Page 124 - The Secret War in the Italian front in WWI (1915-1918)
P. 124

THE SECRET WAR ON THE ITALIAN FRONT IN WWI (1915 – 1918)




              started to deploy several listening stations,
              each tuned to one of the frequencies most
              often employed by enemy stations.
              An  efficient  method  for  improving
              transmission security became, during the
              war, the  accurate  monitoring  of friendly
              communications  aiming  to avoid  use of
              radio and telephone communications  for
              purposes other than regular service and to
              grant rule compliance on communications
              protection.
              Having explored the limited effectiveness
              of the methods applicable for transmission
              security improvement, let us now analyse
              the characteristics of the last component
              of Communication  Security, namely
              protection of the transmitted dispatches by
              means of codes and ciphers (cryptography)   6.11  Clock  used  by  the  Austro-Hungarian  navy  for  the
              or secret languages and writing systems    periodical change of radio frequencies (ISCAG Archive)
              (steganography).



              6.4  BASICS CRYPTOLOGY       26

              Cryptography is the set of encryption methods for hiding the contents of a message. It is part of
              cryptology which also includes the cryptographic analysis or cryptanalysis, aiming to disclose the
              meaning of a message without knowing the encryption methods used .
                                                                              27

              cryPTograPhy

              Cryptography aims to make a plaintext unintelligible to unauthorised people, transforming the
              clear text into a cryptogram or encoded text through an encoding or ciphering procedure, which
              requires both a complex set of rules and tools (code books, tables, apparatus, etc.) representing the
              cipher, and the key, namely an agreed word, a set of figures or an acronym.
              A cryptogram is transmitted to one or more addressees who decode or decipher it, transforming
              the encoded into the original plaintext, by the same cipher and the same key used for its encoding.
              A message is decrypted when someone who is not the addressee and who is not supposed to know
              the cipher and the key, manages to interpret it correctly.
              A traditional classification of cryptographic systems distinguishes between ciphers also named
              literal systems and codes.
              In ciphers, the elements in the plain text - letters, numbers, punctuations marks, groups of letters
              - are altered by substitution or transposition methods.





              26  For readers already familiar with the basics of cryptography it may be recommendable to skip this paragraph and go directly
              to paragraph 6.5.
              27  The term “cryptography” is often applied to both aspects.


                122
   119   120   121   122   123   124   125   126   127   128   129