Digital Fortress

From Wikipedia, the free encyclopedia

Digital Fortress
Digital Fortress book cover
Author Dan Brown
Country United States
Language English
Genre(s) Science fiction,
Techno-thriller novel
Publisher St. Martin's Press
Publication date 1996
Media type Print (Hardback & Paperback)
ISBN ISBN 0-312-26312-0
Followed by Angels & Demons

Digital Fortress is a techno-thriller novel by American author Dan Brown and published in 1996 by St. Martin's Press (ISBN 0-312-26312-0).

Contents

[edit] Plot summary

Susan Fletcher, a brilliant mathematician and head of the National Security Agency's (NSA's) cryptography division, finds herself faced with an unbreakable code named "Digital Fortress", that TRANSLTR cannot break. TRANSLTR is the NSA's 3 million processor supercomputer that can crack encrypted data in a short amount of time, with some codes broken in more than 3 hours, others within minutes. The code of "Digital Fortress" is written by Japanese cryptographer Ensei Tankado, a fired employee of the NSA, who is displeased with the agency's intrusion into people's privacy. Tankado posts a copy of Digital Fortress on his website, encrypted with itself. Tankado auctions the passkey to unlock the algorithm on his website, threatening that his accomplice "North Dakota" will release the algorithm for free if he dies. Tankado is found dead in Seville, Spain. Fletcher, along with her fiancé, David Becker, a skilled linguist with eidetic memory, must find a solution to stop the spread of the code.

[edit] Characters

Main

  • Susan Fletcher - Head Cryptographer
  • Commander Trevor Strathmore - Head of the Cryptography Department ('Crypto') and Deputy Director of the NSA and the main antagonist of the novel.
  • David Becker - Susan Fletcher's Fiancee
  • Ensei Tankando - Ex-NSA employee turned traitor
  • North Dakota (aka NDAKOTA ) - A fictional accomplice of Ensei Tankado
  • Hulohot - An NSA assasain (Wearing wire-rim glasses)
  • Midge Milken - Head of NSA internal security
  • Greg Hale - An employee of 'Crypto'
  • Leland Fontaine - Director of the NSA

[edit] The Digital Fortress

Digital Fortress is actually a trojan horse virus designed with the intent to open the entire NSA databank to the world. Tankado knew that the NSA would try to crack the Digital Fortress algorithm so they could decode messages encrypted with it. When Digital Fortress got into the databank, it opened the firewalls so that "Any 3rd grader with a modem would get access."

[edit] Themes & Issues

This book deals with issues of civil rights and privacy from your government. There are many discussions in the book concerning whether or not having access to everyone's information in order to secure their safety is ethical.

[edit] Real life scenarios

The book is loosely based around the recent history of cryptography. In 1976 the Data Encryption Standard (DES) was approved with a 56-bit key rather than the 64-bit key originally proposed. It was widely reckoned that the National Security Agency had pushed through this reduction in security on the assumption that it could crack codes before anyone else.

In fact the DES was first publicly broken in 1997, 96 days after the first of the DES Challenges. In 1998, the same year as Digital Fortress was published, the Electronic Frontier Foundation (featured in the book) built a piece of hardware costing less than $250,000 called the EFF DES cracker which broke it in 56 hours.

The brute force search used by TRANSLTR takes twice as long for each extra bit added to the key (if this is done sensibly), so the reaction of the industry has understandably been to lengthen the key. The Advanced Encryption Standard established in 2001 uses 128, 192 or 256 bits, which take at least 1021 times as long to solve by this technique.

Unbreakable codes are not new to the industry. The one-time pad, invented in 1917 and used for the cold-war era Moscow-Washington hotline, was proved to be unconditionally secure by Claude Shannon in 1949 when properly implemented. However it is inconvenient and expensive to use in practice and its use is generally limited to government and military agencies.

Public-key cryptography does not generally use fixed length keys and is not susceptible to the computer described in Digital Fortress although it is not unbreakable and may be broken in the future using quantum computing techniques.

[edit] Code solution

The code that appears in the end of the book

128-10-93-85-10-128-98-112-6-6-25-126-39-1-68-78

is decrypted by looking at the first letter of the chapter for each number. For example, chapter 128 starts 'When Susan awoke'. The resulting text is:

WECGEWHYAAIORTNU

Decryption is performed using a columnar transposition cipher, termed a "Caesar Square" cipher in the book (this is unrelated to the Caesar cipher). The letters are arranged into a square:

W E C G
E W H Y
A A I O
R T N U

and read from the top down.

WEAREWATCHINGYOU

Add spaces and you get the plaintext,

"We are watching you"

a reference to the NSA's monitoring systems.

[edit] Technical Errors

Although the book's website cites reviews lauding Digital Fortress for being extremely realistic, the book contains a number of technical errors and misunderstandings in computers, math and technology.

  • In describing how David Becker helped the NSA translate Chinese characters early in the book, there is no point in emphasizing Mandarin Chinese characters, as all Chinese characters are the same, it is only the dialects (Mandarin, Cantonese, Shanghainese, Hakka, etc.) that differ.
  • Also while describing how David Becker translates Chinese characters, Brown implies that Chinese characters and their Kanji counterparts have different meanings. In truth, a character means the same in Chinese and in Kanji, so there is no difference whether Becker was translating Chinese or Kanji.
  • There is an error in the description of the usage of a public key (chapter 4):
Public-key encryption was a concept as simple as it was brilliant. [...] The only way to unscramble the message was to enter the sender’s “pass-key”[...].
In asymmetric cryptography, it is in fact the recipient’s public key that is used to encrypt the message, and not the sender’s one.
  • The terms character and bit are used interchangeably throughout the novel. The term bit being erroneously used to describe a character. In reality, a character is equivalent to 8 bits.
  • Ten-thousand, million, and even ten-billion bit keys are referred to in the text (Chapter 5) as being unrealistic, but possible, scenarios. Simple calculations can be made to determine that, given the number of keys each processor is able to audit per hour (Chapter 5), even if TRANSLTR had as many processors as there are atoms in the universe (about 1080) it would take TRANSLTR more than 1 million years to crack a 320 bit key. Adding a single bit, (a 321 bit key) would double the time taken to use a brute force attack (more than 2 million years). This demonstrates the absurdity of the claim that TRANSLTR could break a ten-billion bit key in 15 hours (Chapter 5).
  • The main character is purported to have created a program called a tracer. The tracer is sent from the NSA to an email address, and upon arrival at the end host's terminal, the tracer sends the host's IP address back to the NSA. The problem is that this program is said to be undetectable (it even self destructs itself). But in order for the tracer program to function, it would have to execute on the host's machine. The host would at the very least need to open the attachment on the email, thus contradicting the supposed stealthiness of the tracer program.
  • The book emphasizes that the Ph.D cryptographer characters believe in the fundamental impossibility of an unbreakable encryption scheme. See one-time pad.
  • The main character's boss has developed a scheme to replace digital fortress with a modified, NSA-breakable, algorithm. However, the original digital fortress software has been published online for some time, allegedly with a large number of downloads. The public would easily be able to tell that the new version of digital fortress has been modified from the original and isolate the changes.
  • Many errors are made when describing the time taken to break keys. Most of these errors stem from a misunderstanding of the relationship between the length of the key and the number of possible keys. In general, this relationship is exponential (that is, as the key length grows linearly the number of possible keys grows exponentially). In the book it is stated that TRANSLTR is able to audit 100 billion keys in one hour (Chapter 5). Beginning with this assumption, then TRANSLTR should be able to break a 32-bit key in about 2.4 minutes. However, in reality, since this relationship is exponential, it would then take 4.8 minutes to break a 33-bit key, about 10 minutes to break a 34-bit key, and 21,058 years to break a 64-bit key. This is inconsistent with the estimation in the book that a 64-bit key would be broken in about 10 minutes.
  • The characters attempt to decrypt the digital fortress software, but acknowledge that it is encoded with an unknown algorithm. It would not be possible to use brute force to decrypt a message without first knowing the algorithm that was used. Without knowing the algorithm, a brute force attack might generate a sufficient number of keys, but would have no method of applying the keys for decryption, because the algorithm is unknown. Similarly, even if the receiver of an encrypted message has the correct key, if the receiver does not know how to apply the key, the key is useless.
  • Chapter 45 describes David Becker running to catch a bus before the driver 'downshifts'. When a vehicle is accelerating, the driver will shift to progressively higher gears, a process called upshifting.
  • The book also contains several typos, perhaps the most glaring of which is a reference to 'VSLI' chips in chapter 18. Brown was most likely referring to VLSI chips.
  • There are many errors in the use of the Japanese language throughout the book, the most glaring of which being the unrealistic name "Ensei Tankado."

[edit] Notes

  • One briefly described character is mentioned as an alumnus of Amherst College, which Brown graduated in 1986.
  • Brown mentions a Hungarian mathematician, Josef Harne, who in 1987 proposed an encryption algorithm that, in addition to encrypting, shifted decrypted cleartext over a time variant. However, neither Harne nor the concept of rotating-cleartext ever existed.[1]
  • Mr. Brown makes a significant error when describing a climactic chase scene up the Giralda Tower of the Cathedral of Seville. Though he describes Becker as dashing up the stairs of the Giralda, one of the well-known features of this tower is that it has no stairs leading to the top, but a series of ramps.
  • Another error appears in the 2004 Corgi paperback edition, on page 143 the assassin Hulohot transmits the message "SUBJECT: P. CLOUCHARDE - TERMINATED", but on page 425 the list of messages reads "SUBJECT: PIERRE CLOUCHARDE - TERMINATED". The same error appears on pages 113 and 357, respectively, in the St. Martin's Paperbacks 2004 edition.
  • Events occurring at Fort Meade in the middle of the night are concurrent with those in Seville at 02:00.

[edit] External links