Null cipher

Last updated

A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext. [1]

Contents

This is one of three categories of cipher used in classical cryptography along with substitution ciphers and transposition ciphers. [2]

Classical cryptography

In classical cryptography, a null is an extra character intended to confuse the cryptanalyst. In the most common form of a null cipher, the plaintext is included within the ciphertext and one needs to discard certain characters in order to decrypt the message (such as first letter, last letter, third letter of every second word, etc.) [1] Most characters in such a cryptogram are nulls, only some are significant, and some others can be used as pointers to the significant ones. [2]

Here is an example null cipher message, sent by a German during World War I: [3]

PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY.

Taking the first letter of every word reveals the hidden message "Pershing sails from N.Y. June I".

Following is a more complicated example from England's Civil War which aided Royalist Sir John Trevanian in his escape from a Puritan castle in Colchester: [4]

WORTHIE SIR JOHN, HOPE, THAT IS YE BESTE COMFORT OF YE AFFLICTED, CANNOT MUCH, I FEAR ME, HELP YOU NOW. THAT I WOULD SAY TO YOU, IS THIS ONLY: IF EVER I MAY BE ABLE TO REQUITE THAT I DO OWE YOU, STAND NOT UPON ASKING ME. TIS NOT MUCH THAT I CAN DO; BUT WHAT I CAN DO, BEE YE VERY SURE I WILL. I KNOW THAT, IF DETHE COMES, IF ORDINARY MEN FEAR IT, IT FRIGHTS NOT YOU, ACCOUNTING IT FOR A HIGH HONOUR, TO HAVE SUCH A REWARDE OF YOUR LOYALTY. PRAY YET YOU MAY BE SPARED THIS SOE BITTER, CUP. I FEAR NOT THAT YOU WILL GRUDGE ANY SUFFERINGS; ONLY IF BIE SUBMISSIONS YOU CAN TURN THEM AWAY, TIS THE PART OF A WISE MAN. TELL ME, AN IF YOU CAN, TO DO FOR YOU ANYTHINGE THAT YOU WOLDE HAVE DONE. THE GENERAL GOES BACK ON WEDNESDAY. RESTINGE YOUR SERVANT TO COMMAND.

The third letter after each punctuation reveals "Panel at East side of Chapel slides".

A similar technique is to hide entire words, such as in this seemingly innocent message written by a prison inmate but deciphered by the FBI: [5]

SALUDOS LOVED ONE
   SO TODAY I HEARD FROM UNCLE MOE OVER THE PHONE. HE TOLD ME THAT YOU AND ME GO THE SAME BIRTHDAY. HE SAYS YOUR TIME THERE TESTED YOUR STRENGTH SO STAY POSITIVE AT SUCH TIMES. I'M FOR ALL THAT CLEAN LIVING! METHAMPHETAMINES WAS MY DOWN FALL. THE PROGRAM I'M STARTING THE NINTH IS ONE I HEARD OF A COUPLE WEEKS BEFORE SEPTEMBER THROUGH MY COUNSELOR BARRIOS. BUT MY MEDICAL INSURANCE COVERAGE DENIES THEY COVER IT. I'M USING MY TIME TO CHECK AND IF THE INSURANCE AGENT DENIES STILL MY COVERAGE I'M GETTING TOGETHER PAPERWORK SAYING I TESTED FOR THIS TREATMENT REQUIRED ON THE CHILD CUSTODY. THE NINTH WILL MEAN I HAVE TESTED MY DETERMINATION TO CHANGE. ON THE NEXT FREE WEEKEND THE KIDS ARE COMING, BUT FIRST I GOTTA SHOW CAROLINA I'M STAYING OUT OF TROUBLE WAITING TO GET MYSELF ADMITTED ON THE PROGRAM. THE SUPPORTING PAPERWORK THAT THE FAMILY COURTS GOT WILL ALSO PROVE THERE'S NO REASON NEITHER FOR A WITNESS ON MY CHILDREN'S VISITS. OF COURSE MY BRO HAS HIS MIND MADE UP OF RECENT THAT ALL THIS DRUG USAGE DON'T CONCERN OUR VISITS. I THINK THAT MY KIDS FEEL I NEED THEIR LOVE IF I'M GONNA BE COOL. GUILTY FEELINGS RISE ON ACCOUNT OF THE MISTAKES I COULD WRITEUP. FOR DAYS I'M HERE. HE GOT A GOOD HEART. SHOULD YOU BE HAVING PROBLEMS BE ASSURED THAT WHEN YOU HIT THE STREETS WE'LL BE CONSIDERING YOU...

Taking only every fifth word, one can reconstruct the hidden text which recommends a "hit" on someone:

TODAY MOE TOLD ME HE TESTED POSITIVE FOR METHAMPHETAMINES THE NINTH OF SEPTEMBER BUT DENIES USING AND DENIES GETTING TESTED ON NINTH
TESTED ON THE FIRST
I'M WAITING ON PAPERWORK
GOT NO WITNESS OF HIS RECENT USAGE
I FEEL IF GUILTY OF WRITEUP HE SHOULD BE HIT

Historically, users of concealment ciphers often used substitution and transposition ciphers on the data prior to concealment. For example, Cardinal Richelieu is said to have used a grille to write secret messages, after which the blank spaces were filled out with extraneous matter to create the impression of a continuous text. [2]

Dot concealment cipher

A dot or pinprick concealment cipher is a common classical encryption method in which dot or pinprick is placed above or below certain letters in a piece of writing. [4] An early reference to this appears in Aeneas Tacticus's book On the Defense of Fortifications. [6] The Germans improved upon this, using a dot of invisible ink during World War I and World War II.

In 19th-century England, pinpricks in newspapers were once a popular way to send letters with little or no cost.

If dots were placed far apart, this cipher could be used effectively. The dots should be small and the null text must make sense in the context of the senders and their relationship. Both also must have agreed on the page, chapter, article, or section to be used, typically several. [4] Another option is to have an indicator, such as the date in a newspaper, which shows which page the message is on. [7] This version is less secure.

Acrostics

The acrostic puzzle is an extended form of null cipher, but not an anacrostic (which uses a set of lettered clues with numbered blanks representing the letters of the answer to figure out the second part, a long series of numbered blanks and spaces representing a message into which the answers for the clues fit). Hidden or otherwise unmentioned acrostics are a type of null cipher. [8]

This method can be used to secretly insult a famous or important individual. For example, Rolfe Humphries received a lifelong ban from contributing to Poetry Magazine after he wrote and tried to publish "a poem containing a concealed scurrilous phrase aimed at a well-known person", namely Nicholas Murray Butler.[ citation needed ]

Definition of a null

Put simply, a null cipher is any cipher which involves a number of nulls, or decoy letters. As well as the methods shown above, a null cipher could be plaintext words with nulls placed in designated areas or even a plaintext message broken up in different positions with a null at the end of each word. [7] [9] However, a message with only a couple nulls (for example, one at the beginning and one at the end) is not a null cipher.

A null cipher is technically only a term for hidden letters or words within an otherwise unimportant message, however, it is occasionally used for the entire category of concealment ciphers. [2]

Usage

In general, it is difficult and time-consuming to produce covert texts that seem natural and would not raise suspicion, but a null cipher is an option if one is unable to use an advanced encryption method and has ample time. If no key or additional encryption is involved, the security of the message relies entirely on the secrecy of the concealment method. In the present day Null ciphers are used by prison inmates in an attempt to have their messages pass inspection. [5] [10]

Null ciphers are one of three major cipher types in classical cryptography (the other types being substitution and transposition), but they are less well known than the others. [2] They are often marked as a subcategory of transposition ciphers, [2] but that is not true, as transposition ciphers are scrambled messages.

See also

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

<span class="mw-page-title-main">One-time pad</span> Encryption technique

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key. Then, each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition.

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Symmetric-key algorithm</span> Algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption. However, symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">Playfair cipher</span> Early block substitution cipher

The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair for promoting its use.

<span class="mw-page-title-main">Ciphertext</span> Encrypted information

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. This process prevents the loss of sensitive information via hacking. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher.

<span class="mw-page-title-main">Acrostic</span> Text formed from parts of another text

An acrostic is a poem or other word composition in which the first letter of each new line spells out a word, message or the alphabet. The term comes from the French acrostiche from post-classical Latin acrostichis, from Koine Greek ἀκροστιχίς, from Ancient Greek ἄκρος "highest, topmost" and στίχος "verse". As a form of constrained writing, an acrostic can be used as a mnemonic device to aid memory retrieval. When the last letter of each new line forms a word it is called a telestich; the combination of an acrostic and a telestich in the same composition is called a double acrostic.

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

<span class="mw-page-title-main">Polybius square</span> Type of code

The Polybius square, also known as the Polybius checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius. The device is used for fractionating plaintext characters so that they can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire signalling, allowing for the coded transmission of any message, not just a finite number of predetermined options as was the convention before.

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

<span class="mw-page-title-main">Rail fence cipher</span> Type of transposition cipher

The rail fence cipher is a classical type of transposition cipher. It derives its name from the manner in which encryption is performed, in analogy to a fence built with horizontal rails.

<span class="mw-page-title-main">Bacon's cipher</span> Steganography method

Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content. Bacon cipher is categorized as both a substitution cipher and a concealment cipher.

In the history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet. The earliest known description is due to the polymath Girolamo Cardano in 1550. His proposal was for a rectangular stencil allowing single letters, syllables, or words to be written, then later read, through its various apertures. The written fragments of the plaintext could be further disguised by filling the gaps between the fragments with anodyne words or letters. This variant is also an example of steganography, as are many of the grille ciphers.

<span class="mw-page-title-main">Alberti cipher</span> Polyalphabetic substitution encryption and decryption system

The Alberti Cipher, created in 1467 by Italian architect Leon Battista Alberti, was one of the first polyalphabetic ciphers. In the opening pages of his treatise De componendis cifris he explained how his conversation with the papal secretary Leonardo Dati about a recently developed movable type printing press led to the development of his cipher wheel.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

References

  1. 1 2 Gordon, Adam (2015). Official (ISC)2 Guide to the CISSP CBK - Fourth Edition. (ISC)2 Press. p. 349. ISBN   978-1939572066.
  2. 1 2 3 4 5 6 Gaines, Helen F. (2014). Cryptanalysis: A Study of Ciphers and Their Solution. Courier Corporation. ISBN   9780486800592.
  3. Kahn, David (5 December 1996). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Simon and Schuster. ISBN   978-1-4391-0355-5 . Retrieved 12 October 2021.
  4. 1 2 3 Janeczko, Paul B. (2004). Top Secret: a Handbook of Codes, Ciphers, and Secret Writing. Candlewick Press. ISBN   9780763629724.
  5. 1 2 "Cryptanalysts: Breaking Codes to Stop Crime, Part 1". Federal Bureau of Investigation . March 21, 2011. Retrieved 2018-09-30.
  6. "Aeneas Tacticus • Siege Defense, XXI‑XXXI". penelope.uchicago.edu. Retrieved 2022-05-28.
  7. 1 2 Travis, Falcon; Hindley, Judy; Thomson, Ruth; Amery, Heather; Rawson, Christopher; Harper, Anita (1978). The Spy's Guidebook. Usborne Pocketbooks.
  8. "Steganography". www.garykessler.net. Retrieved 2023-09-24.
  9. Moore, Gareth (2019). Explorer Academy Codebreaking Activity Adventure. National Geographic Books. ISBN   9781426333071.
  10. Adabi, Mark (February 5, 2018). "An Atlanta jail intercepted a letter from an inmate who was using a secret code to orchestrate a murder". Business Insider . Retrieved 2018-09-30.