veritas rc

This topic has expert replies
User avatar
Master | Next Rank: 500 Posts
Posts: 266
Joined: Fri Sep 19, 2014 4:00 am
Thanked: 4 times
Followed by:1 members

veritas rc

by conquistador » Sat Sep 17, 2016 10:13 am
Until the rise of powerful commodity computers, and perhaps more importantly until the development of a widespread awareness of the importance of data security and the popularization of the encryption software it requires, there was little cause for a member of the general public to possess any of the devices commonly associated with enciphering or deciphering secret communications. Such was never the case, however, for agencies tasked with national security. Hence, the waning days of the Second World War and the early days of the Cold War gave rise to a specialized class of cipher systems. Often called mnemonic ciphers, they distinguished themselves by requiring little, if any, in the way of material that would arouse suspicion, and offered extremely high levels of security, but often at the cost of inordinate amounts of time or precision to implement.

Since the province of these ciphers was intelligence, or more specifically that ultimate expression of the spy's game, the so called "humint" that thrived for four troubled decades in Europe, this set of priorities was acceptable. A spy could have no possessions that might betray his or her clandestine operations. If an agent were suspected or captured, any possessions would need to appear as innocent or explicable by means of a cover profession. Ideally, to avoid compromising message security or leaving an evidentiary trail, any key information should be memorized and never written in any documents not already destined for destruction.

From this highly specialized field came a range of mnemonic ciphers, some of the most clever ever developed, from the Soviet intelligence apparatus. This family culminated in the VIC cipher which required no fewer than thirty complex steps to secure even a brief message. Using a memorized "recipe," a Soviet agent would combine together an easily remembered date, a snippet of the lyrics of a popular song, a two-digit personal "agent number," and a five digit number made up for each message into a nearly impervious key that would scramble the text beyond the comprehension of the best Western intelligence and police agencies. Other than understanding the procedure of the cipher, which would be well practiced during training, the spy needed only to remember three individual pieces of information, two of which could be publicly verified should memory fail!

The ingeniously complex keying system with its chain addition and advanced arithmetic fed a complex pair of transposition tables that provided the real security of the cipher. The tables modified the results of a simple straddling checkerboard that served little function beyond turning the textual message into a more easily manipulated string of numerals. Once these steps were done, a communique home to Moscow or instructions back from headquarters was disguised as a long string of numbers, ready for transmission by radio, dead drop, or any other means. And while its nature as a secret communication was clear, the message contained within was as thoroughly obscured as was then possible.

According to the passage, which of the following was a requirement of an effective mnemonic cipher?

It must require few tools or files that could give away a spy's secret operations
It should include written records to ensure no data is lost
It must require an extensive and complex process for the agent to follow
It should disguise the secret nature of the message as commonplace communications
It need not offer extremely high levels of security

User avatar
Legendary Member
Posts: 2663
Joined: Wed Jan 14, 2015 8:25 am
Location: Boston, MA
Thanked: 1153 times
Followed by:128 members
GMAT Score:770

by DavidG@VeritasPrep » Wed Sep 21, 2016 11:01 am
Mechmeera wrote:Until the rise of powerful commodity computers, and perhaps more importantly until the development of a widespread awareness of the importance of data security and the popularization of the encryption software it requires, there was little cause for a member of the general public to possess any of the devices commonly associated with enciphering or deciphering secret communications. Such was never the case, however, for agencies tasked with national security. Hence, the waning days of the Second World War and the early days of the Cold War gave rise to a specialized class of cipher systems. Often called mnemonic ciphers, they distinguished themselves by requiring little, if any, in the way of material that would arouse suspicion, and offered extremely high levels of security, but often at the cost of inordinate amounts of time or precision to implement.

Since the province of these ciphers was intelligence, or more specifically that ultimate expression of the spy's game, the so called "humint" that thrived for four troubled decades in Europe, this set of priorities was acceptable. A spy could have no possessions that might betray his or her clandestine operations. If an agent were suspected or captured, any possessions would need to appear as innocent or explicable by means of a cover profession. Ideally, to avoid compromising message security or leaving an evidentiary trail, any key information should be memorized and never written in any documents not already destined for destruction.

From this highly specialized field came a range of mnemonic ciphers, some of the most clever ever developed, from the Soviet intelligence apparatus. This family culminated in the VIC cipher which required no fewer than thirty complex steps to secure even a brief message. Using a memorized "recipe," a Soviet agent would combine together an easily remembered date, a snippet of the lyrics of a popular song, a two-digit personal "agent number," and a five digit number made up for each message into a nearly impervious key that would scramble the text beyond the comprehension of the best Western intelligence and police agencies. Other than understanding the procedure of the cipher, which would be well practiced during training, the spy needed only to remember three individual pieces of information, two of which could be publicly verified should memory fail!

The ingeniously complex keying system with its chain addition and advanced arithmetic fed a complex pair of transposition tables that provided the real security of the cipher. The tables modified the results of a simple straddling checkerboard that served little function beyond turning the textual message into a more easily manipulated string of numerals. Once these steps were done, a communique home to Moscow or instructions back from headquarters was disguised as a long string of numbers, ready for transmission by radio, dead drop, or any other means. And while its nature as a secret communication was clear, the message contained within was as thoroughly obscured as was then possible.

According to the passage, which of the following was a requirement of an effective mnemonic cipher?

It must require few tools or files that could give away a spy's secret operations
It should include written records to ensure no data is lost
It must require an extensive and complex process for the agent to follow
It should disguise the secret nature of the message as commonplace communications
It need not offer extremely high levels of security
Find it in the passage. At the end of the first paragraph, we get the following line: Often called mnemonic ciphers, they distinguished themselves by requiring little, if any, in the way of material that would arouse suspicion

[spoiler]"A" [/spoiler]is basically a paraphrase of this notion.
Veritas Prep | GMAT Instructor

Veritas Prep Reviews
Save $100 off any live Veritas Prep GMAT Course

User avatar
Master | Next Rank: 500 Posts
Posts: 266
Joined: Fri Sep 19, 2014 4:00 am
Thanked: 4 times
Followed by:1 members

by conquistador » Wed Sep 21, 2016 11:04 pm
Based on the information contained within the passage, transposition tables are most likely to be:

The most effective way of securing a secret message
One of the components of the VIC cipher
A technique unique to the VIC cipher
One of the pieces of information memorized by a Soviet agent
Part of all mnemonic ciphers

User avatar
Legendary Member
Posts: 2663
Joined: Wed Jan 14, 2015 8:25 am
Location: Boston, MA
Thanked: 1153 times
Followed by:128 members
GMAT Score:770

by DavidG@VeritasPrep » Fri Sep 30, 2016 9:24 am
Mechmeera wrote:Based on the information contained within the passage, transposition tables are most likely to be:

The most effective way of securing a secret message
One of the components of the VIC cipher
A technique unique to the VIC cipher
One of the pieces of information memorized by a Soviet agent
Part of all mnemonic ciphers
The paragraph that precedes the discussion of the transposition tables mentions the VIC cipher. The first sentence of paragraph four is The ingeniously complex keying system with its chain addition and advanced arithmetic fed a complex pair of transposition tables that provided the real security of the cipher. So the transposition tables are a component of the VIC cipher. Answer is B
Veritas Prep | GMAT Instructor

Veritas Prep Reviews
Save $100 off any live Veritas Prep GMAT Course