Null cipher

This article is about the classical encryption method. For the configuration option in modern communication systems, see Null encryption.

A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext.[1]

Classical cryptography

In classical cryptography, a null is intended to confuse the cryptanalyst. In a null cipher, the plaintext is included within the ciphertext and one needs to discard certain characters in order to decrypt the message.[1] Most characters in such a cryptogram are nulls, only some are significant, and some others can be used as pointers to the significant ones.[2]

Examples of messages containing null ciphers:

News Eight Weather: Tonight increasing snow. Unexpected precipitation smothers eastern towns. Be extremely cautious and use snowtires especially heading east. The [highway is not] knowingly slippery. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday.

Taking the first letter in each word successively yields the real message: "Newt is upset because he thinks he is President."[3]

You can also choose to instead use the last letter of every word, or something like a pattern such as:

Susan sAys GaIl Lies. MAtt leTs Susan fEel joVial. Elated (or) aNgry?

Using the pattern (1,2,3,1,2,3 [each letter in each word]) gives the message: "Sail at seven."

Other options include positioning of the significant letters next to or at certain intervals from punctuation marks or particular characters. Historically, users of concealment ciphers often used substitution and transposition ciphers on the data prior to concealment. For example, Cardinal Richelieu is said to have used a grille to write secret messages, after which the blank spaces were filled out with extraneous matter to create the impression of a continuous text.[2]

Usage

It is difficult and time-consuming to produce encapsulating messages that feel natural and wouldn't raise suspicions. The message may read clumsily, and suspected messages can be detected by mail filters.[3] More importantly, the security of the message relies entirely on the secrecy of the concealment method. Null ciphers are no longer in serious use.[1]

See also

References

  1. 1 2 3 Gordon, Adam (2015). Official (ISC)2 Guide to the CISSP CBK - Fourth Edition. (ISC)2 Press. p. 349. ISBN 1939572061 via Google Books.
  2. 1 2 Gaines, Helen F. (2014). Cryptanalysis: A Study of Ciphers and Their Solution. Courier Corporation. pp. 4–5. ISBN 9780486800592.
  3. 1 2 Kippers, Gregory (2003). Investigator’s guide to steganography. Auerbach Publications. p. 9. ISBN 978-0849324338.
This article is issued from Wikipedia - version of the 11/10/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.