0% found this document useful (0 votes)
364 views111 pages

Advanced Cryptography

Book about cryptography

Uploaded by

adam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
364 views111 pages

Advanced Cryptography

Book about cryptography

Uploaded by

adam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 111

REF ID:A56930

CONFIDENTl.t· ..~

JY ~
·~~
--~.

~~~ ARMY EXTENSION COURSES

,/

Special Text No. 166


Advanced Military Cryptography.
1931 Edition
,·~

.;
.i

··\
.::·/
i'
't.''
Prepa~ed under the direction of the Chief Signal Officer for use with
the Army Extensi?n Courses.
/j

,i
i

.-·~ .

'k·
~:··
~}.·; _..
f~;'···
30 April 1959

This document is re-graded "CUNblDElf.f!fM:a" UP


of DOD Directive 5200.l dated 8 July 1957,
and by authority of the Director, National
Security Agency.

Jf~ft/~'
l>~ul S. Willard
Colonel, AGC
ti:, Adjutant General

••
•.111,

. "=·~-

eclassified and approved for release by NSA on 01-23-2014 pursuant to E.O.


-r-:})-·· 13526 ' ' '
T~f~ .
S?EC IAL TE:~ 110. 1G6
ADVlJ.~CED UILI'l.1ARY CRYPTOGRJ..PHY

PJ.RT I. CRYPTOGRAPHIC SY&TilIS


Paragraphs
SECTION I. Introd11etory remarks •••••••••••••••••••••••••••••••••••• 1-2

SZCTION II. :t..Ionophase transposition systems ••••••• , ••••••••• • ••• • ••• 3-9
III. Polyphase transposition systems ••••••••••••••••••••••••• 10-12
IV. True double transposition ••••••••••••••••••••••••••••••• 13-14
V. Grilles ••••••••••••••••••••••••••••••••••••••••••••••••• 15-24
VI. lliscellaneo~ transposition systems •••••••••• , •••••••• •. 25-28

B. SlmSTITUTION SYSTBIS

5iCTION VII. Polygraphic systems ·••••••••••••••••••••••••••••••••••• 29-31


VIII. Checlcerliloard digraphic substitution ••••••••••••••·••••' 32..37
IX. Complex substitution systems •••••••••·~•••••••••••••••• 38-45
X. Repetitive, s11perposed, and combined s;,rstems ••• ~ ••••••• 46-51
XI. Combined substitution-transposition systems ••••••• • •••• 52-58
XII. Cryptographs ••••••••••••••••••••••••••••••••••••••••••• 59-62
XI I I. lJ. S • Arrrzy cipher device; type ll-94 •••••••••••••••••••• 63-70
XIV. Cipher machines •••••••••••••••••••••••••••••••••••••••• 71-75

C. CODE SYST.BJ..iS
SZCTION XV. Code language and the international telegraph
reg~lations ••••••••••••••••••••••••••••••••••••••••• 76-79
XVI. E11ciphered code •••••••••••••••••••••••••••••••••••••••• 80-84

PAltT II. THi.: LIGN1~L INT:..;LLIGEUOE f>EltVICE

S::.CTION XVII •. General information ••••••••••••••••••••••••••••••••••• 85-88


XVIII. Specific functions of the Signal Intelligence Service , 89-95
XIX. Types and activities of signal intelligence units ••••• 96-100
xx. General organization and operation •••••••••••••••••••• 101-102
X.~I. General Staff responsibility •••••••••••••••••••••••••• 103

-· .. r •
REF ID :.A56930
i . ··.~ ..:. . . . : ...

• • ,- : I•~.:!· 1 •' • '

.·: . .·

.PART I. e:RYPrOGRAmIC SYSTEMS

., . · SECTIOlf I . ·

IlJTRODUCTORY REMARKS

Par"agraph
·nesume-·.or pre.c~cii.ng .information· ••••• , • •• • • • • • •.• • • •.• • • • • • • •.• •.• • 1
Sequen~e of stU:dy •·• , .• •.•••. -~ ••••.••••·• ~ ••. .- • ~ •.••••••• ·• ••••••• •·•·. • • •·~~
. :
. '
- .. ;: . . .. . .. .· . . . . .,; . ; . .

. · · ·· 1. .:·Resu,.me of' p~ceding informati.,n.-.- a. ·.In· Special Te~ No. 165,


(1931),, _,.Eleme~-pa&. 14:1.lit~ry crjptography~ the-student was ·gi van' his first
introd.uat-ion.,to t.he:, i;itµdy: ot'" the more "simple· m.eans -and methcds of secret
·· wrj:ting. · conaiderabl.e .attent.iOn was· devoted to certain preli*1iha:t-Y. data
in the. natur.e. ot. d~:f'.i'ni tions. 'ot b-asic terms ·.employed .in cryptography': ·~nd
·•· of the. _general. cirqum_stances ·aurrounding ·the ·use of. cryptography- "in mili-
. 't.ary: eoillDI\lni(lat:i.ons.·:>, The ractor·s determining the ·infl.uence 01' e'rrE;(jt that
the analysis oi mili't"ary cryptograms· •111 'have -on. the .tact~c.a:L,. s~ttiEitfon
were discussed somewhat in detail., and it was shown tliai· ot thes~ ·f'adt.ors
.··the most::impor.ta:nt i~ the degree of cryptographic security inherent: in' the
; _;cryptogr~phic:.sY:.stem _itseir~,· .This ·was then·. disa-usse,d in. det.ail i,n connec-
. tion. ·•itll-. -r~lated. fe~t6rs. invoiVed in' thE! .. length· ot' time req'iji~ed to eolve
military cryptograms~· it·t:entibn· weh; :also .d.irect~~ t11>. in:t'or~~i6n,.bearing
upon the employment of crypttigrapey:in::our .ArmY, an.d. t.h~ ':t'µric.tlons, :duties,
. ·and ~spon!3JbilitJes .of the various arms and servi~es conceril:e.d"in ft; were
Y~et forth,•• ;·.· Coming,
't:h.~n to~ a. cf:LScussion• ot. :cert:aln preliminary details Of a
: practical natlire~ ··it w.a·s ~hovm tha·t· systems; isulta:t?l~ for- mili t.ary use mu.st
conf~rm to certain more or °les·s· Tigid requirement;s before .tbe'y can ·~ven be
o:onsider~d f9r sue~ .~e ~ec·atise :of. the present-day' limi tatl'ons tlie' art of
.. of . signal ,camnunic.atfon in geii:e.ral:i ,· · . .: . ·.· . '· ·..·..... _ .,. . . · ·· ·
...• ,. . . . . . · . . ·:·: . ; .... ;: ·;:""'···, • . • • . . .. ! . .. .·
·...... •'.

:b •.. · ·H~:ving, assimilated ~Fthe foregoing .. dat~.· ~f 'an' in.troductoey


--= · naturi, the. ~~~deiit...then. took:' up· 'the 'study· or the two·. prin~ip(il."clas_ses
· :L.:.~_:f;:~ryptt>sr~.' i~ansposit.ion_· and sub·stituti·on. various ~xampl~s. of.
cipher··a~/s.tems···or the transposition c1ass. were first illustra.ted,. these
starting out with the simplest Va.r1Eities .of µionolit·erai roµte transposition
and then progressing .through more complex ty1l'0·5· ·e:;:r-simpt·e·c·olumnei---and key-
word columnar methods'~ . 'On.1y a .'hint "wa;s. conveyed. as .to the existence or
far more. oomplicat·ad double :and ·triple -traiispo.sit;ic;>n. :systems. The prin-
ci'pal di.saqyantages. of ·t.ransposition methods in ge~eral were discussed.
Then substitution systems were. ·h1kSn up· and. af.ter a :brief..· discussion of
·the -natur,e of ,alphabets in general and of the kinds ot' cipher alphabets
in partic"ill:ar;·-a..·tew.·exampies of simple~ :monoalpl;labetic ,substitution ci-
phers were given. Hethods Of producing mixed alphabets: were illustrated,
and the U$e of' sliding l?e.sic sequences to derive a set of secondary alpha-
bets was described. ·· Ca~es. of :mOnoalphabetic: substitution with variants
were presented and their· dls'aci~antages :from the point of -view ot' crypto-
graphic security were di°scussed~ It was stated that despite a multi-
plicity ot' values t'or cipher equivalents, such methods do not yield crypto-
grams of a high degree of security, and for this .reason other methods of
REF ID:A56930

- 2 -

producing a multiplicity of values, based ~pon true polyalphabetic methods,


are more satisfactory ..·. The ·use of cipher.9.isks.w:id cipher tables of various
sorts was discussed in connection with more 'complicated types or substitu-
tion, and their disadvantages pointed out. Mention was made or methods of
increasing the degree of' cryptographic security by suppressing or elimina-
ting the manifestations of periodicity in polyalphabetic syste~s based upon
the use of a repeating key. These led to a consideration of the development
and use of cryptographs and cipher machines, a few of' which were merely men-
tioned.· '· · · · · · · · · · · ....
............ o

. .......
' • ,. t

'
••

..
'I I • • 't

c.. The category or substit~ti.'a~· meth·a·a:s· Uh'd"e'r the heading of code


systems wa~ tlieri discus~~d· and exampl,es· of the v,arious typ,es of code words
and codebook ari-aligements giv.en. ·, ·:It. was. enipha.sized that. at the present
time code methods ··or 'c·ryptography .,:p~edo;minate. in our'-.Al-my, and the reasons
for this situat'ion Outlined..- ··.-This -i.nv,oived .a ctjmparison of the advantages
and disadyantages · ~f. cipher and eode ·methqd~ :trqri:i_ the _point or view· of
simplicity,· rapi~ity, practicabil:i;fjy,. sec;i-epy, ·accu!acy, and economy. Con-
siderable attention was de'\l'csted ,t9·.the. secrecy requir~ments of a crypto-
graphic ~ystem for military use., e.n.d it:wa~. po.int;ed out 'that· at present good
cpde .SYS°!ieins o_ffer ·greater adl\Tantag~~: in. ;thi,s respect than do those cipher
systems. which ~y be ~egarded, ·~a, bei.ng .. surfi,cieritly_
. . . : .
practicable
. .. :
for military
use. :. .
d. ·There then 'f'~l~~~~~· ·;;a-'b.r.;e~ ai~~ua~ion of the errors· which are
al.mo.st-inevitable. in cryptographic ~01~iaa,~1.:on; and of methods for their
supjfression· ~nd elimination.·, Finally, a ~ummary of t:Q.~ ·rundaniental rules
for safeguar~ing cryptograms was .. presented. · '· ·
.··: : .:
;
• • I I

!.~ · ·with'_the· foregoing ·as. ~- ~ac~rouri.d, a review· of ·whieh is· rec-


ommended,· the student· ts in a posi-tion no.w to t_ake up the study. of more
advanced cryptographic methods. ppecial emphasis ·is to ·be ·1aid upon only
.... S'4.ch _systems as are practicable for military U:se. · It· ii:r ne'ceEfse.ry to add
. ·. th~t viewpo_infs ai•e always ·undergoing change:. what is regarded as wholly
. . impractfoable today; may, through sorpe· Unforese'.e~ improvemen1i in technique,
:become· feasible·tomoProw, an.cl it i~ unwise to c'ondemn -'a system·too hastily.
'·].'or. ample, before· th~ ·World.,War:,. and .indeed. :for· the :first t·wo years of
.that .. cc;>~f'li~t; .. the-use ·of codebooks.in the theatre of operations was re-
. garc}ed. as whoily impracticable.~ ,Colonel.· H'.:i,ft in his Manual. for the Solu-
tion ct· Militarz ·Ciphers, .published. in ~9i6, ~ays:.
"The necessity fer exiH~t eXJ>raasioil ·or ide·as
practicall.y excludes .tbe use of cod~s for mtlitary
work, ·although it is .po·ssible that a speCial· tactical
code might. be· use,:ful for· prepa?'.ation of· tactical orders."

. Also~· iri an or:fieial British.Army 1-ilanual of' Crzytography prepared in


i914 is found ·the following statement: ·· · ·
: I I.

• ·"Codes :will .fir.st be c.onsidered; but as they de


not. :ful.f.ill the. condttion.s required of .a means of'·
secret eotm:lllnicat;ion in. the. r:l'.eltf, they need not be
dealt with here at length •.''· · · ··
REF-ID:A56930

..' :~ '. :"


..: . .. .
·,

·- :1.

;;... :3 ... ·.··:·

It need only be point:e·d in 'this con;iection .t:hat today code methods ouf
.: p:redmti.inate in the secret communication ayst.eins··or the military, naval,
:-
0

and diplp~~~~. services of practically all the large nations of the world.
ireverth~l.P.s.s, it· is· likely· that within the· next decade or two the pendulum
may OJW, 'JO.OF.a· 's\-7in8" b'V'e:r· to· the· othal". w.si:t~?n and: ciphei- methods. may.. ~gain
come t.o. .~e .:t:ora,·
e'spe·ciul·l-y· ·if.· me.chW,c.a,l. and· electrical cipher ma-chines
are pa:r;f:aQ.~·~~ :~~ "tna't 't1t8i·r· ·Opar-a.t.iQD, .Q~c.qr,ie~~ _ifr'a'c't"icable :f'oI' general Use•
rt is.,tQ:r;-.this reason; 'if' ·fem ·no .other.,. ·that tll;e' '_c'ry'ptog:I-0.pher .who ..-d~sires
to keep .i,:Qr~.;5-t 6t"prog:re.se ·must .d~vote .qonsiderable ·=attention to· the: .111ore
complicated ~i:i)h.er'metliods o-:r· the 'past- and prese.rit ,'tiln.a~. for with.·t:he .in-
0

:·: troduc.tion of mechanical. and electrical devices the.Cdfuplexities and··dif-


'ficu:Lties ot:" these ~and:::Ooperated:-:"11B-t.b.ods may. be el.im.inated. As an instance
·, :: of: th.is, . there . maf'.6e_ .
cited a roethG>d o.:t: c~y,ptograp~y-)rbich·is
). ' '... .. . . . . . ·. . ' .
purely
.
mathe- '

-rnatical::Jin. chal'act.er. a:nd 'Which- ·;iis :so· c-pmpl,icate(l .wli"en 9perated: by hand that
· · its· use~~s-_~ .m:i.'111;'a:;-Y,° cipher wolil.d b.e .pract~cally ..iµtpos.sfble;'. yet,:oa=·mechan-
rca1 de:v:io.~ ~for ,perform:ing· the :math'emati-c.al. opeliati'o:trs 'folv-01 ved in · cJ:""yptograph-
±ng: aiid·· d~qr1fi>togr~phi:q.g· be' constructed,. can
a: c:ompact·;, efficient machine and
based upon 'the cryptographic ·principles invol,vad, *18Y _easily become a· reality
for field use. Consequently, i f among the methods to ·ha set forth ·herein
~-ce~tam; <i>~srapp.~~r to, the student to fall outside the realm of :what: is today
: consi:dere.4• p~~o~ic~bi~/· it.' _should h_! ..rellle.mb9.?-':ed ;t.~~ .~he purpose in describill$
· -'them •i:$: :tO;·:Pt.e~~n.t· for.· J:i±_s· lrjottsideratj,9n .,vari~u~. basJc'"cryptogr.aphic princi-
1

. ~ · :·ple:s1:·~~.~,no,t· :tci .. §~t for'th·methods:.thE:ll ~y..with a'. high degre-e or probability


: ;·:·.. :b.e ·.enco'l);~tErre( .·~~: ·.:m:~fit_~~f· erypto--graphy :i.~ _·,:ttie -~~~cifate ·future:.; .
,-;:, ,, . ···2·~- . ~~~u~~d~ of·;·s~~~y~·.·_;;;~st.,a~ i~ ~he:~~~c~ihtig'text·~:tr~~~~osition
systems will first be discussed, then substitution ·'·systems·•.:, Considerable
attention Vf·t~l. .l>~'.'d;e~t.f'd,tt,o combined substitut.·i,Qn:: )m~· tr_an$position methods.
Following_.:~~i'~; _\l,li-::1:-t.: e<?Bi~/~.-·~~scription of a li_u~ ~-~~ nt.tmber cf'. :ci-yptographs
of the ~~:··t,-~mp:;L~;itj.}Y~~;::·~p~e:ther with a dis~~.s~~-?:n' of _their 'present-day
limitat}.qna.:· -.Tb.e~.~t:E!:t-..- e,·· ~l amount of spaqe .will' be devoted ·to code
system~, 'wi t.h ._sp~:<:iaJ:'- e*ptia·si.s. iipon enciphereq ,· co<?-e. systems.< Fina'lly, there
will tollo\1,.·.·a;_d:i:~<:m~:$f6n. ci·f ·:a ·s;tgnal Corps servic~ called·: the Signal Intelli-
gen~e·\Se-rtlg_e ,<4r!·de:r;\ Whi#i, :-cer~ain cryptographic duti'es are co:raducted.
:·:·-.-:-~:~~· ...... ~. J ; ' . (. ;f'._ .. · '".";':."". ::·. '.. . _\. . . . . .
t-. :··'· ''.: -~.- ;· iT?:;· -:-;· ~;-:-_:
;·; .. . i ,.
..,,
' : i", .

. i

. ·: c·:.--·
,;
. ! ~ . '·.
~ . ; .
. .: ' ..:·~ ._) ; ; ;" . ~ ... .:
..·.::. ,·
':.
.! .• . ~ ~ :· ;. • • .• '
.•·' ..
.· ;:_
') r : '··
···.:.':.:
~
~ : .'
·.· ....
REF ID:A56930

- 4 - .

A. TRAl:;SPOS"ITION SYSTEiolS
SECT I ar\r II •

HoNOPHASE. Tl:{A.rSPOSITI01T ·SYSTEI..f3. · ·~


,.
... •· . ;

.·.- .. Parag~_a:ph
· 'Tr_an.sposi tion ·.systems employing geometric de$igns ............. ~ •• · 3 ... .
Ti'-apeZOici8.1 ·de.signs· · ••·.. ~ :.~ ....... ~ .:· ••.• -. '.•.• .;._,j •• ~ .......: •• •...... •.• • • • • • .. • • 4·., :
~ ~ri~gtJ,1~r· de~1gnB ~ .:•. ,~. -~--~-·. ~ -.; .... -.: .•:. •• -•.•••.••.•. -• • ;. ..•••••.•• -. -.. ~ ..... ....:_••.• - 5.
• ·n1a80nal ·~ethodS:. •·· .:~ -~-.- •• • :. ~ ..·. ·• .. ~••.••.. ·.-. ~ •.••._..-. ·• ~ •• ., .;~·-·-· -~ ~ •• -. • .. . • • 6
Interrupted: key-Word· trans:i;>osit"io.n •· ••••••••••• ·~. ~·-~. • .:...:•• •• .- ..... , • ?
-~~rn1Ut·at1bll rii8t"hoU· · .:, •• ·', ~ ~:- •• .~ •• ~- •.•.••••··;; •••. ;.·.;. •.--.-· ..:.- ..... •·.'..·:.• -~ ~. ........ 8
-~ri!n_sposi ti on ·inethoas ~u'siri.g; special. figures •••·••.• ;, ~ •• •'• ••• ~- •• ,.... 9
. .·. ·; .:! :. ; ;

·3·~ .· "Transposition syst'ema ·employing. ge·ometric -designs··-. In .the pre-


aeding teXt ·brief mention was ·made' of the use of geometDi:o.. ~esigns and
figures othei- .. th~n rectangles· in produc-:i:ng·. transp~si.tioli ;ciphers. It was
st'.at_ed _th~t ·triangles, trapezoids, ·and po·lygons of· varioue. ~YI!'Jlll~trical
·shapes ·a·an ~b·e 'empto"y'ed• Figures· of :these types form~ connec~4:ns.-l~nks. bet-
ween t:he"" me'thOds. 'that': use '··simple rectangular·-designs a.nd the t1l9.re. complica-
ted methods that use' ·rigures ·in whi~h··:transposition takes place .aiong. d-i-
agonais~ ·... ; . . . . . . . .
. . ; .. .
.· ~
. •' • . '·' t .. j ;. ~ ~·' .: ' • ..

· ·. ·. 4~.:
Tr'apezoidal desi"i:;ns·~ · -· a. ·A· trapezoid,-· or, :·more- ac.curate.ly_,.: a
'-· trt.inCBted triail.gle t : Of prearranged dimensiOilS SS' regards the-. llUmb~r Of I C0llS
(which in~th:i.s.case are'rhombs-).intowhich.it i's to be partition.ed,_.is--.9on-
.~tructed. There will be left on one side of the design a series of small
·· · t:Fi.a:rlgie·s ·which: a·re ·not' to be: used·: i'or. inseribl.ng· lett.e-rs, and ar~: therefore
. · ~r·o·ase1f o:fr in ·"uh& des'ien;· as sh6Wn tn..: Figure.·:i..;; Only· t-wo: agr~e~nt~ a,re
. . . . nece·ssary;: !Ii: order to . ·• . ~ . : .. ·. . . . ' . . :- .. . . .
·· ··fii:·-tiie"·'dizriens1o?ls· -or· · · :. ·' . . ; ·. ' . ~-
·th.0·.:;ci·esfgn:·;: 1f k:eyword ·: · · · · .. ··,
·: ·o:t:' k~~i)h'r.ise··· •to deter- · : , ·.·
..· : Inihe·=· ·the;·· D.umber· ·or.-.·ee11s··
·at _the· ·b~se ·:of' the' ·de- ·, ·· ··
sigtt·,' and 1fa understand..:
ing as to the height of
the design ex9ressed in
number of cells. The
successive horizontal
rows of cells will de-
crease by one in number
from bottom to top of the Fi-"'.
~
l.
design. In Fig. 1, the
keyphrase, NO CANDY FOR ISSUE, is used as a basis i'or deriving e. nUI!lbrical
key of 15 elements, and it is assumed that by prearrangement it was agreed
that the height of the design should be eight cells. Therefore, the bottom
row has 15 cells, the next one upwards, 14, the next, 13, and so on, to the
last, with 8 cells. The inscription may follow any route agreed upnn; in
REF ID:A56930
• .'• II

: •• :· ;. t'."
... 'i '
• \I • ~' ,• P •

·····.'··-··': .... ;· .... ,


. .. ... :- ... : ..... ·. ' ;' ..·. :.·.. .·; ... . . - 5 ~- .: .
the eXaiDpie, ·1t ·rollo•.s ~he ~orma~ -~~-~;·'-;r ·'.;;~·t1rig~·
The transcription
follows the numerical key order·~·" Y.ielding.:th~s; c;i:ypt~gram:

ODAIK AEDIJIE.·HPODV
..... ·. ITEIP N H-U ET· BO BRO
: .·.
HDTFS E .I s . _ir .. I
. •
· .. E T: B Ji: F
1 ... • ·· .. \ ·.
BCBTM E· SH GA RT ORD
. . ') . . .
IRE RE .
.A
.
·,v· .A: ...R•. .R.... . . '~
'E :R T N S IEPVR VA SEO FTEDL
.NA .. ···.
. . . : ... .·; . ,.·· ...... -.··· _· ... , ~ ·.: ~ : ., . :...
b·. Dearyptographin,g. ~s·t:he~ely:.·the· r~vel',se-.9.t:·c;i:-yptographing, ther~ be-
ing no·· d·ittimU.t ~e.s prc5vided···that :. tht; design·. has ;been. :Correctly constructed.
For this purp~se"' 'cro"as::section···pape.r;·:w.i,~+..:'b~.·~;eo~d··useM. The analysis Of
such a cryptogram is somewhat complicated oy ine-p'l'tiseiice of columns having
varying numbers of letters; it may be fl;rther complicated by following com-
ple·:x: rout.a~ in. i:p.soription. It is also possible to::fo11.ow a numerical key
in the inscription of t·he plain tezt in horJi.o~tal lines; this additional
procedure would further complicate and ·delay· ·sbluti(,n.. :·

5. Triangular desiBJls. - a. The· sl~l~st wa:j of" drawing up an equi-


lateral triangle for cryptogDBphing is to take cross-section paper, draw a
square the .flide o.f .1"hi,qh is equal to the length agreed upon as expressed in
tlie riumoear of.- ce:J,ls ~ and· then· draw.~ di.agqnal cutting the large square into
two· equal-~ triangles~·. ~.This is shown··1~. Fig;:· .~,:·1'Hc!tre the lQngth agreed upon
is nine,, ,·'-··-~ ~ . , .. ~iji~·. c~lls p'er·. side•;. ~~'~~~tel;"~· of the ·:plain text are in-
snri bed in·acoorqan·ce'with:·any.1 ·• _, .. 1 ·· . . ; ·.. ·.; ~--· ·
prearrangQ·d .route_=,,. ·t~~ ;b;ne:·:il-=-'...... ··=. ··=.· ·: :: . ·<~. ·'~\
lustrated in Fig. 3 being ·a::. : ,. .... ,·.::=, ·.•/~\ \ ><\··-· .. ·
. .·
simple me~hoq. .·'l'h~;.oein .tht;' let- ~~Y"'•. :!\. · ·····\ ·... ··\' ..
ters are ins,cribed. ·. in,,hO~izon.tal .. :.. , ..·. ·;~ . ~\. }_~ .. \.\. , · \ .. .-\ .. ···
. lines in. the normal manner. : When'. ~ . ·: \ .. . ·'( \ ~···
so inscribed,·· ·the· i~tters"·iu···the. ·r .... ~~..,;.. .'·; :~\. : ...... · · _,.'.._ ··\ _,\. ·' · ·
• \ • • • • • I .\-' \ ,.

diagram .w·ill: .t~~..2!!.-1 _columns __ .. , . ,:· '\.·. ~-· ,~·_; ·. :·\·· ·\-·-\''
where·~ is _the.. n~ber '(!:f ceJ.:ls: · . ; ·· ... '<Y \ .\.:-··-\ .\~~\··\
torming on~ _.ot. ~~e . .Sides =of. the .: : ; : ; ... \ ... \ . ~- \: ·\· ~.·\"' ~ · ·
· square from. whi,ch t:it~. ~riangle .. .-. , · , :. ·. "c _· \>-\ : \ ·'\ :\~ . \··~.:·' ...\, (
has been· co~!!truc.ted~ :Ther·total .... · ... ::.~\. \/\' .:' ·. ·\·~_\...-\-\. '
number of letters that· c-an be in~ .. : .... , . . , .· .> ··\ .'"\ . . . - \ •.
scribed within the triangle. is,.:. . · ';~-.-.· \;. Jo:" ·
the sum of n + (n - 1) -t (n - 2) · · · · · .,. -~;'\ \ ·. · Fig. 2
+ (n - 3) + ••••• + l. Fnr a
triangle based upon a side of 9 cells, the sum is 9 + 8 +·7 t 6 + 5 + 4 T 3 +
2 T1 = 45. The letters may then be transcribed to form the cryptogram by fol-
lowing another route, or by following a derived numerical. key applied to the
base ot the triangle. A si~le method ot deriving a key of 2n-l elements frnm
a key of n elements or letters is exemplified herewith. Let the key be
DIAGONALS7 a word of nine letters. E:x:tend this key to 2n-l places by repeti-
tion, and then assign numerical values as usual: -

.!!. • 9; 2n - 1 : 17
REF ID:A56930

- 6 -

1--2--3--4--5--6--7--8--9-1~-ll-12-13-14-15-16-l?
Keyword : D I A G 0 N ·A L S D I A G 0 N A L
Numerical key: 5--9--1-7-15-13--2-11-17--6-10--3--8-16-14--4-12
::i.": .•. '

This numerical key is the.one that has been employed in enciphering the message
..
in
·; ..Fig. 3 • ;

·.. • ''l.

: . ·· .. ·-

.. , .....
£. d.#Yirto~r~~ ... · •J
. ; . . .

UAOOE SEY 1· D RT I SS

--;::_:.<· .. D T.~-}T .. R A UN.TN PE HT R


.. , : .. ,

·. : ~ . .·:
~
Fig. 3.

. ·. ·,: ;:·i~~-·: :Bi. a _si~ght ~henge in .proced~e it· is possible to .enCipher a message
and-produce ~-~~n which, for.the sake of.accuracy in· special cases; is double
the original· length~ but which is self:..checking. ·suppose that instead of ap-
plying a single numerical key to the base o-.£· the triangie, a double-length key
is applied to the iegs, as shown in Fig. 4. Here the key is TRIANGLES, ex-
tended to double length by simple repetition, as follows:

l--2--3--4-5--8--7~.:..-9;..10-11-12-13-14-15-16--17-18
Keyword . T R I ·A N G L E S" - T R ;r A N . G L E S
Numerical key: 17-13-~7--l~ll--5--9--3-15-18-14--8~-12--8-10--4-16

This key is applied to the legs of the triangle beginning at the lower left-
hand oorner. The transcription then follows key-number or~er, which results
in doubling the length of the message but. the repeated le.tters ·are seat·tered
throughout the whole message. In decryptographing such a 'inessage the clerk
merely omits the second occurrence of a letter it' it agrees (in identity)
with its first sp~earance in the text • ..
... :" ..... ; .. : : ~ ~' . .;.. ...
... ;. ~. :· .. ,.
.·. . , ': $
; . : _; .: ; : ' .~ . ' • ! :.. ; ·
.·.. .· ...

• . • ! •. •· ~ : ; ~ •. .•
. ; ' . ,; ; .

·.
: '-· :.·

' ~· ·-
REF ID:A56930
-. 7 -.

C'.rypto~:

vu .s 0 c YN·TSO REOYS 0 URE R· D R I 'I' I DTOGD


R.A NE. 0 R ·I CS N C T R N J: GE?!Iq'E AT.CSR 0 S I I R
s· I O E.T. RTUAI P 0 EC 0 Tt:ESS DPRC lJ AURSD
'
Fig. 4.

Inscription: Up left s~de, down right, ..~l~ernetely.


·'
Transcription:·· (a) In ~~s 'fi.om the.bas~line, le~ to right and right
to lef't, alternately, upwards:

P I S 0 S · RNAT U S I E R S etc.
(h) In diagon~s :from right leg, in key number order.: .

RI ~ DR 0 UAYN etc.
(c) In rows trom left leg, in.key number order:
CT GE 0 YT CE U etc.
. .
(d) From columns in key numbel" order:
CNR 0 I
... T UGR U etc·. ·
Fig. 0.
REF ID:A56930

-s-
~ ,· .
6. Diagonal methods. - a. A method involving diagonal transposition
which-is reported to have been-employ'Efd'.bi ,t.t(e French ArmY in the World War,
is now to be described. A numeri'oai... k·ey i"s a:er.i ved from a fairly long word
or phrase, and a rectangle is o·onsti.\icrped.~·as,: Fig. 6. The text is in- in
scribed in this rectangle .;1.n· norrim-I'. ra:shi6n,' nulls be·ing employed, it' neces-
sary, to complete the . laa·t· 11:6.a' or· 'the: rectangie. . ; ..·
.·· . · ... ;.· •

b. The correspt1ndents ·agree 'bet'or~hand :upon sev~ral" diagE>nals which


run from left to r-ight:;. e:nd>t'rQI!i righ~ to l~ft 'and' which' 'intersec:t' thus cut-
ting up the d.ei;Jigll···:Q.u-i.te ·thorot\Shly. In: Fig.,·s let ·:these· ·selected diagonals
be those indiea·t~. b.y,...:t;·he n$bers' from 1.· to :G; in.elusive, the odd ones indi-
cating diagona1s·:rtinni11g from left to right. In the transcri:i;>ti~n, t~~.let­
ters along the indicated diagonals are first set down in groups of f'ive,
proceeding in ke~ number.order. Correspondents mu~t also agr~e b~forehand
as to .whether .a letter wh~ch lies at the intersect·ion ·o~ two diagonals will
be taken both 'times it is encountered or taken only once and, ·it' so,. whether
on its first or second, appearance. After all these lett'ers have been written
down, one then proceeds with the remaining letters ih the usual ·columnar man-
ner, omitting the letters which have already been taken, or, ·again, if' spec-
ially agreed u:Jon, repeating them e"'/e"J:Y. time they are encountered. If the
latter is done, the inclusion of such letters not only serves as a check' upon
accui"acy but· 'aiso materially increases the difficulties of' solution, since
·in·' thi's ca.se these- letters act. lil.:e nulls. The cryptographing process will
becoL1e clear upon the study or the example· in Fig. 6. ·

Message: ENEMY BATTERY LOCATED AT.WOODS 1;000 YARDS SOUTHEAST OF


r •..

l'.U.tMA.SBURG HEA.VY AR,TILLERY S'J,'OP THEY ARE FIRING AT RATE

OF THREE ROUNDS
. PER MHTUTE FOH. THE BATTERY X .WILLS, MA.J.
Keyphrase: MIINIGHT RIDE OF PAUL REVE,RE

Enciphering diagram: .

M I D U I G · H ·. T R· I D , E . O·.. F P A U L R E ·V E 'R E
l5-l~--2-16-12--9-10~22-19~13--3-~4-17~-8-l8--l-23-14-20--q~4--6~21--7
E. :rt .iEl u -y-, ·B A :·T . T' E .g1,l ):ti ·L. O' c lAl _'f. 'E ', ;D ®~:±'._: LW~ :0 0
_Q. fSY 0 r E T H 0 u s IA.\ mI D y A. R I.DI s s 0 I.III T H E
\A_] S T 0 F I:I U. U M [Al S B l]J B G . H E IAJ V · l.Y! A @ T I
L L E R Y S T 2:_ !Pl T H E ·y ~/ _R_ 'E F . I @ l_ N G (ii..±_
R A T E 0, F '!! . [iii ~- , E .]!. R .0 · U. :l.NJ- D :S,. rE!' E. \Bl M I N llIJ
T · E "· :F: ' 0: R T ··rnJ E B. A T T E. R Y [ii l.Wl I .L L ~ M A J
Cryptogram.:
AD ARR.
... 1'r

SE SAR I~ U A E X Y.AAPH· HAU RA .. UWYPW

RHEDO T~TFS
·, .......
~E _T .. B.. E... :R. 'f b I L T··G·I:M 0 E I T J 0

YRURB T L1 S F T A HUTT N pLAE y Ji! FY.O RE STE


AES I I E DL RT NN 0 R E 0 L D.Y.O E CA GR YT UMR
BDSVE L 0 HTN AT 0 MO E TE F s TAUM
Fig. 6
REF ID:A56930

- 9 -

7. Interrupted keyword transposition. - a. This method' cf trans-


position is· a ..davelO.:pm,en.t ~f a.. more-·simple method, wher.ain the transposition
follows a ;numerical key. The latter· must i'i£st ''be "described·~ A keyword or
keyphrase of
f(lir length·is selected and a nUr.lerical key deri;ved :from it.
Let this ~ey be the. phrase UNIFORI:IITY OF l.11!.'"I'HOD •..

Key phra·se : U . M I F 0 .. R :· M I · T Y 0 · F . M E .·T : H p D


numerical key: 17-l.0--6--3-11-14--8-7-15-l.8-12--4--9--2-16-":""5-l~~)..

The plain text is then written out in horizontal lines corresp~qing .:to.J~he
l~ngth Of the key; then transposition is effected within each row, according
to the sequence ·or numbers applicable, o.s shown in Fig. 7 •.

Message: ADl11INISTRJi.TIVE ORD!m.S MUST· BE COUl?.LETED .ANP REA.DY TO ACCOMPANY

FIELD ORDERS HOT LATER TIW-I 5: C'O P .M. THIS DATE. ··

Eneiphering diagram:

17-10--6--3-11-14--8--7-15-18-12--4--9--2-16--5-13--1
A D B I N I S T R A T I V E 0 R D E
,... R s 11 U s' T B E :c:· .Q M· P ·L. E·· T E,; :D .. ·A·.
·" N'~ n Pt E A ..n . Y T 0 A C C ·.O . M. : P A N ·. Y .• •lj•·

. '· "F · I .E t. D. · O R D E R . S: N O· · T L A : T · .E
. "";R· .T. ·H A N .F ·I V E P l,I .T H I · S : D .. A T
·.':E ,
.·•1

Cryptogram:

EE I IR MTS VD NT DIR OAAAE UPEME BLSSM


.. _:_ .. _. :·. ·-. ·•·· .. _:_.... ...... . • :·-· •• • . • .i ••. :: _f .... \" ...... ·•.. '· ...
n T c T R ·o Y ME c -··A' i1 ·T· ·y··0··· ··..;r;·i···a··ir tr
DROlD S~03L ,RTlA TDHVI HTNMA FESRP
E Fig. 7

J?.. . In ~he foregoing case the encipherment takes place only by trans-
position :within rowi:r, :.b'U..t ".i-t i.s·.ppssiQ-;L~· t.o: .f?ompli-E,.ate '·the; method by trans-
posing, in addition, the rows as a whole, employins.the· same" lt:ey or only a
portion of it, as much as is required. Thus, if the message contained 18
rows of 1'8 letters· ea·ch,. then the· tr.ans.position of rows could be effected
according to keynumber order, ·the last row being taken first (since the num-
ber 1 Of 'the' numericai key happens in this case to .be at .the end Of the num-
erical key}; the 14th row being taken second .(since. the number 2 of the num-
erical key l~ ~he"l.4~h i:nu:lber)·, and ·so ·on. )'lhere the message does not contain
as many c!omplete rows .as there are· numbers iri the key~:· the t.ransposi tion takes
place in 'kel'Ilumber order· nevertheless, the rows being 'taken· 1n the numerical
~. order of the numbers present. Using the same key and message as in the fore-
going case', 'the 'ericlpherinent' waul'd'·be·'·a:s' sli0Wn ·±n:· Fiig.L81e:·' ·;·.;:, .. ~: ::.
• .. ..:.··

. -··· -··- .... -·--··--. ·-- ·-··---------·--·-·----·-·-----·-·----·····- . -


·····-·· ··· ······--····------ ·--------~·----,
.. l.0 ...

En.ciphering diagram:
: :r• :r. . . •1: •~ •.•,. ·!: I · ', • , : . _; ~ t ~. . ' ; ' . .. . ' •
: : :· ..• ;!;''I: i7;.,10--6-~-ll-14..;.-8.;...;.7.;_15-l8-12--4--94.o.16.-5-l3--l
·: ·. ·· ·:1rj -:·· ·A D 14 I"' N I . S T R A T I V ·>l!: 0· R D E
::.·:·10 ~::·_.·, i:R · S . M U S T B · E C 0 M P L .. E T E. D· A
6 N D R E A ·D ..y; ··~T 0 A C C 0 ·M · p· A N Y
3 F I E L D 0 R D E R S N 0 T L A T E
l1 : · R T H A N F I V E P M "T R I S D A,· ·T
;.. i.4'°: :· .. · E. • .-. .. ;... . . ., ...... ' ·· ..

".' .: a.rfptogriln:. ·. · ·· · ·
·...
·,·_~_;::·,~ ~ .
... . ·,_, .. .... ·.
··-·······--·· .
~ ~

E T L N A .E D R ·o I D s T 0. E-: . L F. R y M E· c A R T . ':· y 0. D' A e


. :o:>z.( ·tr:o .p "lt A A .E u p E ·n E: B L. s s MD T c· T R 0 T .I A T D H

V I H T N· MA F E S · .. R P·E E.·E I I R M .T S V DMT D I R 0 A

. . . :...~~.&.~.J=~ :· . .. . .. ·-. i
,;

.£~.. From the preceding method i~ is but a step to the method of inter•
rupted key..'trimsposition now to be described •. Instead of writing the text in
regular-length groups corresponding to tbe length of the key,. it is written
out in irregular.groups the lengths of which vary according to some prearranged
plan •. For example, note the basis or the variable grouping in the following
diagram, which uses the same message and key as under .!·o~ this paragraph:

Enciphering diagram: ·

17-10--6--3-11-14--8--7-15-18-12--4--9--2-16--5-13--l·
A D u·r N I s T. B A -T - I V ·:E ·o ·:R .D E
R s M u s T B E c 0 M p L E T E D A
N D R E A D y T 0 A c. c 0 M· p·A N y
F I E L D 0 R· D E R s n 0 T L A T E
R T H A N F I V .E:· p M T H I s D A T
E
...: .
17•10--6--3~ll-14--8--7-l5-l8-12--4--9~-2~16-~5~13~-1
A D· M I N. I. S.- T R A T I V· E .. o· R .D E .
R S M U· S T B· E- ·O :o .M P L ·K •.•.
· · E D A T •. . •...• · •· :•...
: .·· D R E·N A D Y · T 0 A : C. · C · • • · .•: .. ·• •:
· .. r»:i·:· ·: : .,. 0 IA P A N Y F .. I . E L D 0. R . D E R •
:·-';.=.1 ··_;···. · • S N 0 •. •. . • . . . .•. • .. .-- .•. :. •1 .• • .
·: :·....:«/• .....;.:r <:,:::;· ·-'l' ·;L.·A·.T E ·R :J:',:·H·:.:~:, •. ,;.·.:.·•···•·····;,:·.:. •... ;.:.!··· ...
~-~~-':.·r :·:t.:_f.r1:.~.;.-y::-•. ··A. .. N: F". ~I. V· E; ·P.:· . .-. -~ :.. ·~.: .-..- · •· ~-~: .. ;e..:;_.· .• .. ~ .; .... :··· ·
.:.·:;J•t::··t:!r ~-;·:::i· <M;·T· .H_.:r .. s. ·. 1 D~- 11.;· ·T,·E (L . <C E. ·P).*.·. ·• , •.. :.·.,, ...•..
·.·
... ' ·.,. .. .
-.
...·r. ··••
•,; . ,/ :-..·
_>
(*The f'our final .. let.ter.s.··Ji.CEp. are.•nUll:a·; :to .. oompl.&te.. the;- rpw. }.
Fig •. 9
REF ID:A56930

.....- 11 -
.
Cryptogram·. ( colUmna.r . transpo:si ti on in key-number sequence):
. . ~-

EEEDI UAEAT IIIPC OEBRM MDRPO AFHTE


TIHTS BYFTP AVLRP DSEDM NLNTN SANEV
ST MC D CD IT D YREDR c ·o .E... E O . .E
... A. R T N . 0 S T A. M

A.CA.LL

Fig. 9 {Cont'd)

~- This ·method may·be combined with that ··sho\'in under!?. of this par"agraph,
thus f:u.rther complicating the system. In decry.ptogra.phing such a rne·ssa.ge it
·is· best to use cross..:.section p?per. blook out the cells to be ·occupied by ·let-
ters in the deciphering diagram, and indicate the key numbers applieable to
each line. This will facilitate the process materially and help eliminate
errors.

~· Another method of interrupted transposition is that which employs a


rather long sequence of digits to control the interruptinn. In order to avoid
the necessit~ of carrying ·around such- a written -sequence, it· -is possi:Ole to
agree upon a m1mber who.se reciprocal -when converted ~.Y ~ctual, ~i~i~idn ~nto
its equivalen:t·de.cimal number will give a long series. o-f digits. ·For example,
the reciprocal· of ·7, or .1/7, yields a repeating .sequence of fil digits: .
142857142857 ... ~; the reciprocal of 49, 1/491 yields a r:-epeating seq_uence of
42 ·digits, etc. ·zeros, when: ·they appear, are· omi.tted f·rom the sequence. · Sup-
pose the number 19 is agreed upon, the reciprocal of which yields -the· s.e-.:iuence
(0)52631578947368421. On cross-section paper mark off sets of cells corres-
pqngip.g·J_p. ll\lmQ.e:r. .tQ.: th~ successive digit~.· ThU:s: .. . ......

.. . ............ .
. . 5 2 6 3· 1 .5
.J I I I I !XI I D<I I I I I txl I I t><l t><I I I l I 1. etc .
. . . . .
.. . Let. 1;he ~essage "Qe .A.T'l'ACK. IfAS BEEN POf?TP0~1ED.•.
. . .

Enciphermen1;:

Cryptogram:

AH.Eso· TATSN" TNDAB P-C~"Eo PE


!.· To decryptograph such a message, the cryptogram is written down in
·a series of croae-secti·E>ll··CeUe:,· -Which -a.r..e t~en. blocked-~ff...in. sets acc.ording
-to the numex•ieal ·key: · ·· ·· · · -· ·· .· · · ·· · · ···· ··. · ········ · · · ·

5 ·2 .. . . . . .. . s .. .. . ... 3. .· 1 .. . .... 5'" ..


. I A.I HIE[ si. oJX]TJAl><JTls
. ..
INITIN. ;_·lni>?J
..
ifBIPfXl .c0 xi. El o.IPIE· I .
..... ·..
.

~--·····--------------------·----------------·-··-·---····--- ----
- 12 -
.. , ..'
Taking the lett~.:t"s ·i.n .. cQnse9utive ..order out of the 1;1uccessive sets, ~d
crossing them of'i''·the series at the same t-ine :.as they .are. being;;wrttten·
down to .con~tru~.t. tP,e-. plain text 1 the rnessaBe is found to begin with the
following ·two wC3rd·s·: · · .... ..
.•

ATrACK HAS •• .-
. !.•. Prepe,roto·:ry.·.·~:a cryptographihg, it· is necessary tc:>· f~nd the length
ot:. th~ message to· be·· enciphered and ·then. to· mark Off as ·manY.:.eell,s as will .
··be· req\J,ired ·ror enc'l:pherment·. ·. Nulls ·are used to fill in. c:~;l.ls ~~1:.mt. ar~. net :
ocoupie~ :after·· eric.iphering the· whole' ·message.. The sec:i:-eay ·~t .tJ:i!' m~thod cie-<
. pends, of· course, upori· the reciprocal ·.selected,. bU.t the~e i~ D:o~rea_son'·:~hY ....
any traction that will yield a long series of· digits cannot be employed. ·
If the sele~ti~n of key numb~rs were restricted to ·reciprocals, ·the secrecy·
. would· be more 11mited i-n
s·cop~ ·than is actually necessi·tate.d _by the method
·. 'itselt;. :
.. '
.. a.· -permut1it1bn method • .;. A· ·An old nethod, knO?Rll ·.in- li tero.ture. as
. the aerial teiegraphy method, l forms the basis of. '!ihis s..ystem.· .A set 'of
pe:rmutations of,3,: 4,-· ••• 9 digits ;i.s·agreed U:pon''and·th~se_perm1:1tations are
listed··1n a :definite· aerie·s. As .an· example,. let these-.p~Fp;nrt:a~~-ons be made ·
.qf tlie.dic;its 1 to 5·~ select_ing·only·fou.r of the:possible 120 •. ·Suppose those
··selected' ·a.~e the· f'ollowing, 'set dew in successive line~ ~of the diagrom in·
·to a. ,
:FJ:s ~ · · ·
Permutation
2 3 j l 5 4
2 3 1 5 4 ... .. . .. i
. ... 2 4
3 2 5 1 4 3 I 5 1 .. '

l 5 ... I 3 :2 4
1 5 3 2 4
!
4 3 1 5 2 4 3 I 1 5: ·: 2
!

Fig,. 10 !,
The letters of the plain-text, ta.ken in sets of fives, are d:l,stributed with-
in the sections of' the diagrum in aacordunce with the permutations indicated
above the sections and· also at. the· left. Thus, the fi.rst f'i ve letters of the
text, supposing them to be. the initiallet.ters oi• the :Word. RECOMMENDATIONS,
are inserted in the following pQsit.i~na-: .

. ... .
., ... ~
. ~ ... .. . . ., .
1 so named bec-~u~~- -it~:;~~- first de~lsed ·a~d emplOyed ·i~ m~saage~· transmitted
by a system of 'semaphore signaling in praatical usage in Europe before the
electrical telegraph was invented.
REF ID:A56930

.... ~.' .;

- 13.r. _ .
'• The,_.next·. fiv:e l,ett~r~; .are .i:nscz:ibecf ~n t_he· _secop.d. li.ne Qf: ·the. diagram in t·he
~ctions. indi.cated . .by.
. .
the:. pernutation
. ' . .above
., . .and . at the ..left of ·the l~ne. Thus:
.. .

. .·Permutation. , . .,
I 2
2 3 l 5 4 1-- -- - - _......_____
18 c
3 l
.....,.,..;.;_.;;;_..,...
R
__................._.5____
M 0
4: --+------.. .
i---------p.----:...-·~--+--~--------1-------------+----~------+---~------t
II.·3:2· 5 1._., 4---- 3 2
.....: - - - - ..-i - - -...
5 .. .1, 4
.N····, · ·., ll! •. . · r .. M ......--.. .. D ).~

ill
·' . .
,.
·' ·, ..... .. . .••

T.hia. process is co.ntin.ued for ea:ch· .line and for as many li~e13 as there are .
permutations indicated at t_he lef.t.•. In th~: foregoing ~ase, atter twenty let ..
ters have been inserted, one inserts a second set of five letters again on
the first line,- placing. the· lett43rs ·of this second set inrnediately to the
right Of those of the flrst set, respectively in keymimber order •. The suc-
ceeding lines are treated in similar fashion until the whole message has
been enciphered. The following example Will illustrate the process:

Message: ffECOMiiIE:NDATIONS Fo:Ei°LOCATIO!TS OF NEW BAI.LOOM PoSITIONS


,, i

NUST BE SUBMITTED BEFORE 12TH AIRDROI.lE COMP.AUY CHANGES

COl.1UA!ID POST TOI.IDilliOYT.

Enciphering diagram:

Permutation
.. · . 2. : 3 1 5 .. 4
2 3·1 5'4
EASE OM CTIDMA RC OTRM MO I E C D OITBEN
3 • 2 5 l· 4
3 2 5 l •4
NOSRPS ESNOMO A n U T l' T MlTOFOP DFMBAT
l 5 3 2 4
1 5 3 2 4 TESWYO
SLSTNR OBBLHO IWTEC1'1: N'AEFAR
4 3 . 1 5 2
4 3 1 5 2
L N I R c B"', R o v1.-1 s c• FLU H .G 0 OPTDOD.,.. OOBAEW

*The letters B, C and D are nulls, to complete the figure.

Fig. 10 E.,

The letters of the· cipher text are taken from the diagram according to ·any
prearranged. route-, the·most sir.tple ·being te transcr!be the lines 01'· letters
in groups of fives, thus:

E A SE 0 MC T I D HAR q 0 T R uuo I E c D 0 I T BEN

?T 0·$ R P: :S :a:. s r:r 0 f,{ 0 A I! U · ,TUT HN 0 F 0 .p D F !J!.E A T


~- . l
. . .. ·r' ."'
.. '
TE s WY 0 s"L s· T N R 0 B B L H 0 I w TE c MIT AE FA R

L)J I RC B. R.O ME ~ .C.. F LU H ..G O 0 p T D 0 D 0 0 B"A E w

---· ··----·-~·----.·------······ ----·····-··------·------------


_ _ _ _ _ _....___ _ _ _ _ _ RE-F~B-:-A56938----------- --

... 14 -
b. The foregoing method, when employed iu its most simple form, does
not yield cryptograms of even a moderate degree of seeurity; but if the method .
of inscription and transcription is varied and made more complex, th~ degree
of security may be increased quite noticeably. It is possible to use longer
permutations, based on sets of 6, 7; 8;- or 9 digits, but in every case the
:successive permutations must be prearranged as regnrds both the~p.exact.com­
position and their order or arrangel!l8nt.in the diagralii •
.. ... 9. · Transposition methods usine ~pecial :figures. - a.
. ~ . .
.The method now
-.p .
to be descr;tbed ..i.s usef'ul only· in speci.al cases -where ·the correspondence is
res·tricted .to brief' communications. bet,LV"een a very lini tad· number of persons.
It is' necessary. :to agree in advance on certain partiaulars, as will be seen ...
tet the· message to be encipl).ered be the tolloWing·: .
'
FOUR TRANSPORTS 'Ul.L BE COMPLE!'ED BY END OF APRIL MID SIX MORE BY

El-ID OF JULY.

Note the following figures and encipherment:


0 ~ R

l!,
~ R~
\1J
____,,,_.../
J
(--+=-·
T.
-.-1
.. A

N R I E p

E E
.Jf+O
F I D ·M

OR?SL OFUTA SOTITL BCMRN RIEPE BDPAI


LTDYN OARLN SXEEF IDMRE FYOEY NOJLB

DU
Fig. 11

.!?.· It will be noted that it is essential to agree in advance not only


upon the nature of the figure but also Upon the num,ber of figures per line •

.£• The next series is a modification of the preceding. The same message
will be employed, with a double•eross figure, five figures per line.
REF ID:A56930
- 15 ·~
,. . •. ! ;.[!.::•'\,•.

0 u D O

F-++-R ·n++--F
N·11·'r. I+t--·-A
, ...
' '
A R R p

A N R E .

L
M
# I

x I
·-
-D 0-+f-:-B
s D ·-+-1---·
N Ji;

y

Cryptogram:
"
0 U !' 0 L BET D 0 FRSRL E L E N F i:' T I. T p: -- C_~E- D I A

ARWSM..-:.·.,·. OYBRP A lT ft:E. F. ·: J L D 0 B OUMSD Y L' X· IN


..:. ·;' ;} .
.;';,, .. ·_:,· ·... :
E Y'.. ., ... :. . f~ . :' :: ; ·.' ..
~

' ~ : : .... : '• .. :. :-: .. : .· : : : )

··::' •· ;,
·.;::! ·.
: . . .: . .. . ~
.. . , '. r ~·-.: ,

.·. ',••.,
·:Fi·g~ ·l~ .- ... ;, . · -
:···· ..:· ...
· .. ,

d .•.. Still another series"may 'be ft;>~d, a~ follows:-· .:.··..· .

• :.. I : :' .
F N'··.

N~-0
A
R
·-·U
-·R
.:t·st·-
tr---'.. ···---D
·p "> - F
·' .;.:_ o
I
. T A.

r -1 ·r ', '
·.! . • .

~:.
I
i--:· :':" ::g~~:-r~:: .-.
D·. _. E,. _---·B Y... ·...:u ·. ~ .

's . . . , y· L .
.: 1.·

. Crypt(lgram: : ';.;

. ·, .. ':,·· .
_ ..F St L N ,ltO I P P "L E E I D. A. U Vl 0 M BYTRO R:R SR 0

.. ·."."'-~ .. .. ~

YL

Fig. 13
- 15· ...

.!• A figure of' different form than~ the p:eceding forms the basis of
.the next type.

0 A 0 D F R I Y
Crypt.?gram:
OOEDR TOYR7 PllrLE FPBEU RCBTS HEAIL
D S L T .F IT R ,0 P S B J" I X E L 0 A 0 D A DE F R I Y UL M

NY
Fig. 14
f. Frora the foreeoing examples, it is obvious that many other figures
may be used for effecting transpositions of this kind, such as stars of vary-
ing numbers of points, polygons ']f various symmetrical shapes, etc. It is
merely necessary to ·agr~~ upon the figures, the number of fig1,1res per line,
the ·starting points of the inscripti<'.'n and transcription processes.

~· The method lends itself' readily to combination with simple mono-


alphabetic substitution, yielding cryptograms of a rather high degree of
security.

SECTIOIT III.
POLYP.HA.SE TRAPSPOSITIOI: SYSTEHS
Paragraph
PolYPhase transposition rrBthods in general ••••••••••••••••••••• 10
True and false polyphase transpositions ......................... 11
True double transposition •••••••••••••••••••••••••••••••• • • • • •.• 1·2

10. Polyphase transposition methods in general. - ~· In Paragraph 32


of' Special Text Uo. 165, brief nention was made of transposition systems in
which two or more processes of rearraneeraent are involved. It w~s stated. ~hat
only a very limited number of such transposition methods are practicable ·for .·
military use, but that the degree of security· afforded by them is consi.derably
greater than that .afforded by certain much more complicated substitution meth-
ods'. ·The methods referred to are those '.Jhich involve.. two or more successive
transpositions, and merely for purposes of brevity in reference t~ey will here
. be called polyphase transposition IIEthods to distinguish them from·. the single
or monophase methods thus far described.
REF ID:A56930

- 17 -
b. It is obvious that a polyphase transposition method may involve
2, 3, ••• successive transpositions of t~e letters of the plain text. To
describe these methods in ceneral terms, one may indicate that·the letters
resulting: from a first transposition, dr;- iGnoted as th.e T-1 transposition,
form the basis of a second, or T-2 transposition. If the pr~eess· is con-
tinued, there may be T-3, T-4 ••• · transp;'~itions, and each may involve the
use of a geometric figure or design. Fe convenience, the design involved
in a·ccomplishing the T-1 transposi•,ion ,lr.K. / be designated ·as the D-1 design;
that involved in accomplishing the T-2 tJansposition as the D-2 design, etc.
However, it-.. maY. as well be st1:1ted at this point that, so far as ·military
cryptography.. is concerned,· methods which involve more than D-2 :and T-2 ·
elements are ·entirely impreetical and .:>f'ten those ·which ·involve ·no more.. than
D-2 and T-2- eiernent s are alsQ· -.ir~ract ical for such :.ueie • · ·. · '. · ..... ; ... :-- : ·~
. .. .. . . ·• . . ... .. . . . . ..'
·~· ~. . ;

11. .'.[!rue and false polyphase transpositions, - .!• · It~ ts po·i:rsi'ble to


perform two or more transpositions with t~e letters of a text and yet the
final cryptogram will be no more dit'ficu... t to solve than if only a single
transposition had been effected. The equivalent of this in. th~. case ot
substitution ciphers is to e11ciphe?' a monoalphabetic cryptogram'by means
of a second single alphabet: .the final result is still a monoalphabetic
substitution cipher. Liker!ise~ i1"·a· message has been enciph~red by a
ainple form of route trans9osition and a ~econd end similar or approximately
similar form of sim":lle route transpositi"n is again applied to the text of
the first transposition, the i'inaJ text is still that of a monophase trans-
position cbh-.:r. .ii;ain, two transpositions muy be accomplished without
really e:ff4'ctine a raost -t;horough sC_Jraml?l~ng r-f. the letters composing the
origin'ei text·. Examr)le~ wUl. serve to. clarify the difference between false
and true :P~iY,hase ti-a1~·a~osit~on ... ·. · · · · ·

b~ rote the following simple colwnnar 'transposition cipher p;oepare.d


accordine to the m~thod desci:-ibed
. . . . in 'par· .3~a11h 26. of Special Text lJ~ •. "165.:
Message: DELITIR ALL AJ!MU?:ITION TO 4J.n' m:y:ts1o?r DUUP.
Keyword: SCHEDULE· _ .. S C H E D UL ...
.7'-i-5"~;3-2-8-6-
. : .· ..
Enciphering rectangle:
"l 1 5·3 2 8 6 4
D E L IIV E R A
L L A M1 M u N I
T I ·o N·T 0 F 0 D-1
u R
s I
T
0
II I D I. v.
NID u . I - -
I
p

Cryptogram (T-l):

EL I R I . V M .T D D I M lT H N A I 0 I P LA 0 T 0 RN F V M"

DLTUS EUOIU
Fig. J..5
REF ID:A56930 ·----------.--·-· ·-·----··-·-·-··

...
- 18 -

In produ<?ing the foregoing cryptogram only the columns were transpo!3ed. .. .


Suppose that by prearrangement, using the keyword mrn:AK {derive:<J: numerical_.
ke1 ·= 2-Q.;;·3-1-4), the horizqntal lines of the foregoing enciphering rectangle
were· also·. to be transposed.· For example, let the horizontal lines of the
rectanc;le j)-J,. be. tr!:l.ns:posed inmediately before taking the letters.. _out of the
colwnns _of. _the desisn (in keynumber order) to i'orm the cipher ten. Thus: ·
7 1 5 ~ 2 8 6· 4· .
2 D E L I v E R A u R T H D I v I
5 L L A IA M u N I D E L I v. E R A
3 T I 0 N T 0 F 0 T I 0 N T 0. ,F' 0
1 u R T H D I v I s I 0 N D u M p
4 s I 0 N D u M p : L L A VI M u N· =I
D-1

Cryptogram· {T-2):

R "E' 'I I L D if ·T D H H I N N M I A 0 P I T L 0 0 A V .R F MN'

U:'lTSL I~OUU

Fig. 16

.2.• The ·foregoing, however,· is not a case o::t' true polyphase. or so•called
double transposition. The same final result may be accomplished in a way
which will at first gl.ance appear quite different, but is in reality one that
accomplishes the same two operations by combining them in one operation .... Let
the message be inscribed as bef'ore, but this time with both numerical keys
ap~lied to the top and side of the rectanele. Then let another rectangle of
the same dimensions, but with numbers in straic;ht sequence instead of key~
number sequence, be set alo~_gside it. Thus: ·
7 1 5 3 .2 8 6 4 l 2 3 4 5 ·6 7 8
2 D E L I v E R A 1
5 L L A M u u 1r I 2
3 T I 0 ?! T 0 F 0 3
1 u R T H D I v I 4
4 s I 0 N D u M p 5. I

D-1 D-2

':1J'ig. 17

Each letter in D-1 is now transferred to that cell in D-2 which is indicated
by the row and column indicators of th3 letter in D-1. For:exa~le, the
first letter, D, of D-1, has the indicators 2 - 7 and it is placed in the
2 - 7 call in D-Z: · the ~econd ·,1stt·::r. of 0.:.1, · \1hich is· E, is :placed in the
2 - 1 cell of D-2, and so on. The fi;.1al result is as f'oll0i7S:
REF ID:A56930

- 19 -

----
7 1 5 3
2 D 3 L I
2· 8
V :: R A
6 4
1 --:la 2
D
3 4
H: I T
5 6
v u
7 8
I
,.· 5 _b,_ .L A M 1~ U l'f I 2 E v I A L R D E
3TIOET O F O 3 I T l~ 0 0 F T 0
1 U R T H D I V I· 4 I D !:T p 0 -.!.i- s u
4,§_I ON D u M ? ·-- 5 L M 11 I A lT L u
·--·--
D-1 D-2
Fig. 18 ·.

It will be seen that if the columns of D·Z are now read downwards in straight
order from le:f1; to right the final cryptog·r·am. is identi'cal with ·that obtained
·under B_ abOTe :· ...3· E I I. L. · D V. T_ :J :P~ et.Q. ..
. . . .. . ..
d~" · The fore:;oins cipher: often calied the ·:Tihilist"Cf:ptie~, is referred
'to in-some Of. the oldet iiter~tµJ;"~ a~.a double'trans~Osi~ion Ci?hsr be~ause
it involv;;;s a tranS}los~ti·on of both colu.,:,ri1s aud rows; and indeed as ,described.
under sub;_Jaracra_;;,h- ]?_ aboY"e, it see:..1:!3. ~o involve a double process~ It. ~ s, ·
however, not an: exanl.yle of true. dp'!-1.ble translJO!:lition. ·7ha11 the _;:J.eehanism of:
this ciph:ir is corn)8re·a .irl. th that ao~1. to b~· de19cribed, the; great:· difference
in the crY!)togra~Jhic security of the two ~1E.thods will" becoine a:;n1?r9i1t. · ... : . '

12. True dolible transnosition. - a. In the forrn of the false double


tra!lS:!?OSition described abov~, it is Only entire columns cl:ld entire rows
tnat are tra:n.s.:;>osed. The disar1·ai1c;e::11e'.·lt of the letters is aft·:;r all not
ve:r.J thorough. In true double tra:is)Ositio11 tnis is no 1011.:::;er the case,
fo:r hsre the le.ttars of cOlUi.ili.iS. 8:,1Cl rows beqo.·re so. thoro~hly rearranged
that the final text l_Jres3:n.ts a co:ill)lete scraiabling <il.Iiiost :as thoU[:;h the ·1et-
ters of' the •:lessage had been tossed into a hat a,µ.d then drawn out _at random.

----------------~----.---

S:'i:CTI_ON IV. . ..
::···:

Parac;ra:ph
True double transposition of the columnar type •••••••••·.••••••••••• 13
General remarks on '!!rue :pol~rphase trans::;iosi tion •••• ••............. 14

13. True double transposition of the colu,m.nar t~r!Je. - !.• It is by


what is a:!;)parently a· si·;:,1ple iltodificatio11 of· certain of the colunmar me.thods
alraady described that an exceedin;_J.y .::,ood true double tra;.1s.:;:iosition can be
eff 3Cted. Let a numerical ~:eey be 6.erived :from a keY';IOrd in the usual manner,
and let the •11essage_pe .Wl'.itten out u;1c'ter this lre~r to form a rectangle, in the
usual. manner for colu::an~ tZoansl_)osition. The lea:;th of the message itself'
c~eterr11i:.13s the e::act dL'ilensions ot the recta..1.:;le thus 1'or.n.ed, and 'f7hether or
not it is coI1I.9letely or inco:urpletely filled.

b. In its most effective form. the double transnosition is based Ui)Oll


~ iriconroietely tilled rectan,:,le, that is, one in Which one-~ormore cells in
the last line remain unfilled. An exmu,le of the lll9thod now follows. Let
-.-------.....__ _ _ _ ___,JitE..~-:C.:.A5-fi..9.d-Q-----------~

- 20 -

the keyword be_ I.?'I'"3J2TA.TIO:iAL; the ;nes~_age to be enciphered, as follows:


...
. . - ~ . . : .
OF ·GOLDJ:!TVIJ"..U: STOP ':t:::Q.wST ?3.0i:t'T·_ -1~·:io:ic~~ ~ ..
.. : ........... .
'
Keyword: · I T :3 R U ... ,A.. :T . I . 0 N . -A.. L
H'
Derived numerical ke~T: 4--7
. -12--3-ll--8~-1.:.13--5-10--9...:.:.2-.:.6
. ~

The first, or D-1, recta11c:;le is inscribed in the usual manner -or· s im)le num-
erical· !tey colum.10.r tr;'lnS,!)Osition. It is shown as D-1 in the accompanying
figure. ..The letters
. - -----
of' the T-1 trans~osition are then inscribed in the second .·-··~--...._ ____ _
4--7-12--3-11--8--1-13--5-10--9--Z--6 4--7-12--3-11--8--1-13--5-10--9--2--6
0 u R A T T A c Tr
.LI.. s L 0 -7 A r: N' D G 0 p l~ 0 T u T N
u "T
- u
...!.
F
N
H
G
I L
?
L
I
0
N'
H E
]' ::.1
T
0
H
..
0 u s
T 0 H
- ·-
n· y .·-- s ---·
s _q_ --
u -·- ._H"
.

A 1'T
E A s ·T
A
0
R
F
D'
G 0 ·- ,___ L D .E
T
-··
---
E v --
L ·E s ro: u ~-

- - ·---
I L T 0 'P R E ~-
"
p R p T
S' T
0 R c E
0
I.:
i.
Jo.~

E F T
R E .E N F
-
·-
-·-· - --
D-1 D-2

Fig •. 19-!,

or D-2, rectangle in th~ normal manner of writing, that is, from left to right
and :f'rom the top downwards. This is sho\nl in D-2 of Fig. 19-a for the first
'two columns of D-1. (in n'Uillerical ke~r ora.er) after transfer· of-their letters
into D-2 •. The letters of' the rernainia::; columns of D-1 are transferred in the
same manner into D-2, yielding the. folloWi~g rectangle=

4--7-12--3-11--8--1-13--5-10--9--2--6
A N' N D G 0 p N 0 T u T N
u N A u L y T E E R 0 I F
A E I s 0 K R T s L R R w
0 s· H .. v E F u N H N A L T
R T I 0 R F T H E L w 6- u
I'" t' f • t • o "' .. •·\ E Q. E s 0 H 0 D E E T. ...'!) L
A 0 s 0 H R G I D s L ...'!) c
c F E s 0 :? T T

Fig. 19-:~

·For the T-2 text the .letters are transcribed from the D-2 ·rectangle, reading
down the colu;:;m,s in keynumber order, anc1 grouping the letters . in fives. · The
· crY!>togram is as i'olloll's:

PT RUT 0 GTT I RL 0 -
ti "".)
... DUS VO s OSAU A OREA
c 03 SH EE DEF .J TU L c H lT E ST Q, 0 F 0 Y' 'K FF HR
-· ........
PU ORA E' TLTE LHL:Z:S .G L 0 :;] R 0 U 0-lT A ·. I H I E S
EI! E TH l!i !) I T "
REF ID:A56930
_; .

..2.• In FS°rag:da:pb. 28. of ..Sp~c i al: Text Ho~ l.6S a~ variation .of th~· 'simple
.c().iunmar key meih~id ot trilnsposi tion Vias described. If' {he pl'o.cess' ·therein
i:Q'.dicat;e'd ·is ~epeated, double trapsposition:.is ef'f'ecte~. The f'olio\iring ex-
ample .·will ·s~rve .'\i.~ .. illustra.t13' tb,e method; usinG t.he' ;same ne sa~ge' and: key
as were.·used in. the ·paraj;ra:ph to which r~:f'e-rence .was .JBde: . . .
... •. .. . ~ . . . ; ·,· . •. ; .i . . . . • ·.• .~ .
Me$saae.:.
.. _RE;QuEsT
. '!1.!t'..'.!EDIAT:;i:
.
ro:EL-r:li'q:RC$i;:rrm;rrs··
... .
,.

:.; .. ..
. Keyword~. · ·, · .: .Pa 0 n· ·u 0 .T:: ··.
i:li3ri ved numerical· key·:; .4-5..-3-2..;.7-1~6 .. ··. t.
• • I '' • • ' •
.. . . i} .
. I ·.,'.

·:. ED:~tj>hei.:rnaQ. t :" .· .


. .4-5 ..3-2-7~1-6 : 4-5-3-2-7~1~6 4:,.5 ..3.2-7-l'...a 4 ..5 ...3~2~7-1-6 4-5
Text : .R E Q U E S · T I U ~11 E _D I ".A :· T E R E EN F O R c, E Iil E N'· T · S
. .
. T-1 ·: S ··I° N E 'Q E E E Q. M R c R ·r: . T. ·o T. E HE R S T A F .!'! .Jt. 'D . E M
~

.. .'.l'-2·': ·E.R E.J!.E RE · F :ff M ·T, A S. E. . T S E I :Q, 0 .T . MEIRDU-C MN


. ,, .
. ~ .

. ..
-
Orypi;9gram~
.. : .
•. ';. . ~ . .
1 •.•.

E :Er':E EE' :R·E F.1\f"n .·T A·S ~ ''l' s_:E: ·i'·Q o". T jJ_E IR

DUCMN ·. ' • =~

.......
d. In some resuects .'this modified •nethod is sinroler for the noYice to
perform correctly th~ is that eniploying rectancles. Ex:ierience has shown
t~· ·many 5.Il;e:x:p3rt cryptographic clerks fail to perform the two transpositions
cdrrectly.when 'D~l·an-d.D-.2 recta11f;les are employed in the work.
:·: .~ •~4.. ·. -~~j;-al ·~~~~k~ .·o~: ~r~ :;ol~pb~~e tran-si)ositi'on •. - a. The crypto-
~':i;m·i-0• .&e.~r·i~y. o:t'. ·the. t;rµ_e.·. double transp9~i:Hon· method deserves discussion.
qare'~'l.11. .sif~(ly.'of lf, c:r:typtogr:B:l~ en'cipl:iered. by the' "double transposition method
!3et · tcrth. ~n: pa:&~sra19hs .l3b arid. c, wHl convince the student that an extremely
thorough .scrambling·9t th~-letters is indeed.brought about by the method.
:Basi·call.Y, .its priooipl.e i53 the' spl-itting up .Pt. the adjacent or successive
leiite:i:s .qq11~t:~tutinG ·the pl~in' 't'ext by. .t.w:o _sets'. ot "cuts", the second ot which
. is in a direction that is perpendicU:l87'." to the _f'irst, with the individual
"cuts" o;t both ,se~.s arranged in a variable and ·irregular order. It is well
adapted -tor. a regular" and volu..."D.i,nous exchange cryptograms between corres- ot
'~ndents, because everi if. nBny ;msa·o.ges iii the_ uame l.m!r are intercepted, ,!!2.
long as n~ two messages ~ ident~l,.J.n length, they can only be crypt-
analyzed after considerable effort.I"· ··

.]... .Triple and quadIUple transpositions, of the sa;.ne nature are possible
but not practical ·ror. seriQus usage. · The.oretically, a continuation or repeti-
tion otthe transi>osition :proc·ess· will ultimately bring about a condition
wherein the n.n rectangle is iden'I; ical with t;he D-1 rect&"l.3le; in other words,
after a certain. nuz.1.her o.t tr:ms:positions ·the.. rectan(;le produced by a repeti-
. · tion. o;e ~?-~ crn>td§ra"ohing :J.rocess. resul t'fl' f.inall.Y in ~Y:-?togravhing the
message. Exactly ho.w J"Jl8D.Y' repetitive transpositions intervene in such cases
is extremely variable and ·a:e!>ends· u:9-0n. :factors· 1yit13 outside the scope ot this
text.

~-----~--------------------·---------------- ··--·-··----
·---··--···-·------ . ._.._._ ···-------·-------·--c---RE-F---I-B--:--A:S-6-9--3-0 _______________ __._.___ ,,. _. "·--· -------·

- 22 -
£.• In the exaa:?_)le ot cryptoc;rallhinc given in Par. 13-.2_, the D-1 and
D-2 rectangles ai:e identical in dimensions and identical numerical keys
··are applied to effect the T-1 and T~ tra:1apositions~· It is obvious_, how-
ever, that it is _not necessary to maintain these ·identities; D-1 &nd D-2
rectangles of' different dimensions may readily be employed, an~ even it it
is agreed to have the dimensions identical, the numerical keys :Cor the two
transpositions may be different. 1!'"\u"ther:~1ore, it is 3>0ssib-le to add other
variable elements. (l) The direction or manner of inscribing the letters
in the D-1 rectangle may be varied; (2) the direction of reading off or
taking the letters out of the D-1 rectan3le in effecting the T-1 trans-
position, that is, in transferring· them into t_he D-2 rectangle, may be
varied; (3) the direction of' inscribing these letters in the D-2· rectangle
may ba_"l.8.~ied; (4) the direction of reading off or takinB the letters out
of the n..:2 rectangle ·iri effecting the T-2 transposition ·.nay· be varied •.
Finally, one or more nulls may be inscribed at the end ot .. ei tP,.eJ:. the D-1
or the··_n-2 recta?l;'.f;le (but not both) in order that the total number of let-
ters involved in the two transpositions be different, a factor which still
further increases the degree of cry:ptogra9hi c security •

.9:.• The solution of cryPtosrams enci9hered u:;>on the double transposi-


tion principle is often made possible by the p~esence of certain plaiii-text
combinations, such as QU and CH (in Gernan) • For this reason-, caref'ul
cryptographers substitute a sinGle latter for ~uch combinations, as de-
cided upon by preagreement. For example, in one case the letter Q was in-
variably used as a substitute for the compound CH, with good effect,

SJ:CTICl!" V •· ·
GRII..LZS
~aragraph
· Types of cryptographic ·gril.:)..es ••••• , •.••••••••••••••••••••••• • • • • • 15
Simple grilles • ·••.•••..•• ~- •••••• ~- ~ .. • • • • . • • . • • . • . • . . . • . . . . . . . . • . . . . 16
·· · BEYVol ving grilles ••••••.•.•. ·.•..• -•.•• I!!• • • • • • • • • • • • • • • ·• • • • • • • • . ~.... 17
· . Grilles of other c;eorn.etric forms •••••••••••••• -. • • . • • • • • • • • • .• • • • • • . 18
· Polyphase tr.a:i_sposi tio11 by Grilles ••••••••••••••••••••••• ;. • • • • •.• • 19
Increas_in;:; security of revolving grilles ••••• .-~.. • • • • • • • • • • • • • • • •. 20
Const~ct ion of' revolvi~ crilles ............ ·••.. ·•••••••• ~. • • • • • • • • •.• 21
ifonper.torat~d crille 6: •••••••••· •.••• ~ .• •••.•••.• ~ •••••••.•.••••••••••••• 22
Rectangular or 1':Jost 'card 11 Grilles ••••••.•.••••••• ·•••• ·••••••••••••• 23
Construction of rectangUl.:ir or i 1post card' 1 grilles ••••••••••••••• 24

15. Types ot cryptographic .:;rilles • .;. Broadly spealcinG, cry-gtoGra:phic


grillesl are sheets of' ~aper, cardboard, o~ thin .-ootal in which perforations
have been made for the uncovering o-r spaces in which letters (or groups of
letters, syllables, entire '\7ords) may be uritten on another sheet of papar
·upon '\1hich the .;rille is superiraposed. Thia latter sheet, usually made also
of cross-secti·oil pa.::_Jer, will hereafter be desi311ated, for purposes of brev-
ity in reference,. ·as the .o'.l.r.JJ:.~e__t?rid, or grid. Its e:xternal .. d:Lwnsions are
·the sa~e as those of· the Grille. Grilles are of several ty~es_depending
. upon their construction and :rrsnner of -employaent. They vri.11 be· treated here
.,..under the titles of' ll) simple grilles, (2) revolvi:;J.G r;rilles, (3) nonper-
foro.ted grilles, and (4) "post cardn srilles.
r-·--------. ----------------- ---------------
ilso often called :istencils. 71
REF ID:A56930

..•,

• '., 16~ Simple· grill~·s. ·. ..; ~.. These ~ortsist., usually of a ·squ~re in which
:ti61e·s or apertt1.rE:1. s·.b..~ve bqen :·9°ut ·in
prearraneed posit~o11.s·; when. the srtlie .
is sU.:perimposed 'upon the· grid, these apertures disc:l,6s,e eells on.'the Grid,.
in which cells l~tters, grou~)S oi' l6tt~rs·; SJllabie·s,,. or .~niti:t'e' words 1'.l13Y 'be
inscribed. A;.1 e:x:a..nple is shown in Fig. 20. The 'rour ·sides ·or the o'Jvers'e.
surface of the c;rille are desi.:;~1at3d by the i'i~res l, 2, 3, 4; t·he fQul,"
sides of the rev~rse surface, by the fiaures 5, 6, 7, 8. These ficures are
· . eliI.PJ.9ye ,d ~O. indicate_ t~e position .Of the c;rille upon the Sl'id il'i euci1)herment •
: .. .I'

: Fig. 20

p_. (1) In cry:f)togra~hine;· a message the ~ill~, is !Jlaced .upon .the ,gr;id,
in one of' the.eiGht :possible ~Jositions: obvers_e surface up, with 'figure
1, 2, 3, or.. 4 at the to::i left; or reverse surfdce u9; with ticure 5~. s·, 7, or 6
at the· top .left. The lett Jrs of the :plai:.1 text ar~ then inscribed in the
cells disclosed by the a11·~rtl.L."es, follo11L1G any· :;>:,:·eorra11,S~d route. In fig. 21,
the nor-.i:lal raa...lJ?..c:;r of 1rriti:..1c, fror~ left to ri.:;;ht, ·and ·ftom the top downwards,
has been follm1ed in the 'inscription, '
the . ~,Jes$ase
.. . :b:ei11.;
.
ALL iTISTROY::RS OUTSIDE.
~

. ;' .

Fig. 21

---------··-----·· --·--------- .... ·--· ·~-· ..•...


·-· . -·---···-···~··-··· ·---· ------· ··----···. ---·-·---

- 24 -
(2) The -trm1scription pro·cess now follows. The cipher text is
written down., the letters being taken by following any prearranged route.,
which ll'D.lst De perpendicular to the route of inscriptiQn, otherwise the let·
ters ·will follow in plain-text order.. In the i'ollowil).g., the route is ·by
colunmei from:. left to rlght .•
Cry.pt ogram:
t R T. A D . T S S E R · Y 0 .I D S E L, 0 E U
(3) If the. number Of l~tters of the plain~text messa5e exceeds the
mpnber· of cells disclosed by one placement of the grille, the letters given
_by this placement are written down (in cryptographic order} and then .the
grille ls placed in the next posit io11 on a fresh· Grid·; the process is con-
tinued µi this mam1er until ·the entire message has been cryptographed. The
several sections of ·the cipher letters resulting ·from tlie placements o·r the 0

grille on sU.ccess1ve grids merely follow each other in the final cryptogram.
In this manner·of 'employroerit it is only necessary tor the correspondents to
agree upon the initial position of the 3l"ille and its successive positions
or placements.
,g,. It is obvious that by the use o:r a simple grille. the letters of a
msssage to be cryptographed lilBY ·be distributed within an enveloping nessqe
consisting mostly of 11 dwinyn text, inserted for pu...-nposes of enabling the
message to esca]:'e suppression in censorship. For examp_le, suppose the -grille
shown in Ftg. 20 is em.pl.oyed in position. l., and the message to be.conveyed is
.ALL DESTROYE.:."18 OUTSIDE:. The letters of this message are inscribed in their
proper places on 'the grid, exactly as.shown in Fig •.?l •. An "open" or disguis-
ing text is now to be composed., the latter serving as an envelope or "cover"
for the letters of tha secret text~ \Vhich remain in the :positions in which
they tall on the ~rid. The open or disguising text, in other words, is
built around or superLiiposed on the secret text. 1Iote how this is done in
~· 22, with an apparently innocent message readinc;:

I HA.VE rTORKED vzay ]ELL ALL DAY' THYTITG TO. GET EVERYTHING STRA.IGHl'EHED
UP BEFORE· GOil-TG OH MY if.5'..<T TRIP SGOT~, BOT lN3IDE TEr-r DA.¥S . • • •
11 '!:))
I H A v E w 0 R K E ~
e
D v ·E .R y ,W E L L A

L L D A y T R ....
"tr
I N

G T 0 G E T ·E v E R

y T H I H G s T R A

I G H T E :;:r E n· u p

B E F 0 R E G b I ?J
•.
G 0 M IJ y N ·E x T T

R I p s 0 u T H B u
T I N s I D E T E M
c.)~
.Fig,. 22
REF ID:A56930
- 25 -

~· The foregoing ~thod naturally requires the transmission of consider-


ably more text than is actually necessary for conveyinG the message intended.
Hhere question~ of .censorship are !lot. involved,.the methocl is thereto~ :lmprac-
tical •. A modification l)f the ?1l8thod S\lggesta itself in·t~ .use of a transpar-
ent sheet of pap~r superimposed upon a square or other ..fig1,1re in which the
inqividual ce.µs are i:i;~egnla.rly numbered BI!-d the inscr~:i;>tion process follows
the seqµence of numbers. An example :·is.. ~hqvm. in Fig. ~3, using the message
ROCK C3EEK BaIOO.:S -.nLI. m: DEST301'ED. ·.mrr:r:-r T~IL HAS. CilOSSED.
16 ,,3 ·25 21 39 44 7 J.5: w 0 T E H v ..l!i ..l!i
6 37. 29 41 1 11 45 31 ~ .• . .
R I E. s R R .s II
23 18' 43 10 24 20 28 14 E L R B .S B y G
34 12 8 42 48 4 33 38 N I E c D K E L.
2 35 47 30 5 46 26 17 0 T E D· c s R I
27 19 13 32 22 40 36 9 0 L D H D A A K

a
-
b

The transcription may now follow any preal.-ranged route. The normal method of
reading would produce the cryptogram beginning W c T E H O E E R I, etc. It
is obvious that the correspondents must possess designs with identically num.-
bered cellsl.

17. RevolVing grilles. - e.. In this type of grille ( see Fig. 24-a)
the apertures are also f'ormad by-perforating e. sheet of cross-section paper
according to prearrangement, but these apertures are so distributed that
when the grille is turned four times successively through angles of 90° and
set in four grille positions on the_ grid, all the cells on the e;rid are dis-
closed in turn. (The preparation of' such grilles uill be discussed in Para-
graph 21.) · I1' letters are inserted in the cells ·so disc;Lcised, then after a
complete revolution of the grille every one of the cells of' the grid will
contain a
le.tter a11c1 thua. the Grid \Till be conrpletely filled, For this
reason such a gr~lle is also called a selt'-fillin;;z, or an ~~-~:_completion
grille. The secrecy of messages e:::iciphered by its means is dependent upon
the distribution. or position of the apertures, the sequence of' grille posi-
tions on the grid, (i.e., whether in the order 1, 2, 3, 4 clockwise; .or l,
3, 4, 2 etc.) and the route followed in inscribing and transcribing the let-
ters in the cells of the G'l'id. For each position of the grille one-fourth
the total number of letters of' the text is inscribed; hence it is convenient
to refer to 11 sectionsa of the text, it being understood that each section
consists of one-fourth the total number of' letters.

b. There are t:10 lJOssible procedures so tar as the iI?-soription-trans-


cription sequence is concerned. (1) The letters of the plain text· may be
inscribed in the cells of the c;rid through the apertures disclosed by the
c;rille and then, when the c;rid bas been completel~r tilled, the grille re-
moved, and the letters transc:t-ibed froin the grid accordinG to a prearranged
route;- or, ('3) the letters of the :plain text may first be inscribed :i;.n the
cells of the grid according to a prearranced route and then the Grille ap-
plied to the co;~-:;letely-filled grid to: give the seqµence o'f letters. :tormina;
the cipher text of' the tra~cri:pt.ion process •. Tbre first IIBthod w:l-11_ :t>e
described_ in subparasraph £_, the second in sub:::;>aragra:ph-.e. ·
~-----......._-------..--------·-·
1 The system employed by the French .tr-.rry in 1886. was of the nature here de-
--------
scribed.

--·--------------------·------- ..... _____._,,_ ... .......... . .------ . --·l · ·- · . . . . . . . . ·- -. .. . _,. _ _


·····--··-··_l_ .---REF-~6-9-3-w.O--·------···-·-···-------· .. - ·-··-···· ---

.;. 26 "'."

.Q.• · ·Taking the simplest manner. of inscribing the letters, that is, from
l~ft to Tigh.t and from the top downwards, the letter.a of the first section o-f
)he text are ·inscribed in the cells disclosed by the apertures, the grille ·
b.eing in the first position.. This is shown in Fig. 24-'b. The grille' ls then
given 1/4 turn clocltwis~, bringing figure 2 to the top left. If the grille
has been co·rrec·tly prepared none of the .cells disclo.sed in the second grille
position on ·the grid.will be occupied by a letter. The letters of the second
section are then inscribed, this being shown in Fig•. 24-:-.Q.· In Fig. 24-g and
!· the.~~~~~ ~:f .11;1scribing the'· third and fourth sections, re&pectively, 8.1'6·.
ahown. TJ:,ie letters of. the cryptogram are then tBken out of· the completed gxoici ·
by following .8.llY' prearranged ·route· of transcription. · ·!{'he cryptogram below· bas
been tr~sc.ril:>.ed by foliow1ng down the. columns in .. suc_ces~.ion from left to right.

~~ssa.g~: . HOSTILE. 75-MM A.RTILL:a:RY· IN ACTION .i..T,: r.A:BMH6u$E .350 YARDS


SOUTHWE~T OF HAMILTON SCHOOL?QUSE.

.. : .. ;,..• .T T .
REF ID:A56930

- 27 -
4
E. y .E E Cry::Qtogram:
.L H: R
\1 E.· B VJ
• ... :' .~ ·.
-
.R }
'
u .o.. s ·N s· N D T LRI c· v
'
y ·a- o-:o T ..•' ~'1 I ·L H N
.,, .
I- L R
""D T· s :!;!l 0 F A ~-

c H T E F A I 0 u..
··F s0 l~1 T HURT I T c UL 0

'°V w 'I A L ]!; T N T I· R OE DA T MVU I E STE L


. .. ..y
·y. F, '1J ·T y F a·: .A l! ... y FRM·U RN S F·E FAS ES
;

R s c·· l!i F. A 1· H H 0
,• E SEA T .: 0 I D·T:L .y N O· I.N
0 0 u. v R s. D E s s
AH EA H· ED lt 0 T. ·. If HS.H H
M .L u A .H :a.
I
0 Tui :E: ·T
T T 0 I u s L H I-I E E TA MI y 0 SRE
.. . .e

·Fig.. 24 '( Con~d.)

.. i• ··..To· ~e-cryptogral)h s?ch a nessage, t~ cipher letters are inscribed


columnwise,in... a ·grid lOxlO (i.e., one composed ·or 100 cells, 10·:>~ side)
and. th~. t~· &rill~ applied to the. square in tour consecut·i ve poaitions
eo.rresponding to those used· in ·cryptographirig. Tlle letters; disclosed by
each ·:plac~eil.t :qf the ·grilie are rrri tte·n down. as they appe~r, section. after
sec-ti:on. ·. :· :: ... · · .. · · . · · · ·' · , ' · : ·
~:... ! •

vinz
• • •• o• •.I • ' :. I

. The .second ma'llD.eJ;" .Of' "enrploying a revo1


. ,.1e• . ·::;rhle is ·itere1y..the
· reciprocal o:r the first. The. pr.ocedure followed ·1n: the ;·first :n-E:thod· to< .
... deCrYlJtOgra1Jh :8: :mes~~g~ j..s fql~owed. in tlie sEfoo11.d :i:118thod to orjJ>tOg!'a@.' ·a
·.message; e.:m. t~ prqce~re 'followed ·in ·the ·tirst·;~th.od t·o crtptograph is
followed in the· ·seoond ·~mtliod to .~ecJ:'Y-.Ptocra_pli. · ·
.......~.:.;·;·~. ~ :~.:-.;....~.:~.··- ·...:.~.;..., .. ··t"'··-·:.:. . . .· ·.·
! .. 18 •. Gt.illes of ~other ge0IIB"tric :forms. - Grille.a. are 'rj.ot.lilllited to
$q_w\r..~~':"s4aFd .. fig1:1~s,_ They· n;iay" be. equilateral tri.an.gi.es, :pentagons, hex-
agons, aid ao pn.; Any f'ibiira··;whfoP. can be pivo·l;ed :up.on a central .point
and'.which· wben'.;t"evol~d upon this pivot can be placed in a· succession of
homologqus pcHl)..t ions over a .gr.id correspondiDG to the grille will, serve
equatiy .:well• A t~_iSJlJ~le '.~fo~ds tbree grille positions, a pentagon, five,
and so on. : .
~ ..

~l9~ >"~i:fP~·~;~-trillt·~·position by 3rilles. - One g:t:ille may. be employed


.
to inscribe the lette.rs· ·or the Lt"'B ssaee on the grid and a seco11d, and dif-
ferent' grille ·'employed ·to· trai.1ser1;be them :from the grid to farm th.e final.
text of the cryptograr:i. This'. riould canst itute a re3l double transposition
rretho·d_ ·oi' · G!'e~t · ~,onqn·e:x:itY.; · ~lY-ifhase tran s:posi t ion by a series of grilles
is of course possibl:-e. · ; · · · · ..
.. . . . .. . ;"'-·· ... .. ·- ................. ...... •.· ...
; -·~. ., \...
.
-~
.
20. · Increa·sing the ~o.urity of' revolving grilles. - .!.• The total.
number Of letters v1hich a~grfua·\?ul exactly encipher is termed its cap-
acitz. If the number Of letters of a rmssage is al\7ays equal to the total
capacity of the g:rille, this inf'ornation is of great aid in solution by
-----~------RE-F-l:D-rA-5-6--93-0--·-··- . -··-..·----- . . . . . . . . . . . . ~--------- . .- ·-..

. ..
- 26 - -,
the ene~. .For example, a message of 64 letters indicates a grille 8x8. with
16 apertures; one of 144 letters, a grille 12xl2 with 3& apertures, and- so on.
There ere, hooever, :qiethod s of employing a grille so that. it will serve to -
enc ipher··:;,ne ssages the lengths af' \1hich are greater or less than the ca:paci ty
ot the Grille •
.k· ~-.'hen the total number oi' letters is less tha:i;i tm capacity of the·
grille, no modification in ;mthod of use is nscessary. .Encipherrnent ot such
a message comes to a close when the last plain-text letter has been inscribed.
In· decry:ptogra:phin13 ruch a ;ressae;e, the recipient must strike out, on the grid
upon which he is to insc:-... ibe the cipher text, a number of' cells corresponding
1

to the difference between the number Of' letters of' the text as received ·end
the total capacity af' the bl'ille. _The locatioi1 C1£ ·the cells to be thus eli-
minated il1Ust be prearranged, and it is best usueill~r to strike them off from
the final positions of the grid. -

.2.• _ Uhen the total number af' letters is equal to or greater than the
capacity of the grille, a gr.id af' GI"eater capacity than that ot the grille
can be ];Il:'epared, on which the grille may be positioned several times, thus
forming a: large --or composite grid composed· by the juxtaposition of' the sev...
era:L' EID.all grids. It there are a few cells· in excess of the actual number
require·d, t~ese may be struck off from the large grid at prearranged points,
for-example, from the lest column and row, as shown in Fig. 25-b. The
grille is then placed in its first position in turn on each of' the component
grids, t~en in its second :position, and so on. An example will serve to
illustrate. A message of fifty-two letters is to be enciphered with the
grille shown in Fig. 25~1!,, -the .capacity ot vll.ich is sixteen letters. The
llUlnber ot letters of the message being greater than three tiims sixteen,
the composite grid must be comp_osed of f'our small grids containing a total
ot siXty-tour celis. ',T.'heref'ore, t1velve o:r these ce~s ·must be eliminated.
These are shown in Fig. 2p-k.· together m. th the nu.."1'.lb er indi eating the posi-
t ions ocoupied by the letters of the te:;.."t.

15 29 1 30 19 33

42 2 16 43 46 6

17 44 31 18 21 47

3 32 4 45 7 35

25 38 11 39 22 36

50 12 26 51' 48 10

27 52 40 24 49

13 41 14

-a i
Fig. 25
REF ID:A56930

· 21. Construction of revolvUlg g;t"ille·s. · - a. . There. e:re severaJ. ways


or preparing revolving grilles, of which the one-des·cribed· below is .the: most·
simple. All methods make use of cross-sect ion pa.pair• ·_, ··

~· SUppo~e a revolving grille· with a capacity of 100 lette.rs ~s to be


constructed. The cells of a sheet ot
cross-section paper lOxlO are nt.unbered
consecutively. in ;bands trom the outside to the center, in the ·manner .shovm ·
in- Fig. 26-.!_. It. will be· noted tha.~. in' each. band, if ~ is the num'ber of .
ee·lls ·forming_ one side of the band, the highest number assigned to ·the . ce~ls
in each·band is n-1.

1 2 4· 5 1
9 1
3
2 3 4
Q
5
7
6
8
7
--19 --
2
8 ·7 l 2' :3 ·4 .5 l 2 3 .....
7 6 5 1. .2 3 i 2 3
-

6· 5 4 3 ·1 1 2 3 4 5
. . .. . 5 4 3 2 I ·1 3 4 5 6·
4 3 2 1 3 2 1 .5 6 7
3 2 1 5 4 3 2 l· 7 8
°'
..... 2 1 7 6 5 4 3 2 ··1 9
1 9 8 ·7· 5· 5 4 3. 2 1
..
. Fig.:: 26-.!!,

c. It will _be noted that in each· band there is .a qU;adruplication ot


each dig~t: the figure l:. appears i'-our times, the figure 2 appears four times,
and· so on. From eaoh receding band there is to be cut out (n-1} cells: from
the outermost band, therefore, nine cells are to be cut out; :rrom the next
band, seven; from the next," f'ive; from the next, three; and i'rom the last,
one cell.. In determining specifically' what cells are to be cut out in each
band, the only rules to be observed are.these: (1) one and only one cell
bearing the figure 1 is to be cut out, one.and only one cell bearing the fig-
ure 2 is to be cut out, and so on; (2} as random a selection as possible is
to be m,ade among the cells available· for selection. f'9r perf'ora.t.ion. In
Fig. 26-b is. shown a· sample grille p:re!)ared in thfs way. ·
T"

+=' •.

Fig.. 26-.£.
-· 30 -
. ·· !• :·It. .t.he .. side of the grille is composed of an odd number o:r cells,
the -inner-J.UOflt -band will consist· c:r but ··oneccell. In sucll case this central
cell !llllst not be perforated~ · ··
- .. •';·

·!.· It :i.s obvious that millions of differently perforated grilles may


be· constructed. Grilles of. fixed external diluen·si9ns_. maY be desi~ated by
indicators, as was done ·,by. the German .A:J.rirJy" in 1915, when this system lff!.S
employed. For .example,· ·hie BRITZ grille might indicate a: :LOxJ.O grille;·
serving -t.o encipher me~sage·~ 'ot· aboU.t 100 letters,; the :ALBERT grille Dd.sht
indicate a 12x12 grille 9 serVf.ng to al.Cipher !IE ssage.s Of about 144 letters,
and so on. Thus, uith a set of grilles of various dimensions, .all construct-
ed by a cent~al headquartera a:n.d. ·distribute.d to lower units·, systematic- use.·
of grilles for :iBssages of' varying_ lengt~s ·can be _afforded.

!• A system for desisriatfng t~ ·positions. of the :perforated cells of


a grille may be establishe.d. be.tween q_<?.:rr~spondents, so that the necessity
for physical transmission of g±-illes·tqr'intercom:m.ttlication is eliminated.
An example of a possible system. is tb.St, ·which is based upon the coordinate
method of indicating the perforations.~.· .. The. colunms from. left to righ:f; and
the rows 1'.rom bottom to.top. ~re designated by t~e letters A, B, c, ••• •
Thus, the grille shown in Fig .26-b vio~l.d have'· th& t'ollowing tormula:
111

ADG; BBEH; CDJ; DEG; EA.CHi FFI;


. .
·o:E;
·i
HBDHJ;
. :
"J::bG; JA.BFI.
A• Given the formula,- the eight_ ·earners o:r ·the grille can be labelled
in various wa~rs by preill'rangeiaent. But· the sL-.iplest nethod is that shovm in
connection with Fig. 26-b. Then the initial pos.ition oi' the grille can be
:j.ndicated by the number Which appears at the up,er left-hand corner when the
. _ grille is -placed on. the ~id, ready for use. Thus, position l indicates that
~ .•':: ...the"·grille is in posit+on \7i.t~ the i'i~re 1 at the upper left-hand c~rner;
· ··· ·~sition 3, uith the f'i~re .~·at the upper left•hand· ccrner, etc.

~· The direction of' .revolving the .::;rille can be .clockwise .or _counter-
a;tockwise, so that car.re spon,de:n.t s :in.lat make arrange:::en ts beforehand as to·
..:which direction is to be :tallowed. ·· ·

i· _:aevolving ~rilles can be e!d,nstructed so that tney h&ve ,t\vo '.o:)erating


f'aces, ·an obverse and a reverse face~· They may be terr.-.Ed revolving-re_!_e!!!l>_~
grilles. The principles of their co:n.struction . :"9rely involve a ra.odification
of those described in CO!mection with ordi::iary revolving grilles. A revolving-
reversible grillewill have eie;h.t :!.JOSsible placement indicators; USUall~r posi-
tions 1 and 5, 2 and G, etc., corres:Jond in this obverse-reverse relationship,
as shown in Fig. 20.

1· The pri:~ciples of COilstruction described in the preceding paragraphs


81Jply also to grilles oi' othe:t" sha1::ies, ruch as triangles, pentagons, etc.

22. lfonperforated grilles. - a. All the. ef:f'ects of a grille with


actual perforations :;nay·be obtain~db~ tae modified use of a nonperforated
grille. Let the cells that would normally be cut out in a grille be indicated
merely by crosses thereo~, and then On a sheet of cross-section paper let the
REF ID:A56930
- 31-
d;istribu'f!ion of letters resulting from each plaQe,,ient .of the gri)..le on a grid
.be indicated. by inserting c'rosses· 'iii the appr,opria'l;ie ~el.le{,· ~s shoym, .. Fig. 27 • in·
.·dr1i1e
Grille Pctsition

-a b ...
Fig.; 27
. ) .'· . . ' : ..
b. Note should be i.mde:· or· the ,fact that in· Fig. 27-b the distribution
Of 'crosses shown.. in the third· l'i)V( ·~ i cells is the reverse Of that shdwn ·in
the i'irst; too.distribution shown in'.the i'ourth row is the reverse 01' that
shown in the '¢econd. This rule is a~:plicable to 81.~ revolviiig grilles and
is of ir.iportance in ~olution.
~ ;

:e·. ··-·ri'the letters of the text are now inscribed {nor-.uai manner ot
m-it tiig')':r;n the cells not eliain.ated: by crosses, and the letters trans-
cribed f'rom
COlllilD.1.S to form t:h~- hfy}?togram, . the rerults are the sarJ:ie ·as
though a perforated gri_U~ haa·Qtien employed.· Thus:

E W C R A E 0 L D A R D D A T Y
·CrY!Jt ogram:
... ..
E \if C R A E 0 L '.D. A . : R D D A T Y

Fi:;.,27-.£_

-d. It i·s· obvious that· ·a nu.-n:erical key may be appli~d. to effect. a .


colurrmar transposition in the foregoing method, giying a_dditional.security.

~· The method is applicable to grilles of other shap;~, such as


triangles, penta::,'Qns, hexal?,ons_, octagons, e.tc_.. . . ,

!• In Fig. 27-c it is not~d 1ih~t there are 1;-iany -c~lls thi:r\; -~ight be
occupied by letters but are not.. It· is
obvious that 'these iray be .. tilled
with nulls so that the grid is camvletely fi_lled rd th le.tte~s. Long messages
may be enciphered by the superposition of sever0.i. .d.iagi:-a1-ila.
sions as Fig. 27-£.. · . .· · -
·°'f
thf!) same"·dµaen ..

------~---·--- .. ---------- ----


..
- 32 -
23, Rectangular or "post-card11 grilles. - a. The grille shown in Fig. ·2a
dii'fers i'l'om the ordinary revolving grille in that (1) the apertures are rect-
angular in shape, and are greater in width, thus perraitting of' inscribing sev-
eral letters in the cells disclosed on the grid by each :perforation of the
grille;· and (2) the grille itself' adrJ.its of.but two positions with its obverse
side ~P and two with its reverse side up. In Fig. 28 the apertures are num-
bered in succession from top to bottoill. in· four series, each applying to one
position of the grille; the nu...'iibers
in parentheses apply to the aper- l. 3
tures when the grille is reversed;
the numbers at the co:i-n'i3rs apply 11(33),
to the four positions in which the
grille may be placed upon the @~id. i2(34)1 {v9)Z£

(£9)1£ 3(35)
]2_. One of the ways in which
such a grille may be used is to I I
urite the :first letter of the text (89)0£
t(36 )'
at the extreme left of the cell
disclosed by aperture 1, the sec- (19)68 . . i5(37 >I
ond letter, at the extre:;1e loft of
the cell disclosed by apsrture 2, t(38)1 . (09)88
and so on. The grille is retained
(69)t.a 7(39)
in the same position and the-17th
letter is written ir.IJlilediately to I ·I
8(40) (99) 9g
the richt of the 1st, the 18th im-
:::nediate:cy to the right of· the 2na, I I
{l.9)98 9(41}
and so on. Depend.ins uuon the
Width Of the apertUre, ~nd thus of. 1
(!99)va 10(42)
the cells disclosed on the .~rid,
2, 3, 4 ••• letters 1na~r be in- I I-·
serted in these cells• .!hen all ·
ll(43) (99)£2
the cells hava been filled, the
srille maJr then be placed i?t the
..· c 1v9)g~:l 12(44)
second position, then the third, I I
. 13(45) {£9)ta
and finally, the fourth.
1
14(46) cz9)ogl
.£• Another way in which
the grille .JJB.Y be used is to 1 1
change the position of the grille c19)6t 15 (47}
after the 15th letter bas been 1
inserted, then after the 32nd,
('oo)at 16(48)
4Bth and 64th; the 65th letter 1
is then inserted to the right of csv)l)
the 1st, the Slst, to the rigQ.t {v) ·. g
of the 17th, and so on until the
grid is completed. Fig. 28

i• Whole words may, of course, be inserted in the cells disclosed by


the apertures, instead of individual letters, but the s~curity of' the latter
method is much lower than that of the former.

~· The· text .of the grid may ba transcribed (to form the crYI>tOgram) by
following any prearranc;ed route. ... ~
REF ID:A56930

. .. ·~ ~3 -

t. The suocessive ryositions of a post-card grille may be prearranged.


The order 1, 2, 3, 4 ..is_ b.;:;_t one Of 24 dif..t'erent sequences in which it may
be superimposed upon the gr;":id ~: ·

24. Constructio~ .Q.:(~ectangular· or 11p~st~bard" grilles. - !!• A mod-


ification or the prh1ei;ples _set i'orth. in Paragraph 21, dealing with the con-
struct ion of revolvi.ng _gr~lies, is a:pplie-d in ,.the_ construction of rectaneular
or 11 :post-card" grilles._; J'lote-,-t:be ;:Jlanner-in which the cells in Fig. 29-a are
assic;ned numb3rs: homo~og0us calls each band_ receive the sar,1e :number. in
In Fig. 29-a there are thre·e bands, -numbered fr.om 1 to B, 9 to 16, and 17 to
24. Then in each band o_ne ·and only one- aelLoi' -the same-nu..llbered set of four
cells is cut out. For example, it cell la- is a~iected for ::;>erfora.tion from
band l (as inC'.icated bj'_t;tie ·c-oock mark in~tha.t.cell}, then a cross is written
in the other three homologous ·cells·, l~ ·.£_,..and .£_, to indicate that they are
not available f'or selection for peri'orati-on. _.Then a coll bearing the nuL1ber 2
in band 1 is selected; ·f<?r exalll!>le, -2,:£;, -and at once 2!!, ,ll,, and E. are crossed
-;for :ae1e~tion,< and SO Ollo
Off as beine ineligible_...........
Band 1

7B-3\\•
\ .
Band 2

-
.
. . :
_-
:

--
la

--
2a
3a
9a
lOa
lla
17a· 17c
l8a l8c
l9a l9c
lOc
llc. ·
9c le
-2c
3c -
. I

4a l2a 203. 20c 12·c · 4c·


.5a 13a '.Zla 21c l3c 5c
6a
7a
14a
15a ··--- --
22a 22c
23a 23c
14c
15c
..§£....
7c
Ba l6a. 24a 24c ~- Be
Bd
7d
16d
15d
24d
23d 25b ------ -- ----
......... 24b ~-·-
l6b
..
Sb
_'?E....
15b
6d
5d
14d
l3d
22d 22b
2ld 2lb -- -----
14-b ... ..§JL
13b 5b
4d 12d 20d 20b 12b 4&_
3d lid l9d 19b llb 3b
2d lOd 18d l8b lOb 2b
ld ·9d 17.d. _17b 9b
. .......... lb ><
-
. .. .. . . .. .. .
.. . ...
._a
....... • • ~ • ' I "• ·' o
...... b

Fig. 29

In FiB. 29-c is shown a grille-- as finally prepared, the nonshaded cells rep-
resenting apertures.

-------· -- ----~-------------
.. -·-·-·----·---·····-~---~--- ........ J...._. · - - - - - - · · - · ··---------·· •..... n"Cl'F ID· A569~·Q_
-·--·--·~-· ··-··-· . •. .. ~ ·----- ·······--· .. ···-·f·· ....

34

Fie. 29-~

Jl.. The :roregoin;:; grille is a ;'six-colunm~' 011e, that is, the cells
form six colu;.uns. It is obvious that crilles with any even number of ·
columns of cells are possible. The nllinbsr of apertures in e~ch band should
be equai··:and· tl:iiS- nuraber ;nUltiplied by the nu.aber of bands and theJ:l py 4
should equal. the ca:p:ici t~r bi' the grills• In the case Of the one shown· in·_
Fig. 29-c the capacity is 8 x 3 x 4 or 96 cells; this is the same as is ob-
tained merely by ruu.lti~lyin[;' the- l"!eiGht (in cells) by the llUiilber Of c_ol-~~
16 x 6 =
96·.- If 4 letters are inscribed in e:::ichrectangle,-the cap~city-of· -
the grille in ten;is of lett~rs is 384. The @•iii in this .case_ wouJ,,d,_ ai't_er -
completion, -~Jresent 24 ·col\.u.;m.s of' lett,n·s, to which a numerical lcey for a
second tran&"Po sition can be a:p9liec in transcri:Jtion to :p1>0duce the final
text or the c1\12tocrr.riJ..

a~CTION VI.

Paragraph
Complex· route trai1s::_;,osition ••••••••••••••••••••• ~ ••••••••••••• 25
Transposition Of groups Of letters, syllables, and words •••~•• 26
Disguised trans:1osition ;·-iethods •••••••••••••••••••••••••••• ••. 27
Cipher "na.chines for effecting trans)Osition ••••••••••••••••••• 28

25. Col'llplex route transposition. - a. In Fig. 30 a route for in-


scribing letters within a rectan~le is indicated by a sequence Of numbers.
The initial point r:m.;;.r be at any oi' the four corners of the rectangle, or,
indeed, it ~ray be at any other point, as ~rearranced. The letters may be
inscribed to for:n the rectan5le by follouing the route indicated and then
transcribed fra:n. the rectancle to i'orm the cr~rptocrar.1 by following another
route. Or the letters may be inscribed accordin~ to one route and tran•
scribed accordin::; to the nlli,1erical route indicated.
REF ID:A56930
- 35 -

.B_. A variation ot the fore-


goine; ·is ,.that; _i,l.lus.t.rated in .. ... _.
Fia. 31, -~~~e:i,~~_i:q. 1*e· insJl~-~-h~n . ·.... . ea·
~Q_
2 _ ---·
61. 6031
29....., 32
59.
~~ ··513· 33
30,_ _!_
62 89
28' .. ;3 ·-
follows the ·l".?ute .sh~:m. pr .~f3.. · , . · • , . .. 4 ~L _M, 57 64" 87
arr.on$ •. The .initial 'lOint .. o:f in'.'"" .. · ~ 65" 56 35. "26: 5
se.ri:>ti.~ 1~ )ndi-~ated, by' ·the·, tit~.:~.·. -6. 25. 36 55· ·55· 85"
ure l ,. ap.d· .tl;le. fi~al ::;>o ~nt ~. by t~e ·. ~ · · M
ti©ir~· ·2·.. ·.· . ·a
67. 54 ·37
23 38 ·53 68~ 93·
.
24 ..-.:-_'L.
·-
I .. ·. . . . , .

.
. .;: ·:.· ·.

..
.:- .·.

. ..
.·:,·

.··92 .()9. :52: ·3\l- ··S2:· ·--9 .


.
-----
--
..9.• In. the· fo.rego.ing. case, ·=. .. . • . . -~ 21 40 51".
70·; .81
the route is ·a snccesad:9n: .ot· t,he.,.,. ~. · .. · SC>" ~!_ ~ fiO 41 20 11
moves mode by the ki,ng· .-in '~h~ .' · ;: . ··: .. · ·12 19. ·42 ·49· 72· 79
game of chess; it fOl"!lls the so- ·
call·ed Hking.'- s :tourH,. in 'R'hiQh. : , . .
the pla7ing :!dece makes a .~or.,,,lete .... ..
. ..
""'"7a·
.[* '1/5" 48. 43 18 13,__
.!7.: 44 47 74. 77 ·-
7.5.. 46" 45 ·15· 15
- -
:~e:;.r::. -~:::~~a~~~= :~tl
b"einz: traversed· oJJ.l;y· Qllce, :w.it.h . . ... ,
. ·i· :·.··· ,_;..-. ·, ..·,, '.'F~g·.·.-.~~.:. :. :
·the· -last .move plac"iug···tbe p,iec~ :.· ... .
in a cell from which it may next
move ·_into the'. ee·ll· b"om.'whhh:=-the:- , :· .·.·. ,._·. '-'
journey started;. -A rou..te ·,com-: · 1
~-w;;··~.;.;...i~.+--+--o+...-.i.._-1
= . ·; • . , . ,.. .

posed·of' a success.ion df ·:!':l.Ovaa •-:iade . :. :-..


by ther laiizht, or·. :the. ao~call.ec;l : - : ·... ; : '· . 1-.~-Hl-.-+;o+.;...+~E--HH-~~
r lmicltt·' s tourn ;· .'1-s ··also· possible,. · .· ... ; !--+.+.-""lb-&--+.-~~~f--t
1

but itt ·-order. to :be · !)ract i~al · a


grid'.with the eells·Ii.umberQd·in. · ··
succession would have to be ,re-
:!;)C'.recl tor the corres::,:>ondents,
since ·millic:>ns ,o'f d:ii'terent ..rQ".":'. ' .. 1l ·•

entPimt· knir:rht!s· tours can ·be.·'·' .. _., ·


construetedr :on a·:.c~ssboard ·of, .... : ·.
the usual 54 cells.
Fig. 31
2o. Transposition of grou:ps. of let.:t.er.s_,...~Yll~bles, and words. - There
is nothing in the !Jreviousl~i ·desc1•ibed 'JDthOdir 1ihich ];lt'ecludes the possibility
of tba:lr a:-:;>::;>lication to pairs of' lett3i•sj ·.sets of tbree or more letters, or
even S!"llablas and \7hole \Drda... Nor, of'. cou;r~e,. is their use limited to ope-
rations-·with :pl:J.in text: they may' be applied as secondary steps af'tJr a sub-
stitutive Pl'9Q~s~.~~~.~~pn com~leted (see Section X).I •• • • "I . . . •
.
'" • I • • ..... • f I • • I • • • • 'Ii • •

27. Dtpguj,~;~: ~~tlii~~sH~9n.' ;.ie~iioii~ •. .:: :.!.. . ·.Th~.. aY'stom. c>tten en~Ount~red
in romances and J.ilY"Ster-; stories, wherein the messace to be conveyed is in~
··serted i:D:·a series of nonsignif'i·cant.· worP,s co:p.st.ructed--witb the .. ;purpose ot
. 8Voidiiig ·.or.. EtV8d"in3 ~piC•iOn, · 1s. a; &pecfes Of' ..thi~ form: ·0.f "Ope:p.~ 1 ci-n>to.-.
/3ram involving transposition •. '1!he~1 opell"· or:~nveloping, · amiaren~l.y i:p.nocent
text may be desir'1ated as· the: e.xternaJ. :ta:AJ;; .the. S!=l.cr.et · o;-.. cryptographic text
ne.y· be ·desianatea ·-as· the. intern.al text.... A. oompl_icated. e:lca:;nple · e>f' ·.external or
open and internal. or. seer.et text; is· iiiat ·.shown .. i~· -Pa+asr~p;b. l~.•· .
.· .
· <J!.. · Little need 1,-e said ·of the .method based .upon. con~t;ructill(S .external
text the letters of' which, at prearranged positions p-r: inter:v~ls~ ~pell out

·.-:1 ·:se~· :Baii, Vi. .·~r~·'R•


: '
~ ~~them8.tieal
.. ·. . . . .. . : . ;· .. . .. :. ~ .necreations·.
. . . . ; ~ ·:
and.-~ssays~- London, 1928 •
. . . : ... : . . .. ·. : ':

----------.-----------------------·-.-----·-------
·---···------·--~-----""'RE~F.__..._.IDW'-..L.:.:i!:!A5~6!!_,,9!.:!3~0~-----------

- 36 -
the internal. text. For example, it may be prearranged that every fourth
letter or the external text forms the series of letters for spelling out
the internal text, so that only the 4th, 8th, 12th ••• letters 01' the ex-
ternal text are significant. The same rule may ap:ply to the complete words
of the external text, the ~ 2!!_, ~'.9.' • • • words form the internal te~. · ?1e
preparation of the external text in a suitable form to escape suspicion,!:.!
not so easy as might be i;nagi~, when, efficient, experienced, and vi~ilant
censorship is at work. Often the para[;l'aph or passage cont~ining the secret
text is sandwiched in between other paragraphs added to pad the letter as a
whole with text suitable to form introductory end closing matter to help
allay suspicion as to the presence of secret, hidden text.

£.• A modification of the foregoi:cg method is that in which the lat,


3rd, 5th, ••• words of a secret :message are transmitted at one ti;.ue or by
one agency of comrmmica.tion, and the 2nd, 4th, 6th, ••• words of the mes-
sage are transmitted at another time or by another agency 01' communication.
Numerous variations of this sche:ile will suggest the1i1selves, but they are not
to be considered seriously as practical methods ot secret interconmmnication.

~· Two correspondents raay agree upon a specific size of paper and a


special diagram drawn upon this sheet, the lines of which pass through the
words or letters of the intern.al. text as they appear in the external text.
For example, the legs of an equilateral triangle drawn upon the sheet of
paper can serve for this purpose·. This method is practicable only when
messages can be Jhysically conveyed.by ~essenger, by the postal service, or
by telephotographic means. Many variations of this basic scheme may perhaps
be encountered in censorship work.

28. !~~chines for effecting transposition. - These ma.~r be dismissed with


the brief statement that if any exist today they are practically unknown. A
few words are devoted to the subject under Paragraph 71, Section XIV.

B• SUBSTITurIOH SYSTE!::S
SECTION VII. .
POLYGRAP.HIC 'S'!STID£
Paragraph
Preliminary remarks ••••••••••••••••••••••••••••••••••••••••••••• 29
Monogra:phic and polygra:phic substitution •••••••••••••••••••••••• 30
Polygraphic substitution by means of tables ••••••••••••••••••••• 31
29. Preliminary remarks. - a. It is assumed that the student has· ab-
sorbed the infor-illation contained in Sections VII - VIII, inclusive of Special
Text No. 165, Elementary 1iilitary Cryptography. These sections deal with the
various types of cipher alphabets, simple monoe.l.phabetic substitution, mono-
alphabetic substitution with variants, the more simple varieties of poly-
alphabetic substitution, cipher disks and cipher tables. The present study
of substitution is a continuation of the former, a thorough understanding of
which is a requisite to the examination of the m.ore complex types of substi-
tution now to be set forth.

b. Before entering upon the study referred to, it will be advisable to


..
er9lain several terms which wi.ll be used. substitution met~ods in,. general may
REF ID:A56930

... ·-~-37 ·~

·be:described as .being monoliteral.or polyliteral in character. In the former


... '!:-here. is .. a strict iet..t,er:-f'or"':'Iettei repl3cement' or; tci 'ilicilide riumeri(lai 8.nd
a
syriibc;>:l.,.·l)letl:l.ocis, ;thei-e is 11 one-to..;one 11 · corre'spondence between the length'. of

•. :tha,~~ts o:t: .the "j;llain text arid those :of the cipher text; no. mat;ter)Jll,e:t;l},er·
... _t~~ ~~ostitutiori 'is monoalphabetic or ,pol~ral:phabe..t~c in ch.eracter. .Ill .pol.y-
. · 'lJ:t~'rs.l''methqds; haWever, ··1;hi.s "one-to-one" c<;>rrespondence no longer holds:.
a·:·coml:linat:i,on of. twQ lettei.. s, or of two figur~s, or ·of a letter and a· figure,
; ~ represe:t;t:li a .single J,.etter. Of the plain text; •tllere· :is here ·a :rtwo•t0'."'0ll8 91
. · corres:poi:ia.Eirice; two ·characters of ·the ci~her text representing one of, t,~e
plain·. teXt. 'l'he method.a described- under'.'.Section X pf. Special T~xt .No:.. :165,.
EI~riientary 1ttlitary Cry:9tography, faU u11der the latter designat~~h; the ci-
pher· aquivalen;ts there shown are, properly speaking,' bipartite i:n.··ch~acte~ .•
Tripartite c.ipher.. equivaien1;s are also encmintered. Polyli.tara)..,~t.ho.ds·~
therefo~e, .are said. to emp~oy J?OllJ!artite "alpha~_!!~ Of \vl:iich the bipart'fte
type is· by .far -the most co1mnon. ·Further on in this text·, polyliteral methods
ot :greater coi_i1ple:x:ity·than those· illustrated in Sectiq~ X .of $:Qecial Text
No. 165 will-be disc\'issed' · A:ttention now will be .directed m0re .-p~rticuliµ-ly
,.... · ~'t<;) a. d.1=f:feren:t'tY.9e o'ir substitution designa:ted as :rnoriographic and p_olygraphic
.. SU'b S tit Ut'•. 1on. · . . · : , · · · ·. · . . -.. . ..· .. . . . ..
·.
.'
30. Monographic and :polygraphic substitution.·-· a. :ill the ·metltods
of substit'l:ltion ·heretofore described are monographic in-nature, that is, in
the ·e:n.ciph~ring· proeass··the indiviaua1··imits subjected to treat~nil ar,~
sl.ngl:e letter~; there 1s a letter•for.;..letter substitutio~., or. to include,,
-~\J,merical 'and symbol ri:ethods,. there is, as i~1 t]+e case of mo.noliter~ sub-
stitutiO.n., • 8, 71 0lle-t0-.0Il~ 71 C0l'l'eSpOn~e:)lC0 between Ulli ts qf the plain t~xt alld
tp.Ose of:,the cipher ·text •.. In polygr~phic ~ubstitution, however, co:m01nations
o:t letters: of th~.plain."1;:ext'*; consi'dered as 1Iidivi~ible< conif>ounds,: constitute
the_ upJts_ -.t:or t:rea_·fa~n~ ;'~n' :ei;ici:phe~rne_nt. ·If· the' units consist of pairs of
~ plai~-text. letters, the enciphermant is ·pair-for-pair, and.is said to be :
dig:i:-aphia in ·character.;· if the units ,consist o'f sets of three.,le:tters, it is
trigraphicr ·'in ~haract·er,: and so on;.. ·· Th~re is stil;L a. 7'on~-to-one 11 _ C!'.>rres-.
ponden~e'· involved, but. tp;e ':lD-~ tljl. in these cases are. composite in character
and .the individual e:t.e.ll.ents cQ.ruposing the units affect the,- cipher equivalents
J_ointly,ratl:ier tll.~n separatel:r. Tile·b.asi'c import-antd'a-0tor i~·.true'poly-
.. .graphic. sub'stitutfon is t.hat all the letters· Of· the .g~oup _pa~i;ici:pate in the
determinaiioo~or·the.. cipher equivalent of the group; th~ .iP.~il:t.ity o:t.: ~
letter of the plain-te:;ct grpup· affects t,he .. Qo~osition of. the wh-Ole oipher
group. Thus, in a certafo digra!)hic system~- may be enci:phered: as 'XPc,
and ACp_. on ~he ot!ier hand, may be enciphered as NKc; a diff'erenoe in the
· ;I.'denti~y ·of..eui _bne . ,o:f the: letters of the.plain ....text pair.here prod:uces a
difference iii .the identity of: both letter:;> of the.· .oipher ·;aif'.• ·
. .. . . . ~

>
:. "_:. ·. -b--~ ]br'_pr~c.tical. ~sag~' polygrephic' 5ucrstitut'i.on is limited to the '
. himdl.ing ·or .digraphs arid ·t.~i;il.•apl:i.s', although ·very< ·occa'siohally groups ·ct
'nnra-·tha:Q." tlire-e' letters' mia~r· b'e employed £-or. ~~e'ial_; purposes·. .''
.. · ·- : .. .,; . . .
~ ·: .' •.
. ..
. ·~.:~· :.'·~ .:~.: . ~~-·-: ·.· ...
,•·; ....
__

··" :· ~~.: · ':e'.h~. furµ'l.amenta1· purpqse or. p9lycraphic ~:ubsti ~tion is -~he".sup­
pression or rather the elimination of the frequency ~haracteristics·ot
ordinary plain text. It is these frequency characteri sties which lead,
sooner or later, to the solution of practically all substitution ciphers.
When the substitution involves only individual letters in a monoalpb.Abetic
-------------- ~---------------------~r-rrr:A56"93

- ~ 36. -
,. .
·-sY'stem, th"e.-cryptogram can be solved very qu1'?19.Y; _whe,n. it u;,volves individ-
-. :Uai lett·ers i'n a: polyalphabetic systei:n, ..the. ccyptogram _can u~ually be. sol~ed,
_ .b~t· only. ~fter a much longer t~e and !Ill.lch more study~ depending upon the
: ~oniple:l!:ity -Of _the method. The basic
principle - in the solution, -however, is
_.to .reduce t:Q.e polyalphabetic text to 'the terms
ot mOnQalphabetic ciphers and
theri·to solve··the latter. In true polygraphic -substitution-on the-_other
hru;ld 1 _the solution does not rest upon the l~tter ba~i~ at aJ.+-because .it is
·not a· ;qµe~tj_on of' ·breaking up a complex text into simpler elen:ents; -it rests,
.- as a rule, u:pon the possibility of an3lysis on the basis of the frequency of'
tl;le poly§r!E;h-ic units -concerned. Ii' the substitution. is digraphic, then the
~its are-pairs of letters and the no:riaal. :frequencies of' plain-t~xt pairs
become Of first consideration; if the substitution is trigraphic·, the un.its
.are .sets of three ietters and the no:rmal frequencies of pla:in-text trigraphs
. _ are inyolved. - In the last two cases the data that· can be -em.ployed in the
solution are meagre; ·and are f'ar' from definite or unvarying in the'ir signif-
icance, and that is tlhy solution or polygraphic substitution ciphers is often
extremely d1t'tic\llt •. _

!.• Just -as in typography, when certain combinations o~ letters, such as


..ti, ·r1,. _and
·rf'i; .are mounted on one··and the same pieee of type, they are ealled
a
logotype_ ·o.r ligatures, so in , cryptography, when co1nb 1na t ion.s o-f t m or mor.e
letters.are t~ be ~reated as a_unit_.in a cry::ptographic process, they may also
be call~d ligatures and can be. conveniently indicated as being so ~Y placing a
bar across the top of the combination. Thus-~ Cc\,
represents the digraph co
of' the plain text. ·It will also·be convenient to use the Greek.letter Q to
repre.sent a letter Of the- a:lph abet ' '71thou t - indicating its i d~nti ty. : Thus,
instead of' t~.. ciraumlocuti~n· "any- letter of the pl~in text",._ t~~ -~YnJ.bol Op
will be used;. and to:r the expression 11 any letter ot' th& cipher text", .the
symbol 9 0 will be used. The symbol "Q9p tl;_en means -"imy plairi-t~xt.!_di~aph";
the symbol ~0 , "ariy cipher-text digraph". ·':[lo ref'er specific$1~-:t'o' Jhe-
lst,. _2nd,_ 3rd. • ~. member of a ligature, the eX_ponent 1, 2-1 3· -• ••. will be used.
. - 2 . -
Thus, 9i) of.REMp-is the letter E; Q~ of XRZ~ is z.
31. Poi:ygra"~hic slibstitution by 111eans -Of tables. - .!.• The most simple
mthod Of effecting polygraphic. substitution involves the Use Of tables sim-
ilar to that· Bhoml. in Table 1 •. This table imrel.y prei;ients equivalents for
digraphs and is -to ·bEWem:ployed upon the .coordina:te system, ~ of ~1~ being
sought in the .column a.t~-left or ·right, ~ in the row at the top or bot-
.. tom. The cipher pair, 9le8, is then found at the intersection of the row
and oolUlJlD. thus indic,ated. - For example, AFp :: ~~- ; ~ : Azc , ete •


REF ID:A56930

- 39 -

·Table 1,
(Showing only a partialiy filled table. j ·

Final iet.ter (~)


. .
A B c D E F G· H r J K ••• x ~ ·z
A
r-1 Pi B
FX
NY
CH
DC
XE
NB
yy
ZI
ZA.
xx DX
YG FB CD EF
....
XJ zx ... E!\. DX F".tI A
B
~ c AH AB
- ...
••• ND' c
D
:E U
..
BB
-- - __
YA
.A.I
.AY
••• BF_._ D
E

.. ... . ..• ·•. .. .. .. .. . .I .••• -.. ... •• .•


··o
··NZ r
QI

F AG !AZ .AA1 F
. .

J .1 BC! .l CJY i . ~ ! . . . ·1 r=t ::: q-BA__,.!..,..F.E~.I


.

3 N N

~ ~ ii A· B.
t "! l C D
AC]
E· · F. G
til_t~l A;1 r~J~f:ADlJ ~
R I· X· K X Y Z

_ k!... ·The :ro,:-egoi~- tabie is rec:fa?rocal in nature; that. is, Up : YG0 and
YG:p : AFc• T;b.us, a .. si~le table· s~rves i'or ·enciphering as. uell as for de-
ciphe-ri:hg. The t70rd DEFEND uould be enciphered as YA NZ CY, and. then· grouped
,in fives:· YANZC .y: .~·. ~ •. When· a final sin:;le letters oc,curs, a null is added
in order to make a pair of' ~tters capable of being enciphered by the method •
. Reciprocity ii,;," horrever, not an
essential factor ·and for greater security .
il.Gnreciprooal tables ar_,·more advisable. In W:ch. cases an enciphering table
lml.st ·have . 1 ts complementarJ ,O.eciphering table.

c.. Until the amount of te)ct; e.nciphe1.. ed by l'E.ilnS o~ such a table becomes
greatenough to disclose the cipher equivalents or the most frequently used
digraJ?hs, such as EN.- ER,. RE, TH, ON; etc.,: cryptograms base.d U!)On "the tabJ.e
are relatively secure against solution. .

_£,. A ·simple· method for J:lreve:z'.i.t ins the· establishment of the ·frequencies
characterizing the~e comrt10nly used digraphs and thus eliminating the principal
basis for their ident if"icati o:ti is .:;i. ven in Paragraph 52-:~' Section ll. ·
. e. The :factor that contributes most to the relatively high degree of'
secur!'ty Of' the digraphic method described. in sub:paragraphs a a.lid b is the ab-
senc~ of' synmetr-.r in' th~ t~ble empl.oyed, ..for this table.. is canstrncted by ran-
dom ~ssign.i-n.ent -Of values. and ._sh<ms no S ~1Zil1Jletr~~ trh;atifoev'er j.a..i,ts' arrangement
0

.. c:>f". contents •. Hence, ·even .. i-f" -~·in ~-first -~~fie _o'!: ~ :: Ql.~ is identica1
.!!!.!!! e~ ln-. ~ second case, ;91~ i~ t.l).e. ~irst cas~ i~ uho_~ly~if'f"e!,!nt i'rom
Ql.~ in "th.e ·second case. . For eJfample, ;Table 1 s~on_s that ACP : XE 0 and
A!l 0 : Yfe ; the cipher resultants f"ail to give any hint that the plain-text
pa~rs contain an identical letter.
- 40 ·-
t.. If, however, the latter is not. the case and the table exhibits
syrmretry in its arrange:nent ot contents, solution is sOLlewhat racilitated.
Note the f'ollomng Table 2, for exai..'lple, 1n which two mixed sequences are
ell!l;>loyed to torm the cipher equivalents. One· mixed sequ:Ence is based U])On
the keYJ;>hrase WESTnroHOUSE AIR BRA.KE; the oth:er, upon the keyPhrase GENERAL
ELECTRIC COMPANY. The word FIRE ~ould be enciphered as KIQ,A..

Table· 2.•..
ff;··... :.·.· ·
AB CD ~-F G-H I ·J KL MN. 0 P ~RS~ UV V X Y Z
A WG EE SN TR IA. NL GO Hr OI. UO Af! RP BY XB CD DF FH JJ IX ~ :Ps· Q.U .VV XW .Y.X Z:Z.
Bm~™mn.~m·~m~~~u~oonmu~~~wn.n~m-:·
c SG TE m NR GA. m. oc UT AI RO BM KP CY. DB FD JF LH Mi PK QQ, ~. ;x:µ yv. ZW, me EZ
D TG IE NN GR HA. OL UC AT RI. BO ·rtM CP Di F.e· J-.o. LF. m
pJ- Q,K VQ, ~ YU ..zv EX sz vm..
E IG UE GN HR . OA .UL Ac· RT BI KO CM DP. FY JB. r.n·· MF ·m~Q.i VK XQ; YS. zu. w EW .si: TZ
~w~moom~-OO~KIOO~W~IBID~~~~~WW.fi~llll
. G 00 HE ON UR .AA HI. BO KT. CI DO FM JP "LY MB PD Q;D' VB ±.r YK ZQ.. WS :$U fJV TW·. IX NZ
RmoowoM~m~mwm~mm~umrt~~•·OONll~~
I OG UE AN RR BA KL cc DT FI JO· LM MP Fl Q,B VD XF nf ZJ-""mc"EQ. SS TU iV NW·GX BZ
Jooo~mn~oonnw~w~w~umum~~ronoo&~
KM~~~~mmnum™~ft~E~m~~~mw~~~m
lil:a RG BE KN CR ~"FL J"C LT MI PO QH VP XY YB ZD WF EH SJ TK IQ NS GU HV ow· AZ VJ:
M BG XE CN DR FA JI.. LC :Ml' PI QO VM XP YY ZB \1.[) EF SH TJ .II{ NQ, GS HU 0V UW ·u RZ
Nm~mmnu~~~wmn~~~~.mu~~moowil~~
ooo~~mu~~~nEm~R~w~mm~~oomD~~~­
~mnmrn~K~ftnm~~n~~n~~~~m~~oon~
Q~nwm~~m~nw~P~wm~~m·~~~oo~a~m
Rmumm~nmn~e~~fiIB~~-mm~~MOOD~m~
S. LG ME PN QR VA XL YC ZT WI EO SU TP IY lm GD HF OH UJ Al{ R~ BS IaJ CV DW FX JZ
~m~~nnnmmnooruun~Ewmu~~~oo~~~~
U PG Q;E VN XR YA ZL WC El' SI TO IM NP GY BB OD UF AH RJ BK KQ, CS DU Fi JW LX l'IZ
y_.~·w·Dmun~~nro~~mooma~mll~mwn~m~
~wnn~nnoo~rroo~~~·oowwM~~~~ro~~~~
imnD~n~ronmoo~~m~~~m~m~mm~N~n
Ym~~m~~mmMOO~Wil~~D.@m~.~~WN~UD
zm~~-~~n~~moo~~~wn~mnm~wro~wnn

2e~nation_ o:t Table 2 spows that when ~ is identical


£• . A. _cursory
in two ca~~s then e is identical in these cases, so that in reality the
0
encipherment.is by no means truly digraphiI 1n character. Described in
cryptograph;f.o ·teT·' .·the encipherment of 9P is polyalphabet io in ch':"1"aoter
whereas that C1t ep-is monoalphabetie. A more obyious J;>icture of this con-
dition is brought aut in the follooing rearrangement ot Tablp 2.. ·,

i.
.
_t
REF ID:A56930
.. .. \
... .'.' .......

•. ·~ ,·"4i'' ~-
.
..

..
Table 3 ..
·i._. ,.
·:··
..
;·. .. 2
"'
e.P '

A B c D- E F G H I :J -.~
.Ll.. L u 1l 0 p Q, R s. T ·U .v. .W· x. Y, z
A, TT E ·s T I ?T G H 0 u A R B
...... ~ c D F J I. M p "Q, ·v x y z
B E s T I N G H 0 .u A R B A ·c ·DF j L M p Q· v x. y. z w
c s T I N G H .o u A R B l{ ·c D F J L u p .Q v x ,.Y .z w E
D T I N G H 0 u A H B i{ c D F J L M p Q v x .Y z w· E s:
E I N G H 0 u A .R B . Tr"
.1.:.. c D 'F J L M p Q; ·v x y z
. 'rJ
17 E s T.
F N G H 0 u A R B'K c D F J.L H.P Q v x y .Z E s T" I
G G H ,0 u A
'.
R B K c
T,.
D F J L-M p Q. v x y z 'J ·E :S. T I ·N
H H 0 ·u A R B .Ll.. c D F J L T.•
J.! p Q v X.Y z.w .E s .T :1 N G
I O·U A n B IC c D F J L M p Q. v. x y z w E. s· T 'I N G H
, .. J u A· R"B ·K c D F J L .. M p Q. v .·x .y z w E s 'T .I N .G H· o·
··K A R B·: K" c· D., F J L M p Q, v· x Y.z w E s T.. I N. G H 0 u
L R B K c D F J L M p Q v x Y. z w· E s T ·.I N G H 0 u A
M B K c :0 F J L M. ...
1J Q;v x y z w E s T r:. N G.. H:. 0 u A R
r-1aft N ·. K c :D. F J L H, p Q.. v ..,,.. y z: -iv:· E .,.....
}. T I N G.H·o V .:A R B
0 a: D F J· L M p Q, x y z :-r E s
V, T I· N G H u: A ··1R B
0 K
p· D'. F: J L M p Q v x y z iY E s T: I N G H 0 u
A.R·B K d
Q
R
s
F J"
J L
L :M:
L M p
M p Q.
P. Q v
v
Q v

....
v
x y
x y z Yi E s T I
,..,
y '-'
z vii'
"fl E:
E
s
s T, I N ~ Jl· 0
T· I· N G·. H 0 U.
G H N 0 u A R:. B <K :c
u A R B' ·K. c D
4, R B I{' c~n F
,,
:Q·

;r;
~.'I p Q v x y z w s I N G H 0 u A
.,,.
R B .L>.. c n:' F .J
T E T ~
u p Q 'V .;,.
""'" y z w E s T. I N G H 0 u A R B K c· D :F. J ·:1 1q
:V Q v y x z w E s T I N G H o· u A R· B I{ c D F· :r'· L .M R
. 11. y x y w z E s T I N·· G li. 0 u .A. R B .K
.. 0 D F J L M p Q·
' x ·X· y. .Z w E s T I N G H .o u A R B l>.. c ~

D'F J. L M p Q v
·y ··Y ;c; W.. E s T I N G H 0 u A R B .,r .i.>.. ·n c F J L :M p, Q, v
·'Z z w E $ T I :N G H 0 u A· il B .a.>. c .D F -~
J L· M p Q v x y
'2
ea G E :N H A. L.·. C T. I 0 .1,1 p y B ·D F H J Ir Q, s U. v. w x z
...
i
By a slight modification in arrangement, btit w:Lth-no cha:ire in basie• : ;_
h..
pr:i.nc.fj?le·~ the encipherruent can be made nonoalphabetic, so far as ep. ia con- .
,cerned,. and polyalphabetic, so far as·~ is'concerned. ·Note Table 4.
. .....

.. .... ......

--·····-···-- - ---· -·······-~·-··--··--·-··---------- ···~--·-· - - - - ··--·----··----·----·-····· ------.-------·-----


- 42 -
Ta"b1a··4·~
02
P.· ..
1 e1c._A___B___C__D__E rr·· ·L ~u________ " R s T u v w x Y z
N o P __;.~----------------------.
~p ___F___
G__H___I __u________
7
T ••• l,,

A W G E N R A L C T I 0 H P ~ B D F H J K Q S U V W X Z
:SE ENRALCT I OMPYBDFHJKQSUVWXZG
0 S NRALCTIOMPYBDFHJKQSUVWXZGE
t) T· ·-R -A L_ ·C T I 0 M P ·y B D , F H J K Q, S U V W X Z G E N
l!l ·:r;. ·.!.. · L C · T . 1 0 M P Y B D. i ~H . J K Q, $. U V . W X Z . cl: E. N R
.F.. N ·.L ·c T ): fr M P Y B D ·F ·H J K · Q S U · V W · X ·Z G ·E N R A
tf G C T I ·o H P Y B D · F H J :c Q S U · V · W X . Z · G E N ·.R A L
i.I .. R~ .T I ··o M P Y: B D F .H J" iI Q. S U V W · X Z -G · E N R 'A L C
.:i . 0 :x- 0 M P .y B D F · H ·J K Q, S U V i1 X Z G E ·N R ·A L · C T
[ .· U 0 lJI P Y B D F H J It Q ·S U V VI X Z G .E N R ·A :L C. T I
~--'• .. AR. :M P Y B P F H J K Q S U V W X Z G E N .R A "L C T. I 0
. ..,. P Y 1' D F H J" IC Q. S U V ~-r X Z .G ·E N R A L C ·T I 0.
~-: B Y B D '.ij' ll J K Q, ~ U Z G E N ·R A L C T I 0 M P
V \1 X
~---· X B D F H ~ K 4 ~ U V ~ X Z G E N R A L C T I 0 M: P Y
0 C D F lI t K Q ~ U V W X Z G ·E N R ·A L C T I .0 M P. Y B
P .. D F H j K Q, -~ U V ·W X Z G E N R ·A L C T I O .M ·P :Y B" D
.. Q - F H J K q S U V W X Z G E N R A L C T :! 0 M P '.¥ <B . D F
R" ,. . J' ' J K Q, S U V W' X Z G E N R A L C -T I 0 M P .Y B .:D ~ F
S .• L K Q S. U V :7 X Z G E U R A L 0 T I 0 M P Y B :D ·F , H;
T ·.· M Q, S ti V )i" X Z G E N 3. A L C T ··;r ci M P Y B D "F 1I· J
UP. S U V W X Z Q - E N R A L C T I O M P Y B D F " H
V'Q ~VWXZ0-ENRALCT IOMPYBDFHJ
W'. , V . V W X ~ 0: E N R A L C T I 0 M P Y B D F H .;r K
x·. X. 1V X Z G E N R A L 0 T I 0 M P Y B D F H J K Q,
Y. Y X Z G E N R ~ L C T I 0 U P Y B D F H J K Q, S
t . z~- z· 0- t: N B A c L T I 0 :;,! p y B u D F H J K Q s
i-.-------------,..-------------------------------------___;;__,,.._.-..-.....;.....,__ ,.....-.1

, L ..
i. The .;L"eaults given by Tsble 3 or Tabl~ 4 may be duplicated by- -using :
, slidilig alpha.~ets, as shown in Figs. 32 and 33. In the :f'ormer, which corresponds
·to Table 3, Alphabets I and IV are: fixed, II alid III are mounte_d upon_ th~_ same
. s~rip, whic?- is inovable. ·To use these al:p:h~bets in enciphe~nt, ~ ot e'I91-.1s
. looated on Alpha~et· II and Alphabets II-III or~ shifted so that 9~ is beneatR A
on Alphabet I; a;; is now sought in Alphabet I and ~ will be f'otmd under it on
.Alphabets III ana
IV, respectively. Thus, to-i; .the. word FI3E: the .successi-ve posi-
t·iona Of the alphSbet ·str.fps
KIQ,!... . .. . .
·are as
shown 'belOW_; yie_lding_ th~. ciphe'.r resultant.
.. ' . . . . ..
I .- A B C D E F G ·H I J K r,· :hf N 0 P Q R s T U v"w
X Y" Z - - Fi;xed Blphabet
,.;j;,. • - II - F G H I J K L ~-1 N 0 ? Q, R S T U V IT X Y Z A B 0 D El .
f'Ip _, Kic III - N G H 0 U A R B K C D F J L ].I P Q, V X Y Z 17 E S T I j Movable alphabet
IV - G E N R A L C T I 0 l'.-JI P Y B D F H J IC Q, S U V W X Z - - Fixed alphabet

I - A B C D ~ F G H I J K L MN 0 P Q, R S T UV f:I X Y Z - - Fixed alphabet •


- .. -
II - R S T U V i1 X Y Z A B C D E F G H I J K L MN 0 P Q,)
REP ~ Q,A.o III - J L M P Q V X Y Z 17 ::!: S T I N GH 0 UAR B K C DF Movable alphabet
IV - G E N R A L C T I 0 MP Y B D F H J ~C Q S U V \T X Z - - Fixed alphabet -

Fig. 32
REF ID:A56930

- 43 --
--·
... : ._-:~!- ·: ! J) ;T0 correspond wit~ Table 4 the alphabet stri·ps ·are _arran~ed e.s-_ shown
. , . in_ Fi~~ ~3·•-. _Ile=:x-8 Alphab&ts I and II are fi:x:ed, III and .IV are. nio~~ed upon
· -~·'the· E:Ja.ttl~ ~vable strip. To .. use these alphabets in enciph~rraent,: ep of 9l'92' is
~ocated.. o.n ',Upbabet IV Cd Alphabets III-IV are shifted. so that·eB.1:1(Ip) is~e­
neath A -0n_Alphabet I;.~ (F) is now sought in Alphabet I and 9I'e'fwill be
found un,der it on· Alphabits fr and III;respectively.. Thus, far thS WQ-rd FIRE,
the successive positions ot. the aiphabet strips are as· shGwn .below, yielding
the- cipher result.ant NBJU~ · · ·

I ~AB C DE G H I J KL MN 0 P QR S TU V W X Y Z .. --·F,.xed
F alphabet
.II• WESTING H·O U A.RB KC D F J L MP Q V XY:Z ~ - Fixed alphabet
III - I 0 M P Y B D F H J K Q S U V W X Z G E I~ R A L C T) · : · . .
IV - I J K L M N ·o p Q R s ~ u v Vi x y z A B c D E F G Hl. ?B>vable alphab't
' '

I - A· B C D :a: F G H I :r I<; .L MN 0 P QR S T U V 1J X Y Z - - Fi;md alphabe;t


. II - W E S T I N . q H 0 ,U p
A ,-R: ~. ~ .q_ F J J;. ~ P Q V X Y Z - _.;. Fixed alpb,abet
Imp : ro0 III' - A. L C T .I. Q M PY B D· F R 'J K Q S U. V \'t .4 Z GE N R} ·: · · •
IV - -.E F G H I :r K L M ·N 0: P Q R S T U V ~y--x Y, Z A B C D Movable al:phabet
. .. ..
Fig. 33 ·: . :: .

k. .Neither. Table 3It>r ·Table .4 presents .the pos~ibilities such tables .


might-afford ~or.: di~apbic' S.1bsti tut ion. The~~ +nay, ho~ever, be rearranged so
as to give re~lts _t_bat :will ·approach mare c'los.ely to ~e desired id~al. as tc;>
. nonrelationshi,P between ci!)her eqµi val.ants ot plain-text pairs having an iden-
tical. letter j,n common~.· Note that in Table 5,. wliich is base.d upon the same
primary alphabets as Table 3 and Table 4, the ci'pher equi vSl.ents the same are
as in the latter tables, b·ut they tiave been so distriblited as to eliminate
the undesirable a11d. externally obvious re'.'iationship refer:::-e'd .to. '·.{In table any
of this nature there can be only 67.q different ·pairs of ·equ~yal<Ets, since the
table presents n:ereirthe·perr.ru.tations of the 26letters-taken moat a time.
It is the dtstribution of.the pa:i.rs which is inr.part~t.) ·

....
.
··!:

. . . . : ..

. . :

···-·· -·-----------~·--------·----·----------- ----------


·- 44 -
Tab;Le 5..
2 .
. 9P
A B 0 D E F G 8 I J i L M N-. .. 0 P Q R S T U V W X Y
,• , Z
w E . ~:· -~ .I N:· G .R, ·9 U. A R· :B1· K" c :p .. :iJ' J L M p .A Q, V" x y z
A
.:z ·X .VJ v ,u .s 0., ~ .. J H F .D B y .,p 'I.IA 0 .I T c L N ·.·E >a G
.E :s' T:.·: .I: N. G· a. . o·· u. A.· R. B· K 0 D F· J'- L M p Q ·v t· y z w
:a
". . :Z ''% ·:w. :v ··.u ..s . Q. K :J H F. .D B y p ''M .0 .I T c L ·A ·R .. N E

c s T. I, lt:. G H :0. u 4.· :a,., IL K o.: D F . J' L· M p 9. v x y z.A .w E


E .. q. z .. x ,\, .·v. u ·s. .Q ·K . ·;r :-Ir F DB y p 'M ·o· I T .C 'L ,R N
T r· R G H. 0 u A R B K cD F L M p
j Q, . v .x y z. Tr E s
D N z x w v u s Q_
E G ~ J H F D B y p M 0 I T .·a L A R
I N G H 0 u A R B K c D F :r L" M ·p Q v x y z Vi E s T
E R .N E ····G· z' ·x w v u s Q K· J H F D B y
' p M 0 "I T c L A
N' G H"· o· u A R B K c D F J L M· p Q V· X· ~ Z· W· E s· 'l! I·
F A ,.R .]:f E G ·z x w v u s Cl K J H F n·B 'Y ·p M···u : ! 'T C· .L
G H o. u; A R B K c D F j L M p .Q v x y:. ·Z w· E S· T I· N
G L A R N E G z x w v u s 0. K J H· F D B y p .M 0 I T c
H ,Q: u. A R B K c ·D F j I. M p Q.. v Y· x z w E .S T I N G
.o ...·L· A ..R N E G . z· x W· v u s 0 K J. H F· D 'R ,y .P M 0 I T
0 .u A. R B·· K, c, D F ... J· L M P· Q, v. x Y· .z w- ;E s T I :t-r·..
(}- H"
..
..•. ·:t.
T' c •t A ·R N E G z v u .s
X . . T:V Q K J H F D B .Y p M 0 I
u A' R B K. c D F· J L M p Q v x y z VI E s 'T I N G H' 0
J I T c L A R N E G z x w v u s C. K J H F D B y p M 0
A R B K c D F J L M p Q v x y z w E s T I N G H 0 u
K 0 I T c L A R N E G z ·x w v u s Q. K J H F D B y p M

L
.R. B
...o
K c l;) . F. J' L :M p Q v. X· y Z· w E s 'l! . .I N G H 0 u A
F D B y p
.
..M .I T .C L ·A R .:r:r E ·G z .x w v u s .Cl .K . J H
,B K 0 D F.· j L Ivt p Q v x y z .V{ E s T I N G. H. 0 u A R
'i/4}.f
' .... p ·M ·o ·I ·T c .L A R N; E G z x w ·V u s . Cl K J' B F D B y
Z. y x. v Q .. p M· L J:. 1' D 0 K B R A u 0 H G N r T·. l3 E w
z G E N ·R A .L ·C '1?. I 0 M .P y B D. F H J K Q. s u v w x
.Y ~ v. Q,' ?. M:. L J F D C· K B A U. 0 :a H- G N· I T s E w z
::•.:
0 x z G .E N R A L: c ,T I 0 .M ·P y B· D F H J TT J.\, Q .S u ·v w
G -~ I T s E· VI z y
····:e· ...xw v.x..Qz :p. M L J F :0
.G :E· :N R A L
c
c
K. B. R A u 0 ~-
T· ·I Q I.I p, y B D.. F, ,H j K . Q.. s u v
'
v Q p M L J F D c, ~ B R A U· Q, .H. ·G .N I· T s E· w Z· y x
Q'' v w x z G E N R A L c
0 M T I p y B D F H J K ~ s u
Q p M L J F D c K B :a
0 H A u G N I T s· E w z I x v
R u v w x z G E N R A L c T I 0 M p ""J. B D F H J K Q s
p M L J F D c K B R A u 0 H G N I T s E w z y v Q x
s s u v w x z G E N R A L c T I 0 M p y B D F H J K Q
M L J F D c K B R A u 0 H G N I T s E w z y x v Q. p
T Q s u v w x z G E N R A L c T I 0 M p y B D F H J K
L J F D c I{ B R A u 0 H G N I T s E w z y x v Q, p M
u K Q s u v w x z G E N 3 A L c T I 11w
0 J.i!J. p y B D F H J
J F D c K B R A u 0 H G N I T s E w z y x v Q. p M L
v J K 0 s u v w x z G E N R A L c T I 0 M p y B D F H
F K D c B R A u 0 H G N I T s E i7 z y x v Q p M L J
H K Q J s u v w x z G E .N R A L c T I 0 M p y B D F
D c K B R A u 0 H G N I T s E w z y x v Q p M L J F
x F H J K Q s u v w x z G E N R A L c T I 0 M p y B D
y
c K B R A u 0 H G N I T s E w z y x v Q p M L J F D
D F H J K Q s u v w x z .G E N R A L c T I 0 M p y B
K B R A u 0 H G N I T s E "!{ z y x v Q, p M L J F D c
z B D F H J K Q s u v w x z G E N R A L c T I 0 :M p y
REF ID :A569.30

·• .:·.·4s· -
~~. ··· ·Table S ,a.till. sho~:~·.~Yiimi~try· . in ...lts :con·s:trdcti'onl,-aond:a.' . ~~s:piclon of
its existence f',ormed -~u.r.f..ng the ,pr_elim~nary st&ie~ ·.·C'·t cryptanalysis. woi.i.l.ci ~id
materially in hastening final solution.·

m. The foregoing tabl;~··h.~~e ali" been··aitfaph.ic in nature, "but a kind


of false trigr&.phic s11bstit11tior,i.may b~ also accom:i;>lished by means of S·lleh
tables~ as illustrated in the accomp&nyin~ Tacle.6, which i~ the same as
Table 5 with the additton--of
. . . .one
. . more . alph&,'Qe'j;
. at .the
. . t.oP of the. tbble ...

Table 6.
• ' I • I • "• • I •
• "I•," I.• ••r •• .
• O
.. . .
I• 1 •

III. A B C, D. E F ' ~ H ·r · ·J K · •L :u N 0 .p Q .R s T u . v.·. t~ x y z


IV •. 11 A ri · '·=·· ·er ·d • ·p · ·T ·'11 · ·p ··ht -E . B
'r"· ..... . -c;. u . .x· - K L. ·Q s u V ., Yi
--
x y ~

I. II.
4 w G E
I I

Ii· ·.R · A .L .• C
• • ~ -
.'.l1. I
- .. . ..
p"-y; B D 'F H·:J
() };f K Q s u· v
.•...
'\L X z
B E E N R A L c r:1... I lI p y R D F II J K
0 Q s u ·v ii ~-
.1~ ~ G
c s N R .A L c r:1... I .o !{ P. y B D F H J K Q
.. s u .V \"'' x z G E
D
E
T
I' A
R A L C- T ·r 0
L c T· I 0 ·a
·~l .P
.
y B D. F H" J K Q S·
p y . .B ,. D F H J x Q s u
:
u v
v \'
'f
}~
x·:z
~z a.··E ?i
G E N
R
F "N • L: c T I 0 }.{ p y B D F H J K .Q s u· v V' v
A .2.. G E -lL h
,
.A

G G c· T I 0 .· lI .P y B . :p F H ; K Q. s u v \. x ~· G· ·E N Ji. .I. L
H H T I 0 u ..p Y· B D 1'' .H K Q s· u v ~ x :r ... ~ G E N .R 1.. L c
I 0 I 0 }.! P·: y B n. F H J K. Q, S. u v. 1i; .X ~ G" E N l. - .I-. L c T
u ·o u p, y .B D F H J K Q s iJ v' v- x z ·G .b. .L· c T
J
·x A 1~ p y :B D. F H J K Q s u
,.,ii z G E. v .. E · 11
N H
'R
i. L 0 . .T J:
I
0
., "'" R ll...
. l
~4
. R.
B
p
y
y B'· D :F H J
B n F H J K
·K Q s u v \'',. J>..,... 2. G E: ll
Q s u v \' J>..
,
G
. E. •I
..~ R .. .. J.. L
L c !I.' ~ o·
CL T I- 0 . }.II
1~1
p
~ i( B D F H J K·:.Q s u v \.' ..... ... G E u H .i~
v r,
L c T I 0 !" p .. y
0 c D F II J K . Q. s :J v \: x z. G L Ii !( L ~ c '1 I 0 u p y :B
p F H· J i: Q s . [J ·V 15'• A. r'.... G E il h
, L c 0 lI p y :B
D T I D
Q F H J 1. Q s [J v
,., ... r: G ,,. 1-l R A L c T·
,
~~

I '() I.I p y B D F
~ J J K 'Q s. ·U v \1
"~\.
'-'
""
'" Z· G ,E N li A L c T I 0 I.I p y :a :D F H
s L K Q. s u v v: x ~ G ·E n R 1. L c .T I 0 1'l p y B D F H J
s v .... z. G 'C' rr. R a. .....T c T· I 0 H
-· p y
s u v ,.: ...
T jJI Q CJ \'I '!,•
:B D F H J K
u :p ~ :z ..,G E· If. ·ll ~· L· C. T ·.I .. 0 l.I p y J3 D F H J K Q
v Q, IJ v l!ii ]~ ~ G .c. Ii ·k· . i.. t. c T ·~. o. . hl p y B D F H J .K Q. s
v v Vi' x z G 'E N· .:ij .: 4. 'L .c T. I:· o. J,I . p y B II J K Q s u
'
D F
~ x w x ~.G E ;11 ·R. ~ :L· ic =T I· -0: n' p::,Y B D F H J K Q s u v
y y x z G E N R Jt.. :L c ''l' "i· o· ·!.t P. Y.'. B .D F H J K Q.s u v l"
z z z G E I-4 R j• .. L .-c.. =~ I _._o li p: y ·B. . :!) : F II J T.' ,... s u v Vi .x
i~ ....
'
n. In u.sinc thi~ i~bl~,.··~···1~ ·loca~-~d··~r_i-~~ph~be~ I,. and its equivalent>.
g!, taken from .i..lphabet· .r5:;: g~: ts ~.oc-a.ted in; al.p~a~·et· I~I, and i1;s· equ.ivalt:nt, e~,
taken from Alphabet ·IY;·- ~· 1S t.he letter lyip.g at -phe intersection of the row
indicated bf g:
in: ~lp~;i .I. ,~~;.~_he .co1:~. ~~~~-rpin~~-:hy .e~. Th11s, FIItE LINES
wo11ld be enciphere·d. lijlZ.: Il)l. ~~OV~: It i's obvio;WI.,; however, that only the ·en-
cipherment of g 3 is polY.~iP.h.i,;.~e;t-1~.· in :-c~raet:er:·-;:::;~ and e2 ~re enciphered pure'1
monoalphabetion~ly. 'Vb.rJ.CiU:s!·odier· ·agreements mr.y.;oe madepwith respect to t;he ·
alpha.bets in which the :i:lcdn-.text •. le:tter '1•111 be souc;ht in au.ch a tli."tile, bu.t
the :~sic cryptocraphic princip~es·are the same as in the case described~ ·
- 41$ -
. ..... ~

.. .2.• ... Digraphic tables employing numerical equivalents instead of' letter
eqti.ivale·:nt·s·are;: ~t eGur.s~·, ··~a.sible~ but· in. t~iQ; co.se.. :th~ ~~or ·Ot. equiyalents
required, 6'76i<metins'"th.o.t· ·~00lbimt19ns·oi' . . . . .·:t'.igure~.
·• . three .... • : i:.··; must.. -be··.use"tt·..
. . .• ·~ ·
• .;:(' ': •: '' ': •I ,·,' • :,

~. 1."'... ··--~:---~:-------·----- .=

:·,'.:',. :. ·. : :: ...... .
• . • : ••• _!, • : ,J . . • • ; .

--.· .. ··' .,:o-<· "!':' "':;:? :·:t.::>,·~~:~~t:


r.;1J::;t .13 tiJ'i ;·f:··: .. ·····CHECKE:l.ttJOA.RD DIGRA.Pfila. 'StrBSTITOTION: .·_ ' . ·. · .. , ~ ·- .
:fr,jJr:: 'lr) c.:.-• .... : . . .. . .. . .·. ·:; . . . ·.··. ~dgroph

Disadvo.fit~~'!o(:~::uose· ·tables •• ·•.•.••• ·• ·~. ~.-~.: ·,,..~· •.•••••.•.• •••••••.•.•... 32


.Four-al.pMb~t · clle.qk~boords •• •·• ..•. •.• • • •.• • • • • • • • • • • • •.• • • • • • • • • •.• • • 33
TwQ-alphabot checkerl;Jon.rds· .•.•.~ •.••.•.• ·•.•.•·~ •• ·•••.••• :.. .•.•·.•.••••• ,~ •.•.• •.~... ...
· One-nlpho.bet checkerboards··· .• ;; ••••.•.••••• • ••• '. •• .-.., ••.•.•.• ~ .•• ;•••.;. .......·
•, 34
, 35',:
.• .
. .
=:::Reeta.n.gu.l.c.i:.,.d.esi.g:Q..s.......... ..... ········•• ... ,. im • • • • . • • ,. •;• . . . ,... ••• • • • • .......... •.• • • .. 36
. '. Co~iD.ea:: alj>habet:ic:il. and tlumer£cai:.- checkerbo·a~-:~.: .-~~:•. ·• ~·;, .• '.~:•. ~ ••·:~· '.··. '37 ... ~ ~ !
; ··: ·. : . . . : . . .· .:. .· .. ·. .·· .·. ::.: . . : . ·:
;· · •· .. · . ..32...;_ l'.>i».~9,-yt;.nt·cges of' largo tnblcs,. - .Digro.phic subst.itut1on by means! of'·
; tnble:s sucn·. o.s t®se 113.ustrated- ill. Tr.tbJ.e,s l, 2~ and 5, ·is imprnotic3J. -for ;
t· 11nlitnrY.:use on
n~cco'ilnt ot. tho re1a·tivill.y· lr)rge s:i:ze .that the .t:'1ble >t,,,kes, hnd
t:tio inconvcinience-·. in their production," chr.mge, distribution a® handling_•. : ,h-ust
=. :
o.s it ht\.~ eean. no:ted· in· Special Te:it 1;55,· E~eriJS'n.t~ry J.6.litn.:t"y ·aryPtogra·~,'.:
Section XII, that. simple sliding n;L_phabet·. stri:p,.s cmi replac·a l.3:rge quodl-i~UJ.~
t~ble-s, ·so it -wUl .be t'ouncl that' sm'lll de.signs ·similr'.r to a checkerbonrd cd:n .,
;. · replilce ··the lrirge quc.driculnr tnbles -in d.igrnphic: SLl°!?stitution.. .Although. tho.
usual chess or chaclmrbo~rd i.s based on .., squcre 8 x a, wi·th ~4 cells, the 1 term
; · checkerbonrd W'ill here. be ·US~d ~0 ~US~::lte· ,:my squnre design ~th n 2 cell~.
i.
·'.
33-~ Four-..ilphnbet checkerboards. ~ a. The simple o.r ~ingle-olphab~t
checkerboard consists of r. square 5 x· 5, con·~nining 25 c.ells in which the =
lsttars of' n 25-ele:ment olph::ibet (I end .J being 1ntarchangoab1o) ··ore inserlod'
i~ ony pre:n•rruig•3d order. When f'our such -eheck;or'\)o~d alphabets 'nrt:i nrr:mSod
iii a· -larger square ~s .shown in Fig. 34, the latter ::ney pe employed f'.or digraphic
... ~bstitution to yield the s::im ·cipher :resultn.nts os does tho nru.c~ 1::-.rger Tabl_e' l
.
. ' .
.

T w E N y F O· u R T
!
;•
~
,. K L M 0 s L· :M.. p 'Q
·-
E
~
Secw l (.91) H v z p I ·K Y_: ·z.· s N· Sec. 3 (~) . .'
. . . . p"
-.. FG... ..un. R Q,'· x I x ·W -V A
'
·- ...... .. Q. .;e.. .A.- ·n, :;
. . ··"... ..
":·
....H . ·-G-. ... .0 'B, . ..
~

-·· ·• ..
. ....··.:
·'· • I • • '
·T: ·:a :r
·1f E· F. I: v. E:· .A '.
p'•; Q'' .5· N: .. P. .£} .B ..
1t
•• :. I • • '

0 .:.··; ..
. ..... :. -; ·. :::, .. ·-·2 ... ·· ~
. =., , ~eo a -~. {~c) y z U·
·:: ..
·o y;. z T. 0
"
sec, '.2 :(e2 )'" ·
..
: ·,.• . :: . : . . ~ . .
.:
-'.14L- x w ·V.
A.
B .. ~ '•N- u
: :. p ~-::
.... :· .. ·... ~ . ,; . .: ..:· . .~ " ·g.
"]'.)

-1..• " ': .: : .. : .. ·


·.·K· G·: F. ··D·- c. M. ·L· -K (}
.
.....
~- .;
.. ·Fig. :~4 , ' .
. ....
.,
: ~·

.; ~ . . .. .. ~·
..-·•

..',
REF ID:A56930

- 47 -
...
of Paragrc:ph 31. I~ thi's( ~qu~::·-~ q-f~ ~ /.-1.s.>scJgb.t in Section l; 9 , in 1
2
Sect ion 2. Thus, ~ qna..;~ . :n;1 ·.~~~ . f:~~- ~~~i -~~:r-"~ll,~st - southoo.s~ corners
of an pn.."\ginnry roct~gle aG).iIµtetid bf tho~.~ lett~rs ns loc...'1tod in theso
two ~·1ol.1s. qt·tm sctumja.··:··~n·'" 1'9~f .:).hd~.9~ ire;; -~~-Sp~c~ivel.y,, -~he .!!.tt~ a~ ,!he
northeast - southwes~ · co~-,·~s·_·-~-:~~~~(.s~~.roc;t~l~ •. ·. ·Thus,'~ : TK"c·; WDn : TXc;
=
~ l'@"c; mt. :_W .;.~te.•... :I:i:ii.-~~-~!.~~?.~O:~~~.'.~ij.~g,. . ~ are sought ~n stfotions
3 and 4, r~sp«ct1vetY> ~~d ~he}r 'qm;~ardi:~t 9~ ~a.~-, noted in Sections l and
2, respectively. It l'lo.J:: of .cQ.ur.~J3, .. :be .Pl"~P.~:;mteq_.-.j;ihO.t el should be sought in
the sect1 on now i abe1~ d ~-, :· ·9~ ;: tii¢ ·io.b~l~a·d · ~-~ ·.:v111~roupoR Jn;
would be iocnt ea ea
in the sect ion now lrt:bel~d ~r; i9e,: i:n ::t;hc."t nett lPbe'lo.cl 2. .
. ~ . ·. ~·.~-~ r ··:~·······ii·· . ! .... ·:~ ··::····r~ ~--~
. b.. It is poss~bl9 t~ .do-ll.!t.i:i!Qi_~...~~P!'{~e fSU~stitution eh2_cke:t"~ord
thnt.:¢i.6w~ rB~roci~·~n··_-~tQ !99~ w9,90 relqti~slf.ip.iSO thc.~_,if-~ ~.Xfc~ tor
a:xomple, then XY:p :. ~.c·~ :.Tvr~·:c~clit·~one·:. a:r~ ·Cf!S~ti~l to llBSlll",!_!!Ciprocity-.
?1ese ar~ tnkcn into :~C?~~-~~f?~li~-~<:1D::·:_1.~ -~~~- -~-~tobli~t of the el92, or decipher-
ing sactions, nnd on:o;ic:impio,~ill ~e~ve :to expini:fl'the process. e
. . . . .. . •.... ~- t. . • . ·: : ..
• o •oo I... oo • ' - o 0 •

£..• Two enciphering' a.lphnbata ~ro first constructud, ono in soction l for
1
e~, the other in section 2 for e2, as shown 1n Fig. 35-!!_. The nlph~bet in Sec-
tion 3 is now to be constructed.¥ . . horizont~l
: .... A.ny .. .
row of Section 1 is taken, ..
·. . . . . . :l 2 .. -~ . ',4 ·~ ... . ..
. ' 1 B·· ·. -W. G·· ·:R1 P!-. · :.·· . . . :: ,
... e
I• '
. .2NY.VX_·E ......
.. l
3 $ I c T K Sec • 3· (ea.)
4 .P" ~-'· i ... 0
~- (· ~

5 D z 1: Q, ; fr ..
·-
..

: .~
.....' C X'K P·B l
'
~···· · ... ·~ .. Q,I :rf .y n· v 2
• S: A: ·t w· L 3 soc. ·a (e~)
· · . .·. .. .; : .:: .·. ·a; Z. 'Q.
. . . . . . .. ; .... - . . N. R 4

·-rr·1· .·~ ·
.. .• .. .c Ti H· r:·F·,• U
. : . • ~•
5
4 5
·:: ...
. ..... 1.-: :··;.,. : :! •· :
...
. {.· -~- -~-· . .:.~; . . . .:. . ·c~ 1..:.
.. . . . . ..... . . F-1.g_. ..35--n '
.
for exomple, t1le row". l~brili)cl i,, ·Qqijs~.s·Hnt of the letters· BWGRM, ~nd these
letters :lre written bn. ~Y ho:u:izontnl rm,· at Section 3, in any trnnsposed order,
whic~ is i!llll.Odintely written nt tho top of Section 3, ~s shown in Fig. 35-Jt.

, .......

•..
. .. ....
~
~-.'

t.""" : . • :.-·
.. ' ··.. ·.:: ·:. ... ·.

:
.:·.. ;.:

...
... : : : ', .. .. .. ~ .~ . ·::· .. ''·
·"I'·
·.
.• .
1
.1
B
2
w
3
G
4
R
.5
M
-5 2 4 l
..
3 .,

..·'
-~. N y V. x E
3 s I c T K .. · · Sec. ~ (e!)
4· .U p :L A 0 :M w· R B, ·G:·. l ·. .
...
5 D z F 'Q H
·-· :· ..

c x K p B l.
0 M: y D v 2
- 2
' . $' A 'E. \7 L 3 .Sec
. •. · 2 (9°p.)
G z Q. N· R 4
T H I F u 5
1 2. 3' 4 5

Row 1 of Section 1 mis inserted in ro\v 4 ot Seotion 3. . The reciprocal permuta-


tion ot 1 4 is 4 1, and therefore :row 4 o:r Section l ~st now be inserted in
row l.of Section 3, and in'the transpo~ed order 5-2-4~1-3, as indicated at the
top or· Section 3. T~e result. is showri- fn Fig. 35·-£~ · Thel,l .. row 2 of' Section l
.. :
. . ..
··.•
..
1 2 .' 3 ..: .4 :.·5
.· . .. . 5 2· ·4 l .3
1 B W· G; R M o· ..:p: A U· L 4
-· '
.2. ·N Y; v: ·X E
.. -·
3 ·s: I: C: ·.T K Sec. 3· (tl)
c
4 ·'u· p L· A: ·o :M· ~w R B G :\.
·5 D ·z. F Q. H '

c x· K p B 1
0 M y D v 2
Sec. 4 (~) . s A E VT L 3 Sec. 2 "(9~)
·G z Q N R 4
T. H I F u 5
:
: 1 2 3 4 5

Fig. 35-c

1s transferred to another raw ot Section 3, for exa~le, the fifth, and the
letters inserted in the already indicated transposed order. Illmediately
thereafter, in order to continue the reciprocal permutation relationship,
·•·· I

REF ID:A56930

- 49 ·-

row 5 of Section 1 becoI!les rovr·2 of' Section 3. This leaves r<RI 3 of Section l
to become also row 3 Qf ·Section 3·, and to be re"ciprobai to itself.. The result
is shown in Fig •. 35-2:,, ,whc:.~e ·Sectfon 3 .is comp;t.etely' c~structed. The f'ore-

. : 1 . 2.. . 3 4 5 ... 5.. 2 4 1- 3


'
..
]j B w.... .G ·R M 0 p .A .'tJ' :i:. 4
2 N y •V x E H z· Q D.. ;F 5
... 1
Sec. 1 (91) 3 S· r c T K K ·:I T s C. 3 Sec. 3 (e0 )
p
4 u. ·.p L A .o M· ,w I
'R
.
J3• 'G 1
5 .D· z· .F Q. H ·E· .:y x ir-. 'J·;
I
.. ·.·C X· K. p B" l
0 M y D· v 2
s A E w L 3
G z Q N R 4
T H I F u I5
1 2 3 4 5

goiilg principle of pel--..m1tat10n recipro-~ity ·applies equally to'·the rows of Ssction


4. Suppose the per!lllltati~n 3-5-1-4-2 is decided upon .~or the. rows ot Section 4.
This means that rows l:and.3 of Section B beoome rov:s 3 and.1 of-Section 4; rows
2 and 5 of ~ction 2 bqcOi.ilS-.,5
• J. • .
.and Z of' Se.ction.:4;
. •
row 4 of Section 2 becomes .r6w
4 ot section 4. As regards "the transposed order wit.hin ·tbe rows of' Section 4, .
the foll.owing rule app.lies: :· the latters :t'crming a complete.. colwmi from the·' top :
Of Section 3 to the bottom o~ Section 2, w~atev~~ their order,. I!Dlst also form
a coq>lete ·colu..im from· th.6 t·op oi' Section 1 t·o the bottom ot Section 4. For
example, the COlU:.71ll desiane.ted '.:>y the .numb&r 5 Oi' section ~:contains the lette;t"S.
oma.m:aosc1l'; column 5 of' Se~tion 1 C.ontains i'ive o:t" ·these· J.6t.tars, the.~- . m.-oil;·
fbr!?' the "conu>l~ed ·collllrm. must contain the l~tters, ·oosCJ!': but in the tr~s- . .
posed arder.given by the permutation selected'for.the rows of Section 4,-viz.,
3-5-1.-4-2. . . .· .

The coili;pleted square i~ -.then a.a. shown ·j,n Fig. ·35·-a·;· and aXb.:tb:its r~iprocity
th~oughout. ··. EXamplo·: . BBP :·nv~,. and·~~ :
. . . . . .
mrc. .: ·. -
.
. . .· ..

"· 1. .qw. . <REE... _,ID : A.5 6 9 3 0
;r"
.,

-· 50 .....
.. .. .. ];; 2 3 .4 5 . 5 ·2 4 1 ·3''. .. ..
•.
..
... 1 B w ~ R M 0 P. A u -L 4 .
2 N y v x E H z Q, D F 5
Sec •. 1 {9;1.)
p 3 s I .C T K. K -I T ·S c 3
4 .u p .L A. 0 M w R B G. 1

z -·E y x v
5 D F Q H. N 2
.. •;. j - ..
3 w A L E s. .c·. x
K 'P B 1
5 F ·R u I T Q. M .y D v 2
Sec. 4. (9~)
c 1. p ·x B K C· ·S ··A E w· L 3 Sec •. 2 (ea)
p
4 N z R Q IQ. G z 0 N R 4
2 D }.~ v y 0 T H ·:I .. F u 5
4 :2 5 3 ·l. 1 2 "3: 4. 5
.,
Fig.: 3-5-.!,.

!~ The total number of reciproc·al !Jurmutations oi' five elements is 26,


as follows:.
..
(1) 12345
. {2) 12354 (7) 14325 (12) 2J.354. ·(17)" 34125 (22) 45312

(3) ~5 . (8) 14523 (13) 21435 (18) .35i<l2 (23). 52341

(4) 12543 (9) 15342 {14) 21543 (lSI) .42315 {~.) -~431
•·
.... (5) l.3245 '{10) 15432 (15) 32145 {20) 43215 (25) 53241,"
(6) 13254 (11) 21345 (16) 32184 (21) 42513 (26) 54321"
.. . .
Since the row parmutations of sect ions 2 and 4 are independent, the total num- .
bar of'· ditf'erent four-alphabot squares as regards row pe:rmutations is 252 : 676. I
T~g into account tho column l'Jarmll.tations,. 5x4x3:x2xl in number,. it ·1s there-··
~ro,. :pqsaib+.e to havo 676:d20 or Bl,120 di:rtorent~ four-alphabet checkerboards
of this nature, based upon tho sane two alphabets in Sections l and _3.. With ....
changes in the latter, the nUI!lbor,.of ·course, becomes vary much greater.

· 34~ . · ·Two-alphabet checkerboards, ..- a... . It is pt;lss:i.ble t·o e:rtoct digrnphic ·


substitution with a chcckarboard· consisti1ig of but ·.i;wo iioctions 'bY· a ·inodificatiOn.
in tha ~thod of finding equi valen. ts. . In the c heckeirboard shown in Fig •. 36, 9~
REF ID:A56930

- 51
~f 91 e; is located in the· square at the left, e2 , in the square at the riglJ.t.
M A N u F ---- u
A

T ·0 ;:M
C. T R I G B I L.. E s
; 2 1
B· D E H K c D. F G H . ·_:Spec·· ··
:
.L 0 p Q, s K . }T p Q, .·R
·.V Vf x y z; v w x y ,z
Fig. 36
When e e~ are at the opposite ends o:f the diagonal of the imagi~~rY ··:rectangle
1
defined bY the letters, el~ are ·at"· the OQpOsite enc1s of the oth~diag~al oi'
the same re_::angl~ ju_::: as 2::
"!;he' pr:aceding case. For example, ~ : T'l'ci
i5rrp :. 'Wl:'c ; ATP : TAc; EI), : HEc. ,
b. Reciprocity may be imparted to ~he 2-section checkerboard by recip-
rocal-permutation of the rows of the:checkerbqard, no attempt being made to
effect any reciprocal permutatipn :o:r ;o.Olumns~· Fig. 3? shows such a checker ...
board.
M A N u F. I 0 s Q, L p

~
l
2 .c T R I G w
...
z y v x

~
3 B D E H K D I{ H B 1!:1

4 L 0 p Q s A F u M N
5 v w x y: .Z • T G ,I c R . 2.I
Fig.--37 '

Here, for exa..inple, A.WP :: (jfc: and '~-p ·OT'~-=


RA" : DL'c··~d
./;' 'fie·;
. . : ... p.. :'·.-c,
..
etc. 1i:: ..
c. In two-alphabet checkerboards in which one section is di~ectl.y above
tb.e"."C:>t"her; reciprocity already exists Wi th~t ~cial_irepara,.!!ons" '!!:: its pro-
duct ion.-, In Fig •. 38, i\D : -cm: and 1lI . ::: MO ; NIA. : 1-AA. 0 ·an.a MA.~ : ML. When
- •. p c p c .-p·. . . ---p
M 4- N u F
c T .R I G
B D E H K
L 0 p Q. s
v w x_ y z
.
A u ·T 0 M
.
B I L E s
c p F G
..
H
...
K .J:if p . Q ·R

v w x y z
Fig. 38

·-· ·--~----------------------------~------~--------
- 52 -
l 2 N "'

both ~ and 9p happen to be _in the same column there is really no encipherr:ient,
a .tact ·\vhich cons·titutes an import.ant disadvantage of this methoG.. This d1.s-
advantage is only slightly less ob.vious. in the ;preceding cases where the cipher
equivalent of such a case of 9IQ2 .oonsist.s merely: of th,e plain-text letters in
reversed order, yielding ~-· P '. . ·
O· . .

35. One-alphabet checkerboards; Playfair Cipher. - a. By reducing the


checkerboard to one alphabet, there results the· square ·of the well-lmown Playfoir
Cipher, used for many years as a field ·ciuher the British .Army. For a short in
time, 1917-18, it was pre.scribed as· a: f;ieid.. cipher. for ·use in the United States
Army. A modification in the method of finding cipher equivalents has been found
usef'ul in imparting a greater degroc of security than that afforded in the pre-
ceding types· of checkerboard JJBthods. Fig. :39 shows o typical Plo.y:fair square.

M I'A N ·u F
leIT R I
~:-
D E -- H
G
-
K
L 0 p Q s
~ ;.•.
v w x y z
. I
-!
Fig. 39.

The usual method or enciph,er:rmnt can be best ~x,Pla~~d .:~y· examples gi von under
four categories: :·. ··· :, ·· ·
. .· ''." .. 1 ... ··2.. .
(1) Members of the .pla.in'.':"'.te:::rt; psfr.~_ep o.nd· .. ep,,
~e at opposite ends of

the meznb3rs of tho eipher~te:id; pair, 9 10 o.nd ec, are at the oppasi te
the diagonal of an imaginary recta:ngle dcfine~ by the two letters;

.· . ends.-:or.:the .. otner :.diagon~I ·.of.-.this _imaginary rectangle •... ~mples:


.. : --~p ::ILc; ~p, :: lJC'c;. m.~.: 'Qjc; 'VTP : Yee.. . . . . .
... :.
. (2)· ..e;·.a.ri~l.-e~·:a~e'in thc·~a.+00·:.r~!Y; the lotter _imme.diately to the right
· or ~ rorms·. e~·; the letto:.~ immediately to the. right of e~ forms
9~. When e1tlier e~ or:e~·1s ·~t the extreme right of_!he row, the
first letter in the row ooconie·s· its e . Examples: MA. . . : AN ;
- - - mt' - - c ---p c
MU:p : .A.Fe; .i:\Fp : N!v c; :I('~,: t~c•

{3) e~ fld are in the same colu..im; the lotter imrJediately below e~ forms
e2
ec, th~ lottor immed_iotel~ below g2 forms Q~. When either e~ or e~
is at the bottom Qf ~he colunm., thE top letter in that column becornes
its 9 0 • Exomplos: MCP ·.: ·cnc; AWP ::: ~; ~ : AT0 ; QUP : Yic•

(4) 9~and 9 2 are identical~ they·ore to be separated by inserting a null,


usunlli the letter X or Q• For eX?mple, the w0rd BATTLES would be
enciphered thus: ·

BA. TX. TL ES.


nM ~; ·ao. :·ia?·
REF ID:A56930

- 53 -

b. The Playfoir Square.is.nutomnt~cally reciprocal so rru- ~s enci:pher-


m.ents-of: type {l) ::ibovc q:f.-6 concerned;_ but this .is not true of eµc,iphe:ci;re_nts
of typo (2) or (3).

36. Rectllngulnr designs. - a.. It is not essential that ch.eckerboords


f·or digrnphic substitution,· be; in,. the she.pa 'of perfect squares; i·e·cto.ngu'.l.a.r de-
signs 1'1'ill servo equnlly vmll, w:ith little or no modific.'."\tion in prOcediire. In
four-nlpha.bet ·end two-o.lphnbet i-cctnngJ..e s reci:proci ty can be produced by follow-
ing tho me.thod i~dicnted in P:irngrnph · 31. · ·

J2.• In .tho. 'a.ccompnnying Figs. 40 nnd 41, there n.re shown ·two .eX:cr~9los of
such rectangles, together with illustrations of enciphcrrnents.. Since the
English c.lphnbet consists of 26 letters, n number which c:m only :f'orm an fm~
pr3ctic.nble rccta.nglo 2x13, ".litd since the addi tiori of nny symbols Su.ch o..s the
dtgits 1, 2, 3 ••• to r:iugmont th.o number of ·ole;:,mnts to 27, 28, 30, 32, 35, or
36 cho.r.::-_cters would result in prod1.,lcing crypt.o~rnms contci.ining interrilixturos
of lott1Jrs ::md figures, the only :pr:i.ctictl.ble scheme is to rcduco tho ~li;ih:-tbot
to 24 letters '."Is shown in tho figure.a, where :t.:scrvus :'."'..lso for :r nnd U :'1lso
for V.
l 2 3 4 5 6 6 2 '3 l 5 4
1 T ~~-{ 0 ~I u N
·--L y Q, 4
z ·H· ;p --~

2 D R E s 1· x K J3; .C A G F 3
3 .A B c F G K x R E D I s 2
4 L NI p Q, y· 2 N w 0 T u H 1
- -
4 :x R '.7 z· y, Q 0 :n E T l
H u ..

3 L: I K p M G s .A :D B c F 2
2 'B .1\. j) F- ·c ·s G I I{ .t . M :_p ,3..

·-
.·.1 T N·· E- u H 0 ·O· R w x ··Y z1 4
.... -4 2 3 '6 5 .. 1 ·.· l 2 3 ·4 5 6
?10: 40.
Exnmples:
Plnin: TH ER EA RE 'BE Tr E'n CR yp TO GR ..\M
Ciphur: YX BE BK CR ER LX BE m:· HC zx RH IB
l 2 3 4 2
---r
3 1 4
1 T w 0 H B c J.\. F 4
2 u N D R z
-- Q y p 6
seo. 1 ( e1 ) ·
.. .P . ·..
3 E s
4. B-.-...
~
I :{ K L G M
c F w 0··- ---
T H
-
-
--
5
1
5 G K L. M s I 1i' x ~~ 3
6 p Q, y z N D u ·:r.c ·2
5 Q u p R 0 N E T 1
2 s H u ...." H u s l'l- 2
te 2 3 c D. B F D B c F 3
Sec .• · 4
. c
) -- 6'
·1
4
y
E
K
\'i/ x z
0 If T
G~ I L
G
M
w x
I
p
K
G. --
L
5
R
y . Z1 6
4
~·. . . . . l ;

3 1 2 4 1 2 3 4
Fig,. 41; ; -~ ....
'"1 .• ,·
Exai."11.ples:
Plain: TH ER ... EA. RE:: ... BE .:.:Tr EI°L ..CR _);p TO GR AM
Cipher: BS ME M3 ffi' .TM "FQ. ME . 'HN :'DN :BQ.· n·;·W".E' .
- 54 ·-

c~ Tv10-al9h.:ib0t :rc.:cta."1t;L3s arc also :possitlo; it -is thought U:."lllo!'.essary
to demonstrate them by. specific exara:ples .: The general e:;.;:amples shown in the
:preceding sub!_)aragraph are considered sufficient.

'· ·~_. .. It is possible, however, :md it m.!3-Y be practicable to extend the


alphabet to 28, 30, or more ··-:iharacters by the subterfuge now to be explained.
SU:ppose one ·of -the letters of the alphabet be om.itted from the ··set cf 26 let-
. ·ters, and sup:pose it to be re:!,)laced by 2, 3, or more pairs of letters, each
pair havine as one of its me~nbers the.omitted single letter. Thus, in the
case of a one-alphabet Pls.yfair design of rectangular shape, in which the
letter K is omitted as a sine;le letter, and. the nu:.'.lber of characters in _the
rectangle ismde a total of 30 by tlw addition of.five combinations of K
with ·other letters, the rectangle sl:ovm in ·Fig. 42 may :.be constructed.

w A '.81 Ht= I N
..
G T· 0 B c D
El F·· . .T .KA IIra KI'
K{)
..
IKU :L M: p Q.
I
R u v., x y :z
. ~ig_. 42

An iri:t-eresting consequence of this.modification ,is that certain irregularities


are introdnc~d in the· cryptogram, consisting .in ·(l·) the occasional replacement
01' 9J..s~ b~.Q 929~, tl~at·.J..S,_ Of a digraph by atrigraph, (2) less 1'reque¥tly,
the replacement of ate~.e~ by el9*g3e4, that· i-s, of a trigraph by a tetragraph,
!::d (3) the aEP_eara.:::!_ of. v~nt ·:va~ues~ For~aTI!Ple..!._ mp :
mro'0 ; GL:p : OKOI';
JK = KAKE ; CK.., =
BKE 0 , or KEPc, or DICEQ, or GP , or TP • So fill' as the de-
ci11>tograpfiing ts concerned, there wouid be no dffficult~, because the operator
al.ways considers any K o~curring in the cipher text as invariably forming a
ligo.ture with the· ·succeeding letter, talding the pair of 1ett€}rs as a unit.
In decryptographing a· set ·of letters7 such o.s GPc, he obtoins CKOP; he dis-
regards the o.

e. As a final note it mcy


be,addedthat'it i.s, Of course, possible to
insert the letters within u· checkerboard· or .a· rectangle in a less systematic
order than that. indicotcd· in ·the v:J.:rious ex:u-:uples. · The letters may be in-
serted at random or by following tpe priucbles of systemJ.tico.lly-rQ.ixed alpha-
bets, so that no definite sequence is ·op!)in'L."Ilt in the. checkerboard or rectangle.

37. Combined ::i.l:pha.boticnl and mun;::ric::ll.. c:qeckerbo~d. - ~· In Fig. 43


there is shown 3 four-ooction check13,rb.o::ird which :presents a rather interesting
feature in thQt it m.c.lrns ,ossit>le .tt10 .sub~t_H\ltion of· 3-figure combino..tions
f'or digraphs in· o. unique i.'l<.'1.IlllOJ;'. '!'o. 9.nciphe:r o. rnpssnge one proceeds ~s usual
to :find tho numr.:lric;:<l oquivo.len~s c;r ~J·pcir, ::md then these numbers ::ire nddod
together. Thus: · ·
Pla.in text: PR oc EE DI NG
275 350 100 r.?R· 325
9 13 24 18 7
Ciphe~· to:Xt : 284 363 124 09:3 332. ..

... ·- ... -.. --~ .


REF ID:A56930

- 55 -

.. A B -e
----··
D E OOQ -~~R·· 050 1075 ion
..

F G H· 1·. K 125 1!30 175 200 225


.. .. .. 1
L }i N ·o p ,. 250· .27!: . .30(' 325 35n. : Se_c .. 3 (ec>

Q
.
R a T:. u '
-
. 375 40<' 42B 45C . 47.5
..
v \f. x ·.y .z 500 525 .550 575 600
-
.. '
.. .. .. ...
.. .... ... :·:

I
.
'

.•
0

5
1

6
2


3

A
·-
-·· 4

9
v
W··
Q

.R
L

M
J'
G

·.B ..
.. . .. : : ., 2
2
S ec.· ·4 \,.9 c ) l 'l ·1-i;::; 12" .. .13· 14" x '-8· N H c...,. ··.· .. Sea.·: .2 (eP)
4",•
·:•·.·.

15 15 17 18 19 y .T . r, I ·D
Ill•;

2c 2J.:· ~.a. 23 24 z. u
..
.·p .··K. E

Fit;. 43

!!.• TC!' dee ipher such a oDy;pto [';l"atn~· t ak·e tl:e gre.ate·at mul t i];1le of' 25 con-
tained in the group of three digits; this :cru.ltiple and its remainder fo.im the
ele..."llents for determining the plain-text pair· in·the usual :mr.ner. ·Thus, _. .
2A4: 275 +9 :·PR. :• . '
. . . .:

--------------------
. . ·. ; ·· · '. s3cTION IX ·. . ·:

··.'. ·.
:-·: CQMI.'LEX SUESI'J;TUTIO~·T. ~-~STEMS..
. . . . .. ·· l?a~asr.~pl,i.. ·
Preliminary remarks ....................................... "!. • • _; •. ~ · ~: ~8 -~ . L--•-
Continuous or nonrepeat ing-!cey systems •••..•.....•.•• •.• ........ .; •· · ·. 39 · ·· ~·
Auto-key systems ••••••••••••••••••••••'!'•••.••········•:.·.·,.,. •._,;· .•:••'•••·. 40
Progressive-alphabet system::: ~; ~: •• ~.". ~··••• ·~ ·•••• ~ •••.• ·.·~ ••-•••·•.••.•• · 41
Interrupted or variable-key s~rs·tems. .. .. • • • • • • • • • • • • • • • • • •.• • • • • • • 42
suppressing :periodioity by e~cfpherment of"va~iable~length
groupings 01' the plo.in text ................. ·......... ·• 43
SUp:pressing :periodicitJ by e:n.ciphel'i!lent by variable-length
groupings o:r the key ••.~ • -~ •··••••• ·• • • • • • • • • • • • • .. • • • • • 44
Mechanical cryptographs in which periodicity is avoided ••••••• 45
38. Preliminary remarks. - In-Paragraph 63 o:r Special Tert No. 155 1
Elementary ?.~ilitary Cryptography 1 bri13i' refel'ence \ias mde. to .:n.ore complex
subati tution systans. It was stated that there are certain :;;>Ol!•al:phabetic
methods in which periodicity.is absent; there are other n:ethods in which the
external manifestation of' ~eri~dicity in crY:Ptograi'IB is prevented, or in
which it is suppressed or disguised. Sli;:;ht hints we:-e then given as to the
nature of so.rae.oi' these·~~thods •. This and the next two sections of the pres-
ent text are devoted to a more detailed description and discussion of the
~~thods indioa~ed, which, as a class, may be·designated as !l>-E!.~~ systems,
as contrasted wi~h the_p~ev~c~sly de~c~i~~d, more· sL19le, R!'.!io~~ syate!.lS.

···-·· ·--· - .. ··--·····-----·-·----·--------------


--~-------REF-:I-JT:-A56 9-36 - - - -

. - 56 -
·.

39 • . Contthµo11~-~r-nonre~eatll1g:.key.systel48. -.!· "One ~:t th:e simplest
roethods of avoiding pe~iodicity occasion9d by_t~e emplo~t· ~f·ma.re than one
substitution alp}\.abct"_ :!-1;1.t:o.. use ·as·t~u lfoy ·:ror the enci:phel"Ill0nt: of one or
more ·messages ·a ser:i..3a of l~tters or: cha.recters that. does not repeat itsuli'.
The ·.running. text of a"
book~ .identical ·copies of which. are in possession of
the'·corros:pondent~~ -~Y serve ·as tna·}::oy tor this ptJ.r!)oso •. :. It is only necessary
for thu corrliSspond..lnts to i;isr'3o -as to the startin.3, point of': the .lcey, or to
arrange a systom ·or
in°?ico.ting this start inc; point i~ j;}le.. _.t>Jxt of .. th.a cr:'llto-
a
gram. Such a systa:n is cabl.·3d. .££.1!.°t~.!1-l?.:U.E~o..t syst.)iD.·.· . Other n~~m.es ,applied
to it are nonrepaatin&, riuining ;: or .!!!.~E-~i:r~j:..~_e-:~cJ!:. systc::DS. T~~ephonu direc-
tories, tho Biblo,' standard: rofe:t"enc-:. war~~$; ot:c.i ar:J of'te!I. used as ;;ource
books for such kc~-s. · · ··· · · 1
.· .....
. . .. ....
]?,. Various tY:Pes of ci:ph-3~ al:?;ihpbet~· DDY be a~J.:O:red 'in this system,
direct or reversed ·~andard :alphab::;ts,. r'1;1-~4: al.:phabots··arawti_ tip ai random,
0

o:r so"Qonda:cy mi:x:3d l'.;\lpaab·.:1ts resulti:13 i'ror:!..the in'.l;orao1;1o:r;i pf two primary


slid:l:Jig :niixod alpha'Qois. · ~ · ··· · ' .. ·· .· , ·.. _.· .. · · : ·
I 0 1 • :

..2.• As an o:xo."Jt)lc . of' the m~hod oi' cr;..?togra:phing,· suppose the i'ollowing
Illi)ssago is to bo ~DCi!Jh·:;)l'!.>d on tho ·c0ntinuous key ,principle, using as tho koy
the text oi' this sub:paragraph, bllgin..Tl.ing .AS .AN EJ(f4.j'/IPI.3 ••• ~ and· rovilrsed
standard alphabets:

Hl!:A.VY. IN'BRDICTIOM FIRE. FALLING AT ••••

Koy toxt:
Plo.in taxt:
-ASA.."'m"·
H!l:A.VY
XA!.-I?L
INTER
EOFI"'d
DICTI
!:.:.l!:!.'T.l:I
aNFIR.
ODOFC
E.J.l;ALL .
RYPI'O
lliGA.T
...
....
Crn>togram: TO.ASG PNTLU BGDAZ ~ZLQ. ICYOUR JLJTV ...
40. Auto-key syst~rns. - a. Tho ciphor lett0rs oi' a crY!>togram may
ssrv::; as !coy lott'-lrs, thus autOOD.ticall;i- furnishing n key. SUp:posc, for cx-
amplo, that two ~arr'3s~cndcnts ae,Tcc to usa th9 'o/Qrd '1'3UE·as an._1nitio.l key,
and su_-pposo tm mossa.::;v ·-to b'3 :en:c·ipho:i'."·5d · (w;tl:i .tho obsolete· u. s . .ArcJy ciphor
disk) is a.s f'ollows:· · · ·· · · ·· · ·: · ~ ..... ~., .... · · · · · · - '· · · · ·
: o e •• • • ' o ,• ', •e o t "' • • • I
·." .....
HEAVY "IlffilID1CT:tOI·~ Fire:· F'.ALL'n!G AT. ·•· ~. ~
. .. . ...... ·.· ·.. ·
Tha first :f."our._iott·:)~ qro ;:,nc_iphor~~ . a.i;i:shown=·
. . . :. ' ~ . .. . . .
Koy tuxt: THOE . . ....
...
Plai.."l t~xt: HE!VY .nrrz:a · .....
ntdTt · •••
Cryptogram: MNUJ
Tho ciphor lotters· lF.UJ n~11 f'orm. tho lm~•l-:;,t·brs f'or enciphering thll n-»::t four
plain-text lottors, YillT, yielding OF"'rlQ,. Th·J lnttor th.on :torm ·tho ke;:,~l~ttors
for ::;nciph0ring thB _:noxt f'our luttors, ·and· s0_ on, ~·i9lc:i.:1,ng. tho :f'ollow.i.ng:

Koy tuxt:
Plo.in text:
TRUEH
EEAVY
£rtJjOF
·rn·rE.:t
HQJCOE · · rrn1u
DICTI . OHFin. .
VQODR LOSGD. •...
.nmAT •••
:omim:· ...
EF.A.LL
Cryptogram: :MNUJO
.
FR~O ::urvw UVQ,OD .
Ri:._OsG.
b. Insto.ad of' using tho. ciph·.:1r l,u·tt'3rs iri. ·sots, o.s shown, tl10 l:lst ci-
phor I'vtt:.lr gi v;a.n by th~ us~ ot thtJ ke~rword im:y boccxna tho koylcttcr i'or on-
ai:s>horing the n.:;xt pl::lin-toxt lettor; tho ci:phar rusultnnt of the lott0r then
REF ID:A56930

- 57 -
bocom.:.s th:u kcyl.ltt•.Jr fer unc!plu.ri.!lg th.J i'ollowins btt·_)r·, aid so on tb·. tho
and of tho mssag::i. Thus: ·
Koy t o:xt : TRUEJ" CZ.RPi1 O.AIITA JF.11.li.P . EWJD.1.. . • •.•
Plnin· torl·: HS.\"VY DI CTI o:mrra EF-\LL DrG:lT ......
or!rptogr0L1: IvIMUJ'L ZRP:1C .AlrL\.J F.LUPE 'NJn.Uf · •• ~ .
c. It is obvious thr:t nn initi:-.l. ko~·vrord is not ll'JC0SEmr~·; i."\ singlo
prearranged l~tt~r ~ill do.
_g_•.. Tho pl~ili. _t\l~: ~.tsol! mcy sorv:e ns ::i koi,_ ~1'ti?.r .. ~ ·initial group or
on inititl latter. This is shown in tho i'Ollowillg. 1Jx::iraplo, ilh·~rcin tho text of
tho mss~ge itsol:t', .'.'.ft0r tho pr:.;::i.zr....•::ingod initinl !myv«>rd TRUE, .toms tho ke:r
.toxt: ·
Koy text:· TB;tJEH E.\VYI N',l.1ZRD ICTIO lOO:aE F...'.LLI· •·.••
Pl:i in te~::-t;: HEAVY INTT'..la . DICTI ONFIR EF-\LL INC'z:'..T ••· ~ .
C.rypt ogr.o~m: Mt!UJJ WNCUR . XLCYV . UPC ..UC J..."..IGr XlMP • ~.
o~ ·Althoue;h. rovor&Jd·standnrd nlph~bets hnvo used in all th~ foro- boon
going-e:omplcs, it is obvious th..'.lt v:irict:.s t;r:pcs· oi' nl.ph:ib"ots may be o:mployed,
!ls proo.rr'n.IlGOd • ·· · ,· · : .·
. .
The follO!'dng rotb.od; though it "Itl..'ly. nt first o.p:po:'lr to bo qui to dii'-
f.
f~rorit, is in re~lity idontic~ with those jus·t doscribod. .i mixed sequanco is
pr&p:u-ed end its eleiaents nu:.nborod in
scquonco. Let the ~ixod sequane~ be de-
'nved :tr.an the koyword PERMOT..'.':..BLY:. . .
·E5 3 7 .5 9 8 l 2 ·4 10 ..
P E R MlJ T ~ B-L--:y-
0 D F .G H I J" K .N '0
Q.SV·WXZ
A _j B K E D S L N M G W P C Q a F V T I Z U H X Y 0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 :26

t.et. tho m.essa.go·bo tho s".',mc· a.a baf'cro, nnd l.:st the first ~ttor bo its· o..m
cipher equivalent •. E::icll cipher lotter f'rom tb..--:t point on is producad in turn
by finding the ~um of th~ numJric~l equiv~+cnts 01' tho prucoding cipher lettor
and the plo.in-text l•.Yttor to be onciph.orcd. i"lhon this totr.:l vxcoods 26, the
lc.tter amount is dcductod ~nd the l.Jttor cqui V'."'.lont of tho ro::::in.indor i~ tcko:i;i.
f'or the ciphor lettar. Thus: •
K~y text:· (\ 23 2 t"')"' 16 . 21 11 .17 11 25 18 12
3 21 2() 14 .......
~

Plain text : H ·E ..:\. v y I M T E R D I c T I 0


Numericnl vn.luo: 23 5 1 18 25 20 9 . 19 .5 16 6 .20 14 19. 20 26
Koyed v:i.luo: 29 3 21 46 40 23 42 21 37 17 37 25 44· ,38 38
(Less 25 or 52
if' neccss::ll.'Y)
2 w- 3 21. 2C 14 23 16 ·21 11 17 11 25 18 12 12
Ciphar text: H j B z I c H R z G F G y v w w
Kay text: 21 12 6 22 1 lR 19 1 9 3 12 23 2-4

Plain text : F I R E F A L L I N G A T
Numeric~ vnlue: 17 20 16 5 17 i· 8 8 2() 119 1 19
Kayed va.lue: 38 32 22 27 18 19 27 9 29 12 23 24 43
(Less 26 or 52 l2 6 22 1 Ia--r9 i 9 3 12 23 24 17
if necoss-'lry
Ciphor text: Yi b u •
J..I. V· T ....\ . N :A w . H· x .. F

------. ------~--'-····------------
- 58 -
·- .
&• In the foregoing example the aucceaaive cipher letters form the auc-
ceaaiTe keylettera.; but, .H.s noted in _aubp.ara.er.aph Ji,. t)'le auccesaive pl:_llin-:te.xt
letters may serve KB the successive keylett~rs. • :

h. The SC'llDe·results can be obtdined by the uae or sliding strips beari~
the mI'xed alphl&):fit, Study the following dia~ript show~ng thP.. succes.s'i-ve positions
ot the movable s~~~p and compare th~ results with those obt~ined in subparagraph
-
t above.
.
·· · · · ·

f la.in Cipher .. '


0 A J B K E D S L N M G W P C R .F V .. T.I Z U H X Y.'
H . ij H· X Y O A J B K E l>~SL. N 1i1 "G 'I P C ~ R J' ·V T I Z U
E. J J B K E· D s· · L N II G W P C Q R F V .T I Z· U H X Y 0 A
A B K E D S L N 11 G"·W P C Q R F V T I Z U H X Y O A J
V Z l1 H X Y •0 A J B K E D S L N II l ~1 P C Q R· F V T I
Y I Z U. JI X• 1 O A J B K E D S L N U 1 W P C Q R F V T
I C Q &.F V :T I Z U H X Y 0 A J B X 3 D S t N K G W p
N H X ~-~·A J B KE D S L NU G ~ P C ~ R.F VT I Z U
T R F V T I Z U H X Y 0 A J B K E D S L N II G W p c Q
:1· Z Z . U · ii X· Y 0 A J B K E Jl S L N II G °\V P C ~ R F V T I
!\'· · · G W . P C ~ . R F V T I Z U H X Y 0 A J B K E. D S L N M
D F F V T I Z U H X Y 0 A J B K E D S L N M G W P C Q R
I. G. W P C ~ R .F V T I Z U H X Y 0 A J B K E D S L N JI
0 .Y. 0 A J B r.: E p S L 11 ·1i.1 3 w· P C ~ R F U H X
V T. ·I Z
'l;'. ·.; V T I" Z. U H X Y 0 ..\. J B IC "E D S L. N K G W ·p C Q R r:
I W P C Q R F V 1 I Z U H X Y 0 A J B K E D 8 L N II <l.
0 VI P C Q R F V T I Z U H X Y 0 A ._.j. B K E D S L N · 11 G
N Z U H X Y .C1• . A... .'f
..B K E D S L N JI G W P C Q R F V T I
~ 0 ~ R F v T I i ·u H x "y""o n s L
;i ~
7 p A J B K E
I D S L H M G W P G ~ ~ F V T I Z U H X Y 0 A J
R U H X Y 0 A J B K E D S L N M G ~ P C ~ R F V
E ".A J B: K : E· . n· s L N M G ~1 p c l R r· v T I z u H x y o,
F =v ·.· v T·-" I· z u H x· y 0 A J B K .E D 8 L N II G w p c Q R F'
A T T I Z U H X Y 0 A J ~ K E
b S L N II G W P d ~ R F V
L ...... l . A ·.J ~ l R F V -T I Z U H x y
·.·.s· ··K E i> S t· N M G ·.: P 0
L. • . N N 11 · Q. \Y ·P C· l R F
tT S X Y • 0 A J B K E D S
V T I . Z L
:i: B B .K. -E·· · D S L .N H G W P O ~
R F V T I Z U H X Y O A J
N· ·VI.:· . P .. C . i . .1\ Y 0 A J B K . E D S L N JI
F V T . I Z U' :1 X G
G H HXYOla.JBKEJ"lSLH""GiVPC1RFVT I Z U
. A.. X X Y 0 A J B K E D S L H :.f .l 'V :··· C ~ R F V T I Z U H
T .. F F · V "T l Z U H X Y 0 .at. J 3 K E D 8 L N :U G W· P C Q R
. .!• ·Ona·· seri'luo cbjecticn to ouch dUt .;-key "syst •ims is tha.t the result a or
.:::. arrora.~Kr.e .--Q~l.ct:ti_y~~-·- ~nP. .~J'.'ror. a!'fec;ts ull the suc..:ec:-iir.J letters_, 1;1.nd if
· itner1:1.l errors 1:1.re mude the messa.g.ea a.re difficult tr de·::ry~l"g~ti.ph. It· is
poaaible th&.t this disc.1.dvu11ta.ge cKn be minir.iized l·y the ase of d.utom...tic ·cipher
d'evices suitc1.bly c:-11structed -to u.c~cmplish the &ncipherment with:· speed· .11.Dd
ciCCUrd.cy •.

41. P~qgressive-ulph~b~t systems. - '• The speci~l chara.cterist~c ~r


these systems· is thcat th"!" :members of d whcle set of ciphe.r- a,J.pha.ll~t·a._tu:.~ ~·­
ployed one ·"f.t;.e.!".. the otheJ.": in: prcgressi'>n .and: in a definit~ sequence.·· These
systems are peri<'dic '-:in natura"
""i:iriif"the"""leri"gth "of· the ""·pertC'~ i~ .U~Ua~ly eqUKl
tc the total number 9f different .cipher . . alph11.beta
. . . i,i the.~.system.
. empl(\yed . ...... . · The


REF ID:A56930

.. 59 -
sequence in which tho vc.rio11s cipher c..lphr...bets ·uro ust;d may_ -or. im.y. nofe_ ~n~e
with et:..ch mos&t~gc; if it does~ this constitutes i:.11 t...dditio~&.l o],.~_mep:t o:f _secrecy •
. ·•

b. To illustrde "'ht.tis mr.:.i:;.nt by.n progre_ssivo syst€oli1J• .simple 1.;xt..mple


Will be given, ~'!Ilploying the obsoletG u. s. Army Ciph~r Disk •. st~rting-with
the disk set so th<.t A·: A (or with wi.y othor pr~c~rrLngod initii:..l setting), the
first letter of th~ muss~ge is enciphered; the rcvolv~ng alpru,bct. is then moved
one step clockwise (or countcrclock\\isel &.nd the second hr~ter is encipht.red,
c.nd so on. · Aftc;r 26 letters ht..ve b<;e;n enciph<;:rcd, the disk hi:.s rcturm.:d to
its initid st{..rting point c-.nd t. st:cond cycle begins {if the- mes_sc..gc is longer
th<...n 26 letters). Thus, the period in this c<..se is 26 h.:tti:;rs. It is obvious
thi.t the displL.cemcnt of --tho revolving disk rru .. y occu.r E'.fter every 2, 3, 4 •••
letters, L.s prco..rr,'t..ng&dJI 'in which cc.se the period increr.stis corrc.spondingly in
length. The displi:..cement mny, howe:iv.:r, be more complic,.ted thi:n this, r.nd rntlY
occur c.fter "' constc..ntly v.:.rying number of letters ru..s been enciphered, v.-h&rc•-
upon pt;riodicity is suppressed. ·...
..\I'
~ .

c. Tino sliding mixed compon~nts mc..y be employed, producing o. set of 26
second(~ry mixed tolph.'.:.bets.

d. · Another vi;;rii.tion is mor£l complic1....ted. Sllppose the corrospondents


dro.w up i:.. set of 100 r{..ndom-mixed cipher o.lpru.bot s, ec;.ch c;.ccoJ!lpr.nied by n
designo.t ing nwnber from 00 to 99, r.nd a. set of numerict..l keys compo.sed of
r:.:ndomized, sequ.ences of rtumb·ers from 00 .to 99 •. Er.ch su.ch ·nµmcricul ke_y is
'desigru...ted by ,c.n iadico.tor of some sort. To encipher n cicss~ge,. ti. key se-
quence is selected und the cryptogrvm is prep~red by met.ns of the ·sequence
of o.lph"-bets indicnt~d by the key sequence. If the mess~e is 100 or 16ss
letters in length, the c:.lpho:.bets do not repec..t; H' it is more thr.n 100 let-
ters long, either the sequ.ence. of o.lphc.bets muy rep'-'l\t or else t:;. novJ sequence
is selected, i;.s preo.rrunged. It is possible to opcrcte the s;'stem by mer..ns
of indicators inserto.d in tho text of the cr;ptogrL?n.

42. Intcrrupttid or vi.rit;.ble-k~-y systems. - In curt~ in of ths foregoing


systems it wi;;.s noted the<t periodicity is entirely £..voided by tho u.se of « key··
which is so long t.l:l::,t it docs not repent itsel:f.; often such c, system is re-.
ferre.d to (.;.$ operc.ting in connect ion •·i th c.n indefinite' infinite' or unlimited
key us oontr~sted with one thr..t oporctcs in connection with n definite, finite,
or limited key. But periodicity.m~y Glso b~ cvoidcd b~ speci~l ?Jlf•nipul~tion
of a limited key. Suverul such methods will bo e:x.ploined below.

43. s~ppr~ssing periodicity by enciphcrment of vuriuble-lcngth groapings


of the pl&in text. - t:i.. A keyword, though limited in length, mr:.y n<:>vertheless
be applied to vc.rie.ble or invc:ri«.bk-lcngth, sections of tho plo.'in taxt. V:hen,
for example, cc<ch letter of the key se1·ves to encipher a. singlG letter of the
plain text, th6 enciphermont is s~id to be invari~ble or fix~d in this respect.
The same is true t:Vcm if a single letter .o.f t.h<> k~y serves to encipher regui&r
sets of letters{ of the pli:..in text; for e:x.r.mple, e.c.ch h:.ttur of the k~y rn.uy ser've
to enc).pher 2, 3, 4 .••• letters of the te:x.t. In these cr~ses periodicity v.ould
be. manifested ·externc.lly by the cz:yptogrc.ms·, .. providing there is a suffici&nt
t.mount of· text to bi:: e:x:umined. But if er"-ch let-ter of th<.: key scrvgs to encipher
irregu.lc.r or vc..ric.ble-lcngth groupings of the pli;.in text, then periodicity <fr,n.:.
not appear except under rnthcr remote contingencies. Suppose, for ox&mplc, that

-~----------------------··---·----······ ··-· . ········-·· ·-·--··


. --·· .. -·--·~- ... -·---··--· - ----··---:----ItEE--.1.l,.,i.D,..;.:;-.1A,..
..~;.i:..'61101J.a.9...,,3-ldQ'------------

- 60..a.

.so simpl~ a ·scheme ..as lotting uach l~ttter ot the key s&rve to. enc;J.ph~r a
complete.. word of'. the te:x:t ie llBC>-d; since words ti.re of irregW.u:r lengths c.nd,
there is little or no rcglll.arity wlu..tcver in the seqllence of words with re-
. spect only: t'o. thc.ir ,ltmgths, periodicity. Cf'Jinot· z...ppei:.r. All ex:r;.mple of. en-
cipherr:10nt will. be'. usuf11l~ ...

b, ln th.a· following. exc..r3Ple the sir:iple ciphor···disk (direct sequence


. eliding ag~inst reversed seq12.encc) is llseA-, with the keyword DEBARIC, to en-
cipher the following mE;.SS~e, u.ccoi'dillg te thfi so:ticmo desQribed &.bovc.
. St11dy it cr:.r~tu.lly. .· :•:·. . ·
. .·. .
Keye. · D E A R K
Plaln.Text: C 0 LL EC T ALL S T ·R A· G;. G L E R S ST 0 P SE N-D "THEM
Ci:gher: · · ll P s S Z :e K ETT J I·K.B V-V Q :X ,K J I H M: L z'N E o B. D G Y
lCoy: D E B
Plain Text:-, o·R WA.RD AT 0 NC E
Cipher I . . y p l.I" H D :M: A.. E L :uozx
.
Cryptograms 11 P S S Z :B K E T T J I K :B V V Q X X: J I H :M: L Z NE 0 RD
GYYPK HDK~E LNOZX
. . .... ..
.!!.• Instead of tinciphtlring c.ccording to m:.turtil. wo-rd. lengths, th,!l irreg-.
ule.r grou.pinge of the. text may be resu.lc..tod. by other agreement a, For e:u.i::iple ,.
su.ppose that it is c.greod thr..t every k:eylette~ will encipher 14 .nw:iber o:(' ·let- ·
tera corresponding to the numeric~l velao of ~he keyletter in the no:rmi~~-u~phL-
bet. The foregoing oxamplu then becomes &s follows: ·

Xoya D. E B i-. R .
Pl~in T6.x.t: C 0 L L ECTJi.L L 5· T R i. G G :LE R 5·5 T o·P t.E N_D TH
Cipher: B P 5 S il.CLET QJ n ARLLGNLZZYDCZNEOYK
Keyi K D.
Plain Text: E K .F 0 R W A R D .A T . 0 N C E
C_tpher1 G Y l!' W '1'. 0 lC T H K R P Q B Z
.. ..
Cryptogrcm: · :B P S .S · J. CL.ETQ JHARL L . . G· !f A Z Z Y D C .Z N E__O. Y·K
GYFWT OXTHK BPQBZ
·!• The foregoing tD:i:cmplt:1 e1:1.plQyed_ ~~v~~~ad·-_ sti.ndLi.:rd; &lph&bets, bat
. _.mixed alphabets of' &ll typ{;is raq readily be used.

· ·. e. :If the kr::.yword· h .short, und the· message long., pcriodichy ·mq cr~ep
. in despite.the irregtil~r groupings in the enciphf:r~nt. ·su.ffi~ie~t evider.ice
· · ·-~ even be obt~ined t.:> l~ad to c. 41sclosu.rc of -the length· of ~.-the key. Bat
· -·if' the key consists of. a long -vJord, or .o-r c. oomp:!.ete pQ.rase. or. sentenec ~ the
text would hll.ve :to be very long in order tht.t eu.fticicnt evidences of __ periodicity
be toun~ to mil.lee-possible the determiDL:.tion of.t~e·length of. the key.
REF ID:A56930

- "61" - ..

. 44• Suppr.eEi°sins p~riodicity by- enci·phf.l'!nont by vti.rit.ble-le.ngth group-


ings ·or the key •. - a·. . In Pi.r·.· 43-b ·pu·ipdicity wis .suppressed by. enciphering
vE.rinble-lungth groiiptngs of thti. toxt; ·in_· tld_s pc..rii.grnph it will be shown how
pc.riodicity r:J/J.y l:e suppres'.s·ed bY: e1tciphe-ring bi v::;:ril:lb1a-l.ength groupings of'
the key. The method con.sists · 1n intarru.pti~ the key •. ·

"h. · GiTen a .ke,Word'., it ccn ·bE.coce c. v~TiE.ble-lc.ngth ktiy by· inte.rrupting


it c.ccording to .~or.iC preiirr1.<.rigud plc.r_i~ so ·th~~ ·it b~comes equivi~lent to :t1. ser-
1ea· of ·keys pf' :d.i;ftc.r-ont l~ngt~s. Thu.a,·· tlia ·single keyword UUPREPJ.:BEDDll.ES may
be expa.nded. to ·'" sequence. ot. irr,egu:iar lcng.t·hs, s11ch :as UNPREP / UNP / UNPREPJ.B /
mn>R 7 I I
UNPREP1.RE UNPREPlaREDN .u ./ uNPRE~· ··etc •. Vt.riou.s schef!les tor indicating
or determining the interruptions mc..:y b·e adopted. For exu:1ple, suppose it cc,y
r.e E>..gr£:ed that the interruption will t&.ke pli..ce irJlnediately after and every t-ime
thii.t the letter R occurs in th.la. plc:in text. The key v,;ould then be interrupted
e.s shown in the following exc.m:plc. · ·· · · ··· · ·· · · ·
. ..
Key: UN P U ~ UNPRE PARED UN PRE UN PRU NP •••
Plain Text: 0 U R' F ·R· 0 N ~LI' ··N~E-S.A B ENOWR RT
E.·P 0 ED •••
c.- It is possible to r.pply an interrupted key to vuriable length group-
ings of' the plain ·t·ext: · Ill: "11:l11strt::t·ing ithie cethod., on. indicator, tl.le lgtter
X, will be i.ris~rte.d ·in "th:e ·p1c..1n tc:xt: to show when the··intcrruption t&.kes place.
The plain text. is enciphe"red by nnttiriil \"/Ord lengths.
o I • • I• I o ' •
.. . .. .. I•"•.

Key: .. U. . 'N: . • · · · · · · · ·U · N P U
Plain Text: ·o:u i(. ? R 0 "N "T x . L ·I N·-E ·s ~RE NOWX REPORTED
d. It is o.lso possible·· to ·interr11l>t tho kay rcgulc.rly, cu"tting it up
into equo.l length secti:lO.S. na, f'or eXuil.ple I y; 1th the keyword EXTDIGUISHER:
m' / ~I / TIN / ING / NGU / GUI· / UIS / ISH / SHE / HER. Each set of tlµ'~e
keylctters 1!1£.Y serve to ~ncipher & set of three plc.in-text lett&rs. But it
is possible to tlakc ct.ch" set of.three keylettcrs cpply to J:10re than three.
plc..in-text letturs, or to irregulGr gr:lupings of pl~in-tcxt letters. For
exi.mple • suppose i:::. nl.1D'1Gr~cr.1 key be · dGri vod from the kcyv•ord:
B X T I N G.U I S H E R
""1•12-10--5-·'1-3-11-6-9:--4--2--li
Let this numerical soq~nc& ~~teroino how r.m~ l~tt~rs will b& enciphered by
each grouping of' the key. The eJa".inple bele>w will illustrc.te {rcvcrs~d stc.nd-
ard ~lph~bets ~re usud):
. . ·
Nucber·e: . l 12. . 10 5
Key: E XTIXTIXTI"X.TI ·TINT INT INT· I!TGIN
Plc.in Text: 0 0 L L E 0 !I' A. L L S ·T R AGGLERSSTO '"p 5 END
Cipher: C J I X T R P X I X P .la. B TOHIEYl.BQUF TV 0 V K
Numbers: 7 3 . 11
Key: N G U N G UN G U I. . U I S U I S U
Plc.in Text: !I'HEKFOR. -Vl"AR Dia.TONCE
Cipher: CJ Z Q .B .B G ·w.. · }{ ~ R- . B I Z G V Q. Q

Cryptogram: CJ IX T RP XIX l!' l. RT C H·I E Yi .B Q U FT V

CVKUZ Q~BGW KURRI ZGVQQ


- 62 - ..

e. Anothur si~lo :.metho.d ·of' prear:rr..l]f;int; th~ interruption of' a. keyword,
'or :of'plnin text is 1;o.' er.iploy the seq\lonce: or {1QD1.be:r;s ·giy~n .. ·~ociuclng_ ~n i~­ bf
comensurate frnction ·to docic&.ls •. : For. ci~.tlpl.e, 1;J.:l.e frfo.Cti~.n .l/'1 _yield~ t~e'.,
sequence 14285714285? ••• This fr~ction ~ ~e rep~ese~ted.~y ~he ln~lQnt9r
letter H sivan c.s the initic..l lette;r ·ot th~ crypt9~~·r.i~.:. .. ·· · ,

45. ·-lfcchllllic~l cryptogrnphs.in which:periodicity is ~voided. - There Gre


·certain cryptographs which opert.te in such £~ r:u:.nni:.r-~ th&t "pid.odlcity is'.~voided
or .suppr&sBtJd. Sone of ther.i will be discuss9d in Section tJ;i:. .I.mane th~m one
· of the most intc.:resting is that invented by $ir Charl£s ~ent.stone in 1867 ~
As c. rule, howev.::r, mcchc.nicul cr7ptogr:..phs, by their very rl6.ture, cnn hnrdly
c.void being cyclic in operntion, thu.s ctl.using pe;i-io.dic.~ty· to be c.xhibited in
the cryptogrG.cis • · · ·· ··

-----------------~~
SIDTION X
REPEI'I'l'IVE, ·sUPERPOSEl>, AllD CCJ1mINED SYSTEMS.

.Par~!aph
Supc.renc iphe ment •• ; • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • .. • • • • • • • • .. • • 46 ·
· · Repetitive monoc.lphabotic su.bstitution systems.•••••••• ! ••• ~--~.••. .". ·· ·: 4~
Combined mononlphabetic wid polyalphub·ctic sub1"3titution syst~ms ! : 48
Repetitive poly~lphc.botic substitution B"Jstons •••••••••••••••••• 49
Repetitive trE..nspllsition systems • • • •• • •• • • • • • •• •.• • • • • • • • • • • • • • • • 50
Combined substitution t.nd tri:;.nsposition systems ••••••••.••• ~··.... 51
46. SuperenciphulT.lf.:nt. - o.. \"/hen, for purposes of .~w;menting the degree
or cryptogr~phic security, the plain toxt of El. rnessuge 1.Uldergocs a·first or.
prim&.ry cnciphcrcient and the· resulting cipher text then··undersces Ii. second .or
secondt.ry ~ricipherment, the system ns n whole is often.rt:f~rred.to as one in-
volving superenciphera;nt. If the two or nore processes c.re; wel"i selected, :the
objective is r...ctually rol4.chi;;d, und the resu.lting· cryptogr~s P,r.cscqt ·Q.:~rel,r.tively
grec.t degree of cryptogr.hphic security; but sor..tit im,es this .is ..n~~. G:Cc~m:Pl."t~hed
and the augr.iented security is of a pu.ruly ~llusory chc.r,Lctt:;r. The riru:.l" crypto-
gr~phic security r:w.y, in f~ct, bo n~ bre~ter in desroe tho.n if' c. single encipher-
ment ht.d been dffoct~·d, c.nd. in.unus\ir.l ~c.:scs, it mcy even be loss then before.

b. It is impossible t·~ describe c.11 the cor:ibin&.t1on~ thnt ·might lie. an-
ployed; only Q. very few typiclll cc..ses cc~ here be trij"t~d, 'CJ:ld these will be
selected with c. vio11 to illu.strc.ting gi:.neral principles. · It is. posEiible to
pass .e. mcssc:.ge thr._ough 2, 3, ••• succeuive processes of su.bstitutio~; or
throush _2, 3, ••• successive procossos ~.r "trc.nspo~iti:m, or: su.bstitution·me.y
be followed by transposition or vice vers~. · ~ exm:i.ple'of ench t~pe Will be
given. ·

c. It will be convenient to c~dopt the s~bol. O to represent the cipher


te:x:t produced by 1.;.ey unspecified prJcess of .. encfpherr.ient. Tho SY!Pbols c 1 , C ,
C!.l!, • • • 1 Will then represent the SUCCCSBiVC··te:x:ts produ.ced by .SU.CCCSsiYe pro~
cesses in superenciphorm~n~. Tho su.bscript l~ttcr .!. or !_m&.y be prefixed to
REF ID:A56930

. . .
,.\
- 63 -
.. . . ..
the . C to indict.te.thc.t a given proceBB is on£i.of Sll.bstitution or or trt:~naposi­
ti~,n. T~u~,-_th_e.. ·a~up&_in.i:. .systc.m whQro a first s11batitution 11.follo:wod'by
~ sucon~. su.bs1i~t11.tio'n"c•.n be r..::prus(,,ntad symbolic•.lly by BC1 ~ sc2. In' a .
siml~ll.r ~ur,· ~Ci'_-:-~ tc2.reprea\Jnts'double trruisposition_. Tho· s~ol sc 1 -+
tC£ m.;;,~ns .·~ht:.t tho ·t·t:;)~ from· r. first procvss of sllbstit11tion Wl®rgoos · trc.ns-
position. ca.a n suc·ond· proc\iBB.
... . . ...
47. Repetitive mono~lph~betic s~bstitution 6yatems. - ~upposo a·mcssi;gc
und~rgoce a primur1 unciph~rment by mc~ns of a single-mixed, nonreciprocal
&lphGb6t, Lnd th~ pri~ry cipher tuxt under~oos c sccond&ry encipharment by
mci;;ns of the's~lll<) or.a. different .mixcd·~lph~~~t. Thu.r&sulting cryptogrcm is
still monoc.lphnbE:.t.ic ·in· chc.r::.ctor,.c.nd.pri:.surit.8.;vi.:;ry little, if' r:.1J1' r~UBl?lenta­
tion in the degree· of socuri1iy-{dopending ilpon·:the•t~~e·: of ·t;lphabe;t umployc:.d).
Heru an dntir6l1 illusory incro~so in sacurity is. involv~d f.nd Elr1 incffectlll'.l
·.complexity is 1ntro4uccd; .the~proo~se zaq·J.ndEtod;b~ rcpot.ted .indo:f'.initQ~Y with-
.. ·a·tlt produciiig the desired t~sult. _Th~s. is b~ce:11.sc the f'.~df.;men1;~1. l!l'-~~c ·~:f.:
monor.lp~:butic .substitution:hc~s ,not ·bce.n .te.k~n .into cons1Q.eJ;'.'L•:t:1o.n..in ,t:tie 9~ . ~
temp~s at su.p~ren~iphemont; .. sc:i;. ~ ··sC 2 ~ ..o.3 ...... , .~.tU.l ·re.ciai~s mqnoGlPh~·:-
betic in ohc.rr.cteir·.. . .: ·. . , : . . · .. · . ·.. ·, . . . . · . . · .. · . .. . . ..;-

. ·4ra •. : ·C~mbin~~-m~~~~1:P~~b~t1~
Md. P<>;l.~~.iphab·l~t.1:c :ciu~st·~t.tit~Qn sy~~.~~~/~
.. E..
If a messr..ga undergoes a prir.ia.r;,r enciphe~n'\: by t.he ;rQpe_at:i-ng~k~y .met.hod, ·~s.ing
stc.nd.a.rd dphc;bet s, c.nd the primc.ry cipher t'e.xt then undergoes e. secondGry ·ttn-
c~phQ:n!l{;;n1; by mouna o~ ~ single-mixGd alphc.b~t, thu degree. o~ cryptogr&phic
se*u.ritt ~~· ~fi:c.rql::~ed)o tiiu aruiio'c%t~rit th~t ·u:waf4ci·.-'be:·1f ·th& o~~f,;:ln..'l~ .~~­
sr.ge had widor~ne the 'fKimo ·prfmLry :anc:i:phorn1erlt · 'fii'.·th socondt:ry··clpnri.bet·li ;r·e-
suit:i.ng·:rrom··.t!id s'.Uci.i.ng ·of c. mixed :prir:iuy. sequ.oJlC·e :agtdli&lt :the ·.noror.l ·:seqli.;incc.
This increc..ae 1n security is not vary·gr~.t. · ·.:· .. / .. ' ·:·· .: . · · ...::·:! : .... · .. ·:<

•.. ·E.,, . T~e .sr.ae .is tz:~ i_f' ·. ~h~ PZ:~!l!~Y ..1~nci.~n:io;t, ~~ r.l0~~¥~~be~~.~ and the:.
s~co~~r-Y. ~n~iphurr.Ent· .. is _.pt;>lyr.ip.h<.:b.o"ti.c ·.b:f.. t,hc .r.io:~hOd C\t.acr~Q9.d. , .J .. . . . .
.. : . .
.c. .
. . . ~ ..
In .genc.rc.1 1
I a'''•
' :'•

... ' . .

. .
• I •" • •

. . . . . .. . . . . . . •. .
•• •I

:'
., •

'
'"

·this c.l&o iii,iplfo.s'."tci ··ot"l1G'r ·tipds at·· polyd'phCLbe-t:i'c· a.rid


• •I• • • o I • •• ' ,• I' ;. •

.. .
• ... 'ol

.
• .t' ' •

oonoc.lphabotie. cocbiru:tione. · Tlie·=1iicro'i.::i:u:i· in aecurity is=·n:ot ·verlr'grt>~f; r.rld is;


.. indeed~ much :1-us~ "t·h.Li.ri thu 'iminitic.t·u·cFsU.Spttc-t. :- · .... · ·· ·~= ·.. ···
·. .... : .·
· ·: 49•· , ~pet.it.iv's pol.yLf.1.Pht:.bli-t-ic. aubatitut=i"CJ.Q. .. systems .. ~ ti.. .If tpc ,prim&ry
. "-no.tphermu-nt .is .b7. ~c.ns of"the .rG~EiC:ting-~oy .l>r.in;~i.P.~e, •1th-stc.ndnrd ~iphf:l.bets,
c.nd the secondt.ry. onciphurmu.nt is e icilur ·!µ .clu.rr:,ctvr, 111 th s1o1lc.r alph£.b6t s,
end a. key of s1oil'2l'. ·length, th~ f 1ni.l ~ryptogrc,r:i prosents no inc roe.so 1il secur-:
1ty c."li &ll. Thu.a, if the ·kdy BODE ·is·wicd"'in the.l>rino.ry oncipherm.oot (Vigc..n~re·
M.ct·hod) and the koy i'GHI is usud in ·the· s:Ocond&.r7 ·enciphermont, the finr.l result·.
is the &C1l?l6' &s though tho key GHI.i hlld beqn ~·-~d :in c. single ertciphe:rment •

.!!..• If mix~d &lphabets Ql'O uoed; c.nd if those of the pri'flr.ry r..nd the soc-
ondc:.?j onciphcrmunt belong to the sr..1:1c sc;ries of secondtlry &lph&bote resulting
from th6 sliding of two pritu.:.ry euqu.enccs r..gninst e~ch other, th~ results ure
similr.r in cht.r~cteir to tt..ose de scribed under Sllbpt.rc.gri:..ph "' abovo: thEly a.re
identicr~l with those tht:.t would bu obtc.ined b7 e.n equive.lent single 1:;nciphcr-
cent by the c..ppropriti.te . secondl.ry i:.lphllbets.

·-- ···--·---- . -----. ··-----·---·------------ ..........___________ ___ ............ ..,


- 64--.

c. for
If ·tho key the secommry enciphercient is of n different lungth
fror.i thut for the pri1;u.;ry enc ipha~r.itiht, the results ~~rE;. hov1ev&r' soue;whi:,t
diffsrent, hi thi.t. thil ·period of ·th~ ·rcsu.ltc..nt cryptogrc:\I'.l: boco~s _the lqc,st .
·~· ..comr:ion multlplti of "th.t:. ·two kt;;y i~ngths. For cxc:uplc, if· the length ot: .the
key for the 'prir.icry onciph..;rr.ii.;;n.t i~ 4, thd for th& s~condnry, 6, ·.the· result
is th..; st,rac e<.s though c. k.::y of 12 e:lenunts hc.d be•... n .:.mployod in c. single
enciph~rrJont. This ccn be:· demonstrc.tud us follows, 11sing the ·keys '4-1~,2.... 3
end 5-2-6-1-4-3:

. 4· l 2 3 4 l 2 3 4 1 2 3 4 l 2 3 4 l 2· 3 4 l 2 314 l 2 3
: . 5 2 6 l 4 3 5 2 6 l 4 3 ·5 2 6 l 4 3 5 2 6 l 4 3 5 2 6 l •••
..
;· . . 9 3 8 4 8 4 7 5 10 2 6 ·6 9 3 8 4 8 4 7· 5 lO 2 6 6. 9 3 8 4 ....
d. The d~gr~c of cryptogrr.phic security "is,· wi t.hout do11bt, in:crcr:sed by·
su.ch C:- method. If the key lengths r..ro properly selected., ·thb.t is, if they pre-
sent no common mu.ltiple l1Jss· th~n t.heir product, tho motho'd.·mii;y give crJrpto- ·.
grams of grant s&cu.ri ty. For oxc.oplt3, two keys thr..t ere 17 ~a· 16 · cha.rr.ct.crs· '
in length would givo u cryptogrL..rn th~t is oquivclont in period to th~t of a
.crJPtogrcm cncipherod once by a koy 17 x 16, or 272 olcccnts in length. The
f:und.a.r.ientel-principlo of en excellent, th9ugh cocplicc.ted printing tclegr&ph
cipher system is this very principle. ·

50. Repotitiv~ trruisposition systems. - Thuse h~vc been doclt with in.·
Section III r.nd n0od no further discussion &t this point. It w~s thore shown
thc.t properly sE.lcctod trLnsposition methods when repetitive in chl.rc.ctc.r c&.n·
produ.co cryptogrc.ms of Vf;ry groc~t socu.rity.

51. Comb~rted substitution r.nd tr~nsposition systems. - These ere im-


po~ant e:i:iough. tp warrnp_t their detailed study, to which the next section is
devcited.: .. Cofubinhttorisor SllbiJt.it11tion ruld trc..nsposition r;iethods cc.n tcke f.iE..ny.
differ\:lnt. ·f~rm:~, ruid .only Cl. few. ~.:x:ample~ ~:n be illU:strr.ted herGin. It ls. ...
possible, of course, to upply substitu'tion first, thun trr.nsposition, or trans-
position :firsj;, thun su.bstitut:J,on·. The most comm.only encountered systems·/how-
ever, are .o·f th~· ~omor type, that is~· sc 1 -~ tc 2 • Flirthermore., it cun· be:··
sts.ted thC:t "as· ii rule prc.cticnble systems in which both procossos are c.o~i"ne_d
iise· methods thc.t :are rel.atively simple in thetiselv~s, but &ro so s~lc9j;~d c.s
to produ.ce.?ry~~o~r~s of grent security us n result of the combinution• To
give &., very rough -c.nulogy, in. certr.in coobin&.tions the effect ·is :mil.ch mori;. them
eqlliv~lGnt to the simple nddition of compl~xities of the order X Lnd Y, giving
! +_Y; it is rJ.ore of the: or~er r.t:,
or .. o~on ·,x2y2 • : · ·-· ~-·
.;:

.....
···I.•
. . ... . ...
REF ID:A56930

- 65 -

SECTION XI.
. . .
cm.mrn~ SUBSTITUTI01~ - T~lSPO~ITIO.i{
' • a
5YS'l'EMS.
• '

Paragraph
1tonoalphe.betic and· po~ralp~ab~tic substitution combined with
transposition •••• ~ •••••••••••••••• ~ ••• ~ •••••••••••••• ~..... 52
Polyliteral substit11tion combined with transposition •• • • •• • • •• •• • • 53
. ; Fra.ctioriating. -.syst.ems ·~: ••••. ~; ••• ~ ••• ·•·• ~-.·.·.·. ~. ~ ••••• ~ ••• ~· •• .; ••••• ~. 54
Comparison of for~g:oing f.racti9nat_ing system With certairi digraphic· ·
systems .•.•••.•...•...••••...•• ~. ~ .••••.•• ~ ••••• e.:.•• -.. ~· ..... ~ •• ·. 55
Fractionating syste~s as· forms of combined substitution ~d trans-
position . •,• .•.••·•...•.•. ~. •.• •.•...• •.• .· •.••.•.. ·•........ ·•..•..• 56
Fractionation and recoinbinat ion within ref_;u.lar or v&.rii..ble grqupings
o·f ·fractional elements .••••••.••••••••••••••••• , • • • • • • • • • • • • • 57
Fractioru;.tion combined with co'lui:inc.r trV:nspo~ition ••• ·•••• ·• • •••: •••·• · 58

52. . Monoalph.&betic and p~iys,lphcibetic sub"stittl.ticin combine-a. Wi~h tr~s-


position. - a. A message mo.y uncic:il".go· simple mc;i·nog,lphl.bE.itic-"su.bstitu.ti'on;'·or
complex. polyalph'-betic substi;tu.t.ion 'i:.:i.d ''.tlie· _rc;s.U:lt;i!ig ··text pt.ssed ~t.~ough ·a
simple trc.nspo sit ion. Obviously, Ii it.her stand&.rd. o·r m.txcd clpht..b't:~s · mt:.y be
omployad for the substitution phr.st:i i.:..nd for the trt.nsposition phtfsc &n::i :one
of the simple vr.riGties of.gGomctric-dosign ~thpds cccy- be applied.
. . : . '•

b. As c.n cxampl.:;, note the follb·wirtg ~irn~le combinc.tion; using the mcssl<.gc
ALL ACTION.~ ~rn:um BEACH ;iµ.~ CEA~ED,....

1st step: sc 1 l~o~oalpl'_l.abc~~c, .by rliix~~ ~fPht'.bct): · ··

Plt..in: A B C D E F G H I J K L M N 0 P. Q R.S T UV W X Y Z
Cipher: T D R A M 0 B N I L P E. Z Y. ~ W V U :· S Q ·x J"'ll G· F C · ;

M~ss~go: AL L AC TI OU A T L A,N D IN G B E .AC H H A S C E A S


Cipher: T E E T R QI X YT Q E T Y" A .. I Y B :o· M T ll N N T ·. S RMT S

l!cssago;. E D
Ciphcrt. M. A

2nd step:
.
·TEETRQIX . (F~r th~ 1~·~-~ript ion;.~-
. .ri;ct~~le·
.. . of dg~1t
. . .. columns.)
.
Y T Q E T Y .A I
YBDMTRNl'l {For the tr~nscription; couiitcrc'.lockWlso roil.ta b·cginning
i:r··5 ii l(T s M A · ··a.t · ·1ot1or ·r1ght· hund ··corner. ) · · · ··
· · · · ·· · · · ....
\'
. .. . ... . ' ..
. , . Cryptogrr.m:- . a ·N: ·I··X I . q,::R T: •E"- E.: T. y y T s ..R: li-T 5 u

Q T B D 11 T R

c. A simple subterfug~· often: c.dopted :betwi;,en correspondents is to -write


thG su.bstitu.tion text b!.;.ckwc,rds to form the find cryptogrim (c; cD.se of simple
reversed writing).
REF.. ID:A56930
············--·----··-··-·--··-----------
···-

- 66 -
d. An extremely simple, ~nd yet off~ctive transposition method {when its
prcst..nco is not suspl~Ctbd), sometimes employed as a preliminary to substitution
is that in which th~ _text Qf a l?iessage .is -first divided into halves, the second
being.placed under the first as in rail-fence writing. Thus:

P o E n o o , T - ·F . 11 - A K . :rr·.,. o-
.R ... C - - .Ji: ...T ·. ·P- · ·R· · •G·••E· · •B• ··R·· ·A·· ·I H.
J •
I • • • ' • • ~ • • • • •

Then encipherment. .by .s:Lmpl.e .monoa1phabet:i:c ·methods ·may ·be effected,· and the~·ci­
pher text ~akenfroni the-two ·separate ·nnes.·· Thus;.if· a standard alphabet one
letter in adv:an.c.e .wer.e •Used,. .the teJE'b -would -be -as ·follows: - · · · ·

Q .. P. •. F. - . .E .. .,P - :P · · .U · • ·G · · ·N · · B · · ·L · · :U · ·P · • · :
.S D' ~- U · Q S P :y- C: s- -B J· 0
• ' • • I .. • • • ' • • • • ' ' • • • , II • II • \ • • • • • ' •

Cryptogram:. - Q P. F. E. P. - . p er G. !{ B .L -u p s D ·p U' ·Q s p: F ·c s :a J 0

-- . _e·. · . A. simple variation of the foregoing method, which is fre·quentl:y effect-


ive: "i~b. :tru.e· digraph~c roothods- of substitu.tion is. to write e2 uncle~ ··e~ ·~d t~~n
enciphel" .the sets of Jwttapo.sed ~letters digra?hically, tEen .the ·se~_s- of ·J_UX-
taposed ~-letters. Thus,·- let the messuge- be- WILL RFJllUBN· AT ONCE~· i~· w~u~d be
written.down as follows:l. -- · - ·

W t R T R A 0 C
I L- E · · U -ir T- · N E- ·· •

Then the following pairs would be enciphe:ed: RTp, ~' QC , I1p, etc. The Wtp,
foregoing message enciphered in this DWJlner by means of ~h5 Pl~fair Square shown
in Fig. 39, for example, yields the following cryptogrnm:

Plain text: YfL RT '"RA. ·oc . IL . EU UT NE


Cipher: VO IR TN LT c~ mi AR RP

_ .Cryptogram: V 0 I R T N L T C Q H N AR R P

f. Naturally the transposition process may involve groups of letters; a


simple type of disarrangement is to reverse the order of tho l~tt6rs in 5~letter
groups.. Or, within 5-letter groups a transposition such as 3-2-1-4-5, or
2-1-5-3-4 (any o:f: li20 different arrangemants) is po.ssible~ ·

-§..• .. Cc;>l~ar transposition methods .·lend themselves especially wel-1 to_ com-
bination with substitu.tion methods. An excellent example will -be' considered
~e:r-
... the next sect ion.
. ... . ,

l
In preparing. the text for encipherment, the clerk mu-st·· bear .in mind that if a
Pl~f'a1r· squ:ar'e is to
be u.Sed no doublets can be enciph~~ed.. -The- me~s~e WE WILL
LE.AVE ••• would be arranged thus:

w x I L x E. v . ;
. ...
•.
x

Yi L-
. -- E
.
L
.. ;
A·_ E • ,I •'Jo •. ' •~ ~ ;,
REF ID:A56930

- 67 -
53. Polylitoral substitution combined with transposition. - a. In
Par. 30-b the essential nature of polyliteral silbstitutfon as aon::tr"ii."te·d. with
monoli ters.l substit11tion WQS. discussed. Polyli terc:i. met.hods'· make "u:Se pol:y- or:
partite alphab~ts in \1hich the cipher equivalents· are ·~ompos'ed o~ two. or· more
parts. This·being the·cnse it is a natural extension· of cryptogrcphic processes
to ~ep&r&te these parts or to distribute them th~oughou.t the c1pher tex:t sc;> that
the components, or, so to· speak, fractional parts ·of the ciphe;r equivalents are
thoroughly disarranged and: distributed· evenly .or··irregularly ·throilghout the text.
Such systems may be called. fractionating systems. ·~

.. 54. Fractionating systems •...;. a. · A simple ·e~ample· Yi ill first b·e sho"&·n.
Let the follovdng bipartit.e· cipher ·alphabet be diawn ttP by assignint nli?ne'rfcal
equivalents from 01 to 26 in mixed sequence to the letters of the no:rma:l sequence,
Th,us: -. .
·· :

A B C D E F G H I J X L M N 0 P Q ~ S T U V W X, Y .. Z
. 0·2. u .06. l.2·13 05. :10 14 09 J.5· 16·17 01 03' 18 19 20 08 21·07' 0.4 22 23 24 25 26
.. '

Each letter is represented by a co~~!JW.tiou of two digits; in preparing the mes-


sage fol' crypto·graphing, .the t\Ve :digits comprising the·· cipher equival~nt. of a
letter are written one below the other, thus:
, ..-
Plain text: 0 ·NE.. P L:A U E· REP ORT ED" L 0 S.T ;

191. 1 Q: l :· ·1· t: l e ·o 6 1 l l 0 0 l 'l. 1 l 2'0


Cipher tg~; e3 9ea7 32 7 8 1 7
8 3 3 ~ 7 ? 3 3 ..
' . :· . . . . :· l . .· ·' .. : .
:By recombining the Sihgle"digits in.pairs, reading from,horizonta+ ~ines, .and
writing down the pa~rs ·in·: unchwlged"numerical forni, ·one obtains t_h.e following:

10

b·., :. "T.he. f"oregolng. ciphe'r' ·text cB.n. i1e ·transmitted in 5-figure groups, or
it can be reconverted into letter.s by one means or another., l:)ut some .diffic~lties
are encountered in' 'th.e iatter ·case becfil,use every one or' 100 different pairs of
digits has t·o be provided tor, thus necessitating a 2-letter substitution, which
would make the cipher text t~ice ~s long as the plain text.
'. ' •' ... =--~ •I I:. I'; • • •

c. In the methods t.o folloT1 presently,, these diftictilties are ayoided by


a simple modifieation.· :: This moilif':i.c·ation consists in the employment of tru~.
polyt'id: cipher alph·abet:s, that: is /p.olypartite- alphabets in which the·. pla:in com-
ponent is the normal seqU:en.ce the: ciphe:r component consists of a seque~cEl. of and
equivalents composed of·ali t~e pe~utations of 2~ 3, 4, ••• symbols .taken.in
definite. groU.J?S~ · _For· eiam~le·~·.. ·a ::bifi~ ·alpha.betl c~.mposed or pe!-mU"\i~tJQ.~s Q!. f'i ve
' , • .· • ~: •I ·, • : ., • .: ,• • • • • • •

l .. . . '. . . ·';I. • . '• . '. ·.. ; ... .. " .. ' . •· . . .


Such an alp,h~be.t s~oulq..:l:>;e..cl.e~:r.ly ,·diffe.rentiated from a. biliteral alphabet·.
In.the lat.te;f"t\ya ·a.r;icLoply two :el,.eznentf! .are employed, in grou.ps· <#..,fives, .·
yielding ·2~, .or ·.3:2 :i>ermutati.o;n.s., .Th~ :Bpi~.era.l Cipner o:r Sir Francis Bacon ·and
the Bau.dot' Alph:a1r~t·. :'p'r .·m()'derri ~pr:i.nt::i'.n'g· .~ele~e.ph. ~ystems are. based upon· alph&bets
that are:·tYI>~c1;1-'J::·ex~les· of _bl:J.j,t~fra;L_ ~a~.p~~·~.~s.. .The d~signatio.µ; d·igra.phic-:alpha-
• .. ·~:will be· appu-~ci):~· ·o:nEi~· ~ w}µ:c,l;i: :the· c·~~~ei:, eqa,!va.le~_ts ar~ compose.d of aq
number of symbols',:.:n~ taken simply 1n grotips.of two, these symbols not being per-
muted in systematic-fashion to produce a complete set or 2n equivelents.
- - - - - - - - - - - - R : E - F - - T J T : :A5693·(J--

.. "1 :;

- 68 -

digits take~··two at·.~·time.:ca.n be·cons'tru.c~ed, yielding a.set of 25 equ.~vale~ts


for a 25-letter alphabet.: (.I and J being usually· cQnsidered. a.s one letter)• A
trifid alphabet· of 21 equivalents can.be. constr11cted.from !!.!_.the permu.ta.tions
of the .digit~ ;l,: .~; 3.,:,taken·three ·at.a·tim.e; an.. extra ch_aracter mu.st, hQweyer,
be added. ta: :represent ·the. 27th element of the alphabet. It is convenient to
represent . th~ varts :~f: ·..& b"ifid. equ.i valent ,by tbe. symbols g~ e.nd 9~, the .piµ_''t s of
a trifid ~qu.ivale.nt, ·PY the. S;','Jllbols .. .9~· and 05, 05 .
• • I • '

d. Polyfid cipher alphabet·s· ·m~ be· systematically-mixed alphabets based


upon key\vords :and keyphra,s~-s ,_ .. For e:KiB.r.lPle, not~ }low the following bifid. alpha-
bet is derived fro;m :the_ keypb>:'C.Se XYLQPHON'~C .BEDLAM·
. . . . .
X Y L 0 P H N I C B E D A M F G K Q R S T U V W Z :
11 12 13 14 15 21 22 23 24 25 31 32 33 34 35 41 42 43 .44 45 51 52 53 54 55

The same pr.ineip.l:e may be ·appli-~d to :trU.id- alphabet.s, · c.111p~oying th~ perm11t~ti?ns
of the three digits, l, 2 and 3, taken in gro~ps of three.
• • ~ :. • '. i • ~ • • '.

e. Note ..the· tol"lowing bifid ;alph.a.b~t and t}le. example 9f .its use i~ enci-
phering a message: , .

A .B C D E F G H· l-J 1 K _L .. M .N .• 0 P., Q . R . S. T . U V Tl X Y Z
12 31 21 32 33 15 25 34 24 35 41 ·ll 13 42 43 44 23 45 22 14 51 52 53 54 55
. •. ' ~ •• ;. ' .! .; - • . ,. • ~

iiEPORT.ED L 0 s· T
2 3 4 4 2.2 3 3 .4:442
:s s·,:s 2 '.3 i :3
.... ;2. 'i ~·5 .2

The bifid elements,. 9~:.a.nd Q~, ~re ,n_ow _reco~bin~d ~orizonta~ly in pairs.an~ the _
pairs are reconverted into letter equivalents of the basic alphabet, which, for
the sake of conv,enie~~e , ..is. her.e. 8.J'range_d .,in tl.1-e form of. a deciphering alphabet:
J -.I,,• o• I • • , ·I , •., • • '•' · ' •o I J •• '• ' ,, • " , , • 1 •

ll 12 13 14 15 21 "22 23 24 25 3f.32 33 34:'.35· ~i ·4.2 43 44 45 51 ·52 53. 54 56


:M A N u p . c· : 'T .. R ' I G :s .. )>.... E. ; it_·. 'iC L . o' ·p . Q. s . v VI y .! x z .
Cryptogram: L H L ~(:tt. QT .E Q ·o ... B' :ii:'"A .E. E" .D n·n "Aw
f. It w·~1~· be· ·note·d that th..ere a.rt:t ).•oqr. bade st.eps involved iri the· fore-.
going-encipherrilen,t.:. (l) ~ tfrocess· of.-.d~co.rnpo'sit"iori, S\lbstftli.tive in character, '
in which each.. e i~ .·~eplace·~ by"~~ b:lpa:rti~.~- ec_.. · co~po.~e~ of two. part~; :e~ and. 'e~.
according to a ~ifid alph&:~et; (2) a process 9f sepaJ"ation, transpo~1t1ve in. ·
Ch!ilracter, in whi.ch,· each Q .J.s ~eparat.ed from the 9~ with vinich it was orig.frially
~ssociated, 13) a process 8r"'recornbination, also "transpositive in" char&.cter·; in
ti1hich each Qc is··combined with a ·9~·with ·wh-ieh· i·t ··was· not ·originally associated-;-
and, finally _(~L..~: p~ocess of recomposition, . subst"itutive in character> in ·which
each new e~e~ cambinat·~on·is·giyen a letter: value according to a bifld·_a.lphabet~·
In the foregoing example· t subparrigraph. e} ,,.- ·the· alphabet ·tor the ..reeompd·Sition was
the same as that'"fd~ the d.eco?ilpbs'i~fon(""th.is·~· ot'·course;··is not an·i~erent ne- .
cessity of •t.he ·system:· ..tlic· d~composition ._a~d."· rocompo!'ition '-alphs.l;>cts -iii~ b~ en-
tirely differen~~·· .iJ:'.~!s.-is ~h.6wz{in.._th.~·exfimple irt·Par. 5~-d• · · .: .,:·:,· ·· · · · · ·
t
• • • I••"••',,•. I
.. • •

.
·••

.
I• ,'• I•• • , • ' •.·· ,· • • •• , , ; ' ...

.: ~ : . .•
.
.... ' ...... "i'" .· t_., - • , ~ .: • : !. • .• •
REF ID:A56930

Cor.iparison of foregoing· fro.ct fonating system with· ce·rtain digra.phic


55.
syst~ms. - a. 'l1he method d1;1scribcd undt)r Purug1·a:rih 54-e cc.n be id:.mtified with · ,,.
some of the-digraphic substitution systems dis:c ll'.ssed in Se.ct ion VII. · : .

b. Tc.ke the inoss.i;;.ge. of Pllr.• ··54-e and let a·..si.ight ni.o.dif.ieatibn ··in t1ie meth-
od ofre~ombining 9~ and 9S
be L1ade~ _Specifica:t.ll, let tr.e first halves ~nd_tP.-e
second halves of the bifid equivalents:·of the pla1n.;..text letters be combil;led~·in
the following manner; using the bif~:d 'alphabet of·Par. 54-e: · · ··

!,{essage: 0 U .E P L A N E R E P'·O R T E n L 0 S T

ON E p. LA NE RE p 0 _R ·.T ED L 0 s .""T
4 l : L 3 ·4::::·H 4 l : L l 3 : N 2 3 : R 4 4 : Q :2 ·2 : T 33:E 44=Q 42:0
2 3 : R 3 '3~::.:E! l 2 : A 3 3 : E 3 3 : E 3 2 :·D · 3 2 : D 3 2 : ~ l 2 : A ·~ 2·: W

Cryptogram: . L R H E L A N E R E . Q. ·D T D E j) QA 0 w
If the cryptogram given in Par. 54-e \~ere split in the middle into two se:ctions,
and the letters takon alternately, tho result ·would be identical v:ith t~at. ob-.
tained in this subparagr1iph. The identification referred to in sdl:rparagraph a
above' is now to be demonstrated in the folloviing subparwaph. -

c. Note the t\Vo-alphabt:t checkerboard sho:-vn in Fig 44 •.. If th~ ~ame mes- .
:.: sage Ts ":now enciphered by ·its inuans, a crypt"ogl'ajn ~'9.~nt.ic~l Wi'.th" that ~~tained:"
..: in su.bpi:ra.graph 55-b will be· obta.inod. Thu.a: ·. · · .: · ·

KANUF
CTR I G
B D E···H- K · 0 N E· P L A I~ B R E P 0 R. T ..E: .D '.. L? 0..$ 'T •.. ..
..
;..
•• ~
L 0 P QS •• • ·.• : •1 ;·: .. . . •.

v ti. xy z Substitution of pairs: ! ;'


. . .:. .......
MCBLV
ATDOVi
i\JREPX
OIIp : LRc; BPp, =HE0.~ LAP - 1:-'c; UEP =NE 0 ;· ~ : REc; etc.
lJ I H Q. Y Cryptogram:
F GK S Z
Pig. 44 L R HE L . AN *R E: etc.

d. In the example in Par. 54-e, the s&me bi£id alphabet was used for the
recomposition as fur the decomposition.·. Instead of 'converting the combined a~e~
elements into letters by meens of the original.bifid alphabet, suppose a second
bifid alphabet specifically drawn up for this recotp.position is at .hand (see Par.
54-f). Thus: · · ·

11
12 =u= A 21 :B
22 -- I
31
32
-- c
=n
41:
42 =N
K 51
52
=v
=wx·-
13;:·.T .23 :! L 33 :F 43 =p 5-3 ,':: .. .
14·.:.o =E
25 - s
.. 24 34 =G 44 =RQ 54::: y"i I '
,.. o o
..;
••

• 15 =11 - 35 =H 45 : 55 =z
.. :;·;."
- 70 -
The encipherment of the message is then as follows:

:Message: 0 ll E PLAllE REPORTED L 0 S !I'.


Alphabet for decomposition Alphabet for recomposition

A: 12
=
ll = 13 11: A 34 =HG
::s31 0 =42 12 u= 35:
c = 21 p =43 13: T 41 : K
D : 32 Q = 44 14 0= 42: N
E: 33 R : 23 15 =I! 43 =p
F: 15
G : 25
=
s 45
T: 22
.il =
::s
22 : I-J
44 =Q
45 : R
H 34 = u =14 23: L 51 =v
I-J: 24 v =51 24 : E 52 =w
K 35 = w: 52 25 =s 53 =x
L : 41
},{ =11 x = 53 31 =c 54 = y
y =54 32 : D 55 =z
z =55 33: F
Encipherment:

O N EP LA NE RE p 0 RT ED L 0 S T
4 l ~ K 3 4 : G 4 l : K l 3 : T 2 3 : L 4 4 =Q 2 2 : I 3 3 : F 4 4 : Q 4 2 : N
~ 3 : L 3 3 : F l 2 : U 3 3 F' = 3 3 : F 3 2 : D 3 2 : D 3 2 : D 1 2 : U 5 2 : W

Cryptogram: K L GF K U T F L F QD I D F D Q. U N W

e. Now encipher the same plain-text message by means of the four-alphabet


checkerboard sho~n in Fig. 45. The results are as follows:

:Message: 0 .N.. E P L A N E R E P 0 R T E :D L 0 S T.

IMA N U F A U T O 11
le TR I G ::SILES
l::SDEHK
LOPQS
CDFGH
KNPQR
li_v'. x y z v .w x y z_
~CKV 1.ICBLV
U I D U \i ·A T D 0 VI
I TLFPXINREPX

I OEGQY UIHQY
M S H R Q F G__ K S~.
!
J'ig. 45
Plain Text: 0 11 E P LA NE RE PO RT ED LO ST
Cipher Pairs: K L G F KU TF LF QD ID FD Q.U NW
Cryptogram: K L G F K UT F L F Q. D I D F D Q. U N 'V/
The results are identical with those obtained Wlder subparagraph~·
REF ID:A56930

- 71 -
f. If the successive letters of the cryptogram of subparagraph b are
enciphered monoalph.al:etice.lly by means of the following alphabet, the results
again ~oincide with those obtained under subparagraph~ and~.

Alpha.bet

_:_c1:i A :B.c· D"E·F G H i-J .i L :MN 0 p QR s ~ u v w x Y.Z


_C2: · U C-B'D.F MSG E· ij KAT NP Q LR l 0 V W X Y Z
Firs:t ·cry}>togr~:: L- R H E L . A· ll E R E QDT D E D QA9 W

Final :cryptogram:- K -LG F K.. U, T FL F Q DI D.F. D Q U ~VI

56. Fractionating system~. as .fo~s of combined substitution and trans-


position.·- In stueying the various types of checkerbo'ard ·substitution ··discU.ssed
in Section VIII, it was not i;i.pparent:, -~d no h~nt was given, t~t these systems
combine both substitution and transposition rmtl1ods int1t a: single method. But
the analysis pre.se:nted in Pl..r.: 55::sh~~- ~learly th~t.there is a ki,nd of trans-
position involved ·in checkerb.o""rd .'~:th9d.s. of c,rypt~gr.a~hing.•. · ·

57. Fr~ctionation and recomb.ination within regu.lar or vt..~iable groupings


of fractional elements._ - a. Th.if! :r,iethod is an .extension or modification .o.f
that illustreted in Par. 54-e. Let the t·ext be written· oti.t in gro11ps of
3, ·4, 5, ·······letters)· as pr6arranged between the correspondents. $uppose .
groupings of five letters are agreed .upon; ··a biffd ·alphabet (that :in Pat. 54:..e)
is ·1.1.se.d for. Subst~tq.:Jii.on, thus: -
.'·

Message: 0 NE "
PL AN ERE p 0 RTE D ~. . d sT
·.4.. 1 ..3 44 1 1 3 2 3 4 4 2 2 3 3 4 4 4 2
.'"2:3-3 3 l 2 3 3 3 3 3 2 3 2 3 2 l 2''$ 2

Then, let the recombina.ti~ns be.effected within the groups, horiz.ontally. Thus,
for the first grollp, the recombinat·i6ns are 41, 34, 4.-St, 33, and 31. The eii.tire
message is as follows:

4i.34.4 11~32~3. -44.22.3 34.44.2

2.33.31 2.33,33 . 3.23.23 2~12.52

Recomposition( using the same bifid alphabet as wns used for the decomposition)
yields the cryptogram:

LHGEB MDDEE QTERR HQTAW


1'. As indicated, other groµ.pings may. be employed. Furthermore, a dif-
ferent b ifid alphabet for the recomposition may be used that was employed for
the origin~l substitution or decomposition. It is also clear that sequences
of variable-length groupings me.y also be employed, as determined by a subsidiary
key.

~---------~-----------------------------------
- 72 -

c. Tr if id. alppab.ets also lend. themselves to these methods. UoiB the


following: e,xrunpl,.~:· ·

Alphabet tcir decomp~sition 'Alpht.bet for recomposition

A: 222 J =312 s : 131 111: I 211 = u 311 = v


.B=
- 322
c ... 121 K = 112
L : 231
T :
u-
1~2·
211.
112
. 113
= K
·= w
212 : N
213 : H
312
:3i3
=
=
J
Z'B
D: 133 M : 323 v= 311 121=c 221 = x ·321 = E
=
E 321 . N: 212 w= 113 122 : T 222 : A 322= :s
= 123 = 333 x= 221 ·123 =·F 223·= y 323= r.t
F
G : 332
0
. : l;' = 233 y = 223 131 =s 231 : L 331= Q.
H: 213 Q.= 331 z= 132 132 =ZA' 232 : R 332 : G
I : lll .R : ~3.?. ? ·= .313. 133 : D 233 = p 333= 0
. . '
:Message: H A S,
I '
A ·I
·I·
~.·P· I,. A -li. ,E .
R'ETURI~~D YET?

'H A S A I ·R .p L A N ERE T. U R 'll E.D Y E·T·?


..
2 2 1.2 l 2 2 2.2 2 3 2 3.1 2
.•
2 2 3~1 ·2: 3 l 3·
;le2 3 _2 .• 1 3.3 3 .2.l 2.3 22.1 3.1 2 3.2 2 2 l
3 2.1 2 l· 2.3.l 2 2· l.'~.l
., 2 l . 2 2·.1 3 3 l 2 3

Cipher T~x~ ·XU R ZA C.. A Y G F.T


• 91,1

Final cryptogram: XUR Z A CAYGF TJ! T :S ~ C :Y F F A D· ·Z B X F

d. Bifid and,· trifid alphabe"t~ may be combined within a single system


with appropriate groupings, but such combinations may be considered as rather
impracticable for military.usage.
. '
58. Fractionation combined with columnar transposition. - a. An ex-
oelle.nt system o.f. combined su.bst.itution-trwisposition that has stood the test
of prnc.t·ical, warti~ us.age,. i-s "ths.t no.w to be -described. Let a 36-character
bipartite alphabet squ.are be drawn up, and a nessage enciphered, as follows:

1
The reason for the regrouping sho~n in the final cryptogram requires a con-
sideration of the fa.ct' that a: tr'ifid ~l·phc.:bet inV'Ohes the use of 27 characters.
Since our alphabet contains but 26 letters, either an extra symbol would h&ve
to be used (which is impracticc.l) or some subterfuge must be ndopted to circum-
vent the difficulty. This hus been done in this ccse by using ZA and ZB to
representtwo of the pennututions in the recomposition clph~bet. In decrypto-
gr~phing, when the clerk encounters thu l(Jtter Z in the text, it must be followed
. eitho_r by A or by .B; according to the c,lphc..bct here used, ZA represents permuta-
tion. 132, llll.d ZB re.presents permutation 313. In order not to introduce a break
. iri ~he regUlation 5-letter· grtmpings or o1pher text~ the final cryptogram is re-
~ouped strictly into fives.
REF ID:A56930
, .•, ..
·'- ...

- 73 -
M 0 N T H S
. '·
V/ H 8 A 1 I 9
- . (Key ~O! ~~ternal alphabet:
I. L c 3 0 u. M :t HAili · C-0Lt1.MBIA HAPPY LAND• ·
N B 2 p y N D ~- ·: Digi1;s, are inser~ed ir.unediately
T 4 E 5 F 6 G after ·each letter from A to J,
A l,le~ 1, -B, _2, etc.)
E 7 J f K·Q R
R s T v v· x .z
'
Message:

ADVANCE PROGRESSIUG SATISFACTORILY OVER 400. PRISONERS AND_ 5 - 75 'MM

GUNS CAPTURED. SECOlQ OBJECTIVE REACHED AT 5:15 P. li • .


Sub stitu.tion:

ii D · V. A.. N . C ·. E . P. R: 0 -~· :i:t , ]; S S I N G S. A . T I S F . '.A" C .


WN NS· Rli WN NH IO· T:O -N:N: ES
. .... . . IT. TS ES TO RM. RtrI VIH UH
'
TS. Ri\I . \lllf YJH
.
RJl.i TT. WN 10 · . ·no
T · o . nr 1 .~ Y · o, v· .E ,· R 4 ~ ~ P .R r s o N •E R s A N D s. ·..
RO ~T ES. WH Th~ NT. lT: Im. TO ~ TM .NN EN NN ll> VlH RM. IT NH TO ~ RH WU NH liS ~: ...

. ~~: ·T;-_ I~ I~~~-·~~: N'~· ~·I~ ~Jl~ J R~· I~ ~ T~ ~~ m~· T~ t~ .!g I~ lf~ I~~-~~:•;~·-·:
• • ' •·• L. 'f. " •I ·••. • ·.:, .: .,.. \ : .•·•

c T I v E R E A c H E D A T 5 i 6. p .·: ll
0


...
· ,:

IO RO WH RN TO. ES TO. WU . IO
. Wli
.
TO.
. ns. VIN. RO TN v;T T?J NN: . IS
. . ~

The_ c1 text. is n~~ i_nscribed in .:a rect·a.ng~e of j>~~:(i~1;~~i.t'.i~d ~~~e:r:>:sli>n8:·~ .:·.: ..

'l':ra..nsposition re~t~~le: (colwnnar~ tas~d.· on ~ey)r.Ait.


.. . .. . . . . ~PY
COLOMB!A .
~) · ·
. . . . ~

H A I L C 0 i.' U M :B . I° A IJ:°· .A P P Y . L : A. It . D ....


. .· ·•
8--l-10-12--G-17-13-20-15--5-11--2--9--3-18-19-21-14--4-16--7
W N N S R N W N N H 1··0·-~·-0·N N E S I T T
S E S T 0 R M R M W H N H T S R M W N R 0
W H R M T T W N I ~ R 0 r· T E S W H I M N
T I T R N T 0 E S T M E N .E N N N E S W H
R .M I T N H T 0 E S R M W N N H N S T N E
l'4 T N ..I •. S. l ,· .S.. .T.. S .. l. _R . l{ . ii. • P. . ).{, ..I .. P. • y: . N. .
N N . ..
R 0 l • H· • ~ . 8· . T· . O· • N- • 0. ~ a. M • tr•• o. . J:, . o.. .I. '.I! ': .N 'H N . . . . A

s I T . lf • M' • ~ • -()' . !1.1' • 'O' • ·r· . Q- • R• • O· • v:· . Ir . R· . N•. T t'. :Q) E . s .:. ";
T o · ·vr lf · r ' o· · vr - M' • T' · t>' · 1-r if . w ·'Jt,.':· :a- v T. ·:N.-: vi·· r·, T ··o·
n N N I. S .. : . . .• .. . .. .. . . . ........ .. •

:: . ···:
....
i. I . '· I • _; : ._ ,0 . ." ; ·, '. .': : • ' ~ :" ~ ; ·. -~ . ·.. . . . .
.
. .. : .~ . ~ . . .. f:i,g .-.. 46.: :·, :.-~ : .. . ~ !. ' .
...... ········-·-·· ·----···--··-··· ·-·-·-----_·---·--··-··-·--·--·---------···----BE~- ID~:~A5~6~93~0-----------~--

- ~4 -
Cryptogram:-

NE HIM T 0 ION OU OEM lil!RSO T .T .. ;E.. :t-fR O·V/ N I Ji


. ....
ISTNN._OWHt:o: - 'T'. ·s-. I. 5 . I
.. ;..
0 R 0 TN NS E :M I ST 0 NH
'• .
EN.NS T· ·W ·s WT R MRS~N THI NW H,T 0 W.N SR T IN

I T WN I HRMRH R 0 NS T lvtRTIH NNIW:M VI OT ST

OWSllH ES'ViTT UNMIS ES N 0 T TR°t'LWN llHETN

RT TH I SE 0 NS ENNlII HRNRS NH I 0 R ONRNE


'.
OTOThl E:i>!WNN 0 INT
- .
Fig. 46 (Cont'd)

b. One of the important advantages of this type of cipher 'is that it


affords acclU"acy in transmissio~, since the t~xt is composed.of a i1mite~ num-
l?er ·qf letters. In fact, fr the horizontal an9. vertical coordinates -Or ~he·- .
cipher square are the same ·1~tters, then"th:e cryptographic teXt is composed'
of permutations of but six different letters,_-.thus _P.iding very materially in
eorr.ec~ .reception.. Indeed,.· it.;.is· even possible to ;reconstrU.Ct comple'tely a
message ..that has· been so badly garbled i'ha.t' oniy halt ot it is present~ .This
c,ipber -system was l.l.sed with considerable success by.,the German A:rroy in 1917-18,
Md '.was known to the Allies ·as the ADFGVJt Cipher·; beQat.ise ·these .were t-he -~et:t;ers
ased as horizontal 'and vertical coordinates of the cipher square~ and 'conse-.
qu.ently the cipher text consist_ed solel~ of these: six ~_etter9.
;; . .. . . ;::.· . . . ; . ' . ''
c. The cipher text of the foregoing message is, of course, twice as long
e.e th~ Ple:in t~xt., _:B11t it can be reduced. to ·:e~~ctli· ;t?:e: ..~.r~-~~-n8<l ~~~~~t;ext- .-
length by combining the distributed or transposed 9c and e~ elements in pairs,
ref~rr.~ ,to. :thf:? ·.original (or a different_) .Polypartit~. ~q1l.9.re,,. .. and r~omp9s_i.ng
the pairs into letters. In this case, the horizontal and vertical coordinates
m11st be ident_ical in order to permit of finding equi;val~nt~ ~or alf, po·ssible
pairs. e ' : I' • ' ' • • ' 4• ' ; •• e • • I '" o ' • ._ ·~ . . . . ., , , , .

------------~------"-
SECTION XII.

CRYPTOGRAPlIS
Para.graph
Preliminary rem.arks • •.• ...............· ........• •• ~ ...... ·..•· .. ~ :..••. -~.-•. 59
The Wheat stone Cipher •••••••••••• ·•••••• • •• ;. •• •. -e·•••.•• ~ ~ ·• ~... •.• ...... ' ·so
The Jefferson Ciphel' .-~ ............ ~ ... ~ ...... ~·- •• ~.-•• ~ ............. :•••.•• ·61
The U. s. Army Cipher ·Device 7 IJ!ype·M-94 •••-.................;••• -• ••.•• · :62
: ... ..
59. Pr.eHminary ·remarks • . .:.: The cipher· systems· ·aescribed in the preceding ..
sections by no means exhaust the catego~y 1 of complex systems, b11t it is im-
possible to describe them all. Furthermore, each one presents innwnerable pos-
REF ID:A56930

- 75 -
I • • • ("• • ' : : : •: o 0 : J I

si"rlil.i ties for me Ufication in minot ·respect.a, and for combination w1 th other
mst:1l"d.s." In the paragraphs to followt .the princ.ipl.es upon. which ciertain of the
~n~re si:tri:>le mechanica:l crfptographs have ·been ba'sed will .?e .descri~·ad. :

. 60. The Whea~_s.tone. ·cipher. - !:· ·The .device is a 11 ttle. more than four • • ' • ' I

i11cl1es in diameter,·. · ·· ;
and. consist· a 'Jf a . ·.
dial with two ..·h~n.ds,
..
as s·.10,m in Fi.~~ 47. . ·
The d.ial is c<..:n~osed · ·'
of ~wo ·.~nC:e-pd~1p.011t ...
circ~ e_t}., o_i. _1.ett~rs.. ..
. In the- .0,uter:.cird~- ..... ·.
.·._t":he i.~i:i~rs _pro'r~ss ····· ··., : . · ·· ·
, ,.. clockwise .. . .in no·rme.l
).. . .
·;: ·.~Ph~'"!l~t1c s~guence,
. .. b~: there is en elC,tra
. .' ·;c:ha.rB.ctei- between.:··the·
.. ·; ·.)~ .and t~~; A, . ~i~. a
..total of 27. ~haracters,
. : . : S~me of .if!~· sj>~e.s· also .. .
have digits inscribed ... ·
· :· ·. ¥n'..the~, for. encipher-, , ·. · .
ing numbers . In the ..
i'1ner circie the letters
are arranged in mixed
alphabetic seque~~e and .
are inscribed either on
a. 81:l;~face which :,e.e~ tsi. i.::
of eras~re, or on a de-
tachable cardboa.rci cir-
cl~ which can be removed
.·a:n:a ..replaced by another
.oi.~cie bearing a differ-
' ent sequence. In Fig. 47
this inner sequence is a Fig~ 47
systematically-mixed se- ,
quence derived from the keyword FBA.NCE, as follows:

1 2 3 4 5 6
F R A :N' c E
·B D G H I J
1C L . 'M 0 p Q
.. .. s T u v wx
y z
F B K s y R D L T z A G 'M u N it 0 v c ·1 p \V E J Q x
. : -~-·- . :B;. ::·.i'h~; t~~ b.~~s::ar~:·P·ivo~~~ .. ~~~c~~~r~cai.1~. _·al:'. a::r.e·:=the ·};lour and ~1nute
.ha."'lds.of a clock•. Now, in a·cloek, .tlie.mi~ute hand mak~s $complete revolution.
·.whiie: th~ hour lJ,anQ_ .makes: oiiJ.y lll~· o:(a CO~~ete ."revolu~t'?n; the act~OD in the

. - ·····--. · - - • . -·····• ................... - .. •·r· . . • . . . -----· . ........ . . - .. .


----··-------~-----RE.,.._......cF=-'=ID=-: AS==-=6-=-9-=3-=-0---~-

- 76 -
case of this device, ho•.11ever, is somewhat different. The short hand is free to
·move independently of the: long one, although the. motion of the latter affects
the· former. Since the outer circle has 27 spaces·::an.d the inner one only 26, by
a simple mechanical coritrivanoe ea.ch complet~ revoiution of the long hand causes
the short.h.BJ:ld to make.l-1/26 revolutions, thus causing the short hand to point
one place·in'advance of where it·polnted at the end of the preceding revolu-
tion of the long hand. For example, when the long hand.is over B of the outer
circle and the short hand points to R of the inner circle, if the long hand is
_pushed clockwise arowid the dial, making a complete revol11tion, the short hand
will.-· also .mS.ke
. . ·a
.
complete
.
revolution clock\lise plus one space, thus pointing to D•
_. · · E_• To ·enciph~r. a r.i~s~e, th~ long hand 8lld the short hand are set to pre-
arranged initial positions, "I~ is usu.al to agree that the plain-text letters
will be sough* XBX~lXU:iCX«lifn«XUllX100£X~XO:UXBQ'ilC~XO«
IEiUi~WfDDUUIX'i'iWOOCIKil:Xiil'IUl««Jcin the outer circle of letters, their cipher
·equivalents in the inner circle; and that the long hand is invariably to be moved
in the same direction,.usually clocb'1ise. Suppose the message to be enciphered
is SEND .AMMUNITION FOBWABD. The long hand is moved clockWise witil it is direct-
1~ O"{er Son the outer sequence. The letter to which the short:hand points is
•:
~. .. . . the cipher equivalent of sand is.written down. Then the long hand is moved
clockwis~ to a position over B• the letter to which ·tn:e short ha.rid ;points is
i:.- , ...
·'... noted and·written down. •When a double letter occurs in-the plain·text, as in
·::.·
·.·
the case of the double u·' of .AMMulhTION, some infrequffiltly used letter, such as
Q,, must be s11bstituted for the ·second occurrence of' ·t-he letter. To decipher a
i_nessage, the hands are· returned.to -their initial prearranged positions, and then
the long hand is moved clockwis~ until the short hand points to the first cipher
·. ~
lett~r; trui long hand is. then directly over the plain-text letter. The process
is contin11e4 unt~l all the +etters have been deciphered.
; .
d. A-.con~ideration
or· the foregoing details shows that the encipherment
of a message .depends upon· a combination of the following variab:es:
(l) The sequence of letters in the outer circle. In the case ju.st
considered, this sequence must be regarded as a known sequence,
since -it consists merely of the normal alphabet plus one char-
acter.
(2) The sequence of letters in the inner circle•

(3) The initial juxtaposition of the two sequences.

(4) The Gxact composition of the text to be enciphered, since this


will detennine the number of revolutions of the long hand re-
quired to encipher a given nuiaber of letters of the message.
e. It is ~vious that if the outer alp~bet is ma.de a mixed alphabet, as
well as the inner, both·being different, the cryptograms will be made more se-
cure a_.gainst crypta.nalys is.

r. The s&111e results as are obtained by using the device can be obtained
by u.STng sliding strips or··paper;- providing the ·operator will bear in mind that
~very t_im~ a_ eP. on the p_lain compon~~t- is- sit'uated:_to ·the·-iert of· ·the preceding
i: · 9P' he· must ·displace the ·cipher ccmp<>lient- :o.ne interval to the left-, if the cor-
REF ID:A56930
"" .
- II -

respqnde~t~ have agreed upon a clockwise movement of the long hand• or to the
right, if they have agreed upon .a.. coun:terclock:wi !iJC moveme.nt .. of ,~he. long hand~

61.. The Jefferson Cipher. - .. a. Credit for the invention of the cipher
system and device now to- be described belong~ to Thomas Jefferson1 , the original
inventor, al though it was independently invented ~any years lat·er (1891) by a
French cryptographer, Commandant Bazeries, and still later ( 1914) by Captain
Parker Hitt, u. s. Army· {now Coionel, .. U. s. Army, Ret.) • .Because it was first
described in print (19ql)·by Bazeries, the·prinQiple upon which the cipher sys-
tem is based is usually referred to in the literature as the Bazeries principle;
for the sake of historical· ricouracy, hov1eyer, it is herein called the Jefferson
principle. ..

b. The basis of t·his princ"iple is the use o·f· a set of 20 {or more, if de-
siredT mixed alphabets arranged in a se.qu.ence that ·can. readily b".1,J?P~ged; these
can be used in the enciphennent of a whole set of 20 letters with one and the
same displacement of the alphabets. Successive encipherments are accomplished
with different displacements of the e.lphabets. · · · ·

C• \7hereas Jeffer·son contemplated a devi.ce using a totc.l of 3(; different


alphabets ·mounted on r·evolvable disks,· the one: Bazeries desc;ribed· uaed only .20
alphabets mounted in the same manner. ·

62. The u. S. Army Cipher Device, Type l!-94 •. -.. This cryptograph is ba.sed
upon the Jefferson principle, using 25 mixed alphabe.t.s on cipher disks. I~i tl,le
follovi ing sect ion the latest desor iption of the device and its method o t: u~e .i's
the same as that contained in Vol. IV of lJ. s. :Arrey. :Ba.sic Field :n~anuai.

SECTION XIII

µ •. s: ARMY CIPHER DEVICE, 'TYPE 1.:-94


.. . ... Paragraph
Purpose- and:dist~ibu.tion. 11 •.•••f'••••.•.••.•••••11•.••.••••••··~···•••tt .. •• 63
General de script· io.z:i, .•-. ••..• ••••.• •• :••••••••••••• ,. ~ •••.• ••• ,.... .• • .• • •.• • 64
Necessity fqr key ~d providirig for changes·therein ............ ~ 65
Detailed instructions for setting the device to a pre~etermined
key ••••••••·••••··~-··.·.·~!'.•"·~~,.,·•••••••••••~·····••11•··~· 66
Cryptographing !J.. message ..• ••• ~.• •• !'.• • • !' • • • • • • • ~·· • • • • • , . . . . . . . . . . . . . . . 67
Cryptographing abbreviations, punctuation signs, and numbers .•• ,... 68
Decrypto-graphing a message . .!' • • • !' • • • • • • • , , • • • • • • • • • • ~..... •.• • • • • • • 69
Prece.ut ion_. ......• ~ -~ ••.••• •-• .• ••••••• •.• .• ••••••• ., .••• ,. • • • • • • • • • • • • • • • • • ?O

63. Purpose and distribution. - Cipher device type M-94 is a crypto-.


graphic. instrument that is an item of equipment issued by the Signa~. Corps
to all message centers as one of the authorized meW'l.s for secret~.cemmw;iica­
tion•. It is also an item of equipment possessed by all Naval unit~: ~!i sta-
tions, including those. of the Uarine Corp~,· and con be employed in certain
classes of secret intercommunication bet\~·een the Arrrr:J and the Navy when spe-
cific arrangements therefor .have been made by the appropriate commanders.
1 John M:. I.ianly, Pll,.D., formerly Captain, I.Ulitary Intelligence Division, Q'.$.A.,
discovered, in 1922, a description of the device among.Jefferson's Papers in
the Library ~f Congress (Vol. 232,·Item 41575, Jefferson's Papers).
78 - .
. .
64; · General description. - a • The device is made of aluminum alloy and
.~o~;8:tsts pf the: :following_ part:s:
· ...... (i} A central sha.f"j;, .t.he left ·end of .which terminates with a
. I _proj_ect"ing should.er, the right end ot whi~h· fs thr~a.ded;· . .'' . .
• ' ·I • • ' I • '

(2) A set of 25 alphabet· dlsks,·' en the ri~ of. each .'o.f :Which .
tii..ere ·is stamped a diffe~ent, c,omp;Lete.l! .di_sarrang~d &lphabe~;

( 5) A guide-rule· d'isk', cons'istl~ -~f a blank' or. wile'ttered~.


disk from which there projects a guide rule; ··

· ('4). Aretaining plat~:'· co.risis~i~: of a thin !lisk u~bn .one


surface of which is stamped the name and . type number of .
the. .·device;..
;

(5J A knurled thumb nut.

b• F.ach disk h~s a hole .at the cent~r suitable for mounting it upon the
·centrai shaft, upon which the disk can be revolved forward or backward; The
left face of each alphabet disk is proviQ.ed with a circle of 26 eqQidistant
slots; the right face is cupped, and carries at· one point on the inside rim
o~ thi~ cup a smal~ projecting lug. The guide-rule disk also carries such a
lug. Vlh!3n the _disks .. ip::e assembled upon the shaft, the lug· on'·each disk en-
gages with one .of :the . ·slo1!s on the adjacent disk on the right and. t_hus the
disks can ~e hela ·1n engagement ·in any desired relative positions by screwing
down the· knurled. -thumb nu.t against the retain'ing plate., which is inserted bet-
ween the last alphabet disk and the nut.

!!_• When the thumb nut and ~h~ retaining plate are removed and the alpha-
bet disks ~re taken off the shaft~ it will.be noted that each alphabet is
stamped on its inside or cup surfac~ with an identifying symbol consisting of
a number that is above the central hole and a· letter that' is below it. The
numbers run from 1 to 25, inclu.sive, the letters from B to Z, inclusive. These
symbols are employed.to ·designate·~he seqaenee·in·which the alphabet disks are
to be assembled·upon the·shaft in· cryptographing or·aecryptographing messages,
as described in P8:ragr~).~'"66 below. Either symbol· may be used for this pur.;..
Pole (as prearranged) btl.!fr for the pr·esent only the numerical identifying· symbols
will be so u.sed. ·"" · • · · · ' · · · · · · · · · ··· • .· · ·

65. Necessity for key and provid:i.ng for changes therein.· ~ a. :Messages
cryptographed ·by ~the ··same sequence of ·alphabet ·disks can remain secure agairtn
solution by a well-organized and··efficient ·eneD\,V ·cl"yptanalytio ·seotion·for
only a relatively short time. It is impossible to state exactly how long,
becatise solution depends upori a number· of variable factors; a conservative
estimo.te would place the minimum at s:i.x hours,- the maximum at·tw(' or three.
~s. For this reason 'ft· is necessary to chlirige the sequence from time to
time, and the :method for determining or :i:ndic'ating the new sequence -mwit be
agreed 11pon in advance and thoroughly Understood by ·&ll who ·are to use -the
instrilment. · · ·· ~ · :

. ·b·. "'The seq\lenoe in which 'the .. alphabet disks are assembled upon the shaft
. coris~it,11tes t.he ~ in this ciph~r system.: 'li.h~n ·a cha~ in .key. is to talc~ place,
REF ID:A56930

eXS:ctly what the new key ~ill be and :the exact. moment that it. is ~o supersede
the old k"ey will be determined by the proper commander ancf villl. be coinmunice.ted
in signal operation instructions.

66. · Detailed instru.ctions for setting. the .. device to a predetermined--···


key. - !.•· The method prescrib~d herein 1s based upon a keyword-or keyphrase
from whi~h the sequence of' nwnbers constituting the key f'or assembling the .
alphabe' disks can be obtained by following a simple. standardized procedure.
The r~as·on f'or employing such a .procedlll"e ,-is that it makes it possible to
deriiie~' at will. a relat·ively long sequ.~~c~ numbers (which would be dif- ·of
ficiJ.lt ·to remember) from a word. o.r phr.a.s_e .. {wh:i;ch is easy to remember) and
thu.s eliminates the necessity of carrying the ·key in written f'orm upon the
person~ It 18 this basie keytior-d ·o.r keyphrase \":hich is communicated .through-
out the conrnand in signal ope:Pat1·0.n ~nst.ru.ot~ons. The exact method of deriving
the.numerical key s~q__qence from the keyword or keyphrase is given step· by step
in th¢ f'ollow.ing s~Pa:r_agra:~~· · · · · · ·· · .·, . .

b.. .. ·... Assw11£L.t.~t the k.e)rphrase so communicated is CHINESE LAUNDRY-. · The


following are the detaiied steps to pe followed in deriving the numeri~al key
sequ.eriCe:··;, ;:·: ..

ti) A ·set of rows of cross-sectf.~n squares, 25 .squares .iri each row.


is prepared. '{Prepared sheets of i ~qua.res are su.itable.)

{2:) In the top row ·t:he series o~ numbers 1. 2. 3, ••• 25 are inserted.
Thus: . . ..
. . ...
~

1 ·2 3 4 5 6 7 . fl 9 lO ll 12 13 14 15 16 l,.7 l,8 19 20 21' 22 23 24 25


.. .. ' . ... , . ..

the ~~ber:· i~~--t~~ ·~w;c.essive letters of the key-


. : {3') B'eginning• under:
phra11~a.re written in the. second ~o.w pi'. s_quare~, under the su.ccessive
numbers. · Thu.s: ·• · ·

l ·2 3· 4 5 6 7 B g. 10. 11 12 13. 14 15 16 17 18 19 20 21 22· 23 24 25


c· ·.H I· N ·E s E L A,· U N D R y
' .
..

{4) The keyphraee is extend~d by repetit;ion. ~til ·the!e is a .letter


under the nwnber 25. making a key sequence of 25 letters. Thu.es

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
c H. I N E s E L A u N D R y c H I N E s E L A u Ii
... . ·

{5) The letters of' ·the ·key '$equence are now to be. nwnbered.-.se;ially
from left to right in "8.ccordance-wrth t·he relative ·position that .. E!ach.
letter oc·cupies in the ·ordinary. alp~)?et. . Since the letter. A comes fir st
in the ordinary alphabet• and since th~s letter QCClll"S t~ice ~i;i t~ 11-
. ' . .·. . ~ .' . .· .:.: .. ..

a
1 If the; uy:co~sists o.t.'· word o~ phrase·. containing more than 25··.1etters,
those after the 25th: letter are· nie)·.ely. 01nitfa~d. ··' · : ·· ·-' .... ~- ·
. . • .. . . '.:: :· 'l • . :.
- 80 -

lustrative key sequence, the number l is written under the first appear-
ance of A 1n this sequence, and the number 2 is· written wider its second
appearance. Thus:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 -22 23 24 25
0. H I N E s E L A u N D R y G H I N E s E L A u N'
l ·,.,, 2
\

(6) The next letter in the ordinary alphabet is B. The key sequence
.is carefully exa.mine.d to see if it contain~ the letter B. Since this let-
ter does not appear in the ill11strat.ive key· sequence, the latter is ex-
amined to see if it contains the letter c. This letter occurs twice in
.~ ,the illustrative key ~q11ence and the first C, therefore, is assigned the
·· number 3, the second C, the ·number 4. Thus:

l 2 3 4 .5 6 7 a 9 10 11 12 13 14 15 16 17 18 19 .20 21 22 23 24 25
c H I N E s E L A u N D R y c H I N E s E L A u N
3 l 4 2
. . .
(7) The next letter in the ordinary alphabet is D, which, being pres-
ent in the key sequence, .is assigned the ne:x:t number, pnd st> on. Thu.s,
the proce·ss. is contin~d uhtil each letter has been assigned a number.
The work mu.st:- be done carefully so as not to overlook a single letter.
If an error is made in the early stages of the work, it necessitates
starting ·afre.sh •.. The operator should be especially careful vdth the let-
ters which 1Dlmed1ately follow one another in.the ordinary alphabet bu.tare
present in the key sequence in reversed order, su.ch as ED, FE, OD, and so
. on• It ·is. easy to make a mistake in such cases and to assign these le_t-
ters __riumb~~~ -~in-~ _seq~nce that is the reverse of what it should be.·

· {S) When the numbering process has been completed,· and if the work
has·· been correctly performed, it will· be found that every letter of the
key sequence has a number under it, and that the greatest number that
appears is 25. If this is not the case, it is an immediate signal that
an error has been made• It can not, however, be assumed that so long
as every letter has a number under it, with.the greatest number 25, this
is immediate and. concl11sive proof of accuracy in the work. ·The oper.ator
ihould invariably check his work; better yet, if two clerks are available
each one should derive the numerical key independently and the final re-
l'U.lts checked by comparison.

(9) The keyphrase selected as an· example in the foregoing description


yields the following numerical keya

l 2 3 4 5 s 7 8 9 10 ll 12 13 14 15 16 17 18 1.9 20 21 22 23 24 25
c H I N :s s E L A u N D R y c H I N E s E L A u l'i
3 10 12 16 6 21 7 14 l 23 17 5 20 25 4 11 13 18 a 22 9 15 2 24 19

( 10) It is this !iJequence of numbers which indicates the order in which


the successive alphabet disks are tQ be assembled upon the shaft from left
to right. Thus, according to the foregoing key sequence, alphabet disk
· No. 3 comes first, that is fmrnediat-ely to the right of the guide-rule disk;
alphabet disk Iio. 10 comes next·, ·ari.d' so on. Alphabet disk No. 19 is the
last in this part icu.lar key·, e.ild after 1t has been placed on the shaft '
REF ID:A56930

-· 81 -
·the ·retaining plate· an.d thumb nut are added and the latter. screwed down
,a dhtance·:sUf'ficient to. keep .t~e ass~bl~. together and y_e:t;"perm:it of ~e­
. volving· individllal disks freely upon the Shaft •. The instrfunent is· now·
. reaay: for u·se in eijoher cryptographing
. . . . .
'dec'ryptographini'1nessage·a •.. ·.
. . . . . ·.. : : '
or'
67. · Cryptograi)hing a message. - Suppose the following message .b ·to.· be
ell;c'iph;ere:d with the key derived in the preceding paragraph: .

GO 3RD INF

K4'Y~ JU&.r REACHED EAST;ERll EDGE OF WOODS .ALOlfG · 552-592. .


. ''

iio.AJ?.•:.· .Vvl:t1· REliAIN IN OBSERVAT"iON.


. .. . ......
.
CO 2D BN

a. · · ':l'he message is written dc\-:in on the work sheet undern.ea:th ·the key in
lines-of 25 ietters each •.. Space is left under each line for·the insertion:of
cipher letters. {for p4qcedU.re in connection with abbrevia.t·ions and .n~bers
appearing in the text of messages, see Paragraph· ·sa below~>. Thus:

1 2 6 3 4 5 7 8 9 10 l l 12 13 14' 15 16 17 18' 19'20 21 .22 2~. 24 25


c H E .... I N C'
E L A u N ·.:n
'R y ·c II. I "l{ ·E s E I.' A u ··N
3 10 12 16 .6· 2J. 7 14 1 23 17 0r.:.· 20 25 4 11 13 18 8 22 ·9 '15 ..2. 24 ·19
..
c 0 T H I R N F ·H ,A .v E J ·.U. s T R E A ·c . ij ·E · ]
.,
..
D I
. ~ .. , ..
..
•'· ..
.
. ..
'•
.

E A s T E R N E D G E 0 F v;.. 0 0 D s A ·1 0 'lf ·G· Jf ... "!


.•··
.. ... ...
...
'

. .
v.. E :i
.. -
...
:r v
'•

E ··T :w :o
"
'
.. D A
"

·.~
.....
.

H".
,
., I
....
v E .. N
..
I
.....
~

Ii . .E ·-,T w 0 li
: . I : ·-· ..
- '' ~~.·
..... ... .. .
0 A D w I L· L ·.B ;-·E . ){ A '.I N I .N 0 B ~. J;: R v ·.A T I 0
'' .. ..
'" ...
N c 0 s E c 0 N D ~ N ..
''
·. ...
.. .. '

b. By revolving"th~ ctisks upon the shaft, one by ·one, the first 25 let-
ters of the message are.aligned form"a..continuous horizontal row of letters to
reading f~Qm left, to right. a+ong ~he out~ide of the cylinder. The guide-J:ule
·will be found very convenient in marking the row upon which the letters.are
being aligned• ~h"lls :r~+·~e.ving ttu( ~yes of wme~essary ~train and reducing the
cha.nee of .making er;ro~s~, Afte.r S:U 25 letters ·have been.aligne·d, the asf.!embly
is lockt;td. iP.- p9si t·io~. so thS.t-_ no. disk can become displaeed acciden:t·~lly, 111
further manipulatio~·.· _o.f. t'l:,ie. cyii;l~er.. The row.. '6£ letter·s·.. 1s iminecliately check:..
ed to make su.re that no disp'iacement has· occurr·ea among· the·'f'irst few disks
while manipulating the last few.
·······-····-·-··············--···--·-···-···------------"Cc~F----rn~_'l'l._c,e.n ~o
~~ ----:a:D~JO

- A2 -

. !!.• The outside of the cylinder _now pres~q.1i~ a series-.:or 26 r_o1ve cf let-
ters, of which 24 r"ws.,µ-e f,u.lly visible,. the other.two being··hidden or par-
.tially oY>scu~~d blr. the. guide-rllle'. ·'·One· ot t}:le 24- vis;Lble. rows: is· the pla.in-
text rC:>W~~hat. has .just been. set ·\lp,··and the othe~. 23.rows a.re cipher..;text rows
a.rJl ·one of which may.be selected to represent the plain-text row. On~_of these
cipher;..t·ext row.a 1s selected at random and the let.tars composing· thie· row are
written unde:i-neath th~ ro:w .or plain-text let.te;rs t~~ work sheet~ ' Th11s, -on
sU.ppbsi:ng· the· row l:>eginning LYEUJ .., .·., has been selected, the first cipher
line will read as follows:

l 25 4 .5 6 7 8 9 10 11 12 13 14 15 16 'J. 'l ·16 19 20 21 22 23 24 25


c H I. N, .E .s E L A u N D R y c H I n E s E L A u E
3 10 12 16' 6 21 7 14 1 23 17 5 20 25 4 11 13, 18 a :22 .9 .15 2 24 19
c 0 T H I R D r N F H A v E J u s T R E A 0 H E D
L y ·E u J D J N y .. P Q B F y 11 E c N H p F A G p G

It is ·not· necessary to mii.ke any ·record on th~ work sheet as ··to which ciirher-text
row {·(a.bove -oi: below··the plain.;.;text row) .was eelected, nor is it nect;1esary to .
irldicate it: -~n any ·manner whatever in the· cipl:ler message. · '. .~

: !• . Th,~~.tnl.Jtl\b ·nut is' loosened, bu.t not removed :r~om .. the .shaf:t;.'. .. ~he_ next
25 lette.rs. of;' the ·me~.lil8f;e ..are •l.igned; the t·hiJ.inb nut sere.wed down ag~inst the
reta. ~ :p·rate·~· the '"ie.t.ters in !thf:1 al.ignment are checke~h anl;l. again aq one ..
of the ~3 vis~bl,e 'ci}>~~r-text. J;'QWS~ excep~ ~he ·one ·u·sed to encipher .the· t;1rst
line,-:l·s. _selected ·at. •r~~m ·ror the cipher text. The letters. in the l'.Ciw s.e....
lect~q ar·e· wt-f~ten down Under· the second lirie .~ .. pl:a.fn..;text Iettei:s ·op the .
work '~heet.· · Thu.s,;··s11p'poslng tire'. row beginni.ng··KZBYJ · ••• , was ·selected,, the
work· $.eat· .nc;;w appears; a.a···tolio'lis; : ·.· ,.
. .. ·•.. ... ' '
. . .
.• ..... .
. ·,.
..
l . 2. . 3· -4- s 6 7 a ·9 10 11 J.2. 13 14 15 :i,6 ·:t7· 18 19 20 21 22 25 24- Z!:i
c ... .R .: I . . -H- E .5.. E L A u N..••D.. .. R y . O· H ·::i :N -E s .E ··t .. A U. ',N
3 :lp. J.2 16 6 ·~·l ··:? IA. 'l -~3 l~ :5 20 25 4 ·i·l- 15' ·i-e, "9 ,22· g 15 .·.2 ·24 19
s .T R E
..
0 ·o T H I B D. .I. Ji ,.F H ·A. v ·E J u A .o :H E D
y· E ·u. D J N ._y ... i' . ·Q. B F I N · . E c .N .H .P p
L
.. . J
,; .. .. ··"
F A ·_G·
.. .. .
G

E A. s T E .R .N E D .G E ·O F VJ 0 '.Q .. I) s .. 4 .·L 0 ~ G F ·1
x z· B Y' 'J. .I A. .. H N..
.. s R A ;·N D J ),[ ..E p . ~- ·. l R .J. T -·s .-N

.e·. This proce·s.s ~e.. conti~-ued in· sitnilEi.l' m&njier w:ith._the third. and .four~h·
lines-of· the: plain,;,.tex~ message .. -It should neve·r .lie a. practice t.o "favpr", made
truit is, -frequeritll. to
select a· pau-ticuliµ- eipher~text row above or below !the
plain-:tex'!;··row. As. irregular a se"l.eetion ~~-possible S'hoald be m~de," ~:id· the
selection. of the cipher-text· row immediately above the· plain-t'ext row or .1mme-
diate.l,7_ ~ei.o~ :\!he lo~e'i·· edge ·of the· guide· r~lf3: should.be· avoided.· Suppa.sing
these ins~r~~t·ions to 'have beeri· fQl;Lowed and that :there has· been sel~i:rted for
"'he cipher~text row i'-epresent:ing·'the third pla.in~text·· Une ·of the message .the
row b.eglnni:ng ·RAvw •'". ,-· and $or ·that representing ·-the;fourth 'line, th~ :one
begi.ruiing..P~SY ••.•.,.:the. mes:sage _npw stands. as. -foll~ws1 " . · · ·
.. . ··.....
.
··-· ... ·

.
. ' .. ..
:·~· . . ....
'\
- .
REF ID:A56930

- 83 ~

.. ..
1 2
3 4 5 6 7 ·s 9 .10 l l 12 13 14' 15 16 17 18 19 20 21 22 23 24 ?5
c H ..I' N E s E L A . lJ N D R y c H I ?f E' s E L .A u N
3 10 12 16 6 21 7 14 l 23 17 5 20 25 4 11 13 18 8 22 ·9 15~ ~ 24 19
'
c 0 T H I R D I N F H A v E J u s T R E A c H E D
L y E u- J D J N .Y p Q B F y N E c N· H p F . A. G p G

E A s T' E. R N E D G E 0 F VJ 0 0 D s. A L. 0 .ll G 'i? I


K z B y J I A H N s R A N D J M E F s y R I T s N
..
v E F I y E T VJ 0 D A s !I F I v E If I N E ~· w 0 R
R A :M: T F 0 l\{ 0 ·x E N c s II c s p l{ x H T E x G }.{

0 A D w I1 L L R E l:l A I N I N o· B s R ·V
"!'.'
.u A T. I 0
p J N s y v A w u c H y F H E y T B G p y K G Ju G
. \";

f. There are left cnly. 8 letters to be enciphered., . not .enough to ma,ke a .


complete i"cw of 25 letters. This, ho.w~v;~;r; ,Jn8kes. no ·diffe,r~nce in procedure;
these A letters are merely aligned and cipher-text row is selected to reP:,- a
resent them. Supposing the row beginning URZGH .• •• , is selected,. th~ ~.ssage '
now stands as folll'lvi,s:
". . ' . .
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 lG l,7 :18 19 20 21 22 23 . 24 25
c H I N E s E L .A u N D R y c H I N E s E L A u If
3 10 12 16 ·; 21 7 14 1 ~3 17 5 20 25 4U ·.13 18 8 22 9 _15 2 24 19
c 0 T H .. I R D I N F H A v E J· ·U s· ·T R E A c H E D
L y E u J D J N y p Q .B F y N E c N· H p F A G p G
.. .
E A s T. E R N E D G E 0 F v; 0 0 D s A L 0 u G F I
K z B y J I A H N s R ·A N ·D J· : M. ·E F s y R I T s N
:

v E F I v .. E T VI 0 D A s H F I v E N I N E T VJ 0 R
R A M T F 0 M 0 K E .N c s H. c ·s p 11 x H T ·E x G M

0 A D w I L L R E M A I. N I N 0 l3 s ii'
.u R v A T I 0
p J N s y v A w u c H y F H E y T B G p y K ·G Jo,{ G

NI c 0 s E c 0 N D B N ..
u R z G H E J Q. s M D
.. I I

~· The cipher text is now to be copied on th~ mess~e form, in 5-letter


groups. It is as follows:

.
LYEUJ
.. DJNYP QBFYN ECNHP iii~G
: '
s
.

H N s-" .': .R A N" D'i ! . l.1. Ei s . y .. :a I T . N


.:i: A
0

'! . • •
. ..' .. .. . . . .: . . ~
: .
RA .:b.'r"T F 0 lv~ 0. K' .E. · N. C S ·H C . ·$ ·p ·NI X· R '1' E X G M
.
-p ·J·Il S Y
. . .
·v AV/ U C' H Y.F·H E · YT BG P
. '

'.
URZGH EJQSU D
RE-F~D: :A§.6g.a.Q-------------·--

- E;4 -

h. _._·The last. groµ.p of the oipner --message is, . ho•ever,. .not .. a. complete
gl'OlJ.P _of: 5, ~etters. - lt is niade so by adding four X's•·-· These. o.r.e not to· be
cryptographea; -they are ·acld'ed- m~rely ·~o complete i;he last. ciphe~. group.· The
final: message becomes· as shown below: . .,. . •· . . . ~ ;..

LY· EU .J D J N.Y.P Q. B p YN ~i'N


;E ... :.
1( p F A G: p G

K z :s y J I A.H N S. RA N _D J ME F s y R I T s N
·~ :

RAMT F OM 0 If E·.. N -a··~-~. c· s :P.u x R T E X G)4 ..


'
p J N s y v A..V/ IIc HYF If;~- y T B G. p - YK G Lt G
-
-- UR zG H E J Q s }{ n: x x. ..x, x
'l'h~.message as it now reads is but on~· of many different fonns in whic·h.' this
s~e mes~age could ·appear ext·erna.lly~ depending· on exactly which of the-
ava.ilab_le cipher.;.text rows :ts' :selected -for eaoh- line of the -~nc_iphe:rment. ,

68. Cryptographing abbrev'iations. punctuat·ion signs, and numbez:s. · -


_!• Au.thorized abtreviat ions appearing in the original plain-:text message
me.y be. enciphered as abbrevicitio1.1s_, 1'!ithou.t perioQ.~! Examples a Am Tn = AMTN;
E. V• Brown Sch : EVl3RC>lJNSCH. . .

: .!:· .. · -N~~lly,. the. write~ ·or-a· message ·spells out the punctuaiien signs
he.wishei;i ttansmitted; as, for examp-ie, STOP, COl'CMA, COLON,. etc. If a mes-
sage .contains punctuation signs not. so ·spelled out, the messa.ge_-c_enter cfrief
mi....st ... i~d;i.ce.te.. whether they
.-
a.re ·'to
. be omitted·
. .
or spelled :ou.t and tra~s~itted.

: · _c. . Cardine.I anci. ordinal Jiwnbers when spelled out in. letters ·in the
original pla~n~text_ mes~~e are· always enciphered· e~c-tly_ as spel,led. ·

.. d. : . Cardinal numbers whe~ e·xpre·ssed in figures in- the orig.i.n~l plain-


t ext . me~~ag.~ m11st alwa:is be ·spelled O\lt 1 digit. ·by digit 1 in .c:ryptog.i:-_a.phing.
E:xe.m:g.l_es::.. . .. · · · ·

4 : FOUR
. . 40 =
FOURZERO t 8.nd' not FORTY l .
400 : 110URZEROZERO {and not FOUR HUNDRW)
465' .:. · .FOURF1VEFIVE - ·· ·. - ..
.450,, 7_-75A·~ B ; FOURFIVEZEROPOINTSEVENDASHSEVENFIVEEIGHTPOIN'l.1EIGHT
. .. · 2005 .: . TWOZEROZEROFIVE .
12:01 a.m,, : ONETWOZEROONEAX
5:15,p.m,, : FIVEONEF~VEPM
e. Or.d:$.nal :numbers, a.bov~ the ordinal number 10th, when_ expressed in
figu.res followed by "di', or "th", are· cryptographed merely ·a.s digits spelled
ou.t, without. eidding the "d" or. "th"~ r:\'.'h~ omission of th.e "d" or the "th"
will cause. no conf.1,1.sion l'.'r .. ambigu.ity. Exi:unples: 3d Bn : THIRDDN;·· 7th Pack Tn =
SEVENTHPACKTN;··11th Regt: ONEOlIBREGT;· 403d Am Tn:;:: FOURZEROT~·
REF ID:A56930

,~9.•. ,Decryptographing a:me·ssage • ..,.'/~•·· ;JCnowing th~ keyword or keyphrase,


the· n~ric~f key.is Q.e;.e·lo;Ped as described ~del".·::Pe.rwilph 66~ and the set:: .
of .~lphab~t. ·~isk.s: is ·a·ssem~led· accordingl~.: .T~~ Jiie s sa,ge to be. decryptographed
is written down in
iines'of 26 letters,: on -~~~.s 7 s~c·~ion ~aper,:· it available,
space being left wider each line for the insertiori' of· pl8.1n-text letters. · ·.
Using the c.ipher ~essage given under Paragraph 67-~, it appears wider··the· ..te7
··in the following ~orm: ., : ,....

l 2 3 4 ..5 6 7 Et· .. 9 10 ll 12 13.. 14 .15 16 l 7 18' 19 20 21 22 23 24 25


C H I N E S E L A U N ~ ·R % C .H ~ .N E S E ·L A U .N
3 10 12 16 6 21 7 14 l 23 17 ; 5. 20 2q : 4. 1'1 l.3 18 8 22 .. 9 15. .2 24 19
L .. Y .E U J I> J ..N --y p· Q.. :B F Y N E C If H P F A G . ·p G
...
·-. -··

-.. .. -. I.•:
....

R A M T F 0 ).{ 0 K E ?l c s II c s p }.I x H T E x G JI

..
·.·:~-~- .:~·rt''
p J N s y v A \": u c If ·y· ·F II 'E y T :a G p y K G u G
..
..
. . . . .
u R z G H E J Q. s :u D . .

· · · b ;.· The first 25 let~ers o_f the C!yptogram are set u.p on the device, the
let'-iers being aligned in a row from· left to right; . jµ.st above the gu.ide-ru.le.
Fixing the ·disks in this: position by· screwing down· the thumb.. ~ut,. the who;Le
cylinder is turned slowly, forward or·'be.e;kward, and each row of. letters is
carefully examined. One Qf these rows arid only one will read :l.n,t.elligi'bly. all
the way across from left to
:r,ight. · That 'is the row. which. gives the. plain text
for the first ·25 cipher letters. These letters .are inserted in.their proper
place on the work sheet, giving the. following: . .

1 2· 3 4 5 6 7 8 9 10 11 12 ·13 14 15 l,6 17 10 19 20 2J. 22 2~ 24 25


c H I N E ·5 E· L A u li D ·R y c. H I N E s E t A u N
3 10 12 16 6 21 7 14 l 23 .17' 5 20 25 4 ll 13 18 8 22 9 15 2 ·i!';I:. 19

L y E u J 'D J ll .y ·.p Q, Bi F y N EC N H p E A G p G
c 0 T H I ~ D I- H F li : A v I: J u ~-
T R E A. c H E I

c. T.he thi.µnb nu.t is then loosened, the next 25 cipher letters .are set up, .
the a.ssembly. is· locked into p~sition, ,84;~in the whol~ cylinder is. slowly re-
v.olved, e.nd the plain-text row of lettet.sJo~.d. Th~se 'are wr'itten down in
.the.ir p~oper place; and the process is. continued wi~li the· rest of the cipher
. -letters. ~ti:!. th~· me~s~ ha.a ·been cor;ip~~~ely decryptographed. · ·
=·. ~.

. d. · · In the case· of a· cryptGgrmn.· the·, l~f!t ·few letters of which do not ·form
·:.a. compiete set of 25, if· any difficulty i~ e,xp~Pienced in ·picking out the plain- •
text row~ the context·· o·f the· precedi.ng ·P~~.:.. of the me_ssage _shou.ld give. Jt. .good
~. . . ..

·-·-----·~~---~-~~·-··--------·--·
REF ID:A56930

- 86 -
.. . .
clue ... In. ~h~ .cas~. of
th~. £i1uirj;r.~1;i v~ meS'Sage above,· ..it·:·s.hould, ·b"e·· :reali;aed
that the .last. four 1-etter·s of the' c·ryptogram ·are not· to be· decryptog:r~ph~d,
siMe· they :were m!!rel7 ~ddec( after cryptographi.ng to· make the last: -group, of
the cryptogram a. complete group· of rive l~tters. They are omitted..- fr(?m. the·
worls:. sheet. .. . · . · · ' ·· · : · ·

e. The plain-text message is then copied on a message form. The .cod_e· ·


clerit:ma.y; if authorized to do :-ae· by. the. message-center chief, convert nWribers·,
whicJ.?.. 'had. to be spelled out rin · i'ett'ers .to permit of their :c.ryptographi_.ng·,. ·"into
their e·qu.ivalent Arabic figur.es. Abbre'Viations. and punctuation signs are, .
however, copied exa.ctly as ·the.Y...~~~d in the decryptographed message·.·
. 1 •

. 70• Precu.ution. - 1ifhen in da!!ger of" capture, the alphabet. -disks of a.


device that has recently been used to cryptO(!&Ph or decryptograph a message
must be taken off, thoroughly d~sarranged, and reassembled. ·· -. .
.. ___________.,.. ___..

CIPHER liIACHINES .
Paragraph
Transpo·sit ion-cipher machines •••••••••••••••••••• ,. ••••• • ••• • • •• 71
Su.bstitu.tion-cipher machines •• ~ • .; ••• • •••.• ~ ••••••••••••••••••••• 72
Machines ·aftording only monoalph~betic substitution •••••••••••• 73
:MB.Chines ·affording polyalphabetic. sub sti t u.t ion ........ ~ •••••• •. 74
Disa11:ventages of cipher machines •••• ·•·•• ~ ~ •••• ~ ••••••••• • ••• -•••• 75

71.. Transposition-cipher· machines. - These are rarely encountered; the


files of u. s. patents disclose but one example and so far as is known no
actual machine has been constructed conforming to the specifications covered
therein. It may be said that sub.stitu.tion methods lend ·themselves so mu.ch
more readily to au.tomatic encipherment than do transposition methods that
the possibilities for the constrllCtion of cipher machines ·ror effecting
trahsposition are almost completely overlooked. .Basically it would. seem
that· a me.chine for effecting tr1Uisposition would have to include some means
fo:r "storing up" the letters until all the plain text has· been ;'fed into the
machine";· whereupon the transposing process is begun and the letters are
finally brought cu.t in what externally appears to be a randomized· order. It
is. eonc.eiva.ble that a machine might be devised in which the disarrangement
of the le~ters is a function ·merely of the number. of letters comprising the
message; daily changes in the randomizing machinery collld be provided for by
·resetting the elements controlling the process.;·

· 72. · S11bstitution-cipher machines. ·..;..·a.. ·The su.bstitution principle lends


itself·very readily to the constru.ction "of machines for effecting it. The
cryptographs described in the precedirJg two sections, as well as the simpler
varieties making use merely of two or more superimposed, concentric disks, are
_ : "iii the· nature of ·hand-o-perated su.bstitu.tion-cipher mechanisms that are difficult
:ta· use-, cannot ..be :employed for. ~apid or. a.utorJB.t ic cryptographic ma~ipulations,
and· are ·qtiite markedly su.sceptib_le :t!·o errors in· their operation.. For a. long
time these defects have been. recognized and inventors have strlven to produ.ce
REF ID:A56930

- 81 ..;

and to _perfect devices mor~f:.-a.u.tomatic in·:theit .functioning•. The sueeess ..that ·


has· at~end~d th.efr .·efforts.'eailnot ..:be· said to be :great.: several·· ree;s.qns ·,for.,_ .. ~
thh·:~an. .b~ ·cited; chief amorig which is ·the fact :that these inve~~ors have.' ...
not~ BB & i'ule, rea.lized·'the complexity Of the. probl:em confronting ·th,em, no~ ..
have they approached the problem with the necessary thorough knowledge, of . · .
both prac~ical cryptography, with its many limitations, and theoretical · ·
crypta.naiysis·, with its wide pessibUities for the exercis.e·.of. l\wnan i!}genuity.
Perhaps the day will come, however, when the problem. will .b~, a.tt.acked by cef11...,
petent, -large, and skilled staffs of experts,, with the result. that highly ·
efficient cipher machines will be developed and will actWllly.be used io.i .
practical secret communication. · · · ·'·

b. It is obvious that automatic -devices of this nature must be equipped


with a keyboard of'~·~ome kind~ ·resembling or duplicating that of the ordinary .
type\"1rit~r. · Furt~:I-more, ·for ·rapid manipulation thee.e :machines must be _ac-
tuated by mechanisms affordi.i:Jb speed in· operation, sllCh as electric or spring
motors, compressed air~ electro-magnets, etc. ··

73. Machines af'ford.ing:'o.nly' inorioa.lph.abetic substitution. ·.-<Little .need


be said of those machines in which: the ordinary keys of th~ -keyboard. ~:r~:.me.r.ely
covered with removable caps bearing other letters or characters. · They .yi~J:d · :
. only the simplest type of substitution known and have little to recornrnen9.- :them.:
Even when the mechanism is such that a whole series of alphabets can be bJ,"oug}?.t
into play, i;f the~ .encipherment is mon~alph~betic for a succession of ~O or ~qre
letters before the alphabet changes:," the degree of cryptographic s_ecurity t~".-.
relatively l°ovi, ·especially if the varioas alphabets are interrelatedas··a·~-:'.
su.lt of theil'. deri·.-ation froc a limited number of primary components.: · ·. ·· ·

74. Macnines affording polyalphabetic Sllbstitution.• - a... 'In recent . '


years there have been p"iaced upon the commercial IDal'ket many-cipher machines
of more than ordinary interest, but they cannot .be described here .in detail.,
In some of them the number of secondary alphabets is, qu.it~ limited, but the
method of their employment or rather the manner in whic~ the mechanism operates
to bring them into play is so ingenious that the solution of cryptograms pre-
pared by means of the machine is exceedingly difficult. This point should be
clearly recognized and widerstood; othe~ things being equal;. the manner of
shifting alphabets contributes core to cryptographic security than does the
number of alphabets involved, or their type. For example, it is quite possible
to employ 26 direct standard alphabets in such a way as to yield greater secu-
rity than is afforded by the use of 100 or more mixed alphabets in an easily
analyzable method. The importance of this point has not been recognized b~
inventors. ·

. b. · One· of the serious limitat.ions u.pon the development of good machines


is that the· number of letters in oµr_alphabet, 26, does not lend itself well to
J!lfi!Chap.iea;L man~pulation because it has but the factors 1, 2, and 13;. nor is· it
a perfect square.. If the alphabet consisted of 25,. 27 •.. or 36 characters,. much
.· 111o~e couici"be. d.o.ne:~· ·,· ,The addition of figures or symbo.ls to. -the 26-letter . alp~­
bet .intro9.llc~a tlie. s~°i";i.ous practical difficulty that the. e:cyptogr,ams. ~ill: con-
tain: .ch~r.acte~s .ot~t.._,than letters, and the cost or transmitting interrjp.,xt:.\U':es
of J,e~te~s, . · f,i.gµ.fe~. an.q ~Yinbols is ·prohibitive.. Su.bterf~s pf on~ sort or.
another.,. employed to .ci:rcwrit're:nt this difficulty,. are 11sually -impr~ctical and:;
ex.pens! ve·~ .. · · · ;:. ·. . , .
· - - - - - - - - - - · - - -..---RE-F-TB-:-A:56-9-3-0---------·--·-------~--- . ·-- . ----- .

-- as_-..
-~

!.::·'.c.:.·~ ·-The: P~inciples_ u.nd.erl¥ing the .vario11s machines which have th11"' far
been· .'deve.lope.d a~e-. so d.iver·se. tha~ no· .de'sc.ri.ptfoii or··them c-ah· her~ ,be- -µri,d~r- .
taken.: <Nor a~e th~Y- _:iriiportMt Crorri tlie s:ta.ndpo'int" 'of' practico;l cryptoe;r.ai>°hi..
todar, ,s·in-ce s9: far ~a is. known, no.µe hav~ ·even been or are now "q_S_ed by; MY :
of the: :lar.ge .co~ei:ciE!.;L, or gaver~~ntal o'ffi.ces.· . ·; : . . . .
... ~ -~ • t. .• • •

•.. .-:-.t-_::-.7(),._: ~ .D-1.~ad~ant~ges:.o.f ciph.e_r· 'machinef!• .."".'· 'In addition to· .the tact. that .
~-11. very re.cently t~e crypt-o~aph'ic sect.iri'ty of cipher maehine~ _was not very
great;.. thf!re :ar.e. three more- condit1o.ns br ·c1rcumstanoes which militat_e ·agaj,:n:st
the llSe:_ of.. ciph~r ~PPE!-rat11s:- for· commerc.ial or gove:r:--nmental. 11sa,ge. . : : ~· .. ·,-_ .

.!.• The first is that cipher cannot competi3·with:eode, .from the point _of
view ·.of condens.~tiQ~ 9r a:bbl".eviation. A cipher message is alw~s at least as
long.B:s the original plain-text massage, whereas a code message is 11~ually much
shorter t~&n ;~he. eqU:iv~ent original pi·ain-te:x:t me.ssage; this arhes from the
fact -that in w~ll-cons_tr11Qted codeboolts a single gro11p of five· {Qr ~ometime s ·
less) characters may :represent a lol).g phrase or 'even a whole sentel).ce.
• I : • '

b-. -. ·' ·Th~--seqond very tmp<?rtant economic disadvantage of ciph~{ a.·~ compared
"wi:th code is. t.hat the cost or tr~nsinitting the former by telegraph is-us11ally
twice.as mu.ch a~ that of.the latter, this arising from the diff~rence ex- in
·~erna.l·ap.pear~ce of eipher_te:rt as c'ompe.red with· co-de text._ St11dents who ~re
·interested-in this phase_ of' the question are referred-·to the fol.lowing treatise:
'The hist·o . of codes· and code la· e, the international tele e.ph re 11latiohs·
pertai-ning· the-re.to, and the bearing of this history on the Cortina repor '·_by
Major:\11-lliam F., ~rie.dman:, Sig-Res._, Gov:er~ent Printing Office, 1928. : ·:

c. c1:Phe~ machines -are expens1 ve, they are· delicate .mechanisms that ·re-
q111re-frequent Qervic.i~ and they cannot be readily transported. Often they
require electric c\_lrrerit fc;)r operation, the availability of which is scmetimes
in quest-ion. .I! .th~ mechanism 1$ at all complicated to set up for enciphering
or dec~phering, errors are-easy to make and call'for.costly'exchanges ot mes-
.. sages relative to their correction. ·

------------~-----
0 •. -- CODE ·sYSTE}.'[S
·(
SECTION XV
CODE WGUAGE' AUD THE INTEIU1ATIONAL TELEGRAPH filnULATIONS.
Paragraph
Pr9li~1nary .remarks •• : •....•.....••.•...•••.•••.•••. ·.•••••.•••• , .••... 76
International and domestic reglllations governing construction of
code groups ••••••••••••••••••••••••••••••••••••••••••••• 77
Princ1pai ~ffect -a~ the new regUla'!;i~ns - •••••_•••••••••••••••••••••• • 78
Intex:ni-i:X:tures of .code and ciph~r te~ · ••.• _•••• ~ ••• -• ••• ·.·.~·':~···•··· 79
. . -_76. P~E!liminarf.-:r;em~~k.s. - Sections ·xrv;...xvrn 9f Special Text lfo. -165,
'·:. 'Elementary--JUl-itary Cryptography_, wer~ devoted to: a.general. cons~deration of
--:: ebde' systems and ~nciphered c9de. It i.las there· indicated_ that 9·od.e systems are
.: ··systems.of substit11tf(}n where the elements of the ·s11bst-it11tive. p.roc~.ss~. cpm~ ·
prls1ng. le;tter13,_._ syllable's. words, phrases, and sentences are_ ..so. nl]Ilier~il.s, that
1.l:t·; fs·~1mt>o.ssi~1e to memorize them or to ·reconstruct them at will -when necessary,

so that printed b.o.oks contafning.. these elements ·and their· code. :e_q11_i":alents· rii11st
REF ID:A56930
·- . ()'
- 89 .:.
...... .,
be at hand in ord~r· to cryptograph: or· debryptograph: mft~1!u1,ges. The,. various types
or co·cie groiwia were .indicated, together with methods for their· construction .by::
means.- of permutation taples~ One.;;.part ·and two-part cQQ.e~.vJere briefly discussed.
Finally:. a few words yJere added \':itl~ a view merely ~~'i"'i.f!,dicating_ various tqpes
of. enciphering code .f.or great~r cryptographic securitt;·· . '"
....
77~ Internation~l and .d.bmes'ticf ·-regulations goye;[?niilg. construction· of· code
groups. - a. Rules -r·o1-:the cortstr.uot:ion Qf. cpde. e;roi+ps and the general• composi-
tion of coii'e and cipher telegrams of international t'l'affic are drawn up f.rom time
to time by International Telegraph Conferences t~ whioh ~e~egates are sent· by all
gove:rn.rpents adhering to the :J;nt.ernat:i,onal Telegraph Convention. The United States
is"''not ··S. ··signatory to t.he .Coziventionl. IIo'li:·ever., it is .u.~ual fQr this cpwitry to
receive :an ·invitation to patticipate in the Con:ferences,.,:~d to· seri.d delegates to
attend, Qut without· "the right ·to vot-e. The .last conference \o:as hel'd ·ln <Brussels
in 1928. Because messages exchanged betvi~~n t'he United ~~ates. Wld foreign :Coun-
tries are subject to international regulations when··they arrive or originate in
those countries, for all practical purposes these rules .apply to. th,()se rnessages
w_ith as much force as though. tnis country were one of the signatories to the con-
vent ion. · .. ·. . . . .. . · · · : ~

b. The ·f'o1lo\'"iing ·iB. -a ~~sume of the rules adopted by the last conference,
arranged ·in the f'onn of an ()-~tline of· the protocol that was adopted. It should
be carefully studied.by .all .students interested in the practical aspects of mod-
ern cryptography: . . . . . : ' .. ,
OUTLINE. OJ'.' THE PROTOCOL ADOP'l'ED BY THE INTERNATIONAL TELF.GR.APH CONFERENCE, 1928.
·.· -The f'ollowi~ oti.tilr;i.e 2 of' the protocol will succinctly shou its most
important features: · · ·
. . . . . :: .: . ;
; . .
Types of' La;nguage;JI· . . :'· Principal Features
• .. ~~ '· i::• i: '
ti~- Rciquirements and conditions:
·: • i ' • . •J I ,. •
' . I •. ; , · , o, • ..

' .. : :.: :
.· :1 r : .. : · ·:
., . {a) l~axi.r.lµm length of word--15 letters-.
. ,;{-', .. (b) Must present intelligible meaning;
·, ... :; . ; · each word and expression must have
meaning normally attributed to it
,, . in language to ~hich it belongs.
I. Plaiin :l~uage. is that . w~ich (c) Telegrams of this·: cl:as·~ mu.st be
• ·J preaen'h ~liltelligible meaning wholly in plarn· language but
·.:- in one or more of the langl,18.g~s presence of bona fide commercial
a~thorized·for international tel- marks or commerciaI"'iibbreviations
egraph correspondence, each word in current use, registered ad-
and: each e~pression having the dresses, or check words in bank-
meaning which is normally attrib- ing telegrams permitted •
. uted 'j;_o it in the language to (d) Unions of plain-language words
which it belongs. · specifically prohibited.
2. Tariff (same as at present) at rate of
15 letters per word or authorized
compound word. (Check word in banking
telegrams must not exceed 10 characters
·1.
in length.)
.\., _ _ ... :

l .. . . ..
The t;Jnited ·states·~ is, however, . ,~ sigriatory to the International Radiotelegraph
Convention:• ·which .gbv.erns radio. traffic in its interna.tional aspects. The rules
contained in the Int.~rnat ioriSJ, · Tel~graph Convent ion, in connect ion with code,
cipher, and word count, are ·carried over in-toto into the International Radio-
telegraph Convention.
2
Prepar_ed by the writer, in his official capacity as Secretary of the American.
Delegation.
RE-F-I-B-:-A-56-93-8-----·------------.. -----.. . . . ..

- ... 90- -·
II. Secret -l~l!&g!.is c~~fff1~d into·code.l~~e· and ciph~r language.
: . -· ··''
A. Code langu• -~s'.':'ti;lat.which is composed.;of. (a) artificial words; or (b)
bona fide words nC>t,' naving the meaning normally attributed to them in the
lang\lage to which they belong and accordingly not_ forming comprehensible
phrases -in o-ne ·or more of the languages au.thoJ;"ized for telegraphic corres-
pondence in pl~in -~u.age; or ( c) -a mixture of bona fide words thus de-
fined end artifici.al · w.ords •.
. .
Code-language telegrans are classified into two categories, i.. and B.
Aa to taxation, a code-language telegram can not be considered ~~.belong­
ing partly to Category A and partly to Category B~ From this standpoint
it must be classified in.one of the two categories, the other being ex-
cluded (Art. 9, Par. 5~. '
.·.:.

1. Requirements and conditions:


(a) :Maximum length of word--10 le.tters
·'.
{b) Vlords of 5 letters must contain.at
:. i. '•.\_,·. least l vowel. Wards o'f 6, 7, or
8 letters must contain a min~um
of 2 .. vowels; at least l vowel must
appear in tne first 5 letters and
at least l in remainder of word. .
Words of 9 or 10 letters must con-
tain a minimum of 3 vowels; at
least l vowel must appear in first
5 letters and at least 2 vowels in
remainder of word or vice versa, at
least 2 vowels must appear in first
5 letters and at least one vowel in
l. categorz. A remainder of v~ord. The vowe1s·_:_a.re
· {10-letter system) !_, .!.• .!_, 2..• ~' z_; co~ w~rds c~~t
contain the accented a, a, I, :.e, :lf~.
o, U., and the combinations i'e,~-;-· ·
aa,-ao, ue, ch are each co~ted~s
'J, two Ietters.- ·
{c) Mixture of plain.,code, and cip_he~-"
language words permitted.· ·
(d) Unions of plain-lallg11888 words spe-
cifically prohibited.
· (e) Code book m~st be shown if requested
by authorized offices.
~ ... !J!ariff (same as at present) at rate of 10
...... letters per code word. · Plain.;.1a.ngu:age· · .
.
words inserted in code text ai "rate of .
. . • • . ·. ," \'"(I~ .
. .10 ·letters ,per :word~ CiphSr.;..l~Ul!Lge .... .,
, · wo'rd:s inserted- in code· text at:~:r..te .ol"
.'.. __:'. -·: ·5 :Characters per wo~~-~ -.·, _ ·:-._. . · ··
........ - ......... ......... 1•····

_: ~ ':
REF ID:A56930

... 91 -

!1.
Requireraents ~d.co~ditions:
I (a) Liaximwn length of word--5 letters.
II . (b) .No conditions or . restrictions
. as to
I construction of words, except that
they cannot contain the accented
letters a, a, '· e,
!f, o, a~ and
the combinations i"e,,-a.s.7 ao, oe, ue,
ch ar.e each cowited astwoletterS:-
l
( c) uiiions of P.lain-langu.age- \"Jords no_t
2~. qategory B
· (5.;..letter system) ·
:
---1 . specifically prohibited.!
(d) Mixtur.e of _only plain and code-lan"'!'
guage words permitted.;- figur~s "{)r.

groups of'. figures, e~~ept bona-fide
commercial marks, prohibited.
~.- ;T-ariff, word co wit . ~t .t'1e rate of 5 let-
. ,: ' .. ;ters p~r word,. . .
charged
. .
for·
. . .at ' two~th.ir:ds
. full r~te in. extrr.~Europe,an regime., and.
. ..
. at three...:fourths fu.11. rate in' ·European ·
r~gime. 2 A minimum.charge for ·rou:r:· words
compulsoriiy collected. ?lain-language
Tiords inserted, in code text. counted at
i _ _ __
rate,; . P:f 5. let:te~s· per word •. · . .. . .
., ·, . . ~
.. '. .' .
1. Requfrernents and qond,itions:
(a) Jlo :t'ixed me.xirount lengi!h of word or·
group. · ·
(b} No· c·Qnditions or -restrictions .as to
B. Cipher language is that construct ion of groups, except that
which consists of {a) Arabic .the mixture, \1i thin the same .group,,
figures, groups, or series of . of letters and figu.I'es. is prohibited.
Arabic figures having a se- (Art. 10, Par. 2).
cret meaning, or ( b) wor·ds, (cl Mixtur.e of plain Md .c.iphe:r""!lang,l.age
names,· expressions or com- words permitte9,.:
binations of letters not ful- (d) Unions of plain-langu.ag~ -words spe-.
filling the conditions or . cifically prohibited.
plain language.or code lan- 2. Tariff,, same as ·at present,. at. r'1te. of 5
guage. ·· · · figures or letters per word,· cl!.arged f9r
at full rate. Plain-language words in-
serted in cipher text counted at rate of
lp _letter.a _per word.

l . : . . .
The.~ailure to prohibit (by specific wording) the unions of plain-language· words
in this categoi:y was not due to an _oversight. The ,·intention was ~o "leave the way
open to users to rWl: ple,,in-lnriguege vJOr.ds together· .and "chop"· the ·text. into 5-let-
ter gro.ups •. ThllS '· t.J:.le following is permissible under ·this catego·ry: . .:
• • o " • I; I I
0
• •
. • • " '
1 ~- ! . •

C A N Y. 0' U M·E :E T l-.i 0 T H E .R,A ~ .F I .. V .E P. 1: ·


. ,._.... (Can'yoU:.meet_mother at five P~ lI.) .. •':.· ·•.·

2
Telegrams from the United"states to all ·other coW:i.tries ·except Canada and l:lexi~o
belong to the extra-European r~gime or system.

------·---------------------------
····REF ···I-D-:-M-693-0----·--·-··------------·· ----------·-·-·---~--····-- --····-···----

- 92 -
No change is made in the present method of counting and charging for words
in the add.res.a and signature ·in all telegrams .1

The :new regulations became effective on October l, 1929.

~· · The· foregoing r11les do not apply to domestic telegrams within the


United St.&te.s:. . He.re the rules are that code words (bona.fide words, including
.. au.t~r~~ed: :oo~~·Und words) taken from the English, French, German, Spanish,
. Italian, Dutch,- Portuguese, or Latin dictionaries count as single words re-
gardless <;>f their length; all. other kinds of groups of letters, whether pro-
nounceable. or· not, are counted at the rate of 5 letters per word; figures are
counted ·at the rate of one word per figure. In domestic practice .code may be
used in the deferred se:rvices ( su.ch as day letters and night letters), but not
. in ~~~e~nationa.l. practice.•.

!• International telegraph regu.lations, insofar as they do not conflict


•ith'the provisions of the-International Radiotelegraph Convention, or the
Regulations pertaining thereto, apply with equs.l force to international radio-
telegrams. In particu.lar1 these apply to the matter of types of languages,
-Word count, method ·of counting words in address and signature, etc.•

78. Principal effect of the new regulations. - .!.· In order to appre-


ciate the caases and events·that led to the formulation of the foregoing regu-
lations, one must understand the history of the use of code language in tele-
graphic commwiication-, for .:a ,r~s.urd of· which the student is referred to the
broc;hure mentioned on page ee.- ·. Suffice it here to indicate that as a resu.lt
of an unforeseen loophole in.the regulations drawn up by an International
Telegraph··conference in·l903, it b:ecame possible for correspondents to join
;5-leti;;er code groups in pairs to form singly-charged-for 10-letter words,
.th11s ,cutting the cost of messages in half. This practice ·is:~oYJ ~).most: -~i-
.. ve:tsal'<in :cablegrams and radiograms. The regu:lations with. ;re,~pect to Cat~­
gory A code words; as outlined. ip.;the preceding paragraph, are, an outgrowth
of the cond~tions that .were '1roµght ._b~ut by the practice of Joining two.: ..
5-letter groups. Since under the.Category A rules each 10-letter code word
must contain ·at least .three vowels, it: is obvious that in order tc b~ as~
sured that every case.,of the pairing of two .5-letter groups will result in
forming a 10-ietter word with the. req\lire!l.number of vowels, each s~tetter
·code group in the code mUBt contain a minimwn of two vov1el:s. ·

l
Address and signature are transmitted free of charge in domestic telegrams
witJlin the United St.~te.s,. bu:~ in c~blegrams and international radiograms these
are invariably counted and cha:z:-ged for in ·determining_ the ···c"c)st of translnisSion.
This gives occasion to ·th.e ·practice of employing registered ·eo'de addresses,
. Wh~c~, .in a single word., 'indicate the name, and street a·ddress o·f the addressee.
The city (state a,n.d cowity,_.1t·:necessary) are. added·to the eode.addi-ess and·e.re
included in the word cotint~ . The charge for regi"stering a code address. is: $2~50
per year, per code 'address • . This is paid to the local telegraph_. company, with
whom the code address must be registered. A publication listing registered
.~9de .alioresses of' the most important conmercial t'frms in· the world is privately
. pub.li slle d_ . und~~ .the .ti.t le~.. . ."Internat ionai Register . o~ .l.1~·1.egrapli:fo ·and .Trade ...
Addresses." . · . · ·., ··
REF ID:A56930

~ 93, --

'. .• "~·· > lior ;sQJ:!le.:·~ime. t.o; .CO]I19... A~ategp?Zi' A-~~ll .be. £>~. f~~ S'1'.¥J1.if~:i\-,i_mpor;t;ance
t'O code ·.oompi;i..:e,r,s·,.,a!.J4 ;CP~~ .µ:S.!3.J"~: :thap.... e~t!t~.t:Ala~egoq . :l3: c.~~e, ~f.~g.~~~" :~~~ ·~~:-. ·;
pher language1, l>oth o;f .w,~~h1 ·~~e·- tno:r.~.~~P.~nsi -ve, to ,\lBe th~; ;ls...o~tegory.. .A. .
~:; ·:· ·: .. • .. :.1.·:.··~ :.·:·.·: :.,··: ·:.. ;.. ;,;!··t.··~~-.u·-~.,· . ~·i·:· .. \: .. f.-.i ·:;.· ... ·::··~-~ . ·;·.·;: ..'~_;:··::_; . .-i,~···:; . . ~ ;·::-.'_..~
· :.:

·· ·.. -£•· . ·.The. ·naw· re;g~a.t:l<ms,, _we:re. ,ci~s.j.:('.t~~t to; pq~:.:afl en~:. °j;:<J;;-~~~ .eA~.e_S·S.··.d:A~-:-."
pu.tes. and argwnent.S.; occa·sione.d by .t~, ol~ .~µ.le_s, '~ip~, ~ve~.~.;l>:r..•c:tic~l.lY:. ~-, ·; .
. e~forc.ea'tl'le :b.ec.B.ll.'e:e ,(If·: ii·l;le:· 1-~ck of' .pr~9-~. si~ ..!~· d~f W,~, tR-~ :j;~p~s. ~f.. ~~7._ ;. ·•~
• ! :g~es· and the :r.u.les,.for. th~ir Qomposit_~~·i . T~~.r~;!JB:!3.,a~. s,o; :~o~e thoUf?;~~ .. '?:~ : :...
making the cost of co~-larigu.age teiegra?JIS·, more in. . qonfo::-µiity, 1Vi th the. ~~~-. . .
pense entailed in their handling by the communicat icin agencie's, bu.t th~ .nev/ "· "'
rules;:,fa1L in .. this object, for fea1;19ns :w~.~~l) c.8Jln'?~" ~~r.~ .R~ Aet~iled. "'
:':'· .•. ~'~ ···;·. ..~ ·.. . .. ~ .·· .. ~ _;:·• ~·.·. "! .: '· :··. :;~~ ~·.· . ·~ • . . ~~~i~··i :
79. Intermixtu.r~s of' co.de text;:: ~d .ciV.l~~r. text •. ~~ Ji~ I~ of~fi'.n. ~~~g~p,~,
that correspondents employ a code wliich makes no provision for encoding ptoper
rl'flJne.-:6r un~su.al words not 1nclllded 1~ . th(! yo~a~~~Y; ,t}?.e.. c9d~gp~k • . R~ther or
than .leave t.he unencodable· text in pl~i..µ .liµig™~ ,.i~)•h~,,;?,,~.s~, .'~inc.e.1,9 .. ap-
pearance .will s11re:y lead to clu.es. to un1;1.u.tqorj,zed. re~ding of th~ .nlE!p(fa~. RE.~.:
correspondents encipher su.ch wor9,s 0 .alld_.~rop~l! ~~~ ~Y. m,Ej~~ J9.f. -~ ... PX:~~r,~~~<;
cipher system. Also,· in some ci:i.se.s, :\!heti ~l1.e ~~~~.;ts ~~~i~~~.J~.:i~=~s ,~oc~~~l~;:~
. a~d-the ·various inflections of word~ ~r~ ,,no~ . reJ,:>r~~e~~~~, .·~~~.:,c~~~~P~~¥ri~J ;·- ·1
~-su.ffix·the proper inf'lecti<ms ('~eQ.~, .. "ing!', ."tio.n~·, .. ~tc.)...~ c~ph~r.•.. ~$.h~~·.
procedure, however, is not to be recommended, becatlse it 'corisicieraol.v ·rediicfos · ·
: the cTyptographic security of th~ whqle ~y..st81}-~ .. : -: ·:" _, .- , : . ·: ·.
, . . ·· · · _; : ·· . ,· t .: . ..... . . . : .~ ' ·. i ; ·'I · '.., ··.·I
-.. · ... b-. · ·Sometimes correspondents make q.se of .two· o:r: more codes withill: ~lie~:, :.
- . . •• • •I .•• ••: ' •. , : •. ' ,(~ i' ! '

• same messe.ge. This is occasionally the case whe~ -~hey: are maki~· us~ ,o·f .~ •.::.:·.:;
1
general or commercial code which does not ha.,e all the special· expresSioris · - ...
- :necessary f:or .their btlsine~. th,e l~tte.r. exp:r,~ssions being c~ni!amed .. ~n a .
·small private .code. Sometimes, ho\"~ever, th,~ iz;t~~ixt;·u.re. ~f :oo~e :t;ext .f~~. ·:·:·.
sever.al codes is done 'for the pu:rposes of secr~cy 1 · though .it is, a~. a·rule;.·
a. rat her poor Stlbterfuge. · · - ·· · · ' -· ·

----------~~~~~·

SECTIOU ~I . . 1'.·

ENC IPHER&D CODE.


Paragraph
P11rpo!5e of enciphered- code •• ~ ••••••••••••••• ·........ .; ••••••••••••• · · · ·ao.
}.~noa1ph.abet ic methods· •· ............................ ~. ! ~ • • • • • . • • • • • Bl
Poiyalphabet ic methods •• ~ •••••••••••••••••• ·•• • •••• •. • •• • • • •• • • •·• _ 9.2
Additive and subtractive methods •• • •••••••••••••••••••••••• ••• •• 83
lliscella.n'eous ·methods· •••• ~ ••• w • • • • • • • • • • . • • • • • • • • , . . . . . . . . . . . . . ~.·. ~~

· · · so.- ·Purposes~of ~nc1phered code .. :- .a.:. The pu.rpos~s ~f' enc~phering code
-~ye '·al~eo.cy· f:?e'en explained in the p:nev.iou.s :ten,.· toget;he:r,'_ if~~.~ 'l:i,:r;ief i_nd±~~ ., . ,
· tiom{·of' raethods·~,... The superimposition; of'.a .. good c1p:Q.e:r system upon the code, ..
t~xt o.f a message is today the safest and most practical of 'aii meth'od.s"of ....
ccy~~d~raphy "~or"governmental··u.se ... ·As .. incii:cfl.ted,-~a.ll .s.o~.s:!~~ cipl1;~~: met.h.f>ds
m~ 'b'e--'appl-i~d.;: :but tn.e-..tules impose4:by: inte~na.tionf!L~ ;~d.:Aqmes_ti.Q ..~~.~ep:-~~h
regulatl1b'h~ serve ··=to· limit . ·tbe .. choio~ for... p~f:!.ctiE;1;1.l ,p..µ:po.~~, .... _.; ·z . ·:·,.... ,.,! ... ".

----··----~------~----------------~-~------
REF ID :A5693Q

...
·

E.· Transposition me~ho·ds. where ·whole ·gro11ps are .. :rearranged. are usefu:l bu.t
not :fr~qu.entq eneountered• The :re.aeon. why transposition -imrolvi~ the letters
of a code message taken as a single sequence is not used is that it destroys the
form of ~he grou.p·~ s.Q that t.hey .no .longer conform to the required re~;u.latiohs.
Transposi t.j,on.s ~1ir1.ct ly w-itliin ;the .gr.ou.ps them.a.elves are, .. however.- ·feaSib.ie un-
der the ri,ew regu.lations in internS.tiortal practice.; Where these r.egulat'i·ons·. are
not applicable, or in. communications .passing puxely. through military channels·.
and a~ciE3s·, al.l kinds of' transposition. ·methods may be· applied with go.ad ·ef..fect,
provi!iil'lg .th1a. sys:tem. as ·a whol.e. i's .. or a pract;lcal ne.ture. ...
'· • .• • • • 'I \

2_• Substitution r.iethods may also be u.sed, with the same limitat ions as
re·t~rre4' to. above:. Space fo·rbids an. expos~. of all the. methods that have. been
empic;>ye~,. _,and· only two .ol'. thre~ can: ,b.e ..bri.efly indicated!.
': :··~: ~ .?" • •. t :: {' • , I • ,i . . ' L f '. ' • .<' • , o

-~l.• · .:;M:Qno~lphabetic· me:tb.ods., ·- It is. of course easy to .. draw up a. .Bingle... :·


.. ·..
mu.;;a!·ai,p'hab~t in wll.ieh: vowel.a ,a:re ,rep.:la,ced by vowels, consonants by; .con:s€>n&nts.
WlleP..,tije-:cQ'del>ook· is ol':. t~ in 'poisess£on and"the -oi"ig.in&l':'" ··eneJi.\Y.:'cryp.tanafysts·
CQ.d@ ;wo:Pds ,axe. therefol'e: at ·handrtllis method· does not .. yield.mu.ch s.ecurity.; for· .
.reasons not . necessary :h~re :to :indicate;, Even ~when ·the. actu.al codebook. is not:
knQw.n·;. bq.t .it .f..s knQwn .that it .. 1s ,()n,e: of'. a ,set of ·Commercial cod.es ·Of the· 2~1et ....
ter·.,dif·feren,•e .-tn>e, the .t-econstirti.etion of': the cipher alphabe'\;·ds not diff'icu.lt-:
. .. . . . ·. :) ': '

82. Poiyalphabetic methods. - .!• A very simple polyalphabetic method is


to have. :fi~e· alphabets which are used: i:n succession; or there::m8'Y ·be-. a; series of
sets ot': 5 ·alphabets,. the individual set· to. be .µ.sed being deter:mined .by indice.tol!s
inserted? :in ·the message .it se:lf .- ·,; . , . ··; . ,

2_• ·. '. Any .sort :of polyalphabetic meth,od -.in '7hic-h the indi v:idaal
alphabet~ :ar.e
constr~ucteu so· that.
vowels -replace "VO\"lels, "'Consonants ·rep1ace consonants, may be-
~sed. For example,the repeating key method, the runnine or continu.ous key · :
method, the interrupted key method, etc., cllll. be applied. Digraphic methods may
also be used, providing they are -su.oh that -the .particular pairs u.sed to replace
code pairs conform to the vowel-consonant arrangement of the original.

c. Tables of various sorts are often employed. For example, using a table
applicable to code grou.ps of 5 figures, a table giving pronowiceable combinations
of let1i.~-~s for. the combinations ot digits rtUcy" result in converting a group such
as 75152 -into the. l,etter groµ.p_ KOBAL •. '.r~p:ie.s ..f.o.r ..s,up,stitu.ting combinations of
letters into ot~r pombip.atio~s o~ ~et:ter.s ~~'· !'~. c.o.~s~, equally feasible. ·
The substitution may b~.·s:t!i~:tlY. digraph_ic,, 9~~bip.i~g tYJ.O. 5-letter or 5-:f'igure.
groups into a se;ri~!3. of ~o. ~i~aphs;. O! i~. f.lSY. be a _combin.a~i.on of trigraph~c. and
digraphic substit~tion,.~ach ?~cpar~cte! gro~p ~~1~. s~:i~t. u.~ into a 3-~he.racter
and a 2-characte·r combination. other conbinations are, of cour.se, also possible.
·.· '

In .all ·tJie f~regoingmet;hod~ the chief.. objec~ i.o~ is th~t .the: advantage,
_c!·.
of the. 2,-letter .dif.fe:fential f'eat.UJ,"e is more .or· less; dis.sip~ted by the E!ncipher-.
ment' but. t.hls. .;if!; t:rue·_; of every ~I.lb ~tj, t u,t i ve .· ~~!l~d·;~h.e:( ~~.: 'sy.per:impott~d o~ cod~".
: ~.J . I • • • I. . . . '. '. . . . .. . .. . : . • .: .. .j. ; • . • .. '" • .. ~ • : .• : : • . • ; • • I • •• ' ••

..,!•:T.;. The 4-i.sadvantage :re~err~d..t.Q. in .the .P~~c~di~:·.subp~~~a:p~ ~ a~sent,: . :· f


in those cases on vhiQh.~~l}e:;~9ip~up;me~t .. operf+1i~s.,~rely; tc:i s~~s;~~~te. ,Ot.~r;. ,.,
code groups of' the same book for the message code grou.ps. The most conmen
REF ID:A56930

- 95 ·-

method's. ·of this type make u.se of the figure-code gr·oups, the latter· being man-
ipulated in variou.s. ways to change them and 't;he resulting groups then be. ing :.
given their· letter-code equivalents. Some of: these method·s. are. explained b.elow.
t ;_ ~. '. .. : : . ·. ; : . ' : ~ :
83. Additive and s11btractive roothods. - a·. : If the code grou:[:ts·":tire ·:nu..;.
merical, the addition of an arbitrarily agreed-upon number to each code group
is ti. simple matter •. If the book contains 25,000 code g:-onps, for. example, the
addition of. a number such as .1000 to a code gro11p. 24=, 789 would produce 25'.; 789-j
·and t·his, would be represente·d in the final message by the ·group 00789 (by; sub•
tracting. 25 ,ooo). ' ·" .\ :·
: . : :. ~ '

b~ Where the code groups are composed of letters only,. and are not··ac• .,
companied by nwnbers, additives are rather limited in size, by practical con-
s'idel'a'l.ion •. ·It would be extremely laborious to count 500 groups· forwnrd; for
·example. In these co.ses, additives from 1 to ·.10 ·or -20 are :comr.:ion •. But d1e:z:e
the code-groups are also numbered, t.here i$.opp'Jrtun.ity for fu11 play.of ad-. ,
ditives. For example, in a certain code the code group. AllCOD bears the num-
ber 00869; the additive agreed upon is 1500; th.e code .group corre·.sponding to
the numerical value 02369 is B.ANIL and this is the group transmitt·ed. ·

c. Combined addition ana subtraction may be used within the same system.
For example, addition and s~btraction of a fixed number may be alternated.

d. Keyed add~tive systems are also used. For exar.iple, the additive cor-
responding to the keyword BAD might be (by agreement) 200, 100, 400. These
would be used in repetitive fashion. Or, it might be agreed to use the numbers
additively and subtractively alternately; + i?.OO, .~ 100, + 400, - 200, + 100,
- 400, t 200, etc.

84. M:iscellaneous l!lethods. - a. Among various more couplex methods,


mathematical manipulation or code numbers by complex methods suggests itself'.
For example, the addition of a long series of digits to the digits of the code
groups, and the conversion of the auras into letter-code groups is possible.
Thus, suppose the code groups (and their nwnerical equivalents) of a message
are as follows:

C .A B 0 R N IX 0 T ARC IP YO KR A
1 8 5 4 l 4 2 l ·O 7 0 9 A 5 l 8 3 5 7 2

Suppose the sequence of digits 4 3 2 8 O 9 7 2 1 is used as an additive:

4 2 1 0 7 0 9 8 5 l 8 3 5 7 2 •••
l 8 5 4 l
4 3 2 8 0 9 7 2 1 4 3 2 8 0 9
4 2 6 6 0
7 2 1 4 3
15 5 7 1 5
...
6 l 8 2 1 13 9 3 2 1

Two of the totals obtained in this example are greater than the total number
of groups contained in the code, which, let u.s assume in this case, is 100,000.
2he totals whioh exceed this number are therefore merely decreased by 100,000
and the final result is:

6 1 8 2 1 3 9 3 2 1 4 2 6 6 0 5 5 7 l 5
REF ··--ID-:-AS-69-3-0--- -----------·:-·--·-----

The code groups corresponding :to these nur.ibers are now·sought in. 1;he cqd~b<?ok
itself and .these letter-code :gro4-P,S. form the .t'inal message. The :n~ber!' !e-
su.lting from addition or subtraction of key .riwnbers may, however, l,>~ s9ught,
·in another and differen1;-nwnbered code_ and t~e code grou.ps corresponding to
the keyed code numbers transmitted..
I
· • ' •
: ;
=:·. .
b. · The use of a n~~ere.d. code lends "itself readily to columnar trans~
·position methods •. The code numbers are wr~tten in a rectangle, keyed .~olmnnar
transposition applied, the code groups' resu.lting from: this· process rec:on;verted
into letter grou.ps and the latter transmitted. This is only. poss.ible, however,
where:the codebook .contains exactly 10,000 groups a.nd, of course, the process
bf encipherment an.d decip~erment. requi~es care a.nd time in order to avoid errors.
c. F.ractionation methods, and cipher squares (of the 1-par-t;, .2-part,' or
4-part type, :u.sing pairs of digits from 00 to 99) can be· readily u.sed with nwn-
·be.red codes. They would .yield enciphered code- messages of gre13:t secu.rity.

d. . Very occa·sionally cipher machines or hand-operated cr..yptographs are


u.sed to encipher code. · : ·•
...

. .
.
~
I ~ .: ' ;

.. '•

.• ·)": .,•
• • ~ ,.I I ' •

. '. ~ : .

··. '!

,; ... ;-;
...... .
·

··.: L •..•.
., ,
REF ID:A56930

- 97 -·

·PART II
.. THE SIGNAL WTELLIGLl:lCE SERVICE *

· :·;, . . . ·, · ·· , . . . .. . · ,Pare.g;r~ph
Sect"ion .XVII. ·General :b1to:tmation ·;. ~. ~- ••• ;. ~.;. •• ~ •• ~. ~ ~ •• ~ •• ; • · · 85-S~f .
XVIII. · sp·ecific f\i.ncti'ons ·or" the s·1gria1 rn:t~iiigence .:·:. . : · ·
8ervioe ••••••• ~ ••••••••••••••••••••••••••••••• 89-95
XIX. Types and activities of signal intelligence
units .• !~•••••••••••••~••••••~••••••••••••••••• 96-100
XX. General organization and opera~ion ••••••••••••• 101-102
llI. · General St~ff responsibility .-·•• ~. ~ ••••••••••• ;_.•. ],03
: .i • .' •~ • .·, . . .. . . • • . . . . ' • -~ . •

. . .. ~ . ' . :
S:CCTION XVII.
.. ~ . .

GENERAL· lNFOEhrATfON • !'


lo: d • .i
1


• · · '·
,, .• : .. ·
:Paragraph
Definition •.••••••.•••••.•.••..••.• , •••• , •••••.••..•••••••••••• 85
Basic au.thority •••..•.• ~ ....•• ~ .••.•••· ••••••••••••• : •••••• : ••. 86
Relations with the General Staff •••••••••••••••••••••••••••••• 87
:Reiatioris \liit"h <the ·Adjutant "Gerier·a:i:' :Depa:rtnient -~~~ ~ • .-~. ~:.: ••• .-. ·.
·. ' • ' • ' • . ' • • • . • ' • .
s • ~ ' • • ' • I .. -: ·, ' ; • •·. '4; ' •. .
.88

85. Definition. - a. Up to this point the student h'as bee·n concerned


principally with theoretical considerations in the preparatipn and proper
manipulation of various t'ypes of codes and ciphers. In Special Te~....-t No. 165
( 1931), Elementa:.:y l.1111t~ry Cryptography, brief r..ie~tipn 11Vas mad'3 of the way
in wh'foh ·crypt_ographic" work :in the Arrrty b alloc'c.ted differen:t agencies to.
of the· m'iiitary· estabiishti1ent.'· .It wa.s there .not~d· that most ·or ~he a~tiv:..
ities borinected with this· wo·H( ai-~" fwictlqns. of the. signill Corps •. Tpfs part
of the pre~ent t~xt is deiro~ed_to· ·a.more ~~ta~led ·~xpcisition of the· *ll~ca-
tion men:ti'oned~ so far· as concerns the S~gn'al Corps~.. ·

b. The Signal Corps personnel"assigried to fuiui1·t~e Sig~al Corps


fwictions connected with cryptography are organiZed. into :.units ·or· a special
service, called the Si al lntelli ence ~ervice~ Which 'mii.y be. define~ ·as an
operating service concerned With l the preparation of all ·codes, . o~phers,
and other means of secret communication employed by the Army, and (2)" the
detection and solution of all ene~ sec~et communications.

c. The Signal Intelligence Service forms the subject matter of this


and the. succeeding sections of this "text, which deals with the _Vlay in which
this service is organized, coqrdinated, and s·upervised,: i:n ·order that it
may function in as ·efficient a. manner as possib-le. ·

'86. Easic a~thority • .:.. The functions of the signal· c(?rps 'ref~_rr.ed to
in Par. 65a are. thbs~ which ~re assigned to it by the· 5.ecretary
. i
of .war
'
_wider
the ··rq~Iowi~>para.g:r~p~~-<o_f ·~ 105-:5: ··
• '. • . . . • • ~- . l . . ..

.~i'-his ,pa:rt: -~£, ~·r.e te_xt. ,w·~~ · :prepare'd under the' j otnt ,di re ct ion o.f ·the.', Chief
_S;igna;L O;f'f;icer ii-n;d :the. As.~i.stc:rnt Chief of Staff, 3-2.~ : -.. . ,.
- 98 -

"SIGNAL CORPS

• • ..
GEl:IERAL PROVI5IOUS

• .. • •
2. Duties of the Chief Signal Officer. - In addition to such
~ther duties as may be prescribed, the Chief Signal Officer will have
immediate .charge, ·under ·t-he -direct-ion of 'llhe Secretary ·of f;ar, of' :the·
following:
...
· . .~
. ;>11:
,
..
·
.
• *· *
.
.

. .e.•• · · {A.a. .emended by Changes No.· l, l\lay 10, 1929) -The preparation
and .rev.i.s.10.n. o.f. al-1 co.des an-d ciphers required by the A:l:rrf]{ e.nd in time
of war the interception of enerey- radio and wire traffic, the gonio-
metric location of enemy radio stations, the solution of intercepted
enell\Y code and cipher messages, and laboratory arrangements for the
employment and detection.of secret inks •
. . . . /II, . • • • . :/II. . .. ,.., • • • . . * . . . ...•....... *· ....
· j. · · - The· general- supervision-, cocrdination, and standardization
of all- radio operations ·and the enforcement of reglllations concerning
the same.

* * . * * * •
3• Unit· signal officers.--· a. A chief signal officer will be de-
tailed for.every expeditionary forC-e and a Signal Corps officer as Un.it
·· Signal -o-fficer will normally be detailed fer each corps area, department, •••
· and ·every taCtical unit larger than a brigade containing Signal Corps ..
· troops •••• · ·'!lie unit 1'1gnal officer will ·be ·a member of the staff of his
commanding officer. ·He will be.charged,'under the direction of his coin~
manding.officer, with the command of such portions of the Signal Corps be-
longing to his unit as are not placed by competent authority under some
other· corrmander or- assigned to some tactical unit containing other than
Signal ·corps troops. The unit signal officer is also charged with specific
duties ·as follows:

• • • . ·.
• • * •
{3) ·He will exercise direct technical su.pervision over
all signal work done by the comr.ie.nd,-whether executed by
Signal Corps troops or troops of other branches.

b. The corps area and department signal officers a.re also responsible
unde~ the policy of the War Department and the instructions .of the Chief
.. · Signal Officer for all matters concerning the Signal Co.rps in their reapec-
ti ve corps areas or departments, inclu.ding such matters-_ -in those .posts, ·
. -········.camps., . .and. sta..tions..not .. within the jurisdiction .o.f the .co-rps area. or-- depart-
ment _conmianc:'le~.,. h?:t wit_hin the ~e_rr.~toria.l .limits o_f their respecti:v-~. com-
mands, and excepting_ or;lly«those f~ctions directly under the control. ()f the
Chief Signal Officer." · · ··
REF ID :-A56930
- 99·-·.

87. Relations with the General Staf'f. - ~he liiilito.ry .IntelligQnce lG-2)
Division.of each headquarters-where. signal""intel:ligence activities are con-
du.cted,~xercises general staff supcrvi&ion over tlle Sii'i'lal Intelligence Service
. thereat~.' in accor_dance with. the following paragraphs of .AR 10-15: .

''SIDi'IOll I.
WAR DE?.AR'l~.IEHT GENBRAL STAFF
• • • • • *
· 9... . Military Intelligence Division, general duties •. - a. The
lUUta.ry Intelligence Division is charged, in general, with those
duties of the·War Department General" Staff which relate to the col- .. · .
lection_, evaluation, and disseuination _of ·_r.iilit.e.ry information. i ·: ·

. b. The Military Intellii;;ence Division is specific.ally c~erge.d. ·, ·


·•iith the preparation of pl~B and policies and.the superv,(s'_ion Of'.:11.ll.· ··
: activities concerning: ·. ·· · · ···· ··


:. ~
• • .. • ·. ·.. .. • : .... . .. . ... ~

{6) Codes and ciphers.

• • • • * • •
SECTION II.
GlliER.µ Sr:i'AFP "WITH TROOP~

14. Organization, distribution of d~ties. - The organization ot


the General Sta;f'f' at· headquarters of co:rpa areas t•ill be as herein pre-
scribed for ti.1e \7ar :Department General Staff. At all ether headquarters
the General Staff' will be divided into fo·u.r di visions, among which shall
be distributed, in .aeco:Pdance •\71th ·the priliciples enunc;iated in these
regiµatians, such.of ~he d~~ies ·of tne \lat Depart~snt General Staff' as
apply to smalier. .units •._ ••• "···· · · · · . . ...
I • •' • • • I I I

88. R~·lat.io~s.-~i:th. the Ad·jutall't G'dnera1•·a···Departr.i8nt •. -. a •. A/J. quo.ted


above, under Paragr~ph ·2e of' .AR .105:..5·,· the Chief Signal· Officer-has charge of
"the prepar"t.ion ~d rev~~ion ~f all· codes ·e.nd ciphers req11ired by the Jrrrq."
This covefs onlj the pre?arntion of the man11script for au.ch.codes and· ciphers
as require pQ.blic~tio~"by printint5. The-actual printing of codes and ciphers
and their issu.e is a function o·f the Adjlltant General's Department, in accord-
ance with the following paragraphs of' AR 15-5, pertaining to tha~ Department:
'
"SECTIOl{ II.
DOTIE~ OF THE ADJlJi'ANT GEU:tliAL
2. General. - a. • ••• The Adj11tant General is cll~ged with the
duty of --
• • • • • • .. •
(6) Publishing and distribu..ting --

• • • • • • •
(d) Codes and ciphers.
• • • • • • •
· · · --·--··---·-· _________ ------------· -··-···------·.----------·-----------REF. J:D__;_A,5. 6 93J)___ _

"." .100 ~-

r·· ; . SECTION V .
ADJUTAl~S GElffiRAL

9. : General. - The adjutant general of a corps area,_~istrict, ex-


peditionary force, division, or higher tactical unit is a member of the
special staff of the Commander· thereof _and operates under his direction
and control.

10. Duties. - The duties of the adjutant general of a corps area,


diStrict; exp~di:tionary force, division, or higher tactical unit are
those oU:tlined ~or· The Adjutant General in these -regulations a.s.· far as
they may be applicable to the Command with which he is se:rv.ing.. •.• .. "

b. The Adjutant General has charge of the accounting for. c.odes al'l:d ci-
phers-; in accordance with Paragraph 11ofAli105-25, dealing with the methods
of receipting for codes, reports thereon, etc. In the absence of specific
regulations on the subject, The Adjutant General also has charge of the storage
of reserve editions of codes and ciphers and such p·arts of current editions as
have not been isstied for use.

c. The Adjutant General may call upon the Chief Signal Officer to pre-
pare distribution tables covering the issue of codes and ciphers to specific
organizations and offices; but normally the ty~e and.number of copies of
authorized codes and ciphers to be issued to regular units are shown in Tables·
of Basic Allowances. Such tables indicate, of course, the number of copies
that should be printed for each edition of a code or cipher.

SECTION XVIII.
SPECIFIC FUNGTIONS OF THE SIGNAL Il~TELLIGE~CE SE:f!VICE.

Paragraph
De.rivation of funct1°ons ····································~~········ 89
Code and cipher compilation ••••••••••••• ~ •••••••.•• ~ •••••••••••• • •••• • 90
Intercept ion of enemy communications ••••••••••••••• .- •••••••• ~ •••••••-~. 91
Radiogoniomet~y . .................................... • •.•••.• :.-••• • ·'111' • • • • • • • • 92
Code and cipher solution ••• ~ ••••••••••••.••••••••• ~ •••••••••••••••••••. 93
·secret inks •••••••• ·••.•••••..•••• ·•· •••••• ! ••••••••••••••• -~ ·• • • • • • • • • • • • • • .94-
:: Coemunicat ions security •••••••••••• ~ •••••••••••••••••••••••••• ~ ••••• •.... 95

89. Derivation of functions. - a. The s:i;)ec:l,fic functions and duties


of the Signal Intelligence Service are-derived from the wording of the gov-
erning paragraphs in AR 105-5 qu.oted in ParQgraph 86 of this text. They are
six in number, a.s follows:

(1) Compilation and revision of codes ~d _c.iphers employed by our


own forces. .
(2) Interception of enemy radio and wire traffic by electrical
means.
(3) Location of enemy radio transmitting stati.ons by goniometric
means. .
(4) Solution of enemy codes and ciphers.
REF ID:A56930

..
·
- 101 -

..:. (5J ',~·~~-oratory ~r~_~m~nts. for 'the sel,e:ctiop and pre:Paration" of..
· ·:·~ e·ec)ret ink.a to be e!f1p~oyed by olll' ow~: •uthorized agents·;· ·a.nci ·
· .for "~he .~tection. Qf. th:e ·presence .of s8.cret-ink wr:liing 1~'.
. ·.·enemy dpcuments~ .· · .·". ·.. . . · · -~ · · _·;· ··.··_
:( 6) ·_ in~er~eption. an~,-mi?riHor-1:~ of our· o~n r~dJ~o -t~art~c·: i~ <>~¥.!' _::·'' .:·
to_ deteqt violations o;f r~~u.lations, and, tr.Qm the;point --~~'·;··· ..
, . ·-view of· co~un1c·ations _seQ.urity. _· · · -~ '· .. ·.. · , · . ' .. · '.·: ::· · · '
.• • . •• ~ . . . .• :· ~·· ~ • •. : , - .. ~- : I .. • i. i · .:. :

1• F.ach of the foregoing fµµ.ctiqn!' ;will be disc\lsse~ ~~p.arate.l~ ~ 1~ c~-~~ .• ,


s\lbs~qu.ent paragrap~s. · · ..~ ·:": ·r.. · ;·.•..
.'.,. 90. ~~de .a~d _ciphe.r compilation. "'.".. '.l'his f'wict,ion involve's," t.t'mi.;ci.:f"".' ~ fn,
war e:s well as' ln tlme of' peace, the preparat'ion 'and revision .of code's,-.·. ' : ~ all
ciphers and o.ther means of sec~et cotnµiu.n.:l.cat!ons which are to be employe·d. .by; ·:· ·:
t}l;e .~· · As no.tad in J;>aragraph 88 of this text, The Adju.ti:ui.t 'General is. :.·:.:. ·· ·
responsible for the printing. of codes and ciphers, for .their _'storage., dis.:.. ·· ·
tribution and accounting. · · .' · · ." · ·

91,. . Intercept ion o~ ~·.ne?ey" commU:nioations. - This function invol.ves, in


tl:ne of' war, the interception, by electrical 'means, of' ene~ ~Qmnu,n!Ca#.ons,.:
inolu.ding their press reports; in time of peace, the necessary organiZatlori ·
and training of personnel and the neces-sary _development of' eq\lipment to
enable the Signal Corps to condu.ct intercept.work sl.lCcessfully immediately
upon the outbreak of ~ar. In this connection, it should be noted that the
Signal Corp_s, is responsible for the interception ·of enemj messages. by elec-
trical· means only. It has no responsibilit~· for the interception of enemy
commu.nicat~ons· thro'ugh· p1rsta'.l.' eenso:t'ahip· r.iea:sure"S or· by· means· of personal : ·
contact with eneir\t' b.gehts·; with· prisohers bf· liar, or by· any· other-· personal·
contacts.

92. Radiogohiometry~ ~This fWlOtion· involves; in· time of war, the loca-
tion of enezny radio transmitting stations by radiogoniometry; in time of peace,
the necessary organization and tr'a'in:i:.ng· of personnel and the nece·ssary devel-:-
apmeilt ofequipment (see AR 105-5 ~ 'Paragraph 2b) to enabl~ the Signal co·rps
ta condact this work su.ccessf'u.lly. inmediately upon the ou.tbreak of war.

93. Code and cipher solation. - This function involves, in time of war,
the solu.tion of all code, cipher~ or _other disg11ised eneucr messages or documents
that may be intercepted by the Army· or forwarded by other agencies to the Arrey
for solution; in time of' peace, the necessary research work and the organiza-
tion and training of personnel to enable the Signal Corps to conduct this work
successfully inmediately u.pon the outbreak of· war~ · _ ,: · ·

94. Secret inks. - This fwiction involves, i~. time .of w~~. laboratory
arrangements for (1) the selection and_ptepart:-t.idn of ·se~1'.et ~.l'lk'.s •fo'be enr
ployed by au.thox:ized agents of olir own fprce_s;·,-~d-(2) t}?-~.d~tec~ion~C!f . ·~~e · ·
presence of secret-iri.k ~:r'iti.hg in'intercept;Eld etterri,y 'docnmen~s;-.'in ·~1th~ of -
peace, the necessary rese~ch·work.and:the.organizati&n;an<l·trainirig'i:>t ·;
personnel to enable the Signal Corps to conduct this work successfully
immediately upon the outbreak of war.

---------------------------------·-··-·········--· ---·----·····-· ~ ·-· --···-··· ·••··· ····-- ·······-··- .. ······ - -······ ·------
REF ___ ID:A5.69_3.0_______ ·---------------------------~·---- -----

- 10~ -
95.. Communications security. - Under current regulations, t;he actual
employment of codes and ciphers within the organization to which' they are
distrieu.ted for use in enccding or ·enciphering and decoding· or ·deciphering

messages; is a function of.the message center of that organization. In or-
ganizations: down to and ·including J)ivision, the message centers are operated
by 51.gnal Corps person~el, in ~hose belo11 ~ivision, they ·a.re:opera.ted by
perscmnel assign-e·d 'by the commanders of the o.rganizat ions to ·serve under
the un-it -signal office~.· Although message centers are in -no way organically
related to the Signal Intelligence Service and the ~ork done at mess~e
centers is not performed by signal intelligence per·sonnel-, neverthele·ss the
proper employment of cod.e·s· and ciphers by all message center personnel· is an
important phase of secret communication. Should they be employed improperly,
their secrecy and the SE!Crecy. of the .ent.ii:e code. ·or cipher system is ·jeopard-
ized.. As an outgrowth of AR 105-5,." Paragraph 2j, in time of war as ·well as
in time. of peace ....the su:perviSion of- the use of-co:des and -ciphers b'y all' Army
personnel, with a view to irtsuring t·heir proper employoent, 'is· a responsibil_ity ·
of the Signal Corps and is· a :function- of speciully assigned persorihel of the · ·
Signal Intelligence Service·. ··This duty,· by inference at. least, :i•equires the
interception of our own radio traffic from time to time with a view to its
examination for infractions of regulations establi.shed to preserve searecy
of codes and cipher·s. · · · ·

s.&:1iI01; XIX.
TYP~ .AIID ACTIVIT.IES OF. SIGUAL ll~T"BLL.IGZIJCE UN[TS.: ·
Pai-agraph
Nwnber of type.~ .............. • ••••••.•••••••••••••••••••. • •·• : ~ • ~ :~ •• - ·_ · : 96 ·· ·
The War Department unit ••.• ·••••••••••.•••••••••••••••••• ~ • '· -• • .' •• .;. · 9'7 . ·
A corps area or department unit ••••.••••.••••••• ~ •••••••• • • ~ • • • • • 98 ·· · ·
A general headqliarters unit ·•••••••••••••••••••••••••••• •.•.•••••• 99
A field army 'Wl.it ••••••••••••••••••••••••••••••••••.•••••••.•.. •.• 100
' ; .
96. Nwn'.ber of types. ~· a. Depending upon \Vhere signal' intell~geriqe ~c­
tivities are
condu.Cted, there are four types of signal intellige~ce u.n1 ~~,::~ii~
somewhat different. du.ties. These four types of un1t·s a.re as follows:·· · ... .

(1)
(2)
War Department unit.
Corps area or depa.rtr.ient unit·~
..
(3) General headquarters unit.
_( 4) Field army_ unit.

b. Each ·type of unit is discussed in the succeeding four paragraph's.,


but only general outlines can be ipdicated.

97. . The War Department unit. - . a.. The War Department signal intelligence
unit operates at the V:ar :p~p~rtment, in, Washington, under the direct contl"ol of .·
the Chief Signal' Officer. ..General sta:ff supervision over its activities· ·~s · exer-
cised by th~ G...;.2·.'1:Hv~siQn. of· the \Jar _Depart.ment General Staff'. ·· · ·"·
•• . a\._-:. . .• ' • : J.·1

·:·.
: ' ...
. . ' :.. · _. '. • .. <
REF ID:A56930

- ..103
, . -;.

b. The duties of the War Depar~ment un,it are . as follows:


• .. • . •, ·'. •• J; •

• . I: :' .. (~) The co.mpila.tion .o! all .coP.es and ciphers and other mea..11.s of
. secret COl'lllilwi.iC.at.for.i ·~ri!Ployed' by the ~~. except that when
. estal;>lished, tl~e si~nal intelligence Uni~ at "tlie general
·1 ..
headqua;rters · ot: field or ex!>editi~inary forces will take
over: the prep~z'.atiori. ·_of such fiEdd e9d.e~8 and ciphers as are
required for. cUi':;-ent replc.cer.1eht within· ·the Theatre of Ope-
ratiot1s. ·. ·· · · · · ·
(2_) The in"terception, by .electrical mean.a, of enemy communications
. eoa.riating from stations ·not in the Theatre.of Operations.
(3) The radiogoniometi-ic lccatioii of the enemy'· stations from which
.. · . t~~_se int.~i:~epte_d. communica.~iohs Emanate. ·· · . · ·.
(4) The solution of secret or "disguised enemy commtl!lications includ-
. ing th~se .~ritten in code er cipher.' or those emplQying other
me~s:.for disgu~serilent.. : · ., · · · · '·
(5) Work with.secret inks,·to c·onsist in·the establishment of a lab-
.oratory for the. d~tection of sec:ret-il'lk·writirl.g. in intercepted
. ·. and'
-'ene~ commu.ri~cat.ions - se
!'or· the le~t ioti ~d prepB.rat ion of
.~u.it~ble..s~c:ret ·inks to be ·eniplole~ by authorized agents of
. the W~r Department. · ·' · · . · ·
~ . , ( ~) T:Q.e: su.perviSiop of Army "tadio. and wire traffic within· "tthe Zone
.
.• I

._·; ,; :.o:t: the interior from the ·pain-ti' ·dr ~1~w ··o·f coninunicatiuns se-
. ,cu:rity. .. " ..
. '

... -~8. . la. <?orps o.re& Qr depart:;nent unit. -- a. A sjgnAt~ intelligence unit
is assigne_d to. each of' $ti.ch, corps areas "arid de;;ic.i'tr!10ll~ s lis .f.:1ay be ·'.d:irected by
the War Department. The im'it opetat~s Wlder the direct control of the Corps
Area l or Depo.rt1Jent) Signal Officer. Ceneral ·staff sup~rvhi~n over its
· activi~ies is exercised by the G~~.Pivi~ion of the_Corps Area (or Department)
General- Starr., · · . . : · · ...._.,: · · ··, ,. " · · · ' · .. :."' · ' · " :··

b,; The. -duti~s of a corps area or departfil.ent U!lit. a.re as ·follo~18: ;.

( 1) The interception, by electr.ical ·means·; of enemy- communiCations ·


emanating from stations not in the Theatre of Operations.
l 2) The radiogoniometric location of the enem.Y ·stat ions from ~hich
thel!'le i_ntercepted .communicati~ns emanate. .
( 3) The· solution of secret· or:· d.isg\lised enentv· ~orirnun1cations includ-
. ing those. written in c.ode or c,ipher, or· -those e~ploying other
m.eans for d1sguieel.1ent.· · · ·. · .
{_4) The supervision .of. rc.'.dio a.rtd wire t·raftic· from the point of view
- of co~~icatio~_:s 'se~u.~~ty.. · · ·: ·'

99 •.. ; . -~ :g~~er~i ;h~ad.qur.rters~ 'iui1t ~ ..;.. a:~ ·. · ~ sfgnal:· intelligence unit is


organized .pr_omptlY: U:p_on the' _establishment· or~ ·and is ·as·signed: to,: the general
headquarters' of field o'r ~xpeditiontiry .force_s~. ·A GHQ; Signal' intelligence unit
operates under the direct control of' the chief· ·signal "Officer· 'of the field or
expeditionary forces. General staff supervision over its activities is ex-
ercised by the G-2 Division of the GHQ General Staff.

---=-···--~
··-------·-·---···--····---------BEE_ID: A56930

- 104 -
b. The du.ties or a GHQ unit are as follows:
(1') The c~mpilatlon of such field codes and ciphers as are required
.as r~placeraents for those issued by the War Department to units
of .the field forces u.pon their mobilization; and, as directed
by the Commanding General of the field or expeditionary forces,
. the cQmp:Uation of. ·suah- special codes and ciphers as may be
necessary ._to meet local or spe·cial needs in the Theatre of Ope-
r"ioM. .
(2) The interce~tion, by electrical means, of enet!\Y' conrnunications
emanating·frQm the larger: or more important stations in the
· Theatre of' -Operations. · .
. . ,: (~) TJ:),e radi.ogonipmetric location of tne enemy· stations from which
these int.ercepted communications emanate.
(4) Solution of. secret or-disguised enemy conmlinications including
those written _in code or cipher or those employing other means
_ for disgu.isement. ·
(5). Work with: secret inks· to eonsist· in the establishment of a lab-
. · oratory fo~ the detection of ·secret~ink writing in intercepted
enemy communication~ "and for the selection and preparation of
s~itable secret inke to be employed by authorized a.gents of
- the Conman.ding General or the field or-expeditionary forces.
( 6) Supervision of the radio and Wire traffic of organizations sub-
ordinate to the GHQ., from the point of view of.communications ·
security.
(7) Stu.~ of su.ch captured enemy docwnents as relate to the signal
service of the enemy and are forwarded tr- it ·by the _G-2 Di·dsion
of the GHQ General Starr.

100. A f~eld army unit. - a. A signal intelligence unit is assigned to


each field army. The unit operates as a part of the Arm:;{ Signal Service under
the direct control of the Army Signal Officer. General staff s~pervision over
its activities is exercised by the G-2 Division of the General Staff of the
field army which the unit. serves. ·

· b. Its. duties are:

ll) The in~ercep~ion of enemy radio and wire communications by


electrical ~eans. _
(2)'The radiogonfometric location of ene~ radio transmitting
stations i~ the Ar:trf3 sector. ·
(3} Code a.rid cipher solution to inclu.d~ only -the translation of
intercepte~ eneJ?C" code or·c~pher·messages·by the assistance
_ o.f information furnished by the GHQ. signal intelligence wilt.
(4) s:u.perviaion of tJ:ie radio 'and wire traffic of organizations
· subordinate to-the ~ield army concerned, from the point of·
view of communications security.
REF ID:A56930

- 105 -

SECTION XX.

GENERAL ORGANIZATIOlf AND OPERATION.


.. Paragraph
GenerB.1 ·o.rganiz8.tion· •••••.•••••••.~ ••.•••••·.................. •Ill!·-• •••••••• 101
Gener&1· Op:Eirati'on ·••·•••••• ·••• ·••••••.•••••••••• ••.•.• ...........:•.•••••••• 102

General o·rganization •.. -


...10'1'. a..
Each of the four types of' signal intel-
ligen.ceunits men~ioned in the preceding four paragraphs is 9rganized in accord-
ance· With ~u'thoriz.ed tables 9f organizat.ion appficable to the headquarters tD
which the unit. i~ a.ssigned. ·Tables applicable tn GHQ and Army signal intelligence
units are shown in Appendix l. ··It will be noted that; signal intelligence work '
is conducted ·by ·signal Corps persoru:1el organized into specific sections which,
taken as. a group, comprise the signal intelligence service unit under the Signal
Service {Aney-~ GHQ, etc •.) of those headquarters. It will further be noted that
rs.die· interception i;µid radiogoniometry are performed by regul,arly constituted
Radio. Intelligence Companies (T. of o. - 211 VJ), which ar~ ,, however, under the
technica:l and tactical control of the off'i'CSer in charge of the Signal Intelli-
gence Service at the headquarters t::i which they are assign;e~.

b. war Department and Corps Area and D~paI:tment signal. intelligence units
are orgruiized in accordance with the services each is. intended to perform, follow-
ing, in general, the patt.ern set up for the GHQ and Army signal intelligence units.

102. General operation. - a. The signal intelligence unit at each head-


quarters. to which it is assigned operates as a si&'na.:1,. · C-:·rps activity directly
under the administrative control of' the {Cr.ief) Signal. Offl,cer oz that head-
quarters.· As in all other s.il'!lilar.cases,.the unit·qqn411ciin.gthe activity a't
any he~dquar1iers is w;id.e.:r control .of the cQrnmandi~. g6Jleral thereof. The G-2
Division af the· headqUa.rteis. staff exercises close general staff supervision over
the unit and coorcHnat~~ i1is ~ctivities., ."to~ reasons :which will soon become ap-
parent.

b. Specific details concerning the way in which the various activities of


the Signal Ir.telligence Service are conducted cannot,· of course, here be given;
only brief outlines are .Presented below:

(l) Code and cipher compilation. During time of peace the War
Department signal intelligence unit, und~r the Chief ~ig­
nal Officer of the Army, prepares and.revises all codes,
ciphers and other means of secret cor.mi~ication employed
by the Army in time.of peace, ruid also prepares field
co.des for employment by ~ombat units on active service.
It prepares a sufficient number. of e-ditions ·of the field
. codes to the end that .tr.oops ·may· have qertai.p editions
·.for peace time ,trafn~ng, .. ~d that cert·ain ..edit~cns may be
. held.· in rei;ie.rve for prompt. i.ssue. ..to troops .u.pcm mobili za-
. tion .t:or ·active. serv.ice.. Upon mobj).ization the \.·ar Depart-
. 'men,t . ~.ign~l ,inte.llig~nce ·.~i.t .~~tinues ."t;he preparation and
. revision 'of B;ll meiiris. :c,:t; .seQret· cozmnunic:ation., except that
after 'mob.iiizat ion,. the prepar~tion a~d r;ev,i-sion.. Pf field
c~des,· ahd ·of 'sci.ch spe'ci.al codes ~d: cipher~ aa .are

~-- -· ~-- -·-· ' ... , ..


REF ID:A56930

- 106 -
specifically for use ih the Theatre of Operations, becomes
a responsibility of the GHQ sig~al intelligence unit. It
shou.ld 'be noted that. code' und cipne'r compilation is per-
formed only by the r ar Department and GHQ signal intel-
1igence. .tmi ts.. . . . . . . . . .... - ...... .
· .(2) Interception of. -enenzy: communications •.. The .interception of
enemy communications by electrical means is prioarily radio
interc~ption, but, in the Combat Zone especially, also en-
tails the· :interception.·of enemy communications by ·BilY other·
electrical· means, s·uch as inductive or direct contact with
elect·rical circu.its carrying enemy messages whenever and
wherever this procedure is practicable. A certain amount
of radiogohiometric \lork is required in connect~on 111ith
radio interception for the pu.rpose of locating and iden-
tifying the enemy stat· ion the traf.fic of which is. being·
intercepted. ·The close relationship between interception
and. gori.lometric location. is evident. The (Chief) SignS!l
Officer of·the headqu.arters routes mes~ages or press re-
ports intercepte·d in clear· language to the G-2 Di vision
. :
of the headquarters staff, and routes messages intercepted
in code or cipher to· h5:s ·signal intelligence unit for solu-
·.:';
tion. -It .will be noted that., in time of:. war, int.ercept
... :•.' activities are conductad by all foil.r types of signal i~~el.-
ligence units. ·
(3) .RadiogoniOmetry •... This ·activity. entails the location o~
enenw radio transmitting stations by mea."ls of radiogonio~
meti·ic ·stations located at critical poi~ts within the. area
under the ·ju.risdictio~ of the headquart.e~s. to which tp~~ a.c-.
· . :t.ivity ;,i;s· assigned•··"·Location·or the enemy t;ran~mitting
. ·stations ~d the. deterrainatibn.ot the·tacticn_l ~it-whi.ch ·
: each slich sta.t ion serves, ·that ·is, ·Whether it.if!: ap, Army,
Corps, Division, Brigade, Hegimental, or Battalion stat~cm,.
indicates the tactical disposition of the enenw and the
determination of enemy ·stations as belonging- ~o·particu.~ar
units indicates the enemy battle order. The obtaining of
this very important information is .one of the major func-
tions ()f the Radio Intelligence Company serving a field
al'Iey'. To a lesser extent this may also be a function of
the Radio Intelligence Comp~ serving GHQ. The lChief)
Signal Officer of.the headqu.arters rou.tes the ~nformation
collected by this activity to the G-2 Division of the
headqu.arters staff; he also, of coiµ-se, supplies this
information direct.ly to his solu.tion section. It will
be noted that,·in time of '~ar, radiogoniometric activities
are conducted by all four types of signal intelligence
u.nits, but radiogoniometric ,,.,,ork spec.ifi.c.ally ~onnected
· · . with the determination of the enemy or.de+, ·of. ~b.attle is
conducted primarily by Arrey Signal Inte ll;ig~nce ~ervice,
. : ', •secondarily by GHQ Signal. Intelligence. f,e_r.vi:qe •. Very
: : ">.; <li.tt-i:e·, "if any; au.ch work i.s. condu.cted by ;tAct \;ar De-
, ' . ·. :, par.tment; or -a Corps Area, (o.r departme:nt). Signal In-
·~ · tell.ige.nee. Service. The: latter. c.ondu.ct, o.qly. such radio-
REF ID:A56930

- 10.7.._..
-

goniometric studies as are needed to identify the


particul!ll" ra4.10 ... atatioii.s whose'·trafi"ic is befog
·~'' ··· · :tntercented b~r th.e.r:i.
. - & • ., .
· ··, :-.:: ...
·. ,.
· ··' · ··. . • .

''('4) ,C6'f3:~ arid ciph.er s.o:lution;.;. .At· ·any he.adq\~rt~rs '.f;o. which
. ' a· 'signal iute~~.igence unit 'is assigned~ aJ..1 el;lemy com-
'in~ib·atio~s wp.,!Qh are in secret·'. or di~guise~ form and
whiCJ::i "are obta.ined either by radio inter~eption or
f~om 'other sour~es 111 timately r·ea.eh the code and cipher
s·61.U.t~.on seotfori o.f t.he · si-gnal ·intellige~ce unit for
soiut!.cri_. Solved ~.cor.nuniC·a-t;ions ·a.re. routed by the
(Ch~ef) .. Signal. Offic1?.r .of thEf"'neod~ua.i-ters to-.the-.G-2
"' ·D~v1sion of,.t~e li-eudquarters'"sta:fr". ·It ·c~:ouJ,d)e

noted that "solu.~·,on o.ctivltles:
' • • • •
condu.cted . b ..t all
• • • ••
are
•• • • • •• 6 ••• ( •

.·; f~ur typ~s' of signal intellieetnce units·. btit Viith·· ·


·.',' · ··sections 'd:(ffer.ing iri scope· a.rid 'p.ersaruiel ~ It is ·
· · :pr.obable that,,;.as re.garde solut.ion ac·tivitie.s, ·(a)
.... ·the. \:ar Depa.J'.tment, .signal.· intell.igence unit·~. ancl. ·
.
(b}' a Corps Are.~ 9r Depllrtlt"ent sigtiai intelJ.,igence
un'i~-· will d~a;i. ,~Qstly with ar~tpto~ru1'ls 'con:v~i!lg· .
;·d~pb.ni.i,1:;,ic .. or .g~peral -infdruiatio:n~ 'tvhile {er a'.'GHQ ·
· ·s.igiiEi,1 · i.nt~l:l;ig~n~e·.uni:t and (d)· the. respective:
.. signal'.. J.ntell igel}CO ·unit S 'Of the s(:iireral ·ffold armies
.. imd~t ..~HQ.. w~ill.. c;leal. p.rimirily ,;·nh'. ·cryptograms '_con,;.
:'veying''.combat, OJ". .:tac·Ucal ·informat'ion.- ·Therefore,
·it i~ evid~nt ·thnt, ·as regards solution ·activhies, ..
the ,t.w.Q...t'o.~me.r. ·types of. sig·nal int"elligen.ce. iinit.s,
la) and' {b)' should c>'per-ate indej::.enden"':;ly tl.:i.e . 'of·
~wo. i~tter t.~PE?.e, (.e) .~ ·a.nd ( d) :;. 'e:x:qept t"iat technical
information ..should be! ft-e·e1~r; interchanged bet•:een
~11 wiits~· ·rt :i..s further· e;ident ·tn,.at, as re·g~rde , •,
I

th.~ .solu.t.ion of en~ eodee "and ·ciphe:rs, the' i.:ar·


. .. De~ar':tm.ent. sig:ia.l ..int·elligence '"llp1:f· and the· re~pecti ve
.. corp.a· .area or dep:artr:ient signal· "intelligence ·~its.
deal. with the same t"ypes·of eneniY. codes and cip~ers ;
· td_iplomatic) and. 'seek·the sar:ie·kind·of infoma.ti,on,
ahd, ·th.it· the. solution sectfons 'of .the~e two types of ·
·_un~ts 'sh.ou.ld, ror:.·the-. sak.e. ·-0f? ·arri~iEmcy, work .'in the
·. ~lo'sei;i.t. co.oper.~t.ion:; l.ikewise!', . 8.:rid~ 'i.n. thEi, sEizite' regarcl,
it:. i,s eviddn:t. tlu~.t ~·GHQ' slgna.l int.elligen~e .unit: and
the respective signal .J.iife1l.igeriC,e \init"s of 'the: i;ievcral
'rield armies .wi.der GHQ .deal i~i th .t;he same ·~:n>el,'I (')f
eneiitr Go des ·and ciphers { ta:ctical) "'and: seek t.lle .cs·ame
. klnd of iriformat.icm;. Bind tfi!:l.t ·-the' 'soliit'ion: sect$o.ns
· ot these. tw~>. tYI>es 'o( Urii~s ;sho·u.1d·,'· ~or ·the .sa~~ of
· · etqciency, .\york in the ·closest· ~oo':f>eratiori. · T~ere-
for~;' 1:ihe. \'far'. Depa:r;t.rnent s':i:gnal 'intel~.i~nee ·'uria;t, . ..
and. a .GJ~Q· si.gna,l irit~ell.igetlcfl ·. tjn:it· should be .·organi ze'd
to carry dU.t ,t_o. 't°he:·,ful1est-. erl-0ht tlie ·work· o"f solving
any and all disguised enem;• communications which may
be received, while corps area or departcent signal
intelligence units and field army signal intelligence
units may be organized, \;!th less personnel and may

-
-··-·-··-·-··-------·--···- ... .. ··-····-·--··-----···--·-·---·--·-..-·~-----·~·------·
loe·-·
oper&:ta···1n a less exten.sive _manner, pl!aciryg'·dependence
upon t"he solved enemy c"od.es and cipher··ke'ys' "which have
..bee.n previously worked ou1; ·and furnished ·:them ·by the
solutipn section of the· larger sign&i intelHgenee :unit
with Vchich th~y are most closely allied.;: In E5ase the
sol.ution s~ction of a corps are·a or 'deprirt~ent sienal
intelligence Unit or that of field .A:rmY :s1.grlal intel-
ligence wiit obtains rnessae;~s in· a.. code or'.:cipher con-
cerning which ·it t:a:s ~eceived no date or which it is
· unable to sq1¥.e:,; -s"uch raessag'es are t<? be forwarded to
the solu.t.ion · se_ction ot· the larger Signal intelligence
.unit .(War pepe.rth1ent or. G.i:IQ, respectively) far· solution.
• (5, Secre.t inks. Secret ink i,a'bordtories are asi!igned only
to. the War Depattr.1ent· sign~l intelligence W1it and to
a GJ.Ici ·s~gnal intelligence rinit. ·These a.re ·staall labo-
ratori~·s·· w~ich serve two uain purposes: (a), the de-
tect_.i~ri, ,of;' se.cret-i:nk: writ ir.&6 in· intercepted enemy
commll.fltc'ations., al'.J.d' (b J ,, the selection and preparation
of c'ertain inks su.its.bl"e·for our own use. 1'hese labo-
ratories conduct researdh V;Ork Which Will ·enable them
to draw u.p instrU:ct.io'ns' for ce·rtain' simple and 'general
measures to be employe'tl by s'uoh personnel &S censorDhip
.offfoials, and. others ·who come ·in contact -with suspected
docuine,nts. In case· these rieasures fail, the documents,
if s't1ll suspecte·d,. a..re· forwarded ·to the laboratory for
final test. The laboratories also conduct research work
which will enable them to select ·and ·draw up instructions
i'or the. u,se of suiti;;.ble secret irik's by au.ch of our own
agents ~ho may: be authorized to em~loy them.
(6) Supervision of radio e.nd wire traffic. The (.Chief) :signal
. Of.ricer. establishes a commu..'lications security section as
a pc;,rt of his sigrtal irit·ell:igen:ce ·-unit.. ..'This section
conducts inde.perident radiO and wire intercept ·operations
directed toward obtaining sai.:iples o·f" our O\Ul traffic•
The (Chief) Signal Officer assie;.'"lls 'spe·cific periodswhen
personnel of his Radio Intelligence· Company direct their
att~ntion to ·transr.iiss.fons by' our own forces. ·Traffic
from this· source is ·turned over to the solution section
-for study and examination. If infractions of rules for
.. the u.~e· of codes and ciphers,. or carelessness and blunders
are 'noted, the ~tter is taken up through normal official
channels with a view to their correction or, if 'persisted
in, the. application of disciplinary rJeasures. In· addition
to such intercept activities, the monitoring of telephone
lines, in order to eliminute· or ·redtice, imprudent conversa-
tion over this important sou.rbe of information, may be .
conducted by '_sp~cially desig-nate·d p'ersonnel.
f ...

. ... ,,. ..
.'l .
REF ID:A56930

- 109

SECT IOU :XXI •


. .,,
GENERAL S!i.1.iu'"'F RESPOlJSDILil'Y
Paragraph
General Staff responsibility ••• • ••• • ••••••••••••••• •,, • •,•. • •••••• 103

103. General Staff responsibility. - a. The Military Intelligence


(G-2) Division of the headquarters to which -signal intelligence activities
are assigned is responsible foX" pol:i.cies with Fe~:erenee to and the general
staff supervision of the Signal I.r.telligence Service 13.t, that headquarters.
The point of contact is the Cotr.mu.r;.ication::: Section of t!1(~ G-2 Division.
The contact between the G-2 :Division of the General Sta,i'f and the unit
rendering the signal intellig-ence is perha.ps closer th~n betv:een any other
general stuff division and an operating b:·;:i.rich, sin:::e, in a "Very real sense,
the signal intellit;ence unit operates la.rgel~· as an information collecting
agency for the G-2 Division and the latte1· depends upon the former for the
very vital information that a well-organlzed signal intelligence unit can
furnish. Cor:ununicatfons bet\~er:?n the G-2 Division and t::ie signal intelligence
unit are handled by the G-2 C~rmaunications 5ection. Information of interest
to G-2 obtained by the signal intelligence unit is routed by the (Chief)
Signal Offic'=lr of the heo.dq~a.rters to the office of G-2 where it is handled
by the G-2 Conrnwiicutions Seotion ~nd distributed by that section to other
interested G-2 branches, unless a more direct routing has been previously
arranged.

b. Close personal liaison shov.ld be rnaintained bet\-1een the G-2


Cormnunications Section and the signal int£1"lige.ace W1it. ~I'he General Staff
officer bears in mind tho.t general staff policies ~;ith reference to an ope-
rating branch rr.:i.st be gt:neral in character, and that in forming them every
consideration mu.st be given to the require1:1ents of the technique of the
opera.tin6 branch, with v;hich the General t.tuff officer should be in general
familiar. General Staff policies deter!!line t;hat result is desired from the
operating brunch, the operating branch determines how this result is to be
accomplished. '?he res;ilt desi:.·ed having 'ouen enilrlciated, the General Staff
officer bears in mind that he is a coordinating agent and not a directing
one. He coordini;;.tes the activities of the operating agency with the activ-
ities of other operating agencies over v,hici1 it has no control. The above
mEcy" be considered as a definition of General Staff supervision.

You might also like