Page 130 - The Secret War in the Italian front in WWI (1915-1918)
P. 130

THE SECRET WAR ON THE ITALIAN FRONT IN WWI (1915 – 1918)




              not exist exclusively in the military domain, has been an issue for cryptologists for decades, until
              the implementation of public-key systems.



              6.6  STEGANOGRAPHY: A SPY’S INSTRUMENT


              TechnIcal sTeganograPhy

              During the  WWI, agents operating  beyond enemy  lines, in order to convey the information
              gathered to their contact persons, were often forced to use classic communication means such as
              mail, public telegraphs, carrier pigeons, advertisements on newspapers, etc., and hence tried to
              conceal their dispatches by steganography.
              The term steganography comes from Greek and means hidden writing. It comprises systems
              hiding the very existence of the message by technical or linguistic methods .
                                                                                   34
              Invisible inks are among the most notorious technical steganography methods. In order to hinder
              the detection of these apparently invisible writings, chemical laboratories - in particular German
              ones - designed more and more sophisticated inks, constantly challenging the Entente’s specialists
              who, in the meanwhile, were trying to identify the chemical substances that could reveal the
              writings  hidden  by the  new inks .  The  Italian  Intelligence  Service  also  achieved  a  valuable
                                             35
              level of specialization in the field, progressing from “the first basic means to finding out secret
              correspondence […] to well-equipped chemical laboratories where it was almost impossible for
              any sophisticated substance used to hide suspect correspondence to go undetected” .
                                                                                          36
              Several other technical steganography methods, also used after the WWI, allowed for instance
              photographically reducing an image to the size of a full stop in a typewritten document. More
              recently, messages were hidden inside images transmitted via Internet.
              Unlike technical steganography, linguistic or textual steganography aim to hide a secret text inside
              an apparently harmless text that eventually can get through the most accurate checks, even by
              censorship . The linguistic methods comprise the concealed ciphers and the concealed languages
                        37
              (Jargon codes or language convenu).



              concealed cIPhers
              During the conflict, in addition to many classic versions of veiled secrete writing, such as acrostics,
              grilles ,  etc.,  some  numerical  techniques  strictly  connected  to  cryptography  were  sometime
                    38
              applied.
              For instance, the number of vowels or consonants in each word of the plaintext can form code
              groups: an even number can represent a 1 and an odd number represents a 0. Therefore, with
              five consecutive words one can obtain five binary figures (1 to 0), generating 32 (2 ) possible
                                                                                             5
              combinations, each corresponding to a letter of the alphabet or to a number, or to a symbol of the




              34   The term was introduced  by  Abbot  Trithemius  (Johann von Heidenberg from  Trittenheim),  who entitled  his book
              “Steganographia”, first published in 1506.
              35  The evolution of the technique and use of invisible inks during WWI is described in H.O. Yardley, op. cit., p. 55-89.
              36  O. Marchetti: op. cit., p. 92.
              37  Textual steganography introduced by Abbot Trithemius is still applied today to digital texts.
              38  The initial letters of the words of an acrostic are used to make up the hidden message. Cardano’s grilles are made by holes
              in a metal plate or on a sheet of paper. The message is written into the holes; a support text completes the message.


                128
   125   126   127   128   129   130   131   132   133   134   135