Page 129 - The Secret War in the Italian front in WWI (1915-1918)
P. 129

CHAPTER SIX





                  oPeraTIonal securITy
                  In addition to a constant accuracy in encoding operations, frequent changes of keys and ciphers would
                  be assured, because the collection of a considerable number of uniformly encoded cryptograms
                  in the hands of enemy analysts facilitates the solving process enormously. Indeed, the abundant
                  homogeneous cryptographic material makes statistical analysis more reliable and increases, for
                  instance, the likelihood of repeated code groups being detected. As already mentioned, this can
                  mark the start of a code or chipher breaking.
                  The enemy’s skill in cryptolology must be never underestimated !
                                                                             30
                  It is intuitively clear that a short dispatch protected by a cipher and a key that are rarely used is
                  much safer than a long telegram or more telegrams encoded in the same manner. Claude Shannon
                  theoretically validated this concept in 1949, identifying a ‘minimum distance’, that is the maximum
                  length of a cryptogram or set of uniformly ciphered cryptograms below which multiple solutions
                  are allowed or, in other words, the text is not decryptable .
                                                                      31
                  Therefore, the more intense is the generated traffic, the shorter the operating lifetime of ciphers,
                  and especially of keys, must be. This avoids providing the enemy with enough cryptographic
                  material to break the system. Another method to achieve the same goal consists of using many
                  ciphers at the same time to reduce, for each of them, the number of intercepted cryptograms while
                  increasing the workload of enemy analysts who had to cope with many different encoding systems.
                  During the war, the undereducated or short-sighted operators who did not comply with coding rules,
                  jeopardized the security of even excellent cryptographic systems. French Colonel Marcel Giviérge
                  - one of the leading figures in the cryptologic war on the western front - stated that “One should code
                  well or not code at all”. In fact, when not coding, one risks disclosing some information to the enemy,
                  yet when coding inefficiently, one provides the enemy with the opportunity to break a cipher and
                  therefore to disclose a greater amount of information concerning oneself and his brothers in arms .
                                                                                                         32
                  A peculiarity of military cryptography therefore was the need to instruct in basic cryptography
                  methods hundreds and at times thousands of code operators and telegraphists who had to often
                  work in all but favourable conditions. The lack of a basic knowledge of cryptology for many
                  Italian operators, at the beginning of the WWI, was not a marginal cause of some of the successes
                  obtained by Austro-Hungarian analysts.
                  Another extremely crucial problem arising during the harsh radio cryptographic battle taking
                  place between the two opposed parties regarded the keys which, in addition to their programmed
                  changes, had to be immediately replaced whenever their loss was certain or even just suspected.
                  The frequent and sometimes unpredictable keys changes required very safe transmission channels.
                  In fact, according to a general principle that is still valid, the decrypting of encoded dispatches by
                  the enemy should be avoided, even when ciphers or codes fall into the enemy’s hands and security
                  relies exclusively on keys . On the other hand, keys had to be delivered - often in a short time -
                                          33
                  to numerous units deployed to extensive front lines, including faraway and remote locations, at
                  times connected via radio only. Solving the problem of the keys’ security transmission, which do



                  30  First principle of cryptography 1 (F.L. Bauer, Decrypted secrets, Methods and Maxims of Cryptology, Springer - Velag,
                  Berlin, 1997. p.205 – 207).
                  31  Claude Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, 1949, Vol. 28(4), p. 656 - 715.
                  32  M. Givierge, Questions de Chiffre, op. cit, the statement is attributed to an important and unspecified French personality,
                  at the conclusion of the the article.
                  33  This principle was enunciated by Kerckhoffs, (Auguste Kerckhoffs, La Cryptographie Militaire. Journal Des Sciences
                  Militaires, Janvier 1883, 2° Desiderata) as one of the basic features of a cipher. Many of the ciphers used during the WWI
                  did not meet such criteria.


                                                                                                     127
   124   125   126   127   128   129   130   131   132   133   134