Advertise here with Carbon Ads

This site is made possible by member support. ๐Ÿ’ž

Big thanks to Arcustech for hosting the site and offering amazing tech support.

When you buy through links on kottke.org, I may earn an affiliate commission. Thanks for supporting the site!

kottke.org. home of fine hypertext products since 1998.

Beloved by 86.47% of the web.

๐Ÿ”  ๐Ÿ’€  ๐Ÿ“ธ  ๐Ÿ˜ญ  ๐Ÿ•ณ๏ธ  ๐Ÿค   ๐ŸŽฌ  ๐Ÿฅ”

kottke.org posts about cryptography

Elizebeth Smith Friedman: The Codebreaker

The details of Elizebeth Smith Friedman’s remarkable career sound a bit outlandish when you list them all together:

  • cracked thousands of codes and ciphers during WWI

  • did the same in WWII, helping to foil Nazi spy rings and protect Allied supply ships

  • chief cryptanalyst for the US Navy and the US Coast Guard

  • co-developed, with her husband, many of the principles of modern cryptology

  • broke mobster codes used by rumrunners bringing illegal alcohol into the US during Prohibition

  • testified in court against Al Capone

  • debunked the claim that Francis Bacon had secretly written Shakespeare’s plays

  • J. Edgar Hoover took credit for her “uncovering a Nazi spy ring operating across South America in 1943”, knowing that her wartime work was classified and she couldn’t correct him

From an NSA press release in 2020:

She began solving these encrypted messages and providing the Coast Guard with vital intelligence that supported their efforts to interdict smuggling. She also trained a small team in cryptanalysis to expand the crime-fighting intelligence effort. Elizebeth and her assistant solved about 12,000 coded messages between the so-called rum runners and smugglers, which resulted in 650 criminal prosecutions. In addition to criminals violating the Prohibition laws, some of the messages Ms. Friedman solved also enabled the arrest and conviction of a number of narcotics smugglers.

She had a personal role in some of the prosecutions. She testified as an expert witness in 33 cases, and frequently became the subject of newspaper and magazine articles. For a time, she was one of the most famous women in the country.

From a 2022 piece in the US Naval Institute’s Naval History magazine:

The Zimmermann Telegram, sent in code, changed the trajectory of life for the Friedmans, who possessed skills suddenly extremely valuable to the U.S. government. The military was desperate for codebreakers, and radio and wireless technology was changing the nature of war. There were possibly three or four persons in the whole of the United States who could break codes, and Elizebeth and William were two of them. Elizebeth was the first to decode military messages intercepted from the Mexican Army, working by counting the frequency of letters.

The Friedmans began operating as a team, developing strategies as they went along. For the first eight months of the war, they and their small team conducted all codebreaking for every part of the U.S. government, developing broader methodologies still in use today. Neither was particularly good at mathematics, but they operated on an intuitive level to devise techniques to discern patterns. Most importantly, their methods were scientific, which is to say the results could be replicated.3 The Friedmans worked feverishly to solve messages as they poured in. They decrypted messages from Scotland Yard revealing an intricate separatist plot by Hindu activists living in New York to ship weapons to India with German help. William was summoned to testify about how he broke the codes, but before he could take the stand, an Indian man in the gallery shot one of the defendants.

The Marshall Foundation:

While testifying against Al Capone’s liquor smuggling ring in New Orleans, Mrs. Friedman taught a lesson on the science of codebreaking and the use of mono-alphabetic ciphers right in the courtroom. Col. Amos Woodcock, director of the Bureau of Prohibition said that without the work of the cryptanalysis unit and the expert testimony of Mrs. Friedman, the case would not have been won.

Time magazine: How America’s ‘First Female Cryptanalyst’ Cracked the Code of Nazi Spies in World War II โ€” and Never Lived to See the Credit:

But her biggest achievement was uncovering a Nazi spy ring operating across South America in 1943 โ€” a feat that J. Edgar Hoover took full credit for on behalf of the FBI. Friedman, meanwhile, took her involvement to the grave.

From the National Women’s History Museum:

Smith met William Friedman, a geneticist at the estate. After spending time together, Smith brought William onto her team to help break the Shakespearean codes. They worked together to show there was no evidence that Bacon wrote Shakespeare’s plays, while growing closer professionally and romantically. The couple married in Chicago in May 1917, just after the United States entered World War I. Now using her married name, Smith Friedman worked with her husband at Riverbank to decrypt every single secret message sent to them by the Navy. Trailblazing her way through the field as an expert and teacher, Smith Friedman successfully trained the first generation of codebreakers for the military.

In 2017, Jason Fagone published a bestselling biography about Friedman, The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America’s Enemies (AMZN). That book was the basis for an hour-long PBS/American Experience documentary called The Codebreaker, which is available for rent at Amazon or as a free bootleg on Dailymotion. Here’s the trailer:

Reply ยท 1

The Secret Message Encoded in the Parachute of the Mars Perseverance Rover

decode instructions for the secret message hidden in the pattern of the Parachute of the Perseverance rover

decode instructions for the secret message hidden in the pattern of the Parachute of the Perseverance rover

NASA engineers encoded a secret message in the parachute the Perseverance rover used to slow its descent to the surface of Mars. Tanya Fish provided a handy guide to decoding it on Twitter and as a PDF available on GitHub.


Lava Lamps Help Keep The Internet Secure??

Web performance and security company Cloudflare uses a wall of lava lamps to generate random numbers to help keep the internet secure. Random numbers generated by computers are often not exactly random, so what Cloudflare does is take photos of the lamps’ activities and uses the uncertainty of the lava blooping up and down to generate truly random numbers. Here’s a look at how the process works:

At Cloudflare, we have thousands of computers in data centers all around the world, and each one of these computers needs cryptographic randomness. Historically, they got that randomness using the default mechanism made available by the operating system that we run on them, Linux.

But being good cryptographers, we’re always trying to hedge our bets. We wanted a system to ensure that even if the default mechanism for acquiring randomness was flawed, we’d still be secure. That’s how we came up with LavaRand.

LavaRand is a system that uses lava lamps as a secondary source of randomness for our production servers. A wall of lava lamps in the lobby of our San Francisco office provides an unpredictable input to a camera aimed at the wall. A video feed from the camera is fed into a CSPRNG [cryptographically-secure pseudorandom number generator], and that CSPRNG provides a stream of random values that can be used as an extra source of randomness by our production servers. Since the flow of the “lava” in a lava lamp is very unpredictable, “measuring” the lamps by taking footage of them is a good way to obtain unpredictable randomness. Computers store images as very large numbers, so we can use them as the input to a CSPRNG just like any other number.

(via open culture)


The NSA is decrypting all the things

Edward Snowden’s leak of NSA documents keeps paying dividends. The latest report (in the Guardian, the NY Times, and Pro Publica) alleges that the NSA has cracked or circumvented many of the internet security protocols designed to keep communications private from third parties. From the Pro Publica piece:

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume โ€” or have been assured by Internet companies โ€” that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

Cryptographer Matthew Green speculates on exactly how the NSA might have achieved these results and what the implications are.

Probably the biggest concern in all this is the evidence of collaboration between the NSA and unspecified ‘telecom providers’. We already know that the major US (and international) telecom carriers routinely assist the NSA in collecting data from fiber-optic cables. But all this data is no good if it’s encrypted.

While software compromises and weak standards can help the NSA deal with some of this, by far the easiest way to access encrypted data is to simply ask for โ€” or steal โ€” the keys. This goes for something as simple as cellular encryption (protected by a single key database at each carrier) all the way to SSL/TLS which is (most commonly) protected with a few relatively short RSA keys.

If you’re concerned about the privacy of your communications, security expert Bruce Schneier has some suggestions for keeping secure.

1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections โ€” and it may have explicit exploits against these protocols โ€” you’re much better protected than if you communicate in the clear.