WEBVTT 00:00:04.947 --> 00:00:08.157 A strong cipher is one which disguises your fingerprint. 00:00:08.957 --> 00:00:10.840 To make a lighter fingerprint 00:00:10.840 --> 00:00:14.274 is to flatten this distribution of letter frequencies. 00:00:17.597 --> 00:00:18.935 By the mid 15th century, 00:00:18.935 --> 00:00:21.266 we had advanced the polyalphabetic ciphers 00:00:21.266 --> 00:00:23.357 to accomplish this. 00:00:23.357 --> 00:00:28.167 Imagine Alice and Bob shared a secret shift word. 00:00:28.167 --> 00:00:30.766 First, Alice converts the word into numbers 00:00:30.766 --> 00:00:33.223 according of the letter position in the alphabet. 00:00:33.223 --> 00:00:37.830 Next, this sequence of numbers is repeated along the message. 00:00:39.476 --> 00:00:41.981 Then each letter in the message is encrypted 00:00:41.981 --> 00:00:44.160 by shifting according to the number below it. 00:00:45.129 --> 00:00:48.809 Now, she's using multiple shifts instead of a single shift 00:00:48.809 --> 00:00:53.637 across the message as Caesar had done before. 00:00:53.637 --> 00:00:56.626 Then, the encrypted message is sent openly to Bob. 00:00:58.488 --> 00:01:01.626 Bob decrypts the message by subtracting the shifts 00:01:01.626 --> 00:01:04.859 according to the secret word he also has a copy of. 00:01:06.121 --> 00:01:08.042 Now imagine a codebreaker, Eve, 00:01:08.042 --> 00:01:10.173 intercepts a series of messages 00:01:10.173 --> 00:01:12.642 and calculates the letter frequencies, 00:01:13.673 --> 00:01:18.043 she'll find a flatter distribution or a lighter fingerprint, 00:01:18.043 --> 00:01:20.592 so how could she break this? 00:01:22.546 --> 00:01:26.169 Remember, codebreakers look for information leaked, 00:01:26.169 --> 00:01:29.382 the same as finding a partial fingerprint. 00:01:29.382 --> 00:01:32.411 Any time there's a differential in letter frequencies, 00:01:32.411 --> 00:01:34.929 a leak of information occurs. 00:01:36.129 --> 00:01:39.826 This difference is caused by repetition in the encrypted message. 00:01:41.703 --> 00:01:45.911 In this case, Alice's cipher contains a repeating code word. 00:01:47.219 --> 00:01:51.096 To break the encryption, Eve would first need to determine 00:01:51.096 --> 00:01:55.567 the length of the shift word used, not the word itself. 00:01:55.567 --> 00:01:56.922 She'll need to go through 00:01:56.922 --> 00:02:00.487 and check the frequency distribution of different intervals. 00:02:00.487 --> 00:02:04.430 When she checks the frequency distribution of every fifth letter, 00:02:04.430 --> 00:02:07.648 the fingerprint will reveal itself. 00:02:07.648 --> 00:02:10.144 The problem now, is to break five Caesar ciphers 00:02:10.144 --> 00:02:12.821 in a repeating sequence. 00:02:12.821 --> 00:02:14.726 Individually, this is a trivial task 00:02:14.726 --> 00:02:17.136 as we have seen before, 00:02:17.136 --> 00:02:19.740 the added strength of the cipher is the time taken 00:02:19.740 --> 00:02:22.909 to determine the length of shift word used. 00:02:22.909 --> 00:02:26.909 The longer the shift word, the stronger the cipher.