Advanced Cryptography
Advanced Cryptography
CONFIDENTl.t· ..~
JY ~
·~~
--~.
,/
.;
.i
··\
.::·/
i'
't.''
Prepa~ed under the direction of the Chief Signal Officer for use with
the Army Extensi?n Courses.
/j
,i
i
.-·~ .
'k·
~:··
~}.·; _..
f~;'···
30 April 1959
Jf~ft/~'
l>~ul S. Willard
Colonel, AGC
ti:, Adjutant General
••
•.111,
. "=·~-
SZCTION II. :t..Ionophase transposition systems ••••••• , ••••••••• • ••• • ••• 3-9
III. Polyphase transposition systems ••••••••••••••••••••••••• 10-12
IV. True double transposition ••••••••••••••••••••••••••••••• 13-14
V. Grilles ••••••••••••••••••••••••••••••••••••••••••••••••• 15-24
VI. lliscellaneo~ transposition systems •••••••••• , •••••••• •. 25-28
B. SlmSTITUTION SYSTBIS
C. CODE SYST.BJ..iS
SZCTION XV. Code language and the international telegraph
reg~lations ••••••••••••••••••••••••••••••••••••••••• 76-79
XVI. E11ciphered code •••••••••••••••••••••••••••••••••••••••• 80-84
-· .. r •
REF ID :.A56930
i . ··.~ ..:. . . . : ...
.·: . .·
., . · SECTIOlf I . ·
IlJTRODUCTORY REMARKS
Par"agraph
·nesume-·.or pre.c~cii.ng .information· ••••• , • •• • • • • • •.• • • •.• • • • • • • •.• •.• • 1
Sequen~e of stU:dy •·• , .• •.•••. -~ ••••.••••·• ~ ••. .- • ~ •.••••••• ·• ••••••• •·•·. • • •·~~
. :
. '
- .. ;: . . .. . .. .· . . . . .,; . ; . .
- 2 -
. .......
' • ,. t
'
••
..
'I I • • 't
·- :1.
It need only be point:e·d in 'this con;iection .t:hat today code methods ouf
.: p:redmti.inate in the secret communication ayst.eins··or the military, naval,
:-
0
and diplp~~~~. services of practically all the large nations of the world.
ireverth~l.P.s.s, it· is· likely· that within the· next decade or two the pendulum
may OJW, 'JO.OF.a· 's\-7in8" b'V'e:r· to· the· othal". w.si:t~?n and: ciphei- methods. may.. ~gain
come t.o. .~e .:t:ora,·
e'spe·ciul·l-y· ·if.· me.chW,c.a,l. and· electrical cipher ma-chines
are pa:r;f:aQ.~·~~ :~~ "tna't 't1t8i·r· ·Opar-a.t.iQD, .Q~c.qr,ie~~ _ifr'a'c't"icable :f'oI' general Use•
rt is.,tQ:r;-.this reason; 'if' ·fem ·no .other.,. ·that tll;e' '_c'ry'ptog:I-0.pher .who ..-d~sires
to keep .i,:Qr~.;5-t 6t"prog:re.se ·must .d~vote .qonsiderable ·=attention to· the: .111ore
complicated ~i:i)h.er'metliods o-:r· the 'past- and prese.rit ,'tiln.a~. for with.·t:he .in-
0
-rnatical::Jin. chal'act.er. a:nd 'Which- ·;iis :so· c-pmpl,icate(l .wli"en 9perated: by hand that
· · its· use~~s-_~ .m:i.'111;'a:;-Y,° cipher wolil.d b.e .pract~cally ..iµtpos.sfble;'. yet,:oa=·mechan-
rca1 de:v:io.~ ~for ,perform:ing· the :math'emati-c.al. opeliati'o:trs 'folv-01 ved in · cJ:""yptograph-
±ng: aiid·· d~qr1fi>togr~phi:q.g· be' constructed,. can
a: c:ompact·;, efficient machine and
based upon 'the cryptographic ·principles invol,vad, *18Y _easily become a· reality
for field use. Consequently, i f among the methods to ·ha set forth ·herein
~-ce~tam; <i>~srapp.~~r to, the student to fall outside the realm of :what: is today
: consi:dere.4• p~~o~ic~bi~/· it.' _should h_! ..rellle.mb9.?-':ed ;t.~~ .~he purpose in describill$
· -'them •i:$: :tO;·:Pt.e~~n.t· for.· J:i±_s· lrjottsideratj,9n .,vari~u~. basJc'"cryptogr.aphic princi-
1
. i
. ·: c·:.--·
,;
. ! ~ . '·.
~ . ; .
. .: ' ..:·~ ._) ; ; ;" . ~ ... .:
..·.::. ,·
':.
.! .• . ~ ~ :· ;. • • .• '
.•·' ..
.· ;:_
') r : '··
···.:.':.:
~
~ : .'
·.· ....
REF ID:A56930
- 4 - .
A. TRAl:;SPOS"ITION SYSTEiolS
SECT I ar\r II •
.·.- .. Parag~_a:ph
· 'Tr_an.sposi tion ·.systems employing geometric de$igns ............. ~ •• · 3 ... .
Ti'-apeZOici8.1 ·de.signs· · ••·.. ~ :.~ ....... ~ .:· ••.• -. '.•.• .;._,j •• ~ .......: •• •...... •.• • • • • • .. • • 4·., :
~ ~ri~gtJ,1~r· de~1gnB ~ .:•. ,~. -~--~-·. ~ -.; .... -.: .•:. •• -•.•••.••.•. -• • ;. ..•••••.•• -. -.. ~ ..... ....:_••.• - 5.
• ·n1a80nal ·~ethodS:. •·· .:~ -~-.- •• • :. ~ ..·. ·• .. ~••.••.. ·.-. ~ •.••._..-. ·• ~ •• ., .;~·-·-· -~ ~ •• -. • .. . • • 6
Interrupted: key-Word· trans:i;>osit"io.n •· ••••••••••• ·~. ~·-~. • .:...:•• •• .- ..... , • ?
-~~rn1Ut·at1bll rii8t"hoU· · .:, •• ·', ~ ~:- •• .~ •• ~- •.•.••••··;; •••. ;.·.;. •.--.-· ..:.- ..... •·.'..·:.• -~ ~. ........ 8
-~ri!n_sposi ti on ·inethoas ~u'siri.g; special. figures •••·••.• ;, ~ •• •'• ••• ~- •• ,.... 9
. .·. ·; .:! :. ; ;
· ·. ·. 4~.:
Tr'apezoidal desi"i:;ns·~ · -· a. ·A· trapezoid,-· or, :·more- ac.curate.ly_,.: a
'-· trt.inCBted triail.gle t : Of prearranged dimensiOilS SS' regards the-. llUmb~r Of I C0llS
(which in~th:i.s.case are'rhombs-).intowhich.it i's to be partition.ed,_.is--.9on-
.~tructed. There will be left on one side of the design a series of small
·· · t:Fi.a:rlgie·s ·which: a·re ·not' to be: used·: i'or. inseribl.ng· lett.e-rs, and ar~: therefore
. · ~r·o·ase1f o:fr in ·"uh& des'ien;· as sh6Wn tn..: Figure.·:i..;; Only· t-wo: agr~e~nt~ a,re
. . . . nece·ssary;: !Ii: order to . ·• . ~ . : .. ·. . . . ' . . :- .. . . .
·· ··fii:·-tiie"·'dizriens1o?ls· -or· · · :. ·' . . ; ·. ' . ~-
·th.0·.:;ci·esfgn:·;: 1f k:eyword ·: · · · · .. ··,
·: ·o:t:' k~~i)h'r.ise··· •to deter- · : , ·.·
..· : Inihe·=· ·the;·· D.umber· ·or.-.·ee11s··
·at _the· ·b~se ·:of' the' ·de- ·, ·· ··
sigtt·,' and 1fa understand..:
ing as to the height of
the design ex9ressed in
number of cells. The
successive horizontal
rows of cells will de-
crease by one in number
from bottom to top of the Fi-"'.
~
l.
design. In Fig. 1, the
keyphrase, NO CANDY FOR ISSUE, is used as a basis i'or deriving e. nUI!lbrical
key of 15 elements, and it is assumed that by prearrangement it was agreed
that the height of the design should be eight cells. Therefore, the bottom
row has 15 cells, the next one upwards, 14, the next, 13, and so on, to the
last, with 8 cells. The inscription may follow any route agreed upnn; in
REF ID:A56930
• .'• II
: •• :· ;. t'."
... 'i '
• \I • ~' ,• P •
ODAIK AEDIJIE.·HPODV
..... ·. ITEIP N H-U ET· BO BRO
: .·.
HDTFS E .I s . _ir .. I
. •
· .. E T: B Ji: F
1 ... • ·· .. \ ·.
BCBTM E· SH GA RT ORD
. . ') . . .
IRE RE .
.A
.
·,v· .A: ...R•. .R.... . . '~
'E :R T N S IEPVR VA SEO FTEDL
.NA .. ···.
. . . : ... .·; . ,.·· ...... -.··· _· ... , ~ ·.: ~ : ., . :...
b·. Dearyptographin,g. ~s·t:he~ely:.·the· r~vel',se-.9.t:·c;i:-yptographing, ther~ be-
ing no·· d·ittimU.t ~e.s prc5vided···that :. tht; design·. has ;been. :Correctly constructed.
For this purp~se"' 'cro"as::section···pape.r;·:w.i,~+..:'b~.·~;eo~d··useM. The analysis Of
such a cryptogram is somewhat complicated oy ine-p'l'tiseiice of columns having
varying numbers of letters; it may be fl;rther complicated by following com-
ple·:x: rout.a~ in. i:p.soription. It is also possible to::fo11.ow a numerical key
in the inscription of t·he plain tezt in horJi.o~tal lines; this additional
procedure would further complicate and ·delay· ·sbluti(,n.. :·
diagram .w·ill: .t~~..2!!.-1 _columns __ .. , . ,:· '\.·. ~-· ,~·_; ·. :·\·· ·\-·-\''
where·~ is _the.. n~ber '(!:f ceJ.:ls: · . ; ·· ... '<Y \ .\.:-··-\ .\~~\··\
torming on~ _.ot. ~~e . .Sides =of. the .: : ; : ; ... \ ... \ . ~- \: ·\· ~.·\"' ~ · ·
· square from. whi,ch t:it~. ~riangle .. .-. , · , :. ·. "c _· \>-\ : \ ·'\ :\~ . \··~.:·' ...\, (
has been· co~!!truc.ted~ :Ther·total .... · ... ::.~\. \/\' .:' ·. ·\·~_\...-\-\. '
number of letters that· c-an be in~ .. : .... , . . , .· .> ··\ .'"\ . . . - \ •.
scribed within the triangle. is,.:. . · ';~-.-.· \;. Jo:" ·
the sum of n + (n - 1) -t (n - 2) · · · · · .,. -~;'\ \ ·. · Fig. 2
+ (n - 3) + ••••• + l. Fnr a
triangle based upon a side of 9 cells, the sum is 9 + 8 +·7 t 6 + 5 + 4 T 3 +
2 T1 = 45. The letters may then be transcribed to form the cryptogram by fol-
lowing another route, or by following a derived numerical. key applied to the
base ot the triangle. A si~le method ot deriving a key of 2n-l elements frnm
a key of n elements or letters is exemplified herewith. Let the key be
DIAGONALS7 a word of nine letters. E:x:tend this key to 2n-l places by repeti-
tion, and then assign numerical values as usual: -
.!!. • 9; 2n - 1 : 17
REF ID:A56930
- 6 -
1--2--3--4--5--6--7--8--9-1~-ll-12-13-14-15-16-l?
Keyword : D I A G 0 N ·A L S D I A G 0 N A L
Numerical key: 5--9--1-7-15-13--2-11-17--6-10--3--8-16-14--4-12
::i.": .•. '
This numerical key is the.one that has been employed in enciphering the message
..
in
·; ..Fig. 3 • ;
·.. • ''l.
: . ·· .. ·-
.. , .....
£. d.#Yirto~r~~ ... · •J
. ; . . .
UAOOE SEY 1· D RT I SS
·. : ~ . .·:
~
Fig. 3.
. ·. ·,: ;:·i~~-·: :Bi. a _si~ght ~henge in .proced~e it· is possible to .enCipher a message
and-produce ~-~~n which, for.the sake of.accuracy in· special cases; is double
the original· length~ but which is self:..checking. ·suppose that instead of ap-
plying a single numerical key to the base o-.£· the triangie, a double-length key
is applied to the iegs, as shown in Fig. 4. Here the key is TRIANGLES, ex-
tended to double length by simple repetition, as follows:
l--2--3--4-5--8--7~.:..-9;..10-11-12-13-14-15-16--17-18
Keyword . T R I ·A N G L E S" - T R ;r A N . G L E S
Numerical key: 17-13-~7--l~ll--5--9--3-15-18-14--8~-12--8-10--4-16
This key is applied to the legs of the triangle beginning at the lower left-
hand oorner. The transcription then follows key-number or~er, which results
in doubling the length of the message but. the repeated le.tters ·are seat·tered
throughout the whole message. In decryptographing such a 'inessage the clerk
merely omits the second occurrence of a letter it' it agrees (in identity)
with its first sp~earance in the text • ..
... :" ..... ; .. : : ~ ~' . .;.. ...
... ;. ~. :· .. ,.
.·. . , ': $
; . : _; .: ; : ' .~ . ' • ! :.. ; ·
.·.. .· ...
• . • ! •. •· ~ : ; ~ •. .•
. ; ' . ,; ; .
·.
: '-· :.·
' ~· ·-
REF ID:A56930
-. 7 -.
C'.rypto~:
P I S 0 S · RNAT U S I E R S etc.
(h) In diagon~s :from right leg, in key number order.: .
RI ~ DR 0 UAYN etc.
(c) In rows trom left leg, in.key number order:
CT GE 0 YT CE U etc.
. .
(d) From columns in key numbel" order:
CNR 0 I
... T UGR U etc·. ·
Fig. 0.
REF ID:A56930
-s-
~ ,· .
6. Diagonal methods. - a. A method involving diagonal transposition
which-is reported to have been-employ'Efd'.bi ,t.t(e French ArmY in the World War,
is now to be described. A numeri'oai... k·ey i"s a:er.i ved from a fairly long word
or phrase, and a rectangle is o·onsti.\icrped.~·as,: Fig. 6. The text is in- in
scribed in this rectangle .;1.n· norrim-I'. ra:shi6n,' nulls be·ing employed, it' neces-
sary, to complete the . laa·t· 11:6.a' or· 'the: rectangie. . ; ..·
.·· . · ... ;.· •
OF THREE ROUNDS
. PER MHTUTE FOH. THE BATTERY X .WILLS, MA.J.
Keyphrase: MIINIGHT RIDE OF PAUL REVE,RE
Enciphering diagram: .
M I D U I G · H ·. T R· I D , E . O·.. F P A U L R E ·V E 'R E
l5-l~--2-16-12--9-10~22-19~13--3-~4-17~-8-l8--l-23-14-20--q~4--6~21--7
E. :rt .iEl u -y-, ·B A :·T . T' E .g1,l ):ti ·L. O' c lAl _'f. 'E ', ;D ®~:±'._: LW~ :0 0
_Q. fSY 0 r E T H 0 u s IA.\ mI D y A. R I.DI s s 0 I.III T H E
\A_] S T 0 F I:I U. U M [Al S B l]J B G . H E IAJ V · l.Y! A @ T I
L L E R Y S T 2:_ !Pl T H E ·y ~/ _R_ 'E F . I @ l_ N G (ii..±_
R A T E 0, F '!! . [iii ~- , E .]!. R .0 · U. :l.NJ- D :S,. rE!' E. \Bl M I N llIJ
T · E "· :F: ' 0: R T ··rnJ E B. A T T E. R Y [ii l.Wl I .L L ~ M A J
Cryptogram.:
AD ARR.
... 1'r
RHEDO T~TFS
·, .......
~E _T .. B.. E... :R. 'f b I L T··G·I:M 0 E I T J 0
- 9 -
The plain text is then written out in horizontal lines corresp~qing .:to.J~he
l~ngth Of the key; then transposition is effected within each row, according
to the sequence ·or numbers applicable, o.s shown in Fig. 7 •.
Eneiphering diagram:
17-10--6--3-11-14--8--7-15-18-12--4--9--2-16--5-13--1
A D B I N I S T R A T I V E 0 R D E
,... R s 11 U s' T B E :c:· .Q M· P ·L. E·· T E,; :D .. ·A·.
·" N'~ n Pt E A ..n . Y T 0 A C C ·.O . M. : P A N ·. Y .• •lj•·
. '· "F · I .E t. D. · O R D E R . S: N O· · T L A : T · .E
. "";R· .T. ·H A N .F ·I V E P l,I .T H I · S : D .. A T
·.':E ,
.·•1
Cryptogram:
J?.. . In ~he foregoing case the encipherment takes place only by trans-
position :within rowi:r, :.b'U..t ".i-t i.s·.ppssiQ-;L~· t.o: .f?ompli-E,.ate '·the; method by trans-
posing, in addition, the rows as a whole, employins.the· same" lt:ey or only a
portion of it, as much as is required. Thus, if the message contained 18
rows of 1'8 letters· ea·ch,. then the· tr.ans.position of rows could be effected
according to keynumber order, ·the last row being taken first (since the num-
ber 1 Of 'the' numericai key happens in this case to .be at .the end Of the num-
erical key}; the 14th row being taken second .(since. the number 2 of the num-
erical key l~ ~he"l.4~h i:nu:lber)·, and ·so ·on. )'lhere the message does not contain
as many c!omplete rows .as there are· numbers iri the key~:· the t.ransposi tion takes
place in 'kel'Ilumber order· nevertheless, the rows being 'taken· 1n the numerical
~. order of the numbers present. Using the same key and message as in the fore-
going case', 'the 'ericlpherinent' waul'd'·be·'·a:s' sli0Wn ·±n:· Fiig.L81e:·' ·;·.;:, .. ~: ::.
• .. ..:.··
En.ciphering diagram:
: :r• :r. . . •1: •~ •.•,. ·!: I · ', • , : . _; ~ t ~. . ' ; ' . .. . ' •
: : :· ..• ;!;''I: i7;.,10--6-~-ll-14..;.-8.;...;.7.;_15-l8-12--4--94.o.16.-5-l3--l
·: ·. ·· ·:1rj -:·· ·A D 14 I"' N I . S T R A T I V ·>l!: 0· R D E
::.·:·10 ~::·_.·, i:R · S . M U S T B · E C 0 M P L .. E T E. D· A
6 N D R E A ·D ..y; ··~T 0 A C C 0 ·M · p· A N Y
3 F I E L D 0 R D E R S N 0 T L A T E
l1 : · R T H A N F I V E P M "T R I S D A,· ·T
;.. i.4'°: :· .. · E. • .-. .. ;... . . ., ...... ' ·· ..
".' .: a.rfptogriln:. ·. · ·· · ·
·...
·,·_~_;::·,~ ~ .
... . ·,_, .. .... ·.
··-·······--·· .
~ ~
. . . :...~~.&.~.J=~ :· . .. . .. ·-. i
,;
.£~.. From the preceding method i~ is but a step to the method of inter•
rupted key..'trimsposition now to be described •. Instead of writing the text in
regular-length groups corresponding to tbe length of the key,. it is written
out in irregular.groups the lengths of which vary according to some prearranged
plan •. For example, note the basis or the variable grouping in the following
diagram, which uses the same message and key as under .!·o~ this paragraph:
Enciphering diagram: ·
17-10--6--3-11-14--8--7-15-18-12--4--9--2-16--5-13--l·
A D u·r N I s T. B A -T - I V ·:E ·o ·:R .D E
R s M u s T B E c 0 M p L E T E D A
N D R E A D y T 0 A c. c 0 M· p·A N y
F I E L D 0 R· D E R s n 0 T L A T E
R T H A N F I V .E:· p M T H I s D A T
E
...: .
17•10--6--3~ll-14--8--7-l5-l8-12--4--9~-2~16-~5~13~-1
A D· M I N. I. S.- T R A T I V· E .. o· R .D E .
R S M U· S T B· E- ·O :o .M P L ·K •.•.
· · E D A T •. . •...• · •· :•...
: .·· D R E·N A D Y · T 0 A : C. · C · • • · .•: .. ·• •:
· .. r»:i·:· ·: : .,. 0 IA P A N Y F .. I . E L D 0. R . D E R •
:·-';.=.1 ··_;···. · • S N 0 •. •. . • . . . .•. • .. .-- .•. :. •1 .• • .
·: :·....:«/• .....;.:r <:,:::;· ·-'l' ·;L.·A·.T E ·R :J:',:·H·:.:~:, •. ,;.·.:.·•···•·····;,:·.:. •... ;.:.!··· ...
~-~~-':.·r :·:t.:_f.r1:.~.;.-y::-•. ··A. .. N: F". ~I. V· E; ·P.:· . .-. -~ :.. ·~.: .-..- · •· ~-~: .. ;e..:;_.· .• .. ~ .; .... :··· ·
.:.·:;J•t::··t:!r ~-;·:::i· <M;·T· .H_.:r .. s. ·. 1 D~- 11.;· ·T,·E (L . <C E. ·P).*.·. ·• , •.. :.·.,, ...•..
·.·
... ' ·.,. .. .
-.
...·r. ··••
•,; . ,/ :-..·
_>
(*The f'our final .. let.ter.s.··Ji.CEp. are.•nUll:a·; :to .. oompl.&te.. the;- rpw. }.
Fig •. 9
REF ID:A56930
.....- 11 -
.
Cryptogram·. ( colUmna.r . transpo:si ti on in key-number sequence):
. . ~-
A.CA.LL
Fig. 9 {Cont'd)
~- This ·method may·be combined with that ··sho\'in under!?. of this par"agraph,
thus f:u.rther complicating the system. In decry.ptogra.phing such a rne·ssa.ge it
·is· best to use cross..:.section p?per. blook out the cells to be ·occupied by ·let-
ters in the deciphering diagram, and indicate the key numbers applieable to
each line. This will facilitate the process materially and help eliminate
errors.
.. . ............ .
. . 5 2 6 3· 1 .5
.J I I I I !XI I D<I I I I I txl I I t><l t><I I I l I 1. etc .
. . . . .
.. . Let. 1;he ~essage "Qe .A.T'l'ACK. IfAS BEEN POf?TP0~1ED.•.
. . .
Enciphermen1;:
Cryptogram:
~--·····--------------------·----------------·-··-·---····--- ----
- 12 -
.. , ..'
Taking the lett~.:t"s ·i.n .. cQnse9utive ..order out of the 1;1uccessive sets, ~d
crossing them of'i''·the series at the same t-ine :.as they .are. being;;wrttten·
down to .con~tru~.t. tP,e-. plain text 1 the rnessaBe is found to begin with the
following ·two wC3rd·s·: · · .... ..
.•
ATrACK HAS •• .-
. !.•. Prepe,roto·:ry.·.·~:a cryptographihg, it· is necessary tc:>· f~nd the length
ot:. th~ message to· be·· enciphered and ·then. to· mark Off as ·manY.:.eell,s as will .
··be· req\J,ired ·ror enc'l:pherment·. ·. Nulls ·are used to fill in. c:~;l.ls ~~1:.mt. ar~. net :
ocoupie~ :after·· eric.iphering the· whole' ·message.. The sec:i:-eay ·~t .tJ:i!' m~thod cie-<
. pends, of· course, upori· the reciprocal ·.selected,. bU.t the~e i~ D:o~rea_son'·:~hY ....
any traction that will yield a long series of· digits cannot be employed. ·
If the sele~ti~n of key numb~rs were restricted to ·reciprocals, ·the secrecy·
. would· be more 11mited i-n
s·cop~ ·than is actually necessi·tate.d _by the method
·. 'itselt;. :
.. '
.. a.· -permut1it1bn method • .;. A· ·An old nethod, knO?Rll ·.in- li tero.ture. as
. the aerial teiegraphy method, l forms the basis of. '!ihis s..ystem.· .A set 'of
pe:rmutations of,3,: 4,-· ••• 9 digits ;i.s·agreed U:pon''and·th~se_perm1:1tations are
listed··1n a :definite· aerie·s. As .an· example,. let these-.p~Fp;nrt:a~~-ons be made ·
.qf tlie.dic;its 1 to 5·~ select_ing·only·fou.r of the:possible 120 •. ·Suppose those
··selected' ·a.~e the· f'ollowing, 'set dew in successive line~ ~of the diagrom in·
·to a. ,
:FJ:s ~ · · ·
Permutation
2 3 j l 5 4
2 3 1 5 4 ... .. . .. i
. ... 2 4
3 2 5 1 4 3 I 5 1 .. '
I·
l 5 ... I 3 :2 4
1 5 3 2 4
!
4 3 1 5 2 4 3 I 1 5: ·: 2
!
Fig,. 10 !,
The letters of the plain-text, ta.ken in sets of fives, are d:l,stributed with-
in the sections of' the diagrum in aacordunce with the permutations indicated
above the sections and· also at. the· left. Thus, the fi.rst f'i ve letters of the
text, supposing them to be. the initiallet.ters oi• the :Word. RECOMMENDATIONS,
are inserted in the following pQsit.i~na-: .
. ... .
., ... ~
. ~ ... .. . . ., .
1 so named bec-~u~~- -it~:;~~- first de~lsed ·a~d emplOyed ·i~ m~saage~· transmitted
by a system of 'semaphore signaling in praatical usage in Europe before the
electrical telegraph was invented.
REF ID:A56930
.... ~.' .;
- 13.r. _ .
'• The,_.next·. fiv:e l,ett~r~; .are .i:nscz:ibecf ~n t_he· _secop.d. li.ne Qf: ·the. diagram in t·he
~ctions. indi.cated . .by.
. .
the:. pernutation
. ' . .above
., . .and . at the ..left of ·the l~ne. Thus:
.. .
. .·Permutation. , . .,
I 2
2 3 l 5 4 1-- -- - - _......_____
18 c
3 l
.....,.,..;.;_.;;;_..,...
R
__................._.5____
M 0
4: --+------.. .
i---------p.----:...-·~--+--~--------1-------------+----~------+---~------t
II.·3:2· 5 1._., 4---- 3 2
.....: - - - - ..-i - - -...
5 .. .1, 4
.N····, · ·., ll! •. . · r .. M ......--.. .. D ).~
ill
·' . .
,.
·' ·, ..... .. . .••
T.hia. process is co.ntin.ued for ea:ch· .line and for as many li~e13 as there are .
permutations indicated at t_he lef.t.•. In th~: foregoing ~ase, atter twenty let ..
ters have been inserted, one inserts a second set of five letters again on
the first line,- placing. the· lett43rs ·of this second set inrnediately to the
right Of those of the flrst set, respectively in keymimber order •. The suc-
ceeding lines are treated in similar fashion until the whole message has
been enciphered. The following example Will illustrate the process:
Enciphering diagram:
Permutation
.. · . 2. : 3 1 5 .. 4
2 3·1 5'4
EASE OM CTIDMA RC OTRM MO I E C D OITBEN
3 • 2 5 l· 4
3 2 5 l •4
NOSRPS ESNOMO A n U T l' T MlTOFOP DFMBAT
l 5 3 2 4
1 5 3 2 4 TESWYO
SLSTNR OBBLHO IWTEC1'1: N'AEFAR
4 3 . 1 5 2
4 3 1 5 2
L N I R c B"', R o v1.-1 s c• FLU H .G 0 OPTDOD.,.. OOBAEW
Fig. 10 E.,
The letters of the· cipher text are taken from the diagram according to ·any
prearranged. route-, the·most sir.tple ·being te transcr!be the lines 01'· letters
in groups of fives, thus:
... 14 -
b. The foregoing method, when employed iu its most simple form, does
not yield cryptograms of even a moderate degree of seeurity; but if the method .
of inscription and transcription is varied and made more complex, th~ degree
of security may be increased quite noticeably. It is possible to use longer
permutations, based on sets of 6, 7; 8;- or 9 digits, but in every case the
:successive permutations must be prearranged as regnrds both the~p.exact.com
position and their order or arrangel!l8nt.in the diagralii •
.. ... 9. · Transposition methods usine ~pecial :figures. - a.
. ~ . .
.The method now
-.p .
to be descr;tbed ..i.s usef'ul only· in speci.al cases -where ·the correspondence is
res·tricted .to brief' communications. bet,LV"een a very lini tad· number of persons.
It is' necessary. :to agree in advance on certain partiaulars, as will be seen ...
tet the· message to be encipl).ered be the tolloWing·: .
'
FOUR TRANSPORTS 'Ul.L BE COMPLE!'ED BY END OF APRIL MID SIX MORE BY
El-ID OF JULY.
l!,
~ R~
\1J
____,,,_.../
J
(--+=-·
T.
-.-1
.. A
N R I E p
E E
.Jf+O
F I D ·M
DU
Fig. 11
.£• The next series is a modification of the preceding. The same message
will be employed, with a double•eross figure, five figures per line.
REF ID:A56930
- 15 ·~
,. . •. ! ;.[!.::•'\,•.
0 u D O
F-++-R ·n++--F
N·11·'r. I+t--·-A
, ...
' '
A R R p
A N R E .
L
M
# I
x I
·-
-D 0-+f-:-B
s D ·-+-1---·
N Ji;
y·
y
Cryptogram:
"
0 U !' 0 L BET D 0 FRSRL E L E N F i:' T I. T p: -- C_~E- D I A
··::' •· ;,
·.;::! ·.
: . . .: . .. . ~
.. . , '. r ~·-.: ,
.·. ',••.,
·:Fi·g~ ·l~ .- ... ;, . · -
:···· ..:· ...
· .. ,
• :.. I : :' .
F N'··.
N~-0
A
R
·-·U
-·R
.:t·st·-
tr---'.. ···---D
·p "> - F
·' .;.:_ o
I
. T A.
r -1 ·r ', '
·.! . • .
~:.
I
i--:· :':" ::g~~:-r~:: .-.
D·. _. E,. _---·B Y... ·...:u ·. ~ .
's . . . , y· L .
.: 1.·
. Crypt(lgram: : ';.;
. ·, .. ':,·· .
_ ..F St L N ,ltO I P P "L E E I D. A. U Vl 0 M BYTRO R:R SR 0
.. ·."."'-~ .. .. ~
YL
Fig. 13
- 15· ...
.!• A figure of' different form than~ the p:eceding forms the basis of
.the next type.
0 A 0 D F R I Y
Crypt.?gram:
OOEDR TOYR7 PllrLE FPBEU RCBTS HEAIL
D S L T .F IT R ,0 P S B J" I X E L 0 A 0 D A DE F R I Y UL M
NY
Fig. 14
f. Frora the foreeoing examples, it is obvious that many other figures
may be used for effecting transpositions of this kind, such as stars of vary-
ing numbers of points, polygons ']f various symmetrical shapes, etc. It is
merely necessary to ·agr~~ upon the figures, the number of fig1,1res per line,
the ·starting points of the inscripti<'.'n and transcription processes.
SECTIOIT III.
POLYP.HA.SE TRAPSPOSITIOI: SYSTEHS
Paragraph
PolYPhase transposition rrBthods in general ••••••••••••••••••••• 10
True and false polyphase transpositions ......................... 11
True double transposition •••••••••••••••••••••••••••••••• • • • • •.• 1·2
- 17 -
b. It is obvious that a polyphase transposition method may involve
2, 3, ••• successive transpositions of t~e letters of the plain text. To
describe these methods in ceneral terms, one may indicate that·the letters
resulting: from a first transposition, dr;- iGnoted as th.e T-1 transposition,
form the basis of a second, or T-2 transposition. If the pr~eess· is con-
tinued, there may be T-3, T-4 ••• · transp;'~itions, and each may involve the
use of a geometric figure or design. Fe convenience, the design involved
in a·ccomplishing the T-1 transposi•,ion ,lr.K. / be designated ·as the D-1 design;
that involved in accomplishing the T-2 tJansposition as the D-2 design, etc.
However, it-.. maY. as well be st1:1ted at this point that, so far as ·military
cryptography.. is concerned,· methods which involve more than D-2 :and T-2 ·
elements are ·entirely impreetical and .:>f'ten those ·which ·involve ·no more.. than
D-2 and T-2- eiernent s are alsQ· -.ir~ract ical for such :.ueie • · ·. · '. · ..... ; ... :-- : ·~
. .. .. . . ·• . . ... .. . . . . ..'
·~· ~. . ;
Cryptogram (T-l):
EL I R I . V M .T D D I M lT H N A I 0 I P LA 0 T 0 RN F V M"
DLTUS EUOIU
Fig. J..5
REF ID:A56930 ·----------.--·-· ·-·----··-·-·-··
...
- 18 -
Cryptogram· {T-2):
U:'lTSL I~OUU
Fig. 16
.2.• The ·foregoing, however,· is not a case o::t' true polyphase. or so•called
double transposition. The same final result may be accomplished in a way
which will at first gl.ance appear quite different, but is in reality one that
accomplishes the same two operations by combining them in one operation .... Let
the message be inscribed as bef'ore, but this time with both numerical keys
ap~lied to the top and side of the rectanele. Then let another rectangle of
the same dimensions, but with numbers in straic;ht sequence instead of key~
number sequence, be set alo~_gside it. Thus: ·
7 1 5 3 .2 8 6 4 l 2 3 4 5 ·6 7 8
2 D E L I v E R A 1
5 L L A M u u 1r I 2
3 T I 0 ?! T 0 F 0 3
1 u R T H D I v I 4
4 s I 0 N D u M p 5. I
D-1 D-2
':1J'ig. 17
Each letter in D-1 is now transferred to that cell in D-2 which is indicated
by the row and column indicators of th3 letter in D-1. For:exa~le, the
first letter, D, of D-1, has the indicators 2 - 7 and it is placed in the
2 - 7 call in D-Z: · the ~econd ·,1stt·::r. of 0.:.1, · \1hich is· E, is :placed in the
2 - 1 cell of D-2, and so on. The fi;.1al result is as f'oll0i7S:
REF ID:A56930
- 19 -
----
7 1 5 3
2 D 3 L I
2· 8
V :: R A
6 4
1 --:la 2
D
3 4
H: I T
5 6
v u
7 8
I
,.· 5 _b,_ .L A M 1~ U l'f I 2 E v I A L R D E
3TIOET O F O 3 I T l~ 0 0 F T 0
1 U R T H D I V I· 4 I D !:T p 0 -.!.i- s u
4,§_I ON D u M ? ·-- 5 L M 11 I A lT L u
·--·--
D-1 D-2
Fig. 18 ·.
It will be seen that if the columns of D·Z are now read downwards in straight
order from le:f1; to right the final cryptog·r·am. is identi'cal with ·that obtained
·under B_ abOTe :· ...3· E I I. L. · D V. T_ :J :P~ et.Q. ..
. . . .. . ..
d~" · The fore:;oins cipher: often calied the ·:Tihilist"Cf:ptie~, is referred
'to in-some Of. the oldet iiter~tµJ;"~ a~.a double'trans~Osi~ion Ci?hsr be~ause
it involv;;;s a tranS}los~ti·on of both colu.,:,ri1s aud rows; and indeed as ,described.
under sub;_Jaracra_;;,h- ]?_ aboY"e, it see:..1:!3. ~o involve a double process~ It. ~ s, ·
however, not an: exanl.yle of true. dp'!-1.ble translJO!:lition. ·7ha11 the _;:J.eehanism of:
this ciph:ir is corn)8re·a .irl. th that ao~1. to b~· de19cribed, the; great:· difference
in the crY!)togra~Jhic security of the two ~1E.thods will" becoine a:;n1?r9i1t. · ... : . '
----------------~----.---
S:'i:CTI_ON IV. . ..
::···:
Parac;ra:ph
True double transposition of the columnar type •••••••••·.••••••••••• 13
General remarks on '!!rue :pol~rphase trans::;iosi tion •••• ••............. 14
- 20 -
The first, or D-1, recta11c:;le is inscribed in the usual manner -or· s im)le num-
erical· !tey colum.10.r tr;'lnS,!)Osition. It is shown as D-1 in the accompanying
figure. ..The letters
. - -----
of' the T-1 trans~osition are then inscribed in the second .·-··~--...._ ____ _
4--7-12--3-11--8--1-13--5-10--9--Z--6 4--7-12--3-11--8--1-13--5-10--9--2--6
0 u R A T T A c Tr
.LI.. s L 0 -7 A r: N' D G 0 p l~ 0 T u T N
u "T
- u
...!.
F
N
H
G
I L
?
L
I
0
N'
H E
]' ::.1
T
0
H
..
0 u s
T 0 H
- ·-
n· y .·-- s ---·
s _q_ --
u -·- ._H"
.
-·
A 1'T
E A s ·T
A
0
R
F
D'
G 0 ·- ,___ L D .E
T
-··
---
E v --
L ·E s ro: u ~-
- - ·---
I L T 0 'P R E ~-
"
p R p T
S' T
0 R c E
0
I.:
i.
Jo.~
E F T
R E .E N F
-
·-
-·-· - --
D-1 D-2
Fig •. 19-!,
or D-2, rectangle in th~ normal manner of writing, that is, from left to right
and :f'rom the top downwards. This is sho\nl in D-2 of Fig. 19-a for the first
'two columns of D-1. (in n'Uillerical ke~r ora.er) after transfer· of-their letters
into D-2 •. The letters of' the rernainia::; columns of D-1 are transferred in the
same manner into D-2, yielding the. folloWi~g rectangle=
4--7-12--3-11--8--1-13--5-10--9--2--6
A N' N D G 0 p N 0 T u T N
u N A u L y T E E R 0 I F
A E I s 0 K R T s L R R w
0 s· H .. v E F u N H N A L T
R T I 0 R F T H E L w 6- u
I'" t' f • t • o "' .. •·\ E Q. E s 0 H 0 D E E T. ...'!) L
A 0 s 0 H R G I D s L ...'!) c
c F E s 0 :? T T
Fig. 19-:~
·For the T-2 text the .letters are transcribed from the D-2 ·rectangle, reading
down the colu;:;m,s in keynumber order, anc1 grouping the letters . in fives. · The
· crY!>togram is as i'olloll's:
PT RUT 0 GTT I RL 0 -
ti "".)
... DUS VO s OSAU A OREA
c 03 SH EE DEF .J TU L c H lT E ST Q, 0 F 0 Y' 'K FF HR
-· ........
PU ORA E' TLTE LHL:Z:S .G L 0 :;] R 0 U 0-lT A ·. I H I E S
EI! E TH l!i !) I T "
REF ID:A56930
_; .
..2.• In FS°rag:da:pb. 28. of ..Sp~c i al: Text Ho~ l.6S a~ variation .of th~· 'simple
.c().iunmar key meih~id ot trilnsposi tion Vias described. If' {he pl'o.cess' ·therein
i:Q'.dicat;e'd ·is ~epeated, double trapsposition:.is ef'f'ecte~. The f'olio\iring ex-
ample .·will ·s~rve .'\i.~ .. illustra.t13' tb,e method; usinG t.he' ;same ne sa~ge' and: key
as were.·used in. the ·paraj;ra:ph to which r~:f'e-rence .was .JBde: . . .
... •. .. . ~ . . . ; ·,· . •. ; .i . . . . • ·.• .~ .
Me$saae.:.
.. _RE;QuEsT
. '!1.!t'..'.!EDIAT:;i:
.
ro:EL-r:li'q:RC$i;:rrm;rrs··
... .
,.
:.; .. ..
. Keyword~. · ·, · .: .Pa 0 n· ·u 0 .T:: ··.
i:li3ri ved numerical· key·:; .4-5..-3-2..;.7-1~6 .. ··. t.
• • I '' • • ' •
.. . . i} .
. I ·.,'.
. ..
-
Orypi;9gram~
.. : .
•. ';. . ~ . .
1 •.•.
E :Er':E EE' :R·E F.1\f"n .·T A·S ~ ''l' s_:E: ·i'·Q o". T jJ_E IR
DUCMN ·. ' • =~
.......
d. In some resuects .'this modified •nethod is sinroler for the noYice to
perform correctly th~ is that eniploying rectancles. Ex:ierience has shown
t~· ·many 5.Il;e:x:p3rt cryptographic clerks fail to perform the two transpositions
cdrrectly.when 'D~l·an-d.D-.2 recta11f;les are employed in the work.
:·: .~ •~4.. ·. -~~j;-al ·~~~~k~ .·o~: ~r~ :;ol~pb~~e tran-si)ositi'on •. - a. The crypto-
~':i;m·i-0• .&e.~r·i~y. o:t'. ·the. t;rµ_e.·. double transp9~i:Hon· method deserves discussion.
qare'~'l.11. .sif~(ly.'of lf, c:r:typtogr:B:l~ en'cipl:iered. by the' "double transposition method
!3et · tcrth. ~n: pa:&~sra19hs .l3b arid. c, wHl convince the student that an extremely
thorough .scrambling·9t th~-letters is indeed.brought about by the method.
:Basi·call.Y, .its priooipl.e i53 the' spl-itting up .Pt. the adjacent or successive
leiite:i:s .qq11~t:~tutinG ·the pl~in' 't'ext by. .t.w:o _sets'. ot "cuts", the second ot which
. is in a direction that is perpendicU:l87'." to the _f'irst, with the individual
"cuts" o;t both ,se~.s arranged in a variable and ·irregular order. It is well
adapted -tor. a regular" and volu..."D.i,nous exchange cryptograms between corres- ot
'~ndents, because everi if. nBny ;msa·o.ges iii the_ uame l.m!r are intercepted, ,!!2.
long as n~ two messages ~ ident~l,.J.n length, they can only be crypt-
analyzed after considerable effort.I"· ··
.]... .Triple and quadIUple transpositions, of the sa;.ne nature are possible
but not practical ·ror. seriQus usage. · The.oretically, a continuation or repeti-
tion otthe transi>osition :proc·ess· will ultimately bring about a condition
wherein the n.n rectangle is iden'I; ical with t;he D-1 rect&"l.3le; in other words,
after a certain. nuz.1.her o.t tr:ms:positions ·the.. rectan(;le produced by a repeti-
. · tion. o;e ~?-~ crn>td§ra"ohing :J.rocess. resul t'fl' f.inall.Y in ~Y:-?togravhing the
message. Exactly ho.w J"Jl8D.Y' repetitive transpositions intervene in such cases
is extremely variable and ·a:e!>ends· u:9-0n. :factors· 1yit13 outside the scope ot this
text.
~-----~--------------------·---------------- ··--·-··----
·---··--···-·------ . ._.._._ ···-------·-------·--c---RE-F---I-B--:--A:S-6-9--3-0 _______________ __._.___ ,,. _. "·--· -------·
- 22 -
£.• In the exaa:?_)le ot cryptoc;rallhinc given in Par. 13-.2_, the D-1 and
D-2 rectangles ai:e identical in dimensions and identical numerical keys
··are applied to effect the T-1 and T~ tra:1apositions~· It is obvious_, how-
ever, that it is _not necessary to maintain these ·identities; D-1 &nd D-2
rectangles of' different dimensions may readily be employed, an~ even it it
is agreed to have the dimensions identical, the numerical keys :Cor the two
transpositions may be different. 1!'"\u"ther:~1ore, it is 3>0ssib-le to add other
variable elements. (l) The direction or manner of inscribing the letters
in the D-1 rectangle may be varied; (2) the direction of reading off or
taking the letters out of the D-1 rectan3le in effecting the T-1 trans-
position, that is, in transferring· them into t_he D-2 rectangle, may be
varied; (3) the direction of' inscribing these letters in the D-2· rectangle
may ba_"l.8.~ied; (4) the direction of reading off or takinB the letters out
of the n..:2 rectangle ·iri effecting the T-2 transposition ·.nay· be varied •.
Finally, one or more nulls may be inscribed at the end ot .. ei tP,.eJ:. the D-1
or the··_n-2 recta?l;'.f;le (but not both) in order that the total number of let-
ters involved in the two transpositions be different, a factor which still
further increases the degree of cry:ptogra9hi c security •
SJ:CTICl!" V •· ·
GRII..LZS
~aragraph
· Types of cryptographic ·gril.:)..es ••••• , •.••••••••••••••••••••••• • • • • • 15
Simple grilles • ·••.•••..•• ~- •••••• ~- ~ .. • • • • . • • . • • . • . • . . . • . . . . . . . . • . . . . 16
·· · BEYVol ving grilles ••••••.•.•. ·.•..• -•.•• I!!• • • • • • • • • • • • • • • ·• • • • • • • • . ~.... 17
· . Grilles of other c;eorn.etric forms •••••••••••••• -. • • . • • • • • • • • • .• • • • • • . 18
· Polyphase tr.a:i_sposi tio11 by Grilles ••••••••••••••••••••••• ;. • • • • •.• • 19
Increas_in;:; security of revolving grilles ••••• .-~.. • • • • • • • • • • • • • • • •. 20
Const~ct ion of' revolvi~ crilles ............ ·••.. ·•••••••• ~. • • • • • • • • •.• 21
ifonper.torat~d crille 6: •••••••••· •.••• ~ .• •••.•••.• ~ •••••••.•.••••••••••••• 22
Rectangular or 1':Jost 'card 11 Grilles ••••••.•.••••••• ·•••• ·••••••••••••• 23
Construction of rectangUl.:ir or i 1post card' 1 grilles ••••••••••••••• 24
..•,
• '., 16~ Simple· grill~·s. ·. ..; ~.. These ~ortsist., usually of a ·squ~re in which
:ti61e·s or apertt1.rE:1. s·.b..~ve bqen :·9°ut ·in
prearraneed posit~o11.s·; when. the srtlie .
is sU.:perimposed 'upon the· grid, these apertures disc:l,6s,e eells on.'the Grid,.
in which cells l~tters, grou~)S oi' l6tt~rs·; SJllabie·s,,. or .~niti:t'e' words 1'.l13Y 'be
inscribed. A;.1 e:x:a..nple is shown in Fig. 20. The 'rour ·sides ·or the o'Jvers'e.
surface of the c;rille are desi.:;~1at3d by the i'i~res l, 2, 3, 4; t·he fQul,"
sides of the rev~rse surface, by the fiaures 5, 6, 7, 8. These ficures are
· . eliI.PJ.9ye ,d ~O. indicate_ t~e position .Of the c;rille upon the Sl'id il'i euci1)herment •
: .. .I'
l·
: Fig. 20
p_. (1) In cry:f)togra~hine;· a message the ~ill~, is !Jlaced .upon .the ,gr;id,
in one of' the.eiGht :possible ~Jositions: obvers_e surface up, with 'figure
1, 2, 3, or.. 4 at the to::i left; or reverse surfdce u9; with ticure 5~. s·, 7, or 6
at the· top .left. The lett Jrs of the :plai:.1 text ar~ then inscribed in the
cells disclosed by the a11·~rtl.L."es, follo11L1G any· :;>:,:·eorra11,S~d route. In fig. 21,
the nor-.i:lal raa...lJ?..c:;r of 1rriti:..1c, fror~ left to ri.:;;ht, ·and ·ftom the top downwards,
has been follm1ed in the 'inscription, '
the . ~,Jes$ase
.. . :b:ei11.;
.
ALL iTISTROY::RS OUTSIDE.
~
. ;' .
Fig. 21
- 24 -
(2) The -trm1scription pro·cess now follows. The cipher text is
written down., the letters being taken by following any prearranged route.,
which ll'D.lst De perpendicular to the route of inscriptiQn, otherwise the let·
ters ·will follow in plain-text order.. In the i'ollowil).g., the route is ·by
colunmei from:. left to rlght .•
Cry.pt ogram:
t R T. A D . T S S E R · Y 0 .I D S E L, 0 E U
(3) If the. number Of l~tters of the plain~text messa5e exceeds the
mpnber· of cells disclosed by one placement of the grille, the letters given
_by this placement are written down (in cryptographic order} and then .the
grille ls placed in the next posit io11 on a fresh· Grid·; the process is con-
tinued µi this mam1er until ·the entire message has been cryptographed. The
several sections of ·the cipher letters resulting ·from tlie placements o·r the 0
grille on sU.ccess1ve grids merely follow each other in the final cryptogram.
In this manner·of 'employroerit it is only necessary tor the correspondents to
agree upon the initial position of the 3l"ille and its successive positions
or placements.
,g,. It is obvious that by the use o:r a simple grille. the letters of a
msssage to be cryptographed lilBY ·be distributed within an enveloping nessqe
consisting mostly of 11 dwinyn text, inserted for pu...-nposes of enabling the
message to esca]:'e suppression in censorship. For examp_le, suppose the -grille
shown in Ftg. 20 is em.pl.oyed in position. l., and the message to be.conveyed is
.ALL DESTROYE.:."18 OUTSIDE:. The letters of this message are inscribed in their
proper places on 'the grid, exactly as.shown in Fig •.?l •. An "open" or disguis-
ing text is now to be composed., the latter serving as an envelope or "cover"
for the letters of tha secret text~ \Vhich remain in the :positions in which
they tall on the ~rid. The open or disguising text, in other words, is
built around or superLiiposed on the secret text. 1Iote how this is done in
~· 22, with an apparently innocent message readinc;:
I HA.VE rTORKED vzay ]ELL ALL DAY' THYTITG TO. GET EVERYTHING STRA.IGHl'EHED
UP BEFORE· GOil-TG OH MY if.5'..<T TRIP SGOT~, BOT lN3IDE TEr-r DA.¥S . • • •
11 '!:))
I H A v E w 0 R K E ~
e
D v ·E .R y ,W E L L A
L L D A y T R ....
"tr
I N
G T 0 G E T ·E v E R
y T H I H G s T R A
I G H T E :;:r E n· u p
B E F 0 R E G b I ?J
•.
G 0 M IJ y N ·E x T T
R I p s 0 u T H B u
T I N s I D E T E M
c.)~
.Fig,. 22
REF ID:A56930
- 25 -
a
-
b
The transcription may now follow any preal.-ranged route. The normal method of
reading would produce the cryptogram beginning W c T E H O E E R I, etc. It
is obvious that the correspondents must possess designs with identically num.-
bered cellsl.
17. RevolVing grilles. - e.. In this type of grille ( see Fig. 24-a)
the apertures are also f'ormad by-perforating e. sheet of cross-section paper
according to prearrangement, but these apertures are so distributed that
when the grille is turned four times successively through angles of 90° and
set in four grille positions on the_ grid, all the cells on the e;rid are dis-
closed in turn. (The preparation of' such grilles uill be discussed in Para-
graph 21.) · I1' letters are inserted in the cells ·so disc;Lcised, then after a
complete revolution of the grille every one of the cells of' the grid will
contain a
le.tter a11c1 thua. the Grid \Till be conrpletely filled, For this
reason such a gr~lle is also called a selt'-fillin;;z, or an ~~-~:_completion
grille. The secrecy of messages e:::iciphered by its means is dependent upon
the distribution. or position of the apertures, the sequence of' grille posi-
tions on the grid, (i.e., whether in the order 1, 2, 3, 4 clockwise; .or l,
3, 4, 2 etc.) and the route followed in inscribing and transcribing the let-
ters in the cells of the G'l'id. For each position of the grille one-fourth
the total number of letters of' the text is inscribed; hence it is convenient
to refer to 11 sectionsa of the text, it being understood that each section
consists of one-fourth the total number of' letters.
.;. 26 "'."
.Q.• · ·Taking the simplest manner. of inscribing the letters, that is, from
l~ft to Tigh.t and from the top downwards, the letter.a of the first section o-f
)he text are ·inscribed in the cells disclosed by the apertures, the grille ·
b.eing in the first position.. This is shown in Fig. 24-'b. The grille' ls then
given 1/4 turn clocltwis~, bringing figure 2 to the top left. If the grille
has been co·rrec·tly prepared none of the .cells disclo.sed in the second grille
position on ·the grid.will be occupied by a letter. The letters of the second
section are then inscribed, this being shown in Fig•. 24-:-.Q.· In Fig. 24-g and
!· the.~~~~~ ~:f .11;1scribing the'· third and fourth sections, re&pectively, 8.1'6·.
ahown. TJ:,ie letters of. the cryptogram are then tBken out of· the completed gxoici ·
by following .8.llY' prearranged ·route· of transcription. · ·!{'he cryptogram below· bas
been tr~sc.ril:>.ed by foliow1ng down the. columns in .. suc_ces~.ion from left to right.
.. : .. ;,..• .T T .
REF ID:A56930
- 27 -
4
E. y .E E Cry::Qtogram:
.L H: R
\1 E.· B VJ
• ... :' .~ ·.
-
.R }
'
u .o.. s ·N s· N D T LRI c· v
'
y ·a- o-:o T ..•' ~'1 I ·L H N
.,, .
I- L R
""D T· s :!;!l 0 F A ~-
c H T E F A I 0 u..
··F s0 l~1 T HURT I T c UL 0
R s c·· l!i F. A 1· H H 0
,• E SEA T .: 0 I D·T:L .y N O· I.N
0 0 u. v R s. D E s s
AH EA H· ED lt 0 T. ·. If HS.H H
M .L u A .H :a.
I
0 Tui :E: ·T
T T 0 I u s L H I-I E E TA MI y 0 SRE
.. . .e
vinz
• • •• o• •.I • ' :. I
. ..
- 26 - -,
the ene~. .For example, a message of 64 letters indicates a grille 8x8. with
16 apertures; one of 144 letters, a grille 12xl2 with 3& apertures, and- so on.
There ere, hooever, :qiethod s of employing a grille so that. it will serve to -
enc ipher··:;,ne ssages the lengths af' \1hich are greater or less than the ca:paci ty
ot the Grille •
.k· ~-.'hen the total number oi' letters is less tha:i;i tm capacity of the·
grille, no modification in ;mthod of use is nscessary. .Encipherrnent ot such
a message comes to a close when the last plain-text letter has been inscribed.
In· decry:ptogra:phin13 ruch a ;ressae;e, the recipient must strike out, on the grid
upon which he is to insc:-... ibe the cipher text, a number of' cells corresponding
1
to the difference between the number Of' letters of' the text as received ·end
the total capacity af' the bl'ille. _The locatioi1 C1£ ·the cells to be thus eli-
minated il1Ust be prearranged, and it is best usueill~r to strike them off from
the final positions of the grid. -
.2.• _ Uhen the total number af' letters is equal to or greater than the
capacity of the grille, a gr.id af' GI"eater capacity than that ot the grille
can be ];Il:'epared, on which the grille may be positioned several times, thus
forming a: large --or composite grid composed· by the juxtaposition of' the sev...
era:L' EID.all grids. It there are a few cells· in excess of the actual number
require·d, t~ese may be struck off from the large grid at prearranged points,
for-example, from the lest column and row, as shown in Fig. 25-b. The
grille is then placed in its first position in turn on each of' the component
grids, t~en in its second :position, and so on. An example will serve to
illustrate. A message of fifty-two letters is to be enciphered with the
grille shown in Fig. 25~1!,, -the .capacity ot vll.ich is sixteen letters. The
llUlnber ot letters of the message being greater than three tiims sixteen,
the composite grid must be comp_osed of f'our small grids containing a total
ot siXty-tour celis. ',T.'heref'ore, t1velve o:r these ce~s ·must be eliminated.
These are shown in Fig. 2p-k.· together m. th the nu.."1'.lb er indi eating the posi-
t ions ocoupied by the letters of the te:;.."t.
15 29 1 30 19 33
42 2 16 43 46 6
17 44 31 18 21 47
3 32 4 45 7 35
25 38 11 39 22 36
50 12 26 51' 48 10
27 52 40 24 49
13 41 14
-a i
Fig. 25
REF ID:A56930
1 2 4· 5 1
9 1
3
2 3 4
Q
5
7
6
8
7
--19 --
2
8 ·7 l 2' :3 ·4 .5 l 2 3 .....
7 6 5 1. .2 3 i 2 3
-
4·
6· 5 4 3 ·1 1 2 3 4 5
. . .. . 5 4 3 2 I ·1 3 4 5 6·
4 3 2 1 3 2 1 .5 6 7
3 2 1 5 4 3 2 l· 7 8
°'
..... 2 1 7 6 5 4 3 2 ··1 9
1 9 8 ·7· 5· 5 4 3. 2 1
..
. Fig.:: 26-.!!,
+=' •.
Fig.. 26-.£.
-· 30 -
. ·· !• :·It. .t.he .. side of the grille is composed of an odd number o:r cells,
the -inner-J.UOflt -band will consist· c:r but ··oneccell. In sucll case this central
cell !llllst not be perforated~ · ··
- .. •';·
~· The direction of' .revolving the .::;rille can be .clockwise .or _counter-
a;tockwise, so that car.re spon,de:n.t s :in.lat make arrange:::en ts beforehand as to·
..:which direction is to be :tallowed. ·· ·
-a b ...
Fig.; 27
. ) .'· . . ' : ..
b. Note should be i.mde:· or· the ,fact that in· Fig. 27-b the distribution
Of 'crosses shown.. in the third· l'i)V( ·~ i cells is the reverse Of that shdwn ·in
the i'irst; too.distribution shown in'.the i'ourth row is the reverse 01' that
shown in the '¢econd. This rule is a~:plicable to 81.~ revolviiig grilles and
is of ir.iportance in ~olution.
~ ;
:e·. ··-·ri'the letters of the text are now inscribed {nor-.uai manner ot
m-it tiig')':r;n the cells not eliain.ated: by crosses, and the letters trans-
cribed f'rom
COlllilD.1.S to form t:h~- hfy}?togram, . the rerults are the sarJ:ie ·as
though a perforated gri_U~ haa·Qtien employed.· Thus:
E W C R A E 0 L D A R D D A T Y
·CrY!Jt ogram:
... ..
E \if C R A E 0 L '.D. A . : R D D A T Y
Fi:;.,27-.£_
!• In Fig. 27-c it is not~d 1ih~t there are 1;-iany -c~lls thi:r\; -~ight be
occupied by letters but are not.. It· is
obvious that 'these iray be .. tilled
with nulls so that the grid is camvletely fi_lled rd th le.tte~s. Long messages
may be enciphered by the superposition of sever0.i. .d.iagi:-a1-ila.
sions as Fig. 27-£.. · . .· · -
·°'f
thf!) same"·dµaen ..
.·
(£9)1£ 3(35)
]2_. One of the ways in which
such a grille may be used is to I I
urite the :first letter of the text (89)0£
t(36 )'
at the extreme left of the cell
disclosed by aperture 1, the sec- (19)68 . . i5(37 >I
ond letter, at the extre:;1e loft of
the cell disclosed by apsrture 2, t(38)1 . (09)88
and so on. The grille is retained
(69)t.a 7(39)
in the same position and the-17th
letter is written ir.IJlilediately to I ·I
8(40) (99) 9g
the richt of the 1st, the 18th im-
:::nediate:cy to the right of· the 2na, I I
{l.9)98 9(41}
and so on. Depend.ins uuon the
Width Of the apertUre, ~nd thus of. 1
(!99)va 10(42)
the cells disclosed on the .~rid,
2, 3, 4 ••• letters 1na~r be in- I I-·
serted in these cells• .!hen all ·
ll(43) (99)£2
the cells hava been filled, the
srille maJr then be placed i?t the
..· c 1v9)g~:l 12(44)
second position, then the third, I I
. 13(45) {£9)ta
and finally, the fourth.
1
14(46) cz9)ogl
.£• Another way in which
the grille .JJB.Y be used is to 1 1
change the position of the grille c19)6t 15 (47}
after the 15th letter bas been 1
inserted, then after the 32nd,
('oo)at 16(48)
4Bth and 64th; the 65th letter 1
is then inserted to the right of csv)l)
the 1st, the Slst, to the rigQ.t {v) ·. g
of the 17th, and so on until the
grid is completed. Fig. 28
~· The· text .of the grid may ba transcribed (to form the crYI>tOgram) by
following any prearranc;ed route. ... ~
REF ID:A56930
. .. ·~ ~3 -
7B-3\\•
\ .
Band 2
-
.
. . :
_-
:
--
la
--
2a
3a
9a
lOa
lla
17a· 17c
l8a l8c
l9a l9c
lOc
llc. ·
9c le
-2c
3c -
. I
Fig. 29
In FiB. 29-c is shown a grille-- as finally prepared, the nonshaded cells rep-
resenting apertures.
-------· -- ----~-------------
.. -·-·-·----·---·····-~---~--- ........ J...._. · - - - - - - · · - · ··---------·· •..... n"Cl'F ID· A569~·Q_
-·--·--·~-· ··-··-· . •. .. ~ ·----- ·······--· .. ···-·f·· ....
34
Fie. 29-~
Jl.. The :roregoin;:; grille is a ;'six-colunm~' 011e, that is, the cells
form six colu;.uns. It is obvious that crilles with any even number of ·
columns of cells are possible. The nllinbsr of apertures in e~ch band should
be equai··:and· tl:iiS- nuraber ;nUltiplied by the nu.aber of bands and theJ:l py 4
should equal. the ca:p:ici t~r bi' the grills• In the case Of the one shown· in·_
Fig. 29-c the capacity is 8 x 3 x 4 or 96 cells; this is the same as is ob-
tained merely by ruu.lti~lyin[;' the- l"!eiGht (in cells) by the llUiilber Of c_ol-~~
16 x 6 =
96·.- If 4 letters are inscribed in e:::ichrectangle,-the cap~city-of· -
the grille in ten;is of lett~rs is 384. The @•iii in this .case_ wouJ,,d,_ ai't_er -
completion, -~Jresent 24 ·col\.u.;m.s of' lett,n·s, to which a numerical lcey for a
second tran&"Po sition can be a:p9liec in transcri:Jtion to :p1>0duce the final
text or the c1\12tocrr.riJ..
a~CTION VI.
Paragraph
Complex· route trai1s::_;,osition ••••••••••••••••••••• ~ ••••••••••••• 25
Transposition Of groups Of letters, syllables, and words •••~•• 26
Disguised trans:1osition ;·-iethods •••••••••••••••••••••••••••• ••. 27
Cipher "na.chines for effecting trans)Osition ••••••••••••••••••• 28
.
. .;: ·:.· ·.
..
.:- .·.
. ..
.·:,·
27. Dtpguj,~;~: ~~tlii~~sH~9n.' ;.ie~iioii~ •. .:: :.!.. . ·.Th~.. aY'stom. c>tten en~Ount~red
in romances and J.ilY"Ster-; stories, wherein the messace to be conveyed is in~
··serted i:D:·a series of nonsignif'i·cant.· worP,s co:p.st.ructed--witb the .. ;purpose ot
. 8Voidiiig ·.or.. EtV8d"in3 ~piC•iOn, · 1s. a; &pecfes Of' ..thi~ form: ·0.f "Ope:p.~ 1 ci-n>to.-.
/3ram involving transposition •. '1!he~1 opell"· or:~nveloping, · amiaren~l.y i:p.nocent
text may be desir'1ated as· the: e.xternaJ. :ta:AJ;; .the. S!=l.cr.et · o;-.. cryptographic text
ne.y· be ·desianatea ·-as· the. intern.al text.... A. oompl_icated. e:lca:;nple · e>f' ·.external or
open and internal. or. seer.et text; is· iiiat ·.shown .. i~· -Pa+asr~p;b. l~.•· .
.· .
· <J!.. · Little need 1,-e said ·of the .method based .upon. con~t;ructill(S .external
text the letters of' which, at prearranged positions p-r: inter:v~ls~ ~pell out
----------.-----------------------·-.-----·-------
·---···------·--~-----""'RE~F.__..._.IDW'-..L.:.:i!:!A5~6!!_,,9!.:!3~0~-----------
- 36 -
the internal. text. For example, it may be prearranged that every fourth
letter or the external text forms the series of letters for spelling out
the internal text, so that only the 4th, 8th, 12th ••• letters 01' the ex-
ternal text are significant. The same rule may ap:ply to the complete words
of the external text, the ~ 2!!_, ~'.9.' • • • words form the internal te~. · ?1e
preparation of the external text in a suitable form to escape suspicion,!:.!
not so easy as might be i;nagi~, when, efficient, experienced, and vi~ilant
censorship is at work. Often the para[;l'aph or passage cont~ining the secret
text is sandwiched in between other paragraphs added to pad the letter as a
whole with text suitable to form introductory end closing matter to help
allay suspicion as to the presence of secret, hidden text.
B• SUBSTITurIOH SYSTE!::S
SECTION VII. .
POLYGRAP.HIC 'S'!STID£
Paragraph
Preliminary remarks ••••••••••••••••••••••••••••••••••••••••••••• 29
Monogra:phic and polygra:phic substitution •••••••••••••••••••••••• 30
Polygraphic substitution by means of tables ••••••••••••••••••••• 31
29. Preliminary remarks. - a. It is assumed that the student has· ab-
sorbed the infor-illation contained in Sections VII - VIII, inclusive of Special
Text No. 165, Elementary 1iilitary Cryptography. These sections deal with the
various types of cipher alphabets, simple monoe.l.phabetic substitution, mono-
alphabetic substitution with variants, the more simple varieties of poly-
alphabetic substitution, cipher disks and cipher tables. The present study
of substitution is a continuation of the former, a thorough understanding of
which is a requisite to the examination of the m.ore complex types of substi-
tution now to be set forth.
... ·-~-37 ·~
•. :tha,~~ts o:t: .the "j;llain text arid those :of the cipher text; no. mat;ter)Jll,e:t;l},er·
... _t~~ ~~ostitutiori 'is monoalphabetic or ,pol~ral:phabe..t~c in ch.eracter. .Ill .pol.y-
. · 'lJ:t~'rs.l''methqds; haWever, ··1;hi.s "one-to-one" c<;>rrespondence no longer holds:.
a·:·coml:linat:i,on of. twQ lettei.. s, or of two figur~s, or ·of a letter and a· figure,
; ~ represe:t;t:li a .single J,.etter. Of the plain text; •tllere· :is here ·a :rtwo•t0'."'0ll8 91
. · corres:poi:ia.Eirice; two ·characters of ·the ci~her text representing one of, t,~e
plain·. teXt. 'l'he method.a described- under'.'.Section X pf. Special T~xt .No:.. :165,.
EI~riientary 1ttlitary Cry:9tography, faU u11der the latter designat~~h; the ci-
pher· aquivalen;ts there shown are, properly speaking,' bipartite i:n.··ch~acte~ .•
Tripartite c.ipher.. equivaien1;s are also encmintered. Polyli.tara)..,~t.ho.ds·~
therefo~e, .are said. to emp~oy J?OllJ!artite "alpha~_!!~ Of \vl:iich the bipart'fte
type is· by .far -the most co1mnon. ·Further on in this text·, polyliteral methods
ot :greater coi_i1ple:x:ity·than those· illustrated in Sectiq~ X .of $:Qecial Text
No. 165 will-be disc\'issed' · A:ttention now will be .directed m0re .-p~rticuliµ-ly
,.... · ~'t<;) a. d.1=f:feren:t'tY.9e o'ir substitution designa:ted as :rnoriographic and p_olygraphic
.. SU'b S tit Ut'•. 1on. · . . · : , · · · ·. · . . -.. . ..· .. . . . ..
·.
.'
30. Monographic and :polygraphic substitution.·-· a. :ill the ·metltods
of substit'l:ltion ·heretofore described are monographic in-nature, that is, in
the ·e:n.ciph~ring· proeass··the indiviaua1··imits subjected to treat~nil ar,~
sl.ngl:e letter~; there 1s a letter•for.;..letter substitutio~., or. to include,,
-~\J,merical 'and symbol ri:ethods,. there is, as i~1 t]+e case of mo.noliter~ sub-
stitutiO.n., • 8, 71 0lle-t0-.0Il~ 71 C0l'l'eSpOn~e:)lC0 between Ulli ts qf the plain t~xt alld
tp.Ose of:,the cipher ·text •.. In polygr~phic ~ubstitution, however, co:m01nations
o:t letters: of th~.plain."1;:ext'*; consi'dered as 1Iidivi~ible< conif>ounds,: constitute
the_ upJts_ -.t:or t:rea_·fa~n~ ;'~n' :ei;ici:phe~rne_nt. ·If· the' units consist of pairs of
~ plai~-text. letters, the enciphermant is ·pair-for-pair, and.is said to be :
dig:i:-aphia in ·character.;· if the units ,consist o'f sets of three.,le:tters, it is
trigraphicr ·'in ~haract·er,: and so on;.. ·· Th~re is stil;L a. 7'on~-to-one 11 _ C!'.>rres-.
ponden~e'· involved, but. tp;e ':lD-~ tljl. in these cases are. composite in character
and .the individual e:t.e.ll.ents cQ.ruposing the units affect the,- cipher equivalents
J_ointly,ratl:ier tll.~n separatel:r. Tile·b.asi'c import-antd'a-0tor i~·.true'poly-
.. .graphic. sub'stitutfon is t.hat all the letters· Of· the .g~oup _pa~i;ici:pate in the
determinaiioo~or·the.. cipher equivalent of the group; th~ .iP.~il:t.ity o:t.: ~
letter of the plain-te:;ct grpup· affects t,he .. Qo~osition of. the wh-Ole oipher
group. Thus, in a certafo digra!)hic system~- may be enci:phered: as 'XPc,
and ACp_. on ~he ot!ier hand, may be enciphered as NKc; a diff'erenoe in the
· ;I.'denti~y ·of..eui _bne . ,o:f the: letters of the.plain ....text pair.here prod:uces a
difference iii .the identity of: both letter:;> of the.· .oipher ·;aif'.• ·
. .. . . . ~
>
:. "_:. ·. -b--~ ]br'_pr~c.tical. ~sag~' polygrephic' 5ucrstitut'i.on is limited to the '
. himdl.ing ·or .digraphs arid ·t.~i;il.•apl:i.s', although ·very< ·occa'siohally groups ·ct
'nnra-·tha:Q." tlire-e' letters' mia~r· b'e employed £-or. ~~e'ial_; purposes·. .''
.. · ·- : .. .,; . . .
~ ·: .' •.
. ..
. ·~.:~· :.'·~ .:~.: . ~~-·-: ·.· ...
,•·; ....
__
··" :· ~~.: · ':e'.h~. furµ'l.amenta1· purpqse or. p9lycraphic ~:ubsti ~tion is -~he".sup
pression or rather the elimination of the frequency ~haracteristics·ot
ordinary plain text. It is these frequency characteri sties which lead,
sooner or later, to the solution of practically all substitution ciphers.
When the substitution involves only individual letters in a monoalpb.Abetic
-------------- ~---------------------~r-rrr:A56"93
- ~ 36. -
,. .
·-sY'stem, th"e.-cryptogram can be solved very qu1'?19.Y; _whe,n. it u;,volves individ-
-. :Uai lett·ers i'n a: polyalphabetic systei:n, ..the. ccyptogram _can u~ually be. sol~ed,
_ .b~t· only. ~fter a much longer t~e and !Ill.lch more study~ depending upon the
: ~oniple:l!:ity -Of _the method. The basic
principle - in the solution, -however, is
_.to .reduce t:Q.e polyalphabetic text to 'the terms
ot mOnQalphabetic ciphers and
theri·to solve··the latter. In true polygraphic -substitution-on the-_other
hru;ld 1 _the solution does not rest upon the l~tter ba~i~ at aJ.+-because .it is
·not a· ;qµe~tj_on of' ·breaking up a complex text into simpler elen:ents; -it rests,
.- as a rule, u:pon the possibility of an3lysis on the basis of the frequency of'
tl;le poly§r!E;h-ic units -concerned. Ii' the substitution. is digraphic, then the
~its are-pairs of letters and the no:riaal. :frequencies of' plain-t~xt pairs
become Of first consideration; if the substitution is trigraphic·, the un.its
.are .sets of three ietters and the no:rmal frequencies of pla:in-text trigraphs
. _ are inyolved. - In the last two cases the data that· can be -em.ployed in the
solution are meagre; ·and are f'ar' from definite or unvarying in the'ir signif-
icance, and that is tlhy solution or polygraphic substitution ciphers is often
extremely d1t'tic\llt •. _
.·
REF ID:A56930
- 39 -
·Table 1,
(Showing only a partialiy filled table. j ·
F AG !AZ .AA1 F
. .
3 N N
~ ~ ii A· B.
t "! l C D
AC]
E· · F. G
til_t~l A;1 r~J~f:ADlJ ~
R I· X· K X Y Z
_ k!... ·The :ro,:-egoi~- tabie is rec:fa?rocal in nature; that. is, Up : YG0 and
YG:p : AFc• T;b.us, a .. si~le table· s~rves i'or ·enciphering as. uell as for de-
ciphe-ri:hg. The t70rd DEFEND uould be enciphered as YA NZ CY, and. then· grouped
,in fives:· YANZC .y: .~·. ~ •. When· a final sin:;le letters oc,curs, a null is added
in order to make a pair of' ~tters capable of being enciphered by the method •
. Reciprocity ii,;," horrever, not an
essential factor ·and for greater security .
il.Gnreciprooal tables ar_,·more advisable. In W:ch. cases an enciphering table
lml.st ·have . 1 ts complementarJ ,O.eciphering table.
c.. Until the amount of te)ct; e.nciphe1.. ed by l'E.ilnS o~ such a table becomes
greatenough to disclose the cipher equivalents or the most frequently used
digraJ?hs, such as EN.- ER,. RE, TH, ON; etc.,: cryptograms base.d U!)On "the tabJ.e
are relatively secure against solution. .
_£,. A ·simple· method for J:lreve:z'.i.t ins the· establishment of the ·frequencies
characterizing the~e comrt10nly used digraphs and thus eliminating the principal
basis for their ident if"icati o:ti is .:;i. ven in Paragraph 52-:~' Section ll. ·
. e. The :factor that contributes most to the relatively high degree of'
secur!'ty Of' the digraphic method described. in sub:paragraphs a a.lid b is the ab-
senc~ of' synmetr-.r in' th~ t~ble empl.oyed, ..for this table.. is canstrncted by ran-
dom ~ssign.i-n.ent -Of values. and ._sh<ms no S ~1Zil1Jletr~~ trh;atifoev'er j.a..i,ts' arrangement
0
.. c:>f". contents •. Hence, ·even .. i-f" -~·in ~-first -~~fie _o'!: ~ :: Ql.~ is identica1
.!!!.!!! e~ ln-. ~ second case, ;91~ i~ t.l).e. ~irst cas~ i~ uho_~ly~if'f"e!,!nt i'rom
Ql.~ in "th.e ·second case. . For eJfample, ;Table 1 s~on_s that ACP : XE 0 and
A!l 0 : Yfe ; the cipher resultants f"ail to give any hint that the plain-text
pa~rs contain an identical letter.
- 40 ·-
t.. If, however, the latter is not. the case and the table exhibits
syrmretry in its arrange:nent ot contents, solution is sOLlewhat racilitated.
Note the f'ollomng Table 2, for exai..'lple, 1n which two mixed sequences are
ell!l;>loyed to torm the cipher equivalents. One· mixed sequ:Ence is based U])On
the keYJ;>hrase WESTnroHOUSE AIR BRA.KE; the oth:er, upon the keyPhrase GENERAL
ELECTRIC COMPANY. The word FIRE ~ould be enciphered as KIQ,A..
Table· 2.•..
ff;··... :.·.· ·
AB CD ~-F G-H I ·J KL MN. 0 P ~RS~ UV V X Y Z
A WG EE SN TR IA. NL GO Hr OI. UO Af! RP BY XB CD DF FH JJ IX ~ :Ps· Q.U .VV XW .Y.X Z:Z.
Bm~™mn.~m·~m~~~u~oonmu~~~wn.n~m-:·
c SG TE m NR GA. m. oc UT AI RO BM KP CY. DB FD JF LH Mi PK QQ, ~. ;x:µ yv. ZW, me EZ
D TG IE NN GR HA. OL UC AT RI. BO ·rtM CP Di F.e· J-.o. LF. m
pJ- Q,K VQ, ~ YU ..zv EX sz vm..
E IG UE GN HR . OA .UL Ac· RT BI KO CM DP. FY JB. r.n·· MF ·m~Q.i VK XQ; YS. zu. w EW .si: TZ
~w~moom~-OO~KIOO~W~IBID~~~~~WW.fi~llll
. G 00 HE ON UR .AA HI. BO KT. CI DO FM JP "LY MB PD Q;D' VB ±.r YK ZQ.. WS :$U fJV TW·. IX NZ
RmoowoM~m~mwm~mm~umrt~~•·OONll~~
I OG UE AN RR BA KL cc DT FI JO· LM MP Fl Q,B VD XF nf ZJ-""mc"EQ. SS TU iV NW·GX BZ
Jooo~mn~oonnw~w~w~umum~~ronoo&~
KM~~~~mmnum™~ft~E~m~~~mw~~~m
lil:a RG BE KN CR ~"FL J"C LT MI PO QH VP XY YB ZD WF EH SJ TK IQ NS GU HV ow· AZ VJ:
M BG XE CN DR FA JI.. LC :Ml' PI QO VM XP YY ZB \1.[) EF SH TJ .II{ NQ, GS HU 0V UW ·u RZ
Nm~mmnu~~~wmn~~~~.mu~~moowil~~
ooo~~mu~~~nEm~R~w~mm~~oomD~~~
~mnmrn~K~ftnm~~n~~n~~~~m~~oon~
Q~nwm~~m~nw~P~wm~~m·~~~oo~a~m
Rmumm~nmn~e~~fiIB~~-mm~~MOOD~m~
S. LG ME PN QR VA XL YC ZT WI EO SU TP IY lm GD HF OH UJ Al{ R~ BS IaJ CV DW FX JZ
~m~~nnnmmnooruun~Ewmu~~~oo~~~~
U PG Q;E VN XR YA ZL WC El' SI TO IM NP GY BB OD UF AH RJ BK KQ, CS DU Fi JW LX l'IZ
y_.~·w·Dmun~~nro~~mooma~mll~mwn~m~
~wnn~nnoo~rroo~~~·oowwM~~~~ro~~~~
imnD~n~ronmoo~~m~~~m~m~mm~N~n
Ym~~m~~mmMOO~Wil~~D.@m~.~~WN~UD
zm~~-~~n~~moo~~~wn~mnm~wro~wnn
i.
.
_t
REF ID:A56930
.. .. \
... .'.' .......
•. ·~ ,·"4i'' ~-
.
..
..
Table 3 ..
·i._. ,.
·:··
..
;·. .. 2
"'
e.P '
A B c D- E F G H I :J -.~
.Ll.. L u 1l 0 p Q, R s. T ·U .v. .W· x. Y, z
A, TT E ·s T I ?T G H 0 u A R B
...... ~ c D F J I. M p "Q, ·v x y z
B E s T I N G H 0 .u A R B A ·c ·DF j L M p Q· v x. y. z w
c s T I N G H .o u A R B l{ ·c D F J L u p .Q v x ,.Y .z w E
D T I N G H 0 u A H B i{ c D F J L M p Q v x .Y z w· E s:
E I N G H 0 u A .R B . Tr"
.1.:.. c D 'F J L M p Q; ·v x y z
. 'rJ
17 E s T.
F N G H 0 u A R B'K c D F J.L H.P Q v x y .Z E s T" I
G G H ,0 u A
'.
R B K c
T,.
D F J L-M p Q. v x y z 'J ·E :S. T I ·N
H H 0 ·u A R B .Ll.. c D F J L T.•
J.! p Q v X.Y z.w .E s .T :1 N G
I O·U A n B IC c D F J L M p Q. v. x y z w E. s· T 'I N G H
, .. J u A· R"B ·K c D F J L .. M p Q. v .·x .y z w E s 'T .I N .G H· o·
··K A R B·: K" c· D., F J L M p Q, v· x Y.z w E s T.. I N. G H 0 u
L R B K c D F J L M p Q v x Y. z w· E s T ·.I N G H 0 u A
M B K c :0 F J L M. ...
1J Q;v x y z w E s T r:. N G.. H:. 0 u A R
r-1aft N ·. K c :D. F J L H, p Q.. v ..,,.. y z: -iv:· E .,.....
}. T I N G.H·o V .:A R B
0 a: D F J· L M p Q, x y z :-r E s
V, T I· N G H u: A ··1R B
0 K
p· D'. F: J L M p Q v x y z iY E s T: I N G H 0 u
A.R·B K d
Q
R
s
F J"
J L
L :M:
L M p
M p Q.
P. Q v
v
Q v
....
v
x y
x y z Yi E s T I
,..,
y '-'
z vii'
"fl E:
E
s
s T, I N ~ Jl· 0
T· I· N G·. H 0 U.
G H N 0 u A R:. B <K :c
u A R B' ·K. c D
4, R B I{' c~n F
,,
:Q·
;r;
~.'I p Q v x y z w s I N G H 0 u A
.,,.
R B .L>.. c n:' F .J
T E T ~
u p Q 'V .;,.
""'" y z w E s T. I N G H 0 u A R B K c· D :F. J ·:1 1q
:V Q v y x z w E s T I N G H o· u A R· B I{ c D F· :r'· L .M R
. 11. y x y w z E s T I N·· G li. 0 u .A. R B .K
.. 0 D F J L M p Q·
' x ·X· y. .Z w E s T I N G H .o u A R B l>.. c ~
D'F J. L M p Q v
·y ··Y ;c; W.. E s T I N G H 0 u A R B .,r .i.>.. ·n c F J L :M p, Q, v
·'Z z w E $ T I :N G H 0 u A· il B .a.>. c .D F -~
J L· M p Q v x y
'2
ea G E :N H A. L.·. C T. I 0 .1,1 p y B ·D F H J Ir Q, s U. v. w x z
...
i
By a slight modification in arrangement, btit w:Lth-no cha:ire in basie• : ;_
h..
pr:i.nc.fj?le·~ the encipherruent can be made nonoalphabetic, so far as ep. ia con- .
,cerned,. and polyalphabetic, so far as·~ is'concerned. ·Note Table 4.
. .....
.. .... ......
A W G E N R A L C T I 0 H P ~ B D F H J K Q S U V W X Z
:SE ENRALCT I OMPYBDFHJKQSUVWXZG
0 S NRALCTIOMPYBDFHJKQSUVWXZGE
t) T· ·-R -A L_ ·C T I 0 M P ·y B D , F H J K Q, S U V W X Z G E N
l!l ·:r;. ·.!.. · L C · T . 1 0 M P Y B D. i ~H . J K Q, $. U V . W X Z . cl: E. N R
.F.. N ·.L ·c T ): fr M P Y B D ·F ·H J K · Q S U · V W · X ·Z G ·E N R A
tf G C T I ·o H P Y B D · F H J :c Q S U · V · W X . Z · G E N ·.R A L
i.I .. R~ .T I ··o M P Y: B D F .H J" iI Q. S U V W · X Z -G · E N R 'A L C
.:i . 0 :x- 0 M P .y B D F · H ·J K Q, S U V i1 X Z G E ·N R ·A L · C T
[ .· U 0 lJI P Y B D F H J It Q ·S U V VI X Z G .E N R ·A :L C. T I
~--'• .. AR. :M P Y B P F H J K Q S U V W X Z G E N .R A "L C T. I 0
. ..,. P Y 1' D F H J" IC Q. S U V ~-r X Z .G ·E N R A L C ·T I 0.
~-: B Y B D '.ij' ll J K Q, ~ U Z G E N ·R A L C T I 0 M P
V \1 X
~---· X B D F H ~ K 4 ~ U V ~ X Z G E N R A L C T I 0 M: P Y
0 C D F lI t K Q ~ U V W X Z G ·E N R ·A L C T I .0 M P. Y B
P .. D F H j K Q, -~ U V ·W X Z G E N R ·A L C T I O .M ·P :Y B" D
.. Q - F H J K q S U V W X Z G E N R A L C T :! 0 M P '.¥ <B . D F
R" ,. . J' ' J K Q, S U V W' X Z G E N R A L C -T I 0 M P .Y B .:D ~ F
S .• L K Q S. U V :7 X Z G E U R A L 0 T I 0 M P Y B :D ·F , H;
T ·.· M Q, S ti V )i" X Z G E N 3. A L C T ··;r ci M P Y B D "F 1I· J
UP. S U V W X Z Q - E N R A L C T I O M P Y B D F " H
V'Q ~VWXZ0-ENRALCT IOMPYBDFHJ
W'. , V . V W X ~ 0: E N R A L C T I 0 M P Y B D F H .;r K
x·. X. 1V X Z G E N R A L 0 T I 0 M P Y B D F H J K Q,
Y. Y X Z G E N R ~ L C T I 0 U P Y B D F H J K Q, S
t . z~- z· 0- t: N B A c L T I 0 :;,! p y B u D F H J K Q s
i-.-------------,..-------------------------------------___;;__,,.._.-..-.....;.....,__ ,.....-.1
, L ..
i. The .;L"eaults given by Tsble 3 or Tabl~ 4 may be duplicated by- -using :
, slidilig alpha.~ets, as shown in Figs. 32 and 33. In the :f'ormer, which corresponds
·to Table 3, Alphabets I and IV are: fixed, II alid III are mounte_d upon_ th~_ same
. s~rip, whic?- is inovable. ·To use these al:p:h~bets in enciphe~nt, ~ ot e'I91-.1s
. looated on Alpha~et· II and Alphabets II-III or~ shifted so that 9~ is beneatR A
on Alphabet I; a;; is now sought in Alphabet I and ~ will be f'otmd under it on
.Alphabets III ana
IV, respectively. Thus, to-i; .the. word FI3E: the .successi-ve posi-
t·iona Of the alphSbet ·str.fps
KIQ,!... . .. . .
·are as
shown 'belOW_; yie_lding_ th~. ciphe'.r resultant.
.. ' . . . . ..
I .- A B C D E F G ·H I J K r,· :hf N 0 P Q R s T U v"w
X Y" Z - - Fi;xed Blphabet
,.;j;,. • - II - F G H I J K L ~-1 N 0 ? Q, R S T U V IT X Y Z A B 0 D El .
f'Ip _, Kic III - N G H 0 U A R B K C D F J L ].I P Q, V X Y Z 17 E S T I j Movable alphabet
IV - G E N R A L C T I 0 l'.-JI P Y B D F H J IC Q, S U V W X Z - - Fixed alphabet
Fig. 32
REF ID:A56930
- 43 --
--·
... : ._-:~!- ·: ! J) ;T0 correspond wit~ Table 4 the alphabet stri·ps ·are _arran~ed e.s-_ shown
. , . in_ Fi~~ ~3·•-. _Ile=:x-8 Alphab&ts I and II are fi:x:ed, III and .IV are. nio~~ed upon
· -~·'the· E:Ja.ttl~ ~vable strip. To .. use these alphabets in enciph~rraent,: ep of 9l'92' is
~ocated.. o.n ',Upbabet IV Cd Alphabets III-IV are shifted. so that·eB.1:1(Ip) is~e
neath A -0n_Alphabet I;.~ (F) is now sought in Alphabet I and 9I'e'fwill be
found un,der it on· Alphabits fr and III;respectively.. Thus, far thS WQ-rd FIRE,
the successive positions ot. the aiphabet strips are as· shGwn .below, yielding
the- cipher result.ant NBJU~ · · ·
I ~AB C DE G H I J KL MN 0 P QR S TU V W X Y Z .. --·F,.xed
F alphabet
.II• WESTING H·O U A.RB KC D F J L MP Q V XY:Z ~ - Fixed alphabet
III - I 0 M P Y B D F H J K Q S U V W X Z G E I~ R A L C T) · : · . .
IV - I J K L M N ·o p Q R s ~ u v Vi x y z A B c D E F G Hl. ?B>vable alphab't
' '
....
.
··!:
. . . . : ..
. . :
L
.R. B
...o
K c l;) . F. J' L :M p Q v. X· y Z· w E s 'l! . .I N G H 0 u A
F D B y p
.
..M .I T .C L ·A R .:r:r E ·G z .x w v u s .Cl .K . J H
,B K 0 D F.· j L Ivt p Q v x y z .V{ E s T I N G. H. 0 u A R
'i/4}.f
' .... p ·M ·o ·I ·T c .L A R N; E G z x w ·V u s . Cl K J' B F D B y
Z. y x. v Q .. p M· L J:. 1' D 0 K B R A u 0 H G N r T·. l3 E w
z G E N ·R A .L ·C '1?. I 0 M .P y B D. F H J K Q. s u v w x
.Y ~ v. Q,' ?. M:. L J F D C· K B A U. 0 :a H- G N· I T s E w z
::•.:
0 x z G .E N R A L: c ,T I 0 .M ·P y B· D F H J TT J.\, Q .S u ·v w
G -~ I T s E· VI z y
····:e· ...xw v.x..Qz :p. M L J F :0
.G :E· :N R A L
c
c
K. B. R A u 0 ~-
T· ·I Q I.I p, y B D.. F, ,H j K . Q.. s u v
'
v Q p M L J F D c, ~ B R A U· Q, .H. ·G .N I· T s E· w Z· y x
Q'' v w x z G E N R A L c
0 M T I p y B D F H J K ~ s u
Q p M L J F D c K B :a
0 H A u G N I T s· E w z I x v
R u v w x z G E N R A L c T I 0 M p ""J. B D F H J K Q s
p M L J F D c K B R A u 0 H G N I T s E w z y v Q x
s s u v w x z G E N R A L c T I 0 M p y B D F H J K Q
M L J F D c K B R A u 0 H G N I T s E w z y x v Q. p
T Q s u v w x z G E N R A L c T I 0 M p y B D F H J K
L J F D c I{ B R A u 0 H G N I T s E w z y x v Q, p M
u K Q s u v w x z G E N 3 A L c T I 11w
0 J.i!J. p y B D F H J
J F D c K B R A u 0 H G N I T s E w z y x v Q. p M L
v J K 0 s u v w x z G E N R A L c T I 0 M p y B D F H
F K D c B R A u 0 H G N I T s E i7 z y x v Q p M L J
H K Q J s u v w x z G E .N R A L c T I 0 M p y B D F
D c K B R A u 0 H G N I T s E w z y x v Q p M L J F
x F H J K Q s u v w x z G E N R A L c T I 0 M p y B D
y
c K B R A u 0 H G N I T s E w z y x v Q p M L J F D
D F H J K Q s u v w x z .G E N R A L c T I 0 M p y B
K B R A u 0 H G N I T s E "!{ z y x v Q, p M L J F D c
z B D F H J K Q s u v w x z G E N R A L c T I 0 :M p y
REF ID :A569.30
·• .:·.·4s· -
~~. ··· ·Table S ,a.till. sho~:~·.~Yiimi~try· . in ...lts :con·s:trdcti'onl,-aond:a.' . ~~s:piclon of
its existence f',ormed -~u.r.f..ng the ,pr_elim~nary st&ie~ ·.·C'·t cryptanalysis. woi.i.l.ci ~id
materially in hastening final solution.·
Table 6.
• ' I • I • "• • I •
• "I•," I.• ••r •• .
• O
.. . .
I• 1 •
I. II.
4 w G E
I I
Ii· ·.R · A .L .• C
• • ~ -
.'.l1. I
- .. . ..
p"-y; B D 'F H·:J
() };f K Q s u· v
.•...
'\L X z
B E E N R A L c r:1... I lI p y R D F II J K
0 Q s u ·v ii ~-
.1~ ~ G
c s N R .A L c r:1... I .o !{ P. y B D F H J K Q
.. s u .V \"'' x z G E
D
E
T
I' A
R A L C- T ·r 0
L c T· I 0 ·a
·~l .P
.
y B D. F H" J K Q S·
p y . .B ,. D F H J x Q s u
:
u v
v \'
'f
}~
x·:z
~z a.··E ?i
G E N
R
F "N • L: c T I 0 }.{ p y B D F H J K .Q s u· v V' v
A .2.. G E -lL h
,
.A
G G c· T I 0 .· lI .P y B . :p F H ; K Q. s u v \. x ~· G· ·E N Ji. .I. L
H H T I 0 u ..p Y· B D 1'' .H K Q s· u v ~ x :r ... ~ G E N .R 1.. L c
I 0 I 0 }.! P·: y B n. F H J K. Q, S. u v. 1i; .X ~ G" E N l. - .I-. L c T
u ·o u p, y .B D F H J K Q s iJ v' v- x z ·G .b. .L· c T
J
·x A 1~ p y :B D. F H J K Q s u
,.,ii z G E. v .. E · 11
N H
'R
i. L 0 . .T J:
I
0
., "'" R ll...
. l
~4
. R.
B
p
y
y B'· D :F H J
B n F H J K
·K Q s u v \'',. J>..,... 2. G E: ll
Q s u v \' J>..
,
G
. E. •I
..~ R .. .. J.. L
L c !I.' ~ o·
CL T I- 0 . }.II
1~1
p
~ i( B D F H J K·:.Q s u v \.' ..... ... G E u H .i~
v r,
L c T I 0 !" p .. y
0 c D F II J K . Q. s :J v \: x z. G L Ii !( L ~ c '1 I 0 u p y :B
p F H· J i: Q s . [J ·V 15'• A. r'.... G E il h
, L c 0 lI p y :B
D T I D
Q F H J 1. Q s [J v
,., ... r: G ,,. 1-l R A L c T·
,
~~
I '() I.I p y B D F
~ J J K 'Q s. ·U v \1
"~\.
'-'
""
'" Z· G ,E N li A L c T I 0 I.I p y :a :D F H
s L K Q. s u v v: x ~ G ·E n R 1. L c .T I 0 1'l p y B D F H J
s v .... z. G 'C' rr. R a. .....T c T· I 0 H
-· p y
s u v ,.: ...
T jJI Q CJ \'I '!,•
:B D F H J K
u :p ~ :z ..,G E· If. ·ll ~· L· C. T ·.I .. 0 l.I p y J3 D F H J K Q
v Q, IJ v l!ii ]~ ~ G .c. Ii ·k· . i.. t. c T ·~. o. . hl p y B D F H J .K Q. s
v v Vi' x z G 'E N· .:ij .: 4. 'L .c T. I:· o. J,I . p y B II J K Q s u
'
D F
~ x w x ~.G E ;11 ·R. ~ :L· ic =T I· -0: n' p::,Y B D F H J K Q s u v
y y x z G E N R Jt.. :L c ''l' "i· o· ·!.t P. Y.'. B .D F H J K Q.s u v l"
z z z G E I-4 R j• .. L .-c.. =~ I _._o li p: y ·B. . :!) : F II J T.' ,... s u v Vi .x
i~ ....
'
n. In u.sinc thi~ i~bl~,.··~···1~ ·loca~-~d··~r_i-~~ph~be~ I,. and its equivalent>.
g!, taken from .i..lphabet· .r5:;: g~: ts ~.oc-a.ted in; al.p~a~·et· I~I, and i1;s· equ.ivalt:nt, e~,
taken from Alphabet ·IY;·- ~· 1S t.he letter lyip.g at -phe intersection of the row
indicated bf g:
in: ~lp~;i .I. ,~~;.~_he .co1:~. ~~~~-rpin~~-:hy .e~. Th11s, FIItE LINES
wo11ld be enciphere·d. lijlZ.: Il)l. ~~OV~: It i's obvio;WI.,; however, that only the ·en-
cipherment of g 3 is polY.~iP.h.i,;.~e;t-1~.· in :-c~raet:er:·-;:::;~ and e2 ~re enciphered pure'1
monoalphabetion~ly. 'Vb.rJ.CiU:s!·odier· ·agreements mr.y.;oe madepwith respect to t;he ·
alpha.bets in which the :i:lcdn-.text •. le:tter '1•111 be souc;ht in au.ch a tli."tile, bu.t
the :~sic cryptocraphic princip~es·are the same as in the case described~ ·
- 41$ -
. ..... ~
.. .2.• ... Digraphic tables employing numerical equivalents instead of' letter
eqti.ivale·:nt·s·are;: ~t eGur.s~·, ··~a.sible~ but· in. t~iQ; co.se.. :th~ ~~or ·Ot. equiyalents
required, 6'76i<metins'"th.o.t· ·~00lbimt19ns·oi' . . . . .·:t'.igure~.
·• . three .... • : i:.··; must.. -be··.use"tt·..
. . .• ·~ ·
• .;:(' ': •: '' ': •I ,·,' • :,
~. 1."'... ··--~:---~:-------·----- .=
:·,'.:',. :. ·. : :: ...... .
• . • : ••• _!, • : ,J . . • • ; .
-·· ·• ..
. ....··.:
·'· • I • • '
·T: ·:a :r
·1f E· F. I: v. E:· .A '.
p'•; Q'' .5· N: .. P. .£} .B ..
1t
•• :. I • • '
0 .:.··; ..
. ..... :. -; ·. :::, .. ·-·2 ... ·· ~
. =., , ~eo a -~. {~c) y z U·
·:: ..
·o y;. z T. 0
"
sec, '.2 :(e2 )'" ·
..
: ·,.• . :: . : . . ~ . .
.:
-'.14L- x w ·V.
A.
B .. ~ '•N- u
: :. p ~-::
.... :· .. ·... ~ . ,; . .: ..:· . .~ " ·g.
"]'.)
.; ~ . . .. .. ~·
..-·•
..',
REF ID:A56930
- 47 -
...
of Paragrc:ph 31. I~ thi's( ~qu~::·-~ q-f~ ~ /.-1.s.>scJgb.t in Section l; 9 , in 1
2
Sect ion 2. Thus, ~ qna..;~ . :n;1 ·.~~~ . f:~~- ~~~i -~~:r-"~ll,~st - southoo.s~ corners
of an pn.."\ginnry roct~gle aG).iIµtetid bf tho~.~ lett~rs ns loc...'1tod in theso
two ~·1ol.1s. qt·tm sctumja.··:··~n·'" 1'9~f .:).hd~.9~ ire;; -~~-Sp~c~ivel.y,, -~he .!!.tt~ a~ ,!he
northeast - southwes~ · co~-,·~s·_·-~-:~~~~(.s~~.roc;t~l~ •. ·. ·Thus,'~ : TK"c·; WDn : TXc;
=
~ l'@"c; mt. :_W .;.~te.•... :I:i:ii.-~~-~!.~~?.~O:~~~.'.~ij.~g,. . ~ are sought ~n stfotions
3 and 4, r~sp«ct1vetY> ~~d ~he}r 'qm;~ardi:~t 9~ ~a.~-, noted in Sections l and
2, respectively. It l'lo.J:: of .cQ.ur.~J3, .. :be .Pl"~P.~:;mteq_.-.j;ihO.t el should be sought in
the sect1 on now i abe1~ d ~-, :· ·9~ ;: tii¢ ·io.b~l~a·d · ~-~ ·.:v111~roupoR Jn;
would be iocnt ea ea
in the sect ion now lrt:bel~d ~r; i9e,: i:n ::t;hc."t nett lPbe'lo.cl 2. .
. ~ . ·. ~·.~-~ r ··:~·······ii·· . ! .... ·:~ ··::····r~ ~--~
. b.. It is poss~bl9 t~ .do-ll.!t.i:i!Qi_~...~~P!'{~e fSU~stitution eh2_cke:t"~ord
thnt.:¢i.6w~ rB~roci~·~n··_-~tQ !99~ w9,90 relqti~slf.ip.iSO thc.~_,if-~ ~.Xfc~ tor
a:xomple, then XY:p :. ~.c·~ :.Tvr~·:c~clit·~one·:. a:r~ ·Cf!S~ti~l to llBSlll",!_!!Ciprocity-.
?1ese ar~ tnkcn into :~C?~~-~~f?~li~-~<:1D::·:_1.~ -~~~- -~-~tobli~t of the el92, or decipher-
ing sactions, nnd on:o;ic:impio,~ill ~e~ve :to expini:fl'the process. e
. . . . .. . •.... ~- t. . • . ·: : ..
• o •oo I... oo • ' - o 0 •
£..• Two enciphering' a.lphnbata ~ro first constructud, ono in soction l for
1
e~, the other in section 2 for e2, as shown 1n Fig. 35-!!_. The nlph~bet in Sec-
tion 3 is now to be constructed.¥ . . horizont~l
: .... A.ny .. .
row of Section 1 is taken, ..
·. . . . . . :l 2 .. -~ . ',4 ·~ ... . ..
. ' 1 B·· ·. -W. G·· ·:R1 P!-. · :.·· . . . :: ,
... e
I• '
. .2NY.VX_·E ......
.. l
3 $ I c T K Sec • 3· (ea.)
4 .P" ~-'· i ... 0
~- (· ~
5 D z 1: Q, ; fr ..
·-
..
: .~
.....' C X'K P·B l
'
~···· · ... ·~ .. Q,I :rf .y n· v 2
• S: A: ·t w· L 3 soc. ·a (e~)
· · . .·. .. .; : .:: .·. ·a; Z. 'Q.
. . . . . . .. ; .... - . . N. R 4
·-rr·1· .·~ ·
.. .• .. .c Ti H· r:·F·,• U
. : . • ~•
5
4 5
·:: ...
. ..... 1.-: :··;.,. : :! •· :
...
. {.· -~- -~-· . .:.~; . . . .:. . ·c~ 1..:.
.. . . . . ..... . . F-1.g_. ..35--n '
.
for exomple, t1le row". l~brili)cl i,, ·Qqijs~.s·Hnt of the letters· BWGRM, ~nd these
letters :lre written bn. ~Y ho:u:izontnl rm,· at Section 3, in any trnnsposed order,
whic~ is i!llll.Odintely written nt tho top of Section 3, ~s shown in Fig. 35-Jt.
, .......
•..
. .. ....
~
~-.'
t.""" : . • :.-·
.. ' ··.. ·.:: ·:. ... ·.
:
.:·.. ;.:
...
... : : : ', .. .. .. ~ .~ . ·::· .. ''·
·"I'·
·.
.• .
1
.1
B
2
w
3
G
4
R
.5
M
-5 2 4 l
..
3 .,
..·'
-~. N y V. x E
3 s I c T K .. · · Sec. ~ (e!)
4· .U p :L A 0 :M w· R B, ·G:·. l ·. .
...
5 D z F 'Q H
·-· :· ..
c x K p B l.
0 M: y D v 2
- 2
' . $' A 'E. \7 L 3 .Sec
. •. · 2 (9°p.)
G z Q. N· R 4
T H I F u 5
1 2. 3' 4 5
c x· K p B 1
0 M y D v 2
Sec. 4 (~) . s A E VT L 3 Sec. 2 "(9~)
·G z Q N R 4
T. H I F u 5
:
: 1 2 3 4 5
Fig. 35-c
1s transferred to another raw ot Section 3, for exa~le, the fifth, and the
letters inserted in the already indicated transposed order. Illmediately
thereafter, in order to continue the reciprocal permutation relationship,
·•·· I
REF ID:A56930
- 49 ·-
•
row 5 of Section 1 becoI!les rovr·2 of' Section 3. This leaves r<RI 3 of Section l
to become also row 3 Qf ·Section 3·, and to be re"ciprobai to itself.. The result
is shown in Fig •. 35-2:,, ,whc:.~e ·Sectfon 3 .is comp;t.etely' c~structed. The f'ore-
The coili;pleted square i~ -.then a.a. shown ·j,n Fig. ·35·-a·;· and aXb.:tb:its r~iprocity
th~oughout. ··. EXamplo·: . BBP :·nv~,. and·~~ :
. . . . . .
mrc. .: ·. -
.
. . .· ..
,·
"· 1. .qw. . <REE... _,ID : A.5 6 9 3 0
;r"
.,
-· 50 .....
.. .. .. ];; 2 3 .4 5 . 5 ·2 4 1 ·3''. .. ..
•.
..
... 1 B w ~ R M 0 P. A u -L 4 .
2 N y v x E H z Q, D F 5
Sec •. 1 {9;1.)
p 3 s I .C T K. K -I T ·S c 3
4 .u p .L A. 0 M w R B G. 1
z -·E y x v
5 D F Q H. N 2
.. •;. j - ..
3 w A L E s. .c·. x
K 'P B 1
5 F ·R u I T Q. M .y D v 2
Sec. 4. (9~)
c 1. p ·x B K C· ·S ··A E w· L 3 Sec •. 2 (ea)
p
4 N z R Q IQ. G z 0 N R 4
2 D }.~ v y 0 T H ·:I .. F u 5
4 :2 5 3 ·l. 1 2 "3: 4. 5
.,
Fig.: 3-5-.!,.
(4) 12543 (9) 15342 {14) 21543 (lSI) .42315 {~.) -~431
•·
.... (5) l.3245 '{10) 15432 (15) 32145 {20) 43215 (25) 53241,"
(6) 13254 (11) 21345 (16) 32184 (21) 42513 (26) 54321"
.. . .
Since the row parmutations of sect ions 2 and 4 are independent, the total num- .
bar of'· ditf'erent four-alphabot squares as regards row pe:rmutations is 252 : 676. I
T~g into account tho column l'Jarmll.tations,. 5x4x3:x2xl in number,. it ·1s there-··
~ro,. :pqsaib+.e to havo 676:d20 or Bl,120 di:rtorent~ four-alphabet checkerboards
of this nature, based upon tho sane two alphabets in Sections l and _3.. With ....
changes in the latter, the nUI!lbor,.of ·course, becomes vary much greater.
- 51
~f 91 e; is located in the· square at the left, e2 , in the square at the riglJ.t.
M A N u F ---- u
A
P·
T ·0 ;:M
C. T R I G B I L.. E s
; 2 1
B· D E H K c D. F G H . ·_:Spec·· ··
:
.L 0 p Q, s K . }T p Q, .·R
·.V Vf x y z; v w x y ,z
Fig. 36
When e e~ are at the opposite ends o:f the diagonal of the imagi~~rY ··:rectangle
1
defined bY the letters, el~ are ·at"· the OQpOsite enc1s of the oth~diag~al oi'
the same re_::angl~ ju_::: as 2::
"!;he' pr:aceding case. For example, ~ : T'l'ci
i5rrp :. 'Wl:'c ; ATP : TAc; EI), : HEc. ,
b. Reciprocity may be imparted to ~he 2-section checkerboard by recip-
rocal-permutation of the rows of the:checkerbqard, no attempt being made to
effect any reciprocal permutatipn :o:r ;o.Olumns~· Fig. 3? shows such a checker ...
board.
M A N u F. I 0 s Q, L p
~
l
2 .c T R I G w
...
z y v x
~
3 B D E H K D I{ H B 1!:1
4 L 0 p Q s A F u M N
5 v w x y: .Z • T G ,I c R . 2.I
Fig.--37 '
v w x y z
Fig. 38
·-· ·--~----------------------------~------~--------
- 52 -
l 2 N "'
both ~ and 9p happen to be _in the same column there is really no encipherr:ient,
a .tact ·\vhich cons·titutes an import.ant disadvantage of this methoG.. This d1.s-
advantage is only slightly less ob.vious. in the ;preceding cases where the cipher
equivalent of such a case of 9IQ2 .oonsist.s merely: of th,e plain-text letters in
reversed order, yielding ~-· P '. . ·
O· . .
M I'A N ·u F
leIT R I
~:-
D E -- H
G
-
K
L 0 p Q s
~ ;.•.
v w x y z
. I
-!
Fig. 39.
The usual method or enciph,er:rmnt can be best ~x,Pla~~d .:~y· examples gi von under
four categories: :·. ··· :, ·· ·
. .· ''." .. 1 ... ··2.. .
(1) Members of the .pla.in'.':"'.te:::rt; psfr.~_ep o.nd· .. ep,,
~e at opposite ends of
the meznb3rs of tho eipher~te:id; pair, 9 10 o.nd ec, are at the oppasi te
the diagonal of an imaginary recta:ngle dcfine~ by the two letters;
{3) e~ fld are in the same colu..im; the lotter imrJediately below e~ forms
e2
ec, th~ lottor immed_iotel~ below g2 forms Q~. When either e~ or e~
is at the bottom Qf ~he colunm., thE top letter in that column becornes
its 9 0 • Exomplos: MCP ·.: ·cnc; AWP ::: ~; ~ : AT0 ; QUP : Yic•
- 53 -
J2.• In .tho. 'a.ccompnnying Figs. 40 nnd 41, there n.re shown ·two .eX:cr~9los of
such rectangles, together with illustrations of enciphcrrnents.. Since the
English c.lphnbet consists of 26 letters, n number which c:m only :f'orm an fm~
pr3ctic.nble rccta.nglo 2x13, ".litd since the addi tiori of nny symbols Su.ch o..s the
dtgits 1, 2, 3 ••• to r:iugmont th.o number of ·ole;:,mnts to 27, 28, 30, 32, 35, or
36 cho.r.::-_cters would result in prod1.,lcing crypt.o~rnms contci.ining interrilixturos
of lott1Jrs ::md figures, the only :pr:i.ctictl.ble scheme is to rcduco tho ~li;ih:-tbot
to 24 letters '."Is shown in tho figure.a, where :t.:scrvus :'."'..lso for :r nnd U :'1lso
for V.
l 2 3 4 5 6 6 2 '3 l 5 4
1 T ~~-{ 0 ~I u N
·--L y Q, 4
z ·H· ;p --~
2 D R E s 1· x K J3; .C A G F 3
3 .A B c F G K x R E D I s 2
4 L NI p Q, y· 2 N w 0 T u H 1
- -
4 :x R '.7 z· y, Q 0 :n E T l
H u ..
3 L: I K p M G s .A :D B c F 2
2 'B .1\. j) F- ·c ·s G I I{ .t . M :_p ,3..
·-
.·.1 T N·· E- u H 0 ·O· R w x ··Y z1 4
.... -4 2 3 '6 5 .. 1 ·.· l 2 3 ·4 5 6
?10: 40.
Exnmples:
Plnin: TH ER EA RE 'BE Tr E'n CR yp TO GR ..\M
Ciphur: YX BE BK CR ER LX BE m:· HC zx RH IB
l 2 3 4 2
---r
3 1 4
1 T w 0 H B c J.\. F 4
2 u N D R z
-- Q y p 6
seo. 1 ( e1 ) ·
.. .P . ·..
3 E s
4. B-.-...
~
I :{ K L G M
c F w 0··- ---
T H
-
-
--
5
1
5 G K L. M s I 1i' x ~~ 3
6 p Q, y z N D u ·:r.c ·2
5 Q u p R 0 N E T 1
2 s H u ...." H u s l'l- 2
te 2 3 c D. B F D B c F 3
Sec .• · 4
. c
) -- 6'
·1
4
y
E
K
\'i/ x z
0 If T
G~ I L
G
M
w x
I
p
K
G. --
L
5
R
y . Z1 6
4
~·. . . . . l ;
3 1 2 4 1 2 3 4
Fig,. 41; ; -~ ....
'"1 .• ,·
Exai."11.ples:
Plain: TH ER ... EA. RE:: ... BE .:.:Tr EI°L ..CR _);p TO GR AM
Cipher: BS ME M3 ffi' .TM "FQ. ME . 'HN :'DN :BQ.· n·;·W".E' .
- 54 ·-
•
c~ Tv10-al9h.:ib0t :rc.:cta."1t;L3s arc also :possitlo; it -is thought U:."lllo!'.essary
to demonstrate them by. specific exara:ples .: The general e:;.;:amples shown in the
:preceding sub!_)aragraph are considered sufficient.
w A '.81 Ht= I N
..
G T· 0 B c D
El F·· . .T .KA IIra KI'
K{)
..
IKU :L M: p Q.
I
R u v., x y :z
. ~ig_. 42
- 55 -
•
.. A B -e
----··
D E OOQ -~~R·· 050 1075 ion
..
Q
.
R a T:. u '
-
. 375 40<' 42B 45C . 47.5
..
v \f. x ·.y .z 500 525 .550 575 600
-
.. '
.. .. .. ...
.. .... ... :·:
I
.
'
.•
0
5
1
6
2
7·
3
A
·-
-·· 4
9
v
W··
Q
.R
L
M
J'
G
A·
·.B ..
.. . .. : : ., 2
2
S ec.· ·4 \,.9 c ) l 'l ·1-i;::; 12" .. .13· 14" x '-8· N H c...,. ··.· .. Sea.·: .2 (eP)
4",•
·:•·.·.
15 15 17 18 19 y .T . r, I ·D
Ill•;
2c 2J.:· ~.a. 23 24 z. u
..
.·p .··K. E
-·
Fit;. 43
!!.• TC!' dee ipher such a oDy;pto [';l"atn~· t ak·e tl:e gre.ate·at mul t i];1le of' 25 con-
tained in the group of three digits; this :cru.ltiple and its remainder fo.im the
ele..."llents for determining the plain-text pair· in·the usual :mr.ner. ·Thus, _. .
2A4: 275 +9 :·PR. :• . '
. . . .:
--------------------
. . ·. ; ·· · '. s3cTION IX ·. . ·:
··.'. ·.
:-·: CQMI.'LEX SUESI'J;TUTIO~·T. ~-~STEMS..
. . . . .. ·· l?a~asr.~pl,i.. ·
Preliminary remarks ....................................... "!. • • _; •. ~ · ~: ~8 -~ . L--•-
Continuous or nonrepeat ing-!cey systems •••..•.....•.•• •.• ........ .; •· · ·. 39 · ·· ~·
Auto-key systems ••••••••••••••••••••••'!'•••.••········•:.·.·,.,. •._,;· .•:••'•••·. 40
Progressive-alphabet system::: ~; ~: •• ~.". ~··••• ·~ ·•••• ~ •••.• ·.·~ ••-•••·•.••.•• · 41
Interrupted or variable-key s~rs·tems. .. .. • • • • • • • • • • • • • • • • • •.• • • • • • • 42
suppressing :periodioity by e~cfpherment of"va~iable~length
groupings 01' the plo.in text ................. ·......... ·• 43
SUp:pressing :periodicitJ by e:n.ciphel'i!lent by variable-length
groupings o:r the key ••.~ • -~ •··••••• ·• • • • • • • • • • • • • .. • • • • • 44
Mechanical cryptographs in which periodicity is avoided ••••••• 45
38. Preliminary remarks. - In-Paragraph 63 o:r Special Tert No. 155 1
Elementary ?.~ilitary Cryptography 1 bri13i' refel'ence \ias mde. to .:n.ore complex
subati tution systans. It was stated that there are certain :;;>Ol!•al:phabetic
methods in which periodicity.is absent; there are other n:ethods in which the
external manifestation of' ~eri~dicity in crY:Ptograi'IB is prevented, or in
which it is suppressed or disguised. Sli;:;ht hints we:-e then given as to the
nature of so.rae.oi' these·~~thods •. This and the next two sections of the pres-
ent text are devoted to a more detailed description and discussion of the
~~thods indioa~ed, which, as a class, may be·designated as !l>-E!.~~ systems,
as contrasted wi~h the_p~ev~c~sly de~c~i~~d, more· sL19le, R!'.!io~~ syate!.lS.
. - 56 -
·.
•
39 • . Contthµo11~-~r-nonre~eatll1g:.key.systel48. -.!· "One ~:t th:e simplest
roethods of avoiding pe~iodicity occasion9d by_t~e emplo~t· ~f·ma.re than one
substitution alp}\.abct"_ :!-1;1.t:o.. use ·as·t~u lfoy ·:ror the enci:phel"Ill0nt: of one or
more ·messages ·a ser:i..3a of l~tters or: cha.recters that. does not repeat itsuli'.
The ·.running. text of a"
book~ .identical ·copies of which. are in possession of
the'·corros:pondent~~ -~Y serve ·as tna·}::oy tor this ptJ.r!)oso •. :. It is only necessary
for thu corrliSspond..lnts to i;isr'3o -as to the startin.3, point of': the .lcey, or to
arrange a systom ·or
in°?ico.ting this start inc; point i~ j;}le.. _.t>Jxt of .. th.a cr:'llto-
a
gram. Such a systa:n is cabl.·3d. .££.1!.°t~.!1-l?.:U.E~o..t syst.)iD.·.· . Other n~~m.es ,applied
to it are nonrepaatin&, riuining ;: or .!!!.~E-~i:r~j:..~_e-:~cJ!:. systc::DS. T~~ephonu direc-
tories, tho Biblo,' standard: rofe:t"enc-:. war~~$; ot:c.i ar:J of'te!I. used as ;;ource
books for such kc~-s. · · ··· · · 1
.· .....
. . .. ....
]?,. Various tY:Pes of ci:ph-3~ al:?;ihpbet~· DDY be a~J.:O:red 'in this system,
direct or reversed ·~andard :alphab::;ts,. r'1;1-~4: al.:phabots··arawti_ tip ai random,
0
..2.• As an o:xo."Jt)lc . of' the m~hod oi' cr;..?togra:phing,· suppose the i'ollowing
Illi)ssago is to bo ~DCi!Jh·:;)l'!.>d on tho ·c0ntinuous key ,principle, using as tho koy
the text oi' this sub:paragraph, bllgin..Tl.ing .AS .AN EJ(f4.j'/IPI.3 ••• ~ and· rovilrsed
standard alphabets:
Koy toxt:
Plo.in taxt:
-ASA.."'m"·
H!l:A.VY
XA!.-I?L
INTER
EOFI"'d
DICTI
!:.:.l!:!.'T.l:I
aNFIR.
ODOFC
E.J.l;ALL .
RYPI'O
lliGA.T
...
....
Crn>togram: TO.ASG PNTLU BGDAZ ~ZLQ. ICYOUR JLJTV ...
40. Auto-key syst~rns. - a. Tho ciphor lett0rs oi' a crY!>togram may
ssrv::; as !coy lott'-lrs, thus autOOD.ticall;i- furnishing n key. SUp:posc, for cx-
amplo, that two ~arr'3s~cndcnts ae,Tcc to usa th9 'o/Qrd '1'3UE·as an._1nitio.l key,
and su_-pposo tm mossa.::;v ·-to b'3 :en:c·ipho:i'."·5d · (w;tl:i .tho obsolete· u. s . .ArcJy ciphor
disk) is a.s f'ollows:· · · ·· · · ·· · ·: · ~ ..... ~., .... · · · · · · - '· · · · ·
: o e •• • • ' o ,• ', •e o t "' • • • I
·." .....
HEAVY "IlffilID1CT:tOI·~ Fire:· F'.ALL'n!G AT. ·•· ~. ~
. .. . ...... ·.· ·.. ·
Tha first :f."our._iott·:)~ qro ;:,nc_iphor~~ . a.i;i:shown=·
. . . :. ' ~ . .. . . .
Koy tuxt: THOE . . ....
...
Plai.."l t~xt: HE!VY .nrrz:a · .....
ntdTt · •••
Cryptogram: MNUJ
Tho ciphor lotters· lF.UJ n~11 f'orm. tho lm~•l-:;,t·brs f'or enciphering thll n-»::t four
plain-text lottors, YillT, yielding OF"'rlQ,. Th·J lnttor th.on :torm ·tho ke;:,~l~ttors
for ::;nciph0ring thB _:noxt f'our luttors, ·and· s0_ on, ~·i9lc:i.:1,ng. tho :f'ollow.i.ng:
Koy tuxt:
Plo.in text:
TRUEH
EEAVY
£rtJjOF
·rn·rE.:t
HQJCOE · · rrn1u
DICTI . OHFin. .
VQODR LOSGD. •...
.nmAT •••
:omim:· ...
EF.A.LL
Cryptogram: :MNUJO
.
FR~O ::urvw UVQ,OD .
Ri:._OsG.
b. Insto.ad of' using tho. ciph·.:1r l,u·tt'3rs iri. ·sots, o.s shown, tl10 l:lst ci-
phor I'vtt:.lr gi v;a.n by th~ us~ ot thtJ ke~rword im:y boccxna tho koylcttcr i'or on-
ai:s>horing the n.:;xt pl::lin-toxt lettor; tho ci:phar rusultnnt of the lott0r then
REF ID:A56930
- 57 -
bocom.:.s th:u kcyl.ltt•.Jr fer unc!plu.ri.!lg th.J i'ollowins btt·_)r·, aid so on tb·. tho
and of tho mssag::i. Thus: ·
Koy t o:xt : TRUEJ" CZ.RPi1 O.AIITA JF.11.li.P . EWJD.1.. . • •.•
Plnin· torl·: HS.\"VY DI CTI o:mrra EF-\LL DrG:lT ......
or!rptogr0L1: IvIMUJ'L ZRP:1C .AlrL\.J F.LUPE 'NJn.Uf · •• ~ .
c. It is obvious thr:t nn initi:-.l. ko~·vrord is not ll'JC0SEmr~·; i."\ singlo
prearranged l~tt~r ~ill do.
_g_•.. Tho pl~ili. _t\l~: ~.tsol! mcy sorv:e ns ::i koi,_ ~1'ti?.r .. ~ ·initial group or
on inititl latter. This is shown in tho i'Ollowillg. 1Jx::iraplo, ilh·~rcin tho text of
tho mss~ge itsol:t', .'.'.ft0r tho pr:.;::i.zr....•::ingod initinl !myv«>rd TRUE, .toms tho ke:r
.toxt: ·
Koy text:· TB;tJEH E.\VYI N',l.1ZRD ICTIO lOO:aE F...'.LLI· •·.••
Pl:i in te~::-t;: HEAVY INTT'..la . DICTI ONFIR EF-\LL INC'z:'..T ••· ~ .
C.rypt ogr.o~m: Mt!UJJ WNCUR . XLCYV . UPC ..UC J..."..IGr XlMP • ~.
o~ ·Althoue;h. rovor&Jd·standnrd nlph~bets hnvo used in all th~ foro- boon
going-e:omplcs, it is obvious th..'.lt v:irict:.s t;r:pcs· oi' nl.ph:ib"ots may be o:mployed,
!ls proo.rr'n.IlGOd • ·· · ,· · : .·
. .
The follO!'dng rotb.od; though it "Itl..'ly. nt first o.p:po:'lr to bo qui to dii'-
f.
f~rorit, is in re~lity idontic~ with those jus·t doscribod. .i mixed sequanco is
pr&p:u-ed end its eleiaents nu:.nborod in
scquonco. Let the ~ixod sequane~ be de-
'nved :tr.an the koyword PERMOT..'.':..BLY:. . .
·E5 3 7 .5 9 8 l 2 ·4 10 ..
P E R MlJ T ~ B-L--:y-
0 D F .G H I J" K .N '0
Q.SV·WXZ
A _j B K E D S L N M G W P C Q a F V T I Z U H X Y 0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 :26
t.et. tho m.essa.go·bo tho s".',mc· a.a baf'cro, nnd l.:st the first ~ttor bo its· o..m
cipher equivalent •. E::icll cipher lotter f'rom tb..--:t point on is producad in turn
by finding the ~um of th~ numJric~l equiv~+cnts 01' tho prucoding cipher lettor
and the plo.in-text l•.Yttor to be onciph.orcd. i"lhon this totr.:l vxcoods 26, the
lc.tter amount is dcductod ~nd the l.Jttor cqui V'."'.lont of tho ro::::in.indor i~ tcko:i;i.
f'or the ciphor lettar. Thus: •
K~y text:· (\ 23 2 t"')"' 16 . 21 11 .17 11 25 18 12
3 21 2() 14 .......
~
Plain text : F I R E F A L L I N G A T
Numeric~ vnlue: 17 20 16 5 17 i· 8 8 2() 119 1 19
Kayed va.lue: 38 32 22 27 18 19 27 9 29 12 23 24 43
(Less 26 or 52 l2 6 22 1 Ia--r9 i 9 3 12 23 24 17
if necoss-'lry
Ciphor text: Yi b u •
J..I. V· T ....\ . N :A w . H· x .. F
------. ------~--'-····------------
- 58 -
·- .
&• In the foregoing example the aucceaaive cipher letters form the auc-
ceaaiTe keylettera.; but, .H.s noted in _aubp.ara.er.aph Ji,. t)'le auccesaive pl:_llin-:te.xt
letters may serve KB the successive keylett~rs. • :
•
h. The SC'llDe·results can be obtdined by the uae or sliding strips beari~
the mI'xed alphl&):fit, Study the following dia~ript show~ng thP.. succes.s'i-ve positions
ot the movable s~~~p and compare th~ results with those obt~ined in subparagraph
-
t above.
.
·· · · · ·
•
REF ID:A56930
.. 59 -
sequence in which tho vc.rio11s cipher c..lphr...bets ·uro ust;d may_ -or. im.y. nofe_ ~n~e
with et:..ch mos&t~gc; if it does~ this constitutes i:.11 t...dditio~&.l o],.~_mep:t o:f _secrecy •
. ·•
- 60..a.
.so simpl~ a ·scheme ..as lotting uach l~ttter ot the key s&rve to. enc;J.ph~r a
complete.. word of'. the te:x:t ie llBC>-d; since words ti.re of irregW.u:r lengths c.nd,
there is little or no rcglll.arity wlu..tcver in the seqllence of words with re-
. spect only: t'o. thc.ir ,ltmgths, periodicity. Cf'Jinot· z...ppei:.r. All ex:r;.mple of. en-
cipherr:10nt will. be'. usuf11l~ ...
Xoya D. E B i-. R .
Pl~in T6.x.t: C 0 L L ECTJi.L L 5· T R i. G G :LE R 5·5 T o·P t.E N_D TH
Cipher: B P 5 S il.CLET QJ n ARLLGNLZZYDCZNEOYK
Keyi K D.
Plain Text: E K .F 0 R W A R D .A T . 0 N C E
C_tpher1 G Y l!' W '1'. 0 lC T H K R P Q B Z
.. ..
Cryptogrcm: · :B P S .S · J. CL.ETQ JHARL L . . G· !f A Z Z Y D C .Z N E__O. Y·K
GYFWT OXTHK BPQBZ
·!• The foregoing tD:i:cmplt:1 e1:1.plQyed_ ~~v~~~ad·-_ sti.ndLi.:rd; &lph&bets, bat
. _.mixed alphabets of' &ll typ{;is raq readily be used.
· ·. e. :If the kr::.yword· h .short, und the· message long., pcriodichy ·mq cr~ep
. in despite.the irregtil~r groupings in the enciphf:r~nt. ·su.ffi~ie~t evider.ice
· · ·-~ even be obt~ined t.:> l~ad to c. 41sclosu.rc of -the length· of ~.-the key. Bat
· -·if' the key consists of. a long -vJord, or .o-r c. oomp:!.ete pQ.rase. or. sentenec ~ the
text would hll.ve :to be very long in order tht.t eu.fticicnt evidences of __ periodicity
be toun~ to mil.lee-possible the determiDL:.tion of.t~e·length of. the key.
REF ID:A56930
- "61" - ..
Key: .. U. . 'N: . • · · · · · · · ·U · N P U
Plain Text: ·o:u i(. ? R 0 "N "T x . L ·I N·-E ·s ~RE NOWX REPORTED
d. It is o.lso possible·· to ·interr11l>t tho kay rcgulc.rly, cu"tting it up
into equo.l length secti:lO.S. na, f'or eXuil.ple I y; 1th the keyword EXTDIGUISHER:
m' / ~I / TIN / ING / NGU / GUI· / UIS / ISH / SHE / HER. Each set of tlµ'~e
keylctters 1!1£.Y serve to ~ncipher & set of three plc.in-text lett&rs. But it
is possible to tlakc ct.ch" set of.three keylettcrs cpply to J:10re than three.
plc..in-text letturs, or to irregulGr gr:lupings of pl~in-tcxt letters. For
exi.mple • suppose i:::. nl.1D'1Gr~cr.1 key be · dGri vod from the kcyv•ord:
B X T I N G.U I S H E R
""1•12-10--5-·'1-3-11-6-9:--4--2--li
Let this numerical soq~nc& ~~teroino how r.m~ l~tt~rs will b& enciphered by
each grouping of' the key. The eJa".inple bele>w will illustrc.te {rcvcrs~d stc.nd-
ard ~lph~bets ~re usud):
. . ·
Nucber·e: . l 12. . 10 5
Key: E XTIXTIXTI"X.TI ·TINT INT INT· I!TGIN
Plc.in Text: 0 0 L L E 0 !I' A. L L S ·T R AGGLERSSTO '"p 5 END
Cipher: C J I X T R P X I X P .la. B TOHIEYl.BQUF TV 0 V K
Numbers: 7 3 . 11
Key: N G U N G UN G U I. . U I S U I S U
Plc.in Text: !I'HEKFOR. -Vl"AR Dia.TONCE
Cipher: CJ Z Q .B .B G ·w.. · }{ ~ R- . B I Z G V Q. Q
-----------------~~
SIDTION X
REPEI'I'l'IVE, ·sUPERPOSEl>, AllD CCJ1mINED SYSTEMS.
.Par~!aph
Supc.renc iphe ment •• ; • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • .. • • • • • • • • .. • • 46 ·
· · Repetitive monoc.lphabotic su.bstitution systems.•••••••• ! ••• ~--~.••. .". ·· ·: 4~
Combined mononlphabetic wid polyalphub·ctic sub1"3titution syst~ms ! : 48
Repetitive poly~lphc.botic substitution B"Jstons •••••••••••••••••• 49
Repetitive trE..nspllsition systems • • • •• • •• • • • • • •• •.• • • • • • • • • • • • • • • • 50
Combined substitution t.nd tri:;.nsposition systems ••••••••.••• ~··.... 51
46. SuperenciphulT.lf.:nt. - o.. \"/hen, for purposes of .~w;menting the degree
or cryptogr~phic security, the plain toxt of El. rnessuge 1.Uldergocs a·first or.
prim&.ry cnciphcrcient and the· resulting cipher text then··undersces Ii. second .or
secondt.ry ~ricipherment, the system ns n whole is often.rt:f~rred.to as one in-
volving superenciphera;nt. If the two or nore processes c.re; wel"i selected, :the
objective is r...ctually rol4.chi;;d, und the resu.lting· cryptogr~s P,r.cscqt ·Q.:~rel,r.tively
grec.t degree of cryptogr.hphic security; but sor..tit im,es this .is ..n~~. G:Cc~m:Pl."t~hed
and the augr.iented security is of a pu.ruly ~llusory chc.r,Lctt:;r. The riru:.l" crypto-
gr~phic security r:w.y, in f~ct, bo n~ bre~ter in desroe tho.n if' c. single encipher-
ment ht.d been dffoct~·d, c.nd. in.unus\ir.l ~c.:scs, it mcy even be loss then before.
b. It is impossible t·~ describe c.11 the cor:ibin&.t1on~ thnt ·might lie. an-
ployed; only Q. very few typiclll cc..ses cc~ here be trij"t~d, 'CJ:ld these will be
selected with c. vio11 to illu.strc.ting gi:.neral principles. · It is. posEiible to
pass .e. mcssc:.ge thr._ough 2, 3, ••• succeuive processes of su.bstitutio~; or
throush _2, 3, ••• successive procossos ~.r "trc.nspo~iti:m, or: su.bstitution·me.y
be followed by transposition or vice vers~. · ~ exm:i.ple'of ench t~pe Will be
given. ·
. . .
,.\
- 63 -
.. . . ..
the . C to indict.te.thc.t a given proceBB is on£i.of Sll.bstitution or or trt:~naposi
ti~,n. T~u~,-_th_e.. ·a~up&_in.i:. .systc.m whQro a first s11batitution 11.follo:wod'by
~ sucon~. su.bs1i~t11.tio'n"c•.n be r..::prus(,,ntad symbolic•.lly by BC1 ~ sc2. In' a .
siml~ll.r ~ur,· ~Ci'_-:-~ tc2.reprea\Jnts'double trruisposition_. Tho· s~ol sc 1 -+
tC£ m.;;,~ns .·~ht:.t tho ·t·t:;)~ from· r. first procvss of sllbstit11tion Wl®rgoos · trc.ns-
position. ca.a n suc·ond· proc\iBB.
... . . ...
47. Repetitive mono~lph~betic s~bstitution 6yatems. - ~upposo a·mcssi;gc
und~rgoce a primur1 unciph~rment by mc~ns of a single-mixed, nonreciprocal
&lphGb6t, Lnd th~ pri~ry cipher tuxt under~oos c sccond&ry encipharment by
mci;;ns of the's~lll<) or.a. different .mixcd·~lph~~~t. Thu.r&sulting cryptogrcm is
still monoc.lphnbE:.t.ic ·in· chc.r::.ctor,.c.nd.pri:.surit.8.;vi.:;ry little, if' r:.1J1' r~UBl?lenta
tion in the degree· of socuri1iy-{dopending ilpon·:the•t~~e·: of ·t;lphabe;t umployc:.d).
Heru an dntir6l1 illusory incro~so in sacurity is. involv~d f.nd Elr1 incffectlll'.l
·.complexity is 1ntro4uccd; .the~proo~se zaq·J.ndEtod;b~ rcpot.ted .indo:f'.initQ~Y with-
.. ·a·tlt produciiig the desired t~sult. _Th~s. is b~ce:11.sc the f'.~df.;men1;~1. l!l'-~~c ·~:f.:
monor.lp~:butic .substitution:hc~s ,not ·bce.n .te.k~n .into cons1Q.eJ;'.'L•:t:1o.n..in ,t:tie 9~ . ~
temp~s at su.p~ren~iphemont; .. sc:i;. ~ ··sC 2 ~ ..o.3 ...... , .~.tU.l ·re.ciai~s mqnoGlPh~·:-
betic in ohc.rr.cteir·.. . .: ·. . , : . . · .. · . ·.. ·, . . . . · . . · .. · . .. . . ..;-
. ·4ra •. : ·C~mbin~~-m~~~~1:P~~b~t1~
Md. P<>;l.~~.iphab·l~t.1:c :ciu~st·~t.tit~Qn sy~~.~~~/~
.. E..
If a messr..ga undergoes a prir.ia.r;,r enciphe~n'\: by t.he ;rQpe_at:i-ng~k~y .met.hod, ·~s.ing
stc.nd.a.rd dphc;bet s, c.nd the primc.ry cipher t'e.xt then undergoes e. secondGry ·ttn-
c~phQ:n!l{;;n1; by mouna o~ ~ single-mixGd alphc.b~t, thu degree. o~ cryptogr&phic
se*u.ritt ~~· ~fi:c.rql::~ed)o tiiu aruiio'c%t~rit th~t ·u:waf4ci·.-'be:·1f ·th& o~~f,;:ln..'l~ .~~
sr.ge had widor~ne the 'fKimo ·prfmLry :anc:i:phorn1erlt · 'fii'.·th socondt:ry··clpnri.bet·li ;r·e-
suit:i.ng·:rrom··.t!id s'.Uci.i.ng ·of c. mixed :prir:iuy. sequ.oJlC·e :agtdli< :the ·.noror.l ·:seqli.;incc.
This increc..ae 1n security is not vary·gr~.t. · ·.:· .. / .. ' ·:·· .: . · · ...::·:! : .... · .. ·:<
•.. ·E.,, . T~e .sr.ae .is tz:~ i_f' ·. ~h~ PZ:~!l!~Y ..1~nci.~n:io;t, ~~ r.l0~~¥~~be~~.~ and the:.
s~co~~r-Y. ~n~iphurr.Ent· .. is _.pt;>lyr.ip.h<.:b.o"ti.c ·.b:f.. t,hc .r.io:~hOd C\t.acr~Q9.d. , .J .. . . . .
.. : . .
.c. .
. . . ~ ..
In .genc.rc.1 1
I a'''•
' :'•
... ' . .
•
. .
• I •" • •
. . . . . .. . . . . . . •. .
•• •I
:'
., •
'
'"
.. .
• ... 'ol
.
• .t' ' •
.!!..• If mix~d &lphabets Ql'O uoed; c.nd if those of the pri'flr.ry r..nd the soc-
ondc:.?j onciphcrmunt belong to the sr..1:1c sc;ries of secondtlry &lph&bote resulting
from th6 sliding of two pritu.:.ry euqu.enccs r..gninst e~ch other, th~ results ure
similr.r in cht.r~cteir to tt..ose de scribed under Sllbpt.rc.gri:..ph "' abovo: thEly a.re
identicr~l with those tht:.t would bu obtc.ined b7 e.n equive.lent single 1:;nciphcr-
cent by the c..ppropriti.te . secondl.ry i:.lphllbets.
c. for
If ·tho key the secommry enciphercient is of n different lungth
fror.i thut for the pri1;u.;ry enc ipha~r.itiht, the results ~~rE;. hov1ev&r' soue;whi:,t
diffsrent, hi thi.t. thil ·period of ·th~ ·rcsu.ltc..nt cryptogrc:\I'.l: boco~s _the lqc,st .
·~· ..comr:ion multlplti of "th.t:. ·two kt;;y i~ngths. For cxc:uplc, if· the length ot: .the
key for the 'prir.icry onciph..;rr.ii.;;n.t i~ 4, thd for th& s~condnry, 6, ·.the· result
is th..; st,rac e<.s though c. k.::y of 12 e:lenunts hc.d be•... n .:.mployod in c. single
enciph~rrJont. This ccn be:· demonstrc.tud us follows, 11sing the ·keys '4-1~,2.... 3
end 5-2-6-1-4-3:
. 4· l 2 3 4 l 2 3 4 1 2 3 4 l 2 3 4 l 2· 3 4 l 2 314 l 2 3
: . 5 2 6 l 4 3 5 2 6 l 4 3 ·5 2 6 l 4 3 5 2 6 l 4 3 5 2 6 l •••
..
;· . . 9 3 8 4 8 4 7 5 10 2 6 ·6 9 3 8 4 8 4 7· 5 lO 2 6 6. 9 3 8 4 ....
d. The d~gr~c of cryptogrr.phic security "is,· wi t.hout do11bt, in:crcr:sed by·
su.ch C:- method. If the key lengths r..ro properly selected., ·thb.t is, if they pre-
sent no common mu.ltiple l1Jss· th~n t.heir product, tho motho'd.·mii;y give crJrpto- ·.
grams of grant s&cu.ri ty. For oxc.oplt3, two keys thr..t ere 17 ~a· 16 · cha.rr.ct.crs· '
in length would givo u cryptogrL..rn th~t is oquivclont in period to th~t of a
.crJPtogrcm cncipherod once by a koy 17 x 16, or 272 olcccnts in length. The
f:und.a.r.ientel-principlo of en excellent, th9ugh cocplicc.ted printing tclegr&ph
cipher system is this very principle. ·
50. Repotitiv~ trruisposition systems. - Thuse h~vc been doclt with in.·
Section III r.nd n0od no further discussion &t this point. It w~s thore shown
thc.t properly sE.lcctod trLnsposition methods when repetitive in chl.rc.ctc.r c&.n·
produ.co cryptogrc.ms of Vf;ry groc~t socu.rity.
.....
···I.•
. . ... . ...
REF ID:A56930
- 65 -
SECTION XI.
. . .
cm.mrn~ SUBSTITUTI01~ - T~lSPO~ITIO.i{
' • a
5YS'l'EMS.
• '
Paragraph
1tonoalphe.betic and· po~ralp~ab~tic substitution combined with
transposition •••• ~ •••••••••••••••• ~ ••• ~ •••••••••••••• ~..... 52
Polyliteral substit11tion combined with transposition •• • • •• • • •• •• • • 53
. ; Fra.ctioriating. -.syst.ems ·~: ••••. ~; ••• ~ ••• ·•·• ~-.·.·.·. ~. ~ ••••• ~ ••• ~· •• .; ••••• ~. 54
Comparison of for~g:oing f.racti9nat_ing system With certairi digraphic· ·
systems .•.•••.•...•...••••...•• ~. ~ .••••.•• ~ ••••• e.:.•• -.. ~· ..... ~ •• ·. 55
Fractionating syste~s as· forms of combined substitution ~d trans-
position . •,• .•.••·•...•.•. ~. •.• •.•...• •.• .· •.••.•.. ·•........ ·•..•..• 56
Fractionation and recoinbinat ion within ref_;u.lar or v&.rii..ble grqupings
o·f ·fractional elements .••••••.••••••••••••••••• , • • • • • • • • • • • • • 57
Fractioru;.tion combined with co'lui:inc.r trV:nspo~ition ••• ·•••• ·• • •••: •••·• · 58
b. As c.n cxampl.:;, note the follb·wirtg ~irn~le combinc.tion; using the mcssl<.gc
ALL ACTION.~ ~rn:um BEACH ;iµ.~ CEA~ED,....
Plt..in: A B C D E F G H I J K L M N 0 P. Q R.S T UV W X Y Z
Cipher: T D R A M 0 B N I L P E. Z Y. ~ W V U :· S Q ·x J"'ll G· F C · ;
l!cssago;. E D
Ciphcrt. M. A
2nd step:
.
·TEETRQIX . (F~r th~ 1~·~-~ript ion;.~-
. .ri;ct~~le·
.. . of dg~1t
. . .. columns.)
.
Y T Q E T Y .A I
YBDMTRNl'l {For the tr~nscription; couiitcrc'.lockWlso roil.ta b·cginning
i:r··5 ii l(T s M A · ··a.t · ·1ot1or ·r1ght· hund ··corner. ) · · · ··
· · · · ·· · · · ....
\'
. .. . ... . ' ..
. , . Cryptogrr.m:- . a ·N: ·I··X I . q,::R T: •E"- E.: T. y y T s ..R: li-T 5 u
Q T B D 11 T R
- 66 -
d. An extremely simple, ~nd yet off~ctive transposition method {when its
prcst..nco is not suspl~Ctbd), sometimes employed as a preliminary to substitution
is that in which th~ _text Qf a l?iessage .is -first divided into halves, the second
being.placed under the first as in rail-fence writing. Thus:
P o E n o o , T - ·F . 11 - A K . :rr·.,. o-
.R ... C - - .Ji: ...T ·. ·P- · ·R· · •G·••E· · •B• ··R·· ·A·· ·I H.
J •
I • • • ' • • ~ • • • • •
Then encipherment. .by .s:Lmpl.e .monoa1phabet:i:c ·methods ·may ·be effected,· and the~·ci
pher text ~akenfroni the-two ·separate ·nnes.·· Thus;.if· a standard alphabet one
letter in adv:an.c.e .wer.e •Used,. .the teJE'b -would -be -as ·follows: - · · · ·
Q .. P. •. F. - . .E .. .,P - :P · · .U · • ·G · · ·N · · B · · ·L · · :U · ·P · • · :
.S D' ~- U · Q S P :y- C: s- -B J· 0
• ' • • I .. • • • ' • • • • ' ' • • • , II • II • \ • • • • • ' •
Cryptogram:. - Q P. F. E. P. - . p er G. !{ B .L -u p s D ·p U' ·Q s p: F ·c s :a J 0
W t R T R A 0 C
I L- E · · U -ir T- · N E- ·· •
Then the following pairs would be enciphe:ed: RTp, ~' QC , I1p, etc. The Wtp,
foregoing message enciphered in this DWJlner by means of ~h5 Pl~fair Square shown
in Fig. 39, for example, yields the following cryptogrnm:
_ .Cryptogram: V 0 I R T N L T C Q H N AR R P
-§..• .. Cc;>l~ar transposition methods .·lend themselves especially wel-1 to_ com-
bination with substitu.tion methods. An excellent example will -be' considered
~e:r-
... the next sect ion.
. ... . ,
l
In preparing. the text for encipherment, the clerk mu-st·· bear .in mind that if a
Pl~f'a1r· squ:ar'e is to
be u.Sed no doublets can be enciph~~ed.. -The- me~s~e WE WILL
LE.AVE ••• would be arranged thus:
w x I L x E. v . ;
. ...
•.
x
•
Yi L-
. -- E
.
L
.. ;
A·_ E • ,I •'Jo •. ' •~ ~ ;,
REF ID:A56930
- 67 -
53. Polylitoral substitution combined with transposition. - a. In
Par. 30-b the essential nature of polyliteral silbstitutfon as aon::tr"ii."te·d. with
monoli ters.l substit11tion WQS. discussed. Polyli terc:i. met.hods'· make "u:Se pol:y- or:
partite alphab~ts in \1hich the cipher equivalents· are ·~ompos'ed o~ two. or· more
parts. This·being the·cnse it is a natural extension· of cryptogrcphic processes
to ~ep&r&te these parts or to distribute them th~oughou.t the c1pher tex:t sc;> that
the components, or, so to· speak, fractional parts ·of the ciphe;r equivalents are
thoroughly disarranged and: distributed· evenly .or··irregularly ·throilghout the text.
Such systems may be called. fractionating systems. ·~
.. 54. Fractionating systems •...;. a. · A simple ·e~ample· Yi ill first b·e sho"&·n.
Let the follovdng bipartit.e· cipher ·alphabet be diawn ttP by assignint nli?ne'rfcal
equivalents from 01 to 26 in mixed sequence to the letters of the no:rma:l sequence,
Th,us: -. .
·· :
A B C D E F G H I J X L M N 0 P Q ~ S T U V W X, Y .. Z
. 0·2. u .06. l.2·13 05. :10 14 09 J.5· 16·17 01 03' 18 19 20 08 21·07' 0.4 22 23 24 25 26
.. '
10
b·., :. "T.he. f"oregolng. ciphe'r' ·text cB.n. i1e ·transmitted in 5-figure groups, or
it can be reconverted into letter.s by one means or another., l:)ut some .diffic~lties
are encountered in' 'th.e iatter ·case becfil,use every one or' 100 different pairs of
digits has t·o be provided tor, thus necessitating a 2-letter substitution, which
would make the cipher text t~ice ~s long as the plain text.
'. ' •' ... =--~ •I I:. I'; • • •
.. "1 :;
- 68 -
The same pr.ineip.l:e may be ·appli-~d to :trU.id- alphabet.s, · c.111p~oying th~ perm11t~ti?ns
of the three digits, l, 2 and 3, taken in gro~ps of three.
• • ~ :. • '. i • ~ • • '.
e. Note ..the· tol"lowing bifid ;alph.a.b~t and t}le. example 9f .its use i~ enci-
phering a message: , .
A .B C D E F G H· l-J 1 K _L .. M .N .• 0 P., Q . R . S. T . U V Tl X Y Z
12 31 21 32 33 15 25 34 24 35 41 ·ll 13 42 43 44 23 45 22 14 51 52 53 54 55
. •. ' ~ •• ;. ' .! .; - • . ,. • ~
iiEPORT.ED L 0 s· T
2 3 4 4 2.2 3 3 .4:442
:s s·,:s 2 '.3 i :3
.... ;2. 'i ~·5 .2
The bifid elements,. 9~:.a.nd Q~, ~re ,n_ow _reco~bin~d ~orizonta~ly in pairs.an~ the _
pairs are reconverted into letter equivalents of the basic alphabet, which, for
the sake of conv,enie~~e , ..is. her.e. 8.J'range_d .,in tl.1-e form of. a deciphering alphabet:
J -.I,,• o• I • • , ·I , •., • • '•' · ' •o I J •• '• ' ,, • " , , • 1 •
.
·••
.
I• ,'• I•• • , • ' •.·· ,· • • •• , , ; ' ...
.: ~ : . .•
.
.... ' ...... "i'" .· t_., - • , ~ .: • : !. • .• •
REF ID:A56930
b. Tc.ke the inoss.i;;.ge. of Pllr.• ··54-e and let a·..si.ight ni.o.dif.ieatibn ··in t1ie meth-
od ofre~ombining 9~ and 9S
be L1ade~ _Specifica:t.ll, let tr.e first halves ~nd_tP.-e
second halves of the bifid equivalents:·of the pla1n.;..text letters be combil;led~·in
the following manner; using the bif~:d 'alphabet of·Par. 54-e: · · ··
!,{essage: 0 U .E P L A N E R E P'·O R T E n L 0 S T
ON E p. LA NE RE p 0 _R ·.T ED L 0 s .""T
4 l : L 3 ·4::::·H 4 l : L l 3 : N 2 3 : R 4 4 : Q :2 ·2 : T 33:E 44=Q 42:0
2 3 : R 3 '3~::.:E! l 2 : A 3 3 : E 3 3 : E 3 2 :·D · 3 2 : D 3 2 : ~ l 2 : A ·~ 2·: W
Cryptogram: . L R H E L A N E R E . Q. ·D T D E j) QA 0 w
If the cryptogram given in Par. 54-e \~ere split in the middle into two se:ctions,
and the letters takon alternately, tho result ·would be identical v:ith t~at. ob-.
tained in this subparagr1iph. The identification referred to in sdl:rparagraph a
above' is now to be demonstrated in the folloviing subparwaph. -
c. Note the t\Vo-alphabt:t checkerboard sho:-vn in Fig 44 •.. If th~ ~ame mes- .
:.: sage Ts ":now enciphered by ·its inuans, a crypt"ogl'ajn ~'9.~nt.ic~l Wi'.th" that ~~tained:"
..: in su.bpi:ra.graph 55-b will be· obta.inod. Thu.a: ·. · · .: · ·
KANUF
CTR I G
B D E···H- K · 0 N E· P L A I~ B R E P 0 R. T ..E: .D '.. L? 0..$ 'T •.. ..
..
;..
•• ~
L 0 P QS •• • ·.• : •1 ;·: .. . . •.
d. In the example in Par. 54-e, the s&me bi£id alphabet was used for the
recomposition as fur the decomposition.·. Instead of 'converting the combined a~e~
elements into letters by meens of the original.bifid alphabet, suppose a second
bifid alphabet specifically drawn up for this recotp.position is at .hand (see Par.
54-f). Thus: · · ·
11
12 =u= A 21 :B
22 -- I
31
32
-- c
=n
41:
42 =N
K 51
52
=v
=wx·-
13;:·.T .23 :! L 33 :F 43 =p 5-3 ,':: .. .
14·.:.o =E
25 - s
.. 24 34 =G 44 =RQ 54::: y"i I '
,.. o o
..;
••
• 15 =11 - 35 =H 45 : 55 =z
.. :;·;."
- 70 -
The encipherment of the message is then as follows:
A: 12
=
ll = 13 11: A 34 =HG
::s31 0 =42 12 u= 35:
c = 21 p =43 13: T 41 : K
D : 32 Q = 44 14 0= 42: N
E: 33 R : 23 15 =I! 43 =p
F: 15
G : 25
=
s 45
T: 22
.il =
::s
22 : I-J
44 =Q
45 : R
H 34 = u =14 23: L 51 =v
I-J: 24 v =51 24 : E 52 =w
K 35 = w: 52 25 =s 53 =x
L : 41
},{ =11 x = 53 31 =c 54 = y
y =54 32 : D 55 =z
z =55 33: F
Encipherment:
O N EP LA NE RE p 0 RT ED L 0 S T
4 l ~ K 3 4 : G 4 l : K l 3 : T 2 3 : L 4 4 =Q 2 2 : I 3 3 : F 4 4 : Q 4 2 : N
~ 3 : L 3 3 : F l 2 : U 3 3 F' = 3 3 : F 3 2 : D 3 2 : D 3 2 : D 1 2 : U 5 2 : W
Cryptogram: K L GF K U T F L F QD I D F D Q. U N W
:Message: 0 .N.. E P L A N E R E P 0 R T E :D L 0 S T.
IMA N U F A U T O 11
le TR I G ::SILES
l::SDEHK
LOPQS
CDFGH
KNPQR
li_v'. x y z v .w x y z_
~CKV 1.ICBLV
U I D U \i ·A T D 0 VI
I TLFPXINREPX
I OEGQY UIHQY
M S H R Q F G__ K S~.
!
J'ig. 45
Plain Text: 0 11 E P LA NE RE PO RT ED LO ST
Cipher Pairs: K L G F KU TF LF QD ID FD Q.U NW
Cryptogram: K L G F K UT F L F Q. D I D F D Q. U N 'V/
The results are identical with those obtained Wlder subparagraph~·
REF ID:A56930
- 71 -
f. If the successive letters of the cryptogram of subparagraph b are
enciphered monoalph.al:etice.lly by means of the following alphabet, the results
again ~oincide with those obtained under subparagraph~ and~.
Alpha.bet
Message: 0 NE "
PL AN ERE p 0 RTE D ~. . d sT
·.4.. 1 ..3 44 1 1 3 2 3 4 4 2 2 3 3 4 4 4 2
.'"2:3-3 3 l 2 3 3 3 3 3 2 3 2 3 2 l 2''$ 2
Then, let the recombina.ti~ns be.effected within the groups, horiz.ontally. Thus,
for the first grollp, the recombinat·i6ns are 41, 34, 4.-St, 33, and 31. The eii.tire
message is as follows:
Recomposition( using the same bifid alphabet as wns used for the decomposition)
yields the cryptogram:
~---------~-----------------------------------
- 72 -
1
The reason for the regrouping sho~n in the final cryptogram requires a con-
sideration of the fa.ct' that a: tr'ifid ~l·phc.:bet inV'Ohes the use of 27 characters.
Since our alphabet contains but 26 letters, either an extra symbol would h&ve
to be used (which is impracticc.l) or some subterfuge must be ndopted to circum-
vent the difficulty. This hus been done in this ccse by using ZA and ZB to
representtwo of the pennututions in the recomposition clph~bet. In decrypto-
gr~phing, when the clerk encounters thu l(Jtter Z in the text, it must be followed
. eitho_r by A or by .B; according to the c,lphc..bct here used, ZA represents permuta-
tion. 132, llll.d ZB re.presents permutation 313. In order not to introduce a break
. iri ~he regUlation 5-letter· grtmpings or o1pher text~ the final cryptogram is re-
~ouped strictly into fives.
REF ID:A56930
, .•, ..
·'- ...
- 73 -
M 0 N T H S
. '·
V/ H 8 A 1 I 9
- . (Key ~O! ~~ternal alphabet:
I. L c 3 0 u. M :t HAili · C-0Lt1.MBIA HAPPY LAND• ·
N B 2 p y N D ~- ·: Digi1;s, are inser~ed ir.unediately
T 4 E 5 F 6 G after ·each letter from A to J,
A l,le~ 1, -B, _2, etc.)
E 7 J f K·Q R
R s T v v· x .z
'
Message:
. ~~: ·T;-_ I~ I~~~-·~~: N'~· ~·I~ ~Jl~ J R~· I~ ~ T~ ~~ m~· T~ t~ .!g I~ lf~ I~~-~~:•;~·-·:
• • ' •·• L. 'f. " •I ·••. • ·.:, .: .,.. \ : .•·•
c T I v E R E A c H E D A T 5 i 6. p .·: ll
0
•
...
· ,:
IO RO WH RN TO. ES TO. WU . IO
. Wli
.
TO.
. ns. VIN. RO TN v;T T?J NN: . IS
. . ~
s I T . lf • M' • ~ • -()' . !1.1' • 'O' • ·r· . Q- • R• • O· • v:· . Ir . R· . N•. T t'. :Q) E . s .:. ";
T o · ·vr lf · r ' o· · vr - M' • T' · t>' · 1-r if . w ·'Jt,.':· :a- v T. ·:N.-: vi·· r·, T ··o·
n N N I. S .. : . . .• .. . .. .. . . . ........ .. •
:: . ···:
....
i. I . '· I • _; : ._ ,0 . ." ; ·, '. .': : • ' ~ :" ~ ; ·. -~ . ·.. . . . .
.
. .. : .~ . ~ . . .. f:i,g .-.. 46.: :·, :.-~ : .. . ~ !. ' .
...... ········-·-·· ·----···--··-··· ·-·-·-----_·---·--··-··-·--·--·---------···----BE~- ID~:~A5~6~93~0-----------~--
- ~4 -
Cryptogram:-
------------~------"-
SECTION XII.
CRYPTOGRAPlIS
Para.graph
Preliminary rem.arks • •.• ...............· ........• •• ~ ...... ·..•· .. ~ :..••. -~.-•. 59
The Wheat stone Cipher •••••••••••• ·•••••• • •• ;. •• •. -e·•••.•• ~ ~ ·• ~... •.• ...... ' ·so
The Jefferson Ciphel' .-~ ............ ~ ... ~ ...... ~·- •• ~.-•• ~ ............. :•••.•• ·61
The U. s. Army Cipher ·Device 7 IJ!ype·M-94 •••-.................;••• -• ••.•• · :62
: ... ..
59. Pr.eHminary ·remarks • . .:.: The cipher· systems· ·aescribed in the preceding ..
sections by no means exhaust the catego~y 1 of complex systems, b11t it is im-
possible to describe them all. Furthermore, each one presents innwnerable pos-
REF ID:A56930
- 75 -
I • • • ("• • ' : : : •: o 0 : J I
si"rlil.i ties for me Ufication in minot ·respect.a, and for combination w1 th other
mst:1l"d.s." In the paragraphs to followt .the princ.ipl.es upon. which ciertain of the
~n~re si:tri:>le mechanica:l crfptographs have ·been ba'sed will .?e .descri~·ad. :
. 60. The Whea~_s.tone. ·cipher. - !:· ·The .device is a 11 ttle. more than four • • ' • ' I
i11cl1es in diameter,·. · ·· ;
and. consist· a 'Jf a . ·.
dial with two ..·h~n.ds,
..
as s·.10,m in Fi.~~ 47. . ·
The d.ial is c<..:n~osed · ·'
of ~wo ·.~nC:e-pd~1p.011t ...
circ~ e_t}., o_i. _1.ett~rs.. ..
. In the- .0,uter:.cird~- ..... ·.
.·._t":he i.~i:i~rs _pro'r~ss ····· ··., : . · ·· ·
, ,.. clockwise .. . .in no·rme.l
).. . .
·;: ·.~Ph~'"!l~t1c s~guence,
. .. b~: there is en elC,tra
. .' ·;c:ha.rB.ctei- between.:··the·
.. ·; ·.)~ .and t~~; A, . ~i~. a
..total of 27. ~haracters,
. : . : S~me of .if!~· sj>~e.s· also .. .
have digits inscribed ... ·
· :· ·. ¥n'..the~, for. encipher-, , ·. · .
ing numbers . In the ..
i'1ner circie the letters
are arranged in mixed
alphabetic seque~~e and .
are inscribed either on
a. 81:l;~face which :,e.e~ tsi. i.::
of eras~re, or on a de-
tachable cardboa.rci cir-
cl~ which can be removed
.·a:n:a ..replaced by another
.oi.~cie bearing a differ-
' ent sequence. In Fig. 47
this inner sequence is a Fig~ 47
systematically-mixed se- ,
quence derived from the keyword FBA.NCE, as follows:
1 2 3 4 5 6
F R A :N' c E
·B D G H I J
1C L . 'M 0 p Q
.. .. s T u v wx
y z
F B K s y R D L T z A G 'M u N it 0 v c ·1 p \V E J Q x
. : -~-·- . :B;. ::·.i'h~; t~~ b.~~s::ar~:·P·ivo~~~ .. ~~~c~~~r~cai.1~. _·al:'. a::r.e·:=the ·};lour and ~1nute
.ha."'lds.of a clock•. Now, in a·cloek, .tlie.mi~ute hand mak~s $complete revolution.
·.whiie: th~ hour lJ,anQ_ .makes: oiiJ.y lll~· o:(a CO~~ete ."revolu~t'?n; the act~OD in the
- 76 -
case of this device, ho•.11ever, is somewhat different. The short hand is free to
·move independently of the: long one, although the. motion of the latter affects
the· former. Since the outer circle has 27 spaces·::an.d the inner one only 26, by
a simple mechanical coritrivanoe ea.ch complet~ revoiution of the long hand causes
the short.h.BJ:ld to make.l-1/26 revolutions, thus causing the short hand to point
one place·in'advance of where it·polnted at the end of the preceding revolu-
tion of the long hand. For example, when the long hand.is over B of the outer
circle and the short hand points to R of the inner circle, if the long hand is
_pushed clockwise arowid the dial, making a complete revol11tion, the short hand
will.-· also .mS.ke
. . ·a
.
complete
.
revolution clock\lise plus one space, thus pointing to D•
_. · · E_• To ·enciph~r. a r.i~s~e, th~ long hand 8lld the short hand are set to pre-
arranged initial positions, "I~ is usu.al to agree that the plain-text letters
will be sough* XBX~lXU:iCX«lifn«XUllX100£X~XO:UXBQ'ilC~XO«
IEiUi~WfDDUUIX'i'iWOOCIKil:Xiil'IUl««Jcin the outer circle of letters, their cipher
·equivalents in the inner circle; and that the long hand is invariably to be moved
in the same direction,.usually clocb'1ise. Suppose the message to be enciphered
is SEND .AMMUNITION FOBWABD. The long hand is moved clockWise witil it is direct-
1~ O"{er Son the outer sequence. The letter to which the short:hand points is
•:
~. .. . . the cipher equivalent of sand is.written down. Then the long hand is moved
clockwis~ to a position over B• the letter to which ·tn:e short ha.rid ;points is
i:.- , ...
·'... noted and·written down. •When a double letter occurs in-the plain·text, as in
·::.·
·.·
the case of the double u·' of .AMMulhTION, some infrequffiltly used letter, such as
Q,, must be s11bstituted for the ·second occurrence of' ·t-he letter. To decipher a
i_nessage, the hands are· returned.to -their initial prearranged positions, and then
the long hand is moved clockwis~ until the short hand points to the first cipher
·. ~
lett~r; trui long hand is. then directly over the plain-text letter. The process
is contin11e4 unt~l all the +etters have been deciphered.
; .
d. A-.con~ideration
or· the foregoing details shows that the encipherment
of a message .depends upon· a combination of the following variab:es:
(l) The sequence of letters in the outer circle. In the case ju.st
considered, this sequence must be regarded as a known sequence,
since -it consists merely of the normal alphabet plus one char-
acter.
(2) The sequence of letters in the inner circle•
r. The s&111e results as are obtained by using the device can be obtained
by u.STng sliding strips or··paper;- providing the ·operator will bear in mind that
~very t_im~ a_ eP. on the p_lain compon~~t- is- sit'uated:_to ·the·-iert of· ·the preceding
i: · 9P' he· must ·displace the ·cipher ccmp<>lient- :o.ne interval to the left-, if the cor-
REF ID:A56930
"" .
- II -
respqnde~t~ have agreed upon a clockwise movement of the long hand• or to the
right, if they have agreed upon .a.. coun:terclock:wi !iJC moveme.nt .. of ,~he. long hand~
61.. The Jefferson Cipher. - .. a. Credit for the invention of the cipher
system and device now to- be described belong~ to Thomas Jefferson1 , the original
inventor, al though it was independently invented ~any years lat·er (1891) by a
French cryptographer, Commandant Bazeries, and still later ( 1914) by Captain
Parker Hitt, u. s. Army· {now Coionel, .. U. s. Army, Ret.) • .Because it was first
described in print (19ql)·by Bazeries, the·prinQiple upon which the cipher sys-
tem is based is usually referred to in the literature as the Bazeries principle;
for the sake of historical· ricouracy, hov1eyer, it is herein called the Jefferson
principle. ..
b. The basis of t·his princ"iple is the use o·f· a set of 20 {or more, if de-
siredT mixed alphabets arranged in a se.qu.ence that ·can. readily b".1,J?P~ged; these
can be used in the enciphennent of a whole set of 20 letters with one and the
same displacement of the alphabets. Successive encipherments are accomplished
with different displacements of the e.lphabets. · · · ·
62. The u. S. Army Cipher Device, Type l!-94 •. -.. This cryptograph is ba.sed
upon the Jefferson principle, using 25 mixed alphabe.t.s on cipher disks. I~i tl,le
follovi ing sect ion the latest desor iption of the device and its method o t: u~e .i's
the same as that contained in Vol. IV of lJ. s. :Arrey. :Ba.sic Field :n~anuai.
SECTION XIII
(2) A set of 25 alphabet· dlsks,·' en the ri~ of. each .'o.f :Which .
tii..ere ·is stamped a diffe~ent, c,omp;Lete.l! .di_sarrang~d &lphabe~;
b• F.ach disk h~s a hole .at the cent~r suitable for mounting it upon the
·centrai shaft, upon which the disk can be revolved forward or backward; The
left face of each alphabet disk is proviQ.ed with a circle of 26 eqQidistant
slots; the right face is cupped, and carries at· one point on the inside rim
o~ thi~ cup a smal~ projecting lug. The guide-rule disk also carries such a
lug. Vlh!3n the _disks .. ip::e assembled upon the shaft, the lug· on'·each disk en-
gages with one .of :the . ·slo1!s on the adjacent disk on the right and. t_hus the
disks can ~e hela ·1n engagement ·in any desired relative positions by screwing
down the· knurled. -thumb nu.t against the retain'ing plate., which is inserted bet-
ween the last alphabet disk and the nut.
!!_• When the thumb nut and ~h~ retaining plate are removed and the alpha-
bet disks ~re taken off the shaft~ it will.be noted that each alphabet is
stamped on its inside or cup surfac~ with an identifying symbol consisting of
a number that is above the central hole and a· letter that' is below it. The
numbers run from 1 to 25, inclu.sive, the letters from B to Z, inclusive. These
symbols are employed.to ·designate·~he seqaenee·in·which the alphabet disks are
to be assembled·upon the·shaft in· cryptographing or·aecryptographing messages,
as described in P8:ragr~).~'"66 below. Either symbol· may be used for this pur.;..
Pole (as prearranged) btl.!fr for the pr·esent only the numerical identifying· symbols
will be so u.sed. ·"" · • · · · ' · · · · · · · · · ··· • .· · ·
65. Necessity for key and provid:i.ng for changes therein.· ~ a. :Messages
cryptographed ·by ~the ··same sequence of ·alphabet ·disks can remain secure agairtn
solution by a well-organized and··efficient ·eneD\,V ·cl"yptanalytio ·seotion·for
only a relatively short time. It is impossible to state exactly how long,
becatise solution depends upori a number· of variable factors; a conservative
estimo.te would place the minimum at s:i.x hours,- the maximum at·tw(' or three.
~s. For this reason 'ft· is necessary to chlirige the sequence from time to
time, and the :method for determining or :i:ndic'ating the new sequence -mwit be
agreed 11pon in advance and thoroughly Understood by ·&ll who ·are to use -the
instrilment. · · ·· ~ · :
. ·b·. "'The seq\lenoe in which 'the .. alphabet disks are assembled upon the shaft
. coris~it,11tes t.he ~ in this ciph~r system.: 'li.h~n ·a cha~ in .key. is to talc~ place,
REF ID:A56930
eXS:ctly what the new key ~ill be and :the exact. moment that it. is ~o supersede
the old k"ey will be determined by the proper commander ancf villl. be coinmunice.ted
in signal operation instructions.
{2:) In the top row ·t:he series o~ numbers 1. 2. 3, ••• 25 are inserted.
Thus: . . ..
. . ...
~
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
c H. I N E s E L A u N D R y c H I N E s E L A u Ii
... . ·
"·
{5) The letters of' ·the ·key '$equence are now to be. nwnbered.-.se;ially
from left to right in "8.ccordance-wrth t·he relative ·position that .. E!ach.
letter oc·cupies in the ·ordinary. alp~)?et. . Since the letter. A comes fir st
in the ordinary alphabet• and since th~s letter QCClll"S t~ice ~i;i t~ 11-
. ' . .·. . ~ .' . .· .:.: .. ..
a
1 If the; uy:co~sists o.t.'· word o~ phrase·. containing more than 25··.1etters,
those after the 25th: letter are· nie)·.ely. 01nitfa~d. ··' · : ·· ·-' .... ~- ·
. . • .. . . '.:: :· 'l • . :.
- 80 -
lustrative key sequence, the number l is written under the first appear-
ance of A 1n this sequence, and the number 2 is· written wider its second
appearance. Thus:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 -22 23 24 25
0. H I N E s E L A u N D R y G H I N E s E L A u N'
l ·,.,, 2
\
(6) The next letter in the ordinary alphabet is B. The key sequence
.is carefully exa.mine.d to see if it contain~ the letter B. Since this let-
ter does not appear in the ill11strat.ive key· sequence, the latter is ex-
amined to see if it contains the letter c. This letter occurs twice in
.~ ,the illustrative key ~q11ence and the first C, therefore, is assigned the
·· number 3, the second C, the ·number 4. Thus:
l 2 3 4 .5 6 7 a 9 10 11 12 13 14 15 16 17 18 19 .20 21 22 23 24 25
c H I N E s E L A u N D R y c H I N E s E L A u N
3 l 4 2
. . .
(7) The next letter in the ordinary alphabet is D, which, being pres-
ent in the key sequence, .is assigned the ne:x:t number, pnd st> on. Thu.s,
the proce·ss. is contin~d uhtil each letter has been assigned a number.
The work mu.st:- be done carefully so as not to overlook a single letter.
If an error is made in the early stages of the work, it necessitates
starting ·afre.sh •.. The operator should be especially careful vdth the let-
ters which 1Dlmed1ately follow one another in.the ordinary alphabet bu.tare
present in the key sequence in reversed order, su.ch as ED, FE, OD, and so
. on• It ·is. easy to make a mistake in such cases and to assign these le_t-
ters __riumb~~~ -~in-~ _seq~nce that is the reverse of what it should be.·
· {S) When the numbering process has been completed,· and if the work
has·· been correctly performed, it will· be found that every letter of the
key sequence has a number under it, and that the greatest number that
appears is 25. If this is not the case, it is an immediate signal that
an error has been made• It can not, however, be assumed that so long
as every letter has a number under it, with.the greatest number 25, this
is immediate and. concl11sive proof of accuracy in the work. ·The oper.ator
ihould invariably check his work; better yet, if two clerks are available
each one should derive the numerical key independently and the final re-
l'U.lts checked by comparison.
l 2 3 4 5 s 7 8 9 10 ll 12 13 14 15 16 17 18 1.9 20 21 22 23 24 25
c H I N :s s E L A u N D R y c H I N E s E L A u l'i
3 10 12 16 6 21 7 14 l 23 17 5 20 25 4 11 13 18 a 22 9 15 2 24 19
-· 81 -
·the ·retaining plate· an.d thumb nut are added and the latter. screwed down
,a dhtance·:sUf'ficient to. keep .t~e ass~bl~. together and y_e:t;"perm:it of ~e
. volving· individllal disks freely upon the Shaft •. The instrfunent is· now·
. reaay: for u·se in eijoher cryptographing
. . . . .
'dec'ryptographini'1nessage·a •.. ·.
. . . . . ·.. : : '
or'
67. · Cryptograi)hing a message. - Suppose the following message .b ·to.· be
ell;c'iph;ere:d with the key derived in the preceding paragraph: .
GO 3RD INF
a. · · ':l'he message is written dc\-:in on the work sheet undern.ea:th ·the key in
lines-of 25 ietters each •.. Space is left under each line for·the insertion:of
cipher letters. {for p4qcedU.re in connection with abbrevia.t·ions and .n~bers
appearing in the text of messages, see Paragraph· ·sa below~>. Thus:
. .
v.. E :i
.. -
...
:r v
'•
E ··T :w :o
"
'
.. D A
"
·.~
.....
.
H".
,
., I
....
v E .. N
..
I
.....
~
Ii . .E ·-,T w 0 li
: . I : ·-· ..
- '' ~~.·
..... ... .. .
0 A D w I L· L ·.B ;-·E . ){ A '.I N I .N 0 B ~. J;: R v ·.A T I 0
'' .. ..
'" ...
N c 0 s E c 0 N D ~ N ..
''
·. ...
.. .. '
b. By revolving"th~ ctisks upon the shaft, one by ·one, the first 25 let-
ters of the message are.aligned form"a..continuous horizontal row of letters to
reading f~Qm left, to right. a+ong ~he out~ide of the cylinder. The guide-J:ule
·will be found very convenient in marking the row upon which the letters.are
being aligned• ~h"lls :r~+·~e.ving ttu( ~yes of wme~essary ~train and reducing the
cha.nee of .making er;ro~s~, Afte.r S:U 25 letters ·have been.aligne·d, the asf.!embly
is lockt;td. iP.- p9si t·io~. so thS.t-_ no. disk can become displaeed acciden:t·~lly, 111
further manipulatio~·.· _o.f. t'l:,ie. cyii;l~er.. The row.. '6£ letter·s·.. 1s iminecliately check:..
ed to make su.re that no disp'iacement has· occurr·ea among· the·'f'irst few disks
while manipulating the last few.
·······-····-·-··············--···--·-···-···------------"Cc~F----rn~_'l'l._c,e.n ~o
~~ ----:a:D~JO
- A2 -
. !!.• The outside of the cylinder _now pres~q.1i~ a series-.:or 26 r_o1ve cf let-
ters, of which 24 r"ws.,µ-e f,u.lly visible,. the other.two being··hidden or par-
.tially oY>scu~~d blr. the. guide-rllle'. ·'·One· ot t}:le 24- vis;Lble. rows: is· the pla.in-
text rC:>W~~hat. has .just been. set ·\lp,··and the othe~. 23.rows a.re cipher..;text rows
a.rJl ·one of which may.be selected to represent the plain-text row. On~_of these
cipher;..t·ext row.a 1s selected at random and the let.tars composing· thie· row are
written unde:i-neath th~ ro:w .or plain-text let.te;rs t~~ work sheet~ ' Th11s, -on
sU.ppbsi:ng· the· row l:>eginning LYEUJ .., .·., has been selected, the first cipher
line will read as follows:
It is ·not· necessary to mii.ke any ·record on th~ work sheet as ··to which ciirher-text
row {·(a.bove -oi: below··the plain.;.;text row) .was eelected, nor is it nect;1esary to .
irldicate it: -~n any ·manner whatever in the· cipl:ler message. · '. .~
: !• . Th,~~.tnl.Jtl\b ·nut is' loosened, bu.t not removed :r~om .. the .shaf:t;.'. .. ~he_ next
25 lette.rs. of;' the ·me~.lil8f;e ..are •l.igned; the t·hiJ.inb nut sere.wed down ag~inst the
reta. ~ :p·rate·~· the '"ie.t.ters in !thf:1 al.ignment are checke~h anl;l. again aq one ..
of the ~3 vis~bl,e 'ci}>~~r-text. J;'QWS~ excep~ ~he ·one ·u·sed to encipher .the· t;1rst
line,-:l·s. _selected ·at. •r~~m ·ror the cipher text. The letters. in the l'.Ciw s.e....
lect~q ar·e· wt-f~ten down Under· the second lirie .~ .. pl:a.fn..;text Iettei:s ·op the .
work '~heet.· · Thu.s,;··s11p'poslng tire'. row beginni.ng··KZBYJ · ••• , was ·selected,, the
work· $.eat· .nc;;w appears; a.a···tolio'lis; : ·.· ,.
. .. ·•.. ... ' '
. . .
.• ..... .
. ·,.
..
l . 2. . 3· -4- s 6 7 a ·9 10 11 J.2. 13 14 15 :i,6 ·:t7· 18 19 20 21 22 25 24- Z!:i
c ... .R .: I . . -H- E .5.. E L A u N..••D.. .. R y . O· H ·::i :N -E s .E ··t .. A U. ',N
3 :lp. J.2 16 6 ·~·l ··:? IA. 'l -~3 l~ :5 20 25 4 ·i·l- 15' ·i-e, "9 ,22· g 15 .·.2 ·24 19
s .T R E
..
0 ·o T H I B D. .I. Ji ,.F H ·A. v ·E J u A .o :H E D
y· E ·u. D J N ._y ... i' . ·Q. B F I N · . E c .N .H .P p
L
.. . J
,; .. .. ··"
F A ·_G·
.. .. .
G
E A. s T E .R .N E D .G E ·O F VJ 0 '.Q .. I) s .. 4 .·L 0 ~ G F ·1
x z· B Y' 'J. .I A. .. H N..
.. s R A ;·N D J ),[ ..E p . ~- ·. l R .J. T -·s .-N
-·
.e·. This proce·s.s ~e.. conti~-ued in· sitnilEi.l' m&njier w:ith._the third. and .four~h·
lines-of· the: plain,;,.tex~ message .. -It should neve·r .lie a. practice t.o "favpr", made
truit is, -frequeritll. to
select a· pau-ticuliµ- eipher~text row above or below !the
plain-:tex'!;··row. As. irregular a se"l.eetion ~~-possible S'hoald be m~de," ~:id· the
selection. of the cipher-text· row immediately above the· plain-t'ext row or .1mme-
diate.l,7_ ~ei.o~ :\!he lo~e'i·· edge ·of the· guide· r~lf3: should.be· avoided.· Suppa.sing
these ins~r~~t·ions to 'have beeri· fQl;Lowed and that :there has· been sel~i:rted for
"'he cipher~text row i'-epresent:ing·'the third pla.in~text·· Une ·of the message .the
row b.eglnni:ng ·RAvw •'". ,-· and $or ·that representing ·-the;fourth 'line, th~ :one
begi.ruiing..P~SY ••.•.,.:the. mes:sage _npw stands. as. -foll~ws1 " . · · ·
.. . ··.....
.
··-· ... ·
.
. ' .. ..
:·~· . . ....
'\
- .
REF ID:A56930
- 83 ~
.. ..
1 2
3 4 5 6 7 ·s 9 .10 l l 12 13 14' 15 16 17 18 19 20 21 22 23 24 ?5
c H ..I' N E s E L A . lJ N D R y c H I ?f E' s E L .A u N
3 10 12 16 6 21 7 14 l 23 17 5 20 25 4 11 13 18 8 22 ·9 15~ ~ 24 19
'
c 0 T H I R D I N F H A v E J u s T R E A c H E D
L y E u- J D J N .Y p Q B F y N E c N· H p F . A. G p G
0 A D w I1 L L R E l:l A I N I N o· B s R ·V
"!'.'
.u A T. I 0
p J N s y v A w u c H y F H E y T B G p y K G Ju G
. \";
v E F I v .. E T VI 0 D A s H F I v E N I N E T VJ 0 R
R A M T F 0 M 0 K E .N c s H. c ·s p 11 x H T ·E x G M
0 A D w I L L R E M A I. N I N 0 l3 s ii'
.u R v A T I 0
p J N s y v A w u c H y F H E y T B G p y K ·G Jo,{ G
NI c 0 s E c 0 N D B N ..
u R z G H E J Q. s M D
.. I I
.
LYEUJ
.. DJNYP QBFYN ECNHP iii~G
: '
s
.
'! . • •
. ..' .. .. . . . .: . . ~
: .
RA .:b.'r"T F 0 lv~ 0. K' .E. · N. C S ·H C . ·$ ·p ·NI X· R '1' E X G M
.
-p ·J·Il S Y
. . .
·v AV/ U C' H Y.F·H E · YT BG P
. '
'.
URZGH EJQSU D
RE-F~D: :A§.6g.a.Q-------------·--
- E;4 -
h. _._·The last. groµ.p of the oipner --message is, . ho•ever,. .not .. a. complete
gl'OlJ.P _of: 5, ~etters. - lt is niade so by adding four X's•·-· These. o.r.e not to· be
cryptographea; -they are ·acld'ed- m~rely ·~o complete i;he last. ciphe~. group.· The
final: message becomes· as shown below: . .,. . •· . . . ~ ;..
K z :s y J I A.H N S. RA N _D J ME F s y R I T s N
·~ :
: .!:· .. · -N~~lly,. the. write~ ·or-a· message ·spells out the punctuaiien signs
he.wishei;i ttansmitted; as, for examp-ie, STOP, COl'CMA, COLON,. etc. If a mes-
sage .contains punctuation signs not. so ·spelled out, the messa.ge_-c_enter cfrief
mi....st ... i~d;i.ce.te.. whether they
.-
a.re ·'to
. be omitted·
. .
or spelled :ou.t and tra~s~itted.
: · _c. . Cardine.I anci. ordinal Jiwnbers when spelled out in. letters ·in the
original pla~n~text_ mes~~e are· always enciphered· e~c-tly_ as spel,led. ·
4 : FOUR
. . 40 =
FOURZERO t 8.nd' not FORTY l .
400 : 110URZEROZERO {and not FOUR HUNDRW)
465' .:. · .FOURF1VEFIVE - ·· ·. - ..
.450,, 7_-75A·~ B ; FOURFIVEZEROPOINTSEVENDASHSEVENFIVEEIGHTPOIN'l.1EIGHT
. .. · 2005 .: . TWOZEROZEROFIVE .
12:01 a.m,, : ONETWOZEROONEAX
5:15,p.m,, : FIVEONEF~VEPM
e. Or.d:$.nal :numbers, a.bov~ the ordinal number 10th, when_ expressed in
figu.res followed by "di', or "th", are· cryptographed merely ·a.s digits spelled
ou.t, without. eidding the "d" or. "th"~ r:\'.'h~ omission of th.e "d" or the "th"
will cause. no conf.1,1.sion l'.'r .. ambigu.ity. Exi:unples: 3d Bn : THIRDDN;·· 7th Pack Tn =
SEVENTHPACKTN;··11th Regt: ONEOlIBREGT;· 403d Am Tn:;:: FOURZEROT~·
REF ID:A56930
-.. .. -. I.•:
....
R A M T F 0 ).{ 0 K E ?l c s II c s p }.I x H T E x G JI
..
·.·:~-~- .:~·rt''
p J N s y v A \": u c If ·y· ·F II 'E y T :a G p y K G u G
..
..
. . . . .
u R z G H E J Q. s :u D . .
· · · b ;.· The first 25 let~ers o_f the C!yptogram are set u.p on the device, the
let'-iers being aligned in a row from· left to right; . jµ.st above the gu.ide-ru.le.
Fixing the ·disks in this: position by· screwing down· the thumb.. ~ut,. the who;Le
cylinder is turned slowly, forward or·'be.e;kward, and each row of. letters is
carefully examined. One Qf these rows arid only one will read :l.n,t.elligi'bly. all
the way across from left to
:r,ight. · That 'is the row. which. gives the. plain text
for the first ·25 cipher letters. These letters .are inserted in.their proper
place on the work sheet, giving the. following: . .
c. T.he thi.µnb nu.t is then loosened, the next 25 cipher letters .are set up, .
the a.ssembly. is· locked into p~sition, ,84;~in the whol~ cylinder is. slowly re-
v.olved, e.nd the plain-text row of lettet.sJo~.d. Th~se 'are wr'itten down in
.the.ir p~oper place; and the process is. continued wi~li the· rest of the cipher
. -letters. ~ti:!. th~· me~s~ ha.a ·been cor;ip~~~ely decryptographed. · ·
=·. ~.
. d. · · In the case· of a· cryptGgrmn.· the·, l~f!t ·few letters of which do not ·form
·:.a. compiete set of 25, if· any difficulty i~ e,xp~Pienced in ·picking out the plain- •
text row~ the context·· o·f the· precedi.ng ·P~~.:.. of the me_ssage _shou.ld give. Jt. .good
~. . . ..
·-·-----·~~---~-~~·-··--------·--·
REF ID:A56930
- 86 -
.. . .
clue ... In. ~h~ .cas~. of
th~. £i1uirj;r.~1;i v~ meS'Sage above,· ..it·:·s.hould, ·b"e·· :reali;aed
that the .last. four 1-etter·s of the' c·ryptogram ·are not· to be· decryptog:r~ph~d,
siMe· they :were m!!rel7 ~ddec( after cryptographi.ng to· make the last: -group, of
the cryptogram a. complete group· of rive l~tters. They are omitted..- fr(?m. the·
worls:. sheet. .. . · . · · ' ·· · : · ·
CIPHER liIACHINES .
Paragraph
Transpo·sit ion-cipher machines •••••••••••••••••••• ,. ••••• • ••• • • •• 71
Su.bstitu.tion-cipher machines •• ~ • .; ••• • •••.• ~ ••••••••••••••••••••• 72
Machines ·aftording only monoalph~betic substitution •••••••••••• 73
:MB.Chines ·affording polyalphabetic. sub sti t u.t ion ........ ~ •••••• •. 74
Disa11:ventages of cipher machines •••• ·•·•• ~ ~ •••• ~ ••••••••• • ••• -•••• 75
- 81 ..;
-- as_-..
-~
!.::·'.c.:.·~ ·-The: P~inciples_ u.nd.erl¥ing the .vario11s machines which have th11"' far
been· .'deve.lope.d a~e-. so d.iver·se. tha~ no· .de'sc.ri.ptfoii or··them c-ah· her~ ,be- -µri,d~r- .
taken.: <Nor a~e th~Y- _:iriiportMt Crorri tlie s:ta.ndpo'int" 'of' practico;l cryptoe;r.ai>°hi..
todar, ,s·in-ce s9: far ~a is. known, no.µe hav~ ·even been or are now "q_S_ed by; MY :
of the: :lar.ge .co~ei:ciE!.;L, or gaver~~ntal o'ffi.ces.· . ·; : . . . .
... ~ -~ • t. .• • •
•.. .-:-.t-_::-.7(),._: ~ .D-1.~ad~ant~ges:.o.f ciph.e_r· 'machinef!• .."".'· 'In addition to· .the tact. that .
~-11. very re.cently t~e crypt-o~aph'ic sect.iri'ty of cipher maehine~ _was not very
great;.. thf!re :ar.e. three more- condit1o.ns br ·c1rcumstanoes which militat_e ·agaj,:n:st
the llSe:_ of.. ciph~r ~PPE!-rat11s:- for· commerc.ial or gove:r:--nmental. 11sa,ge. . : : ~· .. ·,-_ .
.!.• The first is that cipher cannot competi3·with:eode, .from the point _of
view ·.of condens.~tiQ~ 9r a:bbl".eviation. A cipher message is alw~s at least as
long.B:s the original plain-text massage, whereas a code message is 11~ually much
shorter t~&n ;~he. eqU:iv~ent original pi·ain-te:x:t me.ssage; this arhes from the
fact -that in w~ll-cons_tr11Qted codeboolts a single gro11p of five· {Qr ~ometime s ·
less) characters may :represent a lol).g phrase or 'even a whole sentel).ce.
• I : • '
b-. -. ·' ·Th~--seqond very tmp<?rtant economic disadvantage of ciph~{ a.·~ compared
"wi:th code is. t.hat the cost or tr~nsinitting the former by telegraph is-us11ally
twice.as mu.ch a~ that of.the latter, this arising from the diff~rence ex- in
·~erna.l·ap.pear~ce of eipher_te:rt as c'ompe.red with· co-de text._ St11dents who ~re
·interested-in this phase_ of' the question are referred-·to the fol.lowing treatise:
'The hist·o . of codes· and code la· e, the international tele e.ph re 11latiohs·
pertai-ning· the-re.to, and the bearing of this history on the Cortina repor '·_by
Major:\11-lliam F., ~rie.dman:, Sig-Res._, Gov:er~ent Printing Office, 1928. : ·:
c. c1:Phe~ machines -are expens1 ve, they are· delicate .mechanisms that ·re-
q111re-frequent Qervic.i~ and they cannot be readily transported. Often they
require electric c\_lrrerit fc;)r operation, the availability of which is scmetimes
in quest-ion. .I! .th~ mechanism 1$ at all complicated to set up for enciphering
or dec~phering, errors are-easy to make and call'for.costly'exchanges ot mes-
.. sages relative to their correction. ·
------------~-----
0 •. -- CODE ·sYSTE}.'[S
·(
SECTION XV
CODE WGUAGE' AUD THE INTEIU1ATIONAL TELEGRAPH filnULATIONS.
Paragraph
Pr9li~1nary .remarks •• : •....•.....••.•...•••.•••.•••. ·.•••••.•••• , .••... 76
International and domestic reglllations governing construction of
code groups ••••••••••••••••••••••••••••••••••••••••••••• 77
Princ1pai ~ffect -a~ the new regUla'!;i~ns - •••••_•••••••••••••••••••••• • 78
Intex:ni-i:X:tures of .code and ciph~r te~ · ••.• _•••• ~ ••• -• ••• ·.·.~·':~···•··· 79
. . -_76. P~E!liminarf.-:r;em~~k.s. - Sections ·xrv;...xvrn 9f Special Text lfo. -165,
'·:. 'Elementary--JUl-itary Cryptography_, wer~ devoted to: a.general. cons~deration of
--:: ebde' systems and ~nciphered c9de. It i.las there· indicated_ that 9·od.e systems are
.: ··systems.of substit11tf(}n where the elements of the ·s11bst-it11tive. p.roc~.ss~. cpm~ ·
prls1ng. le;tter13,_._ syllable's. words, phrases, and sentences are_ ..so. nl]Ilier~il.s, that
1.l:t·; fs·~1mt>o.ssi~1e to memorize them or to ·reconstruct them at will -when necessary,
so that printed b.o.oks contafning.. these elements ·and their· code. :e_q11_i":alents· rii11st
REF ID:A56930
·- . ()'
- 89 .:.
...... .,
be at hand in ord~r· to cryptograph: or· debryptograph: mft~1!u1,ges. The,. various types
or co·cie groiwia were .indicated, together with methods for their· construction .by::
means.- of permutation taples~ One.;;.part ·and two-part cQQ.e~.vJere briefly discussed.
Finally:. a few words yJere added \':itl~ a view merely ~~'i"'i.f!,dicating_ various tqpes
of. enciphering code .f.or great~r cryptographic securitt;·· . '"
....
77~ Internation~l and .d.bmes'ticf ·-regulations goye;[?niilg. construction· of· code
groups. - a. Rules -r·o1-:the cortstr.uot:ion Qf. cpde. e;roi+ps and the general• composi-
tion of coii'e and cipher telegrams of international t'l'affic are drawn up f.rom time
to time by International Telegraph Conferences t~ whioh ~e~egates are sent· by all
gove:rn.rpents adhering to the :J;nt.ernat:i,onal Telegraph Convention. The United States
is"''not ··S. ··signatory to t.he .Coziventionl. IIo'li:·ever., it is .u.~ual fQr this cpwitry to
receive :an ·invitation to patticipate in the Con:ferences,.,:~d to· seri.d delegates to
attend, Qut without· "the right ·to vot-e. The .last conference \o:as hel'd ·ln <Brussels
in 1928. Because messages exchanged betvi~~n t'he United ~~ates. Wld foreign :Coun-
tries are subject to international regulations when··they arrive or originate in
those countries, for all practical purposes these rules .apply to. th,()se rnessages
w_ith as much force as though. tnis country were one of the signatories to the con-
vent ion. · .. ·. . . . .. . · · · : ~
b. The ·f'o1lo\'"iing ·iB. -a ~~sume of the rules adopted by the last conference,
arranged ·in the f'onn of an ()-~tline of· the protocol that was adopted. It should
be carefully studied.by .all .students interested in the practical aspects of mod-
ern cryptography: . . . . . : ' .. ,
OUTLINE. OJ'.' THE PROTOCOL ADOP'l'ED BY THE INTERNATIONAL TELF.GR.APH CONFERENCE, 1928.
·.· -The f'ollowi~ oti.tilr;i.e 2 of' the protocol will succinctly shou its most
important features: · · ·
. . . . . :: .: . ;
; . .
Types of' La;nguage;JI· . . :'· Principal Features
• .. ~~ '· i::• i: '
ti~- Rciquirements and conditions:
·: • i ' • . •J I ,. •
' . I •. ; , · , o, • ..
' .. : :.: :
.· :1 r : .. : · ·:
., . {a) l~axi.r.lµm length of word--15 letters-.
. ,;{-', .. (b) Must present intelligible meaning;
·, ... :; . ; · each word and expression must have
meaning normally attributed to it
,, . in language to ~hich it belongs.
I. Plaiin :l~uage. is that . w~ich (c) Telegrams of this·: cl:as·~ mu.st be
• ·J preaen'h ~liltelligible meaning wholly in plarn· language but
·.:- in one or more of the langl,18.g~s presence of bona fide commercial
a~thorized·for international tel- marks or commerciaI"'iibbreviations
egraph correspondence, each word in current use, registered ad-
and: each e~pression having the dresses, or check words in bank-
meaning which is normally attrib- ing telegrams permitted •
. uted 'j;_o it in the language to (d) Unions of plain-language words
which it belongs. · specifically prohibited.
2. Tariff (same as at present) at rate of
15 letters per word or authorized
compound word. (Check word in banking
telegrams must not exceed 10 characters
·1.
in length.)
.\., _ _ ... :
l .. . . ..
The t;Jnited ·states·~ is, however, . ,~ sigriatory to the International Radiotelegraph
Convention:• ·which .gbv.erns radio. traffic in its interna.tional aspects. The rules
contained in the Int.~rnat ioriSJ, · Tel~graph Convent ion, in connect ion with code,
cipher, and word count, are ·carried over in-toto into the International Radio-
telegraph Convention.
2
Prepar_ed by the writer, in his official capacity as Secretary of the American.
Delegation.
RE-F-I-B-:-A-56-93-8-----·------------.. -----.. . . . ..
- ... 90- -·
II. Secret -l~l!&g!.is c~~fff1~d into·code.l~~e· and ciph~r language.
: . -· ··''
A. Code langu• -~s'.':'ti;lat.which is composed.;of. (a) artificial words; or (b)
bona fide words nC>t,' naving the meaning normally attributed to them in the
lang\lage to which they belong and accordingly not_ forming comprehensible
phrases -in o-ne ·or more of the languages au.thoJ;"ized for telegraphic corres-
pondence in pl~in -~u.age; or ( c) -a mixture of bona fide words thus de-
fined end artifici.al · w.ords •.
. .
Code-language telegrans are classified into two categories, i.. and B.
Aa to taxation, a code-language telegram can not be considered ~~.belong
ing partly to Category A and partly to Category B~ From this standpoint
it must be classified in.one of the two categories, the other being ex-
cluded (Art. 9, Par. 5~. '
.·.:.
_: ~ ':
REF ID:A56930
... 91 -
!1.
Requireraents ~d.co~ditions:
I (a) Liaximwn length of word--5 letters.
II . (b) .No conditions or . restrictions
. as to
I construction of words, except that
they cannot contain the accented
letters a, a, '· e,
!f, o, a~ and
the combinations i"e,,-a.s.7 ao, oe, ue,
ch ar.e each cowited astwoletterS:-
l
( c) uiiions of P.lain-langu.age- \"Jords no_t
2~. qategory B
· (5.;..letter system) ·
:
---1 . specifically prohibited.!
(d) Mixtur.e of _only plain and code-lan"'!'
guage words permitted.;- figur~s "{)r.
1·
groups of'. figures, e~~ept bona-fide
commercial marks, prohibited.
~.- ;T-ariff, word co wit . ~t .t'1e rate of 5 let-
. ,: ' .. ;ters p~r word,. . .
charged
. .
for·
. . .at ' two~th.ir:ds
. full r~te in. extrr.~Europe,an regime., and.
. ..
. at three...:fourths fu.11. rate in' ·European ·
r~gime. 2 A minimum.charge for ·rou:r:· words
compulsoriiy collected. ?lain-language
Tiords inserted, in code text. counted at
i _ _ __
rate,; . P:f 5. let:te~s· per word •. · . .. . .
., ·, . . ~
.. '. .' .
1. Requfrernents and qond,itions:
(a) Jlo :t'ixed me.xirount lengi!h of word or·
group. · ·
(b} No· c·Qnditions or -restrictions .as to
B. Cipher language is that construct ion of groups, except that
which consists of {a) Arabic .the mixture, \1i thin the same .group,,
figures, groups, or series of . of letters and figu.I'es. is prohibited.
Arabic figures having a se- (Art. 10, Par. 2).
cret meaning, or ( b) wor·ds, (cl Mixtur.e of plain Md .c.iphe:r""!lang,l.age
names,· expressions or com- words permitte9,.:
binations of letters not ful- (d) Unions of plain-langu.ag~ -words spe-.
filling the conditions or . cifically prohibited.
plain language.or code lan- 2. Tariff,, same as ·at present,. at. r'1te. of 5
guage. ·· · · figures or letters per word,· cl!.arged f9r
at full rate. Plain-language words in-
serted in cipher text counted at rate of
lp _letter.a _per word.
l . : . . .
The.~ailure to prohibit (by specific wording) the unions of plain-language· words
in this categoi:y was not due to an _oversight. The ,·intention was ~o "leave the way
open to users to rWl: ple,,in-lnriguege vJOr.ds together· .and "chop"· the ·text. into 5-let-
ter gro.ups •. ThllS '· t.J:.le following is permissible under ·this catego·ry: . .:
• • o " • I; I I
0
• •
. • • " '
1 ~- ! . •
2
Telegrams from the United"states to all ·other coW:i.tries ·except Canada and l:lexi~o
belong to the extra-European r~gime or system.
------·---------------------------
····REF ···I-D-:-M-693-0----·--·-··------------·· ----------·-·-·---~--····-- --····-···----
- 92 -
No change is made in the present method of counting and charging for words
in the add.res.a and signature ·in all telegrams .1
l
Address and signature are transmitted free of charge in domestic telegrams
witJlin the United St.~te.s,. bu:~ in c~blegrams and international radiograms these
are invariably counted and cha:z:-ged for in ·determining_ the ···c"c)st of translnisSion.
This gives occasion to ·th.e ·practice of employing registered ·eo'de addresses,
. Wh~c~, .in a single word., 'indicate the name, and street a·ddress o·f the addressee.
The city (state a,n.d cowity,_.1t·:necessary) are. added·to the eode.addi-ess and·e.re
included in the word cotint~ . The charge for regi"stering a code address. is: $2~50
per year, per code 'address • . This is paid to the local telegraph_. company, with
whom the code address must be registered. A publication listing registered
.~9de .alioresses of' the most important conmercial t'frms in· the world is privately
. pub.li slle d_ . und~~ .the .ti.t le~.. . ."Internat ionai Register . o~ .l.1~·1.egrapli:fo ·and .Trade ...
Addresses." . · . · ·., ··
REF ID:A56930
~ 93, --
'. .• "~·· > lior ;sQJ:!le.:·~ime. t.o; .CO]I19... A~ategp?Zi' A-~~ll .be. £>~. f~~ S'1'.¥J1.if~:i\-,i_mpor;t;ance
t'O code ·.oompi;i..:e,r,s·,.,a!.J4 ;CP~~ .µ:S.!3.J"~: :thap.... e~t!t~.t:Ala~egoq . :l3: c.~~e, ~f.~g.~~~" :~~~ ·~~:-. ·;
pher language1, l>oth o;f .w,~~h1 ·~~e·- tno:r.~.~~P.~nsi -ve, to ,\lBe th~; ;ls...o~tegory.. .A. .
~:; ·:· ·: .. • .. :.1.·:.··~ :.·:·.·: :.,··: ·:.. ;.. ;,;!··t.··~~-.u·-~.,· . ~·i·:· .. \: .. f.-.i ·:;.· ... ·::··~-~ . ·;·.·;: ..'~_;:··::_; . .-i,~···:; . . ~ ;·::-.'_..~
· :.:
·· ·.. -£•· . ·.The. ·naw· re;g~a.t:l<ms,, _we:re. ,ci~s.j.:('.t~~t to; pq~:.:afl en~:. °j;:<J;;-~~~ .eA~.e_S·S.··.d:A~-:-."
pu.tes. and argwnent.S.; occa·sione.d by .t~, ol~ .~µ.le_s, '~ip~, ~ve~.~.;l>:r..•c:tic~l.lY:. ~-, ·; .
. e~forc.ea'tl'le :b.ec.B.ll.'e:e ,(If·: ii·l;le:· 1-~ck of' .pr~9-~. si~ ..!~· d~f W,~, tR-~ :j;~p~s. ~f.. ~~7._ ;. ·•~
• ! :g~es· and the :r.u.les,.for. th~ir Qomposit_~~·i . T~~.r~;!JB:!3.,a~. s,o; :~o~e thoUf?;~~ .. '?:~ : :...
making the cost of co~-larigu.age teiegra?JIS·, more in. . qonfo::-µiity, 1Vi th the. ~~~-. . .
pense entailed in their handling by the communicat icin agencie's, bu.t th~ .nev/ "· "'
rules;:,fa1L in .. this object, for fea1;19ns :w~.~~l) c.8Jln'?~" ~~r.~ .R~ Aet~iled. "'
:':'· .•. ~'~ ···;·. ..~ ·.. . .. ~ .·· .. ~ _;:·• ~·.·. "! .: '· :··. :;~~ ~·.· . ·~ • . . ~~~i~··i :
79. Intermixtu.r~s of' co.de text;:: ~d .ciV.l~~r. text •. ~~ Ji~ I~ of~fi'.n. ~~~g~p,~,
that correspondents employ a code wliich makes no provision for encoding ptoper
rl'flJne.-:6r un~su.al words not 1nclllded 1~ . th(! yo~a~~~Y; ,t}?.e.. c9d~gp~k • . R~ther or
than .leave t.he unencodable· text in pl~i..µ .liµig™~ ,.i~)•h~,,;?,,~.s~, .'~inc.e.1,9 .. ap-
pearance .will s11re:y lead to clu.es. to un1;1.u.tqorj,zed. re~ding of th~ .nlE!p(fa~. RE.~.:
correspondents encipher su.ch wor9,s 0 .alld_.~rop~l! ~~~ ~Y. m,Ej~~ J9.f. -~ ... PX:~~r,~~~<;
cipher system. Also,· in some ci:i.se.s, :\!heti ~l1.e ~~~~.;ts ~~~i~~~.J~.:i~=~s ,~oc~~~l~;:~
. a~d-the ·various inflections of word~ ~r~ ,,no~ . reJ,:>r~~e~~~~, .·~~~.:,c~~~~P~~¥ri~J ;·- ·1
~-su.ffix·the proper inf'lecti<ms ('~eQ.~, .. "ing!', ."tio.n~·, .. ~tc.)...~ c~ph~r.•.. ~$.h~~·.
procedure, however, is not to be recommended, becatlse it 'corisicieraol.v ·rediicfos · ·
: the cTyptographic security of th~ whqle ~y..st81}-~ .. : -: ·:" _, .- , : . ·: ·.
, . . ·· · · _; : ·· . ,· t .: . ..... . . . : .~ ' ·. i ; ·'I · '.., ··.·I
-.. · ... b-. · ·Sometimes correspondents make q.se of .two· o:r: more codes withill: ~lie~:, :.
- . . •• • •I .•• ••: ' •. , : •. ' ,(~ i' ! '
• same messe.ge. This is occasionally the case whe~ -~hey: are maki~· us~ ,o·f .~ •.::.:·.:;
1
general or commercial code which does not ha.,e all the special· expresSioris · - ...
- :necessary f:or .their btlsine~. th,e l~tte.r. exp:r,~ssions being c~ni!amed .. ~n a .
·small private .code. Sometimes, ho\"~ever, th,~ iz;t~~ixt;·u.re. ~f :oo~e :t;ext .f~~. ·:·:·.
sever.al codes is done 'for the pu:rposes of secr~cy 1 · though .it is, a~. a·rule;.·
a. rat her poor Stlbterfuge. · · - ·· · · ' -· ·
----------~~~~~·
SECTIOU ~I . . 1'.·
· · · so.- ·Purposes~of ~nc1phered code .. :- .a.:. The pu.rpos~s ~f' enc~phering code
-~ye '·al~eo.cy· f:?e'en explained in the p:nev.iou.s :ten,.· toget;he:r,'_ if~~.~ 'l:i,:r;ief i_nd±~~ ., . ,
· tiom{·of' raethods·~,... The superimposition; of'.a .. good c1p:Q.e:r system upon the code, ..
t~xt o.f a message is today the safest and most practical of 'aii meth'od.s"of ....
ccy~~d~raphy "~or"governmental··u.se ... ·As .. incii:cfl.ted,-~a.ll .s.o~.s:!~~ cipl1;~~: met.h.f>ds
m~ 'b'e--'appl-i~d.;: :but tn.e-..tules impose4:by: inte~na.tionf!L~ ;~d.:Aqmes_ti.Q ..~~.~ep:-~~h
regulatl1b'h~ serve ··=to· limit . ·tbe .. choio~ for... p~f:!.ctiE;1;1.l ,p..µ:po.~~, .... _.; ·z . ·:·,.... ,.,! ... ".
----··----~------~----------------~-~------
REF ID :A5693Q
...
·
E.· Transposition me~ho·ds. where ·whole ·gro11ps are .. :rearranged. are usefu:l bu.t
not :fr~qu.entq eneountered• The :re.aeon. why transposition -imrolvi~ the letters
of a code message taken as a single sequence is not used is that it destroys the
form of ~he grou.p·~ s.Q that t.hey .no .longer conform to the required re~;u.latiohs.
Transposi t.j,on.s ~1ir1.ct ly w-itliin ;the .gr.ou.ps them.a.elves are, .. however.- ·feaSib.ie un-
der the ri,ew regu.lations in internS.tiortal practice.; Where these r.egulat'i·ons·. are
not applicable, or in. communications .passing puxely. through military channels·.
and a~ciE3s·, al.l kinds of' transposition. ·methods may be· applied with go.ad ·ef..fect,
provi!iil'lg .th1a. sys:tem. as ·a whol.e. i's .. or a pract;lcal ne.ture. ...
'· • .• • • • 'I \
2_• Substitution r.iethods may also be u.sed, with the same limitat ions as
re·t~rre4' to. above:. Space fo·rbids an. expos~. of all the. methods that have. been
empic;>ye~,. _,and· only two .ol'. thre~ can: ,b.e ..bri.efly indicated!.
': :··~: ~ .?" • •. t :: {' • , I • ,i . . ' L f '. ' • .<' • , o
2_• ·. '. Any .sort :of polyalphabetic meth,od -.in '7hic-h the indi v:idaal
alphabet~ :ar.e
constr~ucteu so· that.
vowels -replace "VO\"lels, "'Consonants ·rep1ace consonants, may be-
~sed. For example,the repeating key method, the runnine or continu.ous key · :
method, the interrupted key method, etc., cllll. be applied. Digraphic methods may
also be used, providing they are -su.oh that -the .particular pairs u.sed to replace
code pairs conform to the vowel-consonant arrangement of the original.
c. Tables of various sorts are often employed. For example, using a table
applicable to code grou.ps of 5 figures, a table giving pronowiceable combinations
of let1i.~-~s for. the combinations ot digits rtUcy" result in converting a group such
as 75152 -into the. l,etter groµ.p_ KOBAL •. '.r~p:ie.s ..f.o.r ..s,up,stitu.ting combinations of
letters into ot~r pombip.atio~s o~ ~et:ter.s ~~'· !'~. c.o.~s~, equally feasible. ·
The substitution may b~.·s:t!i~:tlY. digraph_ic,, 9~~bip.i~g tYJ.O. 5-letter or 5-:f'igure.
groups into a se;ri~!3. of ~o. ~i~aphs;. O! i~. f.lSY. be a _combin.a~i.on of trigraph~c. and
digraphic substit~tion,.~ach ?~cpar~cte! gro~p ~~1~. s~:i~t. u.~ into a 3-~he.racter
and a 2-characte·r combination. other conbinations are, of cour.se, also possible.
·.· '
In .all ·tJie f~regoingmet;hod~ the chief.. objec~ i.o~ is th~t .the: advantage,
_c!·.
of the. 2,-letter .dif.fe:fential f'eat.UJ,"e is more .or· less; dis.sip~ted by the E!ncipher-.
ment' but. t.hls. .;if!; t:rue·_; of every ~I.lb ~tj, t u,t i ve .· ~~!l~d·;~h.e:( ~~.: 'sy.per:impott~d o~ cod~".
: ~.J . I • • • I. . . . '. '. . . . .. . .. . : . • .: .. .j. ; • . • .. '" • .. ~ • : .• : : • . • ; • • I • •• ' ••
- 95 ·-
method's. ·of this type make u.se of the figure-code gr·oups, the latter· being man-
ipulated in variou.s. ways to change them and 't;he resulting groups then be. ing :.
given their· letter-code equivalents. Some of: these method·s. are. explained b.elow.
t ;_ ~. '. .. : : . ·. ; : . ' : ~ :
83. Additive and s11btractive roothods. - a·. : If the code grou:[:ts·":tire ·:nu..;.
merical, the addition of an arbitrarily agreed-upon number to each code group
is ti. simple matter •. If the book contains 25,000 code g:-onps, for. example, the
addition of. a number such as .1000 to a code gro11p. 24=, 789 would produce 25'.; 789-j
·and t·his, would be represente·d in the final message by the ·group 00789 (by; sub•
tracting. 25 ,ooo). ' ·" .\ :·
: . : :. ~ '
b~ Where the code groups are composed of letters only,. and are not··ac• .,
companied by nwnbers, additives are rather limited in size, by practical con-
s'idel'a'l.ion •. ·It would be extremely laborious to count 500 groups· forwnrd; for
·example. In these co.ses, additives from 1 to ·.10 ·or -20 are :comr.:ion •. But d1e:z:e
the code-groups are also numbered, t.here i$.opp'Jrtun.ity for fu11 play.of ad-. ,
ditives. For example, in a certain code the code group. AllCOD bears the num-
ber 00869; the additive agreed upon is 1500; th.e code .group corre·.sponding to
the numerical value 02369 is B.ANIL and this is the group transmitt·ed. ·
c. Combined addition ana subtraction may be used within the same system.
For example, addition and s~btraction of a fixed number may be alternated.
d. Keyed add~tive systems are also used. For exar.iple, the additive cor-
responding to the keyword BAD might be (by agreement) 200, 100, 400. These
would be used in repetitive fashion. Or, it might be agreed to use the numbers
additively and subtractively alternately; + i?.OO, .~ 100, + 400, - 200, + 100,
- 400, t 200, etc.
C .A B 0 R N IX 0 T ARC IP YO KR A
1 8 5 4 l 4 2 l ·O 7 0 9 A 5 l 8 3 5 7 2
4 2 1 0 7 0 9 8 5 l 8 3 5 7 2 •••
l 8 5 4 l
4 3 2 8 0 9 7 2 1 4 3 2 8 0 9
4 2 6 6 0
7 2 1 4 3
15 5 7 1 5
...
6 l 8 2 1 13 9 3 2 1
Two of the totals obtained in this example are greater than the total number
of groups contained in the code, which, let u.s assume in this case, is 100,000.
2he totals whioh exceed this number are therefore merely decreased by 100,000
and the final result is:
6 1 8 2 1 3 9 3 2 1 4 2 6 6 0 5 5 7 l 5
REF ··--ID-:-AS-69-3-0--- -----------·:-·--·-----
The code groups corresponding :to these nur.ibers are now·sought in. 1;he cqd~b<?ok
itself and .these letter-code :gro4-P,S. form the .t'inal message. The :n~ber!' !e-
su.lting from addition or subtraction of key .riwnbers may, however, l,>~ s9ught,
·in another and differen1;-nwnbered code_ and t~e code grou.ps corresponding to
the keyed code numbers transmitted..
I
· • ' •
: ;
=:·. .
b. · The use of a n~~ere.d. code lends "itself readily to columnar trans~
·position methods •. The code numbers are wr~tten in a rectangle, keyed .~olmnnar
transposition applied, the code groups' resu.lting from: this· process rec:on;verted
into letter grou.ps and the latter transmitted. This is only. poss.ible, however,
where:the codebook .contains exactly 10,000 groups a.nd, of course, the process
bf encipherment an.d decip~erment. requi~es care a.nd time in order to avoid errors.
c. F.ractionation methods, and cipher squares (of the 1-par-t;, .2-part,' or
4-part type, :u.sing pairs of digits from 00 to 99) can be· readily u.sed with nwn-
·be.red codes. They would .yield enciphered code- messages of gre13:t secu.rity.
. .
.
~
I ~ .: ' ;
.. '•
.• ·)": .,•
• • ~ ,.I I ' •
. '. ~ : .
··. '!
,; ... ;-;
...... .
·
··.: L •..•.
., ,
REF ID:A56930
- 97 -·
·PART II
.. THE SIGNAL WTELLIGLl:lCE SERVICE *
· :·;, . . . ·, · ·· , . . . .. . · ,Pare.g;r~ph
Sect"ion .XVII. ·General :b1to:tmation ·;. ~. ~- ••• ;. ~.;. •• ~ •• ~. ~ ~ •• ~ •• ; • · · 85-S~f .
XVIII. · sp·ecific f\i.ncti'ons ·or" the s·1gria1 rn:t~iiigence .:·:. . : · ·
8ervioe ••••••• ~ ••••••••••••••••••••••••••••••• 89-95
XIX. Types and activities of signal intelligence
units .• !~•••••••••••••~••••••~••••••••••••••••• 96-100
XX. General organization and opera~ion ••••••••••••• 101-102
llI. · General St~ff responsibility .-·•• ~. ~ ••••••••••• ;_.•. ],03
: .i • .' •~ • .·, . . .. . . • • . . . . ' • -~ . •
. . .. ~ . ' . :
S:CCTION XVII.
.. ~ . .
•
• · · '·
,, .• : .. ·
:Paragraph
Definition •.••••••.•••••.•.••..••.• , •••• , •••••.••..•••••••••••• 85
Basic au.thority •••..•.• ~ ....•• ~ .••.•••· ••••••••••••• : •••••• : ••. 86
Relations with the General Staff •••••••••••••••••••••••••••••• 87
:Reiatioris \liit"h <the ·Adjutant "Gerier·a:i:' :Depa:rtnient -~~~ ~ • .-~. ~:.: ••• .-. ·.
·. ' • ' • ' • . ' • • • . • ' • .
s • ~ ' • • ' • I .. -: ·, ' ; • •·. '4; ' •. .
.88
'86. Easic a~thority • .:.. The functions of the signal· c(?rps 'ref~_rr.ed to
in Par. 65a are. thbs~ which ~re assigned to it by the· 5.ecretary
. i
of .war
'
_wider
the ··rq~Iowi~>para.g:r~p~~-<o_f ·~ 105-:5: ··
• '. • . . . • • ~- . l . . ..
.~i'-his ,pa:rt: -~£, ~·r.e te_xt. ,w·~~ · :prepare'd under the' j otnt ,di re ct ion o.f ·the.', Chief
_S;igna;L O;f'f;icer ii-n;d :the. As.~i.stc:rnt Chief of Staff, 3-2.~ : -.. . ,.
- 98 -
"SIGNAL CORPS
• • ..
GEl:IERAL PROVI5IOUS
• .. • •
2. Duties of the Chief Signal Officer. - In addition to such
~ther duties as may be prescribed, the Chief Signal Officer will have
immediate .charge, ·under ·t-he -direct-ion of 'llhe Secretary ·of f;ar, of' :the·
following:
...
· . .~
. ;>11:
,
..
·
.
• *· *
.
.
. .e.•• · · {A.a. .emended by Changes No.· l, l\lay 10, 1929) -The preparation
and .rev.i.s.10.n. o.f. al-1 co.des an-d ciphers required by the A:l:rrf]{ e.nd in time
of war the interception of enerey- radio and wire traffic, the gonio-
metric location of enemy radio stations, the solution of intercepted
enell\Y code and cipher messages, and laboratory arrangements for the
employment and detection.of secret inks •
. . . . /II, . • • • . :/II. . .. ,.., • • • . . * . . . ...•....... *· ....
· j. · · - The· general- supervision-, cocrdination, and standardization
of all- radio operations ·and the enforcement of reglllations concerning
the same.
* * . * * * •
3• Unit· signal officers.--· a. A chief signal officer will be de-
tailed for.every expeditionary forC-e and a Signal Corps officer as Un.it
·· Signal -o-fficer will normally be detailed fer each corps area, department, •••
· and ·every taCtical unit larger than a brigade containing Signal Corps ..
· troops •••• · ·'!lie unit 1'1gnal officer will ·be ·a member of the staff of his
commanding officer. ·He will be.charged,'under the direction of his coin~
manding.officer, with the command of such portions of the Signal Corps be-
longing to his unit as are not placed by competent authority under some
other· corrmander or- assigned to some tactical unit containing other than
Signal ·corps troops. The unit signal officer is also charged with specific
duties ·as follows:
• • • . ·.
• • * •
{3) ·He will exercise direct technical su.pervision over
all signal work done by the comr.ie.nd,-whether executed by
Signal Corps troops or troops of other branches.
b. The corps area and department signal officers a.re also responsible
unde~ the policy of the War Department and the instructions .of the Chief
.. · Signal Officer for all matters concerning the Signal Co.rps in their reapec-
ti ve corps areas or departments, inclu.ding such matters-_ -in those .posts, ·
. -········.camps., . .and. sta..tions..not .. within the jurisdiction .o.f the .co-rps area. or-- depart-
ment _conmianc:'le~.,. h?:t wit_hin the ~e_rr.~toria.l .limits o_f their respecti:v-~. com-
mands, and excepting_ or;lly«those f~ctions directly under the control. ()f the
Chief Signal Officer." · · ··
REF ID :-A56930
- 99·-·.
87. Relations with the General Staf'f. - ~he liiilito.ry .IntelligQnce lG-2)
Division.of each headquarters-where. signal""intel:ligence activities are con-
du.cted,~xercises general staff supcrvi&ion over tlle Sii'i'lal Intelligence Service
. thereat~.' in accor_dance with. the following paragraphs of .AR 10-15: .
''SIDi'IOll I.
WAR DE?.AR'l~.IEHT GENBRAL STAFF
• • • • • *
· 9... . Military Intelligence Division, general duties •. - a. The
lUUta.ry Intelligence Division is charged, in general, with those
duties of the·War Department General" Staff which relate to the col- .. · .
lection_, evaluation, and disseuination _of ·_r.iilit.e.ry information. i ·: ·
•
:. ~
• • .. • ·. ·.. .. • : .... . .. . ... ~
• • • • * • •
SECTION II.
GlliER.µ Sr:i'AFP "WITH TROOP~
• • • • • • •
(d) Codes and ciphers.
• • • • • • •
· · · --·--··---·-· _________ ------------· -··-···------·.----------·-----------REF. J:D__;_A,5. 6 93J)___ _
"." .100 ~-
r·· ; . SECTION V .
ADJUTAl~S GElffiRAL
b. The Adjutant General has charge of the accounting for. c.odes al'l:d ci-
phers-; in accordance with Paragraph 11ofAli105-25, dealing with the methods
of receipting for codes, reports thereon, etc. In the absence of specific
regulations on the subject, The Adjutant General also has charge of the storage
of reserve editions of codes and ciphers and such p·arts of current editions as
have not been isstied for use.
c. The Adjutant General may call upon the Chief Signal Officer to pre-
pare distribution tables covering the issue of codes and ciphers to specific
organizations and offices; but normally the ty~e and.number of copies of
authorized codes and ciphers to be issued to regular units are shown in Tables·
of Basic Allowances. Such tables indicate, of course, the number of copies
that should be printed for each edition of a code or cipher.
SECTION XVIII.
SPECIFIC FUNGTIONS OF THE SIGNAL Il~TELLIGE~CE SE:f!VICE.
Paragraph
De.rivation of funct1°ons ····································~~········ 89
Code and cipher compilation ••••••••••••• ~ •••••••.•• ~ •••••••••••• • •••• • 90
Intercept ion of enemy communications ••••••••••••••• .- •••••••• ~ •••••••-~. 91
Radiogoniomet~y . .................................... • •.•••.• :.-••• • ·'111' • • • • • • • • 92
Code and cipher solution ••• ~ ••••••••••••.••••••••• ~ •••••••••••••••••••. 93
·secret inks •••••••• ·••.•••••..•••• ·•· •••••• ! ••••••••••••••• -~ ·• • • • • • • • • • • • • • .94-
:: Coemunicat ions security •••••••••••• ~ •••••••••••••••••••••••••• ~ ••••• •.... 95
..
·
- 101 -
..:. (5J ',~·~~-oratory ~r~_~m~nts. for 'the sel,e:ctiop and pre:Paration" of..
· ·:·~ e·ec)ret ink.a to be e!f1p~oyed by olll' ow~: •uthorized agents·;· ·a.nci ·
· .for "~he .~tection. Qf. th:e ·presence .of s8.cret-ink wr:liing 1~'.
. ·.·enemy dpcuments~ .· · .·". ·.. . . · · -~ · · _·;· ··.··_
:( 6) ·_ in~er~eption. an~,-mi?riHor-1:~ of our· o~n r~dJ~o -t~art~c·: i~ <>~¥.!' _::·'' .:·
to_ deteqt violations o;f r~~u.lations, and, tr.Qm the;point --~~'·;··· ..
, . ·-view of· co~un1c·ations _seQ.urity. _· · · -~ '· .. ·.. · , · . ' .. · '.·: ::· · · '
.• • . •• ~ . . . .• :· ~·· ~ • •. : , - .. ~- : I .. • i. i · .:. :
92. Radiogohiometry~ ~This fWlOtion· involves; in· time of war, the loca-
tion of enezny radio transmitting stations by radiogoniometry; in time of peace,
the necessary organization and tr'a'in:i:.ng· of personnel and the nece·ssary devel-:-
apmeilt ofequipment (see AR 105-5 ~ 'Paragraph 2b) to enabl~ the Signal co·rps
ta condact this work su.ccessf'u.lly. inmediately upon the ou.tbreak of war.
93. Code and cipher solation. - This function involves, in time of war,
the solu.tion of all code, cipher~ or _other disg11ised eneucr messages or documents
that may be intercepted by the Army· or forwarded by other agencies to the Arrey
for solution; in time of' peace, the necessary research work and the organiza-
tion and training of personnel to enable the Signal Corps to conduct this work
successfully inmediately u.pon the outbreak of· war~ · _ ,: · ·
94. Secret inks. - This fwiction involves, i~. time .of w~~. laboratory
arrangements for (1) the selection and_ptepart:-t.idn of ·se~1'.et ~.l'lk'.s •fo'be enr
ployed by au.thox:ized agents of olir own fprce_s;·,-~d-(2) t}?-~.d~tec~ion~C!f . ·~~e · ·
presence of secret-iri.k ~:r'iti.hg in'intercept;Eld etterri,y 'docnmen~s;-.'in ·~1th~ of -
peace, the necessary rese~ch·work.and:the.organizati&n;an<l·trainirig'i:>t ·;
personnel to enable the Signal Corps to conduct this work successfully
immediately upon the outbreak of war.
---------------------------------·-··-·········--· ---·----·····-· ~ ·-· --···-··· ·••··· ····-- ·······-··- .. ······ - -······ ·------
REF ___ ID:A5.69_3.0_______ ·---------------------------~·---- -----
- 10~ -
95.. Communications security. - Under current regulations, t;he actual
employment of codes and ciphers within the organization to which' they are
distrieu.ted for use in enccding or ·enciphering and decoding· or ·deciphering
'·
messages; is a function of.the message center of that organization. In or-
ganizations: down to and ·including J)ivision, the message centers are operated
by 51.gnal Corps person~el, in ~hose belo11 ~ivision, they ·a.re:opera.ted by
perscmnel assign-e·d 'by the commanders of the o.rganizat ions to ·serve under
the un-it -signal office~.· Although message centers are in -no way organically
related to the Signal Intelligence Service and the ~ork done at mess~e
centers is not performed by signal intelligence per·sonnel-, neverthele·ss the
proper employment of cod.e·s· and ciphers by all message center personnel· is an
important phase of secret communication. Should they be employed improperly,
their secrecy and the SE!Crecy. of the .ent.ii:e code. ·or cipher system is ·jeopard-
ized.. As an outgrowth of AR 105-5,." Paragraph 2j, in time of war as ·well as
in time. of peace ....the su:perviSion of- the use of-co:des and -ciphers b'y all' Army
personnel, with a view to irtsuring t·heir proper employoent, 'is· a responsibil_ity ·
of the Signal Corps and is· a :function- of speciully assigned persorihel of the · ·
Signal Intelligence Service·. ··This duty,· by inference at. least, :i•equires the
interception of our own radio traffic from time to time with a view to its
examination for infractions of regulations establi.shed to preserve searecy
of codes and cipher·s. · · · ·
s.&:1iI01; XIX.
TYP~ .AIID ACTIVIT.IES OF. SIGUAL ll~T"BLL.IGZIJCE UN[TS.: ·
Pai-agraph
Nwnber of type.~ .............. • ••••••.•••••••••••••••••••. • •·• : ~ • ~ :~ •• - ·_ · : 96 ·· ·
The War Department unit ••.• ·••••••••••.•••••••••••••••••• ~ • '· -• • .' •• .;. · 9'7 . ·
A corps area or department unit ••••.••••.••••••• ~ •••••••• • • ~ • • • • • 98 ·· · ·
A general headqliarters unit ·•••••••••••••••••••••••••••• •.•.•••••• 99
A field army 'Wl.it ••••••••••••••••••••••••••••••••••.•••••••.•.. •.• 100
' ; .
96. Nwn'.ber of types. ~· a. Depending upon \Vhere signal' intell~geriqe ~c
tivities are
condu.Cted, there are four types of signal intellige~ce u.n1 ~~,::~ii~
somewhat different. du.ties. These four types of un1t·s a.re as follows:·· · ... .
(1)
(2)
War Department unit.
Corps area or depa.rtr.ient unit·~
..
(3) General headquarters unit.
_( 4) Field army_ unit.
97. . The War Department unit. - . a.. The War Department signal intelligence
unit operates at the V:ar :p~p~rtment, in, Washington, under the direct contl"ol of .·
the Chief Signal' Officer. ..General sta:ff supervision over its activities· ·~s · exer-
cised by th~ G...;.2·.'1:Hv~siQn. of· the \Jar _Depart.ment General Staff'. ·· · ·"·
•• . a\._-:. . .• ' • : J.·1
·:·.
: ' ...
. . ' :.. · _. '. • .. <
REF ID:A56930
- ..103
, . -;.
• . I: :' .. (~) The co.mpila.tion .o! all .coP.es and ciphers and other mea..11.s of
. secret COl'lllilwi.iC.at.for.i ·~ri!Ployed' by the ~~. except that when
. estal;>lished, tl~e si~nal intelligence Uni~ at "tlie general
·1 ..
headqua;rters · ot: field or ex!>editi~inary forces will take
over: the prep~z'.atiori. ·_of such fiEdd e9d.e~8 and ciphers as are
required for. cUi':;-ent replc.cer.1eht within· ·the Theatre of Ope-
ratiot1s. ·. ·· · · · · ·
(2_) The in"terception, by .electrical mean.a, of enemy communications
. eoa.riating from stations ·not in the Theatre.of Operations.
(3) The radiogoniometi-ic lccatioii of the enemy'· stations from which
.. · . t~~_se int.~i:~epte_d. communica.~iohs Emanate. ·· · . · ·.
(4) The solution of secret or "disguised enemy commtl!lications includ-
. ing th~se .~ritten in code er cipher.' or those emplQying other
me~s:.for disgu~serilent.. : · ., · · · · '·
(5) Work with.secret inks,·to c·onsist in·the establishment of a lab-
.oratory for the. d~tection of sec:ret-il'lk·writirl.g. in intercepted
. ·. and'
-'ene~ commu.ri~cat.ions - se
!'or· the le~t ioti ~d prepB.rat ion of
.~u.it~ble..s~c:ret ·inks to be ·eniplole~ by authorized agents of
. the W~r Department. · ·' · · . · ·
~ . , ( ~) T:Q.e: su.perviSiop of Army "tadio. and wire traffic within· "tthe Zone
.
.• I
._·; ,; :.o:t: the interior from the ·pain-ti' ·dr ~1~w ··o·f coninunicatiuns se-
. ,cu:rity. .. " ..
. '
... -~8. . la. <?orps o.re& Qr depart:;nent unit. -- a. A sjgnAt~ intelligence unit
is assigne_d to. each of' $ti.ch, corps areas "arid de;;ic.i'tr!10ll~ s lis .f.:1ay be ·'.d:irected by
the War Department. The im'it opetat~s Wlder the direct control of the Corps
Area l or Depo.rt1Jent) Signal Officer. Ceneral ·staff sup~rvhi~n over its
· activi~ies is exercised by the G~~.Pivi~ion of the_Corps Area (or Department)
General- Starr., · · . . : · · ...._.,: · · ··, ,. " · · · ' · .. :."' · ' · " :··
---=-···--~
··-------·-·---···--····---------BEE_ID: A56930
- 104 -
b. The du.ties or a GHQ unit are as follows:
(1') The c~mpilatlon of such field codes and ciphers as are required
.as r~placeraents for those issued by the War Department to units
of .the field forces u.pon their mobilization; and, as directed
by the Commanding General of the field or expeditionary forces,
. the cQmp:Uation of. ·suah- special codes and ciphers as may be
necessary ._to meet local or spe·cial needs in the Theatre of Ope-
r"ioM. .
(2) The interce~tion, by electrical means, of enet!\Y' conrnunications
emanating·frQm the larger: or more important stations in the
· Theatre of' -Operations. · .
. . ,: (~) TJ:),e radi.ogonipmetric location of tne enemy· stations from which
these int.ercepted communications emanate.
(4) Solution of. secret or-disguised enemy conmlinications including
those written _in code or cipher or those employing other means
_ for disgu.isement. ·
(5). Work with: secret inks· to eonsist· in the establishment of a lab-
. · oratory fo~ the detection of ·secret~ink writing in intercepted
enemy communication~ "and for the selection and preparation of
s~itable secret inke to be employed by authorized a.gents of
- the Conman.ding General or the field or-expeditionary forces.
( 6) Supervision of the radio and Wire traffic of organizations sub-
ordinate to the GHQ., from the point of view of.communications ·
security.
(7) Stu.~ of su.ch captured enemy docwnents as relate to the signal
service of the enemy and are forwarded tr- it ·by the _G-2 Di·dsion
of the GHQ General Starr.
- 105 -
SECTION XX.
b. war Department and Corps Area and D~paI:tment signal. intelligence units
are orgruiized in accordance with the services each is. intended to perform, follow-
ing, in general, the patt.ern set up for the GHQ and Army signal intelligence units.
(l) Code and cipher compilation. During time of peace the War
Department signal intelligence unit, und~r the Chief ~ig
nal Officer of the Army, prepares and.revises all codes,
ciphers and other means of secret cor.mi~ication employed
by the Army in time.of peace, ruid also prepares field
co.des for employment by ~ombat units on active service.
It prepares a sufficient number. of e-ditions ·of the field
. codes to the end that .tr.oops ·may· have qertai.p editions
·.for peace time ,trafn~ng, .. ~d that cert·ain ..edit~cns may be
. held.· in rei;ie.rve for prompt. i.ssue. ..to troops .u.pcm mobili za-
. tion .t:or ·active. serv.ice.. Upon mobj).ization the \.·ar Depart-
. 'men,t . ~.ign~l ,inte.llig~nce ·.~i.t .~~tinues ."t;he preparation and
. revision 'of B;ll meiiris. :c,:t; .seQret· cozmnunic:ation., except that
after 'mob.iiizat ion,. the prepar~tion a~d r;ev,i-sion.. Pf field
c~des,· ahd ·of 'sci.ch spe'ci.al codes ~d: cipher~ aa .are
- 106 -
specifically for use ih the Theatre of Operations, becomes
a responsibility of the GHQ sig~al intelligence unit. It
shou.ld 'be noted that. code' und cipne'r compilation is per-
formed only by the r ar Department and GHQ signal intel-
1igence. .tmi ts.. . . . . . . . . .... - ...... .
· .(2) Interception of. -enenzy: communications •.. The .interception of
enemy communications by electrical means is prioarily radio
interc~ption, but, in the Combat Zone especially, also en-
tails the· :interception.·of enemy communications by ·BilY other·
electrical· means, s·uch as inductive or direct contact with
elect·rical circu.its carrying enemy messages whenever and
wherever this procedure is practicable. A certain amount
of radiogohiometric \lork is required in connect~on 111ith
radio interception for the pu.rpose of locating and iden-
tifying the enemy stat· ion the traf.fic of which is. being·
intercepted. ·The close relationship between interception
and. gori.lometric location. is evident. The (Chief) SignS!l
Officer of·the headqu.arters routes mes~ages or press re-
ports intercepte·d in clear· language to the G-2 Di vision
. :
of the headquarters staff, and routes messages intercepted
in code or cipher to· h5:s ·signal intelligence unit for solu-
·.:';
tion. -It .will be noted that., in time of:. war, int.ercept
... :•.' activities are conductad by all foil.r types of signal i~~el.-
ligence units. ·
(3) .RadiogoniOmetry •... This ·activity. entails the location o~
enenw radio transmitting stations by mea."ls of radiogonio~
meti·ic ·stations located at critical poi~ts within the. area
under the ·ju.risdictio~ of the headquart.e~s. to which tp~~ a.c-.
· . :t.ivity ;,i;s· assigned•··"·Location·or the enemy t;ran~mitting
. ·stations ~d the. deterrainatibn.ot the·tacticn_l ~it-whi.ch ·
: each slich sta.t ion serves, ·that ·is, ·Whether it.if!: ap, Army,
Corps, Division, Brigade, Hegimental, or Battalion stat~cm,.
indicates the tactical disposition of the enenw and the
determination of enemy ·stations as belonging- ~o·particu.~ar
units indicates the enemy battle order. The obtaining of
this very important information is .one of the major func-
tions ()f the Radio Intelligence Company serving a field
al'Iey'. To a lesser extent this may also be a function of
the Radio Intelligence Comp~ serving GHQ. The lChief)
Signal Officer of.the headqu.arters rou.tes the ~nformation
collected by this activity to the G-2 Division of the
headqu.arters staff; he also, of coiµ-se, supplies this
information direct.ly to his solu.tion section. It will
be noted that,·in time of '~ar, radiogoniometric activities
are conducted by all four types of signal intelligence
u.nits, but radiogoniometric ,,.,,ork spec.ifi.c.ally ~onnected
· · . with the determination of the enemy or.de+, ·of. ~b.attle is
conducted primarily by Arrey Signal Inte ll;ig~nce ~ervice,
. : ', •secondarily by GHQ Signal. Intelligence. f,e_r.vi:qe •. Very
: : ">.; <li.tt-i:e·, "if any; au.ch work i.s. condu.cted by ;tAct \;ar De-
, ' . ·. :, par.tment; or -a Corps Area, (o.r departme:nt). Signal In-
·~ · tell.ige.nee. Service. The: latter. c.ondu.ct, o.qly. such radio-
REF ID:A56930
- 10.7.._..
-
''('4) ,C6'f3:~ arid ciph.er s.o:lution;.;. .At· ·any he.adq\~rt~rs '.f;o. which
. ' a· 'signal iute~~.igence unit 'is assigned~ aJ..1 el;lemy com-
'in~ib·atio~s wp.,!Qh are in secret·'. or di~guise~ form and
whiCJ::i "are obta.ined either by radio inter~eption or
f~om 'other sour~es 111 timately r·ea.eh the code and cipher
s·61.U.t~.on seotfori o.f t.he · si-gnal ·intellige~ce unit for
soiut!.cri_. Solved ~.cor.nuniC·a-t;ions ·a.re. routed by the
(Ch~ef) .. Signal. Offic1?.r .of thEf"'neod~ua.i-ters to-.the-.G-2
"' ·D~v1sion of,.t~e li-eudquarters'"sta:fr". ·It ·c~:ouJ,d)e
•
noted that "solu.~·,on o.ctivltles:
' • • • •
condu.cted . b ..t all
• • • ••
are
•• • • • •• 6 ••• ( •
-
-··-·-··-·-··-------·--···- ... .. ··-····-·--··-----···--·-·---·--·-..-·~-----·~·------·
loe·-·
oper&:ta···1n a less exten.sive _manner, pl!aciryg'·dependence
upon t"he solved enemy c"od.es and cipher··ke'ys' "which have
..bee.n previously worked ou1; ·and furnished ·:them ·by the
solutipn section of the· larger sign&i intelHgenee :unit
with Vchich th~y are most closely allied.;: In E5ase the
sol.ution s~ction of a corps are·a or 'deprirt~ent sienal
intelligence Unit or that of field .A:rmY :s1.grlal intel-
ligence wiit obtains rnessae;~s in· a.. code or'.:cipher con-
cerning which ·it t:a:s ~eceived no date or which it is
· unable to sq1¥.e:,; -s"uch raessag'es are t<? be forwarded to
the solu.t.ion · se_ction ot· the larger Signal intelligence
.unit .(War pepe.rth1ent or. G.i:IQ, respectively) far· solution.
• (5, Secre.t inks. Secret ink i,a'bordtories are asi!igned only
to. the War Depattr.1ent· sign~l intelligence W1it and to
a GJ.Ici ·s~gnal intelligence rinit. ·These a.re ·staall labo-
ratori~·s·· w~ich serve two uain purposes: (a), the de-
tect_.i~ri, ,of;' se.cret-i:nk: writ ir.&6 in· intercepted enemy
commll.fltc'ations., al'.J.d' (b J ,, the selection and preparation
of c'ertain inks su.its.bl"e·for our own use. 1'hese labo-
ratories conduct researdh V;Ork Which Will ·enable them
to draw u.p instrU:ct.io'ns' for ce·rtain' simple and 'general
measures to be employe'tl by s'uoh personnel &S censorDhip
.offfoials, and. others ·who come ·in contact -with suspected
docuine,nts. In case· these rieasures fail, the documents,
if s't1ll suspecte·d,. a..re· forwarded ·to the laboratory for
final test. The laboratories also conduct research work
which will enable them to select ·and ·draw up instructions
i'or the. u,se of suiti;;.ble secret irik's by au.ch of our own
agents ~ho may: be authorized to em~loy them.
(6) Supervision of radio e.nd wire traffic. The (.Chief) :signal
. Of.ricer. establishes a commu..'lications security section as
a pc;,rt of his sigrtal irit·ell:igen:ce ·-unit.. ..'This section
conducts inde.perident radiO and wire intercept ·operations
directed toward obtaining sai.:iples o·f" our O\Ul traffic•
The (Chief) Signal Officer assie;.'"lls 'spe·cific periodswhen
personnel of his Radio Intelligence· Company direct their
att~ntion to ·transr.iiss.fons by' our own forces. ·Traffic
from this· source is ·turned over to the solution section
-for study and examination. If infractions of rules for
.. the u.~e· of codes and ciphers,. or carelessness and blunders
are 'noted, the ~tter is taken up through normal official
channels with a view to their correction or, if 'persisted
in, the. application of disciplinary rJeasures. In· addition
to such intercept activities, the monitoring of telephone
lines, in order to eliminute· or ·redtice, imprudent conversa-
tion over this important sou.rbe of information, may be .
conducted by '_sp~cially desig-nate·d p'ersonnel.
f ...
. ... ,,. ..
.'l .
REF ID:A56930
- 109