Cryptography, also known as Cryptology, is the practice and study of techniques for converting information into a form for secure communication or storage in the face of a known or potential adversary.
Due to the covert, sensitive or hidden nature of certain subjects concerning them, various aspects of cryptography are utilized on both magic and science sides.
Etymology[]
The prefix crypto-, present in both cryptography and cryptology, is derived from the Greek kryptos/kruptós/κρυπτός (meaning "hidden" or "secret"). For the respective suffixes, -graphy derives from -graphia/gráphō/γράφω (meaning "writing"), and -logy derives from -λογία/-logia ("study/account of").
Two terms in Japanese that can be used to refer to many subjects within the field of cryptography/cryptology are angō (暗号? used for "code", "cipher", "encryption", "cryptography" etc) and kaidoku (解読? used for "decode/decoding", "deciphering", "decrypt/decrypting" etc).
Principles[]
This section requires expansion Cryptography, cryptanalysis/decoding, Steganography, ciphers and methods of encryption, specialist positions involving decoding |
There are various methods of encryption and different types of cipher. Two examples of basic cipher types are a transposition cipher (one of which is utilized with the scytale), where the positions of characters are moved to produce a different permutation of a text's characters, and a substitution cipher (of which, the Caesar cipher is a basic example), where characters are substituted for different characters. In modern times, the advance of science has given rise to new methods of encryption, including applications of random number generation and properties of quantum mechanics (applications of the latter, encryption and otherwise, being referred to as quantum cryptography).
The Caesar cipher (カエサル式暗号 Kaesaru-shiki Angō?), named after and used by the famous Roman general Julius Caesar in private correspondence, is a basic substitution cipher which often used as an initial foundation leading into more complex encryptions. With it, the letters in the text are substituted with the respective letters a set number of places from them along the alphabet, forwards or backwards.[1]
There are various tools which have been used to support cryptographic processes, from simple mechanical devices to modern computers. A very early example used in ancient Greece is the scytale (スキュタレー式 Sukyutarē-shiki?),[1] a cylinder around which a strap of single letters is wrapped. Using a type of transposition cipher, when wrapped around the sideways cylinder vertically, the letters on the strap line up to spell out the intended message horizontally, one which isn't apparent from the order of the letters on the strap when it is unwrapped.
One variant of cryptography is steganography, which involves concealing a hidden message within another message or an object. Rather than just protecting the contents of a message, steganography also involves concealing the fact that a secret message is being sent.
Given the use of codes in the magic side, large counter-magical organizations such as Necessarius may have decoding specialists among their ranks, such as Orsola Aquinas and Sherry Cromwell,[2][3][4] the latter specializing in codes hidden in paintings.[2] The position of Cancellarius in the Roman Catholic Church, once held by Aureolus Izzard, was one said to be involved in decoding witchcraft and finding countermeasures.[5]
It was anticipated that research into Meltdowner's unique property of ignoring quantum theory and manipulating the state of an electron regardless of who was observing it, would have applications in new types of quantum cryptography.[6]
Background[]
Cryptography has been used in simple forms since antiquity, with examples including the scytale used in ancient Greece and the Caesar cipher, a substitution cipher named after and used by Roman general Julius Caesar of Rome in private correspondence.[7][1]
Due to the hidden nature of the magic side, forms of cryptography have been utilized at various points throughout its history. Many grimoires and magical texts are written in code (the infamous the Book of the Law among them),[3][8][9][10][11] and people like the Rosicrucians have used a form of code to concealed magical messages within paintings, music and other works of art.[2][12][13][14]
One notable cryptographer who was also involved in the occult, was Johannes Trithemius, a German abbot and polymath whose students included Heinrich Cornelius Agrippa and Paracelsus. Two of his famous cryptographic works are the three-volume Steganographia and the five-volume Polygraphia.[15] One of the ciphers in the latter was utilized in the Cipher Manuscripts that were involved in the founding of the Golden Dawn by William Wynn Westcott and Samuel Liddell MacGregor Mathers.[15] Westcott's discovery of at least one Trithemius encryption method was apparently coincidental.[16]
At some point, an absolute encryption contest was held in Academy City, with the random number encryption program Omega Secret winning the contest, subsequently gaining a reputation for being practically unbreakable.[17] The company Montgolfier was previously involved in quantum cryptography work.[18]
Chronology[]
Toaru Majutsu no Index[]
This section requires expansion Check arcs for potential examples, Other Orsola Aquinas/Sherry Cromwell cases?[2][3][4] |
Orsola Aquinas Rescue Arc[]
- Main article: Orsola Aquinas Rescue Arc
This section requires expansion Orsola Aquinas's supposed decoding of the Book of the Law as the instigation[19][3][8] |
Orsola Aquinas's supposed discovery of a way to decipher the Book of the Law,[19][3] from attempts at decoding incomplete copies of the book in order to find a way to destroy the grimoire, is what resulted in the Roman Catholic Church targeting her.[19] During the subsequent conflict over her, it emerged that what she found was one of the fake codes written into the book's construction and not the true method of decoding it.[8]
Toaru Majutsu no Index Light Novel Volume SS2[]
- Main article: Toaru Majutsu no Index Light Novel Volume SS2
On the third Friday of September, while hacking into the Bank for an unknown reason, Misaka Mikoto found the data inside the system becoming encrypted at a rate she couldn't keep up with even with her powers, and deduced that it was the work of Omega Secret from the random manner of encryption.[17]
Toaru Majutsu no Index SS: Agnese's Magic Side Work Experience[]
While investigating a possible connection between the recent incidents they had resolved, Agnese Sanctis, Lucia and Angelene experienced frustration in dealing with ciphers on top of many languages when reading grimoires in the Anglican remote database in Zurich.[11] Later, during the attack on the Guild's Thira base, they found that the Guild was using a Caesar cipher for its encryptions, rather than a scytale as they expected from a group dating from ancient Greece, a fact they would use in figuring out how the Guild had changed with the times from Greek to Roman to Christian, their thinking and their goals.[7][1]
Shinyaku Toaru Majutsu no Index[]
This section requires expansion Check arcs for potential examples |
Coronzon Arc[]
- Main article: Coronzon Arc
During the events surrounding the Crowley's Hazard invasion of the United Kingdom, the recreated William Wynn Westcott utilized a spell, verbally invoking a coded text he held, fragments said to reveal power when read using methods of Trithemius’s five books, and referred to the knowledge of the Golden Dawn's beginning.[15]
Souyaku Toaru Majutsu no Index[]
Christmas Eve Arc[]
- Main article: Christmas Eve Arc
During the events on December 24th, Misaka Mikoto and Misaka 10032 had a brief competition over who could crack Maidono Hoshimi's phone, only to be surprised when Index beat them to the passcode - an incident which would later be referred to in a discussion about the vulnerability of electronic protection and encryption to magic.[20][9]
Los Angeles Arc[]
- Main article: Los Angeles Arc
This section requires expansion Vulnerability of electronic encryption to magic[9] |
During the events in Los Angeles on December 26th, Othinus had a discussion with Kamijou Touma about the vulnerability of firewalls and other forms of electronic protection, even quantum encryption, to magic, referencing how Index was previously able to break a phone's password even without magic, and raising the possibility that the Academy City forces' unmanned weapons may have been turned against them.[9]
The practice of hiding messages (such as a recipe for the Philosopher's Stone) in paintings, and the possible simplicty of the code by using symbols only known to an intended recipient (such as the sun representing gold and a pelican for the stone) was also referenced while trying to solve a message left on Melzabeth Grocery's smartwatch.[14] Stiyl Magnus also considered that the Citrinitas spell would have required the decoding of a German original grimoire.[10]
Post-Handcuffs Arc[]
- Main article: Post-Handcuffs Arc
During Anna Sprengel and Aradia's conversation on the legends of the Transcendents, when the former was officially joining the Bridge Builders Cabal and touring their base, texts coded, analyzed and rearranged were talked of, along with letters, notes, texts from correspondence lessons, and urban legends.[21]
New Year's Arc[]
- Main article: New Year's Arc
During his battle with Kamijou Touma and the dragon, when his own magic was drawn out from his head via bloodstain patterns, Johann Valentin Andreae invoked the name Trithemius to use one of his encryption methods, applying a random encryption to the magic circles and other patterns to lock them up.[16]
Toaru Kagaku no Railgun[]
Sisters Arc[]
- Main article: Sisters Arc
Uiharu received a call from Mikoto asking for any information about the clone's passcode "ZXC741ASD852QWE963"; soon enough, Uiharu told Mikoto that it is a clearance code for high-level information.[22]
Jailbreaker Arc[]
- Main article: Jailbreaker Arc
After agreeing to cooperate with Uiharu, Aohoshi Suzuran handed her an encrypted USB stick with data from the facility where Shundan Kimi and her friends were experimented on. Uiharu easily broke through the encryption, finding information concerning the true nature of Kimi's ability.[23][24]
Trivia[]
- Although not a cryptographical device itself, the design of the John's Pen Remote Control was influenced by the device reminding Haimura Kiyotaka of the cryptex from the Da Vinci Code,[25] a device whose name is said to derive from cryptology's crypto- and codex - using the "science of cryptology" to hide a codex, whose design in turn also bears similarities to historical wheel ciphers and wheel-based encryption devices, such as the Jefferson disk.
External Links[]
References[]
- ↑ 1.0 1.1 1.2 1.3 Toaru Majutsu no Index SS: Agnese's Magic Side Work Experience Chapter 5 Part 4
- ↑ 2.0 2.1 2.2 2.3 Toaru Majutsu no Index Light Novel Volume 06 Prologue
- ↑ 3.0 3.1 3.2 3.3 3.4 Toaru Majutsu no Index Light Novel Volume 07 Prologue
- ↑ 4.0 4.1 Toaru Majutsu no Index Light Novel Volume 10 Chapter 5 Part 5
- ↑ Toaru Majutsu no Index Light Novel Volume 02 Chapter 3 Part 4
- ↑ Toaru Anbu no Item Light Novel Volume 01 Between the Lines 1
- ↑ 7.0 7.1 Toaru Majutsu no Index SS: Agnese's Magic Side Work Experience Chapter 5 Part 2
- ↑ 8.0 8.1 8.2 Toaru Majutsu no Index Light Novel Volume 07 Chapter 4 Part 3
- ↑ 9.0 9.1 9.2 9.3 Souyaku Toaru Majutsu no Index Light Novel Volume 04 Chapter 1 Part 3
- ↑ 10.0 10.1 Souyaku Toaru Majutsu no Index Light Novel Volume 04 Chapter 3 Part 9
- ↑ 11.0 11.1 Toaru Majutsu no Index SS: Agnese's Magic Side Work Experience Chapter 4 Part 3
- ↑ Toaru Kagaku no Railgun SS3 Chapter 8
- ↑ Souyaku Toaru Majutsu no Index Light Novel Volume 02 Chapter 2 Part 2
- ↑ 14.0 14.1 Souyaku Toaru Majutsu no Index Light Novel Volume 04 Chapter 1 Part 4
- ↑ 15.0 15.1 15.2 Shinyaku Toaru Majutsu no Index Light Novel Volume 21 Chapter 2 Part 2
- ↑ 16.0 16.1 Souyaku Toaru Majutsu no Index Light Novel Volume 09 Chapter 4 Part 2
- ↑ 17.0 17.1 Toaru Majutsu no Index Light Novel Volume SS2 Chapter 14
- ↑ Toaru Kagaku no Railgun Manga Chapter 142
- ↑ 19.0 19.1 19.2 Toaru Majutsu no Index Light Novel Volume 07
- ↑ Souyaku Toaru Majutsu no Index Light Novel Volume 01 Chapter 3 Part 8
- ↑ Souyaku Toaru Majutsu no Index Light Novel Volume 05 Between the Lines 1
- ↑ Toaru Kagaku no Railgun Manga Chapter 022
- ↑ Toaru Kagaku no Railgun Manga Chapter 125
- ↑ Toaru Kagaku no Railgun Manga Chapter 126
- ↑ Rainbow Spectrum, V21-22