I’ve got another secret!

Gabriellebirchak/ May 17, 2020/ Ancient History, Modern History

The date was May 17, 1975. It was just eight days before my ninth birth­day, and the pack­age arrived right on time, based on the eight to twelve-week win­dow required for ship­ping and han­dling! I took the box and ran to my room, care­ful­ly car­ry­ing the pack­age as though it con­tained frag­ile antique glass. Cau­tious­ly, I opened it. It was a sight to behold! It was my very first Secret Spy Scope pen, ful­ly equipped with a 6‑power wide field mag­ni­fi­er and 30-pow­er full micro­scope. Between this, my x‑ray glass­es, and my spe­cial­ly devel­oped cryp­tog­ra­phy code that any­body could prob­a­bly fig­ure out, my spy days were final­ly underway.

At the age of nine, I was obsessed with 007 sto­ries and Nan­cy Drew Mys­ter­ies. I thought I had the cryp­tog­ra­phy down pat, and I thought I had cre­at­ed a unique code that nobody could fig­ure out that sub­sti­tut­ed num­bers for let­ters and vice ver­sa and shift­ed the alpha­bet by five let­ters. It was easy to fig­ure out. And, as a result, the neigh­bor­hood kids found a mes­sage to my friend Susan, deci­phered it, and learned that I had a crush on the boy next door. I was dev­as­tat­ed and gave up my aspi­ra­tions to become a spy ear­ly on.

It would only be a short mat­ter of time before I would dis­cov­er that cryp­tog­ra­phy and its var­i­ous forms had been around for thou­sands of years. One of the first doc­u­ment­ed forms of cryp­tog­ra­phy comes from Caesar’s Cipher, where each let­ter in the alpha­bet is shift­ed by three places down the alpha­bet. It was first used by Julius Cae­sar and doc­u­ment­ed in his sto­ries about the Gal­lic Wars, which I will get to in a bit here.

Even though this mode of cryp­tog­ra­phy was named after Julius Cae­sar, cryp­tog­ra­phy and its var­i­ous forms had been around for hun­dreds of years. A method of cryp­tog­ra­phy is called steganog­ra­phy, and this includes hid­den mes­sages. Herodotus recount­ed this process when the Per­sian leader, Xerx­es, King of Kings, had planned to attack Greece’s Spar­ta in 480 BCE. Xerx­es thought he had a sure­fire plan of attack, but lit­tle did he know that there had been a spy among the Per­sians.  You see, while Xerx­es was mobi­liz­ing his forces, Demara­tus, a Greek ex-pat who was still loy­al to his home­land, was send­ing mes­sages back to Spar­ta and Athens using two wax tablets, called tab­u­la ceva­ta, to hide the mes­sage. Nor­mal­ly, these wax tablets were used in the class­room as writ­ing tablets. Since there were no pen­cils and erasers, teach­ers need­ed a tool that allowed for eras­ing mark­ings. Thus, in the class­room, teach­ers used tab­u­la ceva­ta, which were wood­en writ­ing tables. The tab­u­la ceva­ta was a wood­en tablet with a recessed sur­face that held col­ored wax. Teach­ers and stu­dents would write on the wax with a sty­lus made of bronze or iron. Like an era­sure on a pen­cil, the sty­lus had a flat end that allowed one to flat­ten out the wax in order to reuse the wax on the tab­u­la ceva­ta. The tab­u­la ceva­ta was­min­i­mal­ly bound with approx­i­mate­ly two to four tablets secured with a clasp. 

Tab­u­la cevata

How­ev­er, for Demara­tus, it was the per­fect spy tool. Herodotus wrote that Demara­tus would write Xerxes’s plans on the wood and then cov­er them with wax so that Xerxes’s guards could not see the mes­sage. Once the tablets arrived in Greece, they would scrape off the wax to read the mes­sages as they learned Xerxes’s plans for invasion.

Thus, when Xerx­es and his Per­sian troops arrived in Athens, the Greeks enticed the for­eign mil­i­tary to Athen’s shore­line, the Bay of Salamis. Xerx­es, think­ing he had trapped the Greeks, kept mov­ing in on the bay, unaware that his oppo­nent was prepar­ing to bat­tle. Once one of his ships, the Artemisia, arrived, it was sur­round­ed by Greek troops, who pro­ceed­ed to take down the entire Per­sian army.

Steganog­ra­phy was also used in Chi­na, as mes­sages were writ­ten on fine silk pieces, crum­bled into a tiny ball, and then cov­ered in wax. In order to con­ceal them until they got to their des­ti­na­tion, mes­sen­gers would swal­low the ball of wax. I do not know about you, but I would hate to be on the receiv­ing end of that message!

Though steganog­ra­phy is sim­i­lar to cryp­tog­ra­phy in that it hides a mes­sage, cryp­tog­ra­phy has a use­ful method of scram­bling the mes­sage. If it is found, it can­not be deci­phered. Back to Caesar’s shift, his let­ters first were trans­lat­ed from Roman to Greek and then were shift­ed three let­ters up so that his cipher alpha­bet began with D.

One of the first doc­u­ment­ed times of Caesar’s cipher was when Julius Cae­sar was send­ing mes­sages to his long long­time friend and trust­ed advi­sor the Roman Sen­a­tor Cicero. Cae­sar was attempt­ing to take down the Roman Empire. He had already pro­claimed him­self as Rome’s dic­ta­tor, and the Roman sen­ate was not hap­py about this. Dur­ing Caesar’s attempt to take down the Roman Empire, he was send­ing encrypt­ed mes­sages to Cicero. The mes­sage was encrypt­ed so that the Roman let­ters were replaced with Greek let­ters, and the entire alpha­bet was shifted.

The mes­sen­ger was sup­posed to deliv­er the mes­sage to Cicero. How­ev­er, he was instruct­ed that if he could not approach the encamp­ment where Cicero was, the mes­sen­ger was to hurl the spear with the let­ter fas­tened to it into the entrench­ment of the camp. Instead, the mes­sen­ger hurled the spear at the entrench­ment where Cicero was, and it stuck in the tow­er for three days until a guard noticed it. Thus, through­out the Gal­lic Wars, Cae­sar con­tin­ued to use this form of cryp­tog­ra­phy to com­mu­ni­cate with his advi­sors and army. His meth­ods and forms of com­mu­ni­ca­tion proved to be use­ful as he won the Gal­lic wars.

The Gal­lic wars is one of many instances where cryp­tog­ra­phy has been use­ful in com­bat. On the morn­ing of Feb­ru­ary 19, 1945, Unit­ed States Marines entered the shore of Iwo Jima’s island. This planned attack last­ed for five weeks. How­ev­er, the advance­ments they made on this island would not have been pos­si­ble if it was not for Nava­jo code talk­ers. The Nava­jos have a unique lan­guage that has no asso­ci­a­tion with Euro­pean or Asian lan­guages. As a result, they cre­at­ed an unbreak­able code that allowed for effec­tive com­mu­ni­ca­tion with­in our military.

Even today, inter­net plat­forms are secure through pub­lic key cryp­tog­ra­phy. Pub­lic key cryp­tog­ra­phy was intro­duced by Stan­ford engi­neer Mar­tin Hell­man, Whit­field Diffie, and Ralph Merkle. Pub­lic key cryp­tog­ra­phy is a process that uses two keys, a pri­vate key that is used to encrypt, decrypt, and dig­i­tal­ly sign files, and a pub­lic key that is used to encrypt and ver­i­fy dig­i­tal sig­na­tures. Before these bril­liant cryp­tog­ra­phers first came up with this con­cept, encryp­tion and decryp­tion were sym­met­ri­cal and were the same.

Cryp­tog­ra­phy has evolved in such a dis­tinc­tive way that we can now use it for cryp­tocur­ren­cy, authen­ti­ca­tion, pri­va­cy, and to deter recent advance­ments in quan­tum code-breaking.

So today, we are faced with the chal­lenge of mak­ing com­plete­ly unbreak­able encryp­tion. Pos­si­bly we are jinx­ing the word Unbreak­able by say­ing that encryp­tion can be unbreak­able. How­ev­er, today, sci­en­tists are cur­rent­ly uti­liz­ing key dis­tri­b­u­tion tech­niques derived from quan­tum com­put­ing. They are cre­at­ing keys out of pho­tons to pro­duce unbreak­able encryption.

The fol­low­ing video is a TED Talk giv­en by John Prisco, the CEO of Quan­tum Exchange. He goes into how to make unbreak­able encryption.

It is insane­ly excit­ing to see how far we have come in cryp­tog­ra­phy and encryp­tion. More­over, if we can cre­ate keys out of pho­tons, I hon­est­ly can­not think of how we could advance fur­ther on this lev­el of quan­tum com­put­ing. As for me, my head is always in the past, learn­ing the his­to­ry of stuff. When I learn about the advance­ments that we are mak­ing in cryp­tog­ra­phy, it just re-instills my faith in the pow­er of sci­ence and math­e­mat­ics and our human intel­lect that we can cre­ate a world that, at one time, was utter­ly unimag­in­able. With the excep­tion of his­to­ry, that is the pow­er of math and sci­ence. Until next week, carpe diem!

Share this Post