Cryptography
Cryptography
v<r<.if iir'wxj''
ifv
f>
-~*
*
i
CRYPTOGRAPHY
CRYPTOGRAPHY
BY
ANDRE LANGIE
TRANSLATED FROM THE FRENCH BY
MACBETH
C. H.
J.
AUTHOR OF "THE MARCONI CODE," "MARCONI DICTIONARY,"
CONSTABLE
LONDON
&7
ETC.
COMPANY LIMITED
BOMBAY
1922
SYDNEY
PREFACE
I
HAVE no intention
cryptography.
attainable
in
Finality,
the
even
domain
of
some
of
them
will
complete manual of
very relative, is not
of writing a
this
art.
this subject,
Besides,
good
and the
titles
My
book
is
simply to explain
The
first
have, on grounds of expediency, substituted an approximate reading for the actual text, and have modified the
I
plan,
way
and
localisation.
any
of the narrative, in
such
attempt at identification
PREFACE
vi
give
some advice
in a general
way
on
lines
much
reliance should
TRANSLATOR'S PREFACE
I
assistance I
W.
Washington,
W. W. Smith
M.
Smoot
of the
humbly beg
J.
C.
H.
forgiveness.
MACBETH.
CONTENTS
PART
PAGE
PART
II
EXAMPLES OF DECIPHERING
PART
LISTS
47
122
III
AND TABLES
BIBLIOGRAPHY
158
PART IV
THE PLAYFAIR CIPHER SYSTEM,
Vll
ETC.
159
ACKNOWLEDGMENT
OUR thanks
Examples
English
H. Macbeth.
Mr.
J. C.
The
late Mr.
W.
J. Jarvis.
Mr. H. G. Telling.
Commander Smith, U.S.N.
Paymaster- Commander
Brown, C.B.E., Pt.N.
J.
E. A.
CO.,
July, 1922.
LTD.
2.
CRYPTOGRAPHY
PART
DESCRIPTION
I.
EVERYONE
2
graphy,
Who
has,
at
some time
or
other,
used crypto-
or secret ciphers.
make some
note, or to
correspond with somebody, by dotting letters in a newspaper or book ? Even children amuse themselves in
this
way on
make
is
it is
slipped our
We
ftair,
cryptography.
This Part
I.
et
revue
write.
1
CRYPTOGBAPHY
over,
to
Particularly, more-
others.
at least in theory.
A man will
his
a
on
own
account,
invent,
perhaps
system of writing
can
write
and
means
of
which
he
preserve secrets
by
of
complete secrecy
trials.
the
new French
more
difficult
to
countrymen
had
them all.
Some years ago I was asked by a friend, a professor at
a university in German Switzerland, to decipher a piece
of yellow paper, covered with strange characters, found
among the records of a Swiss politician, a contemporary
of
Napoleon
I.,
historical importance.
first line
My
it
Now
it is
well
known
is
e;
is,
or
s,
in English, t;
the most frequently occurring letter is o, but i if the
language is written in Koman characters. In Polish the
newspapers
are
and
(chi,
oftenest
at least, in the
To
(kong, work).
in any language,
not, negative),
(pull,
ascertain which letters occur
genitive),
one
must
'
calculate
fre-
quencies."
commonly
to do
is
to study
are es in
adjoin.
They
The most frequent groups of three are ent in
French, the in English, ein in German, die in Italian, etc.
Bulky works have been written on this subject containing
long lists, more or less complete, of the various articulations and disarticulations of words.
Of course, this
an
of
amount
enormous
labour, involving a
requires
German.
CRYPTOGRAPHY
4
statistical
many thousands
of
letters.
To
of
either
At
or
s,
last I
Among
the
first
occurs preceded by the supposed u. In French, u followed by e occurs principally in the syllable que. It
could not be the word lequel here, the sixth sign not being
first.
The group must read: Ce que. A
on we meet again with the sign representing c, followed by the r of the word heureux and preceded
by e, a group of letters which might, for instance, form
the words ecran, decret, or, better still, ecrire.
similar to the
little
farther
The decipherment
is
statistics,
but also on
"
hypotheses. In fact, the famous expression,
Suppose that
of
motto
the
is the
cryptographer
.,"
no question
What
was
as follows:
am writing you
I am writing to
heart, since
here
is
merely to relieve
my
days.
my
my
life
..."
It
by
field
in
for
secret
We
Who
has
not
read,
also,
Jules
Verne's
Jangada
In
Voyage into
Jules Verne,
we
see a
life
of
an innocent
the
CEYPTOGKAPHY
to
is
far,
and
careless
it
is
attains
his
nephew Axel,
the
object simply
backwards.
may
is
comparatively simple. He himself
1
acknowledges this, and claims to have deciphered keys
ten thousand times
more arduous. The system
'
conceived by
Jules
Verne in
is
his
Voyage into
the
As to that in
thanks to an incredible
ultra-fantastical.
many
But
edifying subjects
'
'
'
'
key
'
originals.
You do
me
not
know me,"
entirely:
am
neutral."
and try to decipher them. It is a cryptographic exercise as good as any other. There are certain
methods which enable one to guess which letter means 5,
which 0, which 9, etc. 1 I refrained from pointing them
characters,
in
whether he followed
good.
my
was
We
We
sympathetic
which affords no security,
whether used on paper, or, as has often been seen in
the course of the present war, on the skin that of the
arms or back since a simple chemical reaction exposes
inks,
the
employment
them immediately.
of
CRYPTOGRAPHY
An
inquisitive intermediary
if
document
the
in
whereas
brief,
9
it,
the
especially
recipient will place the message received on to a graph
similar to that of the sender, and will have no difficulty
in deciphering:
RFC
'
I love
He
means
OQXDERKYJ LSZVMTAUGNBHW
you dearly."
of a thread.
beginning on the
letter required,
This
same way,
or perhaps
by
is
left,
it is
is
moved a
section,
and so on indefinitely until all the letters required have been marked.
would require
I reciprocate
Thus, to write the words
'
left,
'
'
something over seven sections of the thread, each corresponding to the length of the alphabet.
This
method
1
It is needless to say that if the zigzag contains fifty angles and
the thread bears fifty marks, a decipherer could discover the key of
both.
10
CEYPTOGEAPHY
in his Poliorcetes. 1
is not the same thing as
cryptography, of
not a secret writing, seeing that hundreds of
thousands of persons can make use of it. Nevertheless,
Shorthand
it is
course;
an
artful
in such a
writing.
t
was the correspondence of two bandits, authors of
robberies on a high scale, who were interned at the two
extremes of the prison. They had transmitted their
missives by means of a very well organised postal service.
Their letter-box was purely and simply the backs of the
volumes lent them by the prison library. They had
It
out.
signs.
1
all
of
different
of these
Chapter xxxi.
11
of
messages in order to show the usefulness of a safe form
cryptography.
These two bandits, M. and
schemed plans
of escape,
in the
Some
'
should work in
first-class railway-carriages
operate
chanting resort."
M., who had a taste for mental pursuits and was well
read, mingled the practical advice which we have just
read with philosophical considerations on perfect friendship, on Schopenhauer and Nietzsche, on the destiny of
'
Ask
the soul, etc. Occasionally there is a postscript:
for
our worthy chaplain to borrow my fountain-pen
you.
CRYPTOGRAPHY
12
I will conceal a
watch-spring in
it,
and you can begin on filing the bars of your cell, for we
shall have to be out by the end of the month."
He
Not one out of a hundred shorthand
further writes
experts in Berlin not one, I repeat would be capable
of reading my system Sto.
So it is still more likely to
remain a sealed book in French Switzerland."
The example given above in facsimile means
Be on
the alert
The pincers will be put behind the window;
'
sill
'
this afternoon."
am
Achtung
Fenstersims hinterlegen."
For
II.
As we have
is of service to private
to certain private individuals
but
in
a
lies
of
corusefulness
means
furnishing
individuals
its
main
seen,
that
cryptography
is.
and
action
relief
asked
diplomatic
can be communicated,
Cryptography, when employed for
military purposes, is termed
cipher,"
secret
information
for, etc.
or
whether
it
or
other signs.
any
prevail,
only
Government
is
letters,
conditions
and
departments
authorities
which
military
1
cryptography,
It is a
matter
common knowledge
13
III.
The
quity.
origin of secret writing is lost in the mists of antiTo go back only to 500 years before the Christian
tablets
who discovered
ginians made use of a
King,
indicate
the
the
stratagem."
The Cartha-
tells us,
"
wishing to communicate
waited
'
Revolt
'
(ATroarao-^)."
This rather slow means of correspondence was not in
current use.
At the same period the Spartans had a far
better system of cryptography,
9.
CBYPTOGKAPHY
14
Plutarch,
among
scytale was a
The
of
the
sender.
The
slightest
made
difference
in
the
practically impossible.
To give an idea of the difficulty involved in deciphering
these scytales without having the proper rod, or with a
easily,
of the desired
cylinder.
and that
ness.
shall
15
have
left it
preserved in
its
twenty-five centuries
its original
state of fresh-
We
after various
fixed on the
is
of three letters,
WIL
forming a part
of
To
wild.
test
this,
is
the word
we
capable of
or
ivill
refer to
the
if
another
or
D,
we
are
is
on the
right track.
and cut
it
CKYPTOGKAPHY
16
The Governments
Italian republics
made
17
thirteenth century.
Since the Middle Ages numerous investigators have
pondered over an ideal system of cryptography. Among
philosopher,
complicated
Ministers
cipher
for
corresponding
with
Versailles, or
his
when
M. Poincare, during
his last
journey
Germany has
CKYPTOGKAPHY
18
"
is
German
gold spectacles
cryptography."
despise.
Each
step in the progress of cryptography is accompanied by a corresponding step in the art of deciphering.
History has preserved the names of some celebrated
decodists.
Thus, the geometrician Franois Viete succeeded in deciphering for Henry IV. a very complicated
spirits of
those
still
unfinished.
1
See the Ziircher Post,, February 28, 1916, midday edition, and
the Bund, February 29, 1916, Sup. No. 100. The military Court
at Zurich, after seeming to hesitate subjectively over this point in
a paragraph of its judgment, admitted it objectively in another
paragraph.
Do Thou,
Histoire universelle,
Book
19
first
gave proof of
The
city
commanded by the
of
extraordinary
expressing
usefully
his
surprise.
He
served
(Rossignol)
La
Rochelle,
very
discovering
He
all
who
way
Vol.
Les
i.
ce
CRYPTOGRAPHY
20
ing
And
This
1 prithee
unto
me impart
justify
There
is
extravagant
would wish
Staff,
amount
a certain
that
it.
'
necessarily
an Antoine Rossignol
eulogy,
Colonel Schaeck, of the Swiss General
not
qualifications
patience,
gifted in
any degree
For
this
21
in
of
any
common
by the
exercise
days.
game.
On
July
2,
for
their
3
arduous labours has dwindled terribly since that period.
In 1752 a German professor named Hermann, who had
defied
the
mathematicians
and
learned
societies
of
Encyclopedia Britannica,
Valerio,
De
art.
Courtelary,
village
Cryptography.
la cryptographie, vol.
ii.,
p. 11.
charged
"
officially to
who
itself into
CEYPTOGKAPHY
22
in deciphering a part
of
cuneiform inscriptions.
heads struck them by
One group
its
Miinter
frequent repetition.
'
'
officer,
who
some
in these four
ways
I.
46.
144.
230.
514.
535.
59.
125.
184.
374.
146.
IV.
still
i.e.,
II.
III.
and by
'
229.
As we have
secret societies.
On
Year 1758
two
plates.
23
for
letters in cipher
'
Among
Lenotre,
'
in bizarre characters
of
yield to cryptographic
methods
might
of decipherment.
*J
"
the
German Empire
1
were centres
CRYPTOGRAPHY
24
of
received or sent
by the King
of Prussia's
Ambassador
in
official letters
made
it possible to tear
open envelopes too troublesome
The Court locksmith was under orders to go
to unseal.
the plans of Frederick II., and, when needful, communicated them to Austria and Bussia. Count Briihl, how-
et seq.
25
1
But he did not complain, for
beyond suspicion.
for
some
time
carried on the same kind
he himself had
of espionage, which gave him a tangible advantage over
his opponents during the Seven Years' War.
a masterAustria, moreover, did not lag behind, and
her black cabinet was operated in a wing of the
stroke
Imperial Palace of the Stallburg, at Vienna. The staff,
who were Neapolitans and well versed in work of this kind,
lutely
was placed
to the Spanish
Ambassador, instead
from Madrid
grave consequences, so
reprimanded the negligent official.
involved
in
"
the
black
Prince
the
severely
cannot be
cabinets
as
they merely
cryptography,"
deciphered cryptographic documents by means of the
*****
quite incapable
of
discovering
talents.
his
other
CEYPTOGEAPHY
26
in
of
writer.
IV.
Let us
cryptography or ciphers.
Broadly speaking,
all
the systems
may
be divided into
produce chaos.
1. In the Substitutional
them completely,
that
class
is
so as to
to say,
where
cabalists
of
had
the Bible.
&
Athbash
(beth),
resulted,
and
so on.
among
The applica-
other instances, in
1
identifying under the place-name Bheshak that of Babel,
or Babylon.
Hebrew alphabet X
first
(aleph)
letter
first
of the
27
first
half
(belli)
etc.
(mem),
In a third system, the Aibakli, the interchange of the
But I shall
letters was based on their numerical value.
not dilate further on this, as that clever Hebraist, J. Buxtorf, has explained the whole thing far more clearly
in Latin than I can in a modern language.
Those
1
desiring further details are referred to his book.
in
AAAAA
ABC.
AAAAB
AAABA
The method
of deciphering a document
obvious enough: the frequency of
the groups must be calculated instead of that of the
letters.
In the example given below, representing the
for
written in this
last
of
name,
ABAAA
we
is
letters
plausible
Christian
way
BBBAB
ABAAA
are induced
is
We
De
CBYPTOGBAPHY
28
The
etc.
difficulty
By making
use of the
it
ABCDEFGHIJKLMNOPQBSTUVWXYZ
abcdefghij k Imnopqrstuvwxyz
Bbcdef ghi k Imnopqrstuvwxyz a
Ccdefghij klmnopqrstuvwxyzab
D def ghi klmnopqr st uvwxy zabc
E efghij klmnopq rstuvwxyzabcd
j
etc.
'
'
hieroglyphics
in cipher by using three alphabets, in the first of which
B takes the place of A, C of B, etc. in the second E = A;
and in the third C=A. We accordingly adopt as the
;
We now
BEG
in consecutive
order, thus:
rogly'phics
BECBECBECBECB
ie
is
letter
two
lines
the letter
1
29
ciphered word.
and
so on.
yields
The finished result appears as follows
hieroglyphics
BECBECBECBECB
imgssimcrimet
Thus the word
"
only two stand for the same letter in the plain text;
the same is true of the three m's, while the two s's also
represent different letters.
Let us examine another cryptogram of the
tapvccigrqduprbhitvcc
a
same order
a c e o e a o
e c c.
by means
of Vigenere's
PIANO, we
operate by
left of
thereto the
the table,
first letter
we
of
letter
Espionage compensation
As we have seen, deciphering by means of the keyword is quite easy when we know that word. When we
CKYPTOGKAPHY
30
do not know
it,
too long to explain here, which permit of its discovery almost mechanically. All that can be said is
little
secret
weapons
Now, in
it
with the
weak
spot
is
your command.
the text we have
is
cc,
PIANO.
We
now examine
Let us
follows
M ASE GX
I S
OM OX
AMOXEX
GK YYMNK
YKOSE K
'
phrase.
The
it is
which
in vain that
it
thesis that
we
we have
before us a
31
If
list
same time to
of proper
Hugo, etc.
The axiom postulated by the books that the
letter e
is
in er or ier
and
in,
to indulge
none
even
It
mate.
is
CKYPTOGKAPHY
32
My
Mustaphas.
interlocutor
'
seemed surprised at my
is no trouble at all
Oh, there
who
Taleb,
'
first
supposed i's separated by a letter not yet identiNow, as our study of proper names has gone con-
of these
fied.
siderably beyond the rudiments set out above, we knowthat ini is the most likely ending: Bellini, Eossini, Mazzini,
Di Eudini,
similar
etc.
make the
assumption, we
might be
Acting on
required substitutions
it
33
if
this fails
AGENTI
? E
G A
A moment's
I
?
reflection
A
N
? A
E N
?
? I
letter r for 0,
of frequencies
in Italian
name
by m, and
it
finally
AGENTI
F E E E A E
G A E I N I
T
MM A S
M OE EN
For example:
28. 71. 54. 75. 09. 62. 20. 65. 13. 79. 52. 32. 75. 88. 79. 43. 22.
stand
.
.").
for
"
'
Travaillez,
prenez
The numbers 54 and 09 each
.
("
Work,
mean
take
a; 13, 88,
3
CBYPTOGBAPHY
34
and
43, e;
word
The
you may
you might use a c
lead to confusion.
letter
If
required.
instance,
'
is
besieged."
the same thing.
'
Kiel
'
guess that
'
the
in
'
Kocher.
*****
w and
35
same
WADE
THEEMOMETEE
instead of
BEAEEE
EQUAL
BELLICOSE
ESTUAEY
TOEEENT
TO
OCCASION
OMIT
The word
VISION
TEREIFY
'terrify'
'terrified,"
And,
be shown.
cannot
all
tionary
'
letter,"
in
meaning.
Special
containing
dictionaries
fifty
(page) 17
23
24
25
26
27
GEADUAL
GEANT
GEAVE
GREEK
GEEEN
'
is
CEYPTOGEAPHY
36
gram, coded
words
from a dictionary
of
25,000
numbered
15128
21531
09043
24029
01643
24127
02432
24133
21682
05070
21531
01174
15311
a ciphered document.
Let us assume that
of the last
two numbers
21531 =THE;
It will
above
09043=GENEEAL.
are
W and T.
Leaving
this
on one side
for the
moment,
37
however, we will study the end, where the last two words
are assumed to have been definitely established as THE
GENEKAL.
numbers
about
GENEKAL
half-way
(09043)
tionary.
than
later
make
THE, and
verb
is
expressing something
in
connection with
the
CRYPTOGRAPHY
38
WITHDEAWN
than
(24127) in the
excludes
other
dictionary,
reading but WILL.
any
We have now to tackle the first three words of the
little
earlier
it
cryptogram.
The
WITHIN
lines
or
WITHOUT.
offers
us
as
'probables'
After further study on the
we produce
described,
closely follows
(24127) in numerical
number, 24133,
first
WITHDEAWN
that representing
order, and the dictionary
artillery
"or
'
army."
so closely in
'
straightforward way.
and
all sorts of
complications interspersed.
is to rearrange the order of the
A common method
figures in each
39
etc.
deciphering.
It is a case of baling
the ocean
of those
numbered
dic-
"
codes," is that when
diplomacy as
are
lost
or
in
most
others have to be
cases
stolen,
they
this
kind
be made in a
and
works
of
cannot
compiled,
tionaries,
known
in
day.
when
a fresh code
considerable
t/
so
volume with
his chief.
The latter, during the whole
time of his Adjutant's absence, saw a pile of ciphered
telegrams from Constantinople accumulate on his table,
of cipher
systems
is
the Trans-
positional, in
amount
to anagrams.
for
Some anagrams
more
for
Eome, wander
for
Galenus,
Angelus
1
The pseudonym adopted by Rousseau when giving
concert at Lausanne.
Andrew
etc.
his
In
famous
CEYPTOGEAPHY
40
we
however,
cryptography,
and 1,000
encounter
letters.
anagrams of
have seen one
be added that
Among
numerous,
are included
'
we have already
daemonians, which
these
contrary.
considered.
system
new
start
in the
is
made
same
right
or left
in this
way
EE
TO
HP
SO
EE
NT
GT
TT
00
UE
OH
TK
GW
HE
TA
which means:
THE WEAK.
It
Verne used
his
for
was a
similar
cryptogram
in
cipher
which Jules
Voyage into
the
are
cut.
is
41
super-
operation
continued until
is
all
It
need scarcely be
when
T M H
R
M
|W
SI
R
by
easily
t
G
IP
Y
L.
CKYPTOGBAPHY
42
Nevertheless, even
grille.
of
the
deciphering is not
grille
difficulty
of
this
volume I shall
and
in
the
second
very great,
part
mechanism
of
the
explain the
process by which it can
without the
be done.
officer
had
To complicate
preferred.
system
The method
of
is
to
be
Here
is
a very
MAD K
V
P A E
first
proceeding then to
the letters of the second column, next those
of the last,
fourth,
first,
How
I S
E N N A
slices,
fifth,
and third
or in
some
ADAKN
is
43
by the key
etc.
when the
IAMDE.
would be changed to
This system
V H
U E
P
N E
N H
P L T N
D S S F
W
T
L E
MB
calculable.
flour.
If
of
scope count how many such scarcely perceptible molecules could be contained in a cubic millimetre, we should
us say, 100,000.
Now, to form a sphere as
as
our
terrestrial
large
globe, it would require a number
of these particles equal to that of the combinations which
find,
it
is
let
possible to
make with
series
of thirty-seven figures.
The key
preceding cryptogram.
is
CKYPTOGEAPHY
44
KV
HE WOE
FK
The
first
line is
L P Z U
S I
S N
Decipher-
B L E
E N
composed
French." 2
'
'
This system of
dividers
-which distantly recalls
the Lacedaemonian scytales, and was dubbed by an early
nineteenth- century writer
the undecipherable cipher
'
'
par
excellence
-is
very
difficult to
1
NOTE BY TRANSLATOR. When M. Langie wrote this, the
Germans were inflated with their military successes.
2
The actual words are: " Le mot impossible n'est pas fra^ais."
One method of complication, calculated to exercise the patience
1
45
is less
shorter,
is
irregular.
But
there
is
"
but
'
-it is
probable,
and often certain, that systems absolutely undecipherable to an inquisitive outsider will also be so to their
recipients, however well provided the latter may be
with the desired keys. The reason is that important news
As soon as it is a question of
is nearly always urgent.
has
to
be
had to telegraphy 1 or radioresort
urgency,
Now, in a long alignment of letters which
telegraphy.
are meaningless to him, the most skilful of telegraphists
due to inattention?
will commit involuntary errors
fatigue,
is
worse.
there
is
letter o
-).
letters that
do
all
missing
the mischief.
One
is
error
is
sometimes
sufficient
CEYPTOGEAPHY
4G
cult
none the
indispensable to
choose keys in which one error will not cause a repercussion throughout a document. Furthermore, it is not
to
decipher,
it
is
less
CONCLUSION.
When
it
crowns our
faction
efforts,
Archimedes, exclaim
"
Eureka
!"
PART
II
EXAMPLES OF DECIPHERING
A
ONE day
into
my
CONSULTATION.
a gentleman sent
up
his card
office.
'
is
to
What
affably.
from you
will
is
excuse
morning,
this: I
has driven
have
me from
owe the
said,
very
me
to seek enlightenment
been sent here on a mission; you
my
Arriving this
a postman
when
Now,
hotel
it
it was an
must write in
It is a
cipher all communications of any importance.
wise precaution, for you will see, if you examine the
it had been opened by steam, stuck down
dried.
and
By whom ? None of the
immediately
again,
hotel people could or would throw any light on the
envelope, that
subject.
"
it
had served
its
purpose.
CEYPTOGEAPHY
48
1 destroy papers
without delay."
text,
me
the ciphered
aitegflytboeehreauwnanoarrdrteet
hoshfpetapotoyhlretihenemgaoarnt
a total of sixty-four letters, or the square of eight. Even
without the knowledge that I had to find a grille, that
and
first
my
Eoman
The
that the
grille,
grille
numbered
Eoman
figures, should
fit
EXAMPLES OF DECIPHERING
49
covers corner III., etc., the same hole will expose letter
A further operation will reveal the letter T
(square 8).
(square 64), and a final turn the letter
(square 57).
i
1
CKYPTOGKAPHY
50
On
the
first
line
my
attention
is
attracted by
AT
coincide with
squares 53, 54 (or 56), 59 (or 61), 62, 64. Marking these
and again reversing the tracing paper, we find in the
corresponding squares 1, 3, 4 (or 6), 9 (or 11), 12 the
combination A T E (or F) T (or 0) E. This not being
'
mark
my
is
in its original
THE
letters.
it.
The
and
first
vowel
is
EXAMPLES OF DECIPHERING
51
now
reverse the paper to ascertain what letters correspond to the new marks, and bring to light T (square 3) and
N (20, 23). We now have the group T T E N 0, the
I
ER
now
Let us
this time
cover the
these
we
be noted
turn produces
LAE
HEN
(7,
HEN
and a final
54, 63), which
we
indicate in green.
have now neutralised 24 out of the 64 squares,
thereby narrowing considerably our field of research.
We
R T E R, we look
Coming back to our original group P
for a likely word to precede it, and are favourably inclined
There are two H's between
towards
(32, 36, 39).
the T and the E, and we adopt the second experimentally.
Marking these and reversing the tracing paper,
we find the three corresponding letters to be R T H
THE
(26,
29,
NORTH
THE
33).
CEYPTOGEAPHY
52
track.
Accordingly, we mark in the four colours the
corresponding letters in the four positions, bringing the
total of neutralised squares to 36.
THE NOKTH,
we quickly
discern a
P and an
0, and think of
'
Pole."
These
we
letters are
find
that
accounted
only
twelve
squares
remain
to
be
for.
now appear
as
TTHENOKTHPOLE
ELBEWA E FT HE AN
BANDTHEPOBTEB
Brown:
IF OUAR S AYINGA
Bed:
Green:
Blue:
unmarked
F and
At
this juncture
my
visitor appears.
Have you
dis-
EXAMPLES OF DECIPHEEING
;
'Here is your
gether: IF YOU
grille," I reply.
Let us read
53
it
to-
'
appears downstairs.
It is to be hoped he arrived in time.
WHERE
The Chief
invited
me
is
THE MONEY
of the
to call
welcome, said:
You are aware that, following on the robbery at the
Continental Bank, the notorious individual whose identity
has not been established, and who is known only under one
of his aliases, Pastoure, has just
been sentenced to
five
Had
Now,
in such a
a fellow of his
way
as to be able to find
justice.
54
CKYPTOGKAPHY
We have been able to
and
The text
prisoner,
;
in his presence.
of the will
effect that
required if an
advertisement were inserted in a big daily asking for the
heirs of M. de Pastoure.'
'
'
held in
"
common by
Here
Pastoure
is
has
multiplication,
written
and
sums
division,
in
addition,
me know
subtraction,
at leisure,
and
let
at
EXAMPLES OF DECIPHEEING
55
figures
made
list
of
201010453787243667351876936177952984
847201224675294851852723645223612111
588643110225011813414375659521401593
579131544939454441021252448100642212
These 144 figures were distributed in the following order
of
frequency:
1245370689
Figure:
Times occurring: 24 21 20 17 12 11 10 10 10 9
I
to be discovered here.
On
where the
n's
The famous
line
'
It is scarcely possible,
in
Kunic, to write phrases with a total
except perhaps
of ten different characters.
In French, when Arabic
two
employed.
and
so on.
There were
CKYPTOGKAPHY
56
were never more than two groups alike: two 10's, two
etc.
Twenty-one groups were repeated, and 30
45's,
occurring, in French,
or 17 per cent., I had
my
more
Thus:
certain groups, which followed at intervals of 1.
010, Oil; 110, 111; 223, 224, 225; 453, 454; 642, 643,
then with a lacuna 645; 851, 852. It then occurred to
me to add together the three figures of the highest group
:
And
"none
of
these groups
figures
composing
usage being
v,
the 22nd.
of each group.
EXAMPLES OF DECIPHEKING
sum
57
of 1; Oil
3.
as
v,
if
was
equalling
i,
according to
my theory.
It
might be Latin,"
I thought.
light
was
This
is
any place
here),
e,
s,
u, a, n, o, r,
it
to
'
Calvisius,
3
'
Opus CJironologicum.
Bibliothegue
Municipale.
So he has deposited the sequel to his secret in a
And with a psychological forevolume," I thought.
'
'
NOTE BY TRANSLATOR.
gram, the
936=18 = r, and
the third
CBYPTOGBAPHY
58
of years.
Furthermore, he has chosen, as the receptacle
of his confidences, a kind of work which is among the
Old books on
law or theology are sometimes referred to, but ancient
manuals of chronology are generally allowed to sleep in
peace."
The same day I repaired to the Bibliotheque Municiand asked for the volume by Calvisius. It was a
quarto tome bound in a thick leather cover. The cryp.
togram giving no indication of a page, I thought Pastoure must have made some secret entries on the first or
last pages.
There could be no question of sympathetic
pale,
else.
Still
reflecting,
with
my
fingers, I
became aware
of the existence,
under
gum.
Armed with
EXAMPLES OF DECIPHERING
done, but vice versa, I slipped the
little
59
sponge, soaked
gummed
its
went
me
to
He
Picture the astonishment, then joy, of the Chief
made me describe point by point the development of
!
my
Then he
'
discovery.
Two days
on
hundred
opening my newspaper,
thousand francs which had been stolen had been recovered from the strong-room of a bank, where a compartment had been rented for fifteen years by a client
panied
by
his
sleuth-hounds.
later,
about to start
for Australia
ARABIC NUMERALS.
now
give another instance of success in the discovery or key to a cryptogram. It was in Arabic numerals.
One day I received in the usual buff envelope
I will
CKYPTOGKAPHY
60
of importance,
by reason
of their
and
and 3
Perhaps
it
is
two
figures
67
64
59
50
53
46
66
62
43
49
49
49
49
62
66
50
59
53
45
53
61
50
66
66
49
65
49
50
65
64
60
60
48
60
49
57
60
49
49
49
46
50
66
68
49
45
46
58
51
66
59
49
45
44
66
NOTE BY TRANSLATOR.
At
first
would
EXAMPLES OF DECIPHEEING
61
letter
fill
the
a date is in
"
ted in June."
tation in filling in the three blanks thus:
Our theory is confirmed on examining the series following
"
nineteen
which
"viz.,
lundted
"
is
obviously
Before going any farther,
50),
(46,
59,
66,
50,
62, 49,
hundred."
we summarise the
results
further
:
trial,
we
are
able
to
construct
our
CKYPTOGKAPHY
62
a=53
EXAMPLES OF DECIPHEKING
63
the
In
examination
diplomatic
to
me
for
the
papers
was to search
to
be
submitted
statement.
At
we were
examination.
inside,
man.
But something was taking place at a table at the other
end of the room, where a mysterious personage, who was
addressed as
Mr. Deputy," was occupied in taking
allegations against the arrested
'
notes.
only
flour.
so,
CKYPTOGKAPHY
64
open newspaper.
YOUWOULDHAKDLYKNOWTHEBE
WASAWABPBOVISIONSABEPLEN
T
("
You would
hardly
Pro-
among
Two
'
EXAMPLES OF DECIPHEEING
a good pace, under the light of the
about two in the morning.
moon,
65
home
reached
'
'
"
'
One
it
Each contains
sixty-five letters.
Cipher
We
is
the result
ABCDEFGHIJKLMNOPQRSTUVWXYZ =
70136103401404531533414020 65
71
57013402
03710
73310011 = 65
it
I will
will be difficult.
decipher them.
'
'
CKYPTOGEAPHY
66
number
equal
J's,
be imagined.
the precious paper from my pocket case and began to
study it. It read as follows:
may
USLAAVIPICASDHOIOTOEIDOLY
SHEBAHADADSTCESKENESONEZ
TUKUKDGOELOACSNB,
A
The
pairs
OE. AD,
indication, I passed
on to another hypothesis.
EXAMPLES OF DECIPHERING
67
'
letters,
which
constructing the
the two groups
of
re-
As a nucleus I took
original
just mentioned, and arranged them
text.
CKYPTOGKAPHY
68
first
OCA
TEDA
|I
The second
it
'
be
and
UKUKD,
OS
A V E U
H I N K
C A P E U
T E D I S K
D
S A C
T
and
cape "seemed too good to abandon. I wondered
"
whether the last could be a part of the word
escape,"
and in order to test this, omitted my first column, OIOTO,
These
substituting the two groups OEIDO and USLAA.
could only be adjusted by moving them down one line.
"
think
was now preceded by OU instead
The word
'
'
EXAMPLES OF DECIPHERING
of I, so I
"
69
"
SAVED
NK
YOUTHI
SES CAPEU
HILEDISK
EDASACOD
BOA
"
.._.>
-i
'
'
"
has escaped."
preserved and the third line became
Success was now a foregone conclusion. It turned out
that the original text had been written in lines of eleven
and had then been divided into vertical sections,
letters,
of
which the
fifth
ciphered
text,
the
and
on.
The
so
first
forming the
line,
SAVEU,
letters
second
had
of the
series,
to
be
CKYPTOGKAPHY
70
Y OUT HI N K Z
HAS ESCAPED!
DO
OCHILEDISGU
ISEDASACOOK
ONBOAEDANEU
TEALVESSEL
(" Do you think Z has escaped to Chile disguised as a
cook on board a neutral vessel ?")
The document
in plain
the
whom
name
ciphered and
and
my
rough working
to
my immediate
principal.
am
following cryptogram:
pbvddzobgqwwnzscczafstx
xpt hktddds kbpf vpc
vpafsvkzfej tvybipqoaasyb
acr pwhsml net gkniysxf vyc
plddlahvwccvpzdqagtcwdj
i
vi ys ds
repetitions: ip, dd, cc, fv, ds, sx, vp, vy, yp, afs, iys, cvp.
I calculate the intervals by making a pencil mark between
the i and p in the repeated ip's (there are three of them),
on
The reader
p. 48.
letters
is
and
do the same
to the footnote
EXAMPLES OF DECIPHERING
71
From
ip
dd
dd
dd 33
dd 62
cc
vp
vp
vy
yb
afs
,,
iys
cvp
11
,,
,,
vp
vp 60
vy 33
yb 9
,,
,,
31
,,2x3x3x5
,,2x2x2x2x3
fv 48
ds 11
sx 61
fv
ds
sx
,,
cc 90
,,
3 X 7
11
11
X
X
X
X
3
ip 63 letters, or
3
33
ip to
ip
61
3
,,2x2x3x5
X
11
,,3x3
afs 31
,,
,,
31
,,3x3x7
iys 63
cvp 60
,,2x2x3x5
The question
is:
Can we discover
this
three columns
that
is,
numbering
p b
v d d
z o b
(31)
s x
v y
(22)
v y b
i
p q
(23)
o a a
(24)
y b
p
(34) d d
bpf
(25)
cr
(35)
(16)vpc
(26)
pwh
(27)
(36)
(37)
v p
(28)
(29)
g k
d q a
(89) g t c
(40) w d j
(12)
x p t
f h k
(13)
(11)
d d
d s k
(5)
w
wnz
(6)
sec
(7)
z a
(8)
s t
(18)
(9)
(19)
v p a
f s v
k z v
(10)
(20)
(4)
g q
(14)
(15)
(17)
(21)
(30)
(32)
(88)
(38)
ahv
c c
z
CKYPTOGKAPHY
72
is
each;
s, v,
7 each; d,
w, 3 each; a, /,
i,
n, o, p, x, 1 each.
p, 8; d, 5; c, y, 3 each; a, h,
g,
z,
/,
b, e, k,
Second column:
2 each; g,j, m,
w, x,
o,
Third column: c, 6;
2 each h, j, q, r,
b,
s,
z, 1
4; a, /,
w,
x, 1
i,
n, q,
s, t,
each.
/c,
v,
I,
3 each; d,
t,
y, z,
each.
E is the commonest
T
or
followed by
S; the commonest
bigrams are TH and HE, and the most frequent trigram
and three-letter word is THE. We may, therefore,
assume that p in col. 2 stands for E. In col. 1 we
According to the law of frequencies,
letter in English,
hesitate between
How
sent E.
(col.
17, 37).
If,
2)
is
of
numbered
preceded by
may
we note
lines,
v three times
repre-
(lines
16,
we
get
HE,
col.
1.
c v p.
let
us substitute
In our
If
of
list
HE
we adopt
for
as the value of v in
this
combination
and 36-37,
and 2 on the succeeding
the
in col. 3
and v p
in cols. 1
lines.
If
we
EXAMPLES OF DECIPHEKING
73
the key-word,
tables.
We
will
we have not
pherment.
So far, then, we have established the following:
v (col.
1)=H; p
(col.
fc)=E;
c (col.
8)=T.
to the
in col. 2,
>'s
and T to the
c's
in col. 3.
Lines
attract
our
attention
at
col.
3,
and
as that of a in the
all
marking accordingly
The next thing we notice is the group WH?T in lines
31-32, and we decide to fill the blank with A, attaching
in the middle column.
?/'s occurring
For the moment we cannot go any farther in this
direction, so we fall back on the law of frequencies, which,
NOTE BY TRANSLATOR.
edition, but is
pitfall if
we
CKYPTOGEAPHY
74
so that
1,
numerous exceptions.
letters s ancU;
we could not
It will
be
at first decide
which was
and v in order
letter after s
of frequency in the
column
and another
by the
in line 31,
letters i
(in
and y
We
(col. 3)
are
respectively.
able to resume the thread of our internal
now
which we
new equiva-
WE??HTHE,
obtained
Col. 1.
Col. 2.
Col. 3.
t=I
2/=A
/=W
x=G
y=K
A
how we may
find a
We
EXAMPLES OF DECIPHEEING
75
results.
(lines
Isolated
groups
begin
to
join
E?T?YWEIGHTHE?B?EC?,
as,
"
up,
for
instance,
ENTLY
being
Always sub-
we
stituting the new equivalents as we establish them,
20
line
continue to build up words and phrases. From
we can now read SUCH AS ?E ??Y EEAS?NA??Y
E??ECT F??? THE? WHAT, which is soon resolved into
"
such as we may reasonably expect from them what,"
etc.
In fact, we automatically decipher the rest of the
cryptogram as fast as we can note the equivalents, which
leap to the eye with ever-increasing rapidity.
Although we have solved the cryptogram (and the reader
Col. 1,
=H;
col. 2,
p=E;
col. 3,
c=T.
Turning to
we
first
CEYPTOGEAPHY
76
with T and
scribed on p. 28.
We
first
pbvddzobgqw,
OL
OL
OL
OL
etc.
and stop
text.
until
at the letter
i,
the
first letter
in the ciphered
letter
U.
text.
We
cryptogram and
produces E, and so on.
of the
following:
But here
at
all.
first
p and L, which
thus decipher as far as the
of the key-word,
We
ueshsuldssfn.
stop, for this array of letters makes no sense
are evidently on the wrong track. What is
we
We
v=H
EXAMPLES OF DECIPHEKING
77
encounter
'in
At the
the double line containing the conjunction of the two letters will be found two capital
and Z. Either of these it is immaterial which
letters,
pair, v.
left of
key-word. We proceed
with
the
second
e
and p, which yields as
similarly
pair,
the second letter of the key-word E or F, while the third
will be the first letter of the
pair, c
We
and
t,
gives us S or
cryptogram, and, following the instructions accompanying Porta's table, proceed as follows
:
cz af,
pbvddzob gqwwnz
YESYESYESYESYESYESYES,
weshouldsuff ci entl yw,
s
In this
We
etc.
etc.
etc.
way
may
in their fruition."
Addison's obiter
this
as
one
oi
dicta.
A good cryptographer
key-word, for
gave the clue to the cipher consisted of letters belonging
to different halves of the alphabet, and Porta's table is
constructed that no letter can be represented by
another in the same half of the alphabet, whereas in
Vigenere's table there is no such restriction,
so
it is
CKYPTOGEAPHY
78
of the key-word
as, for instance,
followed by those under the second letter, E,
and finally those under the last, S. In the case of Vigenere's table a set square is a useful aid.
in
first letter
YES
BILLET-DOUX.
produced.
DBR
3L
10
Fib.
12
11
LQQ
RIORJL HJL
J
19
20
26 27 28 29 30
31
15
D_IL
16
17
18
32
33
"
36 37
38 39 40 41
Lb. 3LL_Z]
48 49
50 51
52 53
22
21
42
23
24 25
34 35
Id
43 44 45 46 47
RJRZIbJ
57 58
54
55
56
13
14
EXAMPLES OF DECIPHEEING
79
"
will
you
The
One
peculiarity
information
Examples
German, Aal
of
Aar
(eel),
eel
in
Leaving
number
of
words
In Eussian, a whole
series of
to represent
We
language.
1
NOTE BY TRANSLATOR.
(a,
CKYPTOGKAPHY
80
of
I,
and, in fact,
II
common
very
and
seven
letters a
41, representing
s's.
e,
graphy,
not more frequently.
language as
s,
if
Now
less
We
son
(are).
and 21-22
identify 5-6
as no (not).
(that, than).
tu (thou, you).
mas
(more),
86-42=MU?E?ES
n contains one
blank,
EXAMPLES OF DECIPHERING
81
cryptogram
CRYPTOGRAPHY
82
"
Tubwc
Efs ekftfo
cfs
Fsef hkfcu,
We
or
an average
156
of 1 in 5J letters.
we ought
letters,
18+10=28
E's.
The
supposed to be such,
As
have
to
here
of
proportion
proportionately
E's,
or
letters
is
N I E S T. We will suppose,
the letter in our text occupying the second
place in order of frequency (17 times), stands for N.
Next in order are k and t, each fifteen times. One of
quency in German are:
therefore, that
s,
I,
the other R.
equalling S.
we have the
e, i,
and
Then comes u
letter T
For the
is
also in conformity
rule.
Now
that
we have
at
EXAMPLES OF DECIPHERING
83
The undeciphered
' 4
by dots:
T71
-*Y"i
"- J
.1
(-*
\^
f-*n
JJ
(-*
\_J
.*,
I' vi
-L_^ J J
i
f*
'
c^
\^
En."
harm
is
the fault ?
w ord
r
or
es,
in
if
this
w ere the
r
word
"
should have
German.
roebuck
dis-
84
CKYPTOGKAPHY
first
is
also
German language.
Er
is
and
we find this meets the case well.
left,
Only
The fifth word in the first line now becomes Er e, which
non-existent in the
e=D,
the
first line
'Der d.
Further
trial
be diesen
reads:
der Erde
e. e
..
e..."
(this),
J=S
the value
first
word
in the
k=I
in the
word
fifth
diesen
line:
is
word,
Ko=In
From
(in).
/=E
it
will
a=Z
g=F
n=M
t=S
It will
b=A
h=G
o=N
u=T
c=B
i=H
p=0
w=U
d=C
k=I
q=P
x=W
e=D
1=K
r=Q
f=E
m=L
y=X
a, q, r, y,
and
s=K
z=Y
z of the
read as follows:
EXAMPLES OF DECIPHERING
"
85
ist."
In English:
"
earth,
is
German
terms.
It is far
more
German
usual in
A SHORT
CUT.
friend
1234 56789
+
101112131415161718192021
v-iv +x + nooTi-n>n<vLo
i
22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
+VooJLLVr+AcoD+<~inrA
42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
CKYPTOGKAPHY
86
We
Times.
all
the
EXAMPLES OF DECIPHEEING
87
32.33.34,
of the triplets
is
and
53.54.55.
THE, we have
"[">
and
Q. The
PL occurs
H to choose
first,
J, occurs
T,
it
'
Pen-
We
or
signs
the text.
The
-that
is,
if
the trigram
THE
occurs in
1=A,
|=C,
00 =T,
-=Z.
far as
require
much
From A?EW
(11-14)=" a
few"
to
WEATHEE.
?A?N?F?CENT
in three or
(36-46)=" magnificent," we reach our goal
CKYPTOGEAPHY
88
four steps, thanks to our short cut, and finally read the
following
'
Am
DICTIONARY CODE.
8686
7670
8686
2475
Weather
9219
6018
6638
7948
9185
is
handed
6448
4212
4833
0300
to
6016
3940
4827
9712
me
4570
0644
0001
0300
is
4368
7262
3696
4212
7159
8686
6062
9576
very commonly
used,
is
But
We
begin by making
which the lowest is
EXAMPLES OF DECIPHEKING
We
89
numbered from
reading:
be borne in mind, as
it
will
probably prove
useful.
We
now suppose
the letter A.
in
We
Webster's Dictionary,
initials.
classified
according to their
From
this table
of Webster's
reference,
though there
is
See p. 138.
CBYPTOGRAPHY
90
We
next thing
in Webster's
Dictionary,
divided
theoretically
into
are
hundred equal sections, words beginning with
58
If
the
61
cent,
and
marks.
between
per
comprised
the dictionary were divided into 10,000 parts instead of
a hundred, the
section would be found between 5,800
and 6,100. In the list of numbers in our ciphered text
we observe
up
'
of
'
it:
is
drawn to
"
'
off,"
offend,"
offen-
common
is
military term
6018.
the equivalent of our second presumed
number,
At any rate, the close proximity of the two numbers is a
sive."
fall
S section.
made
for
We
8686, 8576
*
EXAMPLES OF DECIPHEKING
which favours the assumption that the
first
91
equals
TO
etc.,
that
it
favour any
difficult to
is
of the context.
the
group
TO THE
OFFENSIVE,
instance ?
the E's.
"
We
have, then,
latter
falls
OFFENSIVE
for
are represented by
doubt-
other
happens
falls
which
under
is
almost
C,
number, 1378,
half-way
between 0000 (A) and 2799 (ENEMY), and the only
enemy
less
in
It
the
word
likely
"
is
offensive."
that
among
We
OFFENSIVE.
Another group that attracts our attention is AND ....
This is followed by the number 4212, which occurs
AND.
'
offensive."
Numerically,
the
number
is
we
as
"
pronoun
'
for this
number, we
CRYPTOGRAPHY
92
AND's
'
is
'
'
the
second
'
DI's or DO's.
There
is
This brings us
'
the
among
pro
tern.,
'
We
gaps.
EXAMPLES OF DECIPHEKING
words, such as
slight
as
imagination
A GOOD
is
93
only a very
...
we produce
and eventually
the complete reading of the
cryptogram as follows:
'Mi ... has secured a valuable piece of information
in regard to the coming enemv offensive.
I have been
hundred
to
send
him
five
requested
pounds. It is a good
to
denounce
him.
Do
so, and you and I will
opportunity
divide the sum between us."
Thus, all the words are deciphered with the exception
of the first.
The number of this, 5761, occupies a position
relative to 4833 (IT) and 6016 (OF), its nearest neighbours
numerically, which brings it among the ME's or Mi's.
It is apparently the name of an individual.
We might,
a
of
minute
so
much
the name
by
investigation, identify
i)
ment
and
intervals.
enemy
agents.
CRYPTOGRAPHY
94
mere
is
column,
until,
quotations,
of figures
on the
my
attention
marked with
after
is
dots in ink.
make
all
column
last page,
a careful copy of
:
1856295937693674187422742555
3754286943673562216626703567
3758396932443268297936634163
3174255928683277811966236328
7629653276316025613680227617
2276227242742563316135591858
4256426718792369387237623663
24681866532473267639612166
Altogether
there
dictionary code ?
are
222
figures.
Have we
here
by
5 or 4.
six
It
is,
figures a
this
is
obviously
dictionary code being apparently out of the queswe entertain the theory of a system of ciphering
by groups of three figures, each group representing a
letter.
We accordingly make a trial, dividing the figures
tion,
we arrange
in order
from the
we admit
EXAMPLES OF DECIPHEEING
95
peated ?
Let us put aside for the
moment
that the
differ
much
use to us,
we
forlorn hope.
It
figure groups
may
is
repetitions should
hold
be of
in reserve as a possible
just possible, too, that these threewill
it
still
see
numbers
to the test,
=20, corresponding
So
ever,
far, so
E;
than 7 (160) or 8
without a single E
(035).
Now,
will scarcely
Western Europe.
It is evident that
different direction.
We
of
(9+3+8)
we meet with
or even
of
researches in a
divisible
by
2.
fre-
96
17 once
CRYPTOGRAPHY
EXAMPLES OF DECIPHERING
97
fore, represent as
The
solid features to
and
of
22.76.
may,
therefore,
The cryptogram
of the groove
or slide system.
made
slips,
7
to
and
CEYPTOGKAPHY
98
by this means a great variety of secret alphabets represented by numbers can be formed.
Where the respective positions of the strips as adopted
at the beginning
When
is
of
the
slides
we
and
easily torn,
of plain wood,
all the rules by
On one
the
of
short
rules
we
in
order,
in ciphering.
nA|B|c|D|E|F|Q|H|l|j|K|L|M|N|o|p|Q|R|s|T|u|v|w|x|Y|zp
|
51
4 5 6
|
8 9
|
|l
O|n|l
12
EXAMPLES OF DECIPHERING
As regards the system
farther
in
on,
proximate
numbers.
In what
of
movable
99
rules,
we
give
'
the
chapter
coded
instance,
way must we
entitled
by
adjust our
Ink,"
instead of
Spilt
letters
wooden
rules or slides
studying
We
bigram TH. For this puradjust the upper alphabet in such a way that T
above 74 in the lower numerical strip. We then move
pose we
is
falls
below
first pair,
74.25,
we, proceed:
wrong track.
KOZMRHDLIP.
Plainly
we
are
on the
On jumping
CKYPTOGEAPHY
of the cryptogram.
We get as far as THEKNOW7BLFI,
100
and are again baffled. Yet there are the initial letters
that seem so promising.
Suppose we revert to the combination THAT (presumed) in the
We
"
first line
and
ETATSOTELBA.
get
Keversing
this,
we
it.
recognise
At last we are making definite proBut we have now reached the beginning of the
gress.
text and when we attempt to go in the other direction,
we get a mixture of comprehensible and incomprehensible groups, with occasional numbers which have no
Able to state."
corresponding
and
letter.
81.
changes of alphabet."
numbers separate
intelligible
On
No. 54, we
group
are
agreeably surprised
PLANISWORKING.
By
to
working from
encounter the
continuing to follow
numbers, we are
in
of
the
text complete, as
soon
plain
possession
very
the
indications
follows
given
by
the
key
by May
fourth.
EXAMPLES OF DECIPHERING
101
CONTRIBUTION TO HISTORY.
of paper containing a
Who
to say:
ouszehnsobonl
cous eevr
macpks
g
h
i
ox
102
ou-ou
CBYPTOGKAPHY
EXAMPLES OF DECIPHERING
103
(1)
(17)
(33)
(18)
y
u
(2)
(84) c
(8)
(19) s
(85)
(4)
(36)
(5)
n
h
(37)
(6)
g
b
(38)
k
u
u
u
(20)
(21)
(22)
(7)
(23) a
(89)
(8)
fl
(24) a
(40)
(9) o
(10) e
(25) d
(26) p
a
a
(11) r
(27) r
(12)
(28)
u
u
(29)
(30)
u
u
h
age
(13)
(16) s
(14) e
(15)
(31) r
(82) r
(42) a
n
k
n
(43) g
(41)
(44)
bag
v
(45) o
(46) a
and
cols.
first
li
o.
first
same key-word.
The best way to find the key-word is to ascertain, if
possible, which letter represents E in each column, or,
of the
Now, although E
in English,
it
is
allowance has to be
made
for
In looking for E,
in a short text.
dominating
be borne in mind that this letter very commonly follows
also that
H,
is
TH is
repeated in line
9.
first
The word
"
three letters, o
s,
are
not an unlikely
one of the two letters
the
s is
'
THE
is
CEYPTOGEAPHY
104
having
the
THE.
Armed
letters,
we
will
now
consult
we reach
till
o,
and
which
it
occurs
we
letters in the
the key-word.
in
or deciphering
form
from Vigenere's
table.
way with
and
u, the
second
cryptogram,
By means
ouszehnsobonlhhi cma
theertsfagbzqut
cpksc
VNOVNOVNOVNOVNOVNOVNOVNO
Plainly,
a false
it
is
trail,
EXAMPLES OF DECIPHEEING
We
105
it
is
= THE.
There
is
another
first
THE,
THE,
did not
fall
On
still
same alphabet.
THE
if
putting ifca==THE to the test by means of .Vigewe produce the key -word PDW, but this
nere's table,
is
means
that
we
rather
in the
to
s in col. 3.
in this
our clues
By
this
means we obtain
solid fabric
of
the
plain
text.
106
CEYPTOGKAPHY
THE repeated in line 9,
two consecutive
lines, 13-14,
shows
to occur
choice
The
more
likely
than 0.
If
On
to be
and
u=I
We
W, e=C, w=S
(all col.
1),
(col. 3).
likely to represent
THE
i.e., ilia.
THE(E)E
The word
"
"
lines 41-42 is
it gives us the
very substantial result THAT
IS (EA)ST OF THE. The parenthetical letters cannot
be WE, because E (col. 3) has been established as the
lines 37-42
dis-
EXAMPLES OF DECIPHEKING
Col
o=T,
1.
3 letters
Col
u=H,
1=F, 2
i=A, 4
s=E, 4
o=E, 4
a=E,
i=T,
e=C,
2
2
6
g=W,
u=S,
2.
6 letters
Col
107
3.
s=E, 5
o=A, 4
letters
ii^O, 4
u=I,
k=H,
JJ
Total: 67 letters out of 136, which indicates good proIt is as well to summarise results in this way
gress.
from time to time, as it shows how far the realm of hypothesis is being narrowed down by the extension of that of
certainty.
will elucidate
such a group
This enables us to submit the group to the following transTHE TIT(L)E (OF), the parenthetical letters
formation:
requiring confirmation.
The solution is now in sight. The letters remaining
unknown are merely isolated rocks in an ocean of under-
standing.
line
to
108
now
line 17
hEsdly.
CKYPTOGEAPHY
appears as: THE CevITAx OF WHICH
IS
TAL, while
name
of a capital having
,,
,,
,,
l:ide
2: eh
Vistula."
NOTE BY AUTHOR.
not a
This statement by
my correspondent, who
is
man
it
to-day,
juridical basis.
SPILT INK.
This morning's post brought me a letter from a wellprofessional man who has been utilising his spare
known
who
failed to decipher
it,
me
it
a
to
EXAMPLES OF DECIPHEEING
109
my
it,
I will frankly
If I
admit
do not succeed
it
without any
shame:
sseguhckxzdgzggzszdsj nfj
wphfxqugogghznyslpaysfim
owl w n n o d
hvmpxkqbz h h
nrexbemf
xf
z
iznhkd
yyt
Total: 93 letters.
find that the
and
z,
cl
most numerous
which each
and
Can any
s,
of these
it is
useless
'
Word."
It
will
times.
Accordingly,
we
insert a stroke
CEYPTOGKAPHY
110
letters in
following tabulation:
3
3 letters, or
8
gz-gz
zd-zd
2x2x2
3x13
,,2 X 2x5
39
gg-gg20
ys-ys 5
zn-zn 37
37
ss,
yy.
and in
like
is
viz.,
manner nn
Cyr Slides."
By means
of the Saint
Cyr
is
necessary is to obtain two rules or strips of
one long and one short. On the short rule
wood,
plain
mark equidistant divisions, and in them inscribe the
All that
is
moved up
or
down
EXAMPLES OF DECIPHEKING
will
longer,
it
on the
latter, as
111
shown:
CEYPTOGKAPHY
112
ciphered ?
If
we knew the
secret
the
of
first
letter,
we do
not,
B.
When two
A (mm=?A).
by the next
second and third letters
are followed
like letters
AB (mmn=?AB).
When an
rules
on the
Kule A.
,,
nn
,,
,,
,,
ad
,,
,,
,,
,,
riri
,,
,,
li
,,
A
A
A
A
A
. .
A.
In
ss
the second
99
5 ,
firi
yy
equals
r,
fi
subject, but
Let us apply
A
]
Rule B.
Kule
nno
C.
,,
AB
AB
EXAMPLES OF DECIPHEKING
check,
one
it
now remains
113
letters.
We
first letter, S,
but that
beginning the
for a
letters
i.e.,
ggh.
first
From what
is
the
we infer
new alpha-
section
is
gghznyslpay
The
letter in question is
to S.
Adding
this to the
z,
rules,
CKYPTOGEAPHY
114
of letters
we may
so that
'
am
letter is I.
Accordingly, I
undecipherable.
vented
am
is
absolutely
proud to have
in-
disappointment of
my
it."
of softening the
whom
am able
communicated the
I
to
inform
him in a covering
deciphered text,
note that this system offers safeguards by no means
am appears
negligible, since, for example, the word
in two different disguises, se and ht; the 'in' of the
words
-invented
convinced,"
accordingly," and
correspondent,
to
have
'
'
'
is
'
'
'
while
as iwp
'
'
'
and rex
'
'
respectively.
AN UNDECIPHERABLE
SYSTEM.
was
You
I wish you
Here you are, then
The cipher text, which contained fifty-two letters,
difficult
joy."
'
problems.
as follows:
ylirxqjzmp
tcmovzngrqlfkve
wnodsds ckutiuhpfywbhegbxja
began by calculating the letter frequencies, and, to
in fact,
stupefaction, found two a's, two &'s, two c's
two of each letter of the alphabet, neither more nor less.
I
my
Only one group, ds, was repeated, and, that being the
it was useless to seek a
key-word.
case,
EXAMPLES OF DECIPHERING
115
'
viders."
I reflected
curious are encountered from time to time.
on the possibility of a dictionary code. There are conventional codes composed of three-letter groups: aab
wkf, etc.
By combining
large
number
676x26=17,576 groups of
I might have made some
but for two obstacles:
(1)
three letters.
investigation in this direction
fifty-two letters of the text
The
and
needed at
least
my
efforts
proved
futile.
called
on
my
friend,
CRYPTOGRAPHY
116
informed him
of
my
him
to
me
"
This
is
how
wrote that
to you."
!" I
exclaimed.
"
'
my
all,
quickly
it
far
too
!"
terminus.
vendor.
news
Besides,
when one
is
meals
1
kept
"
me
EXAMPLES OF DECIPHEEING
117
my
2.
3.
z.r.p
i.mp.p
m.mp.p
much
4.
5.
e.p.p
6.
Iron dagger
Small picture (glacier), white wood frame Small engraving (Marie Antoinette), black
mp.p
frame
Small picture (The Flirt), worn gilt frame 10. Black and gold metal tray, flowers in centre
11. Old barometer
12. Old picture (rustic scene)
mi.z
mi.z
mf.z
7.
8.
gilt
mi.mp.p
9.
mr.p
m.r.p
f.z
13.
m.mf.z
14.
mr.p.p
15.
16.
b.r.p
f.z
20.
wood
Head of
21.
Concave
22.
i.mp.p
z.r.p
mf.z
mi.z
....
Watteau subject
z.r.p
f. z
CEYPTOGKAPHY
118
Tin candlestick
Oval silver tray, tarnished
27.
25.
feet
frame
r.p
m.mp.p
z.p
28.
30.
31.
(the Signing of
Engraving
Engraving (Friends
;
Library of
49 plates
32.
Small
silk
i.mp.p
gilt
Magna
Charta)
m.mp.p
-
r.p
Death)
mp.p
till
b.p.p
m.mr.p
mat,
m.i.z
silver fringes
o.p
z.p
m.i.z
Copper seal
Old silver chafing dish
41. Old decanter
42. Liqueur stand, with two flagons
43. Old beer mug, coloured stoneware
44. Bronze medal set in ring of chased silver
mf.z
mf.z
39.
m.m.p
40.
o.mp.p
mi.z
b.b.p
mp.p
-
o.p
The
first
pounds.
We
know
to the right.
This
of infinity,
if
is
If I
were
EXAMPLES OF DECIPHERING
From
the above
it
119
p never
column besides p
first letter is
is
a figure that
is
of the
We
vase (29)
(32),
is
1; of the
copper seal
"
(39),
'
engraving (31), and beer mug (43), 10s. each; and of the
bronze bowl (27) and silver strainer (35), 6s. each.
mi.mp.p.
door-knocker
at mi.z.
CEYPTOGEAPHY
120
value than 2 to
i.
2 10s.,
are also
two items
stand (3G)
The
priced at
letter
1 2s.
etc.,
to
There
silver
6d.
shillings;
'
'
more than
commonly
5 to
seen.
We
therefore
now
attach
the
value
of
r.
Our attention
is
b.
There
is
we appraise
3.
Accordingly
b at 3.
The
EXAMPLES OF DECIPHERING
us to ascribe the value of
On
7,
121
rather than 4 or
8,
to /.
rustic scene
(12},
mat (34) is
marked
b.z., or 3s. 6d.,
o.p.
originally
which price has been crossed out. The value is scarcely
marked
It
was
any
reliable
inference.
9.
of
'
me
but people who are more than an hour late are assumed
to have been victims of an accident, and they are always
excused in
wasted
my
advance.
time."
have not
PART
LISTS
III
AND TABLES
of letter frequencies
lists,
compiled as a
result of
persevering study.
is flair, or insight.
This need not be
or
in
the
nature of a lucky
instinctive
as
purely
regarded
The
third factor
gift.
ENGLISH.
I.
EA
DHNB
-
U Y,
etc.
LC
W U M,
etc.
122
ETAONIBSHD
AND TABLES
LISTS
123
:ETOANIBSHDL
UCMPFYWGBVKJXZQ.
Telegraphic frequency (Hitt) EOANIKSTDLHU
CMPYFGWBVKXJQZ.
(Hitt)
According to Valeric
also English.
ESDNTBYOFA,
etc.
(See
III.)
(Valerio).
TH, HE, AN, EB, ON, BE, IN, ED, ND, AT, OF, OB,
HA, EN, NT, EA, etc.
Frequency of Double
Letters.
SS, etc.
IS,
etc.
(in Order).
etc.
ENGLISH.
II.
(Valerio).
etc.
etc,
CEYPTOGBAPPIY
124
Words
A,
I,
of
One
Letter.
0.
Proportion of
ENGLISH.
III.
1
(COMPILED BY TRANSLATOR.)
Second
Third letters
TAOMHWCIPBES,
letters
EIAUNB
ABN
letters
Antepenultimate
Penultimate letters:
Final
letters:
lish.
to
Position
etc.
T, etc.
I, etc.
T E
AHN
0, etc.
ENAEHILCO, etc.
ETSDNBYG, etc. (See
also
Eng-
I.)
Consonant Bigrams
at the
Ends
of
Words (Order
of Frequency).
NG, ND, NT, DS, KS, ST, TS, TH, HT, ET, SS, CT, LL,
LT, GH, SH, CH, DD, LD, LS, NS, EN,. ES, WN,
FF, LP, MS, ED, EL.
ENGLISH.
IV.
Final Bigrams.
An
com-
LISTS
8
7
AND TABLES
125
ending NT.
words
words
4 words
3 words
ending LY.
each ending AN, DS, EN, ES, LE, ON,
BY, SE,
TY.
2 words each ending
1
An
IED
TH, PR, WH, CH, FR, SH, TR, CL, SP, CR, PH, PL,
BE, GL, SO, SM, ST, WR.
CKYPTOGRAPHY
126
ENGLISH.
V.
A
Ar A
A
A
A
A
p
sA
b b
b i
b 1
b o
d i
d 1
d r
d u
d v
d w
Acy
A
Ative
Ard
A
-
heA
q u
gr
A
A
heA
A
A
p A
A
mA
A
A
a v A
Air
Aid
-A
Ant
A
A
c r
Age
Ament
g e
g g
g n
g r
h
i
And
Angle
A1
A
Ay
A
A
A
Ad
Able
m Ant
-A
complA
Ant
clA
breAkfAst
-A
dAmnAble
cAmpAign
A
A
terrA
mA
A
A
J A
c A
c h A
A
evAcuAte
r
AmbAssador
A mi Able
-A m m A
A-
t r
w Ays
Au A,
c
f
g
i
An
A
Act
Agonist
Ar y
As
A n
A
i
A-
A
A
Age
A
A
A
Ake
-
stArvAtion
A
A
A
^_
Able
A
A
q u
-A
-A
p 1
p p
p t
remArkAble
ArmAment
cArnAtion
signA m An
1
n d
n e
n i
n s
n t
n u
n v
whA r
A r
AT
pA
-A
vA
mwAy
devA
c
A
A
A
Amed
A
A
Ate
u Al
As
LISTS
-
A
A
u d
A
A
AND TABLES
E
restAurAnt
A
v
-A v
A-
drAwbAck
A
1 A
x p
y
Ay
m An
Bar
B
B
o
r
er
B-
mB
i
suBurB
coBweB
Calculate
(J
127
a
chEapEr
E
a r
E
E
E
E
E
a t
a v
E-
rE
E
d e
EasE
b
c r
c t
cl
E
E
E
E
cl
Em
E
expEdiEnt
neEdlE
WEdnEsday
128
CEYPTOGKAPHY
gEomEtry
AND TABLES
LISTS
coNveNe
-NviNce
s m Iss
-TssI
d I
-I s t I
Britain
K
h a
Ki
booKmaKer
singuLarLy
Leu
Late
pOisOn
f
-
coMmeMorate
n
Mon
MumMy
N c a Nd
NceN
N c N
N c o NN daNN d e N
N d N s
N d o N
N f a Nt
N geN
N
N
N
N
-0
t t
N
N
u d
bO
teN
t
00-
tOpmOst
-0 p p 0fOrbOre
fOrgOt
OriOus
fO r
Orn
enOrmOus
-OrpO
r r 0fOrsOok
-OscOexplOsiOn
o o
o u
reNowN
N
N
N
N
-0 p h 0-
caNnoN
aNoiNt
cOnvO-
NjuNction
N kiNg
N a Nd
NmeNt.
1
-0 n
eNgiNe
i
cOmpO-OndOerrOneOus
cO
mm
e s c e
cOmfOrt
Ong
OctOOdiOus
lOgwOod
-ceLluLar
M a d Man
M a M
ObsOlete
Mor c c
atrOciOus
KicK
ca
129
-pO
OtiOn
nOxiOus
x
w Oo
d
9
130
bO
y b
CBYPTOGKAPHY
diS
Ood
PalPable
PamPer
Pan Per
P
P
e o
e r
P r e
P r o
P u 1
P urn
P
P
P
P
PurP-
fEatEicide
extEaoEdinary
-EdeE
EeaE
caEeeE
E
waE
peE
a
o
laE
-E
g e
i
diS
g u St
S h e S
h u S i aS
S
Sh
i S s
-S
ma
m
-S n e Ss
conS
d
puE
-E
hoE
p e
p o
r
cuE
-E
o
e
depaE
E
Et
E
Eace
b e
T
sT
a c
a n
a r
T
T
T
TasTe
TauT
T
-T
T
e c
e
n T
e s
TexT
T
ouT
ThaT
f
paTheTic
wiThsTand
i
Te
Th
E-
-T
Ee
ouT
-T
-T
Ey
FebEuaEy
foEwaEd
aS
S u b S
E
E
-EpaEt
S p o S
s
Em
coEneE
E o a E
-EogE-E
E
Ee
E
E
poSseSs
a S
S t
chaStiSe
treSpaSs
deSpiSe
pEimEose
-E o E
-E k
-E m
u Ss
asSetS
Pie
P-
PorPoise
S e a Son
S e n S
St os
n T
o r
T
T
T
TouT
ouT
p u T
LISTS
AND TABLES
Te
r a
-TreTTion
-T r
beTroTh
U m
U n
TruTh
rUptUre
tU
aT
Tudo
pU
T
T
f
i
sU
b d
Ue
c t
U-
gU
Ural
Zag
ValVe
VelVet
VolVe
W a y Ward
sUccUmb
sUffUse
-U
Ulent
Ue
mUscUlar
MU e Urn
brUsqUe
siTuaTion
T u
T u
Ucky
Unsuitable
ouT
r a
Ur
UnhUrt
131
o Us
U t Uh U m b U g
1
ENGLISH.
VI.
AbeyAnce
hAbitAble
lAborAt
AbreAst
A
Ad
AbstAin
-A b ul A-
coAchmAn
blAckmAil
bAckwArd
ActuAl
erAdicAte
AdorAble
heAdquArters
AeriAl
-AginAcoAgulAte
dAhliA
r
w Ay
AcquAintAnce
stAircAse
chAirmAn
mAlefActor
-A
-AlisAtion
-A
AlphAbet
AlreAcly
steAmboAt
nAmesAke
AminAt
finAnciAl
lAndmArk
chAngeAble
CBYPTOGKAPHY
132
lAnguAge
g Ang w Ay
mechA n c A
An mA
orgAnisAtion
A n n u Al
AnomA y
mA n
Aught er
trAnspArent
substAntiAl
mAnufActure
dilApidAted
i
teC
h n i Cal
C h u r C h
C i e n C
C i f i C
neCklaCe
C
s 1
A
A
A
p i
p p
p p
e
1
A
A
A
A
A
A
A
r o
r r e
r r
r t
C u
p h
s s
A
A
A
g e
A
1A
A
e r
coA
of
Arms
A
A
nA
v
v
e r
A
Age
Ate
s t r
c
r
Al
E
E
E
mE
IE
cl E
f E
E
volCaniC
Cy
De
e s
Deration
a
a
a
a
a
a
a
a
D
D
E
c h E
E
g
g r E
g u E
n s E
r
Es
r n E
b
rehEarsE
E
E
C h a n C e
C h a r Coa
WeDnesDay
AvocAtion
A v o w Al
AwkwAr
a B s o r B
r a
e c
reAsonAble
A
A
D
D
D
D
Dr e
Dw
Al"
CrutCh
r
C
CubiC
eleCt
Able
Ar s
Age
CounCil
u d
mA
Ch
C o n
pArliAment
chArcoAl
chArgeAble
chA
ClutCh
C o a Cellar
C o m Cal
a
a
-E b
dE
E
E
s t
t
Er
h E
t
E
E
mEn
corrE'ctnEss
s
1
E
E
u
u
r
t
E
E
AND TABLES
LISTS
E d i a
-^-E d u c
schE d u 1
dE
-E
-IE
b
d
E
E
a c
f o r
g a t
h a v
f
E
E
E
E
E
E
E
E
va
q u
E
E
f E
b E
r
1 i
Er
-E
o p
o v
bE
Ed
u d
nv
E
E
E
E
Em
Ent
E
m n
-E m s
rEmunErat
parEnthEsis
sevEntiEth
i
En
cE n
nevErthEless
EEn
mE
t i
t
o k
En
v
v
v
v
Ent
s E
E
v E
E vo kE
i
benEvolEnt
d
b
E v
Ew
o t
a r
E
E
ExchEquer
E x
E x
F e
G o
rE
E
cxpErimEnt
dE
E
E
t r
E n u mE rat
p E o p 1 E
r E p 1 i E d
-E p o s E
s c E p t r E
-E p u t E
E r a g E
E r a s E
-E r a t E
o v E r d u E
t c
EvanEscent
in b
E
E
E
E
invEstmEnt
r E s u m E
-E
Er
E
n Eate
dE
e
rE
dE
-
forEignEr
E
E
d E
133
Gr
H
H
arcH
t r
a r
i
11
u d
a r s
a t c
bi
Ess
E me
Fu1
G
Ge
H
H
Hop
H
Heat
H e g Ht
H
c H
tHo ugH
i
I e
t I
-I g h
com pi
Ing
Ion
pilgrim
a 1
11
Ew
wholEsalE
Implicit
I
mp r
n q u
E
E
v
c
CKYPTOGEAPHY
134
Inspire
Instinct
Intuition
diminution
Invoice
circuit
mischief
d
I s c r I
biscuit
d I
N
N
e N
a N
N
-r
c o
capitalist
-Itatlon
-N
stocKbroKer
KnacK
coN
Kno c K
K
L
L
c L
L
n u
a b e
a n d
e a r
e g a
L
L
Ly
L
symboL
c a
L
L
L
L
L
i
i
k
v
e
e
o c a
o v e
o y a
L
L
Ly
Ly
L
Ly
L
LuckLess
absoLuteLy
MadaM
comMandMent
M a x Mum
aMazeMent
i
aM
n d
Ment
soMetiMes
M n Mum
MonuMent
MoveMent
i
meN
N
c h a N t
e N t
c
d e m N
d
g N
d me N t
e m e N t
f r o Nt
c e r
o
o
m N
i
w Ng
i
deliNqueNt
siLentLy
L
EN g a Nd
saNguiNe
cogNisaNce
pheNomeNon
compLeteLy
M ent
Ment
o M
p
p
p
aMuseMent
c o
t r
- M
coM
s y M
s i
-N
-N
-N
iN
N
h
i
s t
t
t e
t
Ne
N
o N
a Nt
N
r N
o N
i
b v
c t
u
n
c
r
g a
tOils Ome
whOlesOme
sOlilOquy
sOmebOdy
meh w
cOmprOmise
s
c
c
n g
n t
meration
-
anOnymOus
p
LISTS
AND TABLES
fOregO
hOrizOn
pO
r t f
r t
Olio
Odox
-OrtiOn
tOrtuOus
pOstpOne
O tatOthrOughOut
neighbOurhOod
OutdO
OutgOing
ParaPet
PersPP h
Phate
PlumP
PostPone
PromPt
ProsPer
Q u
n Quennial
-E a t o E
tEaveRse
-
suEchaEge
aEdouE
EecoEd
EeveEse
buE
bE
g
i
b e
Ey
auEifeEous
wE
e E
coEkscEew
i
aEmouE
bEokeE
pEopeE
uE h e E
AE thuE
paEtneE
moEtuaEy
t
diS
ur Se
diScloSe
135
SeleSs
SeneSs
diS g u
beS
Se
d e S
buSineSs
suSpenSe
diSperSe
reSponS-SticS
ChriStmaS
StreSs
abStruSe
TainT
-TeenTh
Temp T
-T
e r a
TheaTre
T h
auThenTic
hiTherTo
ThirTy
aThle Tic
wiThouT
ameThysT
-TiciTy
-T
T
T
i
i
i
n T*
T e
gh T
e
g a
esTimaTe
-T
culTivaTe
pTiviTy
-TmenT
uTmosT
T
T
o a s
a c
T
T
-TraiT
conTrasT
T r e a T
sTreeT
CRYPTOGRAPHY
136
sTricT
p a T
sUmptUous
c
U
Undoubted
p U n
sTrucT
TrusT
congraTulaTe
-orTuna'Te
TwenTy
trusTworThy
qU a dr UchaUffeUr
rUinoUs
frU
Ul
sUlphUr
scUlptUre
ENGLISH.
conUndrUm
UniqUe
UrioUs
UsefUl
U
beaU
Ul
Ul
caUtibUs
VatiVe
t
Ve
Westward
WindWard
VII.
pA
Able
MAlAyA
CAnAdA
cArAvAn
cAtArAct
extrAvAgAnt
E
E dEnt
piEcEmEal
prEdEcEssor
rEfErEnce
EgEnErate
vEhEmEnt
ElEmEnt
ElEvEn
cEmEtEry
whEnEvEr
whErEvEr
Iblllty
hlbltlon
rigidity
diminish
n
I a
I s I
crltl c Ism
clvl llan
division
IGcOmOtive
chrOnOlOgy
mOnOpOly
mOnOt On
chlOrOfOrm
sTiTuTUnUsUal
LISTS
AND TABLES
137
Bigrams Eepeated.
dE
I
BEE
I
ININg
bAG g AGe
bAE b AEous
B A r BArous
CA
CA
CA
CAreous
C Ade
u C
TH
As-
THer
mUE m UE
U
UT
T p
ABle
hAB
CHur CH
piCKpoCKet
DE c DE
DE u DE
i
IN
IN
INe
INge
INstlNct
DA r DAnelles
perlTonlTis
pEA c EAble
OE a OE
EN d ENt
PHosPHate
EN
EN
POstPOne
revEEbEEate
EE g E E
QU n QUennial
remiSSneSS
pEE v EEse
diSTr u ST
IN g INg
forTHwiTH
IN k INg
sENtimENt
MA d MAn
MAtheMAtics
MU r MUr
seNTimeNT
NG NG
coNTineNT
NT e N T
cOUrteOUs
ON
ON
PAble
PA
plENipot ENtiary
PO r POise
intEEpretEE
coNTraveNTion
EE d EEss
EE p EEsent
cOUrageOUs
t
SEnSE
aSS
SSin
S S
S S
inTErpreTEr
uNDerstaND
etc., etc.
CRYPTOGRAPHY
138
Words
Sub-
form
Numeral Key-Words.
AUTHORISED
BACKGEOUND
BANKRUPTCY
BUCKINGHAM
CHIVALROUS
COMPATIBLE
COMPLAINTS
DESOLATING
DESTROYING
EXHAUSTION
FLOURISHED
FORMIDABLE
GELATINOUS
HYDRAULICS
HYPNOTISED
HYSTERICAL
ILFRACOMBE
IMPERSONAL
IMPORTANCE
JOURNALIST
PATRONYMIC
PLAYWRIGHT
PRESUMABLY
LACHRYMOSE
MACKINTOSH
MENDACIOUS
PROMULGATE
METAPHYSIC
PURCHASING
REGULATION
REPUBLICAN
MINERALOGY
MISFORTUNE
MODERATING
SUBJECTION
SYMPATHISE
UNSOCIABLE
PATRONISED
WORKINGDAY
PREVIOUSLY
PROCLAIMED
PROFLIGATE
may
also be used.
ENGLISH.
VIII.
A
B
C
D
E
F
G
H
I
K
L
LISTS
AND TABLES
139
The extra
FRENCH.
I.
According to Valeric:
ENAIBSTUOLDCMPVP,
etc.
According to Langie
(in
AT
N,
etc.
:ESEIANTOUL, etc.
ESTEANLIUD,
The Commonest Bigrams
etc.
(Valerio).
ES, EN, LE, DE, ON, OU, NT, EE, NE, ED, TE,
SE, EE, AE, ME, AN, IT, ET, IE, Tl, EL, NS,
Frequency of Double
Letters.
MM, PP.
According to Kasiski: SS, EE,
Double Letters
at the
EE.
EM,
UE.
End
CC,
of Words.
EE.
EE,
CKYPTOGBAPHY
140
FRENCH.
II.
According to Valerio:
AN, AU, CE, CI, DE, DU, EN, ET, IL, JE, LA, LE, MA,
ME, NE, NI, NIL ON, OU, SA, SE, SI, TA, TE, TU, UN.
Words
of
One
A,
0,Y.
Letter.
FRENCH.
DI.
Second
letters {Langie)
Third letters
to
Position
Word.
-.DLEPACSMEIF,
:
(Langie):
etc.
A U N E I T, etc.
S E U N T I K, etc. (order
in-
different).
Antepenultimate
I
letters
(Langie):
E,
followed
:EUNILOES,
by A,
EANLIUD
etc.
C X,
etc
LISTS
AND TABLES
141
Initial
BL, BE, PL, PE, FL, FE, VE, CL, CE, GL, GE, TE,
DE, CH, PH, TH, SO, SP, ST.
Final Consonant Bigrams (Valerio).
NT, NS, ET, NO, CT, EC, SC, ND, ED, NG, EG,
MP, NQ, ST, GT (doigt, vingt), SS (express).
FEENCH.
IV.
French text of
an average
EE.
French text
9
7 words ending
6 words ending
ONT.
EES.
4 words ending
GES, INE.
TEE.
on an average
CBYPTOGKAPHY
142
FBENCH.
V.
FAIBE FAIBE.
Eepeated Groups separated by a Single
VIS A VIS,
Letter.
Consecutive
Letters.
UNE, QUE,
etc.
Letters.
CBEEES.
Q
is
is
is
preceded by
C, as in chemin, cheval, cher,
fixe,
etc.
etc.
P, as in photographic, etc.
T, as in theatre, etc.
Word
a Numerical Key-Word.
IMPBEVOYANTS.
1
LISTS
AND TABLES
FKENCH.
143
VI.
Two
Letters).
AffAire
cAlcAire
cAmpAgne
A n 9 A
scAndAle
ebr A n
p p
A
A
A rrA-
pArtAge
AA
AtlAs
A ttABarBare
BomBe
s
CalCaire
CirC-
C o n CC r o C-
speC
Cle
-DarD-
DinDe
Er
E
m Er
i
EmpEreur
bArbAre
s
evidEmroEnt
f E m m E
EncE
-E n d E
gE
-EnnE
dEnrEe
gEnrE
def E n E
Ens Signer
EnsEmble
pEnsEr
s
E
E
u E
b E
-E n
nE p
-E
hE
-E
-E
EE-
casErnE.
gouvErnEment
-E
-E
siE
rE
E
rE
rE
sE
ail E
u Eillir
rE
Ect
-E
E-
-E
g
g
g
Et
Echir
E
-E
E-
fl-
pE
sEcrEt
m Ent
r
Esse
chancEliEr
E
r
r
v E-
dEscEndre
-E t
-E u
-EurE
E
CBYPTOGBAPHY
144
-E u v Er
E
E
F
G
v u
x p
o r
o n
a c
dl
Icile
a I n
ml
Ion
Ion
p I
mill
a I n e
a Ire
u L
c a
IN f
u N
a N n
N
N
N
N
p
fO
Nterie
o
o
N
N cer
N
N
N
N
Ours
Onne
Pie
PP
P
P
P
e
B
E
t r
empeE
"
o
a o
r
E
E
-E
moE
u
u
foE
-E
-S
S
S
S
a S
d e S
S
s
s
-T
T
U
U
Eesse
E
i
Sn S
e n S
o u S
bealJ
Besentant
E
E
Ee
E
Ee
a
a
-T
-T
Edinaire
t e r
n T
n T
o r
o u
t
u S
c o
T
T
Tud
Up
Ure
0-
poUr
Uo
Uite
Oge
Ue
hO
u
u
cO
OppOse
-0
cOmmOtion
n
0-
Ion
mmI
crl p
On
e.
si g n Ifier
al g u Hie
recuel 1 1 Ir
ml
v I c
f
-0
Edition
Fait
He
I m
explO
p o
r
etc., etc.
LISTS
AND TABLES
145
nAissA
cApitAine
ChanCelier
prEcisEr
sEcouEr
EcutEr
E
iNst
iN
Er
EtalEr
E
mE t t r E
ExtrE
i
o u
deSsaiSir
me
Tr
eTr
ai T
o
etc., etc.
T
Instinct
,
Net
pEendE e
laEgeuE
pEopoEtion
maEqueE
mEsurEr
EtagE
t
p a
prEsquE
pE
EntrEr
-E
s t
hOrizOn
propOrtiOn
PourPre
aEceuE
ElogE
-EmblEr
-EndrE
-E nt
LegaL
LocaL
siMpleMent
eNchaNter
ciNquaNte
Bigrams Repeated.
cANcAN
b
AE
BA
CA
CA
CA
EN
EN
b
r
1
n
s
AEe
B Ar e
CAire
CAn
CAde
ENt
-ENsENt
-BE
-EE
EN
EE
EE
g
fEEmEE
gouvEEnEE
vEEsEE
EU
MU
NS
NT
NT
-ON
a
e
t
tOU
PE
SE
E U
MUre
NS
NT
NT
ON
OUrs
PEe
SE
poSSeSSion
10
146
TE
fUK
n
e
CEYPTOGEAPHY
TEr
o I N
a I
QU
UE
mUE m UEe
-EEndEE
T E a TEe
qUE q UE
CH er CHer
chEE chE E
cHE r c HEr
FEENCH.
Q Ue
etc., etc.
VII.
A
B
..
..
E
F
G
..
..
..
to
another.
ITALIAN.
I.
-.EIAOELNTSCDP,
According to Valeric
According to Vesin de Eomanini
LNE
S, etc.
etc.
0, followed by
AND TABLES
LISTS
147
IAEONLKDU.
The same
five
letter frequently
consecutive words.
(Valerio).
EK, ES, ON, KE, EL, EN, DE, DI, TI, SI, LA, AL, AN,
KA, NT, TA, CO, IN, LE, TO, 10, AK, NE, OE.
Frequency of Double Letters (Valerio).
may
Words
be doubled except H,
of
One
A, E,
I,
J,
and Q.
Letter.
0.
ITALIAN.
II.
(Valerio).
J and
letter
is
HAI, HA,
The
letter
is
Proportion of
HANNO.
always followed by U.
SPANISH.
I.
EAOSIKNLDTCUP, etc.
GH,
HO,
CEYPTOGEAPHY
148
AESONLEYIDZU,
The Commonest Bigrams
etc.
(Valerio).
ES, EN, EL, DE, LA, OS, AE, UE, EA, EE, EE, AS, ON,
QU, ST, AD, AL, OE, SE, TA, CO, CI, 10, NO.
Frequency of Double
CC, LL,
EE,
infrequently
Letters.
1
According to Valerio: EE, LL, EE, SS, DD.
Words
of
One
Letter.
A, E, 0, U, Y.
Single-letter
or
A.
words that
may
SPANISH.
II.
(Valerio).
LL.
The
letters Z, J,
H, and
always followed by U.
Proportion of E (Valerio): 14 per cent.
Proportion of vowels (Valerio): 48 per cent.
is
next.
TRANSLATOR.
LISTS
AND TABLES
GERMAN.
149
I.
ENIESTUDAH, etc.
:ENEITSDUAH, etc.
According to Kasiski
According to Valerio
According to Vesin de Eomanini: E, then
Y J C.
etc., the rarest being Q
:
NIE
U.
NEETSDHUZF,
The Commonest Bigrams
etc.
(Valerio).
EN, EE, CH, ND, DE, IE, TE, EE, El, UN, GE, DI,
ES, BE, IN, IT, HE, etc.
The Commonest Final Bigrams.
Frequency of Double
NN,
at the
SS,
Letters.
DD.
End
of Words.
GEEMAN.
EE.
II.
CKYPTOGKAPHY
150
AB, AM,
AN
WO, ZU,
The bigram
is
is
UN
frequently
always followed by U.
always followed by
commences a word;
or K, except in
"
"
foreign
words.
Proportion of
GERMAN.
III.
A
B
Per Cent.
Total.
Total.
11-50
D
E
F
G
H
I
K
L
M
1
The German
authority, F. P.
W. Kaeding,
he established the
presence of 9,260,044 E's, 6,363,537 N's, etc. It may be noted
that one volume of the large dictionary of Larousse contains about
lations
on a total of 60,558,018
20,000,000 characters.
letters (!);
AND TABLES
LISTS
151
NOTE.
another.
at
K;
M;
in
Niethe's
RUSSIAN.
I.
According to
The
Texts
in
AN
Langie:
letter I
Russian characters
DTMVEUKP,
etc.
English transliterations:
R Z K P,
OYAIELNHDTSMUV
etc.
French transliterations:
K P,
E T V E L K M, etc:
French transcription.
A I L E N, hard sign,
I S
predominates in
OIAELNTDCHMUVE
etc.
Final
Letters.
sign,
U,
I, soft sign,
I,
(Y)A, E, Y, A,
M,
(K)H
M, V,
etc.
lator.
CEYPTOGEAPHY
152
final
hard sign.
NN,
(I)A(I)A,
Words
of
I,
EE, (I)U(I)U,
One
SS,
00, ZZ.
Letter (Langie}.
(I)A, 0, U, A.
be added,
if
final
EUSSIAN.
II.
NOTE.
STVENN, NNOSTI.
Like Letters separated by One Letter (Langie).
ILI,
Proportion of
etc.
LISTS
AND TABLES
153
POETA'S TABLE.
This table was composed by Giovanni Battista da
Porta, a Neapolitan physician, author of a work on
notis, vulgo
CKYPTOGKAPHY
154
below
above.
The
rule, therefore, is to
CAE, we
'
word
red
'
by means
of the
key-word
letter
red
CAE
=f
vtu
NOT
=b
a d
VIGENEEE'S TABLE.
This
translator
entitled
table
Traite des
cliiffres
ou
secretes
manieres
d'ecrire,
Paris, 1586.
plain-text alphabet
used to form the key-word.
;
Supposing the
first letter of
the key-word
is
E, and the
first letter
LISTS
beginning from
K in the
of intersection
we
find
AND TABLES
z,
BEX, we
first
kik
by the aid
of the
key-word
155
CKYPTOGBAPHY
156
....
Number
With
3 letters 1
of Combinations.
-24
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
120
720
5,040
40,320
362,880
3,628,800
39,916,800
479,001,600
6,227,020,800
87,178,291,200
1,307.674,368,000
20,922,789,888,000
355,687,428,096,000
6,402,373,705,728,000
121,645,100,408,832,000
2,432,902,008,176,640,000
BKITISH SURNAMES.
Frequency of Terminations (compiled by Translator).
In a
list
of over a
thousand
in
order of frequency:
I.e.,
LISTS
AND TABLES
157
FEENCH SURNAMES.
Frequency of Terminations (Langie).
Out
of 1,000
50 end in IEK.
38 end in
21 end in
19 end in
AKD.
EAU.
AUD.
13 each end in
LET, LLE.
AND, NET.
12 each end in
15 each end in
11 each
10
9
8
CEYPTOGEAPHIC MATEEIAL.
One
or
two manuals
of
cryptography
(see Bibliography).
Two graduated
rules,
to 50, the
Tracing paper.
Coloured pencils.
A
A
CKYPTOGKAPHY
158
etc.
eyes,
BIBLIOGKAPHY
WORKS RECOMMENDED.
La cryptographic devoilee, by C.
F. Vesin de Romanini.
Paris, 1857.
W.
Kasiski.
Berlin, 1863.
Handbuch
La
La
cryptographic
Paris, 1885.
Essai sur
La
les
et
ses
by H.
Josse.
cryptographic pratique,
PART
IV
ETC.
BY TRANSLATOR
IT
is
is
no work in cryptography
'
great bearing
You
will find
by such a
CKYPTOGKAPHY
160
process
men
sails'
is
called
operating
it
The marking of cards by sharpers is a form of cryptography in which an amount of ingenuity is exhibited
worthy of a better cause. Playing cards, ostensibly for
conjuring purposes, are sold publicly in the United States,
each card being marked in such a manner that any one
with a
little
back as
its
FIG.
1.
FIG. 2.
ace,
and
on
so
ETC.
161
which indicates
passing,
often given that great care
with strangers
Business men find
is
essential
when playing
cards
of
some form
by means
of
necessary to
make
extensive use
This
easily
1,
'
'
to represent
sell.
some
different letters
it
bankruptcy
2, and so on.
figures.
An
extra letter
For instance, 11
or BZ/-.
shillings
For,
might be employed,
is
is
repeated.
not be a
It is
and
for advice
and assistance
at the
11
CKYPTOGKAPHY
162
how
communication
is
by no means confined
to
It is
of
methods
known
that tramps in
all
it
When
ETC.
163
many
of
between the
newspaper,
wrapper of a
as
pours a little
rubs it off with water.
way
glass
that
;
but
it is
invisible
when ink
is
is
merely slightly
A solution of nitric
revealed by the application of heat.
acid may also be used, and this can only be revealed by
wetting the paper. After it dries, however, it again
becomes
renders
above-mentioned objection
2 per cent, solution of acid of
unsuitable.
CEYPTOGEAPHY
164
lead
be
it
could be
made
to
with peroxide
of hydrogen.
some
ferric salt.
is
arranged spot.
is
little
ordinary ink.
whatever.
ETC.
165
Bacon
made extremely
difficult.
thusiast, Colonel
to be
employed
is
the use of
dif-
following table
to
three dots,
The
signals in a letter is equal in length to one dot.
space between letters in a word is equal in length to three
dots, while the space between words in a sentence is
equal in length to five dots.
It will be seen that there is a liability to error in trans-
mission of messages
adhered
to.
if
Bad spacing
CEYPTOGKAPHY
166
A
B
Figures.
2
3
P
Q --
E
F
...
Q.
K
L
U
V
M --
.-
6
7
8
9
.-
-.
.
-
which
ment.
'
may be located
This square
is
I.
^compartments, and the letter J is "always represented by
"to
BANKRUPTCY
to
be
the
key-word
Suppose
be distributed between the first and fourth lines of the
square.
Fig.
will
show
their position:
ETC.
167
shown
in Fig. 2
CRYPTOGKAPHY
1G8
the
first
vertical
column
would
be S B.
5. When the
pair of letters to be enciphered occurs in
the same horizontal column, substitute the letter at
the right of the plain text letter. When this letter is at
letters
would be C U.
same horizontal
be enciphered
line
with
K P, D
it
e.g., on Fig. 2, A C would
would be represented by G I,
RL
by A Q.
The enciphered message may be written in groups
three, five, or eight letters, and the letter agreed upon
and
7.
of
for the
to
fill
may
FINISH, etc.
To decipher a message
divide
the
letters
you simply
the
reverse
and
writing
pairs
The
rules.
decipherer
preceding
into
according to the
or Z, as the
should never neglect to write down the
This simple
case may be, when used as a divisory letter.
time
in
a
lot
of
save
will
often
decoding a
precaution
lengthy message.
will
of en-
with
ciphering in accordance with the foregoing rules,
"
as the key-word, distributed in the first
bankruptcy
"
of the square.
ETC.
169
You may
is
YO UM AY
CQ TI KP
KE XE DA
AH VG EB
two
CT KE LI EF IN TH
GV VL YC AH ML FG MB YF
EX PE
YS
UZ
'
for
which Z
is
and
The resulting
STOP
is
after
memory,
and receiver
which
to bear in
all
that
mind
of key-words, and
the square. The key may consist of one or more words,
provided they contain different letters e.g., FAIK
CUSTOM
or
A JUKY OF MEN.
For
BANKRUPTCY
CRYPTOGRAPHY
square, CUMBERLAND in the second
TICHBOURNE in the first and third,
170
five,
for
VH
That these
DLF
difficulties
and F.
can be overcome
is
proved by
skilful
them by means
of
divisory letters.
By
Lieut- Commander
W. W.
(a)
It is a substitution cipher.
(b)
It
letters.
171
When
same
(d)
ETC.
is
letter, as
NN
has
(e) In messages of length, unless encipherment
been made from several squares of different keys, whole
words are likely to recur in the form of repeated
groups.
In the solution of the Playfair, we need not consider
the normal frequency of individual English letters,
be shown
later.
it is
page 167,
YE represent th of
cussion
we
plain text
as above,
as
1,
2,
letters
by capitals and
Also, in referring to equations
designate the letters of the equation
by small letters.
3,
we may
and
of the
4.
Thus
1,
2=3,
4,
3,
where
and 2 are
letters.)
Case
1.
YF=th
then FY==ht
TH=yf
HT=fy
CKYPTOGKAPHY
172
of the square,
and
NK=an
KN na
the
made
is
that
to kn,
in the
23,
1,
4,
square,
assumption
the following equation will also hold: 2, 1=4, 3; while
if the letters 1 and 2 form opposite corners of a rectangle,
Now,
be assumed:
3,
and
may
4,
employed
its
as each letter
when
combined
would appear
that Case
Now,
NK=an
FK=gn
MK=on
TK=cn
FA=en
FL=em
also
.
FP=et
FV=ew
FG=ef
From
ETC.
173
corresponding letter of
plain text.
Hence, Kule
it
equation
one in
bility of
After
II.
2=3,
1,
4, that, say,
five that
cates -n.
or, and en have been
above rule may be of
additional digraphs and partial
assumed or
use
in
determined,
discovering
er,
the
words.
Kule
equal
3,
In the equation
III.
possibly indicate
er,
eliminating possible
or
2=3,
1,
can never
4,
KK
Thus,
This rule
4.
AY=an.
could not
of use in
is
under
is
cipher
investigation.
Kule IV.
In the equation
1,
2=3, 4,
same
if
and
NK=em, and
shown,
equivalent to
-ANK-,
the order
or
ANK.
In the square
ANK
is
and 4 are
column
line or
This
is
which
is
a very useful
rule.
Rule V.
same
line or
which is
KRB
is
KB
K,
may
in the
first
two
and
if
the key-letters
CKYPTOGKAPHY
174
for
group recurrences.
APBNOH
ANNSXE
KBSNHL
ENPFVB
OAEYSC
FBTACS
VSBNOH
EUXUUO
NESCSD
EAEGCI
ENAOEA
OUUADT
DYPYHS
NVOBNX
SOKTDN
HGQEOA
ENEAEB
QENSXU
VNNSGE
BHNSES
INTHXU
GEGBTE
AEGBIZ
YCNIVK
DADYPY
GIOEEB
WQGEUD
BNOAEP
NIYEEB
WECSFQ
NYSIQC
GNXEOU
KNXDTF
OAFLIG
CIENOM
ECOEOT
QNFLEN
CNOELC
EAEEHN
EXXUUY
In working with the cipher, disregard the above grouping and rearrange the message in pairs of letters.
We
.)
CO
Q
o
o
H
Jz;
02
ETC.
175
CBYPTOGKAPHY
176
OA
EN
GE
EA
NS
XU
No group
usual.
each.
th
er
on
an
50
40
39
at
en
es
of
he
38
36
33
in
31
ea
ed
30
30
26
ti
re
nd
ha
or
nt
to
it
25
25
25
25
25
24
22
22
22
20
st
io
le
is
ou
ar
as
de
rt
ve
20
18
18
17
17
16
16
16
16
16
the fourth.
III.).
Nor can
EA
or
EN
symbolise
of
re or rt
(Eule
the possible
ETC.
177
may
represent
ih.
English is known to
INTH, ENED, TION,
THEE,
be
XU
BN3 OH EN
XE OU and in lines
recurs:
4,
2,
3 and 10
we have
DY PY
2
But
will
XEOU
DYPY
To guess
letters.
The repeated
however,
4
groups
2
2
present opportunities.
Also, note the combinations in the cipher of our most
begins
BN OH EN
common
groups:
EN EA
GE 4 OA
NS 4 GE
NS4 XU4
We
be
NS 4 may
be
th,
but
common
XU
4 is
CRYPTOGRAPH?
ITS
at
bo considered as
Hule
Suppose uHj
kO
Now
nni^t
it
l.V
This
(for.
is
an excellent
Sumption,
and
message,
bo
to
V,
However.
possibility.
u K cannot
if
hK
0\
and
=/Ji
lUi
cr.
and
-hi
-v.
in
".
is
:'
'
thought."
lino
for
10.
HA
Thon
and
:/,
\l\~ti.
\vo
Substitute
\\o V^
c;ot
for
assume
in
-w~it
-ht.
lui.
those
AO HA
values
in lino
1.
H AH in lino \). ;;
Those do not appear
the
and
after
promising,
carrying
investigation farther
it
\\as decided to abandon the original assumption that
Ttit.
and
for
ii
;:
will be
ONontuallv be proved
*
tker
false.
false starts
In this case a ^
^reat
many
was abandoned
in
and
etc..
Assume HN 4 HA^
KN=th
Then
HA--er
and
to be th<r ^lino 7
NB=ht
AR=re.
Unfortunately,
but
(Kg.
one
:
AH.
we have no NK in the
Make those substitutions
cipher,
and
throughout
AX \S XR OU
ETC.
he
er
L'A
DT BX OA RP XI
YK RB
r-
KB SX HL DY PY II- XY SI Qr \VR
EX PI- YB XV OB XX GX XR OU OA
r-
CS
PL
IG
h-
OA KY
-0
B(
KT DX KX
XI)
TF
CI
RX OM
th
PR TA CS HQ GR OA BH
B8
EC
OP,
OT
-r
YS
BX OH RX RA
th
fx
uo QE xs
PJ; XT;
TH XU QX FL RX
Rli
e-
IX
XT;
GR GB TR ex OR RC
he
QX
BD YX XS
X-
frh
th
-r
AP,
-t
GB
RA RE HX
IZ
re
RA KG
f-r
YC
CI
f-r
e-
XU VK DA DY PY RX XT
L'Y
eh
First
step
not
underscored.
p^^'-^
1^.0
ab.-titutions
of
undf-r-corf-d
2nd
.
dividf-fl into
FIG. 2.
There
is
I.)
that
TH=rn, and
RE=ar,
RX
is
assumed to be
th,
CEYPTOGEAPHY
180
is
formed from a
rect-
angle or a line:
(1)
or,
E E A
(2)
E E A
H
'
for certain:
E E A
H
Now
Eule
that
II.
Now GE
is
is
Then
Make
same
GE=he
EG=eh
E E A
G H Going back to
at the
(4)
we have:
2),
(1)
and
(2), if
we combine
(2)
with
(4)
From
the above
such as
181
T -
(5)
ETC.
equations,
etc.
Sub-
we must attempt
more
stituted for
have the
to find
of the
used four
back to the
that on
is
and
Assume NS
er.
If this
1
assumption
= 4, these
correct,
ONS
ONS
build
up the square
is
that
order
to be on.
as follows:
(6)
E E A
G H
ONS
NOTE: In the partially completed square the horizontal lines are definitely fixed as shown, for KA=er,
and NS=on. We also know that in the column TEHN,
follows
T and
certain that
column, and
above, namely:
it
CKYPTOGKAPHY
182
NG=oh
HN
be
rli.
183
HN er eh.
would
where
assume HN=w/t, which would
it
"
'
(7)
E E A
H
N
Substitute TB=rrf,
TH=nw,
and
W=wh
in
Fig.
3,
WB=rf.
Line 1 now shows
also
Ti was
'
'
tried,
BN=ri, we
GH
in line 3,
(8)
E E A
G
It is evident
now
W
H
the key.
We
are not
able to
it
as
shown
CBYPTOGBAPHY
184
square:
new
'
first line.
'
We
left
If
XU="
and
zuXU="
was."
(9)
Q T U
ri
ng
th
es
rao
er
ne
-t
AN NS XE OU UA DT BN OA EP
on
wa
NI
se
dt
o-
KB SN HL DY PY HS NY
SI
QC
WE
ma
n-
rs
sq
su
ri
rp
he
jpa
YE EB
ea
-n
no
OS
EN PP VB NV OB NX GN XE OU OA FL
ro
ie
OA EY
SC
SO KT
n-
se
FE TA
CS
ur
in
VS BN
ri
QN
as
ZS
er
g.t
he
th
er
IN
TH XU QN FL EN
j*o
nw
as
nq
th
to
GE GB TE CN OE EC
X~U
IZ
CI
ne
an
SD VN NS GE AE GB
on
ig
OE OT
on.
nt
oq
EN OM
rm
se
ea
IG
om
th
HQ GE OA BH NS ES EC
on
e.h
CI
hs
me
qs
to
EA EG
sq
DN KN XD TF
OH EN EA EB
ng
wa
se
hu
EU XU UO QE NS
at
ho
s.w
FQ
rt
he
as
he
i<3
d-
EA EE HN
er
re
ne
e-
wh
YC NU VK DA DY PY EX XU UY
a.w
st
as
FIG. 4.
Thus, building up the square from the pairs underscored in Fig. 4, we have:
Q T U - P
E E A B D
WX
H K M
N
CRYPTOGRAPHY
186
P Q T U -
D E R A B
WX
H K M
CONSI
may
safely
fill
in the square
P Q T U V
D E K A B
We now
"
is
L Y
F G
WX
H K M
S
5).
considerably."
CONSI
PQTUV
DEEAB
LYWXZ
FGHKM
FGHKM
CONSI
PQTUV
DEEAB
LYWXZ
or
and it is
and fourth
now
interesting to note
how
187
follow normal
ETC.
It is
uncommon
EN =th
BA =er
4
BN
CI 2 =is
NS 4
pair:
=ri
on
GE 4 =he
AP BN OH EN AO EA GI OE EB WQ GE UD
Du ri ng th es er mo* ne* da* yt he pa
AN NS XE OU UA DT BN OA EP NI YE EB
rs
on
wa
sq
su
ri
rp
KB SN HL DY PY HS NY
ma
no
fw
el
ql
kn
ow
se
dt
os
eq
ea
SI
ns
QC
WE
CS
FQ
po
rt
in
EN PF VB NV OB NX GN XE OU OA FL
ro
cl
OA EY
iv
it
ie
SO
SO KT
qe
ni
nc
FE TA
CS
se
hd
ur
VS BN
ui
ri
in
ho
wa
se
sq
DN KN XD TF
hu
re
hs
la
CI
is
ph
Id
om
EN OM
th
ig
HQ GE OA BH NS ES EC OE OT
gt
OH EN
ng
sw
gp
IG
th
rm on
EA EB IN TH
er
nw
so
ea
he
se
an
do
ne
nq
XU QN FL EN
as
to
Id
th
EU XU UO QE NS XU GE GB TE CN OE EC
at
as
qs
oq
on
as
He me
nt
io
ne
dn
SD VN NS GE AE GB IZ EA EE HN
me mb er ed wh
ti
re
ca
on He
EA EG CI YC NU VK DA DY PY EX XU UY
QN
ZS
to
xi
er
eh
*
is
lo
st
um
Evidently a group
Q was
br
left out,
el
meant
used as a
FIG.
5.
ql
for
null.
aw
as
"One day."
qx
CKYPTOGKAPHY
188
their
is
prior to enciphering.
up
split
that
common
of the Playfair
it
will
is
of being split
This claim
common
Digraph
th
..
er
on
he
as
ri
..
re
is
'in
Times Represented
in Message.
4
4
4
4
4
..
..
6
6
8
7
7
4
4
3
U
in Cipher.
..
.
,.
..
3
3
2
3
1
CODES
Closely allied to cryptography
is
In
ETC.
189
code word
For instance,
if
to cipher are:
22350
49861
is
Buy another
123
4567890
UZYNEAEHOB
A more
series of tables
letters,
compiled as follows:
00
01
=AB
-AC
02=AD
03==AE
and
so on,
up
to 99.
may
on
190
BNHGYKZJ
KLVEDEST
DZRKICXF
GFIDWTCO
YVPJEGFA
HICKDROQ
SBKEQHJK
EBIZSOBQ
CAXSDPED
OPHYXHEJ
SOBLJGET
FXEZEKLJ
TJEHSQLO
ABEDZFYT
SJETVTYD
CRDYFEZF
SFTYZCBE
DRZLUSIX
EMNYCHCR
NTEFTRYD
RJPARXEW
HLOCKLJE
QUDCAKNS
CUMKJOKS
WLFSONFR
TLXINVHM
UCNZLYDF
OTRIWVAV
RABMVUCL
VUKLXUDI
ELKOCWVD
ABLNYVSG
YTANBECB
WCWLADXE
BLXUBNQC
UZXHVEFG
ORLVDICM
SDATWRAL
RSBIXFEG
ACBNUMOF
EDRXLAVB
UTKYBSEN
WVFRUGUT
SJUJGADV
VLHYZBUK
ICJTFOVS
DLTEMRGU
PEQCFAGF
IVTBIZBC
XPMAQBML
DCYVSOSB
RTCLOCHZ
CYLABRFO
LASPBIQZ
GICLMDUG
EPZLFURS
ALKDENKI
YCANTEDP
FYRLGEXV
FQRBONCD
ARBGEXD!
VIWCOCR
ZBEWGBHJ
RYNQGXY,
EZLGAPHi
DQYNZNY
GIWFYKN,
HVISTVA]
YPTAHQP]
V R D
R T L
ICSZFED]
DNJOCKL,
REHXZBI
XFOBGHI
BRAVENH]
ATLFINC]
KCSJAWE]
JEFGUDZ
MEQMYWL1
ONBPANCi
MLIVCHU1
AMUKRXLI
JDSEXVY]
EVLJMAN5
I
A K A V Z
QUCKIBN2
SCLURZUL
XDUZVNII
ROFUGAL*
FECORXEI
CEYPTOGEAPHY
TDRIQU GHNAZAJG
E ZXFNOK
KWI TI BMD
x DWIMCG
KOWTFXEN
L WOC MTU
ZECWTGOS
L IMJDTO
LBVCUSU^D
o BLNEKU
VJGSITVA
DUNCDLOX
E WQVAVL
N EZVCPA
VFEBNJCU
x RNYFLZ
EQBUNCSI
c FHGUVG
RSEWLFAJ
C R ULMXJO
ZTCBATRL
IW F CGIFXO
ZCZLEGLM
T UDKVYN
PSOJLCDE
F X CIBSGE
NCDLIWDX
E PFLICH
CLATCNDU
E X TASWEL
TZUKBPFA
V A RHITVO
SRCWICHB
A XGPBYN
CTREZCVJ
D MBYCXZ
DARVKINM
L U KRXJEP
LUCKMRIG
K L AZHZYG
VIRVDUXC
R
HNYSPY NCHUVEQR
W M YCHKBE ZBUTSUCR
Y C HLBYVW
ONDEJSQF
P
TVHCYZ NEFCTOGK
C A TGLSET
CLYRTOCL
M D ESMACK
VYCFLNOL
C D SYFLON
LCXODIGF
C ERHBYB
NHOXDLJU
IN
1C
IL
'IS
;A
IS
S J Y Z N F E
Y H D R A J X
J H P U D F N D
Q A W M W X E K
H B A R D T U Z
D F B Y R G P G
X A P M
Q
S U L V Q F
K Y M
A V J B
U B A C R T I M
F G
J
G L A
Y D A J
R Z L J
Q U V
Y R T E D
Q U
A K
M B
A X V
K M
T L D N A J T
N V
F R L
B U P B R G
191
V Q
E Z L T V Y
F E Z J F
F A
N F E
T
S
TSAR
L J A F Y B L
1
M E R
M U R T
L
V U
H D I V S A Q M
B U V L B N I G
H R
B E T Z C
G H V D A N C D
192
CEYPTOGEAPHY
CONCLUSION
'.
4-?
...
Wjgmorc Street
LONDON .W.i
niiiiiiiiniaii
mil
iiiiiiiiiiiiiin
HIM