Pages

Introduction

Introduction

Throughout history, there has been an ongoing effort to ensure the secrecy of communications. For every innovation in designing secret messages, there is an associated breakthrough in the effort to read them. This constant struggle over time has led to many important advancements in areas ranging from business to computer science.


The field of cryptography (krip-tog-ruh-fee) focuses on the methods and techniques for hiding the meaning in messages and making sense of them.

Cryptography

The art and science of reading and writing disguised messages.

There are many methods for disguising messages. These methods range from mathematically simple to complex and from easy to break to practically impenetrable. A secret code is a system where words or phrases in the original message are replaced by other words or symbols. A cipher (sy-fer) is a way of creating a secret message by replacing individual letters in a systematic way.

Cipher

A disguised or secret way of writing by systematically replacing letters.

There are many different types of ciphers used in everyday life. People use them, often unknowingly, when poking around on smart phones, accessing ATM machines, and shopping online. Classical substitution ciphers involve methods where letters are systematically replaced with other letters, numbers, or symbols. These types of ciphers come in many forms and have been around for a very long time.

Using a secret code or a cipher to disguise a message is called encryption (en-krip-shuhn).

Encode

To convert a message into a disguised form using some secret code or cipher.

Using some method to read a disguised message is called decryption (dee-krip-shuhn). The ability to read secret messages is of interest to the sender, receiver, and their adversaries.

Decode

To convert an encrypted message into a readable form.

Some ciphers are more secure than others. However, if your goal is to delay your adversary from knowing your short-term plans, you can choose a simple cipher. If your goal is to obscure your message for a longer period, choose a more complicated cipher. This book begins with simple ciphers and walks you through some techniques used to break them.

Now if you haven’t already decoded the secret message above, this is what it says:

--------------------------------------

nggnp xsebz guryr sgjvg unepu ref
attac kfrom thele ftwit harch ers

attack from the left with archers

--------------------------------------
In each chapter of this book, you will be tasked with completing several missions. Complete all 16 missions and then you will be ready begin your journey exploring the rich subject of cryptography.

Bonus Mission: After reading this book, determine the cipher used to code the secret message in this introduction.