{"id":179689,"date":"2024-01-23T11:09:27","date_gmt":"2024-01-23T10:09:27","guid":{"rendered":"https:\/\/us.edu.pl\/?p=179689"},"modified":"2024-04-30T17:04:32","modified_gmt":"2024-04-30T15:04:32","slug":"od-szyfru-cezara-przez-enigme-po-komputery-kwantowe-dzien-kryptologii","status":"publish","type":"post","link":"https:\/\/us.edu.pl\/en\/od-szyfru-cezara-przez-enigme-po-komputery-kwantowe-dzien-kryptologii\/","title":{"rendered":"From Caesar\u2019s cypher to Enigma and quantum computers \u2013 Cryptology Day"},"content":{"rendered":"<p><\/p>\n<p>[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_separator]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<h3 style=\"text-align: center;\">Cryptology Day \u2013 25 January<\/h3>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[vc_separator]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p><span style=\"font-size: 12px;\">| Prof. Jerzy Dajka |<\/span><\/p>\n<p><strong>Origins of cryptography reach back to the 19th century BCE, however, the term \u2018cryptology\u2019 was first used in 1844 when \u2013 borrowing from Greek <em>krypt\u00f3s<\/em> and<em> logos \u2013 <\/em>the art of searching for the hidden received its name.<\/strong><\/p>\n<p>Until the middle of the 20th century, cryptography was primarily used by the military and diplomatic service. The protocols used were based on sharing a <em>secret key<\/em> that was used by the parties to \u2018translate\u2019 messages into ciphertext and ciphertext into messages. Many of the tools used at the time are of rather historical interest today, e.g. the Spartan scytale, the so-called Caesar cypher, or the Vigenere cypher. It was not until mathematicians and cryptologists played a decisive role in deciphering the German Enigma and the impact of this event on the course of World War II that cryptology began to be widely perceived as an effective and dangerous tool of war.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<h3>Key to knowledge and secrets<\/h3>\n<p>Cryptology involves building and analysing protocols that will not allow unauthorised people and systems to decrypt messages. The primary goal is to guarantee fundamental safety functions: confidentiality, message integrity, making authentication possible, and guarantee non-repudiation. In other words, the protocol should guarantee that the message that we are sending won\u2019t be read (and understood) by unauthorised people, that someone won\u2019t add or delete anything from it, that it will be undersigned, and that we won\u2019t be able to deny sending the message even if we really wanted to.<\/p>\n<p>As modern mathematics entered the field of cryptology, i.e. numbers theory, probability, information theory, and modern algebra, symmetric protocols, using a secret key, started becoming increasingly subtle. However, there was still the problem of generating a secret key and transferring it to someone without the risk of exposure. During the Cold War in the 1960s, solving this problem was a priority. However, the solution and a true breakthrough came in the 1970s with the Diffie\u2013Hellman protocol and the RSA cryptosystem laying the foundations for <em>public key<\/em> cryptography. These protocols not only allowed to generate a secret key for quick symmetric protocols but also were the basis for completely new solutions, e.g. today\u2019s digital signature.<\/p>\n<p>Thanks to Ron Rivest, as well as Adi Shamir and Leonard Adleman \u2013 creators of RSA, modern cryptology brought also a new family onto the scene: the inseparable Alice and Bob. Ever since then, many cryptology works begin with the words: \u2018Alice wants to send a message to Bob\u2019. Alice and Bob engage in confidential and undeniably authenticated (using hash functions, passwords, identification) transmission of information, exchange a key between them, share common secrets, flip a coin at a distance (bit commitment) and even boast about their achievements without displaying them openly (zero-knowledge proof). Alice and Bob are eavesdropped on by Eve and attacked by Mallory or Charlie, which makes the \u2018crypto-family\u2019 complete, even if a little dysfunctional.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1705932929889{background-color: #f2f2f2 !important;}&#8221;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p><img class=\"size-full wp-image-179693\" src=\"https:\/\/us.edu.pl\/wp-content\/uploads\/fotografie\/Mural-Enigma-fot.-Tomek-Grzaslewicz.jpg\" alt=\" Mural na Koszutce z Polakami, kt\u00f3rzy mieli sw\u00f3j wp\u0142yw na rozszyfrowanie kodu Enigmy\" width=\"100%\" height=\"auto\" srcset=\"https:\/\/us.edu.pl\/wp-content\/uploads\/fotografie\/Mural-Enigma-fot.-Tomek-Grzaslewicz.jpg 800w, https:\/\/us.edu.pl\/wp-content\/uploads\/fotografie\/Mural-Enigma-fot.-Tomek-Grzaslewicz-768x535.jpg 768w, https:\/\/us.edu.pl\/wp-content\/uploads\/fotografie\/Mural-Enigma-fot.-Tomek-Grzaslewicz-575x400.jpg 575w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><span style=\"font-size: 12px;\">In 2023, a mural depicting Polish people who helped crack the code for the German cypher machine Enigma was unveiled. The building with the mural is located at ul. Katowicka 37A, in the Katowice district of Koszutka. The mural depicts the three following cryptologists: Marian Rejewski, Jerzy R\u00f3\u017cycki, and Henryk Zygalski.<\/span><\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<h3>To break the cipher<\/h3>\n<p>Although, the mathematics concepts used for the RSA protocols were not novel at the time of its creation and were based on the discoveries made several centuries back, achieving a satisfying level of security necessitates the utilisation of large numbers, which are difficult to calculate the way our ancestors did \u2013 by hand, without using computers. This and the obvious interest in confidentiality by the military caused secret-key cryptography to have no real alternative for quite a long time. Meanwhile, the progress in cryptology theory along with the development of computing methods became a blessing and a curse for the safety of cryptosystems.<\/p>\n<p>When Martin Gardner used RSA to leave an encrypted text in S<em>cientific American <\/em>in 1977 (<em>Scientific American <\/em>237 (2): 120\u2013124) and was convinced that deciphering it would take \u2018millions of years\u2019, he certainly did not expect that just after 17 years the world will find out that \u2018the magic words are squeamish ossifrage\u2019 thanks to a brute force attack, internet, and distributed computing.<\/p>\n<p>Along with the developments made in cryptography and the appearance of various cryptosystems, different attack methods have also emerged, depending on the tools and knowledge that has become available. If the hypothetical Eva has a cyphertext, she can, being a good linguist, she can, being a good linguist, attempt to reconstruct the plaintext by way of letter or word frequency analysis. If she has the plaintext and the respective cyphertext, she can attempt to understand the encryption mechanism. Historic cyphers were vulnerable to such attacks. If Even can encrypt a given plaintext all on her own, then she is also on a path to success: this kind of attack was executed by mathematicians and cryptologists when they were reconstructing Enigma\u2019s encryption process. If Eve has the cypher at her disposal, she can attempt to modify it slightly and check whether the deciphered message will turn into gibberish: in this case \u2018Eve\u2019 can be a server modifying the encrypted message and observing the reaction of the recipient.<\/p>\n<p>Attacks can be carried out \u2018by brute force\u2019, using increasing and available computing power, based on the physical characteristics of cryptosystem implementations (the use of copies of Enigma is a historical example), and very often by seemingly non-cryptology methods of \u2018social engineering\u2019. Among the possible attack methods, analytical attacks that take advantage of the weaknesses of the encryption methods themselves are the most beautiful. It is worth pointing out here that the modern standard is the 19th-century Kerckhoff\u2019s principle, according to which the method of encryption must not be required to be secret and the acquisition of the method must not cause problems.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<h3>Information security<\/h3>\n<p>The set of contemporary threats to the confidentiality of encrypted messages is now being expanded to include risks associated with the development of quantum computers. A very important group of cryptosystems bases its security on the difficulty (in terms of computational complexity) of today\u2019s known solutions to the problem of decomposing numbers into prime factors or the discrete logarithm. To put it simply \u2013 we do not know how to solve these problems, and therefore break the cryptosystems based on them, in a reasonably short time. Access to a quantum computer that enables an efficient implementation of Shor\u2019s algorithm will change this situation, as the computation time required to break a large group of cryptosystems will go from being ludicrously exponential to pleasantly polynomial. The response to this threat is, on the one hand, the thriving development of post-quantum cryptography, which, although classical in essence, is resistant to attack using Shor\u2019s algorithm, and, on the other hand, the increasing use of quantum cryptography whose security is guaranteed by Mother Nature herself, provided it is implemented correctly.<\/p>\n<p>Together with the \u2018era of information\u2019 came the common and frequent use of cryptological solutions. While people still painstakingly scratch out passwords on the backs of their credit cards, modern and secure methods of ensuring the security of data transmission have emerged using widely accepted security standards verified by subtle certification methods. Alice and Bob are increasingly often non-human entities, i.e. servers, smart cars, and even smarter fridges. We want to believe that our communication is safe and confidential and that no unauthorised person can eavesdrop and forge our messages, even in the name of the \u2018common good\u2019.<\/p>\n<p>Nowadays, an area where cryptology plays a crucial role (or at least should) is online election voting systems. Electronic and remote voting is becoming an increasingly common form of casting a vote. Even this year\u2019s elections at the University of Silesia are done online. Modern cryptology provides us now with a range of reliable tools that should constitute the foundation for true democracy. It is worth bearing in mind that non-compliance with security standards can (and even should) be a basis to contest election results. Voting must be carried out correctly: only those entitled to vote can cast a vote and they do so only once, votes may not be swapped or the results altered in any way, and voters must be guaranteed verifiability and privacy. In addition, the above-mentioned Kerckhoff principle about the open knowledge of the method used should apply here too. If, due to various reasons, we are not certain that we can comply with the strict security standards of electronic voting, employing some other, more secure but less modern method, should be considered.<\/p>\n<p>Today, wrapped up in the social web and the Internet of Things (IoT), we forget that our security is guarded by algorithms, the fruits of the labour of generations of mathematicians and cryptologists, and they do so to a far greater extent than was the case in the wartime days of Enigma. Even though cryptology might not seem like a tool of war, we should remember the wise words of ancient people \u2013 <em>si vis pacem, para bellum <\/em>\u2013 and bear in mind that cryptology has earned its own day.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[vc_separator]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p>The article was written for the <a href=\"https:\/\/ain.us.edu.pl\/\">Scientific Information Agency of the University of Silesia in Katowice<\/a>.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[vc_separator][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1706004495139{background-color: #f2f2f2 !important;}&#8221;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p><strong>Prof. Jerzy Dajka<\/strong> \u2013 a physicist from the August Che\u0142kowski Institute of Physics of the University of Silesia in Katowice and Vice-Director of <a href=\"https:\/\/us.edu.pl\/en\/nauka-i-badania\/centra-badawcze\/interdyscyplinarne-centrum-badawcze-nauk-sadowych-i-legislacji-im-prof-tadeusza-widly\/\">The Professor Tadeusz Wid\u0142a Interdisciplinary Research Centre for Forensic Science and Legislation of the University of Silesia<\/a><\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row]<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_separator][vc_separator][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1705932929889{background-color: #f2f2f2 !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_separator][vc_separator][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1706004495139{background-color: #f2f2f2 !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row] [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/us.edu.pl\/en\/od-szyfru-cezara-przez-enigme-po-komputery-kwantowe-dzien-kryptologii\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":3279,"featured_media":179693,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_expiration-date-status":"","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[]},"categories":[82,51],"tags":[1646],"acf":[],"_links":{"self":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts\/179689"}],"collection":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/users\/3279"}],"replies":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/comments?post=179689"}],"version-history":[{"count":1,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts\/179689\/revisions"}],"predecessor-version":[{"id":185110,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts\/179689\/revisions\/185110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/media\/179693"}],"wp:attachment":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/media?parent=179689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/categories?post=179689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/tags?post=179689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}