Page 126 - The Secret War in the Italian front in WWI (1915-1918)
P. 126

THE SECRET WAR ON THE ITALIAN FRONT IN WWI (1915 – 1918)




              In code systems, code groups made of letter or numbers replace words, syllables, or entire sentences.
              For this purpose, vocabularies or code books are generated with varying dimensions, ranging from
              a few dozen to ten thousand terms or more, depending on the code application.
              Codes can be one-part codes or two-part codes which are also called inverted codes. One-part
              codes have not only plaintext elements listed alphabetically, but also code groups in ascending
              order when made of numbers or in alphabetic order when made of letters. Therefore, a single
              codebook is enough for both coding and decoding. In two-part codes, code groups are chosen
              randomly, requiring two codebooks: one for coding and another for decoding where the code
              groups are shown in ascending or alphabetic order.
              A double ciphering or overencoding can be implemented by further ciphering the code groups
              obtained with the first coding process, by means of a substitution or transposition method.
              The different cryptographic methods will be discussed in more detail further on, along with the
              variety of versions used by the Italian and the Austrian armies during the World War I.



              cryPTanalysIs MeThods
              The methods, tricks, and intuitions that help understand the enemy’s encoded messages are so
              numerous and diverse as to make it impossible to classify them, let alone describe them in a short
              paragraph. According to the American cryptologist William Friedman, the method to decrypting
              a message would consist, in brief, of identifying in succession: language, cipher and key, though
              in practice this logical sequence is not systematically followed.
              With the aim of identifying the language, the analysis of some statistical parameters characteristics
              for each language is required, such as the occurrence of alphabet letters, bigrams (couple of letters) or
              trigrams, representing specific features that are lost only with some coding methods. This frequency
              analysis proves particularly useful also to solve cryptograms based on mono-alphabetic substitution.
              In fact, in that case, a diagram of single letters occurrence maintains - even after the encoding process
              - the same structure and it only shifts with respect to that of the original language .
                                                                                       29
              The  solution  of cryptograms achieved  by poly-alphabetic  substitution  systems relies  on their
              reduction to several mono-alphabetic systems which in turn are solvable by the frequency analysis.
              According to this principle, since the 19  century, some decrypting procedures known as Babbage-
                                                  th
              Kasinski and Kerckhoffs methods have been designed for poly-alphabetic systems of the Vigenére
              type.
              To break some transposition ciphers, it may be convenient to analyse the sequence of some letters,
              called pilot letters: for instance, in Italian the letter Q is always followed by letter U, while in
              German the letter C is followed by H in 90% of cases or by K. In some circumstances, it can be
              helpful to analyse the sequences of bigrams and trigrams. Another approach known since 19
                                                                                                      th
              century to solve transposition systems is the multiple anagrams method which however needs the
              availability of several cryptograms not only employing the same cipher and key, but also with the
              same length.
              All the methodologies mentioned above will be more thoroughly discussed further on.
              Of course, the easiest and most effective method to break ciphers and, above all, codes rely on
              having plaintexts corresponding to encoded messages or even the whole code book, achieved by
              stealing it from the enemy or taking advantage of the various opportunities provided by Human
              Intelligence.


              29  The use of homophones - that is different symbols corresponding to the most frequent letters and used alternatively - allows
              reducing the occurrence frequency of the latter, which changes the spectrum characteristics.


                124
   121   122   123   124   125   126   127   128   129   130   131