| 
 
 Home Programme History Contacts Links 
  | 
| 
 7th October 2014 - Secret Communications, codes and ciphers Richard Phillips Our new season was opened in fine style 
by President Ian Dewar with the help of a plentiful supply of freshly baked and 
delicious treacle scones, courtesy of club member Robert Kirkhope. 
 Once normal business had been conducted our President 
introduced the speaker, Mr Richard Phillips, who talked about secret 
communications and some of their impact on history, concentrating on more recent 
times. Most examples necessarily were cases in which secrecy failed! Ranging 
through treason and revolution, spies, military and diplomatic cases, and civil 
liberties, failures of secrecy had sometimes been matters of life and death—even 
sometimes changing the course of world history—such as the execution of Admiral 
Yamamoto in WW2, and the Zimmerman Telegram in WW1. The methods used by ‘state 
security’ long ago were already well-developed, as the example of Mary, Queen of 
Scots’ last conspiracy showed. The telegraph, just like today’s e-mail was 
vulnerable to interception and encryption was, and remains, one of the most 
effective methods of protecting communications. The 1920’s saw the development of more secure ciphers and 
machines which were in use for three quarters of a century. Careless use of 
these systems during WW2 allowed the Allies to be outstandingly successful in 
the code war though all sides had some successes.  Mr Phillips then looked briefly at 
another way to protect communications, hiding even the existence of a message by 
steganography and concealment containers. He showed some actual examples of 
these as used by major spies. Electronic computers were developed by and for the 
code-breakers but computers then began to need security themselves. Secure 
computer ciphers were developed for use by businesses and individuals. These can 
give protection from fraud and theft, spying and eavesdropping. They are widely 
used by commerce, political and human rights activists, journalists and anyone 
concerned about  protecting 
their privacy and security. We rely on them every time we use our plastic cards 
in an ATM or electronic point-of-sale till or buying on the Internet. 
The USA’s extensive spying and communications 
interception and code-breaking capability can read much of the world’s 
electronic communications. For most people, the biggest threat to their privacy 
is their own government, several of which cooperate in USA communications 
monitoring. Cryptography is a 
technology that is impossible to regulate. In many respects cryptography is like 
a pair of gloves. Most people use cryptography to 
prevent 
crime rather than to hide it just as most people wear gloves to protect their 
hands rather than to hide their fingerprints. By ensuring the 
confidentiality and authenticity of electronic banking and Internet commerce, 
cryptography prevents theft and credit-card fraud. The vigorous application of 
cryptography may also improve national security, the encryption of 
communications for example and protect businesses from industrial espionage. 
Paradoxically we might create a 
safer society by 
promoting a technology that somewhat hampers law enforcement. 
  A lively Q&A session followed and Mr Phillips was given a 
hearty vote of thanks by the members. Our next meeting 
is on Tuesday 21st 
October when Mr John Bolton will speak on test flying and aeronautical 
engineering.      |