Irregular Webcomic!

Archive     Cast     Forum     RSS     Books!     Poll Results     About     Search     Fan Art     Podcast     More Stuff     Random    
Updates: Monday, Tuesday, Thursday, Friday; reruns all other days
<   No. 1629   2007-07-13   >

Comic #1629

1 Wendy: We be free o' our pursuers, cap'n!
2 Long Tom: That be good. Now, let's be seein' what we can be makin' o' this map.
3 Long Tom: Hmmm. It be writ in an ancient hand, usin' a long forgotten secret pirate cipher, but I can be readin' some o' it.
4 Wendy: How so, cap'n?
4 Long Tom: I be studyin' arrrchaic languages!

First (1) | Previous (1628) | Next (1630) || Latest Rerun (1655) | Latest New (3778)
First 5 | Previous 5 | Next 5 | Latest 5
Pirates theme: First | Previous | Next | Latest || First 5 | Previous 5 | Next 5 | Latest 5
This strip's permanent URL: http://www.irregularwebcomic.net/1629.html
Annotations off: turn on
Annotations on: turn off

A cipher is different from a (cryptographic) code. The basic difference is that codes transform information at the semantic level, whereas ciphers transform it at the lexicographic level.

To illustrate: If you wanted to send the message "The treasure is in Tortuga" in a code, you'd need a codebook with pre-agreed encodings of the ideas of "treasure" and "Tortuga" at the very least. If "treasure" maps to "bananas" and "Tortuga" maps to "the moon", then your encoded message would be "The bananas are on the moon". The person receiving your coded message would need to know that the bananas refer to treasure, and the moon refers to Tortuga. Anyone who didn't know those mappings would have no idea what the message was really about, and no conceivable way to discover the meaning from the message itself. (To break such a code, you basically need to steal the codebook or interrogate someone who knows it.)

On the other hand, if you wanted to send the same message by a cipher, you'd apply some sort of pre-agreed mapping to the letters in the message. An example might be to reverse the words and replace each letter with the next letter of the alphabet, which yields: "fiu fsvtbfsu tj oj bhvuspu". Ciphers may look less comprehensible, but they are more liable to be broken using no information but that contained in the message itself. In this case, the letter "f" appears several times. The most common letter in English text is "e", so we might guess that "f" represents "e" - which in this case is true. A variety of such techniques can crack pretty much any cipher invented before about 1950 and the advent of computer cryptography.


2017-10-11 Rerun commentary: Modern computational cryptography is a whole different kettle of fish. (And before I launch into this, I must disclaim that I am not an expert on cryptography - in fact there are parts of it that I fail to understand, despite trying to read up on it. So I'll keep this discussion in general terms and try not to be too specific. And hope I don't make any glaring errors.)

At one level, computer algorithms can scramble text so thoroughly (and unscramble it correctly assuming you have the correct key) that unaided humans have essentially no hope of cracking the encryption manually. However, with the help of computers themselves, some of these algorithms can be broken and messages decrypted.

Moving up a level, there are some types of cryptographic algorithms that rely on computational properties of mathematics so that messages can be encoded and decoded (if you have the key), but are more or less impervious to any sort of cryptanalysis other than the brute force method of trying every possible key. These are the sorts of encryption schemes in common use today for encrypted Internet connections, email, and banking transactions. But here's where things get interesting, because the number of possible keys that you can try in a given time depends on the speed of your computers. As computers keep getting faster and faster, old cryptographic schemes that used to be effectively secure can become more and more easily broken. The advent of quantum computers threatens to speed up this sort of encryption cracking by vast amounts, rendering most traditional encryption schemes useless.

But moving up yet another level, we can also harness the power of quantum stuff to make quantum cryptography - which goes a step beyond mathematics and uses properties of physics to encode messages securely. To crack quantum encodings, you basically need to change the laws of physics, so it'll be impervious to anything short of Chief Engineer Montgomery Scott.

LEGO® is a registered trademark of the LEGO Group of companies, which does not sponsor, authorise, or endorse this site.
This material is presented in accordance with the LEGO® Fair Play Guidelines.

Irregular Webcomic! | Darths & Droids | Eavesdropper | Planet of Hats | The Prisoner of Monty Hall
mezzacotta | Lightning Made of Owls | Square Root of Minus Garfield | The Dinosaur Whiteboard | iToons | Comments on a Postcard | Awkward Fumbles
© 2002-2017 Creative Commons License
This work is copyright and is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported Licence by David Morgan-Mar. dmm@irregularwebcomic.net