Can We Crack the Code? Understanding the Concepts of Deciphering

  • Thread starter FateEternal
  • Start date
  • Tags
    Concepts
In summary, deciphering codes can be a complex process that involves identifying the encryption algorithm and obtaining a key. Some basic ciphers can be cracked without significant computation, but more sophisticated ones may require a computer or extensive time. The history of cryptography is fascinating and has evolved alongside advances in technology and communication.
  • #1
FateEternal
8
0
Can anyone explain the concepts of deciphering codes such as these?

CUSFOOEOLYIULSNAOFSDLGTUTAPURIWYNICAOOTDEKDNNHGCY
 
Engineering news on Phys.org
  • #2
That would entirely depend upon how it's encrypted. The best approach (that I'm aware of) for transposition codes is to look for the most common character first. Generally, in English, that will be an 'e'. Repeating sequences are the next thing that I look for. If there are a lot of instances of ' w9t ' , for instance, it's reasonable to suspect that it represents ' the '. That's reinforced if you have already assigned 'e' to 't'. You then go back and replace every 'w' in the text with a 't', and every '9' with an 'h'. Your instance doesn't show word breaks, though, so it's a bit harder. Some patterns within other words then make themselves apparent, so you can exptrapolate what a particular word might be. Fill it out, and then copy the new letters that you get from that into the other words.
While I don't know, I assume that computer code-breaking takes the same basic approach, but is also capable of deducing whether or not some complex mathematical manipulation has been used in encoding it.
Another encryption method could have each letter stand for a number. The first two or three digits can stand for the page number in a pre-selected book, the next two the line number, the next two the word number, and the last 1 or 2 the letter number within that word. The interceptor would have to know the specific edition of the specific book in order to figure it out.
One that I came up with myself involves a simple transposition code ('a' = 'g', etc.), but every fifth word is English, interspersed with French, German, Spanish, Cockney rhyming slang, whatever. The tricky part is using words in each language that don't include 'special' characters not used in English. I also avoid using common words such as 'the', or 'it'.
I've never put it to the test, since I just thought it up while typing this post, but I suspect that it would be fairly effective unless attacked by a professional cryptographer. :biggrin:
 
Last edited:
  • #3
That isn't a question of cryptography, its called cryptanalysis i beleive.

Cryptography deals with generating and using Cryptographic methods. Cryptanalysis is a study of breaking and circumventing such methods, though i believe it is said that you have to know both to be a good cryptographer.

I only know that i know neither.
 
  • #4
Pardon the terminology slip-up. I should have known better. :redface:
 
  • #5
Danger: Sorry, wasnt aimed at you, just a pointer to the OP

I find the historical background of cryptanalysis the most facinating because it conveyed to me a sense of emergency and neccesity in both developing and cracking codes and ciphers for various ( usually military or political ) reasons.

Ive read a couple of popular science type books on codes and cryptography as well as some basic practical cryptographic texts.

You also get to learn the the basic ideas around the subject from some of the earliest ciphers and codes, most of which are like those you play with as child with secret writings etc, through to the mind boggling specialist field it has become today.

I found it interesting because electronic communication, computers, coding, electronics and maths all come together with cryptography and cryptanalysis in a historical context. In fact understanding simple morse code as a form of communication and the history behind the Enigma machine and breaking such codes is a great way to learn about modern digital computers i think.

Secret writings go back as far as writing itself, but think it really gets interesting at times of war. I don't know anything about the real hardcore modern cryptography though, i just have a passing interest in the history of communication.
 
Last edited:
  • #6
What astonishes me is the unmitigated audacity of the US government in trying to make a branch of mathematics illegal. I refer to the 'public key' encryption which even the NSA's computer power can't crack. While they have no jurisdiction over me anyhow, I wouldn't put up with it if I was a US citizen. If I want to encrypt something in any manner whatsoever, I'll damned well do it and they can get stuffed. :grumpy:
 
  • #7
This is not really relavent to the thread, but is with respect to danger's post.

In some ways I agree with you, although, I am quite prepared to settle for slightly weaker encryption if it means that terrorists are caught more easily, so I am inclined to side with the government (providing that it is a democratic and generally responsible government), having said that, I think that the US government isn't solving the problem in the right way.
After all, the government of any country has a responsiblity to protect its citizens, and the only way to protect them from terrorism is to collect information.
 
  • #8
FateEternal said:
Can anyone explain the concepts of deciphering codes such as these?

CUSFOOEOLYIULSNAOFSDLGTUTAPURIWYNICAOOTDEKDNNHGCY
There's no way, by looking at a string of characters, to tell what the ecryption algorithm is. And even if you know what the algorithm is, decryption typically needs a key.

Some of the cruder (ie: centuries old) encryption schemes can be decryted reasonable easily given a long enough string. For a string of about 50-odd characters, only the most basic ciphers can be cracked without significant computation. In this particular case, you can see if it's a monoalphabetic substitution cipher by doing a frequency analysis (as Danger suggested) and following up from there. But before that, perhaps you'd want to check even more basic ciphers like a shift or scroll cipher. Really, the options you choose depend on the context.

Anything more sophisticated than that will need a computer (you could crack other substitution ciphers, book ciphers or maybe a Vigenere cipher without a computer, if you have a lot of time on your hands).
 
  • #9
Danger said:
I refer to the 'public key' encryption which even the NSA's computer power can't crack.

Only the NSA knows what the NSA can break. It would seem reasonable they are capable of breaking codes somewhat more secure than whatever the current legal cutoff is, so you really have no idea if you are safe from "them" (tinfoil hat on standby).


Some more detail on breaking a substitution cipher (though as mentioned you can't tell this is what the OP's ciphertext is) http://www.simonsingh.net/The_Black_Chamber/crackingsubstitution.html
 
  • #10
shmoe said:
Only the NSA knows what the NSA can break.
You're right about that, of course, but the reason that they gave for trying to classify the concept was that they can't. (That's not to say that they're telling the truth, though, which is never a sure thing.)
 

What is deciphering?

Deciphering is the process of converting a coded or encrypted message into a readable format. It involves using various techniques and methods to understand the meaning of the coded message.

Why is deciphering important?

Deciphering is important because it allows us to understand encrypted or hidden information. This can be useful in various fields such as intelligence, security, and communication.

What is a code?

A code is a system of symbols or letters used to represent messages or information. It is created to hide the meaning of the message from anyone who does not have the key to decipher it.

What are some common techniques used in deciphering codes?

Some common techniques used in deciphering codes include frequency analysis, pattern recognition, and substitution. These techniques involve analyzing the frequency of letters or symbols, looking for patterns, and replacing letters or symbols with their corresponding counterparts.

What are some real-life applications of deciphering codes?

Deciphering codes has many real-life applications, such as breaking enemy codes in war, decoding encrypted emails, and understanding ancient languages and scripts. It is also used in fields like cryptography, data encryption, and computer security.

Similar threads

Replies
4
Views
176
Replies
20
Views
1K
Replies
2
Views
691
  • Programming and Computer Science
Replies
13
Views
4K
  • Computing and Technology
Replies
4
Views
1K
Replies
32
Views
2K
Replies
2
Views
826
Replies
14
Views
729
  • Electrical Engineering
Replies
5
Views
864
  • New Member Introductions
Replies
1
Views
63
Back
Top