{"id":8945,"date":"2015-06-05T09:30:23","date_gmt":"2015-06-05T13:30:23","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=8945"},"modified":"2019-11-15T07:04:03","modified_gmt":"2019-11-15T12:04:03","slug":"best-fiction-with-ciphers-explanation","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/best-fiction-with-ciphers-explanation\/8945\/","title":{"rendered":"Five books and films where ciphers are not &#8216;just solved&#8217;"},"content":{"rendered":"<p>Ciphers, codes, and passwords appear quite often in stories, novels, and films of the mystery, spy and adventure genres. As a rule of thumb, writers and filmmakers do not reveal specific details on how the deciphering is performed, as film and story plots are centered upon the deciphered data itself \u00a0or on a character\u2019s sudden insight. This insight serves as a succor in solving a particular code.<\/p>\n<p>Extensive\u00a0elaborations on how a certain code is deciphered in a story or film are quite rare, so we have collected the most interesting occurrences of these rare gems.<\/p>\n<h3>1. The Gold-Bug by Edgar Allan Poe: The Beginning<\/h3>\n<p><a href=\"http:\/\/xroads.virginia.edu\/~hyper\/poe\/gold_bug.html\" target=\"_blank\" rel=\"noopener nofollow\">The whole story<\/a>, essentially, is a first-person narrative of the reading of a ciphered document and the solving of a puzzle that reveals the way to Captain Kidd\u2019s treasures.<\/p>\n<p>The ciphered text is represented by a random set of numbers and symbols, and the story minutely reveals the thought path of the protagonist, who chose to analyze\u00a0the frequency of appearance of symbols and letters in the English language. By substituting letters, presenting\u00a0and disproving\u00a0hypotheses on possible juxtapositions based on frequent (or impossible) English letter-combination usages, he deciphered the text.<\/p>\n<p>This cipher is called a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Substitution_cipher\" target=\"_blank\" rel=\"noopener nofollow\">\u201csubstitution cipher\u201d<\/a>. Even in 1843, when the story was written, it was not considered to be something extraordinary. However, it was one of the first popular accounts of a cryptographic system; for this reason, it attracted a big a lot of attention. After the story was published, there was a contest in a newspaper where Poe took up solving ciphers sent in by readers of the newspaper.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">World War II information security: Richard Sorge and book cipher: <a href=\"https:\/\/t.co\/3R3bkFh7bl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/3R3bkFh7bl<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/596781088418168832?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 8, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>2. The Da Vinci Code by Dan Brown: Atbash cipher<\/h3>\n<p>When asked to name\u00a0a literary work on ciphers, one of the most common answers that comes to one\u2019s mind is The Da Vinci Code by Dan Brown (his other novels might be named too, and, in particular, Digital Fortress deserves discussion among them, for that matter.)<\/p>\n<p>Most puzzles solved by characters in the novel are not ciphers by nature, as they offer\u00a0no single solution and rely on the intuition, knowledge, and imagination of the individual solving them. However, the book offers several examples of real historical ciphers, most notably\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/atbash\" target=\"_blank\" rel=\"noopener nofollow\">the Atbash cipher<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/xmascyber?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#xmascyber<\/a> lecture yesterday, Keith from Royal Holloway talked about Atbash and Da Vinci Code. Here's my code: <a href=\"http:\/\/t.co\/s2QVvTa4u5\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/s2QVvTa4u5<\/a><\/p>\n<p>\u2014 Prof B Buchanan OBE FRSE (@billatnapier) <a href=\"https:\/\/twitter.com\/billatnapier\/status\/413219454571405312?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 18, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>This cipher, which was created for the Hebrew alphabet, can be easily adapted to other alphabets, since the essence of the method is primitive: the alphabet is \u201cfolded\u201d in two so that the last letter is coded by the first, the second by the penultimate, and so on. As you might have guessed, this cipher offers no challenge for cryptanalysis, as it represents the same simple substitution cipher.<\/p>\n<p>However, this cipher may become comparatively reliable if a frequency analysis turns out to be impossible after you transmit a very short text. Nevertheless, the main heroine, a French police cryptographer, retains a certain pride in being acquainted with the cipher. This pride appears to be na\u00efve, thus creating <a href=\"http:\/\/professional\" target=\"_blank\" rel=\"noopener nofollow\">professional jokes<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">During WW2 modern cryptography principles were often coupled with \u2018amateur\u2019 but equally reliable ciphering methods <a href=\"https:\/\/t.co\/4282BWOXyx\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/4282BWOXyx<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/595990643094196227?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 6, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>3. The Wire by David Simon: Easy-peasy<\/h3>\n<p>In the first season of this <a href=\"http:\/\/en.wikipedia.org\/wiki\/the_wire\" target=\"_blank\" rel=\"noopener nofollow\">legendary TV show<\/a>, a street gang employs a data transmission system that deserves to be reviewed. The system is based upon the use of public telephones and digital pagers in order to exchange messages.<\/p>\n<p>Digital pagers are usually capable of sending an immediate message with a telephone number or a code that represents a standard message like \u201cShow up at the hospital ward!\u201d or \u201cCheese it! It\u2019s a raid!\u201d<\/p>\n<p>The Wire featured the police trying to intercept public-telephone messages in order to build a full network of connections between the gang members in order to track the gang leaders. However, the phone numbers, which were the most valuable pieces of data, were transmitted with \u00a0an encryption.<\/p>\n<p>Just like in Poe\u2019s short story, the starting point for deciphering was a theory on the inevitable simplicity of the cipher used by the gang members. The cipher was able to be solved by the police after hypothesizing that the code was indeed\u00a0suitable for use among street teenagers.<\/p>\n<p>The solution was simple: the opposing numbers over the \u201c5\u201d key were exchanged on a standard phone keypad; thus, 2 was exchanged with 8, 9 with 1, and 5 itself was exchanged with 0.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/06\/06024739\/payphone-keypad.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8952\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/06\/06024739\/payphone-keypad.png\" alt=\"Five books and films where ciphers are not 'just solved'\" width=\"1280\" height=\"961\"><\/a><\/p>\n<h3>4. Zodiac by David Fincher: a Mystery Code<\/h3>\n<p>This is, perhaps, the darkest of the\u00a0stories we discuss here. This is a story depicting the endeavors to catch a serial killer who was active in San Francisco Bay Area at the end of the \u201960s and in the beginning of the \u201970s. The story was <a href=\"http:\/\/www.imdb.com\/title\/tt0443706\/?ref_=fn_al_tt_1\" target=\"_blank\" rel=\"noopener nofollow\">filmed by David Fincher<\/a>.<\/p>\n<p>This killer, who was given the nickname \u201cZodiac\u201d, acted with no\u00a0particular pattern, which made many\u00a0people think that it was not just one man, but a group of imitators. Zodiac terrorized the newspaper with letters, in which he demanded that editors publish ciphered messages in leading articles; otherwise, he threatened to commit new murders of an even greater extent.<\/p>\n<p>Despite refusing, the described murders did not actually ensue. At the same time, Zodiac revealed information about one of his previous murders, details of which could not have been known to a person unrelated to\u00a0killer. At any rate, the murderer was not caught, and enthusiasts have been trying to solve his cryptograms in vain thus far.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Five books and films where #ciphers are not \u2018just solved\u2019<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6dWg&amp;text=Five+books+and+films+where+%23ciphers+are+not+%26%238216%3Bjust+solved%26%238217%3B\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The first more or less convincing solution to one of the cryptograms was offered in as early as 1969. However, there were unsuccessful attempts to break the cipher as a whole. It was supposedly of the substitution kind, known as Caesar\u2019s cipher, that used a mixture of astrological signs and other characters. The rest of the cryptograms remained undeciphered.<\/p>\n<p>Incidentally, taking into account the dubious authorship of the letters and the mental stability of the alleged author, one could actually never be sure that deciphering attempts could lead to any real result at all.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Five lessons from the story of the Enigma cryptographic: <a href=\"https:\/\/t.co\/Xl6w43qpOS\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/Xl6w43qpOS<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/596383248218980353?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 7, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>5. Cryptonomicon by Neal Stephenson: Solitaire<\/h3>\n<p>Assuming that Edgar Allen Poe discovered cryptography in the literary works, Neal Stevenson took it to the next level. In <a href=\"http:\/\/www.amazon.com\/cryptonomicon-neal-stephenson\/dp\/0060512806\" target=\"_blank\" rel=\"noopener nofollow\">Cryptonomicon<\/a>, ciphers and everything related to them are the main\u00a0topic.<\/p>\n<p>The plot line,\u00a0set against a backdrop of the\u00a0Second World War, is devoted to the confrontation of cryptographers of each of the warring sides (including <a href=\"https:\/\/www.kaspersky.com\/blog\/ww2-enigma-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">breaking Enigma and the consequences of this<\/a>). The characters of the second plot line, which unfolds during the dot-com bubble, create something reminiscent of <a href=\"https:\/\/www.kaspersky.com\/blog\/bitcoin-blockchain-news\/\" target=\"_blank\" rel=\"noopener nofollow\">Bitcoin<\/a>.<\/p>\n<p>And where Dan Brown \u2018patters\u2019, Stephenson does not shy away from devoting several pages to elucidation of mathematical or physical principles required for comprehension on how everything works.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">If you want to understand why we'd love to make passwords obsolete, read this book: <a href=\"http:\/\/t.co\/DDZIMxCqbC\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/DDZIMxCqbC<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/io15?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#io15<\/a> <a href=\"http:\/\/t.co\/4HSBbTy7Ln\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/4HSBbTy7Ln<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/604105241819095040?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 29, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Stephenson\u2019s obsession with cryptography reaches its apotheosis in the appendix to the book, which contains a full description of the cryptosystem that was used by one of his characters. The cipher utilizes a deck of cards, shuffled in a certain order, as a key. The appendix has a full manual on how to use the cipher, create the key, and on precautions for those who decide to apply the method in real life.<\/p>\n<p>The book offers good insight\u00a0on the influence these things have upon the world and the principle of functionality of contemporary data security and the Internet industry. In short, it is a must-read.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve collected the most interesting books and movies which give a lot of detail on how exactly ciphers are solved.<\/p>\n","protected":false},"author":40,"featured_media":8946,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1131,1128,261,1129,577,1130,97],"class_list":{"0":"post-8945","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-books","9":"tag-ciphers","10":"tag-encryption","11":"tag-fiction","12":"tag-history","13":"tag-movies","14":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/best-fiction-with-ciphers-explanation\/8945\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/best-fiction-with-ciphers-explanation\/5395\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/best-fiction-with-ciphers-explanation\/6216\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/best-fiction-with-ciphers-explanation\/6159\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/best-fiction-with-ciphers-explanation\/8050\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/best-fiction-with-ciphers-explanation\/5382\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/best-fiction-with-ciphers-explanation\/5449\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/best-fiction-with-ciphers-explanation\/7859\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/best-fiction-with-ciphers-explanation\/8050\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/best-fiction-with-ciphers-explanation\/8945\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/best-fiction-with-ciphers-explanation\/8945\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/books\/","name":"books"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=8945"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8945\/revisions"}],"predecessor-version":[{"id":30473,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8945\/revisions\/30473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/8946"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=8945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=8945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=8945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}