PopCo

Home > Literature > PopCo > Page 39
PopCo Page 39

by Scarlett Thomas


  ‘Did you really do it?’ Emma says.

  ‘Did you?’

  ‘Yeah. Look.’ She shows me the lip gloss she stole.

  I smile, and get mine out too.

  ‘Do you think they’ll be following us?’ she says.

  I frown. ‘I don’t know.’

  ‘We’d better not go into Boots again for a while, just in case.’

  ‘No.’

  We are brave. We are on the run. We have new lip gloss! We promise not to tell anyone else we have done this. Later, Emma asks me if I will be her best friend. It is logical – in our group, Lucy and Michelle are best friends, as are Sarah and Tanya. I had a feeling that Emma has brought me into the group and groomed me for this purpose and when she asks me now I get the feeling of finally having done things right.

  We meet the others later and go to McDonald’s, where, even though we are scared of being seen/caught, we cannot resist getting out our lip glosses. Of course, we do not say how we obtained them. I can tell that Lucy and Michelle approve of me a bit more today. I have lip gloss. I am wearing fashionable clothes. After lunch, we all eat chewing gum (to make our breath fresh) and then we go to the small shopping centre and sit on a bench watching a group of boys from our year who are sitting on another bench watching us. We giggle, and they occasionally call things out and hit each other.

  At about three o’clock, just before I have to leave to get my bus, one of the boys comes over. His name is Michael and everyone knows he wants to go out with Lucy. He comes over to Emma and takes her off to one side, whispering something in her ear. She comes back, grinning.

  ‘Do you like Aaron?’ she asks me.

  ‘Which one is Aaron?’ I say.

  ‘The one with blond hair.’

  ‘Oh.’ He is in my class for history, I think.

  ‘Well? Do you like him?’

  This is a potential minefield. If I say yes, and she sends the message back to the boys, there is every chance they will just jeer at us and shout out things like ‘No chance’, or just make gross noises meaning ‘You’re ugly/yucky’. This is the kind of thing that happens at school. However, things are different in town.

  ‘Why?’ I say, in the end.

  ‘He’s asked you out,’ she says.

  Bloody hell. A boy has asked me out. Is this a joke?

  ‘Don’t take all day,’ one of the other boys shouts from their bench. I glance over and see Aaron punch him on his arm.

  ‘Tell him yes,’ I say quickly, to Emma.

  She nods in the direction of the boys, and three of them cheer, while Aaron blushes. I avoid catching his eye. It’s almost time for me to go and get my bus. It is arranged, via Emma and Michael, that my new boyfriend will walk me there. All the way to the bus stop, and with the others walking behind saying things like ‘Oooh’, and ‘Kissy kissy’, I ask Aaron things about whether he likes school, and other things that pop into my head. I have this idea that if you are going out with someone, you should get to know them. Aaron doesn’t say very much but, when we reach the bus stop, he checks to see that his friends aren’t looking and then kisses me on the cheek. He blushes, says, ‘See you at school’, and then runs away.

  As soon as the bus has pulled off, and my friends are no longer in sight, my stomach clenches like something in a vice in woodwork. I am the only person on the top deck and it is too quiet up here. I close my eyes and see a mess of images: animals in cages, rows of cosmetics, children jeering, beef burgers. I see Aaron’s face leaning in to kiss mine. He wanted to kiss my lips but I turned away. I have a bag of contraband school uniform, that I stole dinner money to get, and a lip-gloss in my pocket that I stole from a shop. I am a liar and a thief.

  Walking home from the village bus stop, I look at Rachel’s house and wish she was home. I will write her a letter tonight, I think. What have I become? Still, I am in too deep to go back now. I will not show my grandparents that I am upset. I will conceal the lip-gloss and new school clothes from them. I will only cry on my own, when no one is looking. I think of Aaron’s kiss, and I wish it had been Alex. I wish I went to chess club.

  There is a car in the driveway that I haven’t seen before. Is it the police? With my heart beating wildly, I walk around to the back of the house and let myself in. I feel sick crossing the threshold to my own home, as if the Alice that should live here is dead because I killed her. That makes me an impostor. I don’t want to be found out. I want to hide for a million years.

  ‘Ah, the wanderer returns,’ says my grandfather when I walk through the back door. He sounds happy, so maybe the visitor isn’t the police. She doesn’t look like the police, actually. She is sitting in the kitchen with my grandfather, drinking a glass of wine.

  ‘Hello,’ she says to me. ‘You must be Alice.’

  She is about my grandparents’ age but more glamorous. She is wearing a black kaftan and a crimson silk scarf. Her lips are the same shade of red as her scarf and glisten like a cut beetroot.

  ‘Hello,’ I say shyly. Then I remember that I am an impostor and cannot say too much in case I am discovered. In fact – I must look like an impostor in Emma’s clothes. Just as I have this thought, my grandfather glances at me again and does a double-take.

  ‘Is it the wine or is there something different about you?’ he asks me.

  ‘I borrowed Emma’s clothes,’ I mumble as I walk through the kitchen and go upstairs to my room. From up here I can hear the sounds of laughter downstairs. I place the carrier bag (which hasn’t been noted, thank God) on my bed and take out my lip-gloss. I apply some of it to my lips but it feels wrong so I wipe it off with the back of my hand. I slip it in my school pencil case instead and think about doing some homework. I half-heartedly take out a couple of books and my folders but my life feels like an open wound at the moment and I can’t focus on homework. Instead, for the next hour or so I lie on my bed with the radio on, trying to convince myself that I like Aaron. Then there is a knock at my bedroom door. It’s the police! No, in fact it is my grandmother.

  ‘I think dinner is almost ready,’ she says to me. ‘Did you have a nice time with your friend?’ I climb into my grandmother’s head and imagine her ideas about the kinds of things two friends would do on a Saturday. I see two girls playing Ludo, helping with each other’s homework, talking about life, families, dreams and ambitions. My grandmother would never understand what I have done today.

  ‘Yes, thanks,’ I say.

  ‘Jasmine is here for dinner. Did you meet her? She’s an old friend of ours. Very interesting woman.’

  ‘Yes,’ I say. ‘I did meet her.’

  ‘Alice?’ says my grandmother. ‘Are you all right?’

  I immediately bristle. ‘Yeah, of course. Why?’

  ‘No reason. Well, see you downstairs in a minute, then.’

  ‘OK.’

  Jasmine reminds me of a very grown-up version of Roxy. She has been travelling, it transpires, which is why my grandparents haven’t seen her for so long. She has been to India, Africa and even China! No one knows anything much about what goes on in China so for ages she tells my grandparents things she has seen there. After we have finished our main course, she lights a long, black cigarette and leans back in her chair like she has no problems in the world. Why can’t I feel like this? Then my grandfather serves his famous homemade Black Forest gateau, and something about this scene is so comfortable and homely that I want to cry. I want to cry and tell them all that I never want to go to school again.

  ‘So how’s the world of cryptography, Peter?’ Jasmine asks.

  ‘You mean cryptanalysis, of course.’ He laughs.

  She laughs too. ‘I was never too great with all that terminology. Code-breaking, then, that’s an easier term. How’s it going?’

  ‘It’s going well. I – well, Alice and I – are working on a fascinating project at the moment. I’ll show you after dinner. It’s called the Voynich Manuscript …’ His voice fades out slightly. In my head, every synapse I have is singing, �
�Alice and I, Alice and I …’ My grandfather has described it as our project! I am so proud, I want to burst. When my grandfather’s voice fades up again, he is about to talk about something else.

  ‘Since you asked about cryptography, though,’ he is saying to Jasmine, with laughter still dancing in his eyes, ‘I feel compelled to tell you the latest developments.’

  ‘So this is what …? Code making rather than breaking?’ She smiles. ‘Graphy from Graphein. To write.’

  ‘That’s right. Have you heard about Public Key Cryptography or RSA?’

  Jasmine laughs again. ‘Peter, have I ever heard about something scientific before you or Beth have told me? Come on, just tell me. It sounds bloody complicated.’

  My grandfather starts by way of a kind of introduction, explaining problems in cryptography, telling her that, historically, even supposedly unbreakable ciphers have always eventually succumbed to cryptanalysis. He talks about Charles Babbage breaking the Vigenère Cipher a hundred years ago and the operatives at Bletchley Park breaking Enigma. This leads the three of them to make various comments about the war, and my grandmother says something about Turing and BP while we finish our cake.

  ‘So,’ my grandfather says, getting up to put coffee on the stove. ‘The challenge has been for the cryptographers to come up with something truly unbreakable. Since Enigma tumbled, the ball has been truly in their court. Now, Alice, tell Jasmine what the biggest problem with cryptography is.’

  Me? I gulp. What is the biggest problem of cryptography? I force my mind into reverse and try to remember all the conversations we have had on this subject.

  ‘The distribution of the key?’ I say uncertainly.

  ‘See, I told you she’s a genius,’ my grandfather says. ‘Exactly. The distribution of the key. Most ciphers are enciphered and deciphered using the same key, often a jumble of letters or numbers or a word. I could decide to communicate with you using the Vigenère Cipher, or even a mono-alphabetic cipher. We would both know that the key was, say, the word “lapsang”. No problem. I use the key word to encipher the message, and you use the same word to decipher it.’

  ‘How do you encipher a message using the word “lapsang”?’ Jasmine says.

  My grandmother smiles. ‘Don’t ask him that. We’ll be here all night.’

  We all laugh. This is true.

  Still, to help this make sense for Jasmine, he quickly explains how you could start a ciphertext alphabet with the word ‘lapsang’ (but without the second ‘a’, of course) and then follow it with all the other letters of the alphabet backwards. He writes it on a scrap of paper like this:

  a b c d e f g h i j k l m n o p q r s t u v w x y z

  l a p s n g z y x w v u t r q o m k j i h f e d c b

  If both sender and receiver knew that the key word was lapsang, any message sent would be easy to unscramble (he doesn’t explain that any message sent using this cipher would unscramble easily anyway due to frequency analysis, though).

  ‘Now, say our key had fallen into enemy hands,’ he says. ‘We would need to change it. But how do I, the sender, get the new key to you, the receiver? What if, to avoid compromising the key, we decided to change it every day? We would still have to exchange it. I could phone you and say, “The key word is now ‘Darjeeling’”, but our telephone may well be bugged. In fact, if we knew our telephone not to be bugged, we could exchange secret information over the phone without any need for a cipher at all.’

  ‘I see,’ says Jasmine. ‘So in order to send a secret message using a key, you first have to send an un-secret message telling the other person what key you are using.’

  ‘Quite,’ says my grandfather. ‘And that is the weak point – the point at which the enemy can intercept the information.’

  ‘What if, every day, you sent a message and then, in the same code, sent the new key word for the following day?’

  My grandfather brings the coffee pot to the table and fetches the best cups from the dresser. ‘People have used methods like that,’ he explains. ‘But you can see that in that situation, if one message was deciphered by the enemy they would be in the loop for all time. They would only have to crack one message to be able to crack all the others for ever.’

  ‘Ah,’ says Jasmine. ‘So, how do you do it, then? I know you want to tell me …’

  ‘Well, there are a couple of ways. The first way, known as the Diffie–Hellman–Merkle key-exchange system – named after the people who invented it – is based on one-way functions and modular arithmetic, which Beth knows more about than me.’

  My grandmother smiles. ‘Believe me, Jasmine, you don’t want to know. It’s basically a complex mathematical trick where two people think of a number, run it through a function – much more complicated than “think of a number, double it and add five” but similar – and then swap the results. The exciting thing about this method is that even if the two results are overheard, the enemy can’t crack the code, because you need to know one of the original numbers to break the code – not the results. It’s very complicated to explain but it is a very clever trick indeed. It didn’t catch on because it turned out to be impractical. The sender has to communicate with the receiver beforehand every time they want to send an encrypted message. But mathematically, at least, this system is very exciting. Imagine being able to swap a key in public, rather than in secret, knowing that even if the enemy hears what you say, it doesn’t matter. It’s brilliant.’

  My grandfather sips his coffee. ‘What people really needed was an asymmetric key, rather than a symmetric one. In other words, a system where the thing you use to lock a message is different from the thing you use to unlock it. If you had a system like this, you could send the lock to someone who wanted to communicate with you, not the key. The best analogy is an actual padlock. Say I had a secret box to send to you. I could buy a padlock and key, then lock the box with the padlock and try to work out how to get the key to you without it being intercepted. Or, alternatively, I could tell you I had a secret box to send to you, at which point, you could purchase a padlock and key and just send me the padlock. It wouldn’t matter who intercepted the padlock – they wouldn’t be able to do anything with it. When I receive the padlock, I just snap it on the package and send it to you. Once it’s locked, even I can’t open it, because only you have the key.’

  ‘That’s so clever,’ Jasmine says. ‘I like that.’

  ‘Couldn’t someone pick the lock?’ I say. ‘If you intercept the padlock, you could then make the key, surely?’

  ‘Well, this is the clever bit. The padlock and key is simply an analogy for – sorry – more maths. In fact, people came up with the concept of an asymmetric cipher several years before they worked out how to do it, mathematically. For a while, no one could think of a function that would have this effect. But, then, three chaps at MIT did it. What if I told you, Alice, that the key in this story was actually two very large prime numbers. What is the lock?’

  I think for a moment. ‘I don’t know,’ I say.

  ‘Well, what do you get if you multiply two large prime numbers together?’ he says.

  ‘A very large composite number,’ I say. ‘With two very large prime factors … Oh! I see.’

  Of course. If you choose two large enough primes, keep them a secret and multiply them together, someone who wanted to prime factorise the big number would have to start from 2, 3, 5, 7, like anybody else doing a prime factorisation. They wouldn’t know where the prime factors would be found, and I know as well as anyone that prime factorisation has to be approached methodically. My grandmother proved to me once that with a big enough value of N (with N being the composite number that is a product of two large primes, p and q) it could take thousands of years to find the answer, even if you could try one prime a second. Of course this is a great method of encryption. You send the large composite number to the person who wants to send you a message, they use it to encrypt this message in such a way that you need the prime factors to decrypt the messa
ge and then, bingo! Only you can read it. You could tell everybody in the world what N is but only you would know p and q.

  For the next half an hour or so, we all explain prime numbers and prime factorisation to Jasmine. I am able to join in with this like a grown-up, as I spent so long doing those prime factorisations for my grandfather. Eventually, she understands.

  ‘But surely computers could do it in a second?’ she says.

  My grandmother shakes her head. ‘With a big enough composite number, N,’ she says. ‘You could have ten billion computers in the world, all working simultaneously, each checking a thousand different prime numbers every second and they would still take a billion years to come up with the answer. Yet, just one of these computers could generate N from p and q in a second.’

  ‘That’s amazing,’ Jasmine says.

  ‘Martin Gardner, the chap who writes the Mathematical Games column for the Scientific American …’ My grandfather begins.

  ‘A bit like an American version of the Mind Mangle,’ my grandmother explains.

  My grandfather continues. ‘Yes, well, back in ’77 he set a challenge for people to crack a code with a public encryption key that ran to 129 digits. Remember, although encryption is based on the large composite number N, it is not just used on its own. There is some modular maths in there as well. However, the security of the cipher relies on N being impossible to factorise quickly. This, then, was the main challenge: to come up with the prime factors of this large number.’

  ‘So how long did it take to crack it?’ Jasmine asks.

  ‘Oh, people are still working on it. Beth was asked to join a team trying to crack it actually. But she’s too busy with proper maths.’

  ‘I’m surprised you didn’t give it to Alice to try,’ my grandmother says, laughing. ‘Since she did all that other prime factorisation for you. And there is a prize of $100, I believe.’

  A prize of $100! I file this away to think about later. We all move into the living room and Jasmine starts talking about new developments in her own area, psychology. She talks about a man called Stanley Milgram, and his controversial book, Obedience to Authority, in which he describes a series of experiments designed to determine how far people would go if their actions were condoned by an authority figure. The study is about ten years old, now, but has apparently inspired all sorts of exciting research.

 

‹ Prev