BolivarTech News

BolivarTech News

Technology Evolution and Trends

BolivarTech News
  • About
  • License

Encryption Is Foundational to The Future (Part 2 The Century of Huge Advances)

  • Cryptography
  • General
  • Security

OTPThe 20th century was marked by huge advances in all the humanity areas, and the cryptography not was the exception.

At the begin of the 20th century, cryptography was a labor intensive, error prone process, capable of transforming a small amount of written material into an encoded cipher text form.

With the advancement of communication technology, encryption and decryption came to be actively performed during World War I.

On the first day of hostilities of the World War I, the British cable ship Telconia located and cut Germany’s transatlantic cables, forcing them to send all their international traffic via Sweden, American cables or wireless communications, and the German forces then started to encrypt their communications in an attempt to prevent hostile countries from reading them, but soon all German traffic was routinely routed to Room 40, the Royal Navy’s cypher organization.

ADFGVX_CipherThe ADFGX Cipher, conceived by Colonel Fritz Nebel of the German Army, was first put to practical use in 1918. It involves the writing of five letters, ADFGX, in a column and a row, and replaces a character with two characters, and the encryption method is essentially the same as the Uesugi Cipher up to this point. The distinguishing feature of the ADFGX cipher, however, is that the resulting series of letters is then ciphered again, this time by a transposition cipher method. The ADFGX Cipher was subsequently improved by using six characters, ADFGVX, instead of five, in order to make it easier to identify this cipher when messages were transmitted via Morse code.

Towards the end of WWI the head of cryptographic research for the US Army Major Joseph Mauborgne introduced the concept of a code based on truly RANDOM keys. This would take the form of two identical pads printed with lines of randomly generated letters. Using the Vigenere technique, each page is to be used to encrypt and decrypt ONE message and then destroyed; introducing the concept of the one use key.

The weakness of the Vigenere square was the repetition of the key. This new technique injected the same randomness into the cyphertext as was contained in the key and there was therefore no useable pattern or structure within the message. Attacks seeking to exploit these weaknesses such as the Babbage and Kasiski tests, would fail.

A key length of as little as 21 letters meant that a Key Exhaustion attack, the cryptographic equivalent of Custer’s last stand, would require the testing of 500 x 1027 keys and even then multiple decrypts may all appear plausible.

This method is still in use today, called the One Time Letter Pad or OTLP, and is used for encrypting the most secret of communications. OTLP is still the only ‘admitted’ system to provide the ‘holy grail’ of cryptography of perfect secrecy.

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

ADFGVX cryptanalysts encryption One Time Letter Pad OTLP Uesugi cipher Vigenère ciphers
2016-02-25 Julian Bolivar

Post navigation

Encryption Is Foundational to The Future (Part 3 The Begin of the Technological Age) → ← How to Handle OutOfMemoryError in Java

Related Posts

Happy Thanksgiving!!!

Encryption Is Foundational to The Future (Part 4 The Reign of the Electro-Mechanical Cyphers)

After the Word War II and during the Cold War, the security in sensitive communications was ruled by Electro-Mechanical Cyphers. Until the 1950’s the WWII the ECM Mark II was […]

Encryption Is Foundational to The Future (Part 3 The Begin of the Technological Age)

The first world war showed the importance of cryptography on the battlefield, and the danger of weak encryption. The second world war became a defining moment in the history of […]

Credit Card numbers or IMEI in Java (Luhn Algorithm)

In order to validate large numbers like credit card and International Mobile System Equipment Identity (IMEI) in every smartphone or tablet over the planet is used the Luhn Algorithm; in […]

Recent Posts

Embedded AI and Tiny Data

Right now we are living Artificial Intelligence (AI) boom bubble, where you can look the big progress that has been cooking in the labs for more than 30 years, some […]

More Info

Happy Thanksgiving!!!

More Info

Free Windows 10 Upgrade Finish Today

Today June 29, 2016 is the last day when you can apply the Windows 10 Upgrade from the eligible platforms, and the next August 2 is expected the Window 10 […]

More Info

The Artificial Intelligence is not Voodoo

The people in general demonize the things they do not understand, this is something that is happening from the beginning of the times. For example, before was the vaccines, organ […]

More Info
Powered by WordPress | theme SG Simple
Posting....