in the Fine Arts. MAS Context is also supported by Wright. With printing support from Graphic Arts Studio. ISSN 2332-5046 5 “It felt more like a maximum security prison than a gated community SURVEILLANCE / 22 / CONTEXT MAS when the Chicago Housing Authority tried to beef up the safety of the neighborhood. Our privacy was invaded with police cameras Urban watching our every move.
    [Show full text]
  • Codebusters Coaches Institute Notes
    BEING COVER AGENT FIXED DELAY, PILOT RIGHT PLANE, CATCH SMALL RADIO (CODEBUSTERS) This is the first year CodeBusters will be a National event. A few changes have been made since the North Carolina trial event last year. 1. The Atbash Cipher has been added. 2. The running key cipher has been removed. 3. K2 alphabets have been added in addition to K1 alphabets 4. Hill Cipher decryption has been added with a given decryption matrix. 5. The points scale has been doubled, but the timing bonus has been increased by only 50% in order to further balance the test. 1 TYPES OF PROBLEMS 1.1 ARISTOCRAT (EASY TO HARD DIFFICULTY) http://www.cryptograms.org/tutorial.php An Aristocrat is the typical Crypto-quote you see in the newspaper. Word spaces are preserved. No letter will stand for itself and the replacement table is given as a guide (but doesn’t need to be filled in by the team to get credit). FXP PGYAPYF FIKP ME JAKXPT AY FXP GTAYFMJTGF THE EASIEST TYPE OF CIPHER IS THE ARISTOCRAT A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Frequency 4 1 6 3 1 2 2 2 6 3 3 4 Replacement I F T A Y C P O E R H S 1.2 ARISTOCRATS WITH SPELLING AND/OR GRAMMAR ERRORS (MEDIUM TO VERY HARD DIFFICULTY) For these, either words will be misspelled or grammatical errors introduced. From a student perspective, it is what they might expect when someone finger fumbles a text message or has a bad voice transcription.
    [Show full text]
  • A Cipher Based on the Random Sequence of Digits in Irrational Numbers
    https://doi.org/10.48009/1_iis_2016_14-25 Issues in Information Systems Volume 17, Issue I, pp. 14-25, 2016 A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERS J. L. González-Santander, [email protected], Universidad Católica de Valencia “san Vicente mártir” G. Martín González. [email protected], Universidad Católica de Valencia “san Vicente mártir” ABSTRACT An encryption method combining a transposition cipher with one-time pad cipher is proposed. The transposition cipher prevents the malleability of the messages and the randomness of one-time pad cipher is based on the normality of "almost" all irrational numbers. Further, authentication and perfect forward secrecy are implemented. This method is quite suitable for communication within groups of people who know one each other in advance, such as mobile chat groups. Keywords: One-time Pad Cipher, Transposition Ciphers, Chat Mobile Groups Privacy, Forward Secrecy INTRODUCTION In cryptography, a cipher is a procedure for encoding and decoding a message in such a way that only authorized parties can write and read information about the message. Generally speaking, there are two main different cipher methods, transposition, and substitution ciphers, both methods being known from Antiquity. For instance, Caesar cipher consists in substitute each letter of the plaintext some fixed number of positions further down the alphabet. The name of this cipher came from Julius Caesar because he used this method taking a shift of three to communicate to his generals (Suetonius, c. 69-122 AD). In ancient Sparta, the transposition cipher entailed the use of a simple device, the scytale (skytálē) to encrypt and decrypt messages (Plutarch, c.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • The Da Vinci Code
    The Da Vinci Code Dan Brown FOR BLYTHE... AGAIN. MORE THAN EVER. Acknowledgments First and foremost, to my friend and editor, Jason Kaufman, for working so hard on this project and for truly understanding what this book is all about. And to the incomparable Heide Lange—tireless champion of The Da Vinci Code, agent extraordinaire, and trusted friend. I cannot fully express my gratitude to the exceptional team at Doubleday, for their generosity, faith, and superb guidance. Thank you especially to Bill Thomas and Steve Rubin, who believed in this book from the start. My thanks also to the initial core of early in-house supporters, headed by Michael Palgon, Suzanne Herz, Janelle Moburg, Jackie Everly, and Adrienne Sparks, as well as to the talented people of Doubleday's sales force. For their generous assistance in the research of the book, I would like to acknowledge the Louvre Museum, the French Ministry of Culture, Project Gutenberg, Bibliothèque Nationale, the Gnostic Society Library, the Department of Paintings Study and Documentation Service at the Louvre, Catholic World News, Royal Observatory Greenwich, London Record Society, the Muniment Collection at Westminster Abbey, John Pike and the Federation of American Scientists, and the five members of Opus Dei (three active, two former) who recounted their stories, both positive and negative, regarding their experiences inside Opus Dei. My gratitude also to Water Street Bookstore for tracking down so many of my research books, my father Richard Brown—mathematics teacher and author—for his assistance with the Divine Proportion and the Fibonacci Sequence, Stan Planton, Sylvie Baudeloque, Peter McGuigan, Francis McInerney, Margie Wachtel, André Vernet, Ken Kelleher at Anchorball Web Media, Cara Sottak, Karyn Popham, Esther Sung, Miriam Abramowitz, William Tunstall-Pedoe, and Griffin Wooden Brown.
    [Show full text]
  • Substitution Ciphers
    Foundations of Computer Security Lecture 40: Substitution Ciphers Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 40: 1 Substitution Ciphers Substitution Ciphers A substitution cipher is one in which each symbol of the plaintext is exchanged for another symbol. If this is done uniformly this is called a monoalphabetic cipher or simple substitution cipher. If different substitutions are made depending on where in the plaintext the symbol occurs, this is called a polyalphabetic substitution. Lecture 40: 2 Substitution Ciphers Simple Substitution A simple substitution cipher is an injection (1-1 mapping) of the alphabet into itself or another alphabet. What is the key? A simple substitution is breakable; we could try all k! mappings from the plaintext to ciphertext alphabets. That’s usually not necessary. Redundancies in the plaintext (letter frequencies, digrams, etc.) are reflected in the ciphertext. Not all substitution ciphers are simple substitution ciphers. Lecture 40: 3 Substitution Ciphers Caesar Cipher The Caesar Cipher is a monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed “distance” away in the alphabet. For example, A is replaced by C, B by D, ..., Y by A, Z by B, etc. What is the key? What is the size of the keyspace? Is the algorithm strong? Lecture 40: 4 Substitution Ciphers Vigen`ere Cipher The Vigen`ere Cipher is an example of a polyalphabetic cipher, sometimes called a running key cipher because the key is another text. Start with a key string: “monitors to go to the bathroom” and a plaintext to encrypt: “four score and seven years ago.” Align the two texts, possibly removing spaces: plaintext: fours corea ndsev enyea rsago key: monit orsto gotot hebat hroom ciphertext: rcizl qfkxo trlso lrzet yjoua Then use the letter pairs to look up an encryption in a table (called a Vigen`ere Tableau or tabula recta).
    [Show full text]
  • General Solution for the Adfgvx Cipher System
    10 Feb 61 FILE OR From File of Special Consultant (Friedman) SERIAL neral Solution for the ADFGVX Cipher System NUMBER Register No. 129 AND Serial No. 1010 SUBJECT NAME AND EXTENSION OF PERSON REQUESTING FILE ORGANIZATION, B TO Mr. William Friedman LI 6-8520 10 2nd. Str., SE, Wash., D. C. DATE RET'ND. INITIAL HERE RETURN To Mrs. Christian, AG-24, HSA, Ft. Geo. G. Meade Mdo WHEN TRANSFERRING FILE TO ANOTHER PERSON, COMPLET'""1ELF·ADDRESSED TRANSFER COUPON BELOW, DETACH, STITCH TO BLANK INSTRUCTIONS LETTER·SIZE PAPER AND PLACE IN OUT·GOING MAIL SERVIC -· 2ND TRANSFER COUPON Declassified and approved for release by NSA on 05-06-2014 pursuant to E.O. 1352a Co1alidential Register No. 1 2 9 WAR DEPARTMENT OFFICE THE cmEI' SIGNAL OFVICD 1·',' or W .lSBINGTQll I GENERAL SOLUTION FOR THB I ADFGVX CIPHER SYSTEM I. *!~ ,. : i~ ' ·!, ------------~--==....;..'"-=='.,,.;'*: 30 April 1959 ftl• 4oc,_at 18 :re~4 •a<mrIDnUAL•·typ ot JMI> ~tive 52()0.l 4&~ 8 J~.1957, u4 117 "thant1 qr: the Jtirectar, laticllal a.nmv·: AceDt:J' • . ' ... ' 4JJ!fl/~ .; ~':j_ S. W1J.lt.r4 . ! ColCMl, .AOC • ! AclJutut GeMnl. --·-··-··--- --· Classification chanr,ed to R68!1'1G6'Pli8 By Authority ot · HAP.CL:J G4 HAY"-:S, Col<! , Siena! Corps Actin~ Chief, Arm.y Sepurity A~cncy B y :·iA:.JCN G. CA "'PR:::tL1 1st Lt,., Si~ 1 April 1946• . NO ACCOUNTltll t!MCESSARJ Rt:GlSTRAnON CAJJCELED, b7 . Authority Hqs. ASA ltr dated 27 Feb 46 2d Ind 11 l~r 46, signed: - HAROLD G .. HAYES, Col.Ji Sir.mtl Corps Aetin.1; Ch!Pf t Ar?!W S~1:1:ri~y Afen·:y ~::t::ii.
    [Show full text]
  • Sneaky Spy Concealments
    Sneaky Spy Concealments This post was written by Brett and Kate McKay and originally ran on The Art of Manliness . Concealment devices or CD’s looked like normal, everyday objects but actually contained a secret compartment or cavity, inside which could be placed film, notes, eavesdropping equipment, and various other types of contraband. They were used to smuggle escape aids to prisoners of war, exchange information with friendlies, monitor the enemy, store secrets for safe keeping, and transport items without arousing suspicion. Concealment History The earliest quasi-concealments were used by the ancient Greeks and Romans. The Greek general Histiaeus wrote a message on the head of his servant, waited for his hair to grow back, and sent him on his way. This was, of course, not a very effective method of communicating something that was even remotely time-sensitive. Roman generals placed secret messages in the bandages wrapped around the limbs of wounded soldiers or sowed a message into the sole of a courier’s sandal. In later centuries, dignitaries hid their correspondence in barrels of beer and hollowed out bullets. Such rudimentary methods of concealment were used for hundreds of years. But the fabrication of concealment devices really became a high art in the 20 th century, particularly during World War II and that Golden Age of Espionage, the Cold War. Active and Passive Concealment < Modern concealment devices can be classified into two categories: active and passive. Active concealments are objects that contain a secret compartment while also retaining their normally intended function. A lamp that you can turn off and on but also contains a secret compartment in its base would fall into this category.
    [Show full text]
  • TRIGON: Spies Passing in the Night
    https://www.cia.gov/news-information/featured-story-archive/2016-featured-story-archive/trigon- spies-passing-in-the-night.html TRIGON: Spies Passing in the Night TRIGION at desk in Moscow. On June 22, 1977, Aleksandr Ogorodnik killed himself with a CIA-supplied suicide pill after the KGB arrested him based on information initially provided by a mole within the Agency. Just over three weeks later, CIA officer Martha (Marti) Peterson—unaware of Aleksandr’s death—was seized in a KGB ambush while servicing a dead drop in Moscow. The streets of Moscow were one of the most important, and dangerous, battlefields of the Cold War. American intelligence officers like Marti worked with assets like Aleksandr in the shadows to collect Soviet secrets. The Soviets, in turn, closely watched all foreign nationals and their own citizens for signs of espionage. Although the story of TRIGON ended tragically, the intelligence Aleksandr provided gave US policymakers valuable insights into Soviet foreign policy plans and intentions. It was insights like this which ultimately helped us win the Cold War. Recruiting a Spy: Aleksandr Ogorodnik (codename: TRIGON) Aleksandr Ogorodnik was a mid-level official in the Soviet Ministry of Foreign Affairs (MFA) posted in Latin America and had access to information about Soviet intentions for the region. He enjoyed his life in Latin America and disliked the Soviet system, which he found oppressive. The CIA recruited Aleksandr in South America in 1973. Upon signing up to spy for the Agency, he was given the codename TRIGON. TRIGON smuggled documents from the embassy and took them to a safe-house, where Agency officers photographed them.
    [Show full text]
  • ISA 562 Information Security Theory & Practice
    ISA 562 Information Security Theory & Practice Introduction to Cryptography Agenda • Basics & Definitions • Classical Cryptography • Symmetric (Secret Key) Cryptography • DES (Data Encryption Standard) • Multiple Encryptions • Modes of Block Cipher Operations • Math Essential • Asymmetric (Public Key) Cryptography 2 1 Basics & Definitions Security Concepts (I) • Confidentiality – Prevent information from being exposed to unintended party – Ex: An employee should not come to know the salary of his manager • Integrity – Assure that the information has not been tempered – Ex: An employee should not be able to modify the employee's own salary • Identity – Assure that the party of concern is authentic - it is what it claims to be – Ex: An employee should be able to uniquely identify and authenticate himself/herself 4 2 Security Concepts (II) • Availability – Assure that unused service or resource is available to legitimate users – Ex: Paychecks should be printed on time as stipulated by law • Anonymity – Assure that the identity of some party is remain anonymous – Ex: The manager should not know who had a critical review of him • Non-Repudiation – Assure that authenticated party has indeed done something that cannot be denied – Ex: Once the employee has cashed his paycheck, he can’t deny it. 5 Cryptography • Crypt = secret • Graph = writing • Cryptography is the science / art of transforming meaningful information into unintelligible text Becoming a science that relies on mathematics (number theory, algebra) • Cryptanalysis is the science / art of breaking cryptographic codes • Cryptology is the science / art / study of both cryptography and cryptanalysis 6 3 Applications of Cryptography • Assuring document integrity • Assuring document confidentiality • Authenticating parties • Document signature • Non-repudiation • Secure transactions • Exchanging keys • Sharing Secrets • Digital cash • Preserving anonymity • Copyright protection • More .
    [Show full text]