Introduction
Throughout history, there has been an ongoing effort to ensure the secrecy of communications. For every innovation in designing secret messages, there is an associated breakthrough in the effort to read them. This constant struggle over time has led to many important advancements in areas ranging from business to computer science.
The field of cryptography (krip-tog-ruh-fee) focuses on the methods and techniques for hiding the meaning in messages and making sense of them.
Cryptography
The art and science of reading and writing disguised messages.
There are many methods for disguising messages. These methods range from mathematically simple to complex and from easy to break to practically impenetrable. A secret code is a system where words or phrases in the original message are replaced by other words or symbols. A cipher (sy-fer) is a way of creating a secret message by replacing individual letters in a systematic way.
Cipher
A disguised or secret way of writing by systematically replacing letters.
Using a secret code or a cipher to disguise a message is called encryption (en-krip-shuhn).
Encode
To convert a message into a disguised form using some secret code or cipher.
Using some method to read a disguised message is called decryption (dee-krip-shuhn). The ability to read secret messages is of interest to the sender, receiver, and their adversaries.
Decode
To convert an encrypted message into a readable form.
Some ciphers are more secure than others. However, if your goal is to delay your adversary from knowing your short-term plans, you can choose a simple cipher. If your goal is to obscure your message for a longer period, choose a more complicated cipher. This book begins with simple ciphers and walks you through some techniques used to break them.
--------------------------------------
nggnp xsebz guryr sgjvg unepu ref
attac kfrom thele ftwit harch ers
attack from the left with archers
--------------------------------------
In each chapter of this book, you will be tasked with completing several missions. Complete all 16 missions and then you will be ready begin your journey exploring the rich subject of cryptography.Bonus Mission: After reading this book, determine the cipher used to code the secret message in this introduction.