Nihilist Cipher
   HOME

TheInfoList



OR:

In the
history of cryptography Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, ...
, the Nihilist cipher is a manually operated
symmetric Symmetry (from grc, συμμετρία "agreement in dimensions, due proportion, arrangement") in everyday language refers to a sense of harmonious and beautiful proportion and balance. In mathematics, "symmetry" has a more precise definiti ...
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
cipher, originally used by
Russia Russia (, , ), or the Russian Federation, is a List of transcontinental countries, transcontinental country spanning Eastern Europe and North Asia, Northern Asia. It is the List of countries and dependencies by area, largest country in the ...
n
Nihilist Nihilism (; ) is a philosophy, or family of views within philosophy, that rejects generally accepted or fundamental aspects of human existence, such as objective truth, knowledge, morality, values, or meaning. The term was popularized by Ivan ...
s in the 1880s to organize
terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
against the
tsar Tsar ( or ), also spelled ''czar'', ''tzar'', or ''csar'', is a title used by East Slavs, East and South Slavs, South Slavic monarchs. The term is derived from the Latin word ''Caesar (title), caesar'', which was intended to mean "emperor" i ...
ist regime. The term is sometimes extended to several improved algorithms used much later for communication by the
First Chief Directorate The First Main Directorate () of the Committee for State Security under the USSR council of ministers (PGU KGB) was the organization responsible for foreign operations and intelligence activities by providing for the training and management of cove ...
with its
spies Spies most commonly refers to people who engage in spying, espionage or clandestine operations. Spies or The Spies may also refer to: * Spies (surname), a German surname * Spies (band), a jazz fusion band * "Spies" (song), a song by Coldplay * ...
.


Description

First the encipherer constructs a
Polybius square The Polybius square, also known as the Polybius checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius. The device is used for fractionating plaintext characters s ...
using a mixed alphabet. This is used to convert both the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
and a keyword to a series of two digit numbers. These numbers are then added together in the normal way to get the ciphertext, with the key numbers repeated as required.


Example

Consider the Polybius square created using the keyword ZEBRAS: with a plaintext of "DYNAMITE WINTER PALACE" and a key of RUSSIAN. This expands to: PT: 23 55 41 15 35 32 45 12 53 32 41 45 12 14 43 15 34 15 22 12 KEY: 14 51 21 21 32 15 41 14 51 21 21 32 15 41 14 51 21 21 32 15 CT: 37 106 62 36 67 47 86 26 104 53 62 77 27 55 57 66 55 36 54 27


Cryptanalysis

Because each symbol in both plaintext and key is used as a whole number without any
fractionation Fractionation is a separation process in which a certain quantity of a mixture (of gases, solids, liquids, enzymes, or isotopes, or a suspension) is divided during a phase transition, into a number of smaller quantities (fractions) in which the ...
, the basic Nihilist cipher is little more than a numerical version of the
Vigenère cipher The Vigenère cipher () is a method of encryption, encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic cipher, polyalphabetic substitution. First desc ...
, with multiple-digit numbers being the enciphered symbols instead of letters. As such, it can be attacked by very similar methods. An additional weakness is that the use of normal addition (instead of modular addition) leaks further information. For example, (assuming a 5 × 5 square) if a ciphertext number is greater than 100 then it is a certainty that both the plaintext and key came from the fifth row of the table.


Later variants or derivatives

During
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
, several Soviet spy rings communicated to Moscow Centre using two ciphers which are essentially evolutionary improvements on the basic Nihilist cipher. A very strong version was used by Max Clausen in
Richard Sorge Richard Sorge (russian: Рихард Густавович Зорге, Rikhard Gustavovich Zorge; 4 October 1895 – 7 November 1944) was a German-Azerbaijani journalist and Soviet military intelligence officer who was active before and during Wo ...
's network in
Japan Japan ( ja, 日本, or , and formally , ''Nihonkoku'') is an island country in East Asia. It is situated in the northwest Pacific Ocean, and is bordered on the west by the Sea of Japan, while extending from the Sea of Okhotsk in the north ...
, and by Alexander Foote in the
Lucy spy ring In World War II espionage, the Lucy spy ring was an anti-Nazi operation that was headquartered in Switzerland. It was run by Rudolf Roessler, a German refugee and ostensibly the proprietor of a small publishing firm, Vita Nova. Very little is cle ...
in
Switzerland ). Swiss law does not designate a ''capital'' as such, but the federal parliament and government are installed in Bern, while other federal institutions, such as the federal courts, are in other cities (Bellinzona, Lausanne, Luzern, Neuchâtel ...
. A slightly weaker version was used by the '' Rote Kapelle'' network. In both versions, the plaintext was first converted to digits by use of a straddling checkerboard rather than a Polybius square. This has the advantage of slightly compressing the plaintext, thus raising its
unicity distance In cryptography, unicity distance is the length of an original ciphertext needed to break the cipher by reducing the number of possible spurious keys to zero in a brute force attack. That is, after trying every possible key, there should be just ...
and also allowing radio operators to complete their transmissions quicker and shut down sooner. Shutting down sooner reduces the risk of the operator being found by enemy
radio direction finder Direction finding (DF), or radio direction finding (RDF), isin accordance with International Telecommunication Union (ITU)defined as radio location that uses the reception of radio waves to determine the direction in which a radio station ...
s. Increasing the unicity distance increases strength against statistical attacks. Clausen and Foote both wrote their plaintext in English, and memorized the 8 most frequent letters of English (to fill the top row of the checkerboard) through the mnemonic (and slightly menacing) phrase "a sin to err" (dropping the second "r"). The standard English straddling checkerboard has 28 characters and in this cipher these became "full stop" and "numbers shift". Numbers were sent by a numbers shift, followed by the actual plaintext digits in repeated pairs, followed by another shift. Then, similarly to the basic Nihilist, a digital additive was added in, which was called "closing". However a different additive was used each time, so finally a concealed "indicator group" had to be inserted to indicate what additive was used. Unlike basic Nihilist, the additive was added by non-carrying addition (digit-wise addition modulo 10), thus producing a more uniform output which doesn't leak as much information. More importantly, the additive was generated not through a keyword, but by selecting lines at random from almanacs of industrial statistics. Such books were deemed dull enough to not arouse suspicion if an agent was searched (particularly as the agents' cover stories were as businessmen), and to have such high entropy density as to provide a very secure additive. Of course the figures from such a book are not actually uniformly distributed (there is an excess of "0" and "1" (see
Benford's Law Benford's law, also known as the Newcomb–Benford law, the law of anomalous numbers, or the first-digit law, is an observation that in many real-life sets of numerical data, the leading digit is likely to be small.Arno Berger and Theodore ...
), and sequential numbers are likely to be somewhat similar), but nevertheless they have much higher entropy density than passphrases and the like; at any rate, in practice they seem never to have been successfully cryptanalysed. The weaker version generated the additive from the text of a novel or similar book (at least one ''Rote Kapelle'' member used ''
The Good Soldier Schweik ''The'' () is a grammatical article in English, denoting persons or things already mentioned, under discussion, implied or otherwise presumed familiar to listeners, readers, or speakers. It is the definite article in English. ''The'' is the m ...
'') This text was converted to a digital additive using a technique similar to a straddling checkerboard. The ultimate development along these lines was the
VIC cipher Vic (; es, Vic or Pancracio Celdrán (2004). Diccionario de topónimos españoles y sus gentilicios (5ª edición). Madrid: Espasa Calpe. p. 843. ISBN 978-84-670-3054-9. «Vic o Vich (viquense, vigitano, vigatán, ausense, ausetano, ausonense) ...
, used in the 1950s by
Reino Häyhänen Reino Häyhänen (; 14 May 1920 – 17 February 1961) was a Soviet intelligence officer of the KGB who defected from the Soviet Union to the United States in May 1957. Häyhänen surrendered information on Soviet espionage activities that solved ...
. By this time, most Soviet agents were instead using
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ran ...
s.


See also

*
Topics in cryptography The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer scienc ...


References

* David Kahn. ''
The Codebreakers ''The Codebreakers – The Story of Secret Writing'' () is a book by David Kahn, published in 1967, comprehensively chronicling the history of cryptography from ancient Egypt to the time of its writing. The United States government attempted to ha ...
''. 1968, 1974 edition Redwood Burn Ltd. pp 344, 368.


External links


A JavaScript implementation of various Nihilist ciphers
{{Cryptography navbox, classical Classical ciphers