Выбрать главу

‘So. A trail bike. Probably the same bike he used to ride away from the equipment shed.’

‘Yes.’

‘Back to last night. You said there was a falsified accusation of assault?’

‘It came over the radio just as the officer was about to interview Proctor.’

‘That is convenient. In Germany we say somebody has “cried wolf”.’

‘Here too.’

‘Who was the caller?’

‘It turned out to be a kid. Truscott—the reporting officer—said she looked to be on the wrong side of sixteen.’

Saskia felt a memory move, delicate as a baby’s kick.

~

The driver stopped midway along a featureless road on an industrial estate. Saskia and Jago left the vehicle and entered a grey complex of office buildings. She could see security cameras tracking them. On instinct, she lowered her face into the raised collar of her greatcoat. The wind sang in the corners. Jago ushered her into the lee of a five-storey building. There were Lothian and Borders Police signs, but the impression was blank, corporate. The occasional flowers looked unhappy.

Saskia relaxed her shoulders as they entered the lobby. There was a security barrier but its horizontal bars were open and its lights green. Jago nodded to the guard and, just like that, they were through.

‘The good news is, they found us a room,’ said Jago, entering the lift.

‘And?’

‘You’ll want to keep your coat on. They’re renovating some of the floor and half the windows are missing. It’s a tad “parky”.’ He used air quotes. ‘That means -’

‘Parky. Right.’

They shared a smile as the doors closed.

~

‘Agent Brandt,’ said Paul Besson, removing his mittens, ‘what do you know about cryptanalysis?’

Saskia considered this nervous, boyish forty-year-old. She was reminded of Lev Klutikov. The last two minutes had comprised rapid introductions and work allocations for the team of four, all galvanised by the chill in the room.

She was about tell Besson she had no idea what cryptanalysis meant. Then, the answer came to her. She said, ‘The study of methods for undoing the encryption that has been applied to a signal, in order to discover its true meaning.’

‘Very good.’ His tone was flat and he had difficulty meeting her eyes. She could smell the anxiety on his breath. ‘Yes, very good. So far, we know this. That, sometime in the last forty-eight hours, our suspect initiated a communication using his personal computer as the interface, and telecommunications equipment in his taxi as the transmitter. That the communication was an encapsulated transmission of video and audio. That it passed through the exchanges at ScotIX and MAE-West. That it lasted less than two minutes. That there were two parties involved.’

‘And that we very much want to know its content.’

‘And that.’

‘Milk and sugar, please,’ she said.

Saskia watched him pour four cups of coffee. They were standing next to the long conference table that dominated the room. Garland—a red-haired, thirtyish woman who had travelled up to Scotland with Besson—nodded and took one of the coffees and returned to her station at the head of the table, where she donned smoked glasses and re-entered her workspace. Meanwhile, Besson put milk and sugar into another cup—hesitating, his eyes on Saskia’s knees—and gave it to Saskia. She smiled and stepped away from the coffee machine.

‘Tell me,’ she said, ‘were both ends of the transmission encrypted at source, or were they directed through a third-party server somewhere?’

Besson raised his eyebrows. ‘It’s starting to sound like you should be the consultant, not me.’

‘Let’s say that I don’t remember what I’ve forgotten. Start with the basics.’

Besson sipped his coffee and unzipped his coat. He loosed a sigh of concentration. ‘Basics: encryption being the process of converting publicly readable information into something that can only be understood by the intended recipient. These days, we tend to use something called asymmetric encryption. It’s asymmetric because the key used to encrypt the information is not the same as the key use to decrypt it.‘ Besson made a sound like a purr. ‘It’s…’

‘Complicated?’ she said, sipping.

He grinned and put a hand on the crown of his head, scratching. ‘You remember the Enigma machine?’

‘No.’

‘The Germans used it to encode military transmissions during the Second World War. The cool thing about the Enigma cipher was that it changed itself with each letter of the message. The odds against breaking it were 150 million million million to one. But it was cracked.’

‘How?’

‘It was systematic. It was predictable. With modern computers we could break it easily. But if there is no system, we have a real problem.’ He looked pained. ‘I’ve had a brief look at the data this morning. I’d guess it falls into the unsystematic category. It’s a one-time pad. Unbreakable.’

‘I do not like the sound of that.’

‘Of all the methods of encryption, only one is mathematically impossible to crack, and that’s the one-time pad, or OTP. Even given infinite computing resources, the plaintext could never be recovered from the ciphertext. The OTP uses a key that has the same number of elements as the plaintext. Each plaintext element’s value—be it a letter or a pixel—is transformed by the corresponding random value in the key. As long as each element in the OTP is truly random, there’s no systematic element for a cryptanalyst to sniff out. It’s what we call perfect secrecy. You rarely find OTPs in the wild because they’re unwieldly, but we do use them to teach students the basics of cryptanalysis.’

‘So how does the receiver of the message know how to unravel it?’

‘The sender and the receiver must have identical versions of the key.’

‘And what form might the key take?’

‘It would be a series of random numbers approximately one terabyte in size, in this case—based on my guesses about the format and frame rate of the transmission.’

‘Paul, tell me honestly,’ said Saskia. Her voice was low. ‘Is it possible to discover the contents of Proctor’s communication?’

Jago’s arm reached between them and took one of the coffees. ‘You can forget you heard that name. I mean it.’

‘Oh dear,’ said Besson, looking amused. ‘Somebody point out the irony of spilling the beans to a cryptanalyst.’

Saskia frowned at Jago. ‘Scotty, I have made it clear that I do not agree with your superiors’ policy of restricting information.’

Besson nodded seriously. ‘I like your attitude, Agent Brandt.’

‘It’s Kommissarin,’ said Jago. He turned to Saskia. ‘All the same, we should keep this on a need-to-know basis.’

‘Did you manage to find a heater?’ asked Besson.

‘That depends. Will you manage to forget the name?’

After a pause, Besson said, ‘Kommissarin Brandt, you were asking about the possibility of cracking an OTP. Well, it has been done. The Signal Security Agency of the US Army managed to crack the OTP of the German Foreign Office in 1944. It turned out the Germans were using a machine whose numbers weren’t completely random. That gave the breakers a foothold. But Proctor’s code? We have no foothold.’

‘Well, looks like you can go back to Cheltenham,’ said Jago, triumphantly. ‘Sorry to have wasted your time.’

‘Scotty,’ said Saskia, ‘the transmission is critical.’

Jago took her elbow and walked her away from Besson.

‘It’s important, maybe. Tell me why it’s critical.’

‘Proctor got this call moments before he walked into the West Lothian Centre with a bomb. Did he receive instructions from the person behind the bombing at that point? Or was it the last message to a loved one from a man about to lose his freedom? In either case, we must discover to whom he was talking. The second party might have been involved in his escape. Perhaps they are waiting for him, helping him.’