0:00:04.947,0:00:08.157 A strong cipher is one which disguises your fingerprint. 0:00:08.957,0:00:10.840 To make a lighter fingerprint 0:00:10.840,0:00:14.274 is to flatten this distribution of letter frequencies. 0:00:17.597,0:00:18.935 By the mid 15th century, 0:00:18.935,0:00:21.266 we had advanced the polyalphabetic ciphers 0:00:21.266,0:00:23.357 to accomplish this. 0:00:23.357,0:00:28.167 Imagine Alice and Bob shared a secret shift word. 0:00:28.167,0:00:30.766 First, Alice converts the word into numbers 0:00:30.766,0:00:33.223 according of the letter position in the alphabet. 0:00:33.223,0:00:37.830 Next, this sequence of numbers is repeated along the message. 0:00:39.476,0:00:41.981 Then each letter in the message is encrypted 0:00:41.981,0:00:44.160 by shifting according to the number below it. 0:00:45.129,0:00:48.809 Now, she's using multiple shifts instead of a single shift 0:00:48.809,0:00:53.637 across the message as Caesar had done before. 0:00:53.637,0:00:56.626 Then, the encrypted message is sent openly to Bob. 0:00:58.488,0:01:01.626 Bob decrypts the message by subtracting the shifts 0:01:01.626,0:01:04.859 according to the secret word he also has a copy of. 0:01:06.121,0:01:08.042 Now imagine a codebreaker, Eve, 0:01:08.042,0:01:10.173 intercepts a series of messages 0:01:10.173,0:01:12.642 and calculates the letter frequencies, 0:01:13.673,0:01:18.043 she'll find a flatter distribution or a lighter fingerprint, 0:01:18.043,0:01:20.592 so how could she break this? 0:01:22.546,0:01:26.169 Remember, codebreakers look for information leaked, 0:01:26.169,0:01:29.382 the same as finding a partial fingerprint. 0:01:29.382,0:01:32.411 Any time there's a differential in letter frequencies, 0:01:32.411,0:01:34.929 a leak of information occurs. 0:01:36.129,0:01:39.826 This difference is caused by repetition in the encrypted message. 0:01:41.703,0:01:45.911 In this case, Alice's cipher contains a repeating code word. 0:01:47.219,0:01:51.096 To break the encryption, Eve would first need to determine 0:01:51.096,0:01:55.567 the length of the shift word used, not the word itself. 0:01:55.567,0:01:56.922 She'll need to go through 0:01:56.922,0:02:00.487 and check the frequency distribution of different intervals. 0:02:00.487,0:02:04.430 When she checks the frequency distribution of every fifth letter, 0:02:04.430,0:02:07.648 the fingerprint will reveal itself. 0:02:07.648,0:02:10.144 The problem now, is to break five Caesar ciphers 0:02:10.144,0:02:12.821 in a repeating sequence. 0:02:12.821,0:02:14.726 Individually, this is a trivial task 0:02:14.726,0:02:17.136 as we have seen before, 0:02:17.136,0:02:19.740 the added strength of the cipher is the time taken 0:02:19.740,0:02:22.909 to determine the length of shift word used. 0:02:22.909,0:02:26.909 The longer the shift word, the stronger the cipher.