The Queen of Scotland and the plot to create a counter-encryption. Cipher – a double-edged sword.
To prove the classic of the Ceasar cipher, we came to England in 1587. The Ceasar encryption method is believed to be used for a counterattack.
Mary I, queen of Scotland, after a failed attempt to regain the throne, fled south to seek help from her cousin, Queen Elizabeth I of England. Mary had previously claimed sovereignty over Elizabeth’s throne and received support from Catholics in England, including those involved in a rebellion that was turned to the name Of the Northern Insurgency. Elizabeth imprisoned her in various castles and hamlets in England.
In 1586, he was tired and afraid of death after months of imprisonment. Mary begins contact with a group of Catholics who are plotting to rescue her as well as assassinate the Queen of England, the leader being a 24-year-old Babington. Of course, Mary was not allowed to send letters during this time, she had to ask an intermediary on Gifford to smuggle the letters into the beer box and bring them into the castle where she was being held.
Babington was wise enough to understand having to code letters with treasonous plots. He used the method of replacing a code board like the Ceasar code, but instead of using words to replace the letter, Babington used symbols to replace the letter and did not forget to add meaningless symbols to hope to “interfere” the decode if accidentally caught.
Gifford’s post-mailer turned out to be a double carrier. The entire letter reaches the hands of Francis Walsingham, the Queen’s High Lady, who is tasked with stopping treason plots before being sealed and reaching Mary.
Walsingham’s Phelippes decoder with a sufficient number of letters quickly solved Babington’s passcode. The letter accepting to take part in Mary’s plan of treason finally reached Walsingham, who saw it as an opportunity to act. Without immediately arresting Mary, Walsingham asked Phelippes to use a code to forge a letter asking Babington to declare the names of his friends in full as a pledge to join the counter-operation.
Babington was overthrown in that his code was only him and Mary knew he had rushed to believe the copy. In the end, whatever comes. Walsingham foiled the plot before it was ready to take place. Babington and his accomplices were arrested and executed while on the run. Queen Mary has denied involvement in the plot, but in the face of evidence that the letters have been deciphered, she still has to accept death. Her execution was one of the most famous in history.
The above story, as evidence that the use of cryptography that is not secure enough is more dangerous than the exchange of ordinary information. For example, Mary and Babington discussing the plot to create a counterattack in the pub would not have dared to reveal all such information clearly. Believing in the code, Babington no doubt believed in a fake message because he thought that no one knew about it besides Mary and him.
Picture: The ciphertext that Mary uses, is called the Babington ciphertext – after its founder.
You must log in to post a comment.