{"id":1631,"date":"2015-05-11T02:14:41","date_gmt":"2015-05-11T06:14:41","guid":{"rendered":"http:\/\/www.kaspersky.com.tr\/blog\/?p=1631"},"modified":"2019-11-15T15:03:32","modified_gmt":"2019-11-15T12:03:32","slug":"2-dunya-savasi-bilgi-guvenligi-richard-sorge-ve-sifreleme-kitabi","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/2-dunya-savasi-bilgi-guvenligi-richard-sorge-ve-sifreleme-kitabi\/1631\/","title":{"rendered":"2. D\u00fcnya Sava\u015f\u0131 Bilgi G\u00fcvenli\u011fi: Richard Sorge ve \u015eifreleme Kitab\u0131"},"content":{"rendered":"<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/Book_cipher\" target=\"_blank\" rel=\"noopener nofollow\">\u015eifreleme kitab\u0131<\/a>, hikaye ger\u00e7ek gibi g\u00f6r\u00fcn\u00fcrken okuyuculara u\u00e7 seviyede teknoloji anlatmaya\u00a0haz\u0131r olmayan casusluk ve dedektiflik roman\u0131 yazarlar\u0131 i\u00e7in her zaman bir l\u00fctuf olmu\u015ftur. \u015eifreleme kitab\u0131nda kullan\u0131lan kolay \u015fifreleme y\u00f6ntemi okuyucular taraf\u0131ndan rahatl\u0131kla anla\u015f\u0131labilir. Kurgulanm\u0131\u015f bir \u015fifreleme sistemi sunmaya\u00a0da gerek yok. Kelimelerle, ilgili numaralar\u0131n yerinin de\u011fi\u015ftirildi\u011fi bir \u015fifreleme tekni\u011fi anlat\u0131labilir. Kitap bazl\u0131 \u015fifreleme tekni\u011fi iki taraf\u0131ndan ayn\u0131 kitaba sahip oldu\u011funu varsayarak hareket eder. \u015eifreleme mekani\u011fi\u00a0her bir harfin sayfa\/sat\u0131r\/karakter olarak kitaptaki yerini belirten basit bir prensibe dayan\u0131r. Daha geli\u015fmi\u015f y\u00f6ntemlerde bir par\u00e7a yaz\u0131n\u0131n \u2018gamma\u2019 olarak kullan\u0131lmas\u0131 veya bir karakter dizisinin mesaj\u0131 kodlamak i\u00e7in kullan\u0131lmas\u0131 m\u00fcmk\u00fcnd\u00fcr. Kitapla \u015fifreleme tekni\u011fi ile g\u00f6nderilen her bir mesaj de\u015fifre edilmeden\u00a0okunamaz haldedir. Daha da \u00f6nemlisi, bu teknikte kar\u015f\u0131l\u0131kl\u0131 anahtar transferi problemi de \u00e7\u00f6z\u00fclm\u00fc\u015ft\u00fcr. Taraflar mesajla\u015fmadan \u00f6nce hangi kitab\u0131 kullanacaklar\u0131n\u0131 kararla\u015ft\u0131rm\u0131\u015flard\u0131r.<\/p>\n<p>Kitapla \u015fifreleme konusunda en tan\u0131nm\u0131\u015f istihbarat yetkililerinden biri Japonya\u2019da casusluk yapan <a href=\"http:\/\/en.wikipedia.org\/wiki\/Richard_Sorge\" target=\"_blank\" rel=\"noopener nofollow\">Richard Sorge<\/a>\u2018dir. Sorge iki ba\u015far\u0131s\u0131 ile \u00fcnlenmi\u015ftir. Alman istilas\u0131n\u0131n tam tarihini bilmesi ve Japon\u2019lar\u0131n uzak do\u011fuda SSCB\u2019ne sald\u0131rmak gibi bir planlar\u0131 olmad\u0131\u011f\u0131n\u0131 komuta merkezine iletmesi.<\/p>\n<p>Ancak ilk mesaj\u0131 (Alman kar\u015f\u0131 istihbarat\u0131n\u0131n s\u00fcrekli olarak dezenformasyon kampanyas\u0131 d\u00fczenledi\u011fini, Alman istilas\u0131 ile ilgili olarak s\u00fcrekli farkl\u0131 tarihler ve tart\u0131\u015fmaya a\u00e7\u0131k detaylar\u0131 verdi\u011fini de not d\u00fc\u015fmeliyiz) g\u00f6rmezden gelinmi\u015fti. \u0130kinci mesaj\u0131 \u015f\u00fcphesiz i\u015fe yarar bir \u00f6ng\u00f6r\u00fcyd\u00fc. Sorge\u2019nin \u00e7abalar\u0131 sonucu Sovyet komuta merkezi, Pasifik cephesinde bir sava\u015f ihtimali g\u00f6z\u00fckmedi\u011fi i\u00e7in askerlerini Bat\u0131 s\u0131n\u0131r\u0131na yerle\u015ftirmeye karar verdi.<\/p>\n<p>Sorge amac\u0131na uygun olarak tablolar\u0131n kolonlar\u0131nda farkl\u0131 say\u0131lar bar\u0131nd\u0131ran Alman \u0130statistikleri Almana\u011f\u0131n\u0131 kulland\u0131. Bu almanak mesajlar\u0131n \u015fifreleri \u00e7\u00f6z\u00fcl\u00fcrken \u2018gamma\u2019 g\u00f6revi g\u00f6rd\u00fc. Japon kar\u015f\u0131 istihbarat\u0131n\u0131n Sorge\u2019nin radyo operat\u00f6r\u00fc Max Clausen\u2019i sorgulayana kadar mesajlara m\u00fcdahale etmesini engelleyecek kadar rastgele say\u0131lar i\u00e7eriyordu.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Richard Sorge ve #\u015fifre kitab\u0131 \u2013 2. D\u00fcnya Sava\u015f\u0131 bilgi #g\u00fcvenli\u011fi:<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fa1qY&amp;text=Richard+Sorge+ve+%23%C5%9Fifre+kitab%C4%B1+%E2%80%93+2.+D%C3%BCnya+Sava%C5%9F%C4%B1+bilgi+%23g%C3%BCvenli%C4%9Fi%3A\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Sorge\u2019yi hataya zorlayan \u015feyler, Japonya\u2019da istihbarat operasyonlar\u0131nda \u00e7ok fazla insan ile etkile\u015fime girememesi, sadece bir ki\u015fiyi operat\u00f6r ve \u015fifreleyici olarak kullanmas\u0131 ve \u00e7ok miktarda veri transferi yapmas\u0131yd\u0131.<\/p>\n<p>Kriptografi tarih\u00e7ileri, Sovyet istihbarat servisinin \u201cmanuel \u015fifreleme\u201d ad\u0131 verilen ve makina gerektirmeyen \u015fifreleme tekni\u011fi konusundaki ba\u015far\u0131s\u0131ndan bahsetmektedir.<\/p>\n<p>Benzer \u015fifreleme teknikleri 2. D\u00fcnya sava\u015f\u0131 ve sonras\u0131nda, Avrupa\u2019da \u201cRed Capella\u201d operasyonunda Sovyet istihbarat ajanlar\u0131 taraf\u0131ndan kullan\u0131lm\u0131\u015ft\u0131r. <a href=\"https:\/\/www.kaspersky.com\/blog\/ww2-enigma-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">Geli\u015fmi\u015f Enigma makinas\u0131n\u0131n m\u00fcttefikler taraf\u0131ndan k\u0131r\u0131lmas\u0131<\/a> konusunda analitik\u00e7iler ve di\u011fer makinalara te\u015fekk\u00fcr ederken, Sorge\u2019nin mesajlar\u0131 kalem ve ka\u011f\u0131t ile \u015fifrelendi\u011fi i\u00e7in saha \u00e7al\u0131\u015fmas\u0131 ve insan fakt\u00f6r\u00fcne te\u015fekk\u00fcr etmek gerekir.<\/p>\n<p>Bu hikaye, kaynaklar\u0131 yerle\u015ftirmek i\u00e7in m\u00fcttefiklerle haberle\u015fme ve Japon komuta merkezinin izlenmesi konusunda \u015fifrelemenin \u00f6nemini ortaya koymaktad\u0131r. Hedeflere ula\u015fmak i\u00e7in istihbarat ve \u00e7e\u015fitli gere\u00e7ler kullan\u0131lm\u0131\u015ft\u0131r. Bilgi g\u00fcvenli\u011fi konusunda insan fakt\u00f6r\u00fcn\u00fcn hi\u00e7 bir zaman g\u00f6z ard\u0131 edilmemesi gerekti\u011fi bu hikayeden al\u0131nacak \u00f6nemli derslerden birisidir.<\/p>\n<p>G\u00fcn\u00fcm\u00fczde siber casusluk y\u00f6ntemlerinde kullan\u0131lan hedefli sald\u0131r\u0131lardan en etkini, <a href=\"https:\/\/www.kaspersky.com\/blog\/no-monkeys-for-cozyduke\/\" target=\"_blank\" rel=\"noopener nofollow\">sald\u0131r\u0131lan organizasyondaki belli \u00e7al\u0131\u015fanlar\u0131 hedef alan<\/a> z\u0131pk\u0131nla avlanma y\u00f6ntemidir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u015eifreleme kitab\u0131, hikaye ger\u00e7ek gibi g\u00f6r\u00fcn\u00fcrken okuyuculara u\u00e7 seviyede teknoloji anlatmaya\u00a0haz\u0131r olmayan casusluk ve dedektiflik roman\u0131 yazarlar\u0131 i\u00e7in her zaman bir l\u00fctuf olmu\u015ftur. \u015eifreleme kitab\u0131nda kullan\u0131lan kolay \u015fifreleme y\u00f6ntemi okuyucular<\/p>\n","protected":false},"author":350,"featured_media":1632,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[704,744,702,557,703,552],"class_list":{"0":"post-1631","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-2-dunya-savasi","10":"tag-guvenlik","11":"tag-kriptografi","12":"tag-kriptolama","13":"tag-richard-sorge","14":"tag-tarih"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/2-dunya-savasi-bilgi-guvenligi-richard-sorge-ve-sifreleme-kitabi\/1631\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/2-dunya-savasi\/","name":"2. D\u00fcnya Sava\u015f\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=1631"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1631\/revisions"}],"predecessor-version":[{"id":7238,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1631\/revisions\/7238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/1632"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=1631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=1631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=1631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}