Page 127 - The Secret War in the Italian front in WWI (1915-1918)
P. 127

CHAPTER SIX




                  When these circumstances do not occur, the code breaking can be implemented by methods that
                  considerably differ from those just described for the literal systems. The level of difficulty usually
                  increases as the codes get bigger and results to be considerably higher for two-part compared to
                  one-part systems. In fact, regarding the one-part codes, once the correspondence between a term in
                  the code and a code group has been discovered, the equivalence with other terms of the following
                  or the previous groups can be quite easy found, by using a dictionary of the language.
                  There are also circumstances that help the solution of any code or cipher, for instance taking
                  advantage of partial coding of massages. Therefore, as a basic rule, ciphering must be integral and
                  comprise all words in the telegram including the address and signature.
                  In addition, the analysts can exploit the operators’ inaccuracy in the coding process. If a codegroup
                  occurs in the same cryptogram several times, its correspondence with frequently used letters or
                  syllables or words may be assumed. In many cases, the use of stereotypical expressions, such as
                  “with reference to your dispatch” or “I am honoured to”, or the knowledge of the topic, the possible
                  structure or even the content of cryptograms help start breaking the code. In fact, once the meaning
                  of some code groups is identified, it can be applied to other enemy cryptograms, which helps to
                  discover more.
                  A further weakness that is often exploited by analysts is the sender’s signature, often encoded letter
                  by letter or syllable by syllable, which makes it easier to decrypt. If the same signature appears in
                  two cryptograms transmitted respectively before and after a change of code or cipher, it helps to
                  start breaking he last if the previous one is known.



                  6.5  MILITARY CRYPTOLOGY


                  encoded coMMunIcaTIons

                  In military telegraphic communication - both wire and radio - as well as, in more simple forms,
                  in the transmission of confidential phonograms, coding and decoding are relevant parts of the
                  operations required to transmit and receive a message as shown in picture 6.14 where, for the sake
                  of clarity, only one unidirectional pattern of a communication channel has been represented. The

























                  6.14 Outline of a communication channel with encoding





                                                                                                     125
   122   123   124   125   126   127   128   129   130   131   132