The Project Gutenberg Ebook of Elementary Cryptanalysis
The Project Gutenberg Ebook of Elementary Cryptanalysis
This ebook is for the use of anyone anywhere in the United States and
most other parts of the world at no cost and with almost no restrictions
whatsoever. You may copy it, give it away or re-use it under the terms
of the Project Gutenberg License included with this ebook or online
at www.gutenberg.org. If you are not located in the United States,
you will have to check the laws of the country where you are located
before using this eBook.
Language: English
ELEMENTARY CRYPTANALYSIS
PREFACE
There are, however, many works which deal most interestingly with the
analysis and decryptment of some one particular cipher. Most of these
are short works, published in magazines or incorporated into books of
a general nature, and nearly always the one cipher dealt with is that
type of simple substitution which appears with separated words in the
puzzle section of our current magazines and newspapers.
CONTENTS
Preface
I. General Information
II. Concealment Devices
III. Transposition Types
IV. Geometrical Types — The Nihilist Transposition
V. Geometrical Types — The Turning Grille
VI. Irregular Types — Columnar Transposition
VII. General Methods — Multiple Anagramming, Etc.
VIII. Substitution Types
IX. Simple Substitution — Fundamentals
X. The Consonant-Line Short Cut
A Method for Attacking Difficult Cases
(by George C. Lamb)
XI. Simple Substitution with Complexities
XII. Multiple-Alphabet Ciphers — The Vigenère
XIII. The Gronsfeld, Porta, and Beaufort Ciphers
XIV. The Kasiski Method for Periodic Ciphers
XV. Miscellaneous Phases of Vigenère Decryptment
XVI. Auto-Encipherment
XVII. Some Periodic Number-Ciphers
XVIII. Periodic Ciphers with Mixed Alphabets
XIX. Polyalphabetical Encipherment Applied by Groups
XX. Vigenère with Key-Progression
XXI. Polygram Substitution — The Playfair Cipher
XXII. Highlights of Fractional Substitution
XXIII. Investigating the Unknown Cipher
Appendix
English Frequency and Sequence Data
Comparative Table of Single-Letter Frequencies
Chart Showing Normal Contact Percentages (by F. R. Carter)
Chart Showing Frequencies of English Digrams (by O. Phelps Meaker)
Some Foreign Language Data
Bibliography (by W. D. Witt)
The Commonest English Words (by Frank R. Fraprie)
English Trigrams (by Frank R. Fraprie)
English Digrams (by Frank R. Fraprie)
Index
CHAPTER I
General Information
The subject which we are about to study is the analysis and solution
of _cipher_, though not including _code_, which is a very special
form of cipher demanding something more than elementary knowledge;
nor shall we enter at all into the subject of _invisible inks_,
certainly a most important aspect of secret writing, but belonging
to the province of chemistry rather than to that of cryptanalysis.
_Cipher machines_, also, are not within our present scope.
The word _decrypt_, with its various derivatives, is being used here
to signify the process of _solving_ and reading cryptograms without
any previous knowledge as to their _keys_, or secret formulas; thus
the word _decipher_ has been left to convey only its one meaning, as
mentioned above: the mechanical process of applying a known key. Our
word _decrypt_, however, is an innovation borrowed from the modern
French and Italian writers, and is somewhat frowned upon by leading
cryptologists.
* * *
1. Concealment Cipher
2. Transposition Cipher
3. Substitution Cipher
* * *
No code presents any real security unless the code symbols have been
assigned in a thoroughly haphazard manner. This means that any really
good code would have to be printed in two separate sections. In one
of these, the vocabulary terms would be arranged in alphabetical
order, so that they could be readily found when enciphering (_encoding_)
messages; but the code groups would be in mixed order and hard to
find. In the other section, the code groups would be rearranged in
straight alphabetical (or numerical) order, so as to be readily found
when deciphering (_decoding_), and the vocabulary terms would be
in mixed order. Just what is meant can be seen in Fig. 1, showing
fragments from an imaginary code book.
Figure 1
*) When a plaintext term has more than one symbol, these are called
homophones. Polyphones are symbols which may have more than one meaning.
The terms _encoding_, _decoding_ are usually preferred to _enciphering_,
_deciphering_.
CHAPTER II
Concealment Devices
Concealment writing may take a host of forms. Perhaps its oldest known
application is found in the ancient device of writing a secret message
on the shaved head of a slave and dispatching the slave with his
communication after his growing hair had covered the writing. Or, if
this appears a little incredible, the ancients have left us records
of another device considerably more practical: that of writing the
secret message on a wooden tablet, covering this with a wax coating,
and writing a second message on top of the first.
The name “null cipher” derives from the fact that in any given
cryptogram the greater portion of the letters are null, a certain
few being significant, and perhaps a few others being significant
only in that they act as indicators for finding truly significant
letters. To illustrate what is usually meant: Say that your very
good friend, Smith, first complains about a radio which he has
bought from your neighbor, Johnson, then asks you to take Johnson
the following note: “Having trouble about loudspeaker. Believe
antenna connected improperly, but do whatever you can.” By reading
the final letter of each word, you will find out what Smith actually
had to say to Johnson: GET READY TO RUN.
Figure 2
I N S P E C T
D E T A I L S
F O R
T R I G L E T H
A C K N O W L E D G E
T H E
B O N D S
F R O M
F E W E L L
Figure 3
S T R I K E
baaab baaba baaaa abaaa abaab aabaa
N O W
abbaa abbab babaa
Figure 4
A TRI-NUMERAL ALPHABET
This alphabet has had many applications, including the use of colored
candy previously mentioned. One contributor to Ohaver’s column
submitted a cryptogram of the open-letter type in which the digits
1, 2, 3, were indicated in the _number of syllables_ of the
successive words. A sentence, “Can you be sure of sufficient
assistance from Mayberry?” indicates the digits 1 1 1, 1 1 3, 3 1 3;
and, if the alphabet of Fig. 4 is the one in use, represents the
letters _A C U_. This is of particular interest in that it is easily
done without involving the awkward turns of language that so often
betray the concealment cipher. (This same contributor, a Mr. Levine,
evolved another cipher, accomplished by an arithmetical process, by
which it was possible to make a cryptogram convey two separate
messages!)
Many writers have shown alphabets of the biform and triform types
applied to open-letter communications by making the significant
factor the _number of vowels_ contained in successive words. Thus,
the sentence given above yields a series 1, 3, 1, 2, 1, 4, 4, 1, 4.
Using a biform alphabet, these are usually considered simply as odd
and even; with a triform alphabet, some disposition must be made
of numbers larger than 3.
1. By PICCOLA.
2. By B. NATURAL.
FOR SALE: Spring coats. All fine Scotch serge, for ensembles. Stoat
trimmed, fashioned right. Black shirred lining, striped. Effective for
brides. Act quickly. - Abraham Batz, 522 Broad, Telephone Exchange 7104-R.
3. By TITOGI.
How about releasing Tony, the gang chief? He don't lie, and is not the
true slayer either. Let us be friends. I am all right. Ed Lehr.
4. By TRYIT.
5. By PICCOLA.
Do not send for any supplies before Monday, at earliest. Order once only,
as men in charge are feeling sore about your threat to encourage the
mutiny at Ford's. - Wilson.
CHAPTER III
Transposition Types
Figure 5
A D E H I L M P
X X X X
B C F G J K N O
Plaintext message: A B C D E F G H I J K L M N O P.
Cryptogram (a) A D B C E H F G I L J K M P N O.
Cryptogram (b) A D E H I L M P B C F G J K N O.
Figure 6
1 4 53 18 55 6 43 20
52 17 2 5 38 19 56 7
3 64 15 54 31 42 21 44
16 51 28 39 34 37 8 57
63 14 35 32 41 30 45 22
50 27 40 29 36 33 58 9
13 62 25 48 11 60 23 46
26 49 12 61 24 47 10 59
Often, two ciphers will differ from each other only in the method
by which their cryptograms are produced; oftener, there will be an
actual difference, but one which is purely superficial. For instance,
we have just mentioned a plaintext unit _A B C D E F_ as having been
transposed with a key 6 2 1 4 3 5 to result in the order _F B A D C E_.
Identically the same numerical key, used in another way, will
transpose this unit in the order _C B E D F A_. The two resulting
cryptograms would be different, but the _kind_ of cryptogram would not.
Three of the many possible _routes_ are shown in the three (partial)
cryptograms of the figure. In this connection, the American popular
terminology seems to favor _horizontals_ and _verticals_, rather than
“rows” and “columns.” The writing in or the taking out of a text is
said to be done by _straight horizontals_, or by _reversed horizontals_
(backward), or by _alternate_ (or _alternating_) _horizontals_
(written alternately in both directions). Similarly, we find ascending,
or descending, or _alternate verticals_; and again the _diagonal_
routes will be described as _ascending_, _descending_, or _alternate_.
The route may also be a _spiral_ one, and in this case it is said to
be _clockwise_ or _counter-clockwise_.
Figure 7
L E T U S Cryptograms:
H E A R F
R O M Y O (a) By descending verticals, from the left: L H R U C
U A T O N
C E C O N C N E E E O A E E G L T A M T C R J S U, etc.
C E R N I
N G J E W (b) By alternating verticals from the right, top:
E L S Q Q
S F O N N I W Q Q E N O O Y R U T A M T, etc.
(c) By diagonals: L H E R E T U O A U C A M R S C E T Y F N E C O O,
etc.
For all of these routes, the point of beginning is nearly always one
of the four corners, except in the case of the two _spiral_ routes,
which are just as likely to begin with a central letter, particularly
when the rectangle is a square. Colonel Parker Hitt, in his _Manual
for the Solution of Military Ciphers_, shows the same series of
letters written into forty different blocks, always beginning at one
of the four corners.
Figure 8
A E I
B D F H J
C G K........etc.
Taken off: A E I & B D F H J & C G K...
Figure 9
[ (N) ...
[(S) (O) ( ) ...
[(T)(I) ( )( ) ...
[ (K) ...
[(R)(E) ( ) ...
[ (W)( )( ) ...
Cryptogram: N S O T I K R E W.
In the figure, a 9-letter message, STRIKE NOW, has been written into
the first three columns of such a grille, and, taken off by rows,
comes out in the order _N_, _SO_, _TI_, _K_, _RE_, _W_. While the
figure shows this cryptogram regrouped in the usual fives, the
original method, as prescribed with the device, would have grouped
it in threes, that is, to correspond with the number of apertures per
column. This would facilitate the operation of decipherment, which is
as follows: Count the number of letters in the cryptogram _and divide
this number by 3_, in order to find how many columns were used. Cover
(or ignore) the unused portion of the grille, write the cryptogram by
straight horizontals into the uncovered portion, then read, or copy,
by descending verticals. The recipient of the present cryptogram,
for instance, finds nine letters, divides this number by 3, thus
ascertaining that three columns were used, covers up the other nine
columns, then, proceeding by straight horizontals, places one
cryptogram-letter wherever he sees a hole. Having thus restored all
letters to their proper columns, he has the plaintext message before
him. It will be noticed that an encipherer uses only the number of
columns that he needs. His last column does not have to be completed
with nulls, as in the case of complete-unit ciphers.
Figure 10
2 1 L E T U S H E A R
5 4 3 2 1 F R O M Y O
0 9 8 7 6 5 4 3 2 1 U
7 6 5 4 3 2 1 A T O N
3 2 1 C E C O N C E R
4 3 2 1 N I N G J E W
7 6 5 4 3 2 1 E L S Q
Some attempt has been made, too, to evolve cipher machines which will
produce effective transpositions, but our understanding is that these
have never been accepted as worthwhile. The accomplishment of
transposition by mechanical means is far from new. In fact, the
oldest transposition cipher of which we have any record was
accomplished by means of the Lacedaemonian _scytale_. The Spartan
general, departing for foreign conquests, carried with him a rod,
or scytale, of exactly the same diameter as one retained by the
administration. When it was desired to communicate matter of a
confidential nature, the sender, using a narrow strip of parchment,
wound this carefully around his scytale with edges meeting uniformly
at all points, and wrote his message lengthwise of the rod. When the
strip was unrolled, the message appeared as a series of short
disconnected fragments, one letter, or two letters, or portions of
one or two letters. It was presumed that no person would be able to
read the message without being possessed of a duplicate scytale on
which to rewind the strip. We are left to suppose that this
presumption was justified by fact, though the decryptor of today
would make short work of such a system. The scytale, we believe,
is the oldest known cipher of any kind, and is still serving today
as the emblem of the _American Cryptogram Association_.
* * *
7. By TITOGI.
T S S N I H A Y S T I N T P I S E R O O I A A S N.
Also this: S H C V I E O L E A E W E R M.
T G H M R R I A Y E X N U E E S D E X S H M T I D E Q U O A Y R O A U
N P U E T G T I T E S Y S N O A Q N X A T U A D S I S H X.
9. By PICCOLA.
W I N T A H D A E S W H L E T Y L W A I L H O Q L A S S S A S Q.
L E A S U L T S G M S L O E I E O I M E A R N S A S R C D E K I U S U
H E M A Q L Y S P R M E O A.
B S P N T E A E F T V V O A N E Y A P U Z S E T P T H M N A T A E E R
S D S S K P S J E S T Y S E A L R H I A S K S N T T E Y W O F T H M W
Y K E F E N N H C I E H H U M I H I T E O H G E S U C G D I O O W E A
S A S N E R H M A A S S L E R G S M N E D T H K E M L U A E T V M F O
R A I W P A Y A M A E Y A D.
A A F R S R T N E A R B N E E O H S R L T I A P D U E O S I I T T A T
G L F O T S O U S H H E P N Y.
F A A T R M N O A T I L V I S Y G U C F F I O O E P S N K L T O I N V
R T T O A H N D N E E R E N N B M P U N P O R R K A U O M E A N A I E
T S S B N R G T G S T T I E E I C T H R.
14. By PICCOLA. (This is serious advice!)
F F L T A A R N I E U O R N T O T D L A N R W S O I A T T E Y B A N T
M E H S K O G R Z E P S R E I O A O A M S S S M A L P I L Y S.
Q Y T E Y O F U B U Q E H I H T E C H T H S A U A O N S I T I T T T I
E T T E L L S E A P L T N T.
CHAPTER IV
Geometrical Types — The Nihilist Transposition
Figure 11
H A L I F A X
4 1 6 5 3 2 7
L E T U S H E
A R F R O M Y
O U A T O N C
E C O N C E R
N I N G J E W
E L S X X X X
Cryptogram: E R U C I L H M N E
E X S O O C J X L A O E N E U, etc.
The key, used exactly as described, is a “taking off” key, and
this is the common way of using one. It can, however, be used for
“writing in” the successive units, placing the first letter of a
given unit beneath number 1, the second letter beneath number 2,
and so on until the seventh letter has been written below number 7,
afterward beginning with the first letter of another unit below
number 1 again. Under this plan the first unit of our figure,
_L E T U S H E_, would have been _written in_ in the order
_U L H S T E E_. Since all units would follow exactly the same
pattern, the resulting _columns_ would be identical with those of
the present block; the only essential difference would be that the
new columns are already transposed, and can be taken off in straight
order. The two resulting cryptograms, however, would not be the same.
The unit which was _written in_ in the order _U L H S T E E_, would
have been in the order _E H S L U T E_ had the method been that of
_taking out_ (or “off”).
Figure 12
Nihilist Plan
S C O T I A S-5 E U J W T O
5 2 4 6 3 1 C-2 R A F O R E
O-4 A N E B C O
S E U H T L (Let us h) T-6 X L X X S E
R A F O R E I-3 A Y U T O M
A Y U T O M A-1 S E U H T L (Let us h)
A N E B C O
E U J W T O (c) Cryptogram: E U J W T O R A F O R E A N E
X L X X S E
B C O X L X X S E A Y U T O M S E U H T L.
But suppose, having marked off such a text into ten-letter units,
or segments, we take each of these segments individually and mix
up the order of its letters, though still allowing it to stand
where it is. And suppose, having done this, we erase the original
division-marks and, beginning at some point in the midst of a former
segment, we again mark off a series of ten-letter units, and count
the vowels of these new segments. This time, we are just as likely
as not to find seven or eight vowels in one segment and none at all
in the next, depending on just what we did to the old units, and
still we have not actually mixed the units; we simply have our
division marks in the wrong places. Imagine, then, how the vowel
distribution can vary when a transposition is one so planned as to
break up units and scramble their letters.
Figure 13
5 2 4 6 3 1 5 2 4 6 3 1 5 2 4 6 3 1
5 5 5
2 2 . A . . . E 2 R A F O R E
4 4 4
6 6 6
3 3 3 . Y . . . M
1 . E . . . L 1 S E U H T L 1 S E U H T L
The decryptor, hoping for the best, writes his cryptogram into a
square (or series of squares) by straight horizontals and counts the
vowels per horizontal line. If his block is wide, he may estimate
the actual number of vowels represented by 40%; if it is narrow,
he may only roughly approximate the number; but in either case what
he hopes to see is _evenness of distribution_. More than half of
his units must be exactly normal, and any which are not exactly
normal must show the smallest variation possible. If he finds that
this is the case, he assumes that his block arrangement is the
encipherer’s original square, with only the minor possibility that
half of his lines may be written in the wrong direction. If his
distribution is not uniform, he counts the vowels per _column_ so
as to find out what kind of distribution he would get from a
vertical arrangement (ascending or descending). If this, too, fails
to show him a uniform vowel distribution, he writes out a new block
by the route of alternating verticals (or gets this count from his
first block; this is possible, though a little confusing). Afterward,
he may go on to the diagonals and spirals until finally he reaches
the arrangement in which more than half of his horizontal lines show
a 40% vowel count, and the rest a minimum variation.
Figure 14
I Y W B B O R T A F T I X D G S S E G H N A T O O I T O X T L U T R E
L X F A Y S D R C H T O M E D E I O V I K F T V T L A E U.
Assuming, then, that the large unit, 64, is correct, we must get it
back into its block — presumably square — in the encipherer’s
original arrangement. Fig. 15 shows the same cryptogram written
into two different blocks. For an 8-letter unit, the normal number
of vowels is about 3 (actually 3.2). In block (a), a count taken on
the horizontal lines shows half of the units normal, two of the
others with the smallest possible variation, and two greatly outside
the 35%-45% limits. When the unit is so short, and when the line
containing only one vowel may be the one which was completed with
nulls, and most particularly when we have no other units to act as
a check, we cannot confidently discard a block of this kind. In
practice, we might waste some time giving it a trial, or we might
look for something better. Notice that its distribution is “ragged.”
We expected to find _even_ distribution, with _more_ than half of
the units exactly normal. This block (a) is the simple horizontal
arrangement. To find out what the simple vertical arrangement would
give us, we have only to examine the columns of this. Here the count
is obviously bad.
Figure 15
I Y W B B O R T 3 I W O F G N O L 3
A F T I X D G S 2 Y B A D H T E R 3
S E G H N A T O 3 B T X G I R D E 2
O I T O X T L U 4 R I E O T S M V 3
T R E L X F A Y 3 T S O U Y O O T 5
S D R C H T O M 1 S T L A T I F L 2
E D E I O V I K 5 A T F H E K T E 3
F T V T L A E U 3 X X C D I V A U 3
4 3 2 3 1 3 4 4 3 1 4 3 4 2 4 3
(a) (b)
1 2 3 4 5 6 7 8 6 5
I W O F G N O L N G
Y B A D H T E R T H
B T X G I R D E R I
R I E O T S M V S T
T S O U Y O O T O Y
S T L A T I F L I T
A T F H E K T E K E
X X C D I V A U V I
(c)
6 5 7 ........ 6 5 7 4 ... 1 6 5 7 4
N G O N G O F I N G O F
T H E T H E D Y T H E D
R I D R I D G B R I D G
S T M S T M O R S T M O
O Y O O Y O U T O Y O U
I T F I T F A S I T F A
K E T K E T H A K E T H
V I A V I A D X V I A D
(d)
6 5 3 ........ 6 5 3 4 ...
N G O N G O F (Abandoned in
T H A T H A D
R I X R I X G favor of c.)
S T E S T E O
O Y O O Y O U
I T L I T L A
K E F K E F H
V I C V I C D
The formation of this digram _TH_ on the second row has automatically
set up a digram _NG_ on the top row, a digram _RI_ on the third row,
and so on; and we find, upon examining these newly-formed digrams,
that the whole series is made up of good English combinations. Thus,
it looks as if our combination 6-5 is correct, and we will proceed
with a possible _HE_ or _HA_, attempting to complete a trigram _THE_
or _THA_ on the second row.
Both _E_ and _A_ are present on the second row, and we may observe
at the steps marked (c) and (d) in the figure just what would be the
result of adding strip 7 or strip 3. At first glance, it appears that
combinations 6-5-7 and 6-5-3 are about equally probable. But it so
happens that both set-ups have formed a sequence _YO_ on the fifth
line, suggesting _YOU_; and when the only _U_ on that line is tried
in both places, it becomes evident that combination 6-5-7-4 is going
to give better results than combination 6-5-3-4, where we find poor
sequences like _KEFH_. At this point, or earlier, a decryptor will
probably proceed on the left side of his set-up, completing the
syllable _ING_ and the series of column-numbers 1-6-5-7-4, as shown.
When this setting together of columns automatically brings out on
the third row a sequence _BRIDG_, we have our first suggestion of
a _probable word_, since the man who had this cryptogram on his
person had just attempted to blow up a _BRIDGE_. After this, all is
plain sailing; the necessary _E_ happens to be on the same line, and
even if it were not, we have only three strips left, and these may
be placed by trial. Thus our eight paper strips arrive at the stage
indicated on the left-hand side of Fig. 17.
Figure 17
2 1 6 5 7 4 8 3
1 W I N G O F L O 2.... B Y T H E D R A
2 B Y T H E D R A 1.... W I N G O F L O
3 T B R I D G E X 6.... T S I T F A L L
4 I R S T M O V E 5.... S T O Y O U T O
5 S T O Y O U T O 7.... T A K E T H E F
6 T S I T F A L L 4.... I R S T M O V E
7 T A K E T H E F 8.... X X V I A D U C
8 X X V I A D U C 3.... T B R I D G E X
"Taking-out" Key: 2 1 6 5 7 4 8 3 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 "Writing-in" Key: 2 1 8 6 4 3 5 7
Speaking now of the ordinary columnars (Fig. 11), one minor point
should perhaps be brought to the attention of the very new student.
Quite often, a digram, such as the _QU_ of Fig. 18, is not written
on a single line, and it may be necessary to match this valuable
digram in the manner shown at (b) of that figure, coming out in the
end as at (c). In such event, we can later on transfer columns 5-6-7
to the other side of the block, raising them all by one position.
(Column numbers, in this case, are for reference only.) The same
would not apply to a Nihilist block in which the whereabouts of the
“next” row is unknown; the digram_ QU_ would have to be abandoned in
favor of something else.
Figure 18
1 2 3 4 5 6 7 1 1 2 3 4
7 5 6 7
T H I S I S Q T T H I S
U I T E T R U Q U I S Q U I T E
E B U T W E D U E T R U E B U T
D W E D
O E E H E A T F L S V A S Y C I O A E D Q O H D F M C M T C P O G E O
R E U G M I E F U O G C Y W G D Q U U I A L S I E R N O R N R R A T O
A Q.
T C I G R H N L A G T L I S A A O M O R N R I M N N E T R N K S A O E
I S D L E I K H H H E R D F T A S O I E T I H N E B T K E.
T O L F P T E E R B I V O P S N R E W O R L I T T E S E N E T O O H O
F H H E H N Y H I O P F O S T G I P H E I E E T K I N U I B N R A A Y
R R E E W L S T H T E E R D T S E A I R S R E A E R R E P E U E U R S
S U I R R O F E S T R P O P A O R R B E E O N T T E E R T A H E R A R
L A D I O E E Z E L Y A O A Y M S L U L W I Y N N O O S S T G T S H L
W E Y M D M E A R E E U R I Y T P P R N Y N T Y O.
Wants Little Wish Should Long Muster But The Man And Gold Wants If Me
Many Below Mint For Not A So And Nor Of More With Score In Song
Wants
Were I That Told Exactly Are Here A Long 'Tis Many 'Tis My But Each
Still Little Would So!
T W E I S I A H O D S P O D E R I T O N J E U T A I A S Y S H N T S T
K D N R S W U.
T E E P H B M E F E B N T U X A V E H A R D W X I E L N C V E V R O I
T A F U L B O R O N T H M T M U E F S H O E T T L E D A K E E G D N L
E E N N I O O E B E E E R S T N R Y D C N X O N O E N E X.
H E L K L T I P N W H S E S I A X S R R E E A C M C P L T L T E O S D
R A O E E X T I H Y E U H N G E M Y T A S L M A A D S C.
CHAPTER V
Geometrical Types — The Turning Grille
There are, of course, many ways in which a key could be applied. The
method used here is one published several years ago by Ohaver, and
can be studied in Fig. 19. First, as shown at (a), we have a quick
mechanical method for selecting apertures that cannot conflict. The
square is divided into four quarters, and each quarter, treated as
if it were the one occupying the upper left-hand corner, receives
its consecutive cell numbers, 1 to 9 (or 1 to 4, 1 to 16, 1 to 25,
1 to 36, etc.). If the route of writing-in is made exactly the same
for all four of the quarters, it becomes possible to clip _one each_
of the numerals 1, 2, 3, 4, 5 . . . . . . . etc., taken absolutely at
pleasure, and each resulting aperture will expose only its particular
four cells. This can be seen at (b).
(a) (b)
Top
1 2 3 7 4 1 _ _ 3 _ _ _
4 5 6 8 5 2 _ _ _ _ 5 2
7 8 9 9 6 3 _ 8 _ _ _ _
3 6 9 9 8 7 _ 6 9 _ _ 7
2 5 8 6 5 4 _ _ _ _ _ _
1 4 7 3 2 1 _ 4 _ _ _ 1
(c)
F R I E N D L Y G
3 8.5 2.7 1.6 9 4 1st Q: 3,8; 2d: 5,2; 3d: 7,1; 4th: 6,9,4
In Fig. 20, at (a), (b), (c), (d), we have a detailed picture of the
operation of this grille on the 36-letter plaintext unit: MISFIRE ON
VIADUCT JOB X RUSH INSTRUCTIONS. One definite edge of the grille must
be designated as the top, and there is a right and a wrong side.
Taking precautions in these respects, we place the grille over a
sheet of paper and mark its outline with a pencil (or otherwise make
sure of maintaining this one location). We write the first nine
letters as at (a), and give the grille a quarter-turn to the right.
We add the second nine letters as at (b) — where the newly-written
letters are the capitals; the others, in lower case, are presumed to
be hidden from sight by the solid portion of the grille. Another
quarter-turn makes ready for the next nine letters (c), and a
remaining quarter-turn completes the revolution (d). The writing-in,
at all times, is _straight ahead_: cells taken from left to right,
and lines taken from top to bottom.
(a) (b)
_ _ M _ _ _ _ _ m _ _ _
_ _ _ _ I S V _ I A i s
_ F _ _ _ _ _ f D _ _ U
_ I R _ _ E _ i r _ _ e
_ _ _ _ _ _ _ _ _ _ C _
_ O _ _ _ N T o J _ O n
(c) (d)
B _ m _ X _ b T m R x U
v _ i a i s v C i a i s
R f d U S u r f d u s u
_ i r _ H e T i r I h e
I N _ _ c _ i n O N c S
t o j S o n t o j s o n
In the Jules Verne story, the three units of his cryptogram were left
standing in their blocks. Verne’s heroes were clever enough to
unearth a ready-made grille, and, by laying this, in its four
successive positions, above each of the three blocks, were able to
read the message through the apertures. Today, such blocks would be
taken off in five-letter groups, and possibly by a devious route. A
little concealment can be afforded, too, by completing the last
five-letter group with nulls, or, better, by adding these nulls at
the beginning of the cryptogram. It is also possible to make the
final 36-letter unit _incomplete_ by blanking out its bottom cells
before putting in the letters.
* * *
In the present case, however, our first letter, _V_, is found near
the top of the square, and only once, so that if the word VIADUCT is
present, a substantial portion of it must have been written before
the grille was turned. We expect to find letters _I_, _A_, _D_, _U_,
and so on, following the letter _V_ in just that order, and without
any very great distance between any two of them; and if, approaching
the bottom of the square, we find it necessary to proceed backward
for _U_, _C_, or _T_, then the grille was surely turned before that
_U_, _C_, or _T_, was written.
Now, considering together the two blocks of Fig. 21, we find that our
first letter, _V_, occupies cell No. 7. In imagination, we revolve a
grille in which the only aperture has been cut in cell 7, and find
that this aperture exposes the cells numbered 5, 30, and 32. These
three cells, then, were surely covered from sight when the letter
_V_ was written into cell 7, and regardless of what the letters are
that occupy these three cells, it is definitely impossible that any
one of the three could have been used in the same minor unit with the
_V_ of cell 7.
Looking for a letter _I_, we find several within a very short range.
But the block contains only one _A_, and since we cannot proceed
backward after selecting the _I_, the position of _A_ (cell 10) tells
us that only the _I_ of cell 9 is possible. We accept, then, the _I_
of cell 9, and, again revolving an imaginary grille with its only
aperture cut in cell 9, we eliminate the letters found in cells 17,
28, and 20. Similarly, accepting _A_ of cell 10, we eliminate
whatever letters are occupying cells 23, 27, and 14. So far, none of
the letters eliminated have been wanted for the development of the
word VIADUCT; but notice that the fourth letter, _D_, found only
once in the block, occupies cell 15, thus eliminating the letters of
cells 16, 22, and 21, one of which is _U_, the next letter
needed. Thus, we are not forced to make a decision as between the _U_
of cell 16 and the _U_ of cell 18.
Figure 21
1 2 3 4 5 6 B T M R X5 U
7 8 9 10 11 12 V7 C I9 A10 I S
13 14 15 16 17 18 R F D15 U S U18
19 20 21 22 23 24 T19 I R I22 H E
31 32 33 34 35 36 T O32 J S O N
Figure 22
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
B T M R X U V C I A I S R F D U S U
N O S J O T S C N O N I E H I R I T
36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19
19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
T I R I H E I N O N C S T O J S O N
U S U D F R S I A I C V U X R M T B
18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
Working with digrams is tedious, but will, in the end, give results.
Considering, for instance, Fig. 22, its first letter is _B_. Of
letters standing immediately to the right of _B_, the first one which
would form a good digram with it is the _R_ of cell 4. But
consideration of a possible digram _BR_, cells 1-4, shows the
check-digram as _JN_, cells 33-36, and this latter digram is so rare
in the language that Meaker did not find it even once in his
10,000-letter text. The next letter known to have an affnity for _B_
is the _U_ of cell 6, but a possible digram _BU_, cells 1-6, cannot
be considered, for the reason that cells 1 and 6 are uncovered by the
same opening in the grille. The distance away of the next letters to
which _B_ is partial proves frightening, and _B_ is abandoned (it is
actually followed by the _X_ of cell 5).
Figure 23
R R T H A O U E E O S B A G D E A E
A V E B K U N E S F D I A N K S S S
T A D P E B R A N S U K O D X F D N
C R E A R R N J A T I Y G O A O A R
A O I L I D X T U S O B R A A N L E
T S G T E P L M A O T V H R A X E X
Beginning over, with _T_ of cell 2: The first frequent digram noticed
is _TR_, cells 2-4, and shows the check-digram as _JO_, cells 33-35.
We accept this at once, because the letter _J_ must presumably be
followed by a vowel, and the only vowel immediately available is
this particular _O_. To extend the accepted _TR_, we require a vowel.
The first one is U, cell 6, and extends the check-digram to _TJO_,
cells 31-33-35, acceptable if _T_ is the final letter of a word. To
extend the supposed trigram _TRU_, we experiment with _C_ of cell 8
and obtain a check-sequence _CTJO_, cells 29-31-33-35, which is still
encouraging. We must know, of course, that no two of the chosen cells
are in conflict with each other. The unit we have partially
reconstructed is the second one of Fig. 20, and the check-sequence
is the fourth unit.
Figure 24
Straight Reversed
7 8 9 28 29 30
A V E L I D
N E S S O B
A N K N L E
Now, in order to arm ourselves against the larger grilles, which are
somewhat more troublesome, and for investigation of cryptograms which
may or may not have been accomplished with a grille, suppose we take
a look at Ohaver’s mechanical method — that is, his use of paper
strips. Picturing any block of 36 cells, numbered consecutively as we
saw these in Fig. 21, let us imagine that there is a grille placed
over this block, and that this grille has only one opening. If the
cell that shows is No. 1, then, at the first turn of the grille, we
uncover cell No. 6; at the next turn, cell No. 36; and, at the final
turn, cell No. 31. We will call this series of cell-numbers an
_index_, and say that the index for this particular aperture is
1-6-36-31. In the first block of the new cryptogram, the letters
which follow this index are _R O P T_. In the second block, the same
index governs the letters _U B V L_, and, in the third block,
_A E X H_. But if the single opening in our hypothetical grille has
exposed cell No. 2, then its _index_, discovered in the same way, is
2-12-35-25, and the corresponding letters, in the three blocks of
this cryptogram are, respectively, _R U E A_, _E I T X_, and
_G S E R_. Similarly, each one of the other seven apertures possible
in this quarter of the grille has an index, expressible in
cell-numbers, and governs a certain series of letters in each
cryptogram block. If the grille is the Fleissner, the index for any
aperture, in a grille of any size, will always contain four numbers,
and will govern four letters per block.
Figure 25
Preparation of Slips
Index....... 1 2 3 7 8 9 13 14 15
6 12 18 5 11 17 4 10 16
36 35 34 30 29 28 24 23 22
31 25 19 32 26 20 33 27 21
1 2 3 7 8 9 13 14 15
6 12 18 5 11 17 4 10 16
36 35 34 30 29 28 24 23 22
Block 1...... R R T A V E T A D
O U B A K E H B P
P E T D I L R R A
T A C S O R G I E
R R T A V E T A D
O U B A K E H B P
P E T D I L R R A
Block 2...... U E E N E S R A N
B I K S D U O F S
V T O B O S Y I T
L X N M T J A U A
U E E N E S R A N
B I K S D U O F S
V T O B O S Y I T
Block 3...... A G D A N K O D X
E S N A S D E S F
X E X E L N R A O
H R G R A O A A A
A G D A N K O D X
E S N A S D E S F
X E X E L N R A O
Now, to read the cryptogram: Each full row of numbers includes all
cell-numbers belonging to some one of the four units, and any one of
these four rows of numbers is a key to the grille, since it shows
exactly what cells were uncovered when the corresponding unit was
written in. To obtain the grille, we have only to select some one row
of numbers, as 12-36-10-16-34-9-26-32-13, and clip out these
particular cells in a square numbered as we saw it in Fig. 21. The
student who cares to know what “instructions” were being sent might
also satisfy his curiosity as to whether or not this new cryptogram
could have been deciphered rather than decrypted.
Figure 26
┌────┐ ┌────┐
│ 9 ├────┬────┤ 13 │
┌────┐ ┌────┤ 17 │ 8 │ 7 │ 4 │
┌────┤ 1 ├────┬────┤ 3 │ 28 │ 11 │ 5 │ 24 │
│ 2 │ 6 │ 14 │ 15 │ 18 │ 20 │ 29 │ 30 │ 33 │ ****
│ 12 │ 36 │ 10 │ 16 │ 34 │ 9 │ 29 │ 32 │ 13 │
│ 35 │ 31 │ 23 │ 22 │ 19 │ 17 │ 26 │ 7 │ 4 │**
│ 25 │ 1 │ 27 │ 21 │ 3 │ 28 │ 8 │ 5 │ 24 │
│ 2 │ 6 │ 14 │ 15 │ 18 │ │ 11 │ 30 │ │
│ 12 │ 36 │ 10 │ 16 │ 34 │ │ 29 │ │ │
│ 35 │ │ 23 │ 22 │ │ E │ │ │ T │
│ │ │ │ │ │ E │ V │ A │ H │
│ │ R │ │ │ T │ L │ K │ A │ R │
│ R │ O │ A │ D │ B │ R │ I │ D │ G │ ****
│ U │ P │ B │ P │ T │ E │ O │ S │ T │
│ E │ T │ R │ A │ C │ E │ V │ A │ H │**
│ A │ R │ I │ E │ T │ L │ K │ A │ R │
│ R │ O │ A │ D │ B │ │ I │ D │ │
│ U │ P │ B │ P │ T │ │ │ │ │
│ E │ │ R │ A │ │ S │ │ │ R │
│ │ │ │ │ │ U │ E │ N │ O │
│ │ U │ │ │ E │ S │ D │ S │ Y │
│ E │ B │ A │ N │ K │ J │ O │ B │ A │ ****
│ I │ V │ F │ S │ O │ S │ T │ M │ R │
│ T │ L │ I │ T │ N │ U │ E │ N │ O │**
│ X │ U │ U │ A │ E │ S │ D │ S │ Y │
│ E │ B │ A │ N │ K │ │ O │ B │ │
│ I │ V │ F │ S │ O │ │ │ │ │
│ T │ │ I │ T │ │ K │ │ │ O │
│ │ │ │ │ │ D │ N │ A │ E │
│ │ A │ │ │ D │ N │ S │ A │ R │
│ G │ E │ D │ X │ N │ O │ L │ E │ A │ ****
│ S │ X │ S │ F │ X │ K │ A │ R │ O │
│ E │ H │ A │ O │ G │ D │ N │ A │ E │**
│ R │ A │ A │ A │ D │ N │ S │ A │ R │
│ G │ E │ D │ X │ N ├────┤ L │ E ├────┘
│ S │ X │ S │ F │ X │ └────┴────┘
│ E ├────┤ A │ O ├────┘
└────┘ └────┴────┘
* * *
The shortest road is that of the probable word. For instance, the
set-up shown as Fig. 26 was actually initiated by the solver at the
letter _J_ of the second block, this being a rare letter and almost
invariably followed by a vowel. Of the several vowels immediately in
sight (in the square) the correct one was promptly suggested by the
sequence so plainly in sight, _OB_, suggesting the word _JOB_, one
already used by these people in discussing their mysterious
activities. The corresponding cell-numbers, 20-29-30, were found to
be on three separate strips — a necessary condition — and when placed
together brought out the straight sequences _RID_ and _OLE_, with
reversed sequences _AVE_, _NEU_, and _AND_. Another very probable
word was suggested by the check-sequence _AVE_ (_HAVE_), and the
necessary _H_ was found with cell-number 33, bringing solution to the
point suggested roughly in Fig. 27, where attention was promptly
focussed on the tetragram _RIDG_, suggesting _BRIDGE_, another word
previously used. There were two strips carrying the desired _E_, but
both refused to fit; and here the cell-numbers came into play. The
last one found, 33, was large and suggested that its letter, _G_,
might be the last letter of a unit; afterward, the building was
continued on the left, with _B_.
Figure 27
Straight Reversed
20 29 30 33 17 8 7 4
R I D G E V A H (Have)
J O B A U E N O (one u)
O L E A D N A E (e and)
A E K D S P V T O O N N A A O N R O N P R O C T I E H T R E H N E T I
A F G S R H T N I L O V T E F F A L M K I E C L A A S N M.
E Y U I S S N S F P A O P E R I S C O A M N R A I R G A A T A L I M N
E G E E I S O S N O S A D N B E I T N O N G U E P R H T E E W S R U A
S S K V Y P I T O N O U E Y S O C M W O T N S T E U O B D G.
25. By SAHIB.
R N I I I N G T F L A I L N N D E E T D R V E U S E S T H R E I G E Y
F I A N O U R R D L G Y T N H A E O N R N E K C D E E I S E Y B S E F
W Y P G R L O L O E U O F H P A T V E R E H E R A E D G M I T R H N E
E I S Y T Q T S I I S A U S G I E A I C A S L L K L L T T X H V H E A
R X A X.
26. By NEMO.
I K O T H N N E H N E E I R C R A G E L O R N O H K T W T C H O H E I
E S S W W T N E T R H A R E O L S P L A A G E A E R L D B R Y E U I T
R T R E N I D T H E I A D E I E N D P D A B R A E C R K E M T A O A U
T O T S Y N B P E S N U H E S R A H E S U P D.
O L T L A L I G E R T I V H E L L E R K I E A E I J F E I Y Y O O U U
S T H E A V A S G Y A S A W C K E P L U E Z T I Z O S I T.
H S O E S N P T A E T O H I S T W L E D T T F A I B T Y U Y O T C E O
I I T R C Y S B T R A H B T E I D O U S C I U O K R O Q N.
CHAPTER VI
Irregular Types — Columnar Transposition
Figure 28
P A R A D I S E
6 1 7 2 3 5 8 4
R E G R E T C H
A N G E I N S Y
S T E M S B U T
T H O U G H T A
D V I S A B L E
A C C O U N T I
N C R E A S E D
V O L U M E S E
N T B Y A I R X
X X X . . . . .
Figure 29
P A R A D I S E
6 1 7 2 3 5 8 4
_ _ _ _ _ _ _ _
_ _ _ _ _ _ _ _
...............
...............
_ _ _ _ _ _ _ _
_ _ _ x x x x x
The cryptogram from this block is shown as Fig. 30, and illustrates
the manner in which the decryptor will number the letters of
practically all cryptograms in order that he may quickly locate any
desired letter, or learn, by subtraction, the distance apart of any
two letters. The decryptor, of course, does not know how many columns
the cryptogram contains, and even after he finds out the key-length,
he still does not know exactly the point at which any one column ends
and another begins.
Figure 30
5 10 15 20 25 30
E N T H V C C O T X R E M U S O E U Y E I S G A U A M A H Y
35 40 45 50 55 60
T A E I D E X T N B H B N S E I R A S T D A N V N X G G E O
65 70 75
I C R L B X C S U T L T E S R
Figure 31
6 1 7 2 3 5 8 4
. . . . . . . .
. . . . . . . A
D V I S A B L E
. . . . . . . I
N C R E A S E D
V O L U M E . .
The ideal case is that in which the probable word is long enough to
furnish more than one of these overlapping letters, as shown in Fig.
32 in connection with the “word” INCREASED VOLUME. Suppose that we
have suspected the presence of this expression in our cryptogram, and
have ascertained that the necessary letters are present for forming
it. We consider its letters one by one, in the order _I_, _N_, _C_,
_R_ . . . . and go through the cryptogram, underscoring (or otherwise
noting) all cases in which the given letter is followed immediately
by another of the letters found in the same probable “word.” But, in
considering any one letter, say the letter _N_, we ignore such
sequences as _NT_, _NB_, _NX_, whose second letters, _T_, _B_, _X_,
do not occur in the expression INCREASED VOLUME. Fig. 33 shows
exactly what digrams of this kind can be found in connection with
letters _I_, _N_, _C_, _R_, _E_, and also the distance (or distances)
apart of the two given letters as found in the probable word. Notice
that in connection with every letter there is one digram in which
this distance is 8, the correct key-length of our present cryptogram.
And when these digrams are selected from the tabulation, and set up
vertically with top letters in the order _I N C R E_, the lower five
letters prove up in the order _D V O L U_. In actual work, the
tabulation must sometimes be made, though ordinarily it will suffice
to start directly with the “proving up.”
Figure 32
I N C R E A S
E D V O L U M
E
I N C R E A S E
D V O L U M E
I N C R E A S E D V
O L U M E
Now let us go ahead and solve the cryptogram, as shown in Fig. 34. We
will assume, to begin with, that our cryptogram has been prepared at
the top of a sheet, and that our various trials are being made on the
blank space beneath it. We will assume also that, having discovered
key-length 8, we have divided this cryptogram roughly into eight
segments, three of which contain ten letters and the rest nine.
Figure 33
I IS 6
ID 8
IR 3
IC 2
N NS 5
NV 8
C CO 8
CR 1
CS 4
R RE 1 4 11
RA 2
RL 8
E EM 9 (6)*
EU 8 (5)*
EO 6 (3)*
ES 2
(*) Distances from the second E
Proving up: I N C R E . . .
(8) D V O L U
Figure 34
(a) (b)
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 4 6 1 7 2 3 5 8
A D V I S A B .
I N C R E A S E E A C C O U N .
D V O L U M E ? I N C R E A S E
D V O L U M E .
E N T B Y A I .
(c) X X X X E H R .
(1) (2) (3)
E N T H/V C C O T X/ ¦R E M U/S O E U Y E/¦ I S G/A U A M A H/Y ¦
(4) (5) (6)
T/A E I D E X/T N¦B H/B N S E I R/A¦S T /D A N V N X/G¦G E O
(7) (8)
/I C R L B X║C S U T L T E S R
x
Figure 35
Column 1 must have another letter, top. (Found at bottom of Column 6).
(4) (3)
Column 6 must then have another letter, top. (Found a bottom of Column 5).
(3) (2)
Column 7, bottom, then shows an extra letter, which must be transferred to
(5)
Column 2, top. When these transfers have been made, as shown on
(6)
the right, all that remains is to transfer the short column (1)
(4)
to the right-hand side of its block, raising it by one position.
Having seen the ideal case, the student will understand how the less
perfect example would be handled, or the case in which the probable
word is not long enough to overlap at all. For the latter, he would
attempt to find some word like CRYPTOGRAM, in which there are letters
such as _C_, _Y_, _P_, _G_, _M_, not likely to appear more than once
or twice in a short text. We need not discuss this latter case, since
we are to see something very much like it before the present chapter
ends.
Figure 36
Key 6: 3 columns of 13
3 columns of 12
Key 7: 5 columns of 11
2 columns of 10
Key 8: 3 columns of 10
5 columns of 9
Key 9: 3 columns of 9
6 columns of 8
Figure 37
Q U I T E A F *
E W F A N S W
I L L B E D E
L I G H T E D **
T O S E E
Now let us picture any text written into any block, as in Fig. 37,
where long columns have five letters and short columns have four.
Considering any digram in the text, as _QU_ at the beginning, its two
letters are separated by exactly one column of length, provided the
letters are counted straight down the columns and columns are taken
in one straight direction, or provided the counting is done strictly
upward with columns always taken in one direction. In the case of
_QU_, this column of separation is a long one (five letters), while,
in the case of _AF_, on the right-hand side of the block, it is a
short one (four letters), but in both cases it is a full column. This
is true, also, of the digram _FE_, which is on two different lines,
presuming that, having counted all the way to the end of the last
column, we start again with the first. If both letters are in short
columns, the interval which separates them is that of a short column,
and if both are in long columns, this interval is that of a long
column. But if one letter is in a long column and the other in a short
column, the separating interval may be long or short, according to
whether the columns are taken in straight order or in reverse order.
If _V_ and the first _I_ stood in sequence in the encipherment block,
either as _VI_ or as _IV_, then the interval 41 represents a certain
number of complete columns, and if the digram was _VI_ (since the
_V_-column was evidently taken off first), this interval 41 must not
include the full number of short columns, but may include the full
number of long ones.
* * *
Totally aside from analysis, there are many ways in which the
key-length can become known, or suspected. If the correspondence is a
military one, it may have been learned by espionage, perhaps through
careless talk on the part of an enlisted man; or, because of careless
habits on the part of the authority providing the keys, in having
confined himself always to certain lengths. Knowing the key-length is
two-thirds of the battle. It enables us, as in our former case, to
mark off the cryptogram into its approximate column-lengths, making
it easier to know the approximate whereabouts of any several letters
supposed to form a sequence. It even enables us to prepare a block,
which, cut apart to form paper strips, will effect a mechanical
solution almost as easily as in the case of the completed unit.
Such a block, for our foregoing cryptogram (Fig. 30), can be studied
in Fig. 38, and is explained as follows: An 8-unit key, used on a
75-letter text, calls definitely for three 10-letter columns and five
9-letter columns, and these columns have become eight segments in the
cryptogram. If all three of the long columns were taken off first,
then the arrangement shown at (a) has every letter in its proper
column. And if all three of these were taken off last, then the
arrangement shown at (b) has every letter in its proper column. With
blocks shown for the two extreme cases, it can be seen that the block
at (c) is a combination-block, in which one of the two extremes has
been superimposed upon the other, so that every column in block (c)
shows every letter which it could possibly have contained. By
concealing the letters of the “cap,” we have a duplicate of block
(a); and by changing the alignment, so as to bring all of the topmost
letters into the same row, we have block (b), with a “cap” attached
at the bottom.
Figure 38
E R I T B S G C E X Y A X I X X
N E S A H T E S N R E H T R G C
T M G E B D O U T E I Y N A G S
H U A I N A I T H M S T B S E U
V S U D S N C L V U G A H T O T
C O A E E V R T C S A E B D I L
C E M X I N L E C O U I N A C T
O U A T R X B S O E A D S N R E
T Y H N A G X R T U M E E V L S
X E Y N B R
1 2 3 4 5 6 7 8 . . | 8 | .
a x i 3 . . .
y h t r x . 5 . 4
x e y n a g x y x x a
E R I T B S G C e t C h ←
N E S A H T E S I n S y
T M G E B D O U S B U T
H U A I N A I T G H T A
V S U D S N C L ** A B L E **
C O A E E V R T U N T I
C E M |X I| N L E A S E D
O U |A T R X| B S M E S E
T |Y H N A G X| R A I R X
|X E Y H R T ←
Y A N
Comparing block (c) with the two above it: If the first column of (a)
was actually a short one, then its last letter, _X_, belongs at the
top of the second column. The making of this transfer would cause the
second column to have eleven letters, so that it would become
necessary also to transfer the last letter of the second column to
the top of the third; this third column would then have too many
letters, and its last letter would have to be transferred to the top
of the fourth, which at present has only nine and may have another.
But if the second column was also short, then there are two of its
letters which belong at the top of column 3. And if this column, too,
was a short one, it has three transferable letters at the bottom.
Now suppose we consider this same cryptogram on the theory that its
key-length cannot be determined, or restricted to certain
possibilities. Our first step is to select, somewhere in the
cryptogram, a segment which is to be set up vertically on a sheet of
paper to act as a _trial column_. If we select it from the body of
the cryptogram, we shall have to make it a rather long segment, since
we are uncertain as to whether it represents one column or parts of
two. We should do this, however, if the body of the cryptogram shows
_Q_, or any other letter or series of letters likely to be vulnerable.
Otherwise, we know definitely that one of the columns begins with the
first letter of the cryptogram, and that another column ends with the
final letter of the cryptogram, and one or the other of these two
segments is usually chosen, preferably the one containing the largest
number of vulnerable letters. If we have a probable word, and find
that its letter _P_, or _M_, or _G_, is the only one in the
cryptogram, we select the segment which contains this _P_, or _M_,
or _G_.
Figure 39
Tests, in Attempting to
Judge Column-Length
E G 20 ( 15)
N G 75 ( 83)
T E 94 ( 74)
H O 46 ( 42)
V I 19 ( 14)
C C 12 ( 6)
C R 7 ( 12)
O L 17 ( 36)
T B 14 ( 8)
X X - ( -)
R C 14 ( 7)
E S 145 (115)
M U 13 ( 7)
U T 45 ( 35)
S L 6 ( 9)
Figure 40
(The numbers assigned to these set-ups merely indicate the order in which the
second segments were taken).
1 8 9 10 11 2 3
E U 7 E Y 17 E B 11 E X 17 E G 20 E S E O*
N S 51 N T 110 N N 9 N G 75 N G 75 N O N E
T O 111 T A 56 T S 32 T G 1 T E 94 T E T U
*H E 251 *H E 251 *H E 251 *H E 251 *H O 46 H U H Y*
V U - V I 19 V I 19 V O 6 V I 19 V Y* V E
C Y - C D - C R 7 C I 15 C C 12 C E C I
C E 55 C E 55 C A 44 C C 12 C R 7 C I C S*
O I 13 O X - O S 37 O R 113 O L 17 O S O G
488 508 410 490 290
4 5
(1) (8) (9) (10) (11)
488 508 410 490 290 E E E I
H E 251 H E 251 H E 251 H E 251 H O 46 N U N S
237 257 159 239 244 T Y T G*
H E H A
Ranked in the order: 8, 11, 10, 1, 9 V I V U*
......... C S* C A
C G* C M*
O A O A
Same Test, Using Mr. Ohaver's Digram Frequencies:
6 7
1 8 9 10 11
E S E H*
E U 6 E Y 24 E B 24 E X 14 E G 15 N G N Y
N S 47 N T 97 N N 8 N G 83 N G 83 T A T T
T O 92 T A 64 T S 27 T G - T E 74 H U H A
*H E 305 *H E 305 *H E 305 *H E 305 *H O 42 V A V E
V U - V I 14 V I 14 V O 9 V I 14 C M* C I
C Y 1 C D - C R 12 C I 19 C C 6 C A C D*
C E 46 C E 46 C A 36 C C 6 C R 12 O H* O E*
O I 15 O X 1 O S 35 O R 99 O L 36
512 551 461 535 282
(Set-up No. 2
(1) (8) (9) (10) (11) would have
512 551 461 535 282 been tested.)
H E 305 H E 305 H E 305 H E 305 H O 42
207 246 156 230 240
Usually these trials are made by setting up the trial column (in
pencil) several times in succession, so that several of the possible
combinations can be seen side by side, in order to determine which is
best. Sometimes this can be decided by simple observation. Otherwise,
the combinations can be subjected to a digram test. This is made by
setting down beside each digram, as formed by each pair of columns,
its frequency as taken from a digram chart. These figures are then
added in each of the set-ups, and the supposition is that the
combination furnishing the highest frequency-total will be the
correct one, provided this high total has been produced by all of its
digrams collectively, and not by some one or two individual digrams.
With short columns, such tests are never conclusive, but with as many
as ten or twelve digrams they are nearly always dependable, and even
with only five or six digrams they will often select a correct
combination.
Figure 41
1 2 3 4
Y E 12 D E 39 R E 148 E E 39
E N 101 E N 120 A N 172 O N 145
I T 88 X T 1 S T 121 I T 88
S H 30 T H 315 T H 315 C H 46
G V - N V 4 D V 4 R V 5
A C 39 B C - A C 39 L C 8
U C 17 H C 2 N C 31 B C -
A O 2 B O 11 V O 6 X O 1
308 492 836 332
.....
1 2 3 4
Y E 8 D E 64 R E 139 E E 57
E N 120 E N 101 A N 168 O N 162
I T 90 X T 4 S T 119 I T 90
S H 40 T H 377 T H 377 C H 53
G V 1 N V 1 D V 1 R V 6
A C 35 B C - A C 35 L C 1
U C 11 H C - N C 34 B C -
A O 2 B O 13 V O 9 X O 1
288 560 882 370
It was decided here to choose as the trial column the first eight
letters of the cryptogram: _E N T H V C C O_. This column is filled
with consonants, indicating that those which follow or precede it
might contain a number of vowels; and of the six consonants present,
practically every one could be called a “vulnerable” letter, or, as
we say in the Association, a “clue-letter.” If we wish, for instance,
to choose a column which will fit well on the right-hand side of this
trial column, we can search the rest of the cryptogram for two
consecutive vowels to follow, respectively, _H_ and _V_, and these
two vowels we should expect to find followed, either immediately or
at interval 2 by some letter (usually a high-frequency one) which
will follow at least one of the _C_’s. This kind of pattern,
unfortunately, was found eleven times. In practice, we should
probably abandon it rather than copy down and test eleven
combinations; here, however, the eleven set-ups can all be seen in
Fig. 40, accompanied by serial numbers to show the order in which
their second columns were taken from the cryptogram. Some of these
have not been tested. Of the five retained, particular attention is
called to the fact that the one having the very lowest total is
actually the correct one, as may be seen by turning back to the
encipherment block. But when a single row of corresponding digrams
(_HE_ in the first four set-ups and _HO_ in No. 11), has been
subtracted throughout, it is seen that No. 11 moves upward toward its
proper rank, having now the second highest total. In practice, it
might even be selected in preference to No. 8, which grows erratic
after its fifth digram (frequencies of 0, 55, 0). But the
column-length 5, in practice, is not unlikely, so that a test made
on the right-hand side of our trial column has not been at all
conclusive.
Figure 42
Trigram Observation
1 2 3(*) 4 5
Postponing the decision, then, let us take a fresh sheet of paper and
make some tests for columns which can be fitted on the left-hand side
of our trial column. Here, we find that the best “clue-letters” are
_N_ and _H_, standing at interval 2. To precede _N_, we should like
to find one of the vowels of which it is so fond, and to precede _H_,
we hope to find either _T_ or one of the letters _S_, _C_, _W_. That
is, we hope to find a pattern in the rest of the cryptogram in which
some vowel, other than _Y_, is followed at interval 2 by one of the
letters _T_, _S_, _C_, _W_. This time we find only four segments, and
when the test is made for these, as shown in Fig. 41, the resulting
totals point decisively to the correct combination, which is No. 3.
Notice, in both of these tests, that results are identical whether
the frequency-figures are those counted by Meaker or those counted by
Ohaver: In the test of Fig. 40, the five combinations (using either
chart) are ranked in the order 8, 11, 10, 1, 9, while the test of
Fig. 41 has ranked its four combinations in the order 3, 2, 4, 1.
Selecting, then, combination No. 3 of Fig. 41, let us return to the
doubtful tests of Fig. 40 and attempt to effect a combination between
our No. 3 and some one of the five previously considered worth
retaining. Thus we can make an observation of trigrams, as shown in
Fig. 42.
Figure 43
/E N T H V C C O/T X R E M U X O E U Y E I S G A U A M A H Y
I C R L/B X C S U T L T E S R
Figure 44
I C R L/B X C S U T L T E S R
With the adding of other columns, which can be done on either side of
the set-up, further digram tests can be made (taken only on the two
extreme right-hand or left-hand columns), but in most cases no further
tests are needed. Considering, for instance, that No. 5 is the
combination tentatively accepted, we need a segment from the
cryptogram containing the _U_ which ought (apparently) to follow
_THO_, then the _S_ or _C_ which ought (apparently) to follow _DVI_;
that is, we want to find a sequence _US_ or _UC_ in the rest of the
cryptogram; and this (apparently) should be followed by two vowels in
succession, to fit after the sequences _ACC_ and _NCR_. In other
words, we know exactly what kinds of letters ought to make up the
column which can be added on the right side of combination 5, and even
the specific letters. Or, if it is the left side on which we have
chosen to fit the new column, we need a segment containing the _A_ of
the apparent _ADVI_, followed at interval 2 by the vowel, probably
_I_, which ought to precede a trigram _NCR_.
In Fig. 43, the three segments of set-up No. 5 have been circled out
of the cryptogram (to prevent further use of their letters), and the
segment chosen to fit on the left side of set-up No. 5 has been
underscored, ready to be circled out in case it is found to fit. It
is now possible to see the suggested nine-letter words, ADVISABLE and
INCREASED, the guessing of which would permit us to apply the easy
method first described.
Figure 45
TT TO cv TM TE cv
WO cv WP WC WD
YP vc YU YY YT vc
(QU) (QU) (QU) (QU)
AU AI AA AW vc
RI cv RM RO cv RY cv
IM vc IC vc IG vc IN vc
4 2 2 5
This latter can be seen by looking at the cryptogram (e), where all
segments, as soon as selected, have been circled out. In finding a
column which would complete the very evident word SYSTEM and, at the
same time, furnish a letter suitable to precede _HA_, we find that
this is the end-segment of the cryptogram, and would leave only two
letters — far fewer than the number needed for furnishing another
column.
At (f), we have extended the rest of the columns by two (and one)
letters, except that there is a gap in sequence on the next-to-last
line. At (g), we have transferred the letter which will fill this gap,
leaving a misplaced _X_ at the top; and, at (h), we have placed this
_X_ where it belongs and are now ready to transfer the two misplaced
columns and recover the key. This key, as before, is found by
numbering the segments of the cryptogram, and assigning these
key-numbers to the correct columns in the adjusted block. It is
usually possible to go further, and learn the long words on which
such keys might have been based.
* * *
Figure 46
C U R T A I N S C U R T A I N S C U R T A
4 19 11 16 1 7 9 14 5 20 12 17 2 8 10 15 6 21 13 18 3
R E G R E T C H A N G E I N S Y S T E M S
Cryptogram: E I S R A S T N C S G G E H Y R E M E N T.
P A R A D I S E P A R A D I S E P A R A D
14 1 17 2 7 12 20 10 15 3 18 4 8 13 21 11 16 5 19 6 9
R E G R E T C H A N G E I N S Y S T E M S
Cryptogram: E R N E T M E I S H Y T N R A S G G E C S.
As to possible variations, a cipher with a new name is not necessarily
a different cipher. Fig. 46 shows a cipher originated many years ago
by the cryptologist E. Myszkowsky, and advertised by its inventor as
non-decryptable. The key-word here is repeated often enough to furnish
one key-letter for each text-letter, nulls being added, when
necessary, to prevent the complete unit which would result if key-word
and text were allowed to end at the same point. This long series of
key-letters is then treated as a single word, and is converted to a
numerical key in the usual way, all _A_’s receiving the first numbers,
all _B_’s the next numbers, and so on. The message of the figure is
very short: REGRET CHANGE IN SYSTEMS. Try enciphering this in the
ordinary columnar transposition, using first the key-word CURTAIN,
which contains no repeated letters, and afterward the key-word
PARADISE, which has a repeated letter _A_. In the second case, what
happens to the two columns belonging to the _A_-numbers? Suspecting
a Myszkowsky encipherment, how could you go about unscrambling the
two? Suppose there were three?
Figure 47
R A C K E T
5 1 2 4 3 6
CH I EF W AN T
S YO U TO I NT
ER V IE W SM I
T HX
I YO V HX / EF U IE /...
Cryptogram: I Y O V H X E F U I.....
A O T O I N E H T C T O T L I I A W G E L P R V L R I I R I U A D E O
W L R R R L C M E O N P E P T A V T S O H O E E N L S N P S S B Y T S
L R O P D R G E T S S T S Y A W N E.
T A M L R I T E D W E E D H H N P W O S W R S H C N O I E D O H I L T
C S T N I W A A R C D H H D A I E T P T R L R O W A S E E T A K F P W
G M A T X E K A H D P I L E O F H W G I N H A K S F S S A A A H E H N
D H H E H.
31. By AMSCO. (The "AMSCO" Cipher).
N W L E L N T L C S L W D L Y L N S O O I D F I N R U C H A L N D C B
S I D E A I T E T I K S T B E E O U T J A T I L I A C O R E A Y E E G A
O.
32. By PICCOLA. (Can you recover this nice long keyword from the numbers?)
Y K I E T N T H H E X I A E N U B A K E E W S C S I H T N L N E N E A
K I E O B O L I E E A M C I F T I N A H S K A N I D L G S O E E I T T
S W H L L E U A D H F S H A B E O E N O A N O S C P H S N O D H T X R
N H R E A.
33. By PICCOLA. (An easy Myszkowski. Probable words: SOLVE, CIPHER, COLUMN).
V I N S R C F E A E O O H S E F H L E T F H U N S T N C L T S L C I A
E E S H R H S I R E T T M T S E T E P D T S O I N M R T T H T L O L R U B
E.
E L O S W E A H X P N N T R N H L W I E G E I G E A E Q A G L E A R R
Q L O N K E S Q L O R N X A R S P X S E E A E I P A G L R E P R Y M T
H N K S E I X X A Y.
H R O T E T E T E H I W E O T T D A O D K G DT C E R A I W O S Y N H
Y R H T W.
CHAPTER VII
General Methods — Multiple Anagramming, Etc.
In the past few chapters, we have been looking at all of the general
methods for decryptment of transpositions. We have seen the use of
_factoring_, which determines, for the geometric cipher, what
key-lengths are possible, and, for the irregular one, what
key-lengths are not. _Vowel-distribution_ has enabled us, in some
cases, to determine the length of major units, or has assisted in the
restoration of minor units to their original intact groups.
_Anagramming_ has been seen throughout: the matching of letters and
columns with or without the application of language statistics.
Figure 48
1 2 3 4 5...
T│ H│ W│ S│ E│
──┘ │ │ │ │
S I│ O│ E│ .│
─────┘ │ │ │
D L U│ E│ .│
────────┘ │ │
B O T M│ .│
───────────┘ │
← . . .│
──────────────┘
Cryptogram: T H W S E S I O E....
Figure 49
1st Encipherment
P A R A D I S E
6 1 7 2 3 5 8 4
R E G R E T C H Primary Cryptogram
A N G E I N S Y
S T E M S X X X (Not usually
X taken off)
E N T R E M E I
S H Y X T N X R
A S X G G E C S Final Cryptogram:
X
N H S R X, G E T G I, R S M N E, E S A X T, Y X E X C.
Why, then, would it not be possible to use such a cipher for general
communication? To this, there are two answers. For transposition
cipher, taken as a whole, has two very serious drawbacks.
First, a transposition, in order to be a good one, must be a
transposition of the whole text, and not a series of short individual
transpositions. Thus, it becomes possible that an error, either in
the encipherment or in the transmission, will not be confined to one
small area, but will garble the whole message. In this way, we have
not only the delay during which the legitimate decipherer is
attempting to decrypt his own message, but, should he fail, the
danger which lies in having it repeated. The decryptor who has been
provided with both the correct and the incorrect version of a same
cryptogram, is often able to figure out both the system and the key.
The other drawback is the danger which lies in the fact of so very
many cryptograms. These, originating at many different sources, and
all enciphered with the same key, will invariably include many of
_identically the same length_. The nature of transposition cipher
makes it inevitable that when any two texts of exactly the same
length are enciphered with the same key, they will follow exactly the
same route. The first letter in both messages will be transferred to
exactly the same serial position in both cryptograms; the second
letter in both will be transferred to another same serial position,
and so on. If we are able to match correctly any two or three letters
in one of the cryptograms, the two or three corresponding letters of
the other cryptogram will also be correctly matched and will serve as
a check. This being the case, any two or more cryptograms which are
found to have the same length can be written one below another so as
to place corresponding letters in the form of columns, and the
problem is reduced to one of _geometric_ columnar transposition.
With ciphers of the complete-unit type, the same thing can be done
having several of the major units. We have, say, a single cryptogram
accomplished with a Fleissner grille, and taken off by spirals. It
may be that nulls were added in the final group, or at the beginning,
or the final unit may have been left incomplete (by blanking out the
unwanted portion of the final grille-block). In spite of these
possibilities, the unit-length, known to be a square based on an even
number, can be determined — _or assumed_ — and the placing of the
several units one below another provides columns made up of
corresponding letters. It is even possible, at times, to apply this
process, with suitable modifications, to several cryptograms whose
length is only approximately the same. It has been done, for instance,
with cryptograms from Sacco’s indefinite grille, mentioned in Chapter
III (General Sacco himself has explained the modifications). Such a
process is ordinarily referred to as multiple _anagramming_, and we
have already seen, in the case of the grille, how it may be modified
so as to take full advantage of any inherent weaknesses when the
cipher is known.
Figure 50
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
C D D N C A A R T H L O I K A O E R T L S N A N O
D A I T E L O C W A I U X D N T Y M I N M O E Y O
B T O A T T U T O C F L I Y K X N E I O S B F Y Y
T A R O T O R E I L N A O H R I O N M D S R J Y S
W E K L N C H T S T S I E G E I H O O P D T N A O
For those who like this method, we repeat a suggestion which has
already been made: Many columns are usually present in such a set-up
which contain _more than one_ of the “clue-letters,” as here, for
instance, column 14 is practically made up of them. Such a column
makes a good point of beginning, since we may search the set-up, not
for some single letter, but for a pattern made up of several. For
column 14, specifically, we might examine the top row of letters,
pausing whenever we come to one of those letters frequently preceding
_K_, and examining the rest of its column to find out what letter
would have to precede _H_ on the fourth row. We may fail with the
first such column, but not with all.
Another particularly good method, and one which might work in the
present case in spite of the very brief columns, is that of finding
the particular column which contains the first letters of all the
messages. Well over half of the initials used in the language will be
found in the group _T A O S W C I H B D_, and with a frequency in
somewhat that order. Any column made up entirely of these particular
letters may be the one which begins the messages; and when this can
be found, it pays to remember that a vowel is practically always
present among the first three letters of each message.
Aside from the general case, each individual case carries clues of its
own, and the finding of these must depend upon the detective ability
(or experience) of the decryptor. Here, for instance, we find that the
letter _K_ has appeared three times in only 125 letters of text. This
letter, normally, has one of the lowest frequencies in the language,
and often is not found at all in 125 letters of text. Finding it
three times, then, rather suggests the presence of some one word, a
word so important to the subject-matter that it has been used in
three different messages.
When considering the letter _K_, the first combination which comes to
mind is a digram _CK_ preceded by a vowel; and the letter _C_, also,
is not a letter which we expect to find in confusing numbers. When an
examination of the set-up shows that, for each of the _K_’s, there is
a _C_ present on the same row, we are inclined to accept the
hypothesis of a repeated word. In practice, we should pick out the
three columns containing _K_, place beside each one a column which
will set the digram _CK_ together, and _build on all three
combinations simultaneously_ to the point at which the supposed word
appears or is proved non-existent. Following out only one of these,
let us consider column 14, where _K_ is on the top row. On this row
we find that _C_ has appeared twice. Both of the _C_’s are tried with
_K_, as shown in Fig. 51; we find that both combinations will provide
acceptable digrams, but there is little doubt as to which we would
select. Combination 1-14 is merely acceptable, while combination 5-14
provides a very accurate description of the column which would fit
best on its left. There should be a vowel on the top row, to precede
_CK_, and another on the bottom row, to precede _NG_. After that,
perhaps another vowel should be found on the fourth row, to precede
_TH_, or perhaps, in this case, an _S_, since the list of frequent
trigrams includes a sequence _STH_; and, finally, something suitable
to precede _TY_, which appears to be a syllable, but may belong to
two different words. The five columns which will meet these
requirements have been added in Fig. 52. In this figure, two
combinations may be discarded, because of trigrams _KTY_ and _YTY_.
The others appear acceptable. At this point, however, the sequence
_XTY_ of combination 16-5-14 begins to draw attention because of its
very few possibilities (SIXTY, NEXT YEAR, etc.), making it likely
that one of these will quickly select or discard the entire
combination. For building SIXTY, row 3 of the set-up contains two
_I_’s and one _S_. The two _I_’s, columns 13 and 19, when inspected
visually, are found to bring out, on the top row, the two sequences
_I O C K_ and _T O C K_, while the _S_, column 21, brings out, on the
top row, another _S_, which would extend these, respectively, to read
_S I O C K_ and _S T O C K_, the latter surely the more acceptable.
The results of these additions, with subsequent development, can be
examined in Fig. 53. The completion of the word SIXTY has brought out
also: STOCK, _MITED_, SMITH, DOING. The presence of the word STOCK
suggests extending the sequence _MITED_ to read LIMITED, and the
addition of two more columns on the left brings out another CK,
suggesting another appearance of the word STOCK. The chances are that
we have already been building on this other word STOCK, but if not,
we may build it now to the point shown in the figure, where the top
row suggests RAILROAD STOCK, the third row, FIFTY TO SIXTY, and the
second may or may not suggest MEXICO. Thus we are well on our way to
solution, and have not once had recourse to a long prepared list of
probable words: _division_, _regiment_, _battalion_, _attack_,
_advance_, _report_, _forward_, _artillery_, _ammunition_,
_communication_, _enemy_, _signal_, _retreat_, _troops_, and so on.
Figure 51
1-14 5-14
C K C K
D D E D
B Y T Y
T H T H
W G N G
Figure 52
Figure 53
11 8 25 6 3 21 19 16 5 14
L R O A D S T O C K
I C O L I M I T E D
F T Y T O S I X T Y
N E S O R S M I T H
S T O C K D O I N G
Naturally, there are times when the matching of the columns, for one
reason or another, proves troublesome. We are thrown off by errors,
by the presence of nulls, initials, abbreviations, etc., or by the
encipherer’s use of cover-up devices, such as the writing of _YH_
instead of _TH_. Or we find that the handling of many paper strips,
caused by message length, is awkward and confusing. But if, in the
eyes of the decryptor, there is any good reason for finding out the
contents of such messages, he can always succeed, even with only two
letters per column.
So far, nothing has been said about helping ourselves to the serial
numbers of the columns, which, during the rearrangement of letters,
are automatically forming in a certain sequence across the top of the
set-up. Regardless of the cipher, it can do no harm to examine these,
and find out what information, if any, they are able to give. In some
cases, they will provide us with both the system and its key,
enabling us to throw away the strips and start deciphering. Suppose,
for instance, we have correctly matched sixteen columns, and find
their numbers in the following order:
31-10-24-37-17-3-32-11-25-38-18-4-33-12-26-39. A careful examination
shows that the numbers are running in sets of six. After the first
six are passed, the next six have repeated them with an increase of
1, and another six appear to be forming up which will repeat them
with an increase of 2. We may verify this by finding the columns
which have numbers 19-5-34-13, etc., and, if the set-up continues to
show plaintext, we know that we are dealing with a simple columnar
transposition. Notice that if the above series were marked into
segments of six numbers each, and the segments placed one below
another, we should have _six columns_, each one made up of numbers
which are consecutive. Thus, we may sometimes learn from a series of
numbers: (1) the system, which is straight columnar transposition;
(2) the key-length, which is 6; and (3) the key itself, which, taking
the six numbers according to size, is 5-2-4-6-3-1, possibly with the
wrong numbers coming first, though it happens that in this case they
do not. This is our old friend SCOTIA, used on forty numbers, in case
the student cares to verify it.
Figure 54
1 7 24 22 12 9 10 15 4 2 20 17 18 23 13 11 8 25 6 3 21 19 16 5 14
C A N N O T H A N D L E R A I L R O A D S T O C K
D O Y O U W A N T A N Y M E X I C O L I M I T E D
B U Y B L O C K A T O N E F I F T Y T O S I X T Y
T R Y R A I L R O A D O N J O N E S O R S M I T H
W H A T I S T E L E P H O N E S T O C K D O I N G
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
(Plaintext serial numbers, added at bottoms of columns)
Figure 55
Finding the Original Short Key from the CRYPTOGRAM Serial Numbers - M.E.OHAVER
1 7 24 22 12 9 10 15 4 2 20 17 18 23 13 11 8 25 6 3 21 19 16 5 14.
1 7 24 22 12 9 10 15 4 2 20 17 18 23 13 11 8 25 6 3 21 19 16 5 14 1 7
x . . . . . x (Repeat series)
(As PLAINTEXT)... 1 7 24 22 12 9
10 15 4 2 20 17
18 23 13 11 8 25
6 3 21 19 16 5
14
COLUMNS of the FIRST encipherment block are converted to ROWS of the SECOND:
To find a good clear example, using the strips as they stand, let us
go back toward the left, and look for a difference 2. We find it
first between the numbers 24 and 22; exactly six positions away, we
find it again between the numbers 4 and 2; another six positions, and
we find it between the numbers 13 and 11; still another six positions,
and we find it for the fourth time between the numbers 21 and 19. Thus
we have two series of numbers, 24-4-13-21 and 22-2-11-19, which run
parallel to each other with their numbers always separated by
interval 6. Sequences of this kind came from the _columns of a first
encipherment block_, and can all be placed back in these columns by
re-writing the mixed cryptogram numbers in lines of _six numbers
each_. Sometimes we find such columns broken to bits, as would be the
case should we continue moving the strip until we have completely
exhausted the possibilities for difference 1; and we never find them
complete, since these columns of the first encipherment block were
taken out in irregular order and written continuously upon the rows
of a _second encipherment block_, and after that were sliced through
in the taking out of columns from the second block. We found traces
of them once before, where a difference of 8 was found throughout
four consecutive pairs of numbers 12-20, 9-17, 10-18, 15-23, always
at an interval of 6 positions.
Figure 56
Finding the Original Short Key from the PLAINTEXT Serial tumbers - GIVIERGE
1 10 20 9 24 19 2 17 6 7 16 5 15 25 8 23 12 13 22 11 21 4 14 3 18
6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
7 16 26 15 30 25 8 23 12 13 22 11 21 31 14 29 18 19 28 17 27 10 20 9 24
The original short KEY can then be found by observing (in the central block)
the order in which columns have been taken from the right-hand block. That
is, find the small numbers which were on the top row; these are standing in
the order 1, 4, 2, 5, 3, 6 (a writing-in key), and the columns which are
headed by these receive key-numbers in the order 1-3-5-2-4-6.
* * *
We have seen, then, the general case in which the “enemy” decryptor,
having several cryptograms of the same length, enciphered with the
same key, is able to use a purely mechanical method in order to
restore the plaintext, and afterward, by observing traces of a known
cipher, to extract their key. For the solution of single cryptograms
enciphered in complicated systems, the writer knows of no other method
than straight anagramming, in which the single letters, accompanied
by their serial numbers, are written on individual cardboard squares
(or imagined to be so), and the attempt made to match them up.
Attention has already been called to some possibilities which may lie
in the serial numbers whenever the sequences or probable words are
thought to be correctly matched. But with absolutely nothing known or
suspected as to source or subject matter, and with nothing
discoverable from serial numbers or possible routes (and taking it
for granted that any accumulation of letters represented in about the
normal frequency-proportions can be made to yield dozens of different
solutions), it would hardly seem that the decryptor, even should he
find the correct solution, would have a means of distinguishing it
from any other.
Figure 57
L H D L A O D D H L H E E U I X D F P I U T A E R O I T Q A E T E R L
N I E N A U D K L I E E H Y N M S J L C N H P B O A D G R N.
M T Q P I N A I E N E I T H R G E K D U U D L L I R I H F R T E C L O L N J
L A S H A A U Y D O E E L N E N D H P D H D E A B O.
For the student who may care to struggle with a case of single
anagramming, we have appended a problem in Fig. 57, together with a
means for finding out the solution and perhaps even the key-word. It
has come from the Philadelphia headquarters of a band of
revolutionists, and our stool-pigeon tells us that the leaders of
this movement are to be called together for consultation during the
coming summer.
* * *
This can be seen at (a) of Fig. 58. The numbers 1, 2, 3, might all
have derived from _A_, but the number 4 cannot have derived from a
letter coming earlier in the alphabet than _B_. Similarly, the
numbers 4, 5, might, by possibility alone, have derived from _B_; the
numbers 6, 7, 8, might all have derived from _C_, the numbers 9, 10,
from _D_, and, finally, the number 11, from no letter earlier than
_E_. When these earliest possible limits have been established for
every key-number, and it is seen that the range is five letters, then
the last five letters of the alphabet, _V_, _W_, _X_, _Y_, _Z_, may
be used to establish the limits at the other end of the alphabet. It
is seen now, that the key-number 6, must have derived from some
letter between _C_ and _X_, inclusive, and similarly with the others.
But when we come to the particular case, it becomes necessary to make
assumptions; for instance, were these numbers derived from a common
English word or from a Russian proper name? The person who selected
it, so far as we know, is accustomed to speaking English, and in all
of his past cryptograms we have been able to recover common English
words rather than proper names. Assuming, then, as at (b) of the same
figure, that we are to recover his usual common English word, we set
down _A_ as a possible letter for the key-numbers 1 and 2. But when
we arrive at the number 3, we see that we cannot assign here a third
_A_, since common English words of this length do not contain a
doubled _A_. The earliest letter possible, then, is _B_, and, upon
noting the consecutive letters _AB_ at this particular point, we
think at once of the common English terminal sequence -_ABLE_.
Figure 58
6 9 1 4 11 7 10 2 3 8 5 6 9 1 4 11 7 10 2 3 8 5
C D A B E C D A A C B A A B L E
X Y V W Z X Y V V X W (FL (MY A C (NZ (FL (MY A B L E
D
E (New limits)
To find whether this is possible, we make sure that the new letters,
_L E_, alphabetically considered, do not run contrary to their
supposed numbers, 8 5. Then, having accepted these four letters as
entirely possible and likely, we work back to the missing number, 4,
and find, now, that it has new limits; it must have derived from _E_,
_D_, or _C_, and from nothing else, and of these, we are inclined to
discard _E_, which would give a sequence _AE_. We then work back to
other missing numbers, 6 and 7, and find that these, too, have
acquired new limits; they must be found somewhere between _F_ and
_L_, inclusive. All numbers which follow 8 have attained a new limit
in the earlier portion of the alphabet, but not in the latter portion.
These are all shown in (b). At this point, any knowledge at all of
English prefixes will suggest what the first two letters are and will
narrow the limits still further. The student, perhaps, has already
guessed the word.
Of the keys which follow, (a) and (b) were derived from English words,
one of which has been used in the present chapter. The remaining four
are derived from proper names, respectively (c) German, (d) Italian,
(e) Spanish, and (f) French.
36. By TITOGI.
(a) U O Y M E E T E N A W H T I M C I C T I J I U S O G N H Y F.
(b) Y T M I L L E M L E W U A A J T W O N F O R T A H L H T G I.
(c) R O P U L E A E E B A H F T K O D T S C I L T T M R Y T I H.
(d) U M H T S E U O K S I H W T R A N C I O W A O H T Y O S S Y.
(e) E C E R L T A D A R M R E A O G P O Y M E E A A T N I B S A.
(f) R E U O T K N A E H E H H L Y W D E L E E E E O M N W S L L.
(g) I H L P U H T T G I Y T T A S N E R T E O R Y T A H N J D S.
(h) E S E F K A C A P E E O L S A M E J N S T E O M S L E O T I.
(i) T E N E W O H S K I I N S G T M O O H T A A T H U E U T O B.
(j) H T P R A H L E R E E R E T A T L E E H S T T T E H B N B S.
37. By EFSEE.
(a) I U E G N M O W H X T A N O I P D I L S F P I A R -
(b) F N E E T X I E T O N O T S M G R T R Y V G P A C -
(c) S F U F N I C E Q E S C U N R I L T M Y I O I P T -
(d) B T E E S N B I H I E T L N X O E S N R E I E G T.
T A S H L E C P W E T C I H A O T N R A O O H L W D O Y I L E O H R L
E V A T E A O M N L E V N W I W I E I H S M H E T H N W O I O L S V I
I F S S O W A S O T F I L E H N M G O F I E R A L O C G N N.
A H H S E S T I H D I S O M E A T H I O O H D I O U T T I K M I E S O
F G S N E R W U G T S G Y I S L A T I T T A A N H O G E N Y L A W E A
L E R T M I W T O E D.
T E H A N E M G S L L I W S N E T T A C K Y E I A A E B P S O U R P E
M O C E E T U N R I S T E R S A F O E T O R T D A E R T E F D I N C A
S E R E T T U O P W A R U R E F F O Y A E E D F O R D R C R.
41. By PICCOLA. (Single block - completed unit - with columns transposed. The
key to this transposition may amuse you, provided you can
reconstruct it in letters!)
A O U U P D M C A N I O G T R S A A Y N K N C A B M N A O A T L E C H
Q S D O R E E W W D N C K E E S T S H N I E T E U H K N I F D I T Y F
U X G I V L T A I P H R C S N R R E H S B M E E A R M T A I U T E W O
P I R S M H O O E V R W F N X S D A H I E T S S U F C N N E E S N F S
E O O L T U A E A O F T V L T E E O E C.
(a) I H S
E W D O X H D H T S E O E H R N E C T O O A G A R S A
N O E A O S O H
U W R T C A U R E N T T O M S O C N Y N P G S H A P P
N F S N E R T E
H E P M A W S M E G I A E A P O R Y D T A A S S A F M
I H S R C H E C
W N E I T A T R X E I S O A C F A T I C E N I R T E U
Y H T E R T S R
S E L S T E G P A H R W. (b) S R H J I A X E C A
N E Y P K A N D
A T S D L I L A S L N T G E A D Y E B L Y T S C C I D
T C S G A M C E
E N W A T I E A E N H L A B D Y A G H C H E G I H O I
L P O N P A S E
D N T T W E S Y E F I M L A R E R H N E D I O T E L R
O S I T D S S R
I S N I R R F S S P E C T R E I F B G O M R X S E N A
H A R N L. (c) A E G Y B A T Y N S R I D T O O S D N E Y E E E O
G N I U U T W S N L H E I I S C G H H W D R R U W E A H E T K C T W V
O E H H I.
C T I H N A I E S O R M F Y E E C T H U W I S L A E D K R L B E R N M
J I T S D A N D O O H T V A T H T E R Y G A U N O T S A P E M O E S U
R I L T E D I E O N E N R C A F I N P O L H O E A G R B X S.
E N W N O T N S E N Y U H O I K H N O E W A O T I U S S A L B W S F R
M I E I D I H R W N T F N D S E E O T U E Y B N O T W E W Z E E D I B
A E R Y I P L R N P Z R S M U T A S O I S U S D T D T R N H N O A S A F E
Z.
CHAPTER VIII
Substitution Types
* * *
CHAPTER IX
Simple Substitution — Fundamentals
Among the oldest cipher alphabets ever used for practical purposes
are those of the type called “Caesar,” one such alphabet having been
used by Julius Caesar, and another by Octavius. As may be seen at (a)
of Fig. 59, this type of cipher alphabet is no more than a simple
_shifting_ of the normal alphabet to a new point of beginning. Using
this particular example, the word “Caesar” will be enciphered as
_F D H V D U_; or, if the word _R Y H U_ is found in a cryptogram, it
deciphers as “over.”
Figure 59
Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHER: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
(b)
A pair of inverse alphabets:
A B C D E F G H I J K L N N O P Q R S T U V W X Y Z
Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
(c) A B C D E F G H I J K L M (e) C U L P E R A B D F G H I
N O P Q R S T U V W X Y Z Z Y X W V T S Q O N M K J
(d) A B C D E F G H I J K L M (f) C U L P E R A B D F G H I
T S R Q P O N Z Y X W V U J K M N O Q S T V W X Y Z
Figure 60
Some Methods for Forming a Keyword-Mixed Alphabet
Keyword: CULPEPER
(a)
Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHER: C A I Q Y U B J S Z L D K T P F M V E G N W R H O X
(b) Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHER: C A K W U B M X L D N Y P F O Z E G Q H S I T R J V
(c) Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHER: A I Q Y E M U G O W C K S D L T F N V H P X B J R Z
Figure 61
Cryptogram: Y B P R O B Q L...
Z C Q S P C R M...
A D R T Q D S N...
Plaintext: B E S U R E T O...
For _decipherment_, the plan is the same, except that the cryptogram
is written first, and the two alphabets of the key exchange their
functions. Often, when the cipher alphabet in use is so incoherent
that its letters are not quickly found, the decipherer will prepare
for himself a special _decipherment key_, in which he places the
letters of his cipher alphabet in straight alphabetical order, and
allows the plaintext alphabet to grow mixed.
* * *
Figure 62
Making Substitutions
(a) 1 2 3 4 5 6 7
F D R J N U H V X X U R D M D S K V S O P J R K Z D Y F Z J X
o t e t o o h e t h o
8 9 10 11 12 13
G S R R V T Q Y R W D A R W D F V R K V D R K V T D F
t t e t o t o e t h e o t h e o
14 15 16 17
S Z Z D Y F R D N N V O V T S X S A W V Z R.
o t o e e e t
Among methods which do not seem indicated in the given example, there
is a very fertile field for research in the examination of _terminal
sequences_. When two or more of the affixes -_tion_, -_ing_, _in_-,
and _con_- are present in the same text, as they practically always
are, they will serve to identify one another, and may, in addition,
be cross-compared with many of the short words, as in, _on_, _no_,
_not_, _into_, _upon_, _can_. The prefix _sub_- may serve to identify
the word _but_. There is a whole group -_ment_, -_ence_, -_ance_,
-_ency_, -_ancy_; another group _pre_-, _re_-, -_er_, _de_-, -_ed_,
etc.; or a good comparison in _be_-, -_able_, -_ible_, etc.
Figure 63
A D S 2/4
R W
B
D F R M Z W W V T Z R 10/11
R M S Y A F R F Y N
E
F * Y D D Y 5/6
D Z V S R
G X 1/2
S
(Etc.)
Concerning the numbers: A has a
frequency of 2, and a variety-count
of 4. D has a frequency of 10, and
a variety-count of only 11. (Yet
D, with so little variety of contact
is a vowel!)
* * *
(a) _R D F_ might represent (I) — _T O S_. (Compare the facts: _t_, _o_, _n_).
(b) _S Z_ might represent (II) — _A I H_. (Compare the facts: _a_, _c_).
(c) _V K X_ might represent (III) — _E N R_. (Compare the facts: _e_, _h_, _l_).
* * *
_The General Case_. — Now let us examine carefully Fig. 64, where the
foregoing cryptogram is repeated without its word-separations, and is
followed by its frequency and contact data. The various devices
indicated in this figure are all of a more or less optional nature.
Concerning the preparation of the cryptogram itself, the chief
requirement is that it be done in ink, or typewritten, on paper which
will suffer a great deal of erasure. The placing of its frequency
figure above each letter is highly recommended, but not vital. Many
solvers will underscore all possible repeated sequences, and will
indicate in some other manner all reversals of digrams; others will
underscore only the repeated trigrams and longer sequences; and still
others do not underscore at all, being content to have all of these
repetitions and reversals listed before them in the contact data.
Figure 64
5 10 11 3 3 2 1 9 4 4 2 11 10 1 10 6 4 9 6 2 1 3 10 4
F D R J N U H V X X U R D M D S K V S O P J R K
5 10 3 5 5 3 4 1 6 11 11 9 3 1 3 11 3 10 2 11 3 10 5 9
Z D Y F Z J X G S R R V T Q Y R W D A R W D F V
11 4 9 10 11 4 9 3 10 5 6 5 5 10 3 5 11 10 3 3 9 2 9 3
R K V D R K V T D F S Z Z D Y F R D N N V O V T
6 4 6 2 3 9 5 11
S X S A W V Z R
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
2 10 5 1 1 3 4 1 3 2 1 1 11 6 3 2 9 3 4 3 5
Contact-Information:
(High-frequency symbols)
R D V S F Z K X
(Moderate-frequency symbols)
J N T W Y A O U
R.N J.U V.Q R.D* D.F* D.R S.P N.H
P.R D.N V.D R.D* Q.R S.W V.V X.R
Z.X N.V V.S A.V D.F*
* * *
The most frequent one is ordinarily _E_. The one which never touches
it is most likely to be _O_. Both of these are very freely doubled,
and for that reason are often confused with each other, but seldom
with any other vowel. They rarely touch each other.
The vowel which follows _E_ and almost never precedes it, is _A_.
The same two observations will apply to the vowel _O_; but a
distinction occurs when the vowel _U_ can be found; this vowel
precedes _E_ and follows _O_.
The only vowel-vowel digrams of any real frequency are _OU_, _EA_,
_IO_.
The doubles _TT_ and _SS_ are among the most frequent in the language.
Figure 65
(Cryptogram Frequencies:)
R D V S F Z K X
11 10 9 6 5 5 4 4
E T A O N I R S H
(Normal Grouping)
We decide, then, that _R_ is a consonant, and that _D_ and _V_ are
vowels.
Figure 66
(a)
v ? v v v v v v v v ? 25
F D R J N U H V X X U R D M D S K V S O P J R K Z
v ? v v v v v 50
D Y F Z J X G S R R V T Q Y R W D A R W D F V R K
v v v v v v v v v v v 75
V D R K V T D F S Z Z D Y F R D N N V O V T S X S
v 80
A W V Z R
O P J R X Z Y F Z J X G T Q Y R W
? t ? t
(c)
F D R J N U H V X X U R D M D S K V S O P J R K Z
e t i y o y t e e a h o a i t h
D Y F Z J X G S R R V T Q Y R W D A R W D F V R K
e i a t t o t e t e o t h
V D R K V T D F S Z Z D Y F R D N N V O V T S X S
o e t h o e a e t e o o a a
A W V Z R
o t
(d)
Preliminary assumptions: y t e . e a h o a . t h o e t h o .
CORRECTIONS: y t O . O a h E a . t h E O t h E .
...to go ahead... ...the other...
(e)
F D R J N U H V X X U R D M D S K V S O P J R K Z
o t i y e y t o o a h e a i t h
N F G D W
Notify *e**y to go ahead with.......
The next step demands that we assign to the most frequent of the
supposed vowels the value _e_, which happens to be a wrong assumption.
Concerning this, it may be well to repeat here something which has
already been said: In dealing with the simplest of cryptograms, there
is often a short detour into trial and error. Also, the average
decryptor, accustomed to the work, and fully aware of what he may
expect from only 80 letters of text, will usually pause at this point
and make some further observations before filling in any of his
substitutions. However, there is value even in the making of wrong
substitutions; the actual placing of supposed plaintext values in
their supposed positions puts the plaintext possibilities before us
_in visual form_, causing us to note easily those very points for
which the experienced decryptor examines in advance.
Figure 67
1. F D R J N U H V X X U R D M D S K V S O P J R K Z D Y F Z J
X G S R R V T Q Y R W D A R W D F V R K V D R K V T D F S Z
Z D Y F R D N N V O V T S X S A W V Z R.
(80 letters).
2. H V X X U T V W D T R A Z D Y F Z J X T V S O U R D S Z R N
S E D T S Q X U L K S E V O T D W W V O D R K V T G S R R V
T Q Y R A Y M M V A R P V A K D Y X O H V V W K S G G V T J
F M S R R K J A R K T D Y M K T J Z K S T O A L R K J F H R
K V U G S U M T S F R R K V A Y Q A J O U R K S R U D Y A W
D H V D N.
(155 letters. - Total for both cryptograms: 235).
Figure 68
(First-Letters)
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A 1 1 1 1 2 1 3 1 A 11
B B
C C
D 1 1 1 1 1 3 3 1 2 4 3 D 21
E 2 E 2
F 2 2 1 3 F 8 *
S G 1 1 1 1 1 G 5
e H 1 1 1 1 H 4 *
c I I
o J 1 2 1 1 2 2 J 9
n K 1 1 1 10 1 1 1 K 16
d L 1 1 L 2
{. M 1 1 1 1 2 M 6
L N 2 1 1 1 N 5 *
e O 1 2 1 3 1 O 8
t P 1 1 P 2
t Q 1 2 1 Q 4
e R 3 3 2 1 1 1 4 4 1 3 1 2 2 R 28 *
r S 2 1 3 4 1 1 3 2 1 S 18
s T 2 2 1 1 1 1 6 1 T 15
U 1 2 1 1 1 3 U 9
V 1 1 1 4 6 1 1 1 1 2 2 1 2 V 24
W 2 1 2 2 1 W 8
X 2 1 1 2 2 1 X 9
Y 2 6 2 Y 10
Z 1 2 1 1 2 1 1 Z 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
9 5 4 27
* * *
Thus we have identified the letters _t_, _h_, _e_, _a_, _r_, which is
as far as the tabulation has been carried. Having the substitute for
_h_, we may now bring in the vowel-solution method through examination
of digrams _KD_, _KJ_, _KT_, _KZ_; or continue with the
digram-solution method by looking over the field for some of the other
_h_-digrams: _sh_, _ch_, _wh_, _ph_, _gh_, and so on. The first of
these should be easily identified by the frequency of _s_, and, in
addition to the regular three check-digrams, we might check this
against a possible _st_, another of our leading English digrams. With
the process explained, we need not go further; the substitution of
letters _t_, _h_, _e_, _a_, _r_, _s_, will surely break any simple
substitution cryptogram. Possibly, enough has not been said as to the
use of the trigram list, the consideration of common affixes, common
short words, and so on; but these are all points which the student
can best develop for himself.
Figure 69
Digram Doubled Letter Letter Frequency Supposed
Identity
Original Reversed 1st 2d 1st 2d
R K 10 K R... R R 4 K K... R 28 K 16 t h
V T 6 T V 2 V V 1 T T... V 24 T 15 e r
K V 6 V K... K K... V V 1 K 16 V 24 h e
D Y 6 Y D... D D... Y Y... D 2l Y 10 ?
W D 4 D W 1 W W 1 D D... W 8 D 2l ?
S R 4 R S... S S... R R 4 S 18 R 28 a t
K S 4 S K 1 K K... S S... K 16 S 18 h a
R R 4 .... .... .... R 28 t t
H V 4 V H... H H... V V 1 H 5 V 24 ? (-e)
Figure 70
Plaintext alphabet: a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHER ALPHABET: S V N K J F D T A R Y U
Plaintext alphabet: a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHER ALPHABET: S O V N K J I H F D T A R Y E U
Q?P? * L? G? C?B?* * T?
M?
45. By PICCOLA.
S C Y J T O P N R M J T U E A W S R O R O A E P Q R J C R O A R M P H
Q K J Q S R S J H A X P F K E A Q R M Y S R P Q P M P S E C A H G A W
S R O P E E E S H A Q O P V S H I R O A Q P F A E A H I R O P H N P Q
R J H T F U A M C J M R Y R O M A A W A E E B T Q R W M S R A S R J H
A I M J T K U A E J W P H J R O A M P H N Q A A W O P R Y J T Q A A L.
J C W E H S N D F S B N J I V T E A G V D H O C Q Q I Q F R P H F K Q
E A R F Q A R F A H F Q E J C B N J N H B E O C B N L N O V H B L F Q
J B N A B L F V H C A J I V B N W N S T B L E A G V A J N S R F W N S
Y R V S S C A E H V A Q F C J E A G J N A W N S O V B V C Q Y D C S P
H E H O C S P E A G B E O N A F R L C A G N E A K C S O N S H A C B E
F A C Q X.
B O Y B A N K I L L A P K R I Y A P Y Y U P B L Y E R P B P L G Y G M
H L A B O Y K J A K L P Y L H H J A C R P O R C Q U Y N B H L A B O Y
G N A Z N Y L H B O Y K N A N P R B R W O J C B R C Q D N P K.
48. By PICCOLA. (Of these two, one has normal word divisions; the other has not).
W T E I C H E P P C A E P T J W P O Y D Q P R M E L U E I N D E P Q T C
Q D Q D P C P D H K G E P U O P Q D Q U Q D J I C. I S Y E Q T C P V E M Y R
E W M E K E C Q E S P E L U E I N E ? P D Q H U P Q C G P J T C V !
E O E E I Q M C I, P K J P E S X Q T E Q M C I P K J P D Q D J I D P U P U
C G G Y J R Q T E V E M Y P D H K G E P Q F D I S.
49. By PICCOLA.
P B K L A B E I C D J D B I L Y P K L D O I X L Y I P K V Y A L ?
A G F Y A M I L K L Y I K I D C A G G L D O I X V D J R K L Y I C P B R P B
N
X D Q A J I ? Q K J I S P B R K L Y A L A B R M X Q F P L F P E O L D
I B R V Y P E Y O B D V X D Q P C E G I A J F I J C I E L G X P K
S I A B P B N P L K. A J P K L D E J A L A B B D L P K L Y P K B D !
CHAPTER X
The Consonant-Line Short Cut
_A Method for Attacking Difficult Cases_
By George C. Lamb
Several routine methods have been evolved for special use on the very
difficult “aristocrat” — that fascinating form of simple substitution
with word-divisions in which the message is of no importance whatever
and the encipherer’s full attention has been given to manipulation of
letter characteristics. Of the several such methods which have proved
workable over a long period of years, the author’s favorite is the
“consonant-line” method, the exact value of which has been tested in
a special analysis of 130 very difficult cryptograms. However, it
should be stated clearly that no method is a mechanical crypt-solver;
these devices merely serve to bring out clues which to the haphazard
worker are totally invisible. For discussion, we will consider an
example by M. E. Bosley which appeared as No. 19 Aristocrat in _The
Cryptogram_ for June, 1936. This is shown at Fig. 71.
Figure 71
U W Y M N X K A E H X R B Z U V X M U W B Z O Y Z T W H V C X Y A
C Y A U Z D B R A H V K B A; Z W S V A H K U Z B K C, M S C X
C Y X B S, X V Z Y T R Y C X P.
Figure 72
U6 W7 Y9 M5 N2 X10 K7 A7 E1 H6 R5 B8 Z6 V8 O1 T4
C5 D1 S5 P1
-W U-Y W-M Y-H M-X N-K X-A K- -H E-X X-B R-Z B- U-X -Y Z-W
V-X -B W-V X-
-V U-B O-Z X-U H-R V-B Y- W-V B-A W-Z B- H-C Y-R
-Y M-C
M-W T-H X-A -S V-M H-D Y-U A-V T-Y D-R Y-T H-K
K- B-
A-Z Z-S C-A C-Y B-C R-H A-K K-A U- S-A
S-X
K-Z C-X C- B- Z-K -W X-Z
-Y
Z-T Y-B V-H X-S U-B
Y-X
R-C -V V-Y
C-P
x . x x x
C T N E O D P C T N E O D P A U C T N E O D P A U W Z
U V X M U W B Z
│ │ │
H
v│ vv│v vvv│v
x│xxxx x│xxxx x│xxxx (Vowel) (g)
7th word:
yy│yyy yyyy│yyy yyyyy│yyyyy (Vowel)
k│ kkk│ kkk│ x x
x x x x . x
s│ s│ s│s Z W
S V A H K U Z B K C
z│ z│zz zz│zz (Consonant)
│w │www │wwww (Consonant H) (h)
4th word:
│r r│r r│r
m│ mm│ mm│ x .
x x x x x . . x
│h │hhh │hhhh O Y
Z T W H V C X Y A
│b b│b bbb│bbb (Vowel)
H
│ │u uuuu│u (Consonant)
a│ s│ (Consonant)
│ t│t (Consonant)
│
Figure 73
1 2 3 4
x x . x x . x x x . . x . x x x . x x x . x x . x x x . x x . . x
U W Y M N X K A E H X R B Z U V X M U W B Z O Y Z T W H V C X Y A
h h h
5 6 7 8
x . x x x x . x x . x x . x x x . x x . x x x . x x x . x .
C Y A U Z D B R A H V K B A; Z W S V A H K U Z B K C, M S C X
h
9 10
x . . . . . x x . x x . x . x
C Y X B S, X V Z Y T R Y C X P.
Further work includes the application of the “force method.” That is,
we turn our attention to the cryptogram itself, marking with a small
cross, or otherwise, all letters determined as consonants, and
placing a dot, or other indication, over all letters determined as
vowels. Some vowels become evident as early as stage (c), as here we
find both _X_ and _Y_ freely contacting our preliminary group of
consonants, and if confirmation is needed, a glance back at set-up
(b) will show that both of these are step-up letters. They may be
labeled vowels without hesitation.
As to consonants, there are two clear text letters, _h_ and _n_,
which, owing to their many contacts with other consonants, and
particularly with the low-frequency consonants (as in the digrams
_CH_, _GH_, _PH_, _WH_, _NG_, _NC_, _NK_, _NQ_, etc.), will often
show up clearly on the consonant-line. Of these two, _n_ will appear
largely upon the left side of the line, and _h_, the more reliable
of the two, upon the right side. Examining (d) we find _W_ and _H_
appearing exclusively on the right side of the line, and since,
under the rules of the game, no letter may be its own substitute,
we may assume here that _W_ represents _h_.
Figure 74
* * *
Figure 75
The above two examples have represented the “tough” case. In Fig. 75,
where the text is the solution to a crypt by J. Lloyd Hood published
as No. 9 in the February, 1932, _Cryptogram_, we have the average
comparatively simple case. The total variety-count is 118, making the
isolation count about 23 and throwing the line of demarcation into
the group _D H Z_, where _D_ is the only step-down letter. Every
letter in the isolated group is actually a consonant, and step (d)
adds the letters _T G H Z_. On the consonant-line, _A_, _O_, and to
a lesser extent _U_, stand out clearly as vowels. _E_ might be
mistaken for _H_ until we apply the force method, while _I_ shows a
step-up of three points, in addition to whatever shows up on the
cryptogram. So up and at ’em! Edgar Allan Poe spoke truly when he
suggested that whatever the human mind can devise, the human mind
can also untangle.
* * *
50. By ROBO.
53. By TRYCHS.
54. By DECIBEL.
55. By B. NATURAL.
56. By POSIUS.
57. By LIGHTNING.
QFY. NZZDO, YOFLAVU HAVVOF NVVBCVSOY: "FOSAZO RBF
YBCZ AY RFBQ DNKO QFY. HCQZDAVU; BCK BR FOYZOSK
RBF WOF, A YCUUOYK YBCZ GO ONKOV AV YADOVSO!"
59. By MISISEEG.
60. By EEGH.
61. By MERLIN.
62. By P. A. BEE.
63. By SHORTY.
T I P O F F S
For the benefit of the beginner a list of "tip-offs" are given below.
By comparing these groups, affixes and single letters it is possible
to find combinations which fit. For instance: ABC compared with ABCD,
ABGA, GA, DHA might result in "the", "then", "that", "at", "not", etc.
67. By "33".
68. By BUBBLES.
70. By WEHANONOWIT.
71. By CURLY.
72. By GALUPOLY.
73. By SABIO.
74. By GINHUTS.
OLDMADE OVID SLATILK, ZLOMLX VWXYB, WERK SLMB LERVI,
NLI CLRO EVRS GKTV OTAHB ADGV TVWEY, YBLTO LISWR
RLDEWLEB.
75. By CIPHERMIT.
76. By A. D. CODER.
78. By AMSCO.
79. By M. G. M.
80. By SIMPLICIUS.
81. By KRIPTOBENS.
82. By PHONEY.
83. By ARROWHEAD.
86. By LIVEDEVIL.
87. By NEOTERIC.
88. By ZERO.
89. By JOKEL.
91. By TRYIT.
92. By DIZZY.
93. By ZANYCODAB.
94. By I. D. CIPHER.
95. By NEON.
96. By TWISTO.
97. By NUMERO.
99. By INVICTUS.
CHAPTER XI
Simple Substitution with Complexities
For the multiple-substitute cases, that is, those cases in which all
or part of the letters may have more than one substitute, the
frequencies of such letters as _I_, _H_, _E_, _R_, may be left blank
(or cut in half, dependent upon just what the cipher is), and only
the frequencies of _C_ and _P_, standing two positions apart, need
be considered. Particularly helpful, in this case, would be a
probable word such as CRYPTOGRAM, in which five infrequent letters
are standing at known distances apart. The frequency-pattern of this
word, based on 100, can be expressed roughly as _3 - 2 2 - - 2 - - 2_,
and the attempt made to find points in the cryptogram at which five
letters of somewhat these frequencies are standing at the given
intervals apart. The foregoing is based on the supposition that while
the encipherer, having several substitutes per letter, will be able
to conceal the true frequencies of his high-frequency letters, _there
is not much that he can do toward concealing his low frequencies_. He
can, of course, produce any frequencies that he likes by swamping his
text with nulls; and this, in the hands of a clever operator, can be
very effective, especially if the circumstances are such that he can
keep his method a secret. But for the average practical purpose, the
time consumed in the encipherment, and the increased length of the
cryptograms, are highly undesirable features, especially if it be
kept in mind that there are many other ciphers than simple
substitution. As to attack by analytical methods, the one device
which is more likely than any other to prove applicable in all cases
is the preparation of a digram count of exactly the kind we saw in
Fig. 68. Such a chart will afford the means for studying carefully
the _contacts_ of any given letter; just what its _variety_ seems to
be; whether or not this seems disproportionate to its apparent
frequency; whether or not it shows a tendency to touch letters of
lower frequency, or to be present in reversals; and so on.
Other simple devices, hardly worth calling ciphers, which have been
used in the columns of _The Cryptogram_ under the title “Simple
Substitution with Frills,” have included: (1) The use of false word
divisions. (2) The simple reversal of an otherwise unmanipulated
cryptogram. (3) The use of two given digrams, placed alternately at
the ends of words. (4) The use of a new cipher alphabet for each new
sentence. The first of these, of course, should have been suspected
after examination of the apparent terminal letters. The second,
theoretically, ought to be spotted if the method of solution includes
a close investigation of digrams. As to the third device, any two
digrams, used in the manner described, will attain impossible
percentages; our leading digram, _TH_, in normal text, remains fairly
close to three or four percent. It was the fourth device, however,
which caused the greatest consternation among the younger solvers;
in this case, the making of the frequency count will show what the
trouble is: It begins very well, with the expected resemblance to a
normal count, and suddenly begins to grow erratic.
Figure 76
"Alphabet" for Encipherment of Numbers
"Plaintext" .. 1 2 3 4 5 6 7 8 9 0
"CIPHER" ... A B C D E F G H I J
Figure 77
j q
Plaintext: a b c d e f g h i k l m n o p r s t u v w x y z E T
CIPHER: C U L P E R Z Y X W V T S Q O N M K J I H G F D B A
Encipherment:
w e m u s t h a v e b e t t e r c o v e r a g e ...
H E T J M K Y C I B U E A K B N L Q I E N C Z B ...
The foregoing is one of those cases in which the decryptor can learn
a great deal by taking his frequency count in the form of a digram
chart. And he knows, of course, that his cryptogram contains some
two letters whose combined frequencies will reproduce the frequency
of _E_, or of _T_.
Figure 78
L N R S T
b a t t a l i o n
A C U L P E ER NE UL LU NE AR RI OR NO
E R A B D F
I G H I J K
O M N O Q S Regrouped:
U T V W Y Z
ERNEULLUNE ARRIORNO.
The fact that two interchangeable substitutes have been provided for
each letter of the alphabet has led many persons to use this device,
absolutely without modifications, as a simple substitution key. Yet
it must be plain that any decryptor, taking his preliminary frequency
count, will discover, before going very far, that this count is being
made on only ten different letters, and thus can represent only one
possible kind of encipherment. A frequency count taken on the pairs,
with no distinction made between a given digram and its reversal,
will afford the necessary proof; after that, the average decryptor
will usually replace the pairs with single letters (or numbers), just
as he would in dealing with printers’ symbols, or other inconvenient
characters. The checkerboards which are actually intended for
encipherment purposes ordinarily use digits for pointing out columns
and rows. Where the digits at the side are the same as those across
the top, it becomes necessary to observe an order, as column-row, or
row-column, and this, using only five digits, is ordinary simple
substitution, in which every letter has one substitute. But if the
five digits at the side are different from the five written across
the top, then the order is immaterial, and any number may be
interchangeable with its reversal; that is, 17 or 71 can represent
the same letter.
Figure 79
(a)
Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHER: O N E W H O H A S P A S S E D O N I S A M O N G U S
(b)
CIPHER....... O M S S
May represent: A U I I Full
F L L Fuss
P M M Fuzz
V S S Pull
Z Z Puss
Figure 80
The two commonest of the checkerboard keys are shown in Fig. 81. When
digits are used, as in (a), an order must be observed in reading the
two co-ordinates. The letter _L_, for instance, may have any one of
the substitutes 13, 18, 63, or 68, but may not also have their
reversals, since these, using the same order, row-column, would all
be substitutes for _G_. Using letters, however, it is possible to
have two entirely different series at top and side, as in (b); in
this case, no order need be observed, and the letter _L_ may have any
one of eight substitutes: _KE_, _KF_, _LE_, _LF_, _EK_, _FK_, _EL_,
or _FL_. By including the still unused letters _U V W X Y Z_, it can
be arranged to provide yet more substitutes for some of the letters.
For either of these cases, the external numbers or letters (preferably
in mixed order), could constitute a semi-fixed key — that is, one not
changed every day — while the mixed alphabet of the square could be
changed as often as desired. Innumerable other keys of this type are
found. For the most part, they are based on rectangles of 35, 36, or
40 cells, the extra cells being used for digits, or other desired
symbols, and especially for extra appearances of the more frequent
letters.
Figure 81
(a) (b)
1 2 3 4 5 A C E G I
6 7 8 9 0 B D F H J
1-6 C U L P E K-L C U L P E
2-7 R A B D F M-N R A B D F
3-8 G H I J K O-P G H I J K
4-9 M N O Q S Q-R M N O Q S
5-0 T V W Y Z S-T T V W Y Z
One such key, the Grandpré cipher shown in Fig. 82, uses 100 cells.
The filling of the square with ten ten-letter words provides letters
in somewhat the normal frequency proportions, and an eleventh
ten-letter word, composed of the ten initials, serves as a sort of
mnemonic device for stringing the first ten together. The words, of
course, must be chosen in such a way as to include all 26 of the
letters.
Figure 82
1 2 3 4 5 6 7 8 9 0
1 E Q U A N I M I T Y
2 X Y L O P H O N E S
3 H A L F O P E N E D
4 U N B L O C K I N G
5 M O V A B I L I T Y
6 A D J U R A T I O N
7 T H E O R I Z I N G
8 I G N O R A N T L Y
9 O W N E R S H I P S
0 N O V I T I A T E S
In Fig. 83, we have the checkerboard again, with a modification. If
the key used is exactly the one of the figure, those letters which
are standing on the first three rows may have twelve substitutes each,
and those which are standing on the fourth row may have eight. In all
of these cases, the substitute for any letter is a pair. But the final
row, including here the letters _V W X Y Z_, is not enciphered with a
pair of co-ordinates; each letter may represent itself, or each may
represent the one on its left or right, but in any case, the
substitute is a _single letter_. Thus we have cryptograms in which
most of the letters are represented by pairs, but a few are not. Such
words as _ever_, _you_, _with_, _when_, _by_, _have_, and so on, will
occasionally occur; or, if not, then the encipherer may insert a few
nulls at strategic points. Thus, the decryptor, taking his count
purely on pairs, is expected to take some of them correctly and
“straddle” the rest. Such a device is described by Givierge, also the
following similar device. The cipher alphabet consists only of
two-digit numbers, but includes no number coming from the 40’s. With
all of the 40’s omitted, a sequence 44 becomes impossible; and the
encipherer, having first prepared his cryptogram, looks it over, and,
here and there, inserts a digit 4 beside another digit 4, producing
the impossible sequence 44. The decipherer, wherever he sees this,
need merely erase one of the 4’s, and since the digits, in Morse,
have their own distinctive symbols, there is no great danger of
errors in transmission which the decipherer will be unable to
straighten out; but the decryptor, as before, is expected to
“straddle.” Concerning decryptment, in all of these cases, there is
little that we can say here except that, given sufficient material,
these ciphers can all be decrypted with comparatively little trouble.*
The “straddling” devices, perhaps, would represent the most difficult
case, presuming that the decryptor has no probable words and none of
the information which comes through espionage or from that even more
fertile source, the carelessness of the encipherer. In dealing with
one of these, the decryptor, who normally expects a certain amount
of uniformity in the frequency counts made from different portions
of a same cryptogram, is likely to find that his count is showing
altogether new substitutes, or the same substitutes with altogether
new frequencies. He suspects, then, that he may be “straddling”
between two pairs, and tries making his count _in sections_ until he
finally discovers what letters (or digit) are causing the trouble.
Figure 83
K L M N O
F G H I J
A-E-S A B C D E b a X t t a l i o n
B-P-T F G H I K AG EF Y NR DI SK KU TI CN HQ
C-Q-U L M N O P =
D-R Q R S T U
V W X Y Z
The use of co-ordinates, in those cases where row and column are
interchangeable as to order, shows up very plainly when the
pair-count has been made on a chart; as previously mentioned for a
case of digits, the letters will divide automatically into two groups,
neither of which ever forms any combination within itself. With the
other case, where an order must be observed, there are not so many
substitutes per letter. But in either case, it is possible to _pair
the letters_ which belong together. Here, for instance, are the
letters _E_ and _F_. The frequent combinations of both _E_ and _F_
are always formed with the same letters; and both have avoided the
same letters; _these two must have been paired_. Their combinations
with _G_ and _H_ are much more frequent than their combinations with
_I_ and _J_; thus _G_ and _H_ must have been paired, and _I_ and _J_
must have been paired. This combination _EG_ (and its equivalents),
has been frequently followed by this other combination (and its
equivalents) and so on. When a great many pairs can be considered
equivalent to one another, it is possible to begin setting up the
checkerboard. Some such devices, of course, are safer than others.
But the mere fact that they double the lengths of the cryptograms
renders them unfit for any purpose where speed is a requirement; nor
can the added time and expense of transmission be tolerated for any
purpose whatever unless there is some very definite gain in secrecy.
Figure 84
4-1 1-5 3-16 4-11 1-3 1-6 2-2 6-21 1-4 3-2 4-25 4-2
3-3 l-l 2-12 5-22 4-10 6-7 6-2 5-6 5-7 2-7 1-2 1-8
N H H K O H W A E H M A U I H U U H S T U S A S T U N H U
M H N I W A H T. N H H H S A D T H H I A I I E I A M H K M
U W A H O L W N W H T M A M D S T H A J T E S U T O T K
N W I E W A O O. O U H K M W A H M N U I H U U H S T N W T O I K
H K M W A H A H O A N W T O I K A W O.
D K I U O C Z P V C L U Z I Q U W Y V B V I N C D U U L C U K U Z I I
U O C Z P V C L U Z P Y N U S Q S C Z I U L Q T U K H I C Z I K L U Z
P Y N N Y J Q Y L U P L U Z I Q J S C U L U S U E Y G U Z I Q I U T Q
N U F S U Z F L U I C V F Q S W Q I I S U Y S U G S Q N B L U G U O V
V Y F S Q Y I H I Y I K O H K U V P T Y K Q I J U Y V P P C E S Y U O
F Q S U L C Z N Y Z F K E S Y Z I U Z I R Q V V C.
Y C G U T H M P Y B X S K R M G X U F P C M I B C J G R M K X L X S Z
N Q V V U N I X Q S Q E E X Z H M X S R L E Q M L C V U D Y C G R N Q
S E X J U S K X C V X S E Q M T C I X Q S K Y C I I Y R K C S C Z M C
L I Q V U S E M Q T K Y R T Q M Z C S Z C V V U M X R L F C L L U R S
M U N R S I V B X S C N U M K C X S W H C M I R M D Y C L L X S N U J
X L C P P R C M U J D T C B O R X S K Y X L E U V V Q F L N Q V V R N
I X Q S S Q F X X X.
B E C O M I C I Q U E X P A Y O T I A N S I Z I P I A N D O A B U M Y
O R E A N U S Q U I M O N I P M A M A M I F O X E G A O K A Z U K I S
G O V I X A W A Z A I T H I N A I L M O S U I S H E A T R U A L E M O
F A T I C A G I D O Y E M B E Y O L E N A C O S E K E E L S O G I Z A
C O O L S I D I O R Q U A Z O W A G E S D I B U S I V I P U A Z A M E
S I D A R T A C O O Y A P E S L I A R S E W O A L O N I K O L O M B A
R I L A Z A L O W I A V U M A K A T L O F I C I N A I M I L N A Q U I
M O N I P S A W O G A P A V I H I S U E C A N O S M O L E T A M E K O
W A I V S I A R T E Z E I R S I L A Z E G A S A M I V E E P.
CHAPTER XII
Multiple-Alphabet Ciphers — The Vigenère
Figure 85
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
Figure 86
Key: B E D B E D B E D B E D B E D B E D B E D B E D B E D B
Message: S E N D S U P P L I E S T O M O R L E Y S S T A T I O N
Cipher: T I Q E W X Q T O J I V U S P P V O F C V T X D U M R O
Figure 87
Modern Enciphernent
B E D B E D B E D
S E N D S U P P L
T I Q E W X Q T O
I E S T O M O R L
J I V U S P P V O
E Y S S T A T I O
F C V T X D U M R
N
O
5 10 15 20 25 30
T I Q E W X Q T O J I V U S P P V O F C V T X D U M R O X X
The modern method would be that of Fig. 87. Knowing that a great many
letters are going to be enciphered by _B_, a great many others by _E_,
and a great many others by _D_, and having no wish to preserve
word-divisions, we begin by writing our plaintext into three columns
(or by grouping it conveniently), and then encipher at a single
writing all of those letters which are to be enciphered by any one
same key-letter. That is, we apply one cipher alphabet at a time, as
first explained. The modern practice will also require that the
cryptogram be taken off in five-letter groups, and that the final
group be made complete. This is another of those cases in which the
decryptor will number his letters, as shown in the figure. The student
who has not previously met the Vigenère cipher is urged to perform the
two operations of encipherment and decipherment and thus familiarize
himself with the use of a tableau; it is possible that in most of his
subsequent reading he will find explanations based on the “columns”
and “rows” of a “tableau,” when, as a matter of fact, no tableau has
been used. To understand how this might be, suppose we take a look
now at the Saint-Cyr cipher.
Figure 88
┌─────────────────────────────────────────────────────┐
│ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z │
┌───────┴┬───────────────────────────────────────────────────┬┴────────────
│ A B C D│E F G H I J K L M N O P Q R S T U V W X Y Z A B C D│E F G H I J..\
└───────┬┴───────────────────────────────────────────────────┴┬─────────────┘
└─────────────────────────────────────────────────────┘ (To Y.)
Now let us examine carefully Fig. 89, with its two examples of
decipherment. At (a) of this figure, a short cryptogram fragment,
beginning _T I Q_. . . . , is being deciphered with the original
key-word, BED, and is bringing out the message, SEND
SUPPLIES. . . . . This, of course, is to be expected of any cipher.
But at (b), it is this _message fragment_, SEND SUPPLIES, which is
acting as a _trial key_; exactly the same process is being used as if
applying the true key, and this decipherment is bringing out the
original key, repeating over and over. The Vigenère cipher, then,
works equally well in reverse, and in this respect it differs from
some of its kindred ciphers. To understand this peculiarity, we have
merely to consider the tableau. Concerning this we have said that the
horizontal alphabet which stands across the top is the plaintext
alphabet, and that the vertical one at the left is merely a list of
keys. Suppose we decide to look at it the other way round, and say
that the vertical alphabet at the left is the plaintext one, and that
all 26 of the cipher alphabets are standing on end with their
key-letters at the top, so that the horizontal alphabet, written
across the top, is merely a list of these keys. Will there be any
difference in the encipherment? Might the slide, also, be prepared in
a vertical position? Does it make any difference in the results
whether we encipher plaintext _SEN_ by key BED, or encipher plaintext
BED by key _SEN_?
Figure 89
Key: B E D B E D B E D B E D.......
CRYPTOGRAM: T I Q E W X Q T O J I V.......
Plaintext: S E N D S U P P L I E S.......
Figure 90
The more difficult of our two cases, that in which we have no probable
words other than _the_, _and_, _which_, _that_, _have_, _but_, etc.,
can follow exactly the routine outlined in Fig. 90; but in this case
there must be two separate work-sheets. Here, it is usually better to
forget words and start at once with the list of normally frequent
trigrams, _THE_, _AND_, _THA_, _ENT_, _ION_, _TIO_, etc. The
key-fragments which are deciphered by these will be very short, and
very numerous; a great many of them will be very good usable
sequences, and perhaps the correct key-sequence will not look quite
so inviting as others which are incorrect. It becomes necessary, then,
to have a second work-sheet on which we may take these fragments one
by one and try them as keys. If any one of them is a fragment of the
original key, _it must bring out fragments of plaintext, and must
bring them out at some regular interval_. If the scheme of Fig. 90 is
the one preferred, the second work-sheet may be prepared exactly like
the first, and used in the same way. The only difference is as
follows: On the first work-sheet, where the figure shows the word
SUPPLIES, a supposed trigram (_THE_, _AND_, etc.) will have been used
to bring out supposed key-fragments; on the second work-sheet, one of
these supposed key-fragments will have been used. These new rows of
decipherment may then be examined to find out whether any of the new
diagonals contain apparent plaintext fragments, and, if so, whether
these occur at a regular interval.
For this kind of work, however, Ohaver has offered us another routine
which requires somewhat more preparation than Carter’s but which is
well worth the extra trouble, especially if it be remembered that a
trigram-search is never necessary except with the shortest of
cryptograms. For the longer cryptograms, we have easier methods.
Ohaver’s plan can be examined in Fig. 91.
Figure 91
L N F V E O L N V M R N G Q F H H R N H I R V F E B,
GQF QFH FHH HHR HRN RNH NHI HIR IRV RVF VFE FEB
YCS IRU XTU ZTE ZDA JZU FTV ZUE ADI JHS NRR XQO
GQF QFH FHH HHR HRN RNH NHI HIR IRV RVF VFE FEB
CNF MCH BEH DER DON NKH JEI DFR EOV NSF RCE BBB
D A E D A E D A E D A E D A E D
L N F V E O L N V M R N G Q F H H R N H I R V F E B
I N . . A L L . . I O N . . B E H . . D F R . . A Y
(TION?) (FRIDAY?)
For the benefit of the novice, we end the chapter at this point in
order that he may have some practice. Example 104 comprises a
thrilling serial with all the trimmings, gripping and original title,
smashing climax, and a brave hero, John Miller. The key to the title
is STRANGE. Part I repeats a word found in the title; part II repeats
a word of part I; and somewhere are the trigrams _NOT_, _CON_, _YET_,
_ING_, _TEN_, _THE_. We have heard, too, that an amateur encipherer
will occasionally encipher the nulls which he adds in his final group.
Example 105 is easily investigated through short common words. As to
the remaining examples, while it is true that they can be attacked by
the trigram method, the student will probably prefer to leave them
until he has seen the methods outlined in Chapters XIV and XV.
104. By PICCOLA. (For trigram practice. A new key for each fragment).
Title of Serial: S L K R N T K W W Z S N V T W T I A A I I X X X X.
Part I: R I G Z V Z K I U O M H J L B W F P K S R Z T R H E J T W I
O S W I O S G Q I I. Part II: H H T X T N E O L V R M T U L C L P P X
T Y R X K U K B U W U O J Z H X M Z K H. Part III: S Y Z Y R T N F U R
K C U S I I R Q U X W U F K C J N R L Q N F O K V X M P U O N H J A X
J H V O P. Part IV: X B V P Y S X C J J Y U R X O T S P I N Y I L U P
A V M X M M F C I B S T I T O O T B R O.
V Y I D J G I E J S N V R J H J F J D B G E K O W U Y A R F F Z W
V O K U X R P G R J U O E K M R B U Y S U H Q W J L J G C I W H G I
W.
P Q X E J F V E G Y M N Y N Y I U F R D S G V R I L P S G Z T M E S I
R K N Y I G P E R W G R R N D L O J N T Y I D X O T Y C I P C R E V C
E S G O I R L I S I R Z Q E U C G L T C I X H Y I X H E L E K Y J E K
P X I E Y R R S L H D L I F Y G P R J G S D I C E.
L V P R V S F P T Y J S P H L F R C E U S B O S Z P H J F Z N S O A P
K T T V V Z C F R J X C C T P W W R H K E W Y U K W G L N U X C C T P
X W G E R F R Z N V Z O W F J W Q Z N U K W Y O E W M P A I.
T W G J C N I U J X C S L S K K B N V G W I P S U Q I U J A U L J U Z
H B E V J V M A O H G G L T P D G L E Y S S L A F I M J S W Q I U M O
N N F L V H I U I Z D Q K V Y R T W H I M R F E U K P N O V Y T K E F
N V Q N O T.
109. By PICCOLA.
A X S E H G O I W W F O I A L G E M Q W E E N B W R E I K L S H Z Z Q
X L G A H V P Z K L D L G G D W T C M H Q D J N W K E H M V V A B M A.
CHAPTER XIII
The Gronsfeld, Porta, and Beaufort Ciphers
Figure 92
GRONSFELD Encipherment
Key: 2 8 1 0 5 2 8 1 0 5 2 8...
Plaintext: S E N D S U P P L I E S...
Cryptogram: U M O D X W X Q L N G A...
Here, we have exactly the routine of Fig. 90, except that our search
must be made for probable trigrams, and not for a probable word. We
have begun with the most likely trigram, _THE_. But here we do not
find it possible to do as we did in Fig. 90; that is, _decipher every
letter_, first as _T_, then as _H_, then as _E_. Of the twelve
cryptogram-letters present, only seven can be deciphered as _T_; the
rest are too far away from it in the normal alphabet, and would
require keys larger than 9. Of the six letters which immediately
follow the possible _T_’s (the seventh is not shown), only three can
be deciphered as _H_. And of the three letters which immediately
follow a possible _TH_, only two can be deciphered as _E_ or as _A_.
It is often possible, in these ciphers, to investigate simultaneously
the trigrams _THE_ and _THA_. So far as the cryptogram is shown, then,
there are only two points at which a trigram _THE_ can be present,
while a Vigenère cryptogram of the same length would have presented
ten possibilities. Thus, we have no real need for a second work-sheet;
the only possible key-fragments, 114 and 790, can be tested by any
hit-or-miss method which happens to be quickest.
Figure 93
Decrypting a Known Gronsfeld
The sequences U I I and A Q E are the only points at which the trigram
T H E could possibly be present, so that only the key-sequences 1 1 4
and 7 9 0 are to be tried. The digram T H alone may be present at Y J.
* * *
Figure 94
AB A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z
CD A B C D E F G H I J K L M
O P Q R S T U V W X Y Z N
EF A B C D E F G H I J K L M
P Q R S T U V W X Y Z N O
GH A B C D E F G H I J K L M
Q R S T U V W X Y Z N O P
IJ A B C D E F G H I J K L M
R S T U V W X Y Z N O P Q
KL A B C D E F G H I J K L M
S T U V W X Y Z N O P Q R
MN A B C D E F G H I J K L M
T U V W X Y Z N O P Q R S
OP A B C D E F G H I J K L M
U V W X Y Z N O P Q R S T
QR A B C D E F G H I J K L M
V W X Y Z N O P Q R S T U
ST A B C D E F G H I J K L M
W X Y Z N O P Q R S T U V
UV A B C D E F G H I J K L M
X Y Z N O P Q R S T U V W
WX A B C D E F G H I J K L M
Y Z N O P Q R S T U V W X
YZ A B C D E F G H I J K L M
Z N O P Q R S T U V W X Y
The Porta tableau, being smaller than the Vigenère, is not at all
inconvenient to prepare and use as it stands. It can be made still
more compact: The upper half being alike for all thirteen cipher
alphabets, this half can be written _once only_, at the top of the
chart. The lower halves can be written below this on thirteen parallel
lines, with their pairs of keys at the left. A ruler may then be
used, as suggested for Vigenère, to point out any given lower half.
But when it is noticed that these lower halves are identically the
same series of letters, with its point of beginning shifted one
letter at a time, it is promptly seen that a slide is possible, on
which the _N_-to-_Z_ half of the normal alphabet, if written twice in
succession, could be placed in 13 different positions with reference
to the _A_-to-_M_ half; and a slide is more convenient still. The
slide shown in Fig. 96 is another of Ohaver’s devices. The only new
feature in connection with the Porta slide lies in the handling of
the key-letters, which, in this cipher, are no longer the first
letters of their cipher alphabets. Mr. Ohaver has added them on the
sliding portion of the device, each pair of keys being placed directly
below the letter which must stand beneath the index (_A_) whenever one
or the other of the pair is the key-letter in use.
Figure 95
Porta Encipherment
Keyword: E A S T E A S T
Plaintext: S E N D S U P P...
Cipher: D R E Z D H G G...
(Compare:)
Keyword: F A T S F A T S
Plaintext: S E N D S U P P...
Cipher: D R E Z D H G G...
The Porta cipher, aside from its purely historical interest, provides
a most interesting decryptment study in the formation of its
alphabets. Notice that because of the encipherment scheme itself, it
becomes totally impossible that the substitute for any letter, in any
cipher alphabet, can ever be taken from its own half of the normal
alphabet. This limitation is far more visible than that of the
Gronsfeld. We have, say, a cryptogram sequence _H E P_. Can this
represent the trigram _THE_? No, because _E_ cannot represent _H_;
for the same reason, it cannot represent _THA_. Can it represent
_AND_? No, because _H_ cannot represent _A_. Can it represent _ENT_?
No, because _H_ cannot represent _E_. Can it represent _ION_? _TIO_?
_FOR_? _NDE_? _HAS_? It is not until we reach _STH_ that we find a
normally frequent trigram which could have the substitutes _HEP_.
But to gather the full significance of this Porta limitation, and
also a suggestion concerning the detail work when taking advantage of
it, let us picture the case of a probable word: INFANTRY.
Figure 96
┌─────────────────────────────────┐
│ A B C D E F G H I J K L M │
┌───────────┤ ┌───────────────────────────┐ ├───────────┐
│ N O P Q │ │ T U V W X Y Z N O P Q R S │ │ V W X Y │
│ │ │ │ │ │
│ │ │ (Keys) │ │ │
│ A C E G │ │ M O Q S U W Y │ │ │
│ B D F H │ │ N P R T V X Z │ │ │
└───────────┤ └───────────────────────────┘ ├───────────┘
│ │
└─────────────────────────────────┘
Using digits 1 and 2 to mean, respectively, the first and the second
half of the normal alphabet, this probable word INFANTRY has the
alphabetical pattern 1 2 1 1 2 2 2 2. And, since every substitute
must have been taken from the other half of the normal alphabet, it
will certainly be represented in any Porta cryptogram by eight letters
having the opposite alphabetical pattern: 2 1 2 2 1 1 1 1. Moreover,
a pattern as long as this is not going to be found very often in any
one cryptogram. The decryptor, then, may proceed as in Fig. 97. Each
cryptogram letter is marked I or 2, or imagined to be so marked, and
this series of digits is examined in the hope of finding a sequence
2 1 2 2 1 1 1 1. If it cannot be found, the word is not present; if
it is found, it can be assumed to represent the word INFANTRY. Here,
we meet with a slight difference between the procedure for Vigenère
and the procedure for Porta.
Figure 97
F J I D T U V S S L F F I T X M S T M E D L
1 1 1 1 2 2 2 2 2 1 1 1 1 2 2 1 2 2 1 1 1 1
.....X M S T M E D L.....
I N F A N T R Y
E C A M C E C A
F D B N D F D B
D A N C E
Using the slide of Fig. 96: Place _X_ and _I_ together, and note that
the key-letters standing below the index (stationary _A_) are _EF_.
Place _M_ and _N_ together, and note key-letters _CD_. Place _S_ and
_F_ together, and note key-letters _AB_. Place _T_ and _A_ together,
and note key-letters _MN_. From the recovered pairs of key-letters,
we are to select one each in order to recover the key-word, using
somewhat the logic we might apply in dealing with a key-phrase
cryptogram. In the given case, where we need the two vowels to form
any word at all, it is not difficult to surmise that the key-word was
DANCE. It might not be so easy to decide as between EAST and FATS;
but key-words, as a rule, are seldom so short as those we have been
using, and the longer the word, the fewer the possibilities.
Concerning keys, however, there is one contingency which may have to
be considered: The various modernized versions of this tableau are
not always duplicates. The cipher alphabets will be the same as those
given here; but where we have caused these to shift in the normal
direction, another tableau may show them shifting in reverse. The
first alphabet will be the same as here, but the second, still showing
key-letters _CD_, will show its lower half beginning _Z N O P_. . . ;
the third, still showing key-letters _EF_, will show its lower half
beginning _Y Z N O P_. . . ; and so on. The recovery of the key-word,
of course, is not vital.
* * *
Coming now to the two ciphers which are called Beaufort, we return to
a tableau so closely resembling Vigenère’s tableau that the two can
be used interchangeably. Fig. 98 shows only enough of the Beaufort
tableau to bring out the difference in form. Here, we find no separate
plaintext alphabet and no separate key-alphabet. Those which form the
square have been lengthened by repeating their first letters; and a
27th alphabet, added at the bottom of the tableau, repeats the
alphabet shown at the top. In this way, we have a 27 x 27 alphabet
square in which _all four of the outside alphabets are exactly alike_.
These ciphers, also, make use of a key-word, applied as in Vigenère
and in Porta. As Sir Francis Beaufort himself is said to have used
the tableau, the encipherment of a given plaintext-letter, using a
given key-letter, was accomplished as follows: To encipher plaintext
_S_ with key _C_, find the letter _S_ in any one of the four outside
alphabets, trace into the square along the _S_-column (or row) as far
as the key-letter _C_; at that point, turn a right angle, in either
direction, and trace outward along that row (or column), emerging
from the square at the substitute, which, in the given case, is _K_.
Or: To _decipher_ _K_ with key _C_, begin with _K_, and _follow
identically the encipherment process_, emerging this time at the
plaintext letter, _S_. This process we have called the _true Beaufort_
cipher. Notice that we have _reciprocal encipherment_; encipherment
and decipherment are identically the same thing.
Figure 98
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
E F G H I J K L M.... (Etc.) ....W X Y Z A B C D E
Key: C O M E T C O M E T C O Key: C O M E T C O M E T C O
Plaintext: S E N D S U P P L I E S Plaintext: S E N D S U P P L I E S
Cipher: K K Z B B I Z X T L Y W Cipher: Q Q B Z Z S B D H P C E
Figure 99
Key: C C C C C C C C Key: C C C C C C C C
Plaintext: A B C D E F G H... Plaintext: A B C D E F G H...
Cipher ALPHABET: C B A Z Y X W V... Cipher ALPHABET: Y Z A B C D E F...
Now, consider the true Beaufort cipher: Here, plaintext letters are
found first, and keys are found by tracing into the square, so that
encipherment is more or less a letter-by-letter process, and hardly
so convenient as in the other two ciphers. It is true that every
ascending diagonal in the tableau is made up of only one key-letter,
so that a ruler, laid diagonally across this tableau, will point out
a whole line of _C_’s, or _O_’s, or _M_’s. But practically every one
of these diagonals is broken into two portions, so that in attempting
to encipher by one key-letter at a time, we find it rather confusing
to make the necessary adjustments. Is there not, then, a more
convenient method for applying the Beaufort? Every cipher of this
family, remember, provides a certain number of individual simple
substitution cipher-alphabets. For every key (whether it is a letter
or a number) there is some kind of cipher alphabet showing a
substitute for _A_, a substitute for _B_, a substitute for _C_, and
so on. To isolate one of these cipher alphabets, and find out what it
is like, we have merely to take some one key-letter (or some one
key-number) and discover what these substitutes are, and what their
order is; that is, we need merely _encipher the normal alphabet_,
using this one key. This is true of every cipher of the
multiple-alphabet type. The process can be seen in Fig. 99, where the
_C_-alphabet (that is, the alphabet governed by key-letter _C_) is
being isolated for each of the Beaufort ciphers.
In the Beaufort proper, we find that the _C_-alphabet will begin with
_C_ and come out in the order _C B A Z Y X_. . . . , which is merely
the normal alphabet reversed. Should we investigate the _D_-alphabet,
we should find that this begins at _D_ and comes out in the order
_D C B A Z Y_. . . . , again the normal alphabet reversed; or,
investigating the _E_-alphabet, we should find _E D C B A Z_. . . . ,
always the normal alphabet written backward, and always beginning with
whatever letter is called the key. This being the case, it becomes
quite evident that a slide is possible, and the formation of this
slide is clearly indicated in the left-hand tabulation of the figure:
Its upper alphabet must run in one direction and its lower alphabet
in the other; if one of the two is made of double length, it becomes
possible to place any one of the 26 key-letters in juxtaposition with
index _A_, thus bringing into position any one of the 26
cipher-alphabets which are governed by these keys. Nor does it make a
particle of difference which of the two _A_’s, the upper or the lower,
is regarded as the index-letter; when _C_ is standing below _A_, then
_A_ is also standing below _C_. We saw, in the tableau itself, that
the true Beaufort encipherment gives reciprocal substitution. This,
however, was not our first meeting with one of the Beaufort alphabets;
in Chapter IX, we met the _Z_-alphabet. We saw there that whenever a
cipher alphabet is merely the plaintext alphabet written backward, it
makes no difference which of the two is called a cipher alphabet; we
may see here that this fact is not altered by shifting one of the
alphabets. Since a slide is possible, it follows that a disk is also
possible. This particular cipher disk, on which one alphabet runs
forward and the other backward, was used long ago in our own army,
and is widely known in this country as “The United States Army Cipher
Disk.” Most persons, apparently, prefer the slides, on which the
letters are always right-side up, and the preparation of which does
not involve the division of a circle into 26 equal arcs. Of those who
prefer the disks, practically all will make the smaller disk
_reversible_, with the normal alphabet on one side and the reversed
alphabet on the other.
Figure 100
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A Z Y X W V U T S R Q P O N M L K J I H G F E D C B
Figure 101
Probable word.......... S C C R T T A R P L D Q O L I
U E T V V C T R N F S Q N K
P O Q Q X O M I A N L I F
P Q . . . M I A N . I .
L E
I T
E C
S O
Use the word SUPPLIES as a trial key, exactly as in Vigenère, but make
use of the VARIANT method, and not tho TRUE BEAUFORT.
***
***
(b)
Cryptogram, VARIANT BEAUFORT: Q Q B Z Z S B D H P C E H K
Probable word............. S Y Y J H H A J L P X K M P S
U W H F F Y H J N V I K N Q
P M K K D M O S A N P S V
P . . . . O S . N . P .
L W
I H
E Y
S M
Of the ciphers we have seen, then, those three which are complete,
that is, which employ a full 26 alphabets, are curiously interrelated
to one another. In the matter of substitution (encipherment and
decipherment), the Beaufort stands alone, in that it is reciprocal,
while the other two ciphers are reciprocal to each other in this
respect. But in the matter of keys, it is the Vigenère which stands
alone, in that it can be deciphered indifferently by key-letter or
message-letter, where this is not true of either Beaufort. _In this
respect, these two ciphers are reciprocal_. To see this plainly, we
may examine our three encipherments, each one showing a different
cryptogram obtained from the plaintext fragment SEND SUPPLIES, using
key COMET. The Vigenère version was seen in Fig. 90. If this be
_deciphered with its message_, SEND SUPPLIES, the result is a
repeating key-word COMET COMET CO. The other two cryptograms were
those of Fig. 98. Here, the Beaufort cryptogram, beginning
_K K Z B B_, if deciphered with the key COMET, gives the
message-letters _S E N D S_. But when we attempt to decipher it using
_S E N D S_ as our key, we obtain: _I U O C R_. It becomes necessary,
in order to find out our key-letters, that we proceed as we did for
Porta: Assuming that the slide is being used, place message _S_
beside cipher _K_, and find out what key-letter is standing beside
the index _A_. Place _E_ and _K_ together, and find the next key,
and so on. That is, change the position of the slide for every
decipherment.
J Q Q Y P I R S F Q Y J N E U R U V E F V W P E B Q F G T E M K U K G
R W E T Z I D V I Q Q S Z I H K W M C E K B F J Q Q X T R F V R J K O
A T E E N J U M S N G L P I B S O A S R Y S A X R U O J G W M V R U S
V D Q Q R D P P K P L I C.
L N P L G S Y R U A I R I Q X R E N D I U U N H D
Y M S U U O Q N S T I T U G L W R E R V B Z D U Q
S I C T U Q B T F X J F E H J W N I K U N H A Y H
I E P R G X K W M P U K U L F N G Q P R B X Z R E
T E U U W T R X J F N H J Y O J U V S P N W O Z G
S O Q C J N W K G E B X Z R I P U N X B N A W O -
I O U K J G F Y S M Q S X H W W D P K M M J E S P Y W Y L B X B V U D
X T V L V O G Q K S L W W Q S E U D K W J I A M G W Z C W F O U I M M
V Z F U Q K S O X D S E L E E P T I O T U L U L W W P K Q K S Z E U.
N D L H T I E Y R K F M F H L C S Z Q A H B H T Y H A F P I V I D C S
X P Z E X N K W Q R M S A H E Q X G R E H A U H G D S O O A G X U G D
W G T I L S A P D V H A Q W E W Z M I M Y Y Q O B F E K C M M T F N E
V H W Z Y B G P W V E H R Z V U O O N B K X F O Z J A Z I Q N Z T T O
P R V I T.
K O A S Y B B S G P A R Y A T F R F D U L W H J A R G H S G U W D B C
J R V M C U P S T Q W M B Y S I W Y I F H B A A F I A N Y H J L S B T
J O C Z E E N N R U A S R U I E J N O E P S G C G W V U M E A K W R L
Y H N S R G H B A H.
115. By PICCOLA. (Short Simple Substitution. - No keyword).
O F T D A F F B E H Z H W G W F O M; M F W R J D E D N V F P Z K
W F D Y F M Z Q K K Z T.
CHAPTER XIV
The Kasiski Method for Periodic Ciphers
Prior to the 1860’s, the ciphers of the past two chapters had been
regarded as entirely safe. A radical change of opinion took place in
1863, when Major F. W. Kasiski, a German cryptanalyst, was so
indiscreet as to publish certain of his observations. The student
will surely have noticed, among the examples of Chapters XII and XIII,
the happening which is suggested in Fig. 102. Some sequence, usually
a digram, is repeated in the plaintext, and happens to be enciphered
more than once by exactly the same few key-letters; the result is a
_repeated sequence in the cryptogram_. What he may have failed to
notice is the _periodicity_ of such repeated sequences. In order that
the same few key-letters be used again, _the key-word must have been
repeated an exact number of times_, so that, in these cases of
repeated cryptogram-sequences, the distance from first-letter to
first-letter is _evenly divisible by the key-length_ — or period (in
the figure, the distance from _V_ to _V_ is 10, which is twice the
key-length, 5). This does not mean that all repeated sequences found
in Vigenère cryptograms are periodic. Often, they are purely
accidental; oftener still, they will be due to the repetition of
alphabets in the key itself, especialiy if it is such a word as
CORCORAN or DESDEMONA. But a distinct majority of them, according to
Kasiski, are caused by periodicity; and if all of the repeated
sequences found in a given cryptogram be examined to find what the
separating interval is in each case, and if all of these intervals be
factored, _the factor which predominates will betray the period of
the cryptogram_.
Figure 102
Vigenère key: C O M E T C O M E T C O M E T C O M
Plaintext: T H E R E I S A N O T H E R Q U E S
REPEATED SEQUENCE: V V Q V . . . . . . V V Q V . . . .
Now let us look at Fig. 104, where the method of presentation is once
more a debt to M. E. Ohaver. In this figure, the repeated sequences
have been listed, and each one is accompanied by the two serial
numbers of its two first letters, together with the interval which
was obtained by subtraction. Ohaver’s process provides a column for
each possible factor, beginning with 2 and carried as far as desired.
Opposite each interval, its various possible factors may then be
noted in their correct columns. In the average case, the correct
period will be pointed out by _the column showing the largest number
of entries_. But in this connection, it must be taken into
consideration that _small_ factors 2 and 3, and even factors 4 and 5,
are usually present in considerable numbers, partly as accidentals,
but also because they are factors of the period itself; that is, if
the period is 6, there will surely be factors 2 and 3 for every
factor 6, and there will usually be a few extra appearances due to
accidental repetition.
Figure 103
5 10 15 20 25 30
C H G S L F A U B F X U P H S J D A G Y X M N Z U W W J P D
35 40 45 50 55 60
J S U P L G C G F K R N I M F C H K O A Q A V X O N N U I L
65 70 75 80 85 90
N S U B F N D V P K A I P L S N M Q O H M E U I L B L K Q W
Now, considering our tabulation, and ignoring the fact that short
periods like 2 and 3 are seldom encountered, we find that factors 3
and 5 are present in equal numbers. Often, we are faced with exactly
this problem. Here are two factors which have appeared in approximately
equal numbers. Which one of these actually represents the period?
Ohaver’s recommendations include these: Where two factors seem almost
equally prominent, select the larger if it is a multiple of the
smaller. If one factor is not a multiple of the other, try to select
a period which is a multiple of both (as 15 here, includes both 3 and
5). He points out also that the factor which is the correct key-length
will usually be accompanied, in the tabulation, by quite a number of
its own multiples, growing gradually fewer and fewer as their size
increases. In this respect, our factors 3 and 5 are both disappointing.
If we consider factor 5, we find factors 10 and 15, but not growing
fewer; instead the number increases. We find no factor 20, but we do
find a factor 25; another increase. Or, if we consider factor 3, we
find factors 6 and 9, but no factor 12, and then a sudden increase in
the number of factors 15. This is a case in which the decryptor would
play safe by selecting the period 15.
Figure 104
C H 46 - 1 = 45 3 5 9 15
U B F 63 - 8 = 55 5 11
U P 33 - 12 = 21 3 7 21
S U 62 - 32 = 30 2 3 5 6 10 15
P L 73 - 34 = 39 3 13
W W J 116 - 26 = 90 2 3 5 6 9 10 15 18
N D V 91 - 66 = 25 5 25
The factors found in the largest number of DIFFERENT intervals are 3 and 5.
The student who cares to examine this matter more closely may do so
by preparing for himself a less haphazard listing of the cryptogram’s
repeated sequences. Perhaps the most satisfactory way of doing this
is to begin by making a general frequency count. Then, in order to
have the more reliable information at once, start the tabulations by
examining those letters whose frequency is only 2; follow this with
an examination of those having a frequency of 3, and so on. The
theory is that letters of these frequencies are much more likely to
belong to only one alphabet, while the letters of higher frequency
have probably been enciphered in several different alphabets, so that
their repeated sequences are not so sure to be periodic. For other
cases in which there may be some doubt, the writer’s advice is to
select large factors in preference to small factors. Or, if the
decision must be made between two factors such as 6 and 7, where a
period of 42 would be necessary in order to include both, simply
select the handiest and give it a trial. With the longer cryptograms,
as we shall see in a moment, an error in the choice is very speedily
discovered; as to the shorter cryptograms, there is one rule which
invariably holds good: _If you meet with any resistance at all_ in
dealing with the kind of ciphers which were shown in the past two
chapters, you have probably selected the wrong period.
Figure 105
A 11 11 1 111
B 11 1 11 1
C 111 1 11
D 111 1 1
E 1111 1
F 11 1 1 111
G 1 111 1
H 11 11 1
I 11 11 1111
J 111 11 1 1
K 1 111 111
L 1 1 11111 11
M 1 111 11
N 11111 11 11 1 1
O 1 11111 1 11
P 111 111 1
Q 1111 1111 1
R 11
S 1111 1 11
T 1 1
U 1 11 11111 11 111 1
V 1 1 111 11
W 11 111 11 1
X 1111 11
Y 111
Z 1
Now let us consider the one case in which the alphabets are all
“Caesars.” In this case, whether the cipher is Vigenère, Beaufort, or
Porta, we have only to identify one letter in order to identify a
whole alphabet. Suppose we examine, first, alphabet 5, in which the
one outstanding letter, _L_, has appeared 7 times. Does this letter
represent _e_? If _L_ of alphabet 5 represents _e_, then, counting
backward (that is, upward), we find that the letter _a_ will have to
be represented by _H_; this alphabet, then, will be the _H_-alphabet
if the cipher is Vigenère. The letter _H_ has a frequency of only 1,
which, in normal text, is not particularly satisfactory as the
frequency of _a_, but this frequency count has not been taken from
normal continuous text; suppose we examine the rest of the alphabet,
and find out what the frequencies would be for other letters.
Beginning at _H_, and calling letters in the order _a_, _b_, _c_, we
find that this fifth alihabet, provided it is the _H_-alphabet, will
contain: 3 _d_’s, 7 _e_’s, 2 _h_’s, 2 _l_’s, 2 _o_’s, 3 _r_’s,
3 _t_’s, and 3 _y_’s. That is, each letter present which shows a
frequency greater than 1 will represent some plaintext original
which, normally, is of some frequency, the only exception being _y_,
which is a vowel. This is the best we can expect of any columnar
frequency count made on only 34 letters; but more convincing still,
and more reliable, is the fact that out of the entire group
_j k q x z_ we find only _x_, represented once. Alphabet 5, then, is
entirely acceptable as the _H_-alphabet of the Vigenère cipher.
Let us see what we can find out about alphabet 3. Here, the strongly
predominant letter is _U_. But when we attempt to identify this as
_e_, we find that we should have to accept an alphabet containing
3 _q_’s, 2 _x_’s, and 3 _z_’s, all occurring in only thirty-odd
letters of text. We meet with similar trouble when we attempt to
identify _U_ as _t_, as _a_, as _o_, and so on. It is not until we
try it as _s_ that we have good luck, finding only a series of blanks
to represent the letters _b_, _j_, _k_, _q_, _v_, _w_, _x_, and _z_.
And if _U_ represents _s_, this alphabet begins at _C_. Alphabet 3,
then, is entirely acceptable as the _C_-alphabet of the Vigenère
cipher, and we have two of the key-letters: * * _C_ * _H_.
Figure 106
J C V 24 111 1
C V 13
D D V 36 11 11
D S 12 11 1
S S 8 111
D T J 60 11 1 1
T J 48 1111 1
This was based on a cryptogram whose period was 12. The PRIME
FACTOR 2 is obviously included twice, and the PRIME FACTOR 3 once.
* * *
Figure 107
Mr. Lindquist also developed his own method for identifying alphabets.
This method, which, in theory, is _graphic_, is not particularly
applicable to the kind of alphabets we have been considering; that is,
it would not be needed when there is so much material. But for shorter
examples, where alphabets contain only ten or fifteen letters each, it
comes close to being that magical thing referred to by Lamb, a
“mechanical crypt-solver.” This method can be examined in Fig. 107,
where it is being applied to our so-far unidentified alphabet 4. An
examination of this alphabet 4 (of Fig. 105) shows that it has four
letters of more prominence than the rest: _I_, _O_, _P_, _U_. These
letters, or most of them, should represent high-frequency originals;
and our method consists in examining them collectively in order to
find out what amount of “shift” must have taken place in order that
some four of the letters _E T A O N I R S H_ would have resulted in
these four particular substitutes. The word “shift” is best understood
by picturing the movement of the lower alphabet on a Saint-Cyr slide.
If the two _A_’s are together, this is the starting position, and the
“amount of shift” is zero. If the _B_-alphabet be moved into position,
we have a _shift of 1_; if the _C_-alphabet be moved into position,
we have a _shift of 2_; and so on. These “shift-numbers,” 0 to 25,
can be written below the letters of the sliding alphabet.
Figure 108
Tableau Showing SHIFTS for Each Letter of the Alphabet - (MORRIS R. COLLINS)
E T A O N I R S H E T A O N I R S H
22 7 0 12 13 18 9 8 19 A 4 19 0 14 13 8 17 18 7
23 8 1 13 14 19 10 9 20 B 5 20 1 15 14 9 18 19 8
24 9 2 14 15 20 11 10 21 C 6 21 2 16 15 10 19 20 9
25 10 3 15 16 21 12 11 22 D 7 22 3 17 16 11 20 21 10
0 11 4 16 17 22 13 12 23 E 8 23 4 18 17 12 21 22 11
1 12 5 17 18 23 14 13 24 F 9 24 5 19 18 13 22 23 12
2 13 6 18 19 24 15 14 25 G 10 25 6 20 19 14 23 24 13
3 14 7 19 20 25 16 15 0 H 11 0 7 21 20 15 24 25 14
4 15 8 20 21 0 17 16 1 I 12 1 8 22 21 16 25 0 15
5 16 9 21 22 1 18 17 2 J 13 2 9 23 22 17 0 1 16
6 17 10 22 23 2 19 18 3 K 14 3 10 24 23 18 1 2 17
7 18 11 23 24 3 20 19 4 L 15 4 11 25 24 19 2 3 18
8 19 12 24 25 4 21 20 5 M 16 5 12 0 25 20 3 4 19
9 20 13 25 0 5 22 21 6 N 17 6 13 1 0 21 4 5 20
10 21 14 0 1 6 23 22 7 O 18 7 14 2 1 22 5 6 21
11 22 15 1 2 7 24 23 8 P 19 8 15 3 2 23 6 7 22
12 23 16 2 3 8 25 24 9 Q 20 9 16 4 3 24 7 8 23
13 24 17 3 4 9 0 25 10 R 21 10 17 5 4 25 8 9 24
14 25 18 4 5 10 1 0 11 S 22 11 18 6 5 0 9 10 25
15 0 19 5 6 11 2 1 12 T 23 12 19 7 6 1 10 11 0
16 1 20 6 7 12 3 2 13 U 24 13 20 8 7 2 11 12 1
17 2 21 7 8 13 4 3 14 V 25 14 21 9 8 3 12 13 2
18 3 22 8 9 14 5 4 15 W 0 15 22 10 9 4 13 14 3
19 4 23 9 10 15 6 5 16 X 1 16 23 11 10 5 14 15 4
20 5 24 10 11 16 7 6 17 Y 2 17 24 12 11 6 15 16 5
21 6 25 11 12 17 8 7 18 Z 3 18 25 13 12 7 16 17 6
Figure 109
E A I H T O N R S
9 0 5 6 N 6 1 0 4 5 A
10 1 6 7 O 5 0 12 3 4 B
11 2 7 8 P 4 12 11 2 3 C
12 3 8 9 Q 3 11 10 1 2 D
0 4 9 10 R 2 10 9 0 1 E
1 5 10 11 S 1 9 8 12 0 F
2 6 11 12 T 0 8 7 11 12 G
3 7 12 0 U 12 7 6 10 11 H
4 8 0 1 V 11 6 5 9 10 I
5 9 1 2 W 10 5 4 8 9 J
6 10 2 3 X 9 4 3 7 8 K
7 11 3 4 Y 8 3 2 6 7 L
8 12 4 5 Z 7 2 1 5 6 M
Miss Pearson’s device took the form of _strips_, a set of 26 for each
of the three ciphers. Fig. 110 shows the first five of her Vigenère
set as she originally prepared them, using the “position-numbers,”
which are all larger by 1 than those of the tableau. Aside from this,
each strip represents one row from the Vigenère half of Collins’
tableau. But where Collins had arranged his numbers according to the
frequencies of the nine possible originals (so that possibilities
found on the left might have more significance than others found on
the right), Miss Pearson arranged hers in straight numerical order,
and spaced them in such a way that No. 1 is always in the first
column, No. 2 is always in the second column, and so on. Had she used
key-letters, all _A_’s would have been in the first column, all _B_’s
in the second column, and so on. As to the use of these strips:
Presuming that the four leading cryptogram-letters are the same as
before, simply pick out the four strips which are headed by the
letters _I_, _O_, _P_, and _U_, and set them together. If any of the
numbers are duplicated, _you will find them standing in the same
column_. These, remember, are the devices of amateurs, and both will
be found very effective. It will be noticed that the basis is the
finding of key-letters (or numbers) and not the identification of
cipher alphabets.
Figure 110
W L P C V M O G K E E I F M U R W W F H V M F F W E Y X A V U B I C Z
O J M L C H V X Y F K S C U S X I L M G B Q I D B W I F G B I Q Z G Z
H F J Y P M K I G V P T W Y K W Z H W M Z H W I F A P S D N W F H E D
S C X A V O E B Y Y O K C O Y U I H U J L H U D X P P W V V H P F W Y
L G F B V E J M A A G B P I E B A V U V Q L Z N L P W A J W.
D J T X J M H L M K O M F D T F N E U I G D D N A A U S N S A C F G Y
M Z Y A Q A N M W U W S R B R F J J Q S K A Y B A N B L T O J E R K S
N W X A G T J L Z Y S T V A R B X L K N R L V D U U F O F A K Z L W Y T E E
W.
D W P W Z T C G H H Z B B V W F B H I F W Q B L L J D Z R G U M M E S
W B D W L J K X I F Y Z D G K Y I O I K D W P M F H C M S F Q G C E L
J I I H W A M I W L J Z I W S W K V W E.
N S R V K D K S I W J W Y C E C E G K C E B D K N Q Y S J U L X Z O L
X P S U V U T F B S O I N P C R R E U Y O N U F K H K Z D D O J P Q Z
C K J I E N A F J D W B U S J U R C L C J C E P C O K T V F A F P Y X
G K K Y Z V.
A B C D E F G C H G I J A K G F D J F B L M E D M M I M G B A N F L C
L O G J P N F D R F C L N. O G P I M S D A N T D L I F U. F C B G
N B P J E G J F C L E F, K C G A I E D V B F.
CHAPTER XV
Miscellaneous Phases of Vigenère Decryptment
Figure 111
(a) (b)
Z I L T F R U I Y T J R Z I L 1 2 3 4 5 6
x x x Z I L T F R
U I Y T J R
K A R O I E A O A E U K L W K. Z I L K A R
x O I E A O A
E U K L W K
For this kind of case, however, many solvers have a preference for
the purely mechanical method which is detailed in Fig. 112. _Sheet 1_
of this figure has been prepared from the first column of our
cryptogram, which included the letters _Z U Z O E_. _Sheet 2_ has
been prepared from the second column, which included the letters
_I I I I U_; and _sheet 3_ has been prepared from the third column,
which included the letters _L Y L E K_. In each case, the column of
cryptogram letters, as it first stands, is also the _A_-decipherment.
With each letter used as a point of beginning, a series of normal
alphabets may be laid out, as in the figure, and the resulting 25
new columns on every sheet will show the other 25 possible
decipherments. But if these decipherments have been caused to
progress in the normal alphabetical direction, and if the cipher is
Vigenère, the key-letters which produce these deciphered columns will
have to run backward in the alphabet. These can be added at the tops
or bottoms of their columns, and can, if desired, be written in red
ink, or otherwise distinguished.
Figure 112
KEYS: a z y x w v u t s r q p o n m l k j i h g f e d c b
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
KEYS: a z y x w v u t s r q p o n m l k j i h g f e d c b
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
KEYS: a z y x w v u t s r q p o n m l k j i h g f e d c b
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
Now, assuming that these sheets have actually been prepared, say on
quadrille paper, the various columns of decipherment may be examined,
and a check-mark placed beside each column in which the series of
letters appears to represent a “good” decipherment. With longer
columns, those may be checked which contain the largest percentages
of letters _E T A O N I R S H_, without too many of the letters
_J K Q X Z_; with shorter columns, perhaps those are “best” in which
any repeated letters are chiefly vowels, it being remembered that
when the cryptogram contains repeated sequences, as well as repeated
single letters, the possible identity of these repeated digrams or
trigrams must also be taken into consideration. With all of the
apparently good columns checked for attention, _sheet 1_ may be
creased vertically so as to place any desired column on the extreme
right, and this column may then be laid directly against any desired
column of _sheet 2_ for an observation of the resulting digrams. If
these appear to be satisfactory, then _sheet 2_ may also be creased
vertically, and the series of apparently good digrams may be laid
directly against any desired column of _sheet 3_ for an observation
of the resulting trigrams. And so on, if desired, to a possible
_sheet 4_, or _5_, or _6_, though, as a rule, the first three sheets
will be found sufficient. While the method, as indicated, is intended
to be mechanical, that is, largely visual, it would be possible,
where uncertainty exists between two given combinations, to copy
these and subject them to a digram test. But this should not be
necessary in a case where key-letters, as well as their deciphered
columns, are expected to set up good combinations in order to form a
plaintext key-word.
Figure 113
* * *
Figure 114
| a z y x w v u t s r q p o n m l k j i h g f e d c b |
( A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D E F G H ...
( A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D E ...
( A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
I ...
| z y x w v u t s r q p o n m l k j i h g f e d c b a |
As this is shown, it has been set for the decipherment of a trigram H D G, and
every possible decipherment can be read from the slide without changing its
present adjustment. The entire list of frequent trigrams can be used as trial
keys:
* * *
Figure 115
Key-letters: M Y C O U N T R Y T I S ...
Plaintext letters: S E N D S U P P L I E S ...
Cryptogram: E C P R M H I G J B M K ...
122. By SABIO. (Vigenère with Running Key. SENT, AGENT, STOP, IMPREGNATED).
A R U N N I N G K E Y S O Q M A V Q X K L U E R S Z S S R F A H A I V
X W E T N K Z Q N V R A G W V E T F W N L K A T A I B S Z U H P E X U
B W W A S P N F F C. (These are a trifle tedious, but not inhuman).
• • • • • •• •• ••
A P V K W T P K P V Y G Q P G A K J Z W J N I X J U Q O U K P V W F U
R F X N K C K P R K Q K W F U R G J O V Z O K G X J V Q S W T F K D L
L Y Q L X Z E F L Y U J V Z C X G Q L J M T X W K K P V T V B Y K X P
F J Z Q X B V C O V V H X Z K J Z U Y.
124. By WHOSIT. (Beaufort, with key-interruption. THEY, WHEN, IN, ON, UP, etc).
M X Y F U H P M J B C X O C K A L Q E D B Q A E P R B Z L G L W M J B
Z Z C S A A L A O E K K C W L L J B P H U W B L F Q O R B Z L A O E M
A L O K F P V H Y U Y H Y J L X O L X Z.
125. By B. Natural. (Gronsfeld, with key-interruption).
S O W H Z G H O C V V W L F F F X O F H H X Q S I H S O Y P P H K T Q
H Z F Y J Q G Q H O B X V X O F L R J L F W E A E F H O G G V O F E T
Y M U X O F T H S N F B U A O B W H V C V V H V A O F Q M A G V N H S
S C F U X O F V H E L O A O J O E C V V E Y F A V S N I P L E O U P W
T A G P Q K E T.
126. By TRYIT. (Gronsfeld, with interruptors. MY, TO, THE, OF, IS, BE, WHICH).
R H X G A P A S R E C Z T R T W Z A J Z S G Q A Z M T P E A U X G K Y
Z F W Z S G Q Y O E Y F C T P W B G K O D P W N D X Z A W F O W H T Z
B M O H K Q P K V K S Q N D J Z S L Z X L C R T T N H S H W.
P N B Y C A N D V N P N F Y Z G V N W E J N S I T T T Z B L N O S L N
X R N I L Z H N H M D X D X B Z N B I K W Z H N D J N B M D T N O I K
N E I I H T W Q M F A T N P Q U N T J W D C X N G I C X P Z B L N O S
L N O I J N O S L G N H S C K T Q D N X W N R I I I L M J T R N U M D
T.
CHAPTER XVI
Auto-Encipherment
Figure 116
Figure 117
Key: C O M E T/ U S Z H L O H O S T .....
S E N D S U P P L I E S T O M .....
U S Z H L O H O S T .....
Note that the cryptogram itself is the key, except that the
first five letters are missing. To decrypt, With any
alphabet, need merely find where to begin using it!
Figure 118
S . . . . R T . . . . L
S . . . . R . . . . S T . . . . L . . . . T
J . . . . J E . . . . E
Figure 119
L C N D M E E L C N O Y G T B G X V N D G S S H W A W J Q E V L H O W
Y I J W L E X A P V E C L B H D Q E K U W W G R H X J F B D Y P I P K
Q D W A R G U W R L G N I Q S L V L E S P H E U T X B O N D H V X D C
O U D S J T F J N U Q N Q L A A I L M Z U X I E W O B Y I W E H P D Q
* * *
Figure 120
(a) (b)
Interval 8, found 8 times Possible Reason for L C N
" 16, " 8 "
" 4, " 6 " T H E o r e m/G E T t i..
" 5, " 6 " G E T t i n g T H E b a..
" 7, " 6 " Z L Y . . . . Z L Y . .
Now, considering Fig. 121: If the unknown first key-letter was _A_,
then the first plaintext letter, found by deciphering with key _A_,
was _L_, and this became the key for enciphering the eighth letter.
If the key which enciphered the eighth letter was _L_, then the
eighth letter, found by deciphering with key _L_, was _A_, and this
became the key for enciphering the fifteenth letter. Following out
this decipherment to the end of _series 1_, we find that the plaintext
letters must have been _L A B R Z Z B_, etc., as given in full in the
figure. A glance at the complete series will show that this
decipherment is not a particularly good one. If another decipherment
be carried out, on the hypothesis that the original first key-letter
was _B_, we obtain the series _K B A S Y A A_, etc., which starts out
fairly well, but which, when completed, will contain two _K_’s, one
_Z_, two _B_’s, and one _P_. If a third decipherment be carried out,
on the hypothesis that the original first key-letter was _C_, we
obtain the series _J C Z T X B Z_, etc., which is a poor decipherment
from the beginning. A trial and error method might consist in making
these decipherments one at a time directly on the cryptogram, erasing
one when it is obviously poor, and trying to add the next series
whenever one proves acceptable.
Figure 121
Keys: A L A B
L C N D M E K L C N O Y G T B G X V N D G S S H W A W J......
Plaintext: L A B R
Now let us examine, not the columns, but the rows, of this tableau,
and find out just how troublesome it is going to be to prepare
tableaux of the same kind for _series 2_, _series 3_, and possibly
others. The key-letters, across the top, constitute a normal
alphabet, and below this each row contains the 26 decipherments for
some one letter of _series 1_. On the odd-numbered rows, the
decipherments for the odd-numbered letters are alphabetically
arranged, but progressing in a direction contrary to that of their
keys, as if these odd letters represented Vigenère encipherment. On
the even-numbered rows, the decipherments for the even-numbered
letters are also alphabetically arranged, but are progressing
parallel to their keys, as if these even-numbered letters might
represent variant Beaufort encipherment. Evidently, then, the
_A_-decipherment is the only one which must actually be carried out;
afterward, the preparation of the tableau is a matter of extending
alphabets. With similar tableaux prepared for the remaining six
series, we have seven sheets, and on each one of these there is one
column showing the correct decipherment of the series, headed by the
correct key-letter. Thus, our solution is to be the mechanical one
of the preceding chapter. On each one of the tableaux, the apparently
“good” decipherments may be checked for attention; the sheets may be
creased between columns, and the “good” decipherments of one tableau
may be placed directly in contact with those of another.
Figure 122
THE
CIPHER The 26 Decipherments, with Keys
LETTERS
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z (Keys)
L L K J I H G F E D C B A Z Y X W V U T S R Q P O N M ←
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z →
B B A Z Y X W V U T S R Q P O N M L K J I H G F E D C ←
S R S T U V W X Y Z A B C D E F G H I J K L M N O P Q →
Q Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
A B A Z Y X W V U T S R Q P O N M L K J I H G F E D C
H G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
W Q P O N M L K J I H G F E D C B A Z Y X W V U T S R
B L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
Q F E D C B A Z Y X W V U T S R Q P O N M L K J I H G
W R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S B A Z Y X W V U T S R Q P O N M L K J I H G F E D C
H G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
N H G F E D C B A Z Y X W V U T S R Q P O N M L K J I
O H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
J C B A Z Y X W V U T S R Q P O N M L K J I H G F E D
A Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
X Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
* * *
Figure 123
a a a a a a a L C N D M E K A A A L M C J B G X K B B X R M K M Z V M
L C N D M E K L C N O Y G T B G X V N D G S S H W A W J Q E V L H O W
L C N D M E K A A A L M C J B G X K B B X R M K M Z V M Z S L Z I T K
Z S L Z I T K Z Q Y X D L N B Z X H Z A O G E T X L U I Q C Y K M P X
Y I J W L E X A P V E C L B H D Q E K U W W G R H X J F B D Y P I P K
Z Q Y X D L N B Z X H Z A O G E T X L U I Q C Y K M P X L B A F W A N
L B A F W A N F C W V V G H R P P L S C J B W G A M Q G G I O T L L I
Q D W A R G U W R L G N I Q S L V L E S P H E U T X B O N D H V X D C
F C W V V G H R P P L S C J B W G A M Q G G I O T L L I H V T C M S U
H V T C M S U H Z K Q X B L C O K A Q P A Y M Y L W K U Z W G L S R E
O U D S J T F J N U Q N Q L A A I L M Z U X I E W O B Y I W E H P D Q
H Z K Q X B L C O K A Q P A Y M Y L W K U Z W G L S R E J A Y W X M M
Figure 124
L C N D M E K A A A L M C J
B G X K B B X R M K M Z V M
Z S L Z I T K Z Q Y X D L N
B Z X H Z A O G E T X L U I
Q C Y K M P X L B A F W A N
F C W V V G H R P P L S C J
B W G A M Q G G I O T L L I
H V T C M S U H Z K Q X B L
C O K A Q P A Y M Y L W K U
Z W G L S R E J A Y W X M M
1 2 3 4 5 6 7 1 2 3 4 5 6 7
(Vigenère) (Variant Beaufort)
Figure 125
* * *
Figure 126
Estimated Rank of the Cryptogram Letters and Their Frequencies Per 10,000
VIGENÈRE
BEAUFORT
& VARIANT
PORTA
Figure 127
C A K W U B M X L D N Y P F O Z E G Q H S I T R J V
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
(b) ENCIPHERMENT - Auxiliary Key X, or 8:
Plaintext: S E N D S U P P L I E S T O M O R
FIRST Substitution: 21 17 11 10 21 5 13 13 9 22 17 21 23 15 7 15 24
AUTOKEY (Addition): 8 21 17 11 10 21 5 13 13 9 22 17 21 23 15 7 15
C R Y P T O G R A M... 29-38-28-21-31-26-18-26-22-31-39-38-44-38-22-22-39-
════════
══════════════
L E Y T O M O P R O W S T O P
9 17 12 23 15 7 15 24 24 15 4 21 23 15 13
24 9 17 12 23 15 7 15 24 24 15 4 21 23 15
33-26-29-35-38-22-22-39-48-39-19-25-44-38-28.
══════════════ ════════
xxxxxxxxxxx xxxxx
(d) Vigenère Autokey - What Happens to REPEATED SEQUENCES with a ONE-LETTER KEY:
Key... X/ T H E M O N T H E X T
Text... T H E M O N T H E X T E
A L A L
But for short cryptograms, Lamb did not find these characteristic
frequency counts half so convincing as the presence in a cryptogram
of certain _digrams_, which appeared to be characteristic for each
cipher, since he was always able to find from 7 to 10 of them in each
100 letters. By making use of the high-frequency digrams (_th_, _he_,
_er_, _in_, _an_, and so on), he then established lists of cipher
digrams which were very characteristic indeed for each type of
encipherment. Thus, in attacking an autokey, it is possible to make
a good beginning with such a digram as _VV_ (_er_-_re_) or _XK_
(_th_-_ed_), if the cipher is Vigenère, and work in both directions.
Figure 128
The Cryptogram: 29 38 28 21 31 26 18 26 22 31 39 38 44 38 22 22 39
9 20 18 10 11 20 6 12 14 8 23 16 22 22 16 6 16
20 18 10 11 20 6 12 14 8 23 16 22 22 16 6 16 23
════════
33 26 29 35 38 22 22 39 48 39 19 25 44 38 28
23 10 16 13 22 16 6 16 23 25 14 5 20 24 14
1O 16 13 22 16 6 16 23 25 14 5 20 24 14 14
════════
Now, putting aside the fact of the mixed plaintext alphabet (since we
do not intend to recover the letters) we have here a cipher which, to
all intents and purposes, is the Vigenère autokey initiated with a
single letter. In place of the letters _A_ to _Z_ we have numbers 1
to 26, and the encipherment is a series of additions. In the
corresponding Vigenère case, the group-length 1 will usually show up
plainly in the number of doubled letters — “letters repeated at
interval 1.” And with the group-length determined as 1, it is
possible to begin with some given initial key, as _A_, and either
reproduce the plaintext or convert the autokeyed cryptogram to a
periodic one in which the period is 2 (twice the group-length).
Considering the analogy between the two cases, it should be possible
to do the same thing here. That is, it should be possible to take the
autokeyed cryptogram of (b), initiate its decipherment with some
number chosen between 1 and 26, and either reproduce the primary
cryptogram or convert the autokeyed cryptogram to a periodic one in
which the alternate numbers will belong to two cipher alphabets.
Where this reduction has been carried out in Fig. 128, the initial
decipherment was made with key 9 in order to avoid a discussion of
negative numbers. Also, the fact of numbers will usually limit the
range of the trial keys: here, the first number, 29, was not
enciphered by adding any number smaller than 3.
Now, looking at Fig. 129, let us compare the new cryptogram of Fig.
128 with the primary cryptogram of Fig. 127(b), and see whether or
not it has the expected formation. Between the two cryptograms (the
supposedly periodic one obtained from the trial decipherment and the
one we hope to recover), there is a constant numerical difference in
the pairs of corresponding substitutes, and this difference,
throughout, is alternately plus and minus. Further comparisons can
be made, if the student so desires, by initiating other partial
decipherments with trial-keys 10, 11, 12, etc. Always, the constant
numerical difference persists, and always it is alternately plus and
minus. Moreover, for every time that the initial key-number increases
in size, there is a corresponding decrease in all numbers occupying
the odd serial positions and a corresponding increase in all numbers
occupying the even positions.
Figure 129
Figure 130
Trial Decipherments:
Our explanation, perhaps, has been a little rapid, but the student
who has read carefully will be able to discover the “germ” originally
referred to, and to make his own laboratory tests. Also, there may be
an interesting answer to the following question: When the cipher is
one of the Beauforts (using letters), and the auto-encipherment is
initiated with a single letter, does a trial decipherment, initiated
with some other single letter, result in a period of 2?
O O U J V J M K N C B U Q L P F U L A S A Z F T G M P B V A Y V S Q J
L F A W S P C H A E I U N R S M F V W S S O O H M E B E A M K F A A X
R H K Z R J Q A O I A V M E I B T O P D J G P R J N F R X T I I G X F
K D H X A F T H J Q H L A R K T G D L P S B M V Y E E V A O A C S M U
V U W C V C T S K S M W L O N P A O O H M W W P Y P O H I L G A Z Q B
Q U Z B Q P K M B O V K W J H P J A G D C H X G W Q B K O G Y A K S I
W N W E X Q N U S U C V O E Y H Y J J C B T B V J Q M N S P A R V P X
O A G T A V L V C Z B D I X N F M W U E Z L N N N W B M O X G T C P K.
O A N C Q R O Q N Y Z G K P L V G P A I A B V H U O L Z F A C F M A V
Z J H T I L L X V B C Z M M T O W Z W A O Q V P M M Q D L Q K O H K F
G O B T L R A U X Y T Y S F N O C Y G R P M U U H T H E W P O O S R G
R Z Z S L Y G K I A N K M M T O W Z W A O Q V A B E U X W T C T J I O
G L P H T E F U F B R X M U Z V L D B P K N S Y A Q B I V M O H P V L
G Z Y F C C W C O M C A W N A A A E V A W M P E B Q X O D O V P X A T
E M A J A T P M J E A Z Z M D S B B N A A A F G L I D N X A M K H K P
D B B P Q Y.
T B F N Q X E F D G F W E A F X S Q U N I G A H E U N B B J L O B Q P
H F A K A S N X G B P E E J W W L Z J O M L L A P R V Y T N M X H Y V
O S E S Q V O A Q M O G V P A J K P Y I U Z F Q G Y J Y T L D F E L Q
Z L W Y Y U Y Z N E P P F W B R W M E E F R W X J W E P R V Y B U M P
Z Z M T S B U K K B A L K Z I L Q A L Z K K F S X Z U S T G J T H A R
G S B X I W V L Z B Z M P I K Y I U R H R V W C V A U F V L W F Q Z U
D I G F W H T Z M S F B K T Z U T R K I V F Z X W L C A U J P A N V S
E O Z U X G I X D S X M G Q E L Q T V B L E I D I A L L A I N O E N L
V J I O I S W Q T D E C T M.
CHAPTER XVII
Some Periodic Number-Ciphers
Figure 131
The cryptogram of Fig. 132 was enciphered with the slide of the
preceding figure, using the key-word CABLO (equivalent to the
numerical key 30-10-20-21-51), and its period, 5, can be determined
in the usual way. However, we have already seen the Kasiski method;
suppose, here, we look at another, originated by Ohaver; and, since
Ohaver himself, explaining his method in connection with a
number-cipher of much the kind we have here, illustrated with single
numbers instead of with sequences, it seems fitting that it be
illustrated again in the same way.
Figure 132
Cryptogram Enciphered with the Slide of Figure 131
32 41 31 61 33 12 32 60 91 91 30 81 70 92 92 51 52 61 23 43 71 01 90 61 71
71 41 12 92 51 01 52 12 91 91 80 50 30 92 53 30 81 62 72 62 30 41 00 02 43
71 20 60 41 51 01 81 00 61 81 71 12 12 31 93 61 50 00 32 33 70 41 00 52 33
22 50 20 51 92 80 31 61 92 23 11 91 01 13 92 81 51 12 91 91 01 30 90 21 82
90 50 01 21 23 70 20 60 01 82 90 31 20 51 91 22 51 12 91 32 12 50 51 51 33
71 10 01 13 92 40 50 91 61 51 60 52 42 91 91 61 01 90 61 43 11 31 60 41 92
51 50 01 02 92 81 21 60 21 33 70 21 60 13 72 70 80 60 21 23 01 90 80 91 43
30 32 20 63 32 80 01 90 61 23 70 90 01 21 82 72 51 30 12 91 50 01 00 62 82
40 50 40 21 53 12 50 12 91 32 12 90 01 81 92 11 41 80 13 92 22 10 21 61 43
11 31 60 21 82 60 32 60 51 92 61 01 42 21 82 22 10 51 63 22 11 01 40 91 51
22 01 90 61 62 30 91 12 42 32 61 12 12 61 33.
As pointed out more than once, those characters having the highest
frequencies in periodic cryptograms will nearly always have derived
these high frequencies because of their occurrence in more than one
of the cipher alphabets; while those having the lower frequencies
will more often represent repetitions in some one cipher alphabet.
Thus, when we find, in the present cryptogram, that the numbers 02,
53, and 63, have each a frequency of 2, it seems reasonable to
suppose, for each number, that its two occurrences were in a single
cipher alphabet; that is, that each one is a periodic repetition.
Now, considering Fig. 133, and confining our observations, for the
moment, to the number 02, we find that this number, in the cryptogram,
occupies serial positions 49 and 154. Having first laid out a series
of columns headed by the various possible periods, 2, 3, 4, 5.
. . . . , we use each possible period in turn as a divisor, first
applying them all to the serial number 49, and then applying them
all to the serial number 154, each time setting down, in the proper
column, _the remainder from the division_. This remainder tells us,
each time, into what cipher alphabet the number 02 would fall, should
the cryptogram be rewritten into the period indicated at the top of a
given column. Still confining our observations to the number 02: It
is seen, under possible period 2, that if this were the period, then
the two occurrences of the number 02 would be in different alphabets.
The same can be seen under possible periods 4, 6, 8, 9, 10. But if
the period were 3, both occurrences of our number would fall into
alphabet 1; if it were 5, both occurrences would fall into alphabet
4; if it were 7, both occurrences would fall into alphabet 7
(remainder zero indicates the final alphabet of the given period).
Here, then, it would appear that possible periods 3, 5, and 7, are
more likely than the rest, as far as the tabulation goes. When
exactly the same observations are made for the number 53, it appears
that the most likely periods are 3 and 5. And when these observations
are made again for the number 63, only the period 5 is indicated as a
likely one. Since the period 5 has been indicated oftener than any
other, this is probably the correct period, as we happen to know
that it is.
Figure 133
P O S S I B L E P E R I O D S
Substitute Serial Position 2 3 4 5 6 7 8 9 10 ...
02 49 1 1 1 4 1 0 1 4 9 ...
154 0 1 2 4 4 0 2 1 4 ...
53 40 0 1 0 0 4 5 0 4 0 ...
205 1 1 1 0 1 2 5 7 5 ...
63 179 1 2 3 4 5 4 3 8 9 ...
244 0 1 0 4 4 6 4 1 4 ...
X
X
* * *
Figure 134
A Series of PARALLEL Frequency Counts Which Can Be LINED UP By PATTERN
10 . 111 . . .
20 . 11 111 . .
30 11111 1 11 . .
40 11 . 11 . .
50 1 11111 1111 . . .
60 11 . 11111 1111 . .
70 11111 . 1 . .
80 111 1 11 . .
90 11 111 11111 . .
00 . . 11111 . .
11 11111 . . . .
21 . 11 1 11111 111 .
31 . 1111 1 1 .
41 . 11111 . 11 .
51 11 111 11 1111 1111
61 1111 . 11 11111 1111 .
71 11111 . . . 1
81 11 111 . 1 1
91 . 11 1 11111 111 11111 1
01 1111 11111 11 11111 1 1 .
12 1111 11 11111 111 1 .
22 11111 . . . 1
32 1 111 . 1 1111
42 . . 11 1 .
52 . 111 . 1 .
62 . . 1 1 11
72 1 . . 1 1
82 . . . . 11111 1
92 . . . 1111 11111 1111
02 . . . 11 .
13 . . . 1111 .
23 . . . 1 1111
33 . . . . 11111 1
43 . . . . 11111
53 . . . . 11
63 . . . 11 .
73 . . . . .
83 . . . . .
93 . . . . 1
03 . . . . .
There are many other cases, hardly more difficult, in which our
rearrangement of numbers results, not in the original order, but in
an _equivalent order_. We could, for instance, arrive at a
rearrangement in which we have taken each third number, or each fifth
number, of the original cipher alphabet, so that our rearranged
numbers are following plaintext letters in the order
_A D G J_. . . . or _A F K P_. . . . ; thus, all of our frequency
counts would be following one same graph, though not the graph of the
normal alphabet. The problem here is to make sure that their graphs
are all the same graph, and then subject them to the process called
“lining up.”
Figure 135
To show the handling of all such cases (which would include our final
autokey example), let us assume that the five frequency counts of our
figure, though still following a common graph, are not following that
of the normal alphabet. In this case, granting that all fifty-letter
frequency counts will vary considerably from the normal, it is not
quite so obvious that their pattern is the same; we shall have to cut
them apart (preferably having copied numbers beside their frequencies)
and place them side by side for a comparison of their graphs. Where
this has been done, in Fig. 135, their similarity is plain in spite
of some discrepancies, and the moving up or down of any one or more
of the counts (which could be done so as to include another position,
since the range of the numbers is only 25 per alphabet) does not
result in greater similarity. If the alignment of this figure is
correct, then all numbers found on any one row are substituting for
one same original; thus, the added frequencies on any one row will be
the total frequency of some one letter in a 265-letter text, and all
of these totals, collectively, should resemble a frequency count
taken on a simple substitution cryptogram of that length. To just
what extent this is true may be seen at the right side of the figure.
The nine leading letters have totalled 74%, where we normally expect
70%; but any single example can provide its surprises, and the excess
4% is not on the wrong side of the ledger. The other end of the count,
as would be expected of the group _J K Q X Z_, is comparatively blank.
Figure 136
1 2 3 4 5
1 A B C D E 13 = C
2 F G H I K 34 = O
3 L M N O P 32 = M
4 Q R S T U 15 = E
5 V W X Y Z 44 = T
S E N D S U P P L I E S T O ....
Text... 43 15 33 14 43 45 35 35 31 24 15 43 44 34 ....
Key.... 13 34 32 15 44 13 34 32 15 44 13 34 32 15 ....
56 49 65 29 87 58 69 67 46 68 28 77 76 49 ....
* * *
In view of the fact that any cipher which will necessarily double the
lengths of messages is of doubtful value, it seems inadvisable here
to do more than mention the infinite multiplicity of processes which
would be possible; but with checkerboards, it is difficult to imagine
any usable process which would not result in parallel frequency
counts; that is, counts which all follow the same graph and thus are
capable of being “lined up.” With most of these, in fact, the
difference between any two of the (secondary) cipher alphabets will
be a difference in _size_ which is uniform from _A_ to _Z_. (Often,
the same result is produced with slides.) Here, then, we may content
ourselves with a glance at one such cipher which is interesting
rather than important. In Fig. 136, we have another of the Nihilist
ciphers. Its primary alphabet is that most famous of checkerboards,
the _Polybius square_, said to have been the invention of the ancient
Greek historian, and certainly well known in his era as the basis for
a signalling system — a capacity, incidentally, in which it still
serves. We are showing it here in what seems to be the favorite
version: The alphabet of the square is the normal one, normally
arranged, with _J_ the missing letter; and the order of reading for
the two digits is row-column. It should be understood, however, that
these details, in practice, are quite variable.
Notice that its primary alphabet contains only the digits 1-2-3-4-5.
The maximum difference among these is 4; and the addition of any same
number to all of them does not change this fact; the maximum
difference between any two of the sums would still be 4. But the
number which is added during encipherment is also a number containing
no digit other than 1-2-3-4-5; thus any number found in a cryptogram
can be considered as carrying two separate additions, one for tens
and one for units. Even when two 5’s are added together, the result
is an all-revealing zero; the “carried” digit 1 can be mentally
“borrowed” back, causing the zero to become 10, and decreasing by 1
the size of the digit which precedes the zero. Specifically: Finding
in a cryptogram the number 40, we may regard this as having only
3 tens, with 10 units; or finding the number 110, we may regard it
as having 10 tens and 10 units. Thus, there is never a time when it
is impossible to see the tens and units as having been separately
added; if we find, in a Nihilist cryptogram, the two numbers 29 and
87, with a difference greater than 4 in their respective tens-digits,
we may say promptly that they were not enciphered with the same key;
no digit whatever added to any two digits of the original square can
produce a difference greater than 4. But if the two cryptogram
numbers are 30 and 77, where the difference in the tens-digits
appears, at first glance, to be only 4, the presence of the zero
must be taken into account; thus, the number 30 has only 2 tens,
and the difference between 2 and 7 is greater than 4; therefore,
the numbers 30 and 77 could not have been enciphered with the same
key. It is interesting, also, to note that the digit 2, found in a
cryptogram, can have been produced in only one way: the addition of
1 and 1; and that the digit 0, found in a cryptogram, can only have
been produced by the addition of 5 and 5. Either one of these digits
gives away its key; but, further than this, the cipher provides four
“give-away” numbers, 22, 30, 102, and 110, the presence of any one
of which in a cryptogram will give away the key to a whole cipher
alphabet.
Figure 137
(Acceptable throughout)
_Period 2_: With a thumbnail on the first number, 24, and another on
the third number, 35, we may run quickly through the cryptogram
comparing numbers found at interval 2; that is, the first and third
numbers, the second and fourth, the third and fifth, and so on, until
stopped by the two numbers 33 and 38, whose difference, in the units,
is greater than 4, showing that their key was not the same. Period 2,
then, is eliminated.
_Period 3_: Here we are stopped short at the very first comparison.
The numbers 24 and 77, found at the first interval 3, have a
difference greater than 4 in their tens, and thus cannot have been
enciphered with the same key. Period 3 is also eliminated.
_Alphabet 2_: The tens-half of the second column ranges over the
full five digits 4-5-6-7-8 (key 3), and the units-half ranges over
the digits 5-6-7-8-9 (key 4). The key which produced the second
cipher alphabet is 34.
_Alphabet 4_: The tens-half of the fourth column ranges only over
the digits 5-6-7-8, with nothing to indicate whether the missing one
is 4 or 9. Thus, the key to the tens might have been either 3 or 4,
though it could not have been anything else. The units have the full
range of digits, 5-6-7-8-9, key 4. In the fourth cipher alphabet,
then, we cannot tell immediately whether the key is 34 or 44.
Granting, however, that the arrangement of letters in Lindquist’s
key-square was the same as that of Fig. 136, the substitution of
letters for numbers may suggest which of the two numbers, 34 or 44,
is the correct key. With one of these we obtain letters _C O A O_,
and, with the other, _C O A T_, a word (The student might find it
of interest to decipher this cryptogram and learn what the minister
had to say).
* * *
Any sufficiently long cryptogram, then, will reveal both its period
and its key, and this regardless of how the letters were arranged in
the encipherer’s checkerboard. It may then be deciphered with its own
key, and the case, at worst, becomes one of simple substitution. With
shorter cryptograms, we often find, as here, that some one or more of
the cipher alphabets could have had two or more possible keys. This
happening, presuming that the alphabetical arrangement of the square
is a known one, or one easily reconstructed, presents no real
problem; a little experimentation on the cryptogram will show which
keys bring out a message. When the alphabet of the square is an
unknown mixed one, the problem may vary according to length, and the
number of key-combinations which are found to be possible. If, for
instance, the case resembles that of our preceding cryptogram, where
only one alphabet out of four was in doubt, then, remembering that
the Nihilist cipher alphabets are of a kind whose frequency counts
can be “lined up,” we might take frequency counts on the several
alphabets, and supply the missing numbers of the doubtful one by
making its pattern match that of the rest. With several alphabets
in doubt, which could only happen when frequency counts are too scant
to betray their graph, it might become necessary to decipher the
periodic cryptogram with each possible combination of key-numbers,
each time obtaining a new cryptogram, and accept, among these new
cryptograms, the one whose general frequency count seems most likely
to be that of a simple substitution. The correct cryptogram, in this
case, should also contain some fresh repetitions; that is,
repetitions which were not present in the periodic one. As to the
three examples which follow, there should be little difficulty in
deciding whether or not the Nihilist cipher is represented.
131. By B. NATURAL.
45 68 48 46 60 78 45 78 24 59 35 67 50 75 38 58 53 60 65 26 54 46 68 55 38 67 42
69 56 59 24 59 70 54 30 85 32 90 44 46 45 56 79 54 30 86 22 78 27 26 44 49 78 75
38 54 55 78 47 27 45 49 89 44 49 88 42 59 56 49 42 86 50 52 26 55 42 60 47 36 22
50 78 65 50 76 35 78 28 59 26 50 68 54 60 76 25 87 28 29 55 58 59 73 59 97 54 69
66 57 26 46 78 65 48 76 45 57 47 29 65 79 77 55 30 57 35 89 45 49 53 46 66 75 57
97 55 68 28 47 22 66 66.
132. By PICCOLA. (Keyword, CRYPT. Fifth alphabet contains Q. But: Can you
rearrange the numbers on the strip before taking frequencies?
15 20 23 18 03 15 26 12 26 25 03 30 40 14 20 09 20 25 11 15 17 25 16 02 29
30 25 21 18 03 11 16 27 30 26 10 02 21 17 01 06 25 13 01 25 03 30 23 26 23
06 27 12 11 20 12 22 16 18 03 29 20 19 01 19 17 19 12 12 20 02 11 14 18 19
13 20 38 11 23 19 01 19 01 27 30 16 21 01 23 17 24 22 25 03 19 26 21 11 28
11 17 16 21 03 13 20 28 05 20 06 26 13 11 26 11 16 27 26 16 02 26 18 05 25
06 03 16 03 03 30 26 16 27 28 10 02 16 02 29 06 26 27 11 24 15 20 23 13 15
11 25 13 05 24 28 20 40 27 19 19 30 27 19 19 13 02 23 21 28 11 30 14 28 03
18 26.
133. By PICCOLA. (If you recognize this gem of literature, you are beyond the
draft age. It got around the censor in 1918).
20 08 17 29 15 09 01 05 08 29 24 11 06 05 10 26 13 22 06 01 18 19 05 03 16 24 13
16 04 08 07 19 12 18 24 11 17 09 07 27 26 22 01 15 21 21 10 03 06 22 03 18 04 22
20 06 07 24 12 19 10 19 10 30 10 19 16 24 13 16 04 08 23 01 10 10 23 10 09 05 08
17 21 22 09 15 21 21 10 03 06 06 21 20 12 22 21 08 18 19 23 05 02 01 11 34 19 27
12 06 02 15 10 22 03 03 02 11 12 19 10 11 19 27 13 12 18 24 19 13 24 15 07 16 16
16 26 20 04 05 11 29 26 20 03 10 19 10 23 11 16 19 13 16 04 08 25 17 05 24 20 20
23 09 10 25 20 25 02 05 07 16 26 20 04 05 11.
134. By DAN SURR. (Should you be worried at finding this in Daughter's boudour?)
A B C D E F G E H D G E F J E K H D L J D G J M M J D G J M E
E F J E O J E L F A C B D G. - P G M G.
CHAPTER XVIII
Periodic Ciphers with Mixed Alphabets
* * *
Now let us consider the four slides of Fig. 138, which are being
designated (arbitrarily) as belonging to _Types I_, _II_, _III_, and
_IV_, in what would seem to be the order of their potential
resistance to decryptment. Their actual resistance, however, might
depend largely upon the manner of their use, and we are assuming
throughout the chapter that the encipherment process is identically
that described for the Saint-Cyr cipher: The upper alphabet, in all
cases, is to be the plaintext one; the index-letter is always the
initial one of this plaintext alphabet; and, for the encipherment of
cryptograms, the letters of the chosen key-word are to be found in
the lower alphabet and brought one by one to stand below the
index-letter in order to set up their cipher alphabets. Also, for
our immediate purposes, we are neglecting certain precautions the
advisability of which will be seen later: First, the mixed alphabets
have all been left undisturbed with their primary key-words (CULPEPER,
DAMASCUS) and their alphabetical sequences in plain view; in practice,
such alphabets ought to be carried through a transposition block, or
otherwise made to appear incoherent. Second, the index-letter should
never be _A_ (or any other frequent letter) unless the details of
encipherment are varied. (We might, for instance, consider that the
index-letter is in the sliding alphabet and that keys are in the
upper.)
Figure 138
SLIDE - TYPE I.
Plaintext: C U L P E R Z Y X W V T S Q O N M K J I H G F D B A
CIPHER: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C.....
══════════════════════════════════════════════════
a b c d e f g h i j k l m n o p .......
Key A: Z Y A X E W V U T S R C Q P O D .......
Key B: A Z B Y F X W V U T S D R Q P E .......
Key C: B A C Z G Y X W V U T E S R Q F .......
══════════════════════════════════════════════════
Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
CIPHER: C U L P E R Z Y X W V T S Q O N M K J I H G F D B A C U L.....
══════════════════════════════════════════════════
a b c d e f g h i j k l m n o p .......
Key A: A C U L P E R Z Y X W V T S Q O .......
Key B: B A C U L P E R Z Y X W V T S Q .......
Key C: C U L P E R Z Y X W V T S Q O N .......
══════════════════════════════════════════════════
Plaintext: C U L P E R Z Y X W V T S Q O N M K J I H G F D B A
CIPHER: C U L P E R Z Y X W V T S Q O N M K J I H G F D B A C U L.....
══════════════════════════════════════════════════
a b c d e f g h i j k l m n o p .......
Key A: B D A F P G H I J K M U N O Q L .......
Key B: D F B G L H I J K M N C O Q S U .......
Key C: A B C D E F G H I J K L M N O P .......
══════════════════════════════════════════════════
Plaintext: D A M S C U B E F G H I J K L N O P Q R T V W X Y Z
CIPHER: C U L P E R Z Y X W V T S Q O N M K J I H G F D B A C U L.....
══════════════════════════════════════════════════
a b c d e f g h i j k l m n o p .......
Key A: C R P A Z Y X W V T S Q U O N M .......
Key B: A E L B R Z Y X W V T S C Q O N .......
Key C: U Z E C Y X W V T S Q O L N M K .......
══════════════════════════════════════════════════
Figure 139
5 10 15 20 25 30
Y V N G K Y E G D P Z E A Y K H S M D Q K K W S J I Q V I O
P E I T E A v c I c c c v
35 40 45 50 55 60
K C F K Q J P M L B J X G K C Z D B G N G Q B D Q M E O N K
I T c v I T H T H E P E c E c E
65 70 75 80 85 90
X T Y A D D D G J R X R X F W G D A Y T Q S G G C G P B Y O
H H I E H A I P H E E v
* * *
Of our four slides, only the _Type I_ is radically different from the
rest. Since its basic cipher alphabet is not a mixed one, it makes
little difference what has been done to its plaintext alphabet.
Notice, in the partial tableau which accompanies it, that the
difference between one cipher alphabet and another is purely a matter
of alphabetical shift (or of “size,” if we wish to replace all of
these letters with numbers). Properly speaking, this cipher belongs
to the case of the preceding chapter; it is presented here largely as
a warning of what could happen through misuse of the _Type I_ slide.
In the remaining three cases, the sliding alphabet is a mixed one; a
series of frequency counts taken from cryptograms cannot be “lined up”
unless letters can be placed in the right order before these frequency
counts are taken. The “right” order may be the original one of the
cipher alphabet, or an equivalent order in which the original letters
are taken at a constant interval. In these cases, as with any other
periodic cipher, the period is found in the usual way. Individual
frequency counts are then taken on the several cipher alphabets, and
these are examined in the hope of finding a known alphabetical graph;
that is, the graph of some mixed alphabet recovered from previous
decryptments — (but notice also the _C_-alphabet under the _Type III_
slide!). It can also be ascertained whether or not the frequency
counts have followed one common graph, whether any two or more have
followed one graph, and so on. But when it is found that the frequency
counts are those of unknown mixed alphabets, then each alphabet is to
be treated by simple substitution methods. Here, the principles will
still be those of Chapter IX, and we will examine, as briefly as
possible, the mechanical phases of their application.
Illustrating with alphabet 2: Start with its first letter, _V_; find
_V_ in the prepared alphabet numbered 2; place on its left side the
_Y_ of alphabet 1; place on its right side the _N_ of alphabet 3.
Pass on to the next letter, _E_: contacts are _Y_-_G_. Pass on to the
third letter, another _E_: contacts are _Z_-_A_. And so on to the end
of alphabet 2. Each contact chart, of course, will serve also as a
frequency count and as a graph. The five graphs should now be
compared with one another in the hope that some two or more may
represent the same alphabet. Such a key-word as DENSE, for instance,
makes use twice of the _E_-alphabet, thus doubling the amount of
material in one of the alphabets. In our present case, it is found
that the five alphabets are all different. Now, just as in simple
substitution, we wish to determine, for each of the five alphabets,
what letters are apparently representing vowels, and what letters are
more likely to be consonants. For this purpose, some of our
“pointers” are still available, and are just as valid as in
Chapter IX.
Figure 140
YT A EL A
CSNKZYCC B IUKLQIKT B
OO C LE QK C FB
DD D DD ZZUNZDZGDZ D BGAGYAGABB
E RZPCJMAMZY E GAOFNIVUUS
HJN F MVS F
HUPSCCGCCWN G QDPKZOPQWKU G
CK H SP H
J I Q BB I CN
LQBQ J PXER J
QTPWOQ K KCUTKK KGKBGBK K WETMYTW
L RABC L WQQA
SQ M EE VF M JM
O N D N
R O U G O M
O P E HGGJ P MBMB
OT Q SC YGBGI Q VBVWV
OD R EL JXX R XXS
S FQH S MGM
T BKX T YBK
QQ U UD YGOUBK U FIFFVG
SU V MV FVY V NVU
W G W B
RRK X TRR YJ X GM
QRNK* Y VEXUQ Y
JUTTECP Z EDDDDED G Z Y
Figure 141
In Fig. 141 we may see some data and probable conclusions concerning
alphabet 1. By frequency alone, the four letters _B_, _G_, _K_, _Z_,
of this alphabet might all be vowels. When variety of contact is
considered in conjunction with frequency, it is noted that _Z_ shows
no variety on its right. And when contacts with low-frequency letters
are also considered (from information present on sheets 5 and 2; in
the figure, frequencies of 1, 2, or 3 were considered to be low), it
is found that in this respect, too, the letter _Z_ stands apart from
the others. These observations, usually, are mental, and conclusions
for any one alphabet must often be modified by what is seen in other
alphabets. It may be found satisfactory to begin by selecting only
the most _obvious vowel_, or vowels, in each alphabet, and to circle
these, or otherwise indicate them, not only on their own sheets, but
also on the two adjacent sheets where they are found again as contact
letters. When this has been done, the less obvious vowels may be
considered again with an additional “pointer,” whether or not they
show too much contact with the more obvious vowels. Fig. 142 shows,
for each alphabet, the probable conclusions which would be reached
after examining the contact sheets of Fig. 140, and before any
confirmation is attempted. The next step in order is that of
indicating them on the cryptogram itself, and the examination of long
segments in which no vowels have been marked. At this stage, too, the
total number of spotted vowels may be computed to find out how much
of the expected 40% is still missing. Up to this point we have
nothing new, and nothing particularly difficult. Whether or not the
subsequent work is to become difficult depends chiefly upon the
amount of material per alphabet, though granting that the presence of
probable words materially alters the case of the shorter cryptogram.
Figure 142
1 B G K * Z
2 E D K Q U
3 B G M * V
4 V Z K
5 O C Q
* * *
Suppose that the cryptogram has been enciphered with a _Type II_
slide. If so, our plaintext alphabet, in the key-frame, is already
arranged like the one on the slide; and when this is true, as may be
seen by glancing back at Fig. 138, the recovered cipher alphabets
will also build up with their letters in exactly the same order as
that of the slide, and, in the end, if fully completed, will show a
picture of the original sliding alphabet taking five of its possible
positions.
Examining the first cipher alphabet of (a), we note that the _lineal_
distance from _B_ to _G_ is 4 positions. If our hypothesis is correct,
then the lineal distance _BG_ will have to be 4 positions in all of
the other alphabets. The third alphabet contains a _B_; measuring 4
positions to the right of this letter, we find that _G_ of the third
alphabet would fall below _i_, and thus would be the substitute for
_i_ in the third alphabet. To see whether or not this is likely, we
return to the contact sheet, where we find that _G_ has already been
spotted as a vowel (see the list in Fig. 142). So far, so good. Then,
the first cipher alphabet of (a) shows the lineal distance _BZ_ as
19 positions. Returning to the third alphabet, and measuring 19
positions to the right of _B_, we find that _Z_, in this alphabet,
would fall below _x_. Examination of the contact chart shows that
_Z_ has not been used in the third alphabet, making it satisfactory
as the substitute for _x_. Still good. Again, the third alphabet
shows the distance _AB_ as 4 positions. Still pursuing our hypothesis,
the first alphabet must also contain an _A_ standing 4 positions to
the left of _B_. If so, it will fall below _w_, and the frequency of
_A_, in the first alphabet is found to be 2, which is satisfactory as
that of _w_. With _G_ and _Z_ added to alphabet 3, and with _A_ added
to alphabet 1, we may now turn our attention to alphabet 4, which
contains a _Z_, and, by making similar observations there, we may add
to the 4th cipher alphabet the letters _A B G_, and, to the 1st and
3d alphabets, the letter _K_. Thus we arrive at (b) through what is
ordinarily referred to as the “symmetry of position” existing among
the several cipher alphabets.
Figure 143
(a)
a b c d e f g h i j k l m n o p q r s t u v w x y z
1 - B G Z
2 - E D
3 - A B
4 - Z K
5 - C
(b)
a b c d e f g h i j k l m n o p q r s t u v w x y z
1 - B G K Z A
2 - E D
3 - A B G K Z
4 - Z A B G K
5 - C
But the second and fifth alphabets cannot yet be combined with the
other three, since neither of these contains any letter in common
with them, and thus we have no point from which to measure lineal
distances. We know, however, that if our hypothesis is correct, the
letters _A B G K Z_, in these alphabets also, will be found at
exactly the same lineal distances as before. It would be possible to
prepare a sort of slide on which these letters, written twice in
succession, are spaced as in the other three alphabets, and use this
in experimenting with alphabets 2 and 5.
* * *
Our _Type II_ slide, then, unlike the remaining three, builds up
automatically in the key-frame, _owing to the simple fact that we
are able to set down the plaintext alphabet in the encipherer’s
original order_. The method of solution, so far as we know, was
first published (1883) by Auguste Kerckhoffs, who seems to have
originated the term “symmetry of position.” The invention of the
cipher is credited to “a member of the (French) Commission on
Military Telegraphy.”
* * *
Fig. 144 shows the development of the key-frame in this case. At (a),
some substitutes have been correctly identified in each of four cipher
alphabets. But long before reaching this stage, the most careless of
decryptors must have noticed that the difference between any two
cipher alphabets is purely a matter of alphabetical shift. This is
particularly visible as between alphabets 3 and 4, where the
alphabetical interval is only 1; examination of alphabets 1 and 2
shows that wherever both substitutes are present, their alphabetical
difference is 14; and further examination shows that the alphabetical
distance from alphabet 2 to alphabet 3 is 17. The use, here, of a
Saint-Cyr slide enables us to arrive very quickly at (b). The
alphabets of (b) are, of course, secondary cipher alphabets, and the
primary one obviously runs in normal order (or, at worst, in a
strictly methodized order which is easily obtainable from the normal
one). What we still lack, in order to reconstruct the slide, is the
mixed plaintext alphabet, and this can be recovered as at (c). Write
out the normal alphabet (known to be the original cipher alphabet),
then, using any one of the secondary alphabets, place originals above
their substitutes wherever these are known. In the given example, all
missing letters can be filled in by alphabetical sequence; and even
though the index-letter was one of low frequency, and thus was not
used in the message, the student should have no trouble whatever in
discovering the key-word which governs the four cipher alphabets.
* * *
Figure 144
(a)
a b c d e f g h i j k l m n o p q r s t u v w x y z
1 - L . . J Q . H G F . . . . B A . . R Y X . . . . . .
2 - Z . . . E . . . T . . C Q . O . . . . . B . . . . .
3 - Q P . O V N . . . . I . . G F U . . D C . B A . Y .
4 - R . . P W . . M L . J . . . G . . . . D . . . . . .
(b)
a b c d e f g h i j k l m n o p q r s t u v w x y z
1 - L K . J Q I H G F . D O C B A P . R Y X N W V . T .
2 - Z Y . X E W V U T . R C Q P O D . F M L B K J . H .
3 - Q P . O V N M L K . I T H G F U . W D C S B A . Y .
4 - R Q . P W O N M L . J U I H G V . X E D T C B . Z .
Plaintext: o n m k . i h g f d b a . u l p e r . y . w v t s .
CIPHER (Rearranged): A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
* * *
The _Type III_ slide is, in many respects, the most interesting
member of its family. With every alphabet taking exactly the same
order (that is, the plaintext alphabet, the key-alphabet, and all
cipher alphabets in the imaginary tableau), it parallels the Vigenère
in every particular except the order of the 26 letters. It has a
corresponding Beaufort form, and a corresponding variant in which
complementary keys are based on the order of the mixed alphabet. Its
14th alphabet, like the _N_-alphabet of the Vigenère, is reciprocal
throughout. And its first alphabet, like the _A_-alphabet of the
Vigenère, is a duplicate of the plaintext alphabet. This was pointed
out in connection with the slide of Fig. 138, where key-letter and
index-letter were both _C_. There are two ciphers, then (the _Type
III_ slide and the Delastelle tableau), in which we are sometimes
able to find, among a number of mixed frequency counts, a single one
which follows perfectly the graph of the Vigenère _A_-alphabet.
Concerning the 14th alphabet, however, we are dealing altogether,
here, with a 26-letter alphabet; and some of what follows is being
explained on the theory that the number 26 contains no factors other
than 2 and 13. If the student will give his careful attention to
_reasons_, as well as to methods, he will be able to adjust these
methods to alphabets of other lengths, as, for instance, the very
common 25-letter alphabet met with in foreign texts. The first
alphabet, of course, duplicates the plaintext alphabet regardless of
what alphabet-length is being considered, and thus, whenever a
_Type III_ slide has been used, we are always in full possession of
one of the cipher alphabets.
Figure 145
A L R X T O K H D C P Z W S N J G B U E Y V Q M I F
L R X T O K H D C P Z W S N J G B U E Y V Q M I F A
(1)........... ═ ═ ═
(2)................. ═══ ═══ ═══ ═══ ═══
R Z Y X W V T S Q O N M K J I H G F D B A C U L P E (R)
X W V T S Q O N M K J I H G F D B A C U L P E R Z Y (X)
(2) Or: Spread the letters apart so that the alphabetical sequences K(JI)H,
Z(YX)W,
etc. are standing at the right interval, always maintaining the alphabet-
length,
26, and intertwine. Both alphabets are the same in this slide:
(The interbals A . . L . . R . . X . . T . . O . . K . . H . . D .
are always odd, . C . . P . . Z . . W . . S . . N . . J . . G . . B
3, 5, 7, etc.) . . U . . E . . Y . . V . . Q . . M . . I . . F . .
1st Alphabet: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
3d Alphabet: U C L A Z B D F G H I E J K M R N Y O Q P S T V W X
Spread the letters of each half, trying interval 2, interval 4, interval 6, and
so
on, treating both halves alike, until the intertwining of the two will set up
some
alphabetical sequences:
. A . U . P . R . Y . W . T . Q . N . K . I . G . D
B . C . L . E . Z . X . V . S . O . M . J . H . F .
Figure 146
With a Type III slide, based on the key-word EXCORIATE, the 7th alphabet, as
recovered from a cryptogram would come out as shown: H K B L A M N P........
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H K B L A M N P G Q S U V W D Y Z F E J X C O T R I
1st HALF-CHAIN: A H P Y R F M V C B K S E
2d HALF-CHAIN: (d l u x) T J Q Z I G N W O D L U X
Each corresponding pair of letters was a digram in the original cipher alphabet.
Taking some two letters, as FG, which form an alphabetical sequence, look for
another pair, such as HJ, which may be its continuation. HJ having been found
at the interval 9, try taking pairs at the interval 9:
FG HJ KL MN PQ SU VW YZ EX CO RI AT BD (FG)
* * *
Figure 147
Plaintext letters: a b c d e f g h i j k l m n o p q r s t u v w x y z
(1) 4th Alphabet: E W Y P V T S Q O N M K R J I H G F Z D X B A C U L
(2) 7th Alphabet: Y S V Z Q O N M K J I H X G F D B A W C T U L P E R
ab ys vd qx nt jp gl bi sf du xm tz pw lr io fk uh me zc wa ry ov kq hn ej cg
(ab)
EW UZ BP GC JD NH SK WO ZT PX CR DL HA EF OI TM XQ RV LY AE FU IB MG QJ VN YS
ab bi io ov vd du uh hn nt tz zc cg gl lr ry ys sf fk kq qx xm me ej jp pw wa
EW WO OI IB BP PX XQ QJ JD DL LY YS SK KF FU UZ ZT TM MG GC CR RV VN NH HA AE
Plaintext: a b i o v d u h n t z c g l r y s f k q x m e j p w
CIPHER: E W O I B P X Q J D L Y S K F U Z T M G C R V N H A
b u c s m a d z y x w v t .......
W X Y Z R E P L U C A B D .......
These two alphabets, like the two from the Type _III_ slide, are
running parallel in the imaginary tableau, so that we have, as
before, a series of 26 _vertical_ distances, _EY_, _WS_, _YV_, and
so on, all known to be equal in the columnar direction and therefore
known to be equal distances on any row. A chain may be started,
exactly as in the other case, _EY_, _YV_, _VQ_, _QM_, _MI_. . . . . ,
resulting in a series of equally-spaced letters _E Y V Q M I F A L R_.
. . . . . which is either the original cipher alphabet, or the
original one with letters taken at some odd interval other than 13.
It is, however, only the _cipher alphabet_; the mixed _plaintext
alphabet_ must still be found. This may be done, as in the case of
the _Type I_ plaintext alphabet, by using either of the two cipher
alphabets which were first recovered and setting originals above
their substitutes. If this is done with our cipher alphabet in the
order _E Y V Q M I F A L R_. . . . . . , then the plaintext alphabet
comes out in the order _a c e h k o r w z m_. . . . . . , and we have
an equivalent slide. If we first rearrange the sliding alphabet (each
9th letter of the series _E Y V Q_. . . .), we obtain the plaintext
alphabet also rearranged.
Continuing, now, with the rest of our figure: The method we have just
seen was based on a tableau, and our equal intervals were all
vertical. In the figure, we are dealing purely with horizontal
distances, and our method is based, not on a tableau, but on a
_slide_ (as it was with the _Type II_). Our 4th and 7th (secondary)
cipher alphabets, after all, are merely two different positions of
the same slide. If we select any two letters, as _a_ and _b_ of the
plaintext alphabet, and find that their substitutes are, respectively,
_E_ and _W_, in alphabet 4, then the lineal distance _ab_ in the
stationary alphabet must be exactly equal to the lineal distance _EW_
in the sliding one; if this were not true, the letters could not have
coincided as they do. Then, if we find the same substitutes, _E_ and
_W_, in alphabet 7, and note that, in this position of the slide,
they have coincided, respectively, with plaintext letters _y_ and
_s_, then the distance _EW_ in the sliding alphabet must be exactly
equal to the distance _ys_ in the stationary one. It follows from
this that _ys_ and _ab_ are equal in the stationary alphabet. If we
begin again with the lineal interval _ys_, we find that this is equal
to _UZ_ of alphabet 4, and that _UZ_, found again in alphabet 7, is
equal to _vd_. Here, then, is another interval, _vd_, which is equal
to both ab and _ys_. And so we may continue, forming a chain made up
of these known equal intervals, _ab_, _ys_, _vd_, _qx_, etc., for the
plaintext alphabet, and _EW_, _UZ_, _BP_, _GC_, for the cipher
alphabet. Sometimes we return to _ab_ (_EW_) without having included
all 26 letters, and in that case (unless the number of letters
included is a divisor of 26), it becomes necessary to abandon _ab_,
and try starting with some other interval, as _ac_.
Figure 148
Plaintext ....... A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Exercise 1: Q * Z A X B O C N * E R F P V G * Y M U I * W * T L
Exercise 2: U V D W S X K Y H Z C F R J Q L I N G P T O M E A B
Exercise 3: H J G K F P E Q O R S T D M B U V W X A Y Z C L I N
Exercise 4: (1) V N U X J Y Z D Q E M P O W C K R I A T L S B F G H
(2) H S G J R K L N F P Q B U I V A W C X Y T Z D E M O
Exercise 5: (1) G X Y Z M H A F T R L K E V Q U O J W I P N S B C D
(2) E * G J I K * L B * * U T C V W * Q D X S * * * * *
Here, as in the case of the _Type III_ slide, we sometimes obtain two
13-letter chains; but in the fortunate case of having recovered in
full both an odd-numbered and an even-numbered cipher alphabet, we
end the chain with every letter represented twice, both in the
stationary alphabet and in the sliding one. Pairs of letters
(representing horizontal intervals) can then be rearranged as in the
other case, the second letter of one becoming the first letter of the
next (in both series), and the dropping out of duplicated letters
gives us an equivalent slide. In the figure, starting with _ab_
(_EW_), we find a plaintext alphabet _a b i o v d u_. . . . . and a
cipher alphabet _E W O I B P X_. . . . . . This, as mentioned, is one
of eleven possible equivalent slides, of which one is the original.
Here, the original can be found by taking letters at interval 21. In
the figure, letters were taken at interval 5, a result of observing
the sequence _W X Y Z_ standing at that interval in the lower
alphabet, and the slide comes out in reverse order. This is still an
equivalent slide, and the decryptor may or may not care to decide
which alphabet runs backward.
135. By NEMO. (Type II. Partial solution: WHEN JACK BOOMER,GREEN RIVER,WYO,B..)
T E R P J Y D B N Q S A I M B X B L Y M D O B I T Z P T I H K O K A G
M Y Q R X T D W U U X B O B Q Y D B W Z S V Z G C U P R Z S W V O D M
T Q Z C A T S M Y Q F D B H Z Q U T I H F S V S Y N F U L Z G L B G D
M T R M U C N A J M I Y N Q O F B D P Q L G X U Y W U I P C A Y N J N
X S B K W I J G R L G I B.
136. By NEMO. (Type III. Partial solution: ALOIS STEPHEN,YOUNG VIENNESE CHARGED
W..)
H G K S T I L O Y D B O L E G A Z N G P D U W P B D R V Z Q Y Z X F L
Q S B H S L T U Q P S Z G X V A Y T G B C B X K H U R I E D M D X B T
O E P S A R I N K X K J B I T P Y I X R I U Z Y O M I M H P H B E J D
N E B S E F L B F D B H F J B F N L G P L J M I B O G T A W D U E Q E
Z T Y U S I.
H T F M R S R T Y E O V P D S Z L A X B A C N T N A K X R C S Z K G O
Q U O F A Z R E T D S V I W K W T E L K F R P R B I H I N A S W R R S
B O H T F L A D D L U B U F M Q O J A G I L I D W T Z I M M R H L L V
K W U J S.
138. By ALII KIONA. (Is this a diplomatic telegram?)
L L D R K Y C R F A S E V S U K T D U L X V K E V C A B L Y U P Y M R
K B E X U B T E L W P J F P T I I U Q Q K T F C T P S K Q L W N D A P
B F A E S N M P R K A P T T S H F K B Z R M G P P Y V M S A I F N P Z
A L T S U S A U D N L X A A Z Y P U C H K N P Y V M S I A X K K D B E
T P S A T P K P S Y V T A Y E A P B T E L W P J F P T A X N.
A N D N Y L M Y X N K D L R P G C X G Q N A A R Z L D E P L G I A W Q
N E I O G A G P Q G Z V D E I E Z R H A Y P L B P N A G E L N V A G T
D H O K H V G T I N D O L S F C P L R T.
CHAPTER XIX
Polyalphabetical Encipherment Applied by Groups
Any one of the multiple-alphabet ciphers may change keys at each new
group instead of with each consecutive letter. As a rule, this kind
of encipherment is never found except in connection with very simple
ciphers, and the intact plaintext groups, each one standing on its
own key-line, are readily discovered by the decryptor who takes the
precaution of cutting out a segment from his cryptogram and “running
down the alphabet,” first treating the original letters and then, if
necessary, their complements. Porta encipherment, in any form, is
rare, but its cryptograms can be subjected to the same process,
provided the letters of the tested segment are first enciphered in
the _AB_-alphabet, and the subsequent extensions properly carried out.
Figure 149
1 C U L P E* 2 R Z Y X W 2 R Z Y X W 2 R Z Y X W
2 R Z Y X W 1 C U L P E* 3 V T S Q O 3 V T S Q O
3 V T S Q O 3 V T S Q O 1 C U L P E* 4 N M K I H
4 N M K I H 4 N M K I H 4 N M K I H 1 C U L P E*
5 G F D B A 5 G F D B A 5 G F D B A 5 G F D B A
2 R Z Y X W 3 V T S Q O 3 V T S Q O 3 V T S Q O
3 V T S Q O 2 R Z Y X W** 4 N M K I H 4 N M K I H
4 N M K I H 4 N M K I H 2 R Z Y X W** 5 G F D B A
5 G F D B A 5 G F D B A 5 G F D B A 2 R Z Y X W**
1 C U L P E* 1 C U L P E* 1 C U L P E* 1 C U L P E*
These eight cryptograms have all come from one source. The general
frequency count has shown a missing letter, _J_, suggesting the use
of a square, and we have suspected the cipher as “Phillips.” With
cryptograms arranged one below another, as shown, the first five
columns are presumably enciphered with block 1 of that cipher, the
next five columns with block 2, and so on; thus, we presumably have
40 letters each belonging to alphabets 1, 2, and 3, and almost that
number belonging to alphabet 4, that is, enough material for frequency
counts which will show whether or not they have been taken on simple
substitution alphabets. While 40 letters of text are very few, we
could, eventually, solve any simple substitution cryptogram of that
length, or any mixed-alphabet periodic whose alphabets have furnished
40 letters each. In the present case, our first alphabet has furnished
eight known word-beginnings; we have one column known to contain only
initials, and followed by two others which are very likely to be the
hiding-place of vowels. This does not mean that we should have no
preliminary struggles, but in the end there are plenty of clues to
set us on the right road: The predominant letters of alphabet 1 are
_A_, _B_, _O_, _K_, _U_ (practically sure to contain _e_, _t_, and
one of the vowels _a_ or _o_). The column of initials repeats both
_A_ and _T_ (to be compared against a list _t s a_. . . .). The
second and third columns, combined, include _B_ and _O_, three times
each, with _O_ found in the initial column also (both could be vowels,
and _O_ probably represents _a_, though _i_ is also frequently found
as an initial). If _A_, by frequency and initial position, be tried
as _t,_ then the other repeated initial, _T_, can be tried as _s_.
This assumption brings out, in the fourth message, a pattern
_s_ - _t_ _t_ -, in which the second letter, _B_, would have to be a
vowel, either _e_ or _o_, since it has been doubled, with _e_
appearing more likely in the given pattern and also in that of the
sixth message, _s_ - - - _s_. The letter _O_, which under the
encipherment scheme could not possibly be its own substitute, can be
assumed, by frequency, as _a_, rather than _i_.
Figure 150
1. A F S X O S G Y F O N P Y O A K O A D G F Z K S Z O Y Z Y L A W A C F.
2. H O U A L H L E D H D L Y G A V D W A K.
3. K O N B K A X U O N H I Q P L B A Z F F S Y F D R R L Y F.
4. T B A A M A F Q E Z U M A I X G F S K B.
5. D K O A C Y B Y E N I M O W D L E G A D O H C Y U U R G.
6. T B B X T O M M D A S I A A Y D Z.
7. O U S U B U L O I Y G A K X M A K W E L.
8. A K R U W A N A L O N N F M S K A X E U.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
25 8 3 10 6 11 7 5 5 . 11 10 7 7 15 2 2 4 8 3 10 1 5 6 12 6
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
6 5 1 1 . 1 . 1 . . 4 1 1 1 5 . . 1 2 3 4 . 1 2 . .
These first correct substitutions are all shown on the left side of
Fig. 151, on the lines marked (a). Surely the next identification
would be the _m_ of _seems_, and probably, too, the _l_ of _settl_. . .
With the vowel _a_ already identified, the repeated _OU_ would be
tried as _an_, and the repeated _KO_ as _ha_, using the digram list.
These are the substitutions marked (b), and from this it is but a
step to the assumptions marked (c). On the right side of this figure,
we are proceeding into alphabet 2. A frequency count here has shown
that the leading letters of this alphabet are _A_, _O_, _Y_, two of
which, _A_ and _O_, were also leaders in alphabet 1. It is one
peculiarity of the “Phillips” cipher that a change in alphabets means
a change in only fifteen of the substitutes, the remaining ten
continuing to represent the same originals as in the preceding
alphabet. Concerning _A_, we can see, from the third and fourth
messages, that it has not continued to represent _t_; but _O_, in the
sixth message, has rather suggested the word _all_ and even the
expression _all right_, which would carry us on into the third
alphabet. From this point onward, then, we are in the same fortunate
position as the decryptor who intercepts his message partly in cipher
and partly in plaintext. With the context as a guide, we need not
worry as to what happens at the ninth group.
Figure 151
1. A F S X O S G Y F O ...
(a) t . . . a . . . n a
(b) t . . m a . . o n a
(c) t r y m a . . o n a (Try ma...)
2. H O U A L H L E D H ...
(a) . a . t . . . . . .
(b) . a n t . . s u r .
(c) c a n t . e s u r e (Can't be sure...)
3. K O N B K A X U O N ...
(a) . a . e . i . . a .
(b) h a . e h i m . a t
(c) h a v e h i m . a t (Have him ...)
4. T B A A M A F Q E Z ...
(a) s e t t . i . g . a
(b) s e t t l i n g u .
(c) s e t t l i n g u p (Settling up ...)
5. D K O A C Y B Y E N ...
(a) . . a t . . . . . .
(b) . h a t . o y o u t
(c) w h a t . o y o u t (What do you t...)
6. T B B X T O M M D A ...
(a) s e e . s a l l . i
(b) s e e m s a l l r i
(c) s e e m s a l l r i (Seems all ri...)
7. O U S U B U L O I Y ...
(a) a . . . e . . a . .
(b) a n . n e . s a . o
(c) a n y n e w s a . o (Any news abo...)
8. A K R U W A N A L O ...
(a) t . . . . i . i . a
(b) t h . n . i t i s a
(c) t h i n k i t i s a (Think it is a...)
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
5 1 . 2 3 2 1 2 1 . . 3 2 3 5 . 1 . 1 . 2 . . 1 4 1
Figure 152
Plaintext: a b c d e f g h i . k l m n o p q r s t u v w x y z
SUBSTITUTES: O . H . B . . K R . W M X U . . . F T A . N D . S .
(a)
A T S Y Y
O A T S S
T
A
(b) O
*Y C E I L *V
S H B R M N
T K F *X U
A *W
O D
N D .│S│ S . N D . S I N D E . N D . S I N D E S
U C│.│T . T . U C B T R U C T . U C . T R U C B
.│H│L A H L A . . H L A F . L A . . H L A F . H
│.│K M O . K M O . . K M O . K M O . . K M O . .
│ │V W X Y . V W X Y . V W X Y V W X Y . V W X Y .
Y C E I V
S H B R N
T K L F U
A W M P G
O D X Z Q
\ ↓
Y \ V │ │
S\I N│ E │ D E S I N
T\R│U C B │ U C B T R
A│F G H L │ F G H L A
│O\P Q K M│ O P Q K M
│ \Z W│X X Y Z V W
│ \ │D
↑
Now, considering Fig. 153: Our five recovered diagonals are imagined
to be those of a well-mixed square, so that we have no discoverable
sequences. It has been found that the letter _e_, in alphabets 1, 2,
3, and 4, has taken, successively, the substitutes _B_, _H_, _Q_, and
_Z_, and that the cipher-letter _E_ has served, successively, as the
substitute for _x_, _u_, _f_, and _o_. The four letters _B H Q Z_,
then, must all have stood in a single column _in exactly the order
named_; and the four letters _X U F O_ must have stood in another
column, two positions to the left of the first, but with a minor
difference in the order: some other letter (the one on the same line
as _E_) must have intervened between _X_ and _U_. The order in this
column, then, must have been _U F O X_. Our first step toward
combining the five diagonals is that of adjusting four of them so as
to set up the column _B H Q Z_. This automatically sets up four
letters of the other column _U F * X_ (_D_) — in the figure, the
_X D_ is present, but has not been adjusted to the _U F_ * — after
which, the fifth diagonal can be added to the others by placing the
_O_ of the column _U F O X_ (_D_). Now, since the letter _E_ has
taken, successively, all four of its substitutes and all four of its
originals, it must, in alphabet 1, have been standing on the top row.
Two parallel lines (if desired) can be ruled across the set-up to
show the top and bottom of the square, and two others (placed
anywhere, so long as they mark a width of five columns) may be ruled
to show the two sides. The outside letters, _Y_, _V_, and _D_, may
all be transferred to the opposite ends of their diagonals, after
which the rhomboid is easily adjusted to the form of a square.
N D Q T F Q Z C N G B U Z H X N L U K Y F T E E W N R G U R M O X Q X
E Q Z L B G X H W F F N R P X P X V D D F I T G S E W R T I I T Z X E
R V W A R I S P E Y I G R Q C.
141. By PICCOLA. (This is the real McCoy - in 1938. But times change).
(a) K G E U H C K T S X P C K N C A D F X Q C B X T
(b) O U T U I U B F S B Q A P H N B Y Z X X L R U G
(c) O F U O S K H Q T K P W Q F E T B W W X P K B O K G H
(d) B L A M R P G X B W G C W K Q Z I A Q C U H Y R C
(e) G U C O S B B L P S B Q D K P G P K D S R C T B L I
(f) X R O S U I T T F G Y P C M C K F T F X O S R B H O A G M
(g) B O I B V B U K E E B D K B C O B Y W B T B M U H O O A B
(h) Y C U Y U T B I T F H S A N P H C W T.
(q) H F X L F M B L R N I N J W P Z Z G I S B B O Z X S F S H R
H T A T M R O F V ? (a) S X F U R R W X I Q S S.
(q) U F V H C N T I T T F O E J X O G N S G X U S O E H I V L X
E A T ? (a) U R Q Q T W E X U W I T O S.
(q) H C W R U Q U I T T F Y O Q I U D R S G X Z W H G F E T P C
J E M K Q F I N D O E E Z B L ? (a) U R Q Q T W.
(q) U R S U F U G J R E D V T O V E C Z X Z U Z G X S D S H C Q
K E X Z W I O V I R M H D W B D Z R R M ? (a) U R Q T D H T T H I
J S S.
(q) X C Q H R E M Z L T T O P A V H U L E B O Y O G N U F V X T
Z L E K S W F A V N ? (a) X R L L Q E W L T C O S P W V C Z L E B
D W Y I Z F I S R D T W C E Z T T A S G O L E.
143. By PICCOLA. (Can you guess what cipher? "Foregoing" refers to No. 141).
R N N G T R I O O H E I T T A F N D E N O G E L G E Y F I R D A I S E.
CHAPTER XX
Vigenère with Key-Progression
Figure 154
Forms of Key-Progression
Figure 155
Figure 157
Initial Key-word: C U L P E P E R C U L P E P E R C U L P E P E R
Plaintext: T H E R E I S O T H E R C A U S E F O R T H I N...
PRIMARY Cryptogram: V B P G I X W F V B P G G P Y J G Z Z G X W M E...
Progression Key: A B C
FINAL Cryptogram: V B P G I X W F W C Q H H Q Z K I B B I Z Y N G...
(a)
C U (key) plus T H (plaintext) equals V B (cipher).
(b)
Interval 18 plus interval 14 equals (32 less 26) = 6
Figure 158
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
A
B 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
B
C 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
C
D 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
D
E 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
E
F 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
F
G 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
G
H 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
H
I 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
I
J 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
J
K 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
K
L 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
L
M 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12 13
M
N 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11 12
N
O 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10 11
O
P 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9 10
P
Q 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8 9
Q
R 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7 8
R
S 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6 7
S
T 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5 6
T
U 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4 5
U
V 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3 4
V
W 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2 3
W
X 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1 2
X
Y 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 1
Y
Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0
Z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Figure 159
Figure 160
4-4 KOS-UYC 51 - 1 = 50 2 5 10
15-12 XMY-JYK 27 - 4 = 23
21-17-3-19 YTKNG-IDUXQ 60 - 10 = 50 2 5 10
23-15 ZWL-XUJ 36 - 15 = 21 3 7
21-15 FAP-CXM 55 - 24 = 31
7-23 QXU-VCZ 41 - 35 = 6 2 3 6
16-6 ZPV-IYE 115 - 39 = 76 2 4 19
17-10 ZQA-BSC 100 - 43 = 57 3 19
10-17 QAR-ZJA 110 - 44 = 66 2 3 6 11
15-11 CRC-XMX 56 - 53 = 3 3
9-2 XGI-VEG 92 - 58 = 34 2 17
2-21 GID-GID 107 - 59 = 48 2 3 4 6 8 12
17-0 EVV-KBB 98 - 68 = 30 2 3 5 6 10
13-10 SFP-CPZ 102 - 82 = 20 2 4 5 10
20-13 PJW-GAN 94 - 84 = 10 2 5 10
9-16 WFV-ZIY 114 - 86 = 28 2 4 7
X = AD x P
LD
P = Period AD = Alphabetical Distance
X = Progression Index LD = Lineal Distance
X = 10 P = P
50 5
For those who like mathematics, Fig. 163 shows a method used by one
of our collaborators for determining both the period and the
progression index directly from the cryptogram. Price also preferred
to find alphabetical intervals by writing the normal alphabet into a
block, five letters to the line, with _Z_ standing alone on the last
line; thus, except for watching _Z_ occasionally, the distance from
one letter to another could be counted by fives. It is understood, of
course, that we do not accept the evidence obtained from only one of
the supposed repeated sequences; too many of these will be accidental,
and many of those which are actually periodic have not represented
repeated digrams, but merely repeated intervals. Naturally, too, the
progression index need not be a small number; the disk encipherment,
mentioned in the beginning, showed a progression of 17 for each period
5. This disk encipherment, incidentally, has been dealt with in a most
interesting manner in Givierge’s _Cours de cryptographie_.
* * *
S O V F O G S G U F V I J R I F M O U I C F T T I K Z Y Z Z Z U I F Q
Q L O W U V A F J F I W W L N C R G J F E M V V N N C D H W T A J N W
A R D B. yallyyayyayalyyaaallayaaaylalllaylyayyallyyayaylalllyyall.
145. By NEMO.
Y Y I Z C U O F Y V H Q Y H T B E B S X P T S Y C R M R X L X E A G U
Y L P U Q B U U Q N Y U S O Q M O O S P U G I J I I F F F A L I R G G
F G E H H N T E G Y Z S M C O F U D E M X O G I K K V B N K W K P Q X
M G D L A I F N H M X T U M E Z X Y Z G N A P D W C D M N C T T H N J F
D.
X E I T B B B B V M X R S J P Y L K E N Y K S Z K F R W L G S A Y E A
V I X I X D U V D U R J G E I B A N Z F H D C C Y C O Y R V A B K W B
R H F K K F X S E J Y T F N L R N I V K V K Q H I Q H I J L P G O U J
V F C F T S H L I D V D D M P.
147. By DAN SURR. (Might try this without bothering about its progression!)
E C G M H T Y T A J B T H N G A W K L I B E M N R H T D G N G P D A O
Q A X R P Z P F H D D X I E A U B S Y C I X C W V R H P B O I X Y P Y
D V W N R N X O O K K I H F O X D S V L V W W C L I H Z H V W R L H W
M M I E E A H G Q Y R S R L K L W Z T J A Y W F N S S U C V Z L P X P
S E E E Y R T H D H T Z N U P U R M G K Z N T Y E Q D E Z E N N H W M
I N R L P S S W P Y M C R U B J Z Y C R N L M A S M E U C L R M D Y R
N E S T O B V J E U D V L O T S Q B J H B N R L B V D X J P X N I G F
I C Q J Y Q Z X Q G K B L F Q U B Q K N E L S S L Y G T L F L T D Z Z
Y K E E R H K L W L I M R N J S O O J P Q C A U D M E I B B Q X A H C
V A J C M G X B I C D K V C L G Q I B S C F V F W Q N A X I D R Z S X
R B I W R C Q R.
E R N I C D M R A S T A A P H T P I L T Q V A A S N E A E E R O O L R.
CHAPTER XXI
Polygram Substitution — The Playfair Cipher
Figure 164
A M E R I C N B D F G H J K L O P Q S T U V W X Y Z
E AA BA CA DA EA FA GA HA IA JA KA LA MA NA OA PA QA RA SA TA UA VA WA XA YA ZA
Q AB BB CB DB EB FB GB HB IB JB KB LB MB NB OB PB QB RB SB TB UB VB WB XB YB ZB
U AC BC CC DC EC FC GC HC IC JC KC LC MC NC OC PC QC RC SC TC UC VC WC XC YC ZC
A AD BD CD DD ED FD GD HD ID JD KD LD MD ND OD PD QD RD SD TD UD VD WD XD YD ZD
L AE BE CE DE EE FE GE HE IE JE KE LE ME NE OE PE QE RE SE TE UE VE WE XE YE ZE
I AF BF CF DF EF FF GF HF IF JF KF LF MF NF OF PF QF RF SF TF UF VF WF XF YF ZF
T AG BG CG DG EG FG GG HG IG JG KG LG MG NG OG PG QG RG SG TG UG VG WG XG YG ZG
Y AH BH CH DH EH FH GH HH IH JH KH LH MH NH OH PH QH RH SH TH UH VH WH XH YH ZH
B AI BI CI DI EI FI GI HI II JI KI LI MI NI OI PI QI RI SI TI UI VI WI XI YI ZI
C AJ BJ CJ DJ EJ FJ GJ HJ IJ JJ KJ LJ MJ NJ OJ PJ QJ RJ SJ TJ UJ VJ WJ XJ YJ ZJ
D AK BK CK DK EK FK GK HK IK JK KK LK MK NK OK PK QK RK SK TK UK VK WK XK YK ZK
F AL BL CL DL EL FL GL HL IL JL KL LL ML NL OL PL QL RL SL TL UL VL WL XL YL ZL
G AM BM CM DM EM FM GM HM IM JM KM LM MM NM OM PM QM RM SM TM UM VM WM XM YM ZM
H AN BN CN DN EN FN GN HN IN JN KN LN MN NN ON PN QN RN SN TN UN VN WN XN YN ZN
J AO BO CO DO EO FO GO HO IO JO KO LO MO NO OO PO QO RO SO TO UO VO WO XO YO ZO
K AP BP CP DP EP FP GP HP IP JP KP LP MP NP OP PP QP RP SP TP UP VP WP XP YP ZP
M AQ BQ CQ DQ EQ FQ GQ HQ IQ JQ KQ LQ MQ NQ OQ PQ QQ RQ SQ TQ UQ VQ WQ XQ YQ ZQ
N AR BR CR DR ER FR GR HR IR JR KR LR MR NR OR PR QR RR SR TR UR VR WR XR YR ZR
O AS BS CS DS ES FS GS HS IS JS KS LS MS NS OS PS QS RS SS TS US VS WS XS YS ZS
P AT BT CT DT ET FT GT HT IT JT KT LT MT NT OT PT QT RT ST TT UT VT WT XT YT ZT
R AU BU CU DU EU FU GU HU IU JU KU LU MU NU OU PU QU RU SU TU UU VU WU XU YU ZU
S AV BV CV DV EV FV GV HV IV JV KV LV MV NV OV PV QV RV SV TV UV VV WV XV YV ZV
V AW BW CW DW EW FW GW HW IW JW KW LW MW NW OW PW QW RW SW TW UW VW WW XW YW ZW
W AX BX CX DX EX FX GX HX IX JX KX LX MX NX OX PX QX RX SX TX UX VX WX XX YX ZX
X AY BY CY DY EY FY GY HY IY JY KY LY MY NY OY PY QY RY SY TY UY VY WY XY YY ZY
Z AZ BZ CZ DZ EZ FZ GZ HZ IZ JZ KZ LZ MZ NZ OZ PZ QZ RZ SZ TZ UZ VZ WZ XZ YZ ZZ
The tableau proper includes a full list of the 676 possible two-letter
combinations, while two external alphabets will furnish another
possible 676 two-letter combinations. With the plaintext marked off
into pairs, the encipherment of a pair is usually accomplished by
finding its two letters in the two external alphabets, where they act
as co-ordinates, and replacing this pair with the one which is found
at the cell of intersection. Thus, using the tableau of the figure,
and the order row-column, the substitute for _th_ would be _LG_; or,
using the order column-row, _TN_. With a tableau like that of the
figure (notice the straight unshifted alphabets), it is also possible
to encipher by what is ordinarily considered the decipherment process,
finding the plaintext pair inside the tableau and replacing it with
the two co-ordinates. But many of these tableaux are filled in a
thoroughly haphazard manner, and when this is the case, only the
ordinary encipherment plan is really feasible; in fact, the decipherer
has trouble in finding his cryptogram pairs, and it is usually
necessary that a second tableau be prepared especially for
decipherment purposes. On the other hand, it is very easy to construct
a mixed tableau in such a way that all of its encipherment is
reciprocal, and in this case there is no need for a second tableau,
since encipherment and decipherment are the same process. In most
forms of tableau, one or both of the external alphabets may be made
to slide and for the most part external alphabets are readily
changeable. But the tableaux themselves will have to be of more or
less fixed nature. Those which are safest are least readily
reconstructed from memory, and even those most easily remembered are
not set up very rapidly.
Figure 165
The "SLIDEFAIR" Cipher -(H. F. GAINES)
Key: H E R C U L E S
Plaintext: SE ND DI AM ON DS TO AM
CIPHER:..... XZ ZR RU KC TI HO KX US
ST ER DA MM ON DA YW EE
..... MZ NI JU KO TI PO SC MW
KW IT HO UT FA IL
..... PR PM XY RW GZ AT
Figure 166
C U L P E (1) bl = IB L P E C U N O Q S T Y Z V W X
R A B D F ez = FE B D F R A V W X Y Z P E C U L
G H I K M (2) cl = UP I K M G H C U L P E D F R A B
N O Q S T ce = UC Q S T N O R A B D F K M G H I
V W X Y Z (3) th = OM X Y Z V W G H I K M S T N O Q
ht = MO
Example:
SE ND DI AM ON DS TO AM ST ER DA MX MO ND AY WE EK WI TH OU TF AI LX.
TP SR BK FH QO KY NQ FH TN CF FB IZ HT SR DW ZU PM XH OM WA ZM BH BL.
* * *
1. If the two letters of the pair are found in the same column in
the key-square, replace each letter with the one directly beneath it;
and if one letter stands at the bottom of the column, use the one
standing at the top of the same column. With the key of the figure,
_ha_ becomes _OH_; _wa_ becomes _UH_.
2. If the two letters of the pair are found in the same row in the
key-square, replace each letter with the one immediately to its right;
and if one letter stands at the extreme right end of the row, use the
one standing at the extreme left end of the same row (_os_ becomes
_QT_; _st_ becomes _TN_).
* * *
2. These pairs and their supposed originals are set together in such
a way as to start the reconstruction of the key-square.
When probable words exist, the work of solution becomes more or less
mechanical, as we shall see. At worst, we may begin at the beginning
of the cryptogram and work straight through until we find the word.
But very often, a really probable word is repeated, and even repeated
more than once. In the latter case, we are sure to find the long
repeated sequence in the cryptogram; while a word repeated only once
may have been divided into two different sets of pairs, as:
_ex_-_ec_-_ut_-_io_-_n_ and _e_-_xe_-_cu_-_ti_-_on_. But notice, here,
what the two encipherments would be, using our key-square of the
figure: _LZ CU EO HQ x_ and _x ZL UL QM QO_. These two sequences have
five letters in common, _L Z U O Q_, and, in addition, when considered
together, show the letters _E C U O_ of the word “execution.” This
does not invariably happen, but is far from uncommon. Nor is the word
“execution” the only one which produces reversal (_ex_ in one sequence,
_xe_ in the other). Then, too, there are many words like “commission”
which, regardless of the point at which the division begins, will
always end in the same set of pairs: _mi_-_s?_-_si_-_on_.
Figure 167
D H B C N Q R T K U E A I O Y Z G X L V F M P S W J
14 12 11 11 11 11 11 11 10 10 9 7 7 6 6 5 4 4 3 3 2 2 2 2 2 -
* * *
It will be seen from the foregoing that the initial difficulty lies
in the correct identification of the first few pairs, and this, in a
short cryptogram, is no small difficulty. By whatever means it is
found possible to make these first tentative identifications, the
operation which is to admit or disprove their correctness is step
No. 2, in which we set them up as equations and then attempt to
replace them into their connected relationships in the key-square. If
this cannot be done, they cannot be correct; and, on the other hand,
it would be an extremely rare case indeed in which we could combine
as many as five or six such equations into one framework and then
find them incorrectly matched. To understand “equations,” suppose we
look at Fig. 168.
Figure 168
POSSIBLE RELATIONSHIPS
I
T K I . K
H T H R . I K . S Y . .
R S Y . S
Y
co nd em na ti on -c on de mn at io n-
EO ND EC TC TI AD EO ND EC TC TI AD CT
Figure 169
Equations of (d),(Fig.168) Possible Combinations
1 2 3 4 5 6 7 8
O D O
N O N D E D E C N O N D O
D C D E N O N D E C
E C D E C
C
9 10 11 12
M
T M . T O N D E C
. M T . N C . . . .
N C . N T M
C
13 14 15 16
A O N D E C O N D E C
T A T I . . . .
I A A T I M
T M
I
To learn whether or not the word “condemnation” does (or could) occur
here, we proceed as in Fig. 169. The first of the five equations may
have had either one of the relationships marked 1 and 2, and the
second may have had either of the relationships marked 3 and 4. These
two equations have a letter _D_ in common, and it must not be
impossible to form a combination which will represent both. This, as
it happens, can be done in four different ways, marked 5, 6, 7, and 8,
and we do not know which of the four is most likely. The third
equation, which has four different letters, may have had any one of
relationships 9, 10, and 11. These, fortunately, show two letters,
_N_ and _C_, which are also present in combinations 5, 6, 7, and 8,
and with two common letters, there will not be so many possible
adjustments as when we had only one. Nos. 9 and 10, for instance,
cannot possibly combine with any one of combinations 5, 6, 7, and 8;
both of these have demanded that the letters _NC_ be in direct
sequence, where the first four combinations will not permit this. We
may begin, then, by discarding Nos. 9 and 10. But No. 11, which we
have retained, demands of _C_ and _N_ only that they be on the same
row. This is not permitted by any one of combinations 5, 6, or 7, and
these also may be discarded. But No. 8 shows them on the same row;
thus Nos. 8 and 11 may be further combined, and we have the
combination marked 12. The fourth equation, another lineal one, may
have had either of the relationships marked 13 and 14, and both of
these will combine easily with the combination marked 12, so that
again we have more than one possibility, as indicated under numbers
15 and 16. As to which of these is correct, the fifth equation,
_io_ = _AD_, is impossible to one, and has automatically been set up
in the other.
* * *
We are safe, now, in making substitutions on the cryptogram. This
means not only the five pairs originally identified, together with
their reversals and possible reciprocals, but all others which can be
derived from combination 16, such as _om_ = _CA_, or _dm_ = _CI_, or
_en_ = _DC_, together with their reversals and possible reciprocals.
Then, too, there will be many partial equations, such as those
indicated in Fig. 170, where one letter of a pair can be identified.
Usually time is saved by taking cryptogram pairs just as they come
and filling in as many letters as possible; in this way, patterns are
sometimes brought out, and thus we come back to step 1: the
identification of more pairs. With the key-square beginning to shape
up, the “chart of probable position” may be used to good advantage.
For instance, what about the letters _H_ and _B_ which were very high
in the frequency list?
Figure 170
O * * E N * E DE EC
. . . .
A T I M
* * *
Figure 171
S E N D D D S T O A R D A M M
I A M O N M X S T E O N D A Y
The Playfair has been, in its day, a very effective cipher, and is
still good for many purposes. It can be rendered much safer if
subjected to the process called _seriation_. This process may be
examined in Fig. 171. Here, the text is “Send diamonds to Amsterdam
Monday,” and the agreed _seriation index_ is 5. The text is written
in pairs of five-letter lines, so that each ten-letter segment forms
five _vertical pairs_, _SI_, _EA_, _NM_, etc., and these are the
pairs which undergo the digram encipherment (notice the treatment of
the doubled _S_ in the second group). If the key-square is that of
Fig. 166, the first ten-letter segment is enciphered _QK_, _UF_,
_TG_, _SA_, _RS_, and the cryptogram may be taken off in that order,
or by taking the upper and lower lines separately:
_Q U T S R_ _K F G A S_. Seriation, it will be noticed, adds a
transposition to a substitution, so that what we have here is
combination cipher. This case, in short examples, is extremely
difficult; it is mentioned only by way of general information, and
is not included in the practice cryptograms which follow.
OS CF WD OG DR AN PO AS OA DH SD EH XK FU CN DR PF UK SD.
PK HL PG RI YH YN HQ IF YF GY ZL EB YF UK NK NG FL FG OL BD GX GK FC PK HG NV AC ZL
KH PK FG FK RZ FG RQ XO IB PB BD LE MV KG GY OL AD FK OR FC LK YN HL LK KZ IF EF AX
NG ON BV IK BI PK IO HQ IF AG LX YA FK AD YG KO AK EG TO OH BI RB OL ON KM FO PK KY
PR EF DZ IF AY QH CZ OK IQ WP FG LF DM CA VO GW PK NG KX KO LH AG NB RT NG KO KH HK
OX ML GP ML PB QD RB OH EB LH NK NG FC PK KY QS LH NE IQ WP FG.
151. By PICCOLA. (Figure 164; new external alphabets. THE, THIS, CHARACTER).
NF BJ HT MD NF WJ GD UC HN FW QI CE HP NF IA SE HS HS LG QA IY QD HV CC LB NF IA IA
CL GA RJ BD NM MA SY KU RD FT HC US HN GH VJ UA SY UL HN XJ EG QQ CJ LB NF KJ CN CS
UK GJ MD NF IA FK NQ GJ XX.
AA FS AF XY GJ BD UI AA PW GN IV QZ RC NK CC WA FT QQ PR GP TT WF PS JS QC HM DI XC
AH JP FB DC EW OX UG GP UI US CV GP MH QR OG JI ZR.
YG NG CR FV FZ RI OU KZ CW OW BQ GQ IH HL YW EG NG QM WX RT KP VE CA IG QI VD QI GN
GZ IZ QY QR HY NG XN AB AK OX NY WC WC TN OX DH NE IH IH YR IS QY WC HI UI UI IR QE
WS RW LG WR AB GW VW CA RQ XM ER QM RE CW ZI RQ XW QW GH YC AY YO VO NE RL PG CG WI
NX VW CA NX QM LH IG RQ WT GO UI GZ EG XN IW OU XT WO LH IG RQ XM WS QY TX IR IQ XM
OG DU AB RM AK UM RG ZR XA PM RW LD KG HI XK LC RT KP VE FO NX XK WR WS QY UR ZX YL
AT UI RH TR AV WS DH WQ PM AK IW OU WT DE IR WX RQ XZ SI GU QN IR XN IR YN IG GY TR
ZX YU RU YL IQ YA RU KG QM PD QM IY HA WS FE RW GH RB HA QI QM GI QC QR UL WV AB NX
GO HA FR IY QY BM QM YH NG IQ RU YL IQ BL PO QM RU GU IR TX SI GQ LQ DX XO EV BM CR
FV GV AB GE RZ GQ YH HA RW YM NE YM BL VW PS.
CHAPTER XXII
Highlights of Fractional Substitution
Figure 172
G E N • R A L 1 2 3 4 5 S = 43
B C D F H I K E = 15
M O P Q S T U 1 G B M V E N = 24
V W X Y Z 2 C O W N D D = 25
3 P X F Q Y
4 R H S Z A
5 I T L K U
Preliminary Substitution:
S E N D S U P P L I E S T O M O R L E Y S R I G H T A W A Y.
4 1 2 2 4 5 3 3 5 5 1 4 5 2 1 2 4 5 1 3 4 4 5 1 4 5 4 2 4 3
3 5 4 5 3 5 1 1 3 1 5 3 2 2 3 2 1 3 5 5 3 1 1 1 2 2 5 3 5 5
Re-Substitution:
41 22 45 33 54 53 51 35 51 45 21 31 53 22 12 45 13 43 21 35 53
R O A F K L I Y I A C P L O B A M S C Y L
45 14 54 21 11 22 53 43 55 Transmitted:
A V K C G O L S U.
R O A F K L I Y I A C P L O B, etc.
Figure 173
S E N D S U P
... . -. -.. ... ..- .--. Reverse digits, and re-group:
3 1 2 3 3 3 4 4 3 3 3 2 1 3
.... -.- ... ... .- . --.
H K S S A E G
Q I N H P R M L M G R N B M A H G T O L O O E L O A O D R I N H W R O
A A B M M I M M W I B M D A B T H D I L T H T H I N T L A Q M C A M F
I V N K Y N O F H B I I T R F Q L A D K V Q I N H P R M R B H S L L U
A B M E T S O A A B M M I M M I B P I V R Q F T K H I R D F G N I E M
A B E N I L M M P A S I F I O P L Y C C R C I T W I V W M F G I O O S
O E R O I K Q I E F O V N V M Q T D R S I O E R I B U Q C D O A L L A
P L A A O O C A Q O M E I D C N T I U L O L Z D G.
The mixed alphabet here was placed in the square by straight horizontals. History:
Message intercepted following a report that on the tenth of August an attenpt had
been made to enter the American embassy in a country where Royalists are opposed to
a group of radicals.
3 3 3 2 3 1 1 1 2 3 2 2 1 3 1 1 1 1 3 1 3 3 1 1 3 2 2 1 2 2 1 1 2 3 1
2 3 3 2 1 2 3 3 1 1 3 2 1 1 2 1 2 2 2 3 1 2 2 2 3 1 1 2 2 1 2 3 2 3 2
2 1 2 3 1 3 3 2 3 1 1 2 2 1 3 2 1 2 2 3 2 1 3 1 2 2 2 2 3 2 3 2 2 2 2
3 1 1 1 3 1 2 3 2 1 1 2 2 2 3 2 3 1 3 2 2 2 2 1 2 3 1 2 2 1 2 1 2 2 1
1 2 2 3 2 3 2 2 3 2 2 2 3 2 2 3 3 1 2 2 3 1 2 1 3 1 1 1 1 2 1 3 3 3 3
1 2 3 3 3 2 1 3 3 1 1 1 1 2 2 3 1 1 3 1 1 1 1 1 1 1 1 3 2 2 1 2 3 2 2
2 1 2 1 2 1 2 2 2 3 3 2 2 1 3.
E D C Y B A Z C B Z A V W X C X B A E Y D C B V A E D W B X A E Y Z D
A E Z V W D C A E D X C B Y D Y Z V C B W B A Z V E W X B X A E Y D C
B V A E W D C X A E Y Z D C E Z V D W C B E D X C B Y A Z D C B V W A
A E D C B A E E W D C B X Y D C Y Z B V A B A Z V E W X A E W D C X Y
E D Y Z C B V E D C W B A X E D Z V C B A C B V W A X Y X B Y A E D Z
E Y Z D V W C W E D X C B A D Y Z V C B A D C W B A X E E D C B A V E
D C X Y B Z A E D C B A E W D Y Z C B V A B A Z V E W X E D V W C X Y
X D C Y B A Z C Z B A V E W B A E W D X Y E D X Y C Z V V E D W C B A.
CHAPTER XXIII
Investigating the Unknown Cipher
When the type of encipherment is unknown, the decryptor’s first
problem may concern the probable language used in the plaintext, and
this he is usually able to determine from the source and history of
the cryptogram.
* * *
* * *
* * *
When all letters are present in the frequency count (or all but one
or two in the possible cases of 25-letter and 24-letter alphabets),
a period-investigation is usually indicated. The case of periodics
has been seen at considerable length, though a final hint might be
added for the detection of a possible Porta encipherment. One of our
many collaborators, F. R. Carter, suggests that any Porta cryptogram,
periodic or otherwise, ought to show from 52% to 53% of letters _N_
to _Z_ — the opposite of normal.
* * *
Of the examples to follow, there is none in which the system may not
be learned through analysis, unless perhaps the final unnumbered
cryptogram, and the material, in every case, should be suffcient for
solution.
No. 164 is said to have been taken from a German spy serving in the
American army in France. This applies, however, to the first fifty
groups only; the remainder was added to increase the length and to
emphasize the plan followed by the spy.
157. By PICCOLA.
C S R Z V Y P Q Z J K H K V Q U U C V M R T W Z N G H Q S A K O X P M
H D R W A J D F Q D F S R Z Z C G X P A J J T Z U L H T G S A H X J J
L T R N N Z P B Z G R E B N F Y G E J N M T N J J Q H P J X M O B J A
L X I A I C P F J O O F R N H.
158. By PICCOLA.
O C E E A T T I T K S N D T D S T H O O Y E A O E E P E B O T Y T A O
A D S E O E T F T T T H R V W C T H O Y L T O O H L R B T T U H R R V
R A W O B R U A O Y E H H L A B N E R L R K V C R I O N S E I D R U E
R I P.
159. By TITOGI.
A H Y N U H C E S T I T N D O R F E H R W E A T F N R F P A O T M A T
L H R E I O T N R L O D R H E E A T E S C T D I N W T S T O E A T S I
T E C D U T M S O T R L D O N G N I I S O F A E T L I T A S.
(a) H Z M Q L D N N D Z S P R F S K L L L L. (b) L I L V M S T Z U G
D H Z U Q X L L L L. (c) T V I U M F R U O Y U Q Y P S F W X L L.
(d) L I L V M F P O E Y Z K F D V U E L L L. (e) G K P V D Z T A Y T
B F Y Y C F I U L L. (f) Q B F P W Y C L U D V P Z Z O S W Y N C.
(g) Q B R T F F G V T U E N S Z H B Q E R L.
161. By PICCOLA.
E G W G W G E G T U C L C U O X G K Z T E G O B G B Y L W M I Q N K Q
Y E N F S C L H M N Y B X S E T N I W O C E G C B F C T C S Z T V G B
E A E G T U R K F K B E G K X B C T G Z Y L X C H Y E G C U O X Y T Q
F A D Q T T C U N B O G C O H X C E W E C U V E G C O C X Y X G B E A
Y T K X F Q C O T B X N E G T U C O N T O P E L E K U V U N T O C N G
N G B K W C E E C S Z K W N H E I K C C R E G C T E G T U R K F K T B
R G M W X C F G Q N I C E B P E E W E N B K I Y F K F D O F E G N U C
B G M T Z T F X C E W E C F V D T T U Z T E N E G W G L F M C T O V L.
162. By PICCOLA.
S P P A S T A S E F U N M T E H S O O A E S L E I C T R C H V U G S E
L Y R E M E N E E R O S N E H I R A E T O R N S H M O D R O P E A O R
P O S R Y P D O I N O C K G T.
Key: M E T H O D I C M E T H O D I C M E T...
6 3 8 4 7 2 5 1 6 3 8 4 7 2 5 1 6 3 8...
Cryptogram:
T H I S I S E N A N S P O S E D E T C...
C I P H E R E D U S I N G T H E PFGVT VUHDG LMRIV
I V V I G E N E S A M E K E Y F ZOPUH MMVNB FOUDQ WSURF
R E A N D A F T O R B O T H O P BIOTP FGHRU VWHKR RWEVV
E R W A R D T R E R A T I O N S WULVA MPGWV MGEAQ CUYHW LBFUT.
163. By PICCOLA.
T Y D Q V W P A Z O M B W B I R K F I O O G W C O G E F L T Q M S R F
X T C J C M A W P P Q M E X V O Q C O C Z F S F W V F E V E R S A B E
C V J J W S I P P H M M K O X V Y I D B D B C I S Y N L J C Y F K C W
E N Z E I T J V L Z M I L I I R W K R O O S Z A W E K J V J G F M Q K
G F N C K H P B R D L V I A P E S L V M D J Z Z V F Z F F R D B A D P
Q W E N L A L O E K M F M F W X O K D W D G C K K K C Q R V.
164. By VULPUS.
P E N A R C P F T I Q E V A T E N B L A T K Q F O A R E N E U I P E P
F U K X I L C N F Q E P C V B T A W A O B N C O E T I N D W B N A R D
Q F O F N B V C P E P G V G P A V A P B P F O A O B S C L B V B T F W
A N E W B T C S D N F M A N A O E V A R A R C T K Q E N B M B Q F V E
V B X K O A P E T B U I P F O F Q E L E O B R D R B Q F U A W A S C U
K L F P E W B O C O D N A M E L G V F V A N C N D M F N B V D T D L E
P F V I T I Q E Q F O C O A U C L F L A O B M E P E N A S D L B T K L
H N E P D. ..... U I L A L B O B M A V K M G U K R F P F U B U D M
F W E T A T I Q E V B R C M B W A N F Z I L E N A Q F W B T C R D T B
T K O E P E U A V A O F N B S C Z K V B W C U B O A L F O B M E X I T
D Q C Q D W A P F Q E N A L A.
R O V L L A B T L D L B C Q M P X L B A F B T C T A T C O R L T O L C
R H P D T X L Y O A E L B X P H L X B T X X Q L D R G L T K X R L G D
B K L D P P L O H L Y O A E L K O M X B L H O E L V C R R C R J L T K
D T L R C I N X P L L L T K X L R C I N X P L V D B L V O R L P O R J
L D J O L F Y L I O P O R X P L M D E N X E L K C T T L V K O L O H H
X E X G L T O L I O Q M E O Q C B X L H O E L T V O L I X R T B L B C
R I X L K X L V D B L D F P X L T O L B X R G L T K X L B O P A T C O
R L F Y L E X T A E R L Q D C P L L B T C P P L C T L V O A P G L F X
L V O E T K L D R O T K X E L R C I N X P L T O L H C R G L O A T L T
K X L N X Y L L T K C B L Q A B T L F X L T K X L X W M P D R D T C O
R L O H L T K X L E X H X E X R I X L T O L D L I E O O R X E L D R G
L T K X L X Q M K D B C B L O R L D L G D T X L L M L B L T K X L T V
O L I X R T B L K D B L R O T L Y X T L F X X R L M D C G L.
03 65 12 45 58 28 06 41 72 14 22 03 02 17 36 88 25 20 55 77 74 51 23 45 41 42 30 24
36 61 96 09 07 78 05 44 08 06 55 92 16 93 02 15 36 37 40 87 41 01 33 77 06 36 27 54
48 29 16 78 92 66 03 10 38 17 45 23 72 96 73 01 49 25 72 38 92 72 24 55 48 08 40 92
28 01 72 96 02 04 74 61 06 99 30 45 72 69 74 93 77 23 55 36 24 93 47 84 76 35 32 89
87 76 77 64 51 96 58 43 76 02 81 38 87 69 89 55 99 23 79 55 51 06 99 71 74 69 89 84
27 25 22 39 42 53 19 93 41 66 09 75 87 37 91 87 90 91 43 19 40 30 38 16 96 22 69 38
78 02 74 92 47 25 77 91 15 40 24 45 07 07 96 48 44 15 12 06 99 44 93 19 25 23 55 30
45 87 96 18 01 78 44 29 45 86 47 69 48 30 66 44 03 41 66 37 38 22 06 42 41.
59.
APPENDIX
X J M M T V O Z B N Q M F B T F S F N J U G P S U I J T B E ?
Vowel Percentages:
Percentages for L N R S T:
NOTES: ENGLISH frequencies, which may be compared with those of Mr. Meaker,
(A, 8.05; B, 1.62; C, 3.20; etc.), were taken from M.E.OHAVER.
FRENCH, ITALIAN, and SPANISH frequencies were taken from a count
made by the author. All four counts are based on 10,000 letters
of literary text, and the dropping of the decimal point gives
the actual count. The frequencies given for GERMAN and PORTUGUESE
are approximations, reduced from other texts, probably military.
%
%
V. C.
V. C.
19 81 P4 L4 C5 D5 M5 N6 S6 W7 T8 R8 E11 H14 A N21T17S12R10L8 D5 C4 M4
6 94
55 45 Y4 B4 N5 T5 U8 D9 O9 S10A16E16 B E34L17U11O9 A7 Y5 B4 R4
70 30
61 39 U4 O5 S8 N13A13I18E20 C H19O19E17A13I7 T6 R4 L4
K4 59 41
52 48 R4 I5 L6 A10N29E39 D E16I14T14A10O8 S6 U5
54 46
8 92 C4 B4 E5 M5 V5 D5 S5 L5 N6 T6 R11H24 E R15D10S9 N8 A7 T6 M5 E4
C4 O4 W4 21 79
69 31 S4 N5 F5 D5 A6 I7 E12O41 F T22O21E10I9 A7 R5 F5 U4
52 48
36 64 O4 D4 U5 R5 I9 E9 A10N48 G E14H14O12R10A8 T6 F5 W4
I4 S4 42 58
7 93 G4 E5 W5 S7 C9 T62 H E50A23I12O7
90 10
13 87 F4 M4 W5 E6 N6 L8 D8 S8 R9 H11T14 I N25T13S10O8 C7 R4 E4 M4
A4 L4 17 83
28 72 Y7 W7 T7 S7 N7 E7 C7 B7 A14M29 J U35O29A12E12M6 W6
88 12
53 47 Y5 U5 I5 N7 A11R13E13O15C18 K E34I21N10A9 T7 S6
68 32
52 48 N4 P4 T6 I7 B7 U7 O10E11L11A17 L E19I15Y12L12O9 A8 D7 U4
65 35
69 31 S4 D4 M5 R5 I12A13O16E24 M E26A17O12I11P5 M5
71 29
89 11 U7 E14O22A23I24 N D16T14G12E10A7 S7 O7 I6
C5 32 68
21 79 M4 O4 D4 L4 P4 H5 N6 E6 C7 F7 S8 I8 R9 T11 O N20F14R11U10T6 M5 L5 S4
W4 O4 18 82
47 53 R4 L4 T4 N4 I4 P6 M6 A7 O8 U10E16S17 P O17E16A15R15L8 U6 P6 T5
I5 S4 59 41
20 80 O10N10L10E10D10R20S30 Q U100
100 --
70 30 P5 I5 U5 T7 A13O16E30 R E23O12A11T11I10S7 Y4
61 39
48 52 D4 T4 O6 U6 R7 N8 S9 I11A16E18 S T19E11O10I9 S9 A8 H6 P5
U4 41 59
43 57 U4 O5 D6 T6 F7 R7 E8 I10N10S13A14 T H39I10O10E8 A7 T6 R4
38 62
35 65 P5 F5 T5 L5 B6 D8 S9 O30 U N18S13T13R12L10P7 B4 C4
8 92
88 12 R6 U10O16A16I16E30 V E65I14O9 A8
99 1
48 52 G4 D4 Y5 N9 S10T11O16E23 W A27H16I16E15O11N4
80 20
95 5 U5 N5 I16E74 X P29T19I14A14U10C5 K5 O5
38 62
24 76 B4 N8 A8 T13E14R15L25 Y A15O12S12T9 W7 H5 I5 E5
D4 M4 B4 38 62
88 12 O12N12A25I50 Z E43I43W14
86 14
All figures indicate PERCENTAGES. - Taking any one letter, as A: On the left,
it was contacted
14% of the time by H, 11% by E, etc., and 81% of its total contacts on that
side were consonants.
On the right, it was contacted 21% of the time by N, and 94% of the time by
consonants.
A B C D│ E│ F G H I J K L M N O P Q R S T U V W
X Y Z
A 1 8 44 45│131│21 11 84 18 34 56 54 9 21 57 75 56 18 15 32
3 11 805
B 32 18│ 11│ 2 2 1 7 7 9 7 18 1 4 13 14 5
11 162
C 39 12 4│ 64│ 9 1 2 55 8 1 31 18 14 21 6 17 3
5 10 320
D 15 10│107│ 1 1 1 16 28 2 118 16 16 6 9 11 4
4 365
E 58 55 39│ 39│25 32 251 37 2 28 72 48 64 3 40 148 84 94 11 53 30
1 12 5 1231
F 10 1 12│ 23│14 3 2 27 5 8 94 6 13 5 1 1
3 228
G 18 2│ 20│ 1 1 10 1 75 3 6 6 1 12
5 161
H 46 3│ 15│ 6 16 5 1 9 3 7 3 30 315 2 48
5 514
I 16 6 15 57│ 40│21 10 72 8 57 26 37 13 8 77 42 128 5 19 37
4 18 2 718
J 2 1│ 1│ 1 1 3 1
10
K 10 8 │ 2│ 8 3 3 5 11 2
52
L 77 21 16 7│ 46│10 4 3 39 55 10 17 29 12 6 12 28 4
6 1 403
M 18 1 9│ 43│ 3 1 1 32 4 5 7 44 15 14 14 9 1
4 225
N 172 5│120│ 2 3 2 169 3 1 3 9 145 12 19 8 33 10
3 719
O 2 11 59 37│ 46│38 23 46 63 4 3 28 28 65 23 28 54 71 111 2 6 17
1 28 794
P 31 1 7│ 32│ 3 1 1 3 2 16 7 29 26 8 24 8 17 2
4 7 229
Q 1 1│ 14│ 2 2
20
R 101 6 7 10│154│ 4 21 8 21 2 5 113 42 18 6 30 49 1
5 603
S 67 5 1 32│145│ 8 7 3 106 2 12 6 51 37 3 39 41 32 42 3
17 659
T 124 38 39│ 80│42 13 22 88 1 19 6 110 53 14 63 121 53 45 6
1 21 959
U 12 25 16 8│ 7│11 8 2 4 8 13 12 96 7 20 6 30 22 1
1 1 310
V 24 4│ 16│ 1 14 2 4 13 5 2 4 1
3 93
W 7 1 9│ 41│ 4 2 7 1 3 5 2 15 36 1 10 27 16 2
14 203
X │ 17│ 1 1 1
20
Y 27 19 6│ 17│ 1 1 1 3 47 3 14 4 2 17 4 21 1
188
Z 1 │ │ 4 2 1
1 9
To learn the frequency of any digram, find its first letter at the top,
find its second
letter at the side, and observe the figure in the cell at which the column
headed by the
first letter crosses the row headed by the second. Frequency for EA, 131;
for AE, zero.
G E R M A N
Order of digrams: EN ER CH DE GE EI IE IN NE ND BE EL TE UN ST DI NO UE SE AU RE
HE
Order of trigrams: EIN ICH DEN DER TEN CHT SCH CHE DIE UNG GEN UND NEN DES BEN
RCH
Order of tetragrams: ICHT KEIT HEIT CHON CHEN CHER URCH EICH DERN AUCH SCHA SCHE
Peculiarities:
Order of digrams: ES EN OU DE NT TE ON SE AI IT LE ET ME ER EM OI UN QU
Order of trigrams: ENT QUE ION LES AIT TIO ANS ONT ANT OUR AIS OUS
Peculiarities:
Q followed by U and a second vowel.
Four and five vowels may be found in sequence ("J'ai oui dire.."), but
E seldom touches the other vowels. D and M contact E about 75% of
the
time, and L contacts it over 50% of the time. It is unusual to find
more than four consonants in sequence; when five are found in
succession, one is almost surely the final S of a plural word.
I T A L I A N
Order of digrams: ER ES ON RE EL EN DE DI TI SI AL AN RA NT TA CO
Order of trigrams: CHE ERE ZIO DEL ECO QUE ARI ATO EDI IDE ESI IDI ERO PAR NTE
STA
Peculiarities:
Q followed by U and a second vowel. H largely preceded by C, in
CHE,CHI,
or sometimes by G in GHE GHI. Z most often part of ZIO or NZA.
The frequencies of the vowels E A I O often exchange places.
Doubling of consonants is very frequent.
S P A N I S H
Order of digrams: ES EN EL DE LA OS AR UE RA RE ER AS ON ST AD AL OR TA CO
Order of trigrams: QUE EST ARA ADO AQU DEL CIO NTE OSA EDE PER IST NEI RES SDE
Peculiarities:
Q followed by U and a second vowel. The only doubles are
LL, RR, CC, EE, NN, OO, in the order given, but the latter three
are very rare. Group frequencies somewhat less stable than
in the other languages.
Order of initials: C P A S M E D T H V R U N I L B O F Q G J Z
Order of finals: O A S E N R D L I Z
P O R T U G U E S E
Order of digrams: ES OS DE AS RO EN CO DO RE ER NT SE AD OR AO SA TE AR EM QU UE
OD ST
Order of trigrams: QUE ENT NTE DES EST ODE ADO CON STA MEN ADE DOS ARA COM
Much like Spanish. Spanish cion becomes cao; ll becomes lh. Articles drop
the L: os, as, in place of Spanish los, las, etc.
BIBLIOGRAPHY
By W. D. Witt
Thomas, Paul B. Secret Messages. New York and London, 1928. 2nd
printing, 1929.
Advanced Works
Pratt, Fletcher. Secret and Urgent, The Story of Codes and Ciphers.
Indianapolis, 1939.
Below are listed the hundred most frequently used words in English.
The figures give occurrences in 242,432 words of English text taken
from fifteen English authors and many newspapers. Compiled by Frank
R. Fraprie, after the rest of the book had been completed.
ENGLISH TRIGRAMS
ENGLISH DIGRAMS
The one hundred and nine most frequent English digrams, compiled from
a count of 20,000 trigrams by Fletcher Pratt, in “Secret and Urgent,”
supposed not to include overlaps between words, and 5,000 by Frank R.
Fraprie, including overlaps.
INDEX
Magic squares, 10
Mathematical aspects of multiple-alphabet ciphers, 142, 151, 193, 196
Mechanical methods, 21, 32, 45, 56-58, 133, 138, 149
Military aspects of ciphers, 3, 55
Mirabeau’s cipher, 209
Mixed alphabets, 70, 169
Monoalphabetic substitution, meaning of, 68
Morse alphabet, 210
“Multifid” alphabets, 209
Multi-literal substitutes, 6, 7, 104
Multiple-alphabet ciphers, 108-197
Multiple-alphabet substitution, meaning of, 68
Multiple messages, 56, 85, 140, 146, 185
Multiple-substitutional encipherment, Multiple substitutes, 68, 99,
102, 103, 159
Myszkowsky’s transposition, 51
Pair-count, 202
Pair-encipherment, 198, 199, 200
Parallel frequency counts, 162, 165, 177
“Pattern words,” 73
Pentagram, meaning of, 1
Periodic ciphers, 108-184
“Period” in autokey ciphers, 146
Period, periodicity, 108, 112-114, 127, 138, 166, 195
“Phillips” cipher, 185
Phonetic alphabets, 106
Playfair cipher, 200
“Pointers” for vowel-spotting, 78
Pollux systems, 209
Polyalphabetic ciphers, names of, 108
Polyalphabetic substitution, meaning of, 68
Polyalphabetic substitutions, 108-197
Polybius square, 164, 209
Polygram substitution, meaning of, 68
Polygram substitutions, 198-208
Porta cipher, 118
Primary cipher alphabet, 164, 169
Primary cryptogram (see double transpositions or double substitutions)
Probable word methods, 23, 29, 34, 37, 99, 113, 119, 124, 147,
202, 206
Progression, Progression index, 192
Puncture cipher, 4
Tableaux:
Vigenère, 109
Porta, 118
Beaufort, 121
used for decryptment of periodics, 134
formed in autokey decryptment, 150
high-frequency co-efficients, 152
imaginary, or formed in key-recovery, 170-172, 178
Delastelle, 177
for finding alphabetical intervals, 194
for pair-encipherment, 198
“Taking off” (Transcription), 9, 17, 23, 60
Terminals (see statistics)
Tetragram, meaning of, 1
Transformation device, 102
Transposition, meaning of, 1
Transposition ciphers, 9-67
Trial key, 111, 150
“Trifid” substitution, 210
Trigram, meaning of, 1
Trigram encipherment, 199
Trigram method of solution:
applied to Beaufort, 125
applied to Gronsfeld, 117
applied to Porta, 119
applied to Vigenère, 113
with the use of a slide, 141
Trithème’s alphabet, 7
Unit, 9, 18
United States Army Cipher Disk, 108, 123
United States Army Double Transposition, 54
Word-spacers, 100
“Writing-in” (Inscription), 9, 17, 23, 60
Transcriber's Note
The original figures were made with a typewriter, and then lines,
arrows, or circles were added. This file reproduces them as well
as is possible as plain text. Please see the HTML version if you
wish to see the figures with all of their details.
In Chapter VII, “those who like method” was corrected to “those who
like this method”.
Exercise 153: “QY BN QM” corrected to “QY BM QM” and “BL PK QM”
to “BL PO QM”.
Updated editions will replace the previous one—the old editions will
be renamed.
Creating the works from print editions not protected by U.S. copyright
law means that no one owns a United States copyright in these works,
so the Foundation (and you!) can copy and distribute it in the United
States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part
of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as creation
of derivative works, reports, performances and research. Project
Gutenberg eBooks may be modified and printed and given away—you may
do practically ANYTHING in the United States with eBooks not protected
by U.S. copyright law. Redistribution is subject to the trademark
license, especially commercial redistribution.
1.D. The copyright laws of the place where you are located also govern
what you can do with this work. Copyright laws in most countries are
in a constant state of change. If you are outside the United States,
check the laws of your country in addition to the terms of this
agreement before downloading, copying, displaying, performing,
distributing or creating derivative works based on this work or any
other Project Gutenberg™ work. The Foundation makes no
representations concerning the copyright status of any work in any
country other than the United States.
This eBook is for the use of anyone anywhere in the United States and most
other parts of the world at no cost and with almost no restrictions
whatsoever. You may copy it, give it away or re-use it under the terms
of the Project Gutenberg License included with this eBook or online
at www.gutenberg.org. If you
are not located in the United States, you will have to check the laws
of the country where you are located before using this eBook.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form, including
any word processing or hypertext form. However, if you provide access
to or distribute copies of a Project Gutenberg™ work in a format
other than “Plain Vanilla ASCII” or other format used in the official
version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the method
you already use to calculate your applicable taxes. The fee is owed
to the owner of the Project Gutenberg™ trademark, but he has
agreed to donate royalties under this paragraph to the Project
Gutenberg Literary Archive Foundation. Royalty payments must be paid
within 60 days following each date on which you prepare (or are
legally required to prepare) your periodic tax returns. Royalty
payments should be clearly marked as such and sent to the Project
Gutenberg Literary Archive Foundation at the address specified in
Section 4, “Information about donations to the Project Gutenberg
Literary Archive Foundation.”
• You provide a full refund of any money paid by a user who notifies
you in writing (or by e-mail) within 30 days of receipt that s/he
does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and discontinue
all use of and all access to other copies of Project Gutenberg™
works.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the
trademark owner, any agent or employee of the Foundation, anyone
providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with the
production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of
the following which you do or cause to occur: (a) distribution of this
or any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of other
ways including checks, online payments and credit card donations. To
donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.