The Monographic Substitution Cipher: From Julius Caesar to the KGB - Comments

  • Insights
  • Thread starter bapowell
  • Start date
  • Tags
    Substitution
In summary, the conversation discusses the topic of encryption and its various aspects, such as good encryption practices, potential weaknesses, and side-channel attacks. It also mentions the challenges of getting encryption right and the clever tactics used by attackers. The conversation highlights the importance of considering all factors when implementing encryption.
  • #1
bapowell
Science Advisor
Insights Author
2,243
260
bapowell submitted a new PF Insights post

The Monographic Substitution Cipher: From Julius Caesar to the KGB

cipher.png


Continue reading the Original PF Insights Post.
 
Last edited:
  • Like
Likes ShayanJ, nsaspook, Greg Bernhardt and 1 other person
Mathematics news on Phys.org
  • #3
Well done, I learned a lot. Thank you for the education.

It might be worthwhile to mention that good encryption practice would be to keep the message as short as possible to make statistical analysis more difficult. In the extreme, shortened plaintext morphs into code and encryption becomes unnecessary.
 
  • Like
Likes bapowell and Greg Bernhardt
  • #4
anorlunda said:
It might be worthwhile to mention that good encryption practice would be to keep the message as short as possible to make statistical analysis more difficult. In the extreme, shortened plaintext morphs into code and encryption becomes unnecessary.

On the other hand, if an attacker can control parts of the plaintext, compression can leak information as explained here: http://security.stackexchange.com/a/19914
 
  • #5
Lord Crc said:
n the other hand, if an attacker can control parts of the plaintext, compression can leak information as explained here: http://security.stackexchange.com/a/19914

I didn't have compression in mind. Nevertheless, the tactic you mention is clever. I'm reminded of the old "Spy Versus Spy" cartoons from Mad Magazine.:wink:
 
  • #6
anorlunda said:
I didn't have compression in mind.
But your scheme is a form of compression, since the encoded text gets shorter.

Anyway, just wanted to point out that getting encryption right is hard, so many things one have to consider.

And yes, the various side channels and so on they manage to exploit is impressive and does indeed feel like Spy vs Spy :)
 
  • #7
Lord Crc said:
if an attacker can control parts of the plaintext

I just remembered the canonical example of that, Heil Hitler.
 
  • #8
Chosen-plain/ciphertext attacks and hardware side channels are the bacon and eggs of Cryptanalysis.
In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.
 
Last edited:

Related to The Monographic Substitution Cipher: From Julius Caesar to the KGB - Comments

1. What is a monographic substitution cipher?

A monographic substitution cipher is a method of encoding a message by replacing each letter with a different letter or symbol. This type of cipher is commonly used in cryptography to protect sensitive information.

2. How does the monographic substitution cipher work?

In the monographic substitution cipher, each letter in the message is replaced with a different letter or symbol according to a predetermined key. For example, in the Caesar cipher, each letter is shifted a certain number of places in the alphabet to create the encoded message.

3. Who first used the monographic substitution cipher?

The monographic substitution cipher has been used throughout history, but it is believed that Julius Caesar was one of the first to use it extensively. The cipher was named after him due to his frequent use of it.

4. How secure is the monographic substitution cipher?

The security of the monographic substitution cipher depends on the complexity of the key used. If the key is easy to guess or if the same key is used repeatedly, the cipher can be easily broken. However, if a strong, random key is used and changed frequently, the cipher can be quite secure.

5. Was the monographic substitution cipher used by the KGB?

Yes, the KGB (Soviet Union's security agency) used a form of the monographic substitution cipher called the one-time pad during the Cold War. This cipher was considered unbreakable when used correctly, making it an essential tool for secure communication during espionage operations.

Similar threads

  • General Math
Replies
6
Views
2K
  • General Math
Replies
8
Views
2K
  • General Math
Replies
13
Views
2K
  • General Math
Replies
5
Views
2K
  • Special and General Relativity
2
Replies
50
Views
5K
Replies
25
Views
5K
  • General Math
Replies
26
Views
4K
  • General Math
4
Replies
105
Views
11K
  • General Math
Replies
12
Views
2K
  • General Math
Replies
2
Views
1K
Back
Top