My Info Blog

The Unbreakable Code

To be able to encrypted secret or important documents has been around for centuries. The historical Greek State of Tempas was the first to employ cryptology methods to protect important military marketing and sales communications. A baton device called a Scytale was used to encrypt military information that has been relayed to commanders on the battlefield. Every commander had an exact duplicate of the creux in shape, size and dimensions used to encrypt the original message. online psn code generator

The baton was the security key necessary to decrypt the message as directed. The idea was, without the duplicate baton the message was considered secure. It was possible the baton could be thieved or even fall into enemy hands. In which case, the secret information being transmitted could be decoded. Also, the security algorithm was not actually complicated and may be cracked. 

Cryptology Conditions

– Info Encryption Standard (DES)

– Advanced Encryption Standard (AES)

– Encryption: Method by which data or information is rendered into a cipher form, that can not be read without the exact step to unlock concept

– Plaintext: Original concept

– Ciphertext: The protected message

– Decoded cipher: Message decrypted using an encryption algorithm or key to reveal the initial plaintext message

During the times of Julius Caesar a more advanced cryptology method was developed to switch the Scytale. This cryptology method became known as the Caesar Cipher. The strategy involved moving letters a fixed distance in ok bye to circle of words to produce an encrypted meaning. The Caesar Cipher showed a substantial improvement over the inherit vulnerability of the Scytale by allowing changed letters to symbolize characters of the plaintext concept. The letter “A”, for example, might be moved 5 places in the message. The original text message character would now concur to the letter “F” which represents the 6th letter of the abece. By repeating this process important messages, could be sufficiently encrypted to permit magic formula communication to be sent.

In the case of Caesar Cipher, the key was to shift each letter of plain text message 1-25 places. The amount zero “0” cannot be used because the consequence would yield no change in the position of cipher text letters. Therefore, the message would not be encrypted.

The Caesar Cipher, like most ciphers, has a mathematical passed down weakness. The Caesar Cipher shifted letters of the alphabet. Consequently, the key is limited mathematically to 25 possible shift places. Today, modern computers are able to use very complex and complex encryption algorithms like M. E. S or AES to encrypted important information using 256 bit tips.

Given enough time and computing power, almost all ciphers can be cracked by using a method called incredible force attack which simply test every possible blend of letters, symbols and numbers until the security truth is found. Found in the case of Caesar Cipher, one would need to try 25 changes in characters before disregarding the code to reveal the plain text original message.

In today’s high end computer age, even advanced encryption algorithms are prone and is broken overtime, however,, with one exception, the one-time pad.

During the World War II period Soviet spies and other intelligence officers would use the one-time pad method to transmits and send important top-secret messages back again to their handlers or head quarters. The cipher text created is totally unbreakable. The encryption criteria to create an 1-time pad is simple, in principal, but difficult to implement and control for large-scale information transmissions. On the other hand, when the encryption code is utilized for short communications, the inconvenience factor passages the privacy factor simply cannot be beaten.

Leave a Reply

Your email address will not be published. Required fields are marked *