The Monographic Substitution Cipher: From Julius Caesar to the KGB - Comments

  • Context: Insights 
  • Thread starter Thread starter bapowell
  • Start date Start date
  • Tags Tags
    Substitution
Click For Summary

Discussion Overview

The discussion revolves around the Monographic Substitution Cipher, exploring its historical context from Julius Caesar to modern applications, particularly in cryptography. Participants engage in technical explanations and conceptual clarifications regarding encryption practices and vulnerabilities.

Discussion Character

  • Technical explanation
  • Conceptual clarification
  • Debate/contested

Main Points Raised

  • Some participants suggest that keeping messages short can enhance encryption by complicating statistical analysis, potentially leading to a scenario where encryption becomes unnecessary.
  • Others argue that if an attacker can control parts of the plaintext, compression techniques could inadvertently leak information.
  • A participant notes that achieving effective encryption is complex, highlighting the need to consider various factors, including side-channel attacks.
  • There is a mention of the interplay between chosen-plaintext/ciphertext attacks and hardware side channels, emphasizing their significance in cryptanalysis beyond just algorithmic weaknesses.

Areas of Agreement / Disagreement

Participants express differing views on the implications of message length and compression in encryption, indicating that multiple competing perspectives remain without a clear consensus.

Contextual Notes

Some discussions reference specific examples and tactics in cryptanalysis, but the implications of these examples and the effectiveness of proposed strategies remain unresolved.

bapowell
Science Advisor
Insights Author
Messages
2,243
Reaction score
261
bapowell submitted a new PF Insights post

The Monographic Substitution Cipher: From Julius Caesar to the KGB

cipher.png


Continue reading the Original PF Insights Post.
 
Last edited:
  • Like
Likes   Reactions: ShayanJ, nsaspook, Greg Bernhardt and 1 other person
Mathematics news on Phys.org
Well done, I learned a lot. Thank you for the education.

It might be worthwhile to mention that good encryption practice would be to keep the message as short as possible to make statistical analysis more difficult. In the extreme, shortened plaintext morphs into code and encryption becomes unnecessary.
 
  • Like
Likes   Reactions: bapowell and Greg Bernhardt
anorlunda said:
It might be worthwhile to mention that good encryption practice would be to keep the message as short as possible to make statistical analysis more difficult. In the extreme, shortened plaintext morphs into code and encryption becomes unnecessary.

On the other hand, if an attacker can control parts of the plaintext, compression can leak information as explained here: http://security.stackexchange.com/a/19914
 
Lord Crc said:
n the other hand, if an attacker can control parts of the plaintext, compression can leak information as explained here: http://security.stackexchange.com/a/19914

I didn't have compression in mind. Nevertheless, the tactic you mention is clever. I'm reminded of the old "Spy Versus Spy" cartoons from Mad Magazine.:wink:
 
anorlunda said:
I didn't have compression in mind.
But your scheme is a form of compression, since the encoded text gets shorter.

Anyway, just wanted to point out that getting encryption right is hard, so many things one have to consider.

And yes, the various side channels and so on they manage to exploit is impressive and does indeed feel like Spy vs Spy :)
 
Lord Crc said:
if an attacker can control parts of the plaintext

I just remembered the canonical example of that, Heil Hitler.
 
Chosen-plain/ciphertext attacks and hardware side channels are the bacon and eggs of Cryptanalysis.
In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.
 
Last edited:

Similar threads

  • · Replies 0 ·
Replies
0
Views
3K
  • · Replies 6 ·
Replies
6
Views
2K
  • · Replies 6 ·
Replies
6
Views
2K
  • · Replies 8 ·
Replies
8
Views
3K
  • · Replies 13 ·
Replies
13
Views
2K
  • · Replies 8 ·
Replies
8
Views
3K
  • · Replies 5 ·
Replies
5
Views
2K
  • · Replies 26 ·
Replies
26
Views
5K
  • · Replies 12 ·
Replies
12
Views
3K
  • · Replies 105 ·
4
Replies
105
Views
14K