//
post
Architecture

No interpreter required

If only people speaking different languages could communicate without the need of an interpreter. I’m thinking of the Trump-Putin encounters with translators present. Only unscrupulous leaders would bar their translators from disclosing to other trusted officials what was said.

But I’m also thinking of Leon Battista Alberti’s justification of his cipher technique, which was to enable confidential communication between rulers — without the need of interpreters.

“I can justly consider this cipher worthy of sovereigns, who can use it quite easily, with little effort and without being encumbered by use of an interpreter” (180).

Of course, in this case those in communication are many miles apart, share the same language, and the interpreter is a functionary who would receive a coded message and had the equipment and the knowledge to decode it and pass the translation on to the sovereign. Alberti’s cipher wheel was so simple that even a king could use it.

Couriers and interpreters lived dangerous lives, not least for the secrets they knew.  Human translators can’t easily have their memories erased, but easy-to-use translation machines reduce the risk of message leakage from a circuit of human intermediaries.

Polyalphabetics

Alberti’s cipher wheel looked something like this, providing a simple equivalence mapping between letters of the alphabet.

He used the Latin alphabet, and excluded a few letters as well, perhaps for symmetry (24 “houses”). According to a helpful YouTube clip by Ciphertown, the cipher disk user would represent H with two Fs, J with two Is or similar secondary coding. I’ll restrict myself to Alberti’s character set here to encode the simple communication:

AM I A PVPPET

With the disks in the position shown above that would result in a simple one-to-one mapping between characters. As long as you know how to align the two disks you could convert the secret message above to

g& v g shhpi

With the same cipher disk design and alignment the receiver could decode that back to the original message. But that’s also relatively easy for a cryptanalyst to decipher, especially with a longer message, considering letter frequency, something about the context, and iteration through combinations.

Cipher++

Here’s another encryption that is more difficult to decode using the same disk design, and knowing that the letter “g” is to serve as an indicator:

Ag& v g Cxxlm

The appearance of the letter A means align g on the inner disk with A on the outer disk. Taking each letter at a time, when the decoder encounters the upper case letter C she/he rotates the inner disk to align g with C to give a different set of mappings. The coder can insert such rotation cues throughout a long message. That would make it extremely difficult for an intercepting cryptanalyst to decode the message.

Shifting the index

It’s simple really, and there are elaborations on the method to make code breaking even more difficult. Alberti described the shift in alignment “changing the index”, and the family of such methods of shifting the alphabetical ordering at different points in the message is now called polyalphabetic encryption.

The WW2 German Enigma machine belonged to the same family of encryption machines, the method that eventually was broken by the cryptanalysts of Bletchley Park. See post: Phone hacking enigmas.

References

Note

About Richard Coyne

The cultural, social and spatial implications of computers and pervasive digital media spark my interest ... enjoy architecture, writing, designing, philosophy, coding and media mashups.

Discussion

One thought on “No interpreter required

  1. With respect to Code breaking, this might be of interest

    https://grahamshawcross.com/2014/04/16/william-tuttes-hidden-past/

    Posted by Graham Shawcross | January 19, 2019, 10:36 am

What do you think?

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

University of Edinburgh logo

Richard on Facebook


Or "like" my Facebook
page for blog updates.

Try a one year research degree

AHRC/EPSRC/ESRC/MRC project

book cover
book cover

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 338 other followers

Site traffic

  • 189,725 post views

%d bloggers like this: