Читать книгу Secret and Urgent - The Story of Codes and Ciphers - Анон - Страница 15
V
ОглавлениеThis is the basic method in all decipherments of substitution ciphers. Admittedly the example shows the process at its shortest and simplest. In normal English text the alphabetic frequency tables are unreliable until two hundred or more letters have been reached in one message or two or three written with the same key. Still with the backing of the bigram and trigram tables any cryptographer can dismember any simple substitution cipher in a few minutes and with a minimum of trials. The fact was evidently widely known when Sicco Simonetta wrote that first book on ciphers, for he included alphabetic frequency tables in it.
At the same time the earliest codes were also being found wanting. In the sense that they are mentioned earlier, they antedate ciphers; and, like ciphers, appear to have grown out of the then new custom of keeping at foreign courts resident ambassadors who found it necessary to send reports home and ask for instructions. Venice and the Papal Curia were the first powers to use resident ambassadors; and, though the latter may well have used means of secret communication before the republic of the lagoons, the oldest reference to any code system is in an instruction to the Venetian ambassador at the Court of Austria. In his dispatches it is ordered to refer to the Doge as “V,” the King of Hungary as “P” and the Pope as “Q.”
The context alone would apparently betray the secrets of such messages if they were intercepted, an observation with which the Venetians evidently agreed; for only twelve years after this first crude code, another Venetian instruction orders the city’s diplomats to refer to important personages by periphrasis—that is, to speak of Austria as the “Sun,” since the sun rises in the east; the east = Ost = Österreich; and to replace all the verbs in their dispatches with meaningless words according to a regular system outlined in a little code dictionary they were given when setting out on a mission.
Then comes another of those gaps in cipher history, followed by the appearance of the Trattati in Cifra of G. di Lavinde in 1480. It is quite a remarkable book, showing cryptography already in a state of considerable development, for he recommends a method of decipherment by attacking the vowels, which is still classic for the Latin languages, and a method of defeating this decipherment, by first throwing messages into a kind of jargon-code, and then enciphering them by simple substitution with suppression of frequencies. Perhaps more remarkable still, di Lavinde’s official position was that of special secretary for secret communications before the Pope. Ciphers had already become so important a business at the Curia as to require the attention of a full-time expert.
Within the next hundred years every major court and minor principality of Italy, Spain and France was using ciphers, and all the great systems of encipherment but one had been invented. Decipherment does not seem quite to have kept pace; indeed it was nearly four hundred years before the classic method of deciphering double substitutions was discovered. Now in cryptography as in other fields of human activity necessity is so much the mother of invention that it is difficult to believe that if the complex systems of cipher had been widely used, means of breaking them down would not have become as widely known as the ciphers themselves. As a matter of fact, practically all the ciphers of which samples have been preserved to us from periods before the Napoleonic era belong to relatively simple types. It is difficult to avoid the conclusion that the more elaborate systems, though they were developed early, remained buried for some time in the theoretical manuals of the men who invented them.
This theory is considerably strengthened by the fact that we know northern Europe, where the greatest development in deciphering processes subsequently took place, did not take readily to ciphers in the early days of resident ambassadors. There were two or three striking historical incidents which painted the unreliability of the existing systems of cipher across the continent (they will be described later); and the North had long since developed its own device for private communication. Under the pressure of the rising art of diplomacy this device began to develop into a regular system. Its basis was a code which is not a code—jargon, cant, euphuism, the erection into a regular method of expression of that system which had formed part of the means of communication used by the Venetian agents in the fourteenth century.