Recent from talks
Nothing was collected or created yet.
Null cipher
View on WikipediaThis article needs additional citations for verification. (June 2023) |
A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext.[1]
This is one of three categories of cipher used in classical cryptography along with substitution ciphers and transposition ciphers.[2]
Classical cryptography
[edit]In classical cryptography, a null is an extra character intended to confuse the cryptanalyst. In the most common form of a null cipher, the plaintext is included within the ciphertext and one needs to discard certain characters in order to decrypt the message (such as first letter, last letter, third letter of every second word, etc.)[1] Most characters in such a cryptogram are nulls, only some are significant, and some others can be used as pointers to the significant ones.[2]
Here is an example null cipher message, sent by a German during World War I:[3]
PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY.
Taking the first letter of every word reveals the hidden message "Pershing sails from N.Y. June I".
Following is a more complicated example from England's Civil War which aided Royalist Sir John Trevanian in his escape from a Puritan castle in Colchester:[4]
WORTHIE SIR JOHN, HOPE, THAT IS YE BESTE COMFORT OF YE AFFLICTED, CANNOT MUCH, I FEAR ME, HELP YOU NOW. THAT I WOULD SAY TO YOU, IS THIS ONLY: IF EVER I MAY BE ABLE TO REQUITE THAT I DO OWE YOU, STAND NOT UPON ASKING ME. TIS NOT MUCH THAT I CAN DO; BUT WHAT I CAN DO, BEE YE VERY SURE I WILL. I KNOW THAT, IF DETHE COMES, IF ORDINARY MEN FEAR IT, IT FRIGHTS NOT YOU, ACCOUNTING IT FOR A HIGH HONOUR, TO HAVE SUCH A REWARDE OF YOUR LOYALTY. PRAY YET YOU MAY BE SPARED THIS SOE BITTER, CUP. I FEAR NOT THAT YOU WILL GRUDGE ANY SUFFERINGS; ONLY IF BIE SUBMISSIONS YOU CAN TURN THEM AWAY, TIS THE PART OF A WISE MAN. TELL ME, AN IF YOU CAN, TO DO FOR YOU ANYTHINGE THAT YOU WOLDE HAVE DONE. THE GENERAL GOES BACK ON WEDNESDAY. RESTINGE YOUR SERVANT TO COMMAND.
The third letter after each punctuation reveals "Panel at East end of Chapel slides".
A similar technique is to hide entire words, such as in this seemingly innocent message written by a prison inmate but deciphered by the FBI:[5]
SALUDOS LOVED ONE
SO TODAY I HEARD FROM UNCLE MOE OVER THE PHONE. HE TOLD ME THAT YOU AND ME GO THE SAME BIRTHDAY. HE SAYS YOUR TIME THERE TESTED YOUR STRENGTH SO STAY POSITIVE AT SUCH TIMES. I'M FOR ALL THAT CLEAN LIVING! METHAMPHETAMINES WAS MY DOWN FALL. THE PROGRAM I'M STARTING THE NINTH IS ONE I HEARD OF A COUPLE WEEKS BEFORE SEPTEMBER THROUGH MY COUNSELOR BARRIOS. BUT MY MEDICAL INSURANCE COVERAGE DENIES THEY COVER IT. I'M USING MY TIME TO CHECK AND IF THE INSURANCE AGENT DENIES STILL MY COVERAGE I'M GETTING TOGETHER PAPERWORK SAYING I TESTED FOR THIS TREATMENT REQUIRED ON THE CHILD CUSTODY. THE NINTH WILL MEAN I HAVE TESTED MY DETERMINATION TO CHANGE. ON THE NEXT FREE WEEKEND THE KIDS ARE COMING, BUT FIRST I GOTTA SHOW CAROLINA I'M STAYING OUT OF TROUBLE WAITING TO GET MYSELF ADMITTED ON THE PROGRAM. THE SUPPORTING PAPERWORK THAT THE FAMILY COURTS GOT WILL ALSO PROVE THERE'S NO REASON NEITHER FOR A WITNESS ON MY CHILDREN'S VISITS. OF COURSE MY BRO HAS HIS MIND MADE UP OF RECENT THAT ALL THIS DRUG USAGE DON'T CONCERN OUR VISITS. I THINK THAT MY KIDS FEEL I NEED THEIR LOVE IF I'M GONNA BE COOL. GUILTY FEELINGS RISE ON ACCOUNT OF THE MISTAKES I COULD WRITEUP. FOR DAYS I'M HERE. HE GOT A GOOD HEART. SHOULD YOU BE HAVING PROBLEMS BE ASSURED THAT WHEN YOU HIT THE STREETS WE'LL BE CONSIDERING YOU...
Taking only every fifth word, one can reconstruct the hidden text which recommends a "hit" on someone:
TODAY MOE TOLD ME HE TESTED POSITIVE FOR METHAMPHETAMINES THE NINTH OF SEPTEMBER BUT DENIES USING AND DENIES GETTING TESTED ON NINTH
TESTED ON THE FIRST
I'M WAITING ON PAPERWORK
GOT NO WITNESS OF HIS RECENT USAGE
I FEEL IF GUILTY OF WRITEUP HE SHOULD BE HIT
Historically, users of concealment ciphers often used substitution and transposition ciphers on the data prior to concealment. For example, Cardinal Richelieu is said to have used a grille to write secret messages, after which the blank spaces were filled out with extraneous matter to create the impression of a continuous text.[2]
Dot concealment cipher
[edit]A dot or pinprick concealment cipher is a common classical encryption method in which dot or pinprick is placed above or below certain letters in a piece of writing.[4] An early reference to this appears in Aeneas Tacticus's book On the Defense of Fortifications.[6] The Germans improved upon this, using a dot of invisible ink during World War I and World War II.
In 19th-century England, pinpricks in newspapers were once a popular way to send letters with little or no cost.[clarification needed]
If dots were placed far apart, this cipher could be used effectively. The dots should be small and the null text must make sense in the context of the senders and their relationship. Both also must have agreed on the page, chapter, article, or section to be used, typically several.[4] Another option is to have an indicator, such as the date in a newspaper, which shows which page the message is on.[7] This version is less secure.
Acrostics
[edit]The acrostic puzzle is an extended form of null cipher, but not an anacrostic (which uses a set of lettered clues with numbered blanks representing the letters of the answer to figure out the second part, a long series of numbered blanks and spaces representing a message into which the answers for the clues fit). Hidden or otherwise unmentioned acrostics are a type of null cipher.[8]
This method can be used to secretly insult a famous or important individual. For example, Rolfe Humphries received a lifelong ban from contributing to Poetry Magazine after he wrote and tried to publish "a poem containing a concealed scurrilous phrase aimed at a well-known person", namely Nicholas Murray Butler.[citation needed]
Definition of a null
[edit]Put simply, a null cipher is any cipher which involves a number of nulls, or decoy letters. As well as the methods shown above, a null cipher could be plaintext words with nulls placed in designated areas or even a plaintext message broken up in different positions with a null at the end of each word.[7][9] However, a message with only a couple nulls (for example, one at the beginning and one at the end) is not a null cipher.
A null cipher is technically only a term for hidden letters or words within an otherwise unimportant message, however, it is occasionally used for the entire category of concealment ciphers.[2]
Usage
[edit]In general, it is difficult and time-consuming to produce covert texts that seem natural and would not raise suspicion, but a null cipher is an option if one is unable to use an advanced encryption method and has ample time. If no key or additional encryption is involved, the security of the message relies entirely on the secrecy of the concealment method. In the present day, null ciphers are used by prison inmates in an attempt to have their messages pass inspection.[5][10]
Null ciphers are one of three major cipher types in classical cryptography (the other types being substitution and transposition), but they are less well known than the others.[2] They are often marked as a subcategory of transposition ciphers,[2] but that is not true, as transposition ciphers are scrambled messages.
See also
[edit]References
[edit]- ^ a b Gordon, Adam (2015). Official (ISC)2 Guide to the CISSP CBK - Fourth Edition. (ISC)2 Press. p. 349. ISBN 978-1939572066.
- ^ a b c d e f Gaines, Helen F. (2014). Cryptanalysis: A Study of Ciphers and Their Solution. Courier Corporation. ISBN 9780486800592.
- ^ Kahn, David (5 December 1996). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Simon and Schuster. ISBN 978-1-4391-0355-5. Retrieved 12 October 2021.
- ^ a b c Janeczko, Paul B. (2004). Top Secret: a Handbook of Codes, Ciphers, and Secret Writing. Candlewick Press. ISBN 9780763629724.
- ^ a b "Cryptanalysts: Breaking Codes to Stop Crime, Part 1". Federal Bureau of Investigation. March 21, 2011. Retrieved 2018-09-30.
- ^ "Aeneas Tacticus • Siege Defense, XXI‑XXXI". penelope.uchicago.edu. Retrieved 2022-05-28.
- ^ a b Travis, Falcon; Hindley, Judy; Thomson, Ruth; Amery, Heather; Rawson, Christopher; Harper, Anita (1978). The Spy's Guidebook. Usborne Pocketbooks.
- ^ "Steganography". www.garykessler.net. Retrieved 2023-09-24.
- ^ Moore, Gareth (2019). Explorer Academy Codebreaking Activity Adventure. National Geographic Books. ISBN 9781426333071.
- ^ Adabi, Mark (February 5, 2018). "An Atlanta jail intercepted a letter from an inmate who was using a secret code to orchestrate a murder". Business Insider. Retrieved 2018-09-30.
Null cipher
View on GrokipediaFundamentals
Definition and Principles
A null cipher is a steganographic technique that embeds a secret message within a larger, innocuous cover text by selecting specific letters or positions to form the hidden content, while the remaining characters—known as nulls—serve as meaningless filler to disguise the communication.[6] This method preserves the original form of the secret message without alteration, relying instead on the arrangement and selection process to achieve secrecy.[7] The basic principles of a null cipher operate through a structured process shared between sender and recipient. First, a cover text is created that is significantly longer than the secret message to provide ample space for concealment. Second, null characters are inserted around the selected positions of the secret message according to predefined rules, such as every nth letter or specific structural cues. Third, the recipient extracts the hidden message by applying the same rules to identify and compile the relevant letters or words from the cover text.[6] For instance, an acrostic approach might involve taking the first letter of each word in the cover text to reveal the message.[7] Unlike true ciphers, which employ substitution, transposition, or other mathematical transformations to render text unreadable, null ciphers focus on concealment rather than obfuscation of content, aligning them firmly within the domain of steganography.[7] This distinction emphasizes hiding the very existence of the communication over protecting its readability if discovered.[8] A primary advantage of null ciphers is their minimal computational requirements, depending largely on human ingenuity for crafting the cover text and devising extraction rules, which enhances resistance to detection in low-tech environments.Role of Nulls in Message Concealment
In null ciphers, a null refers to any irrelevant letter, word, symbol, or punctuation mark inserted into the cover text to obscure the true message, serving as filler material that mimics natural language without contributing to the secret content. These elements are strategically placed to embed the plaintext according to a prearranged extraction rule, such as specific positions, while the surrounding nulls provide camouflage by forming coherent, innocuous prose or other text forms.[9][10] Nulls can take various forms depending on the cipher's design, including individual filler letters like random vowels or consonants (e.g., frequent English letters such as 'e' or 't' to blend seamlessly), redundant phrases that add descriptive but unnecessary detail, or non-alphabetic symbols like punctuation that disrupt potential patterns without altering readability. For instance, in rule-based null ciphers, nulls might consist of entire words or sentences selected for their ordinariness, ensuring the overall text resembles everyday communication such as letters or reports. This variety allows nulls to function as distractors or placeholders, embedding the message in plain sight while the bulk of the content remains meaningless to unauthorized readers.[9][10] Effective nulls must adhere to strict criteria to evade suspicion, primarily by preserving grammatical coherence and stylistic naturalness in the cover text, such as matching the cultural or contextual tone of the medium (e.g., formal correspondence in espionage scenarios). They should also avoid detectable repetitions or anomalies in frequency that could hint at artificial construction, relying instead on randomization or contextually relevant fillers to maintain the illusion of ordinary writing. Additionally, nulls are designed to align with the extraction key—often position-based—ensuring the secret message can be isolated without compromising the cover's believability.[10][9] The primary detection challenge posed by nulls lies in their exploitation of human perceptual limits, as the cover text withstands casual inspection and even basic linguistic analysis, appearing as unremarkable prose unless the precise extraction rule is known. Without the shared key, cryptanalysts must resort to exhaustive testing of potential patterns, such as scanning for acrostics or positional sequences, which is computationally intensive and prone to false positives in longer texts. This inherent ambiguity makes null ciphers particularly resilient to interception, as the nulls effectively mask the message's presence until targeted forensic methods, like statistical deviation detection, are applied.[10][9]Historical Development
Ancient and Classical Origins
Early examples of steganography, the broader practice of concealing messages, appear in ancient Greece around the 5th century BCE, as described by Herodotus in his Histories. These served as precursors to later textual concealment methods like null ciphers. Herodotus recounts instances such as the exiled Spartan king Demaratus hiding a warning of Persian invasion plans by scraping the message onto a wooden writing tablet and covering it with wax to appear blank, and the Greek tyrant Histiaeus having a secret message tattooed on a trusted slave's shaved head, which was revealed as the hair regrew. Such physical techniques demonstrated embedding information within innocuous carriers, influencing the development of textual methods where irrelevant elements obscure the message.[11][12] By the classical period, concealment evolved into textual forms, particularly acrostics, where initial letters of lines or words form hidden messages in poetry or prose. Recognized today as a subtype of null cipher, acrostics allowed layered meanings visible only on deliberate reading. In ancient Greek literature, acrostics appeared in works like those of the Hellenistic poet Nicander. The practice suited the era's scriptoria, with continuous capital letters without spaces facilitating encodings without altering the narrative.[13] Acrostics also feature in the works of the Roman poet Ovid (43 BCE–17 CE), including in Amores and Tristia. For example, in Amores Book 1, lines form acrostics related to characters like Dipsas. These are literary devices, though some scholars have speculated on deeper interpretive layers.[14] In early Christian contexts, alphabetic acrostics in biblical texts like Psalms 111, 112, and Lamentations illustrate structured textual arrangements, primarily for mnemonic purposes rather than concealment. These Hebrew compositions, part of Christian scripture by the 1st century CE, used sequential alphabet beginnings for verses in devotional poetry. In contexts of persecution, such techniques may have aided subtle communication. Null ciphers thus developed from these literary traditions as tools for exiles and spies, using familiar verse to mask intent.[15][16]Uses in Modern Conflicts
During the American Civil War (1861–1865), concealment techniques played a role in intelligence operations. The Union Army incorporated null words—meaningless terms added to coded telegrams—to confuse interceptors and obscure military dispatches. Confederate agents used coded messages in newspaper advertisements, such as personal ads in the New York Herald, to communicate plans like prisoner escapes. These methods adapted classical precursors for print and telegraph media in espionage.[17][18][19] In World War I, null ciphers gained prominence as spies embedded hidden messages in letters and cables to evade censorship. A documented German example from 1917 involved a null cipher reporting U.S. General John J. Pershing's movements: the cover text read "PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY," with first letters revealing "PERSHING SAILS FROM NY JUNE I." Such techniques used specific letters or words amid innocuous prose for troop and supply details.[7][20] Post-World War II, electronic encryption like SIGABA reduced reliance on null ciphers in conventional warfare. However, they persisted in low-tech scenarios due to field limitations. Detection involved cryptanalytic checks for anomalies like irregular frequencies or patterns, as in Allied Room 40 efforts.[21][7]Variants and Techniques
Acrostic Null Ciphers
Acrostic null ciphers represent a linear form of concealment where the secret message emerges from the initial letters (or occasionally the final letters) of words in an otherwise innocuous cover text, with the majority of the words functioning as nulls to ensure grammatical coherence and natural readability. This technique embeds the plaintext directly into the structure of the overt message, relying on the nulls to dilute and obscure the pattern without altering the apparent meaning of the whole.[22] In 16th-century European court poetry, acrostics served as a subtle vehicle for intrigue, allowing poets to convey hidden sentiments amid political sensitivities. For example, French Renaissance poet Clément Marot employed acrostics in his verses to spell out names or phrases, embedding personal or courtly commentary within seemingly lighthearted works that navigated the era's factional tensions.[23] Such applications extended the form's utility beyond mere literary play, transforming it into a tool for discreet communication in royal circles. Construction of an acrostic null cipher begins with identifying words that start with the successive letters of the desired message, then weaving them into sentences augmented by null phrases chosen for thematic consistency and fluency to evade detection. Null insertions must balance brevity and expansion, preventing unnatural repetition or overly contrived phrasing that might signal concealment.[22] These ciphers excel in ease of composition and transmission, demanding no cryptographic expertise or tools, and integrate effortlessly into prose or verse for low-suspicion delivery. Yet their weaknesses are pronounced: the method offers limited payload capacity relative to text volume, and it falters against systematic scrutiny, such as scanning initial letters, which reveals the message instantly if suspected. In contemporary settings, digital acrostic generators—often designed for poetry—streamline creation by suggesting words and structures based on input phrases, enhancing accessibility for modern users.[22] A representative example illustrates the breakdown: the cover sentence "Have important documents delivered early next" yields the hidden message "HIDDEN" via the bolded initials (Have important documents delivered early next), where "important," "documents," "delivered," "early," and "next" act as nulls to sustain narrative flow.[22]Mask and Grid-Based Methods
Mask and grid-based null ciphers rely on a structured layout where the secret message is embedded in specific positions of a grid filled with innocuous cover text, using a physical mask or key to determine those positions and render the null characters as irrelevant filler. The grille, a pierced template often made of card or paper, serves as the mask; it is placed over the grid to either write the plaintext directly through its openings or to select letters from pre-filled cover text, with the remaining cells acting as nulls that form coherent but meaningless paragraphs when read sequentially. This spatial arrangement distinguishes the method from linear techniques, as the message emerges only when the grille is reapplied to align with the designated holes, obscuring it from casual inspection.[24] The technique traces its origins to the 16th century, when Italian mathematician Girolamo Cardano described the Cardan grille in 1550 as a tool for concealing messages by writing through cutouts in a mask and subsequently filling the gaps with null text to create an innocent-looking document. By the 17th century, it gained prominence in diplomatic practice, with French Cardinal Richelieu employing the grille for both personal and official correspondence to secure sensitive political exchanges against interception.[25] In the 18th century, during the American Revolution, British forces adapted card-based masks for military dispatches, as exemplified by General Sir Henry Clinton's use of an hourglass-shaped grille to hide messages in letters transported by couriers, ensuring the null-filled text appeared as routine correspondence.[24] The 19th century saw further refinement in conflict settings, particularly the U.S. Civil War, where Confederate agent George T. Sinclair utilized a keyed rotating grille in 1863; this involved a 20x20 matrix with a keyword like "EMILY NORTH" to position holes, rotating the mask 90 degrees across four orientations to embed the message without overlapping nulls, enhancing security for espionage reports.[26] Into the early 20th century, the method evolved to typed grids in diplomatic pouches, allowing for reproducible keys without physical templates, though retaining the core principle of patterned extraction for secure transmittal.[27] To encode a message, the sender first constructs the grid with cover text, such as a neutral paragraph on everyday topics, arranging it row by row into a fixed dimension like 5x5 or larger to match the communication's length. The mask, predefined by shared dimensions and hole pattern (often derived from a keyword or diagram), is then aligned to pinpoint the extraction positions for the secret letters, which are inserted or selected accordingly; the full grid is read out linearly to produce the ciphertext, where nulls dominate and disrupt any obvious patterns. For decryption, the recipient rebuilds the grid from the ciphertext and reapplies the mask to read only the exposed cells in order. This process demands precise synchronization of the grille, making unauthorized decoding labor-intensive without the key.[26] A representative example uses a 5x5 grid filled with cover text from a innocuous sentence like "The quick brown fox jumps over the lazy dog," segmented as follows:| T | H | E | Q | U |
|---|---|---|---|---|
| I | C | K | B | R |
| O | W | N | F | O |
| X | J | U | M | P |
| S | O | V | E | R |
