Cryptodiagnosis of “Kryptos K4”

Total Page:16

File Type:pdf, Size:1020Kb

Cryptodiagnosis of “Kryptos K4” Cryptodiagnosis of “Kryptos K4” Richard Bean School of Information Technology and Electrical Engineering University of Queensland, Australia 4072 [email protected] Abstract parts of the K4 plaintext with locations were re- leased by the sculptor, totalling 24 letters. Fur- The sculpture “Kryptos” at the Central In- ther details may be found in Dunin and Schmeh telligence Agency in Langley, Virginia, (2020). contains four encrypted passages. The last, known as “K4” and consisting of 97 Callimahos (1977) and Lewis (1992) describe letters, remains unsolved. the process of diagnosis of an unknown cipher type. Callimahos, in a chapter entitled “Principles In this work, we look at unusual statistical of Cryptodiagnosis”, sets out a process of hypoth- properties of the K4 ciphertext, together esis formulation and hypothesis testing. This in- with the known plaintext, using Monte volves arrangement and rearrangement of the data Carlo sampling to perform permutation to disclose nonrandom characteristics, followed testing. This provides evidence strongly by recognition and explanation of these character- indicating a definite “one-to-one” relation- istics. The chapter headers are: manipulating the ship between corresponding plaintext and data, recognizing the phenomena, and interpreting ciphertext letters. It also points toward a the phenomena. possible encryption method which could account for most or all of the observed Lewis states that the task of an analyst is find- properties. This is the “Gromark” cipher ing, measuring, explaining, and exploiting a phe- invented by Hall (1969, 1975) and ana- nomenon (or phenomena). Writing about cipher lyzed by Blackman (1989). type diagnosis, he describes the search for “some- thing funny” or “finding the phenomena”. 1 Introduction Since these publications, Mason (2012) pre- The “Kryptos” sculpture was installed at the Cen- pared a table of cipher statistics for many tral Intelligence Agency (CIA) in Langley, Vir- American Cryptogram Association (ACA) types, ginia in November 1990. The sculptor was Jim with associated random forest (2013) and neural Sanborn and the cryptographic consultant was Ed net (2016) classifiers. Nuhn and Knight (2014) Scheidt, who retired from the CIA in December also developed a classifier for ACA cipher types 1989. The sculpture contains four encrypted mes- using a support vector machine approach. sages totalling 865 letters plus 4 question marks. Scheidt has indicated that the codes were de- In this paper we attempt to measure some of signed to be solved in five, seven or ten years. the interesting phenomena seen in K4 and provide The first three sections were solved indepen- possible explanations. We perform statistical test- dently by three different teams or individuals: an ing using Monte Carlo sampling and describe one NSA team in 1992, David Stein from the CIA in possible encryption method, the Gromark cipher 1998, and Jim Gillogly in 1999. The fourth sec- of the ACA, and its variants. Finally we conduct tion, “K4”, consisting of 97 letters remains un- an extensive search of the Gromark key space for solved and its encryption method remains publicly various bases and key primer lengths before dis- unknown. During the period 2010 to 2020, four cussing our conclusions. 2 Analysis in this paper are provided via Github.1 The recently solved (Oranchak et al., 2020) Good (1983) commented on the practice of look- “Zodiac 340” cipher also had a similar prop- ing at a sample ciphertext and deciding on a test erty (Daikon, 2015; Van Eycke, 2015). A rela- of significance based on the observed data, instead tively high number of repeated bigrams was seen of running a standard series of tests. The passage at width 19 in the ciphertext. The cipher was ulti- is worth quoting in full to describe the risks and mately found to be a combination of transposition rewards of such an approach. and homophonic substitution. The width 19 prop- ... it is sometimes sensible to decide on a signif- erty can thus, after the fact, be deemed “causal” icance test after looking at a sample. As I’ve said as the enciphering process caused this property to elsewhere this practice is dangerous, useful, and appear. often done. It is especially useful in cryptanalysis, but one needs good detached judgment to estimate 2.2 Seriated ciphers the initial probability of a hypothesis that is sug- The “seriated Playfair” cipher of the ACA might gested by the data. Cryptanalysts even invented provide a partial aesthetic explanation for the a special name for a very far-fetched hypothe- width 21 patterns. This cipher is digraphic and sis formulated after looking at the data, namely works by performing Playfair encryption on verti- a “kinkus” (plural: “kinkera”). It is not easy to cal pairs of letters. That is, any given pair of letters judge the prior probability of a kinkus after it has in plaintext (p1; p2) maps to another pair of letters been observed. (c1;c2) in a one-to-one fashion. Thus, numbering the positions 0 to 96, the repeated “BS” bigrams at 2.1 Ciphertext analysis positions 12/33 and 18/39 would reflect the same underlying plaintext, or “AZ” at positions 49/70 One of K4’s most prominent unusual features is and 57/78. Similarly, the “double box cipher” or the number of repeated bigrams when the ci- Doppelkastenschlussel,¨ sometimes referred to as phertext is written at width 21 (Hannon, 2010; “double Playfair”, described by David (1996) is a LaTurner, 2016; Kirchner, 2003); see Table 1. digraphic cipher which required seriation at width 21. OBKRUOX OGHULBS OLIF BB W There are also several arguments against this as FLRV QQ P RNGK SS O TWTQSJQ a method: SSEK ZZ W ATJKLUD IAWINFB NYPV TT M ZFPKWGD KZXTJCD • according to the “ACA Cipher Statistics” IGKUHUA UEKCAR webpage of Mason (2012), the index of co- incidence (IC) of a typical “seriated Playfair” Table 1: K4 ciphertext written at width 21 ciphertext is 0.048 with standard deviation 0.003 versus K4’s IC of 0.036 If we consider the 76 bigrams formed vertically • 26 letters occur in the ciphertext, while the (starting with OF and finishing with GR), there most common Playfair variant uses only 25 are 11 repeated bigrams (AZ BS IT LS LW PK from a 5x5 square QZ SN WA ZT KK). This value is in line with the expected number of repeated bigrams if a typical • the doublet “KK” is present, which cannot English plaintext was written out at width 21; for occur in standard Playfair example, testing all 97-letter contiguous subsets of • a plain interpretation is that there are 97 ci- the King James Bible gives an average value of 9.7 phertext letters, an odd number, while Play- repeated bigrams at width 21. fair works on pairs of letters. As 97 is also If we perform Monte Carlo sampling and take prime, this is also an argument against the a large number of permutations of the cipher- Hill cipher suggestion of Bauer et al (2016). text (Good, 2013), we can estimate the propor- tion of permutations of the ciphertext which would The original description of the Playfair cipher have at least this number of repeated bigrams. In by Wheatstone entitled “Specimen of a Rectan- this case, this proportion is approximately one in gular Cipher”, seen in Kahn (1996, p. 199) uses 6,750. Programs written in C to calculate values 1https://github.com/RichardBean/k4testing a 9x3 rectangle, and enciphers doubled letters, These observations are unusual, and may well which would account for the last three observa- be causal, but were ultimately considered harder to tions. We could take the question mark before measure, explain or exploit than the observations “OBKR” on the sculpture as the initial charac- discussed here. ter, with 27 different characters and 98 ciphertext characters. The low IC could then be accounted 2.4 Known plaintext analysis for by careful selection of the key. The 24 known plaintext letters are as fol- However, these theories all became moot af- lows: “FLRVQQPRNGKSS” in cipher corre- ter the “BERLIN” plaintext clue was released in sponds to “EASTNORTHEAST” in plain and November 2010. This corresponds to the cipher- “NYPVTTMZFPK” in cipher corresponds to text “NYPVTT”. Thus, if a seriated digraphic ci- “BERLINCLOCK” in plain. pher at width 21 had been used to encipher the Materna (2020) noted that for the known K4 plaintext, we would have two different plaintext plaintext, where the plaintext letters are in the bigrams ending in “I” and “N” both mapping to set fK;R;Y;P;T;O;Sg the corresponding cipher- “ZT”, which is impossible. As the letter “K” in the text letters are very close in the standard alphabet 2014 plaintext clue of “CLOCK” also enciphered to the plaintext letters. Thus, the 10 shortest dis- to “K” this ruled out the use of standard Playfair tances (the so-called “minor differences” (Fried- for the vertical bigrams. man, 1954)) sum to 21, as shown in Table 2, for a We might also wish to check a width of seven, mean of 2.1. based on a purely aesthetic argument, since 98 Plaintext letter STORTSTROK characters is seven pairs of rows with seven char- Ciphertext letter RVQPRSSPFK acters per row. Similarly, the “NORTHEAST” Distance 1 2 2 2 2 0 1 2 9 0 plaintext clue was released in January 2020, which corresponded to letters 26-34 in the ciphertext, Table 2: Minor differences between plain and ci- “QQPRNGKSS”. If a seriated digraphic cipher phertext letters had been used to encipher the plaintext at a width of seven, we would have two different plaintext bigrams ending in “N” and “O” both mapping to Monte Carlo sampling by permuting the cipher- “BQ”, again impossible. text letters of K4 demonstrates this occurs only in about one in 5,520 permutations of K4 ciphertext letters.
Recommended publications
  • DOCUMENT RESUME ED 071 911 SE 015 548 TITLE Project Physics
    DOCUMENT RESUME ED 071 911 SE 015 548 TITLE Project Physics Teacher Guide 6, The Nucleus. INSTITUTION Harvard Univ., Cambridge, Mass. Harvard Project Physics. SPONS AGENCY Office of Education (DHEW) Washington, D.C. Bureau of Research. BUREAU NO BR-5-1038 PUB DATE 68 CONTRACT OEC-5-10-058 NOTE 235p.; Authorized Interim Version EDRS PRICE MF-$0.65 HC-S9.87 DESCRIPTORS Instructional Materials; *Multimedia Instruction; *Nuclear Physics; Physics; *Radiation; Science Activities; Secondary Grades; *Secondary School Science; *Teaching Glides; Teaching Procedures IDENTIFIERS Harvard Project Physics ABSTRACT Teaching procedures of Project Physics Unit 6are presented to help teachers make effectiveuse of learning materials. Unit contents are discussed in connection withteaching aid lists, multi-media schedules, schedule blocks, andresource charts. Brief summaries are made for transparencies, 16mm films, and reader articles. Included is information about the backgroundand development of each unit chapter, procedures in demonstrations, apparatus operations, notes on the student handbook, andan explanation of film loops. Additional articlesare concerned with objects dated by radiocarbon, radiation safety, propertiesof radiations, radioactive sources, radioactivity determinationby electroscopes, and radiation detecting devices.Scalers, counters, Geiger tubes, and cadmium selenide photocellsare analyzed; and a bibliography of references is given, Solutionsto the study guide are provided in detail, and answers to test itemsare suggested. The sixth unit of the text, with marginal commentson each section, is also compiled in the manual. The work of Harvard ProjectPhysics has . been financially supported by: the Carnegie Corporation ofNew York, the Ford Foundation, the National Science Foundation,the Alfred P. Sloan Foundation, the United States office of Education,and Harvard University.
    [Show full text]
  • Kryptos: a 29 Year Old Mystery Alfie Baines* — 170180540 [email protected] School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall
    Kryptos: A 29 year old mystery Alfie Baines* | 170180540 [email protected] School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall 1. Aims 3. Frequency analysis 5. Index of coincidence 6. Transposition Cipher H I To automate a majority of the cryptanalysis that has already The index of coincidence (IC) is the I A transposition cipher takes the original been carried out on Kryptos probability that two randomly chosen letters text and creates an anagram of it based on a I To use computing to decipher the final section of Kryptos, known in a block of text are identical. We know regular system or algorithm. as K4 IC ≈ 0:067, and IC ≈ 0:0385 I By taking the text in the green section and english random reversing the order, you can use the following n 1 X key, 1526374, based on the word KRYPTOS, 2. Transcript of Kryptos ciphertext IC = F (F − 1) (3) N(N − 1) i i to decipher the message. i=1 EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJ I The key is obtained as follows: YQTQUXQBQVYUVLLTREVJYQTMKYRDMFD I N is the length of the text K T 1 5 R O 2 6 VFPJUDEEHZWETZYVGWHKKQETGFQJNCE I n is the length of the alphabet = = 1526374 Y S 3 7 I Fi is the frequency of the ith letter in the alphabet GGWHKK?DQMCPFQZDQMMIAGPFXHQRLG P 4 TIMVMZJANQLVKQEDAGDVFRPJUNGEUNA (When read horizontally) QZGZLECGYUXUEENJTBJLBQCRTBJDFHRR I The same method of using columns YIZETKZEMVDUFKSJHKFWHKUWQLSZFTI containing 4 letters and 3 letters is used in HHDDDUVH?DWKBFUFPWNTDFIYCUQZERE the rearrangement of the green section EVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDX during decryption. FLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKF I The similarity between generating a key, and FHQNTGPUAECNUVPDJMQCLQUMUNEDFQ deciphering the text leads to the belief that this may be the intended method of ELZZVRRGKFFVOEEXBDMVPNFQXEZLGRE decryption by the author.
    [Show full text]
  • THE CIA KRYPTOS SCULPTURE: a Summary of Previous Work and New Revelations in Working Toward Its Complete Solution By
    DOCID: 4145037 CONFIDENTIALHREL TO USA, FVEYH20320108 (U) THE CIA KRYPTOS SCULPTURE: A summary of previous work and new revelations in working toward its complete solution by PL 86-36/50 USC 3605 pprnved or Release v ~-~SA on 9-16-2014. OIA Case .. 65414 CO~:FUltJ;NTIALh'IU;L TO USA, FYEY//20320108 1 DOCID: 4145037 CONFIBENTIALHREL T0 USA, FYEYH26326168 (U//FOUO) Back in 1990, the Central Intelligence Agency's Fine Arts Commission canvassed Washington, DC, area artists, asking for proposals for costs and designs for a sculpture which would be erected in the CIA's new Courtyard outside its cafeteria. The winning sculptor was James Sanborn, and he created a nice little puzzle. It stands about 3 metres (10 feet) tall, and con­ sists of two curved copper plates standing side-by-side, forming an "S" shape if viewed from above. (U/IFOUC>) Before we look at the cipher on the sculpture, here's what James Sanborn had to say about his creation on November 3, 1990, the day it was dedicated: "The stonework at the entrance and in the courtyard served two functions. First, it creates a natural framework for the project as a whole, and is part of a landscaping scheme designed to recall the natural stone outcropping that existed on the site before the Agency, and that will endure, as do mountains. "Second, the tilted strata tell a story like pages of a document. Inserted between these stone pages is a flat copper sheet through which letters and symbols have been cut. This code, which includes certain ancient ciphers, begins as international morse, and increases in complexity as you move through the piece at the entrance and into the courtyard.
    [Show full text]
  • Raw Notes from Elonka Dunin and John Wilson
    Raw notes from Elonka Dunin and John Wilson: X & Q in K3 are/could be quote marks Miniature was missing the extra L, and Sanborn asked about an M when looking at it 2 people have the key to K4 - Jae (S.O.) and Muffin (friend) in Tucson, AZ Muffin has one of the COF's Sanborn says there are about 14 COF's Duck pond slabs were supposed to have Morse also, but he ran out of time The Morse code slabs continue under the rock, so the "T is your position" is actually "What is your position" Scheidt gave a talk to the Kryptos society @ NSA, and went over the math behind the codes of Kryptos Arabic COF was originally translated at an Arabic Language Facility in Falls Church, VA, but Sanborn later found out that they gave him some Islamic propaganda in the mix, so he had the translations checked by people he personally knew. PT on the Arabic was from CIA tradecraft Ed Scheidt already knew Whitfield Diffie Ed Scheidt is the ISO person doing the standardization of various crypto techniques for XML formats Sanborn expressed surprise that we didn't include the rotation of the pool in the 3D modeling Sanborn was harassed by CIA personnel during the CIA installation, saying his work was a "waste of money" Christie'isms: errors in various pulped art pieces Errors in CP were Sanborn'isms Christie was suspended above the pulped pieces in a sling in order to be able to reach the inner letters Gilbert Kinney (original purchaser of Untitled Kryptos Piece) currently lives in NY Sanborn has bunches of docs from the Library of Congress Current location of the large COF-english is in his studio.
    [Show full text]
  • Petrified Wood of Oklahoma: Lap- Lawrence, 455P
    2 Petrified Wood In Oklahoma Neil H. Suneson, Geologist IV, Oklahoma Geological Survey Adjunct Professor, ConocoPhillips School of Geology and Geophysics, University of Oklahoma [email protected] / 405.325.7315 Introduction world’s most baffling puzzles, the bane of professional cryp- tologists and amateur sleuths who have spent 15 years trying In the fossil world, petrified wood may be second only to solve it” (www.guardian.co.uk/world/2005/jun/11/dan- to dinosaurs in its fascination to humans, and “wood turned brown.books, acc. 2/27/10). Kryptos is referred to twice to stone” probably has the longer history of the two. In fact, on the dust jacket of the U.S. version of Dan Brown’s novel a fossil cycad was placed in the tomb of the Marzabotto “The Da Vinci Code” (http://en.wikipedia.org/wiki/kryptos, necropolis over 4000 years ago by the ancient Etruscans. It acc. 2/27/10). was accompanied by other funerary objects and thus must have had some special significance. Furthermore, it appears that the trunk of a fossil cycad may have been used by Ne- olithic people as a sharpening stone (Wieland, 1916) and thus may have “the longest known history of any fossil” (from www.plantapalm.com/vce/intro/historicalperspec- tive.htm, acc. 2/27/10). Around 1000 A.D. the Persian as- tronomer, chemist, mathematician, physicist, scientist, theologian, and philosopher Avicenna suggested “that or- ganic materials might be ‘turned into stone by a certain min- eralizing, petrifying power … and this transmutation of the bodies of animals and plants is just as short a step as the transmutation of waters.
    [Show full text]
  • Introduction to Cryptography - 1 CSC4601 F04 Overviewoverview
    IntroductionIntroduction toto CryptographyCryptography Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_04/ Louisiana State University 5- Introduction to Cryptography - 1 CSC4601 F04 OverviewOverview Definitions Secret keys Public keys Hash functions Louisiana State University 5- Introduction to Cryptography - 2 CSC4601 F04 CommunicationCommunication SecrecySecrecy The history of codes and ciphers is the story of centuries-old battle between codemakers and codebreakers Evolution of codes. Always under attack from codebreakers. Analogous to the situation of a strain of infectious bacteria under the attack of antibiotics Technologies involved from mathematics to linguistics, from information theory to quantum theory Louisiana State University 5- Introduction to Cryptography - 3 CSC4601 F04 TheThe EvolutionEvolution ofof SecretSecret WritingWriting In The histories, Herodotus, “the father of history”, chronicled the conflicts between Greece and Persia in the fifth century B.C. The art of secret writing saved the Greece Demaratus send information to Greece about Persian preparation using secret messages: scraping the wax off a pair of wooden folding tablets, writing on the wood underneath and then covering the message with wax again. Herodotus chronicled also the story of Histaiaeus who wanted to encaurage Aristagoras of Miletus to revolt against Persians To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to grow. It seems this period of history tolerated a certain lack of urgency. Hiding a message is known as steganography derived from the Greek word steganos meaning “covered” and graphein–“to write”.
    [Show full text]
  • Cracking the Courtyard Crypto
    00 ::._:ourtyard Crypto http://www .csi .cia!studies/vol43no I /ar15 .html APPROVED FOR J't'J' Unclassified RELEASE DATE: Tlte Puzzle at CIA 1/eadquarters Cracking the Courtyard Crypto (b)( 1 ) (b)(3) Editor's Note: In the late 1980s, under a GSA program, the CIA commissioned Washington artist James . Sanborn to create a series of sculptures for CIA's new Headquarters building. Working together with( i :. who was soon to retire from the Office of Communications, Sanborn created a sculpture named "Kr)iptos" (Greek for hidden) that was dedicated in 1990 and now resides in the northwest comer of the courtyard. The curving verdigris scroll contains an 865-character coded message that seems to flow out from a petrified tree and is located near a water-filled basin bordered by various types of stones. In t.he following article,( describes how he has deciphered most of the secret message contamed within the sculptun:. I looked down at the large number ofyellow pages littering the top ofmy desk, obscuring its dark oak finish. E'ach page was covered in hundreds ofalphabetic letters that, although they appeared to be arranged randomly, were really carefolly laid out in columns ofhidden order. For the past week or so, I had been feeling that I was very close to a solution--but was I? As a hobby, I had solved many puzzles since I was a child. and I had discovered that the most difficult challenge was continually dealing with the nagging fear that I may be on .the wrong track. The voice in my head would whisper, "Maybe you're mistaken--maybe this first part of the Kryptos code is really not a polyalphabetic Vigenere Tableau after all--maybe it's a different type ofcode entirely.
    [Show full text]
  • NSA Documents on Kryptos
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 66050B 17 June 2014 JOHN GREENEWALD THE BLACK VAULT Dear Mr. Greenewald: This further responds to your Freedom of Information Act (FOIA) request of 26 December 2011 for "a copy of each document at the National Security Agency concerning the famous KRYPTOS sculpture located on the grounds of the Central Intelligence Agency. Please review and release both documents that have already been made available as well as documents that have not yet been reviewed and/or released. I am particularly interested in documents regarding the as-yet undecrypted fourth message." A copy of your request is enclosed. Your request has been processed under the FOIA, and eight of the documents are enclosed. Certain information, however, has been deleted from the enclosures. Some of the information deleted from the documents has been found to be currently and properly classified in accordance with Executive Order 13526. The information meets the criteria for classification as set forth in Subparagraph (c) of Section 1. 4 and remains classified CONFIDENTIAL as provided in Section 1. 2 of Executive Order 13526. The information is classified because its disclosure could reasonably be expected to cause damage to the national security Because the information is currently and properly classified, it is exempt from disclosure pursuant to the first exemption of the FOIA (5 U.S.C. Section 552(b)(1)). In addition, this Agency is authorized by various statutes to protect certain information concerning its activities. We have determined that such information exists in these documents.
    [Show full text]
  • Attorney at Law Loyola Law School Graduate • 20 Years Experience
    IInside:nside: PProtectingrotecting tthehe aattorney-clientttorney-client pprivilegerivilege EEveryvery votevote mmattersatters EEnforcingnforcing mmediationediation LLawaw DayDay — MMayay 1 aagreementsgreements BBRBRBA BBenchench BBarar CConferenceonference jjULYULY 224-26,4-26, 22014014 GGRANDRAND HHOTELOTEL MMARRIOTTARRIOTT • PPOINTOINT CCLEAR,LEAR, AAlaBAMAlaBAMA • CConferenceonference HHighlightsighlights • FIRST-TIMER REGISTRATION PRICE IS $325 — DEADLINE: JUNE 20 n rregistere today! atio gist istr 12.5 HOURS OF CLE wwww.brba.orge•r eg : w to ar• r line On-site registration begins Thursday, July 24 at 10 a.m. w. day gul ead br ! rregulare t eregistration d 0 CLE seminars begin Thursday, July 24 at 2 p.m. ba. ratera deadlinene 3 : or JJuneu 30Golf tournament Saturday, July 26 • Auction to benefit the Baton Rouge Bar Foundation g • aattendingttending jjudgesudges • Judge Richard Anderson • Judge Carl Barbier • Judge James J. Brady • Judge Michael Caldwell Judge Paula Hartley Clayton • Judge Louis R. Daniel Judge Charlene Day • Judge Shelly D. Dick • Judge Michael Erwin Judge John Michael Guidry • Judge Toni Higginbotham • Judge Guy Holdridge Justice Jeff Hughes • Judge Brian A. Jackson • Judge Tim Kelley Judge William T. Kleinpeter • Judge Jessie LeBlanc • Judge William A. Morvant Judge Pamela Moses-Laramore • Judge Laura Prosser Judge Ralph E. Tureau • Judge Alex “Brick” Wall • Judge Jewel “Duke” Welch Judge Kirk Williams • Judge Lisa Woodruff-White • Judge Jay Zainey • CConferenceonference ssponsorsponsors • Adams and Reese, LLP • Babcock Partners, LLC • Brady Law Firm • Baker, Donelson, Bearman, Caldwell & Berkowitz PC Cazayoux & Ewing LLC • Chaffe McCall • Breazeale, Sachse & Wilson • Committee to Elect Hillar Moore Dampf, Thibaut & Hessburg, LLP • DeCuir, Clark & Adams, LLP • Delatte, Edwards & Marcantel FindLaw • Glusman, Broyles & Glusman • Dr. Michael J.
    [Show full text]
  • Cracking the Kryptos Code
    ####################################################################### # 5/5/2009 Cracking the Kryptos Code - KHOV.com (News 4) # # # # URL: http://www.thekryptosproject.com/media/video/ # # http://it.truveo.com/Cracking-the-Kryptos-Code/id/298443071 # # # # NR: News Reporter # # DZ: Diana Zoga # # ED: Elonka Dunin # # # # Transcribed by: Jew-Lee Irena Lann # # # # Please report any boo boo's to [email protected] # ####################################################################### 2:54 NR:...Decades in the making. There is a secret code, hidden in a piece of art, at CIA Headquarters. For years, no one has been able to crack it. News Force, Diana Zoga, spoke with one of the top experts on this mystery. A local video game developer, who isn't ready to back down yet. 2:38 DZ: It's tucked away at CIA Headquarters, in a courtyard, with no public access. A sculpture, titled Kryptos. Few have seen it in person, yet thousands are trying to decipher its message. 2:25 ED: The Central Intelligence Agency, the idea that there is an unsolved puzzle in middle of the CIA, also has a mystic about it. 2:17 DZ: The man behind the mystic is, artist, James Sanborn. He challenged the CIA to solve four codes, stamped into a ten-foot tall copper screen. Three have been cracked. But the last is a secret the artist refuses to give away. 2:02 ED: Sanborn uh..likes the idea that it hasn't been solved yet. H..he said that he actually wants to die knowing that it hasn't been solved. 1:55 DZ: Elonka Dunin, a video game developer, based in St. Charles, is one of the world's top experts on Kryptos.
    [Show full text]
  • Kryptos MATH3302 LECTURE, 2 APRIL 2019 RICHARD BEAN Background
    Kryptos MATH3302 LECTURE, 2 APRIL 2019 RICHARD BEAN Background ID360 “Cryptography” in 1995 An “interdisciplinary” subject Mathematics and Computer Science Cryptography links to many areas of mathematics and CS Number theory Combinatorics Statistics Information theory Cryptanalysis – linguistics and psychology also help The prehistory of the Kryptos sculpture Office of Strategic Services (OSS) founded 1942 after Pearl Harbor Central Intelligence Agency (CIA) founded 1947 after WW2 Original HQ built at Langley, Virginia in Nov 1959 – Mar 1961. Langley is a metonym for the CIA CIA Fine Arts Commission established in 1963 Purpose: “to advise the Director on esthetic matters relating to the Headquarters Building and grounds” New HQ built at Langley in May 1984 – Mar 1991 “George Bush Center for Intelligence” (DCI 1976-77, named 1999) Art selection for the new HQ General Services Administration “Art-in-Architecture” department chose artists for new building Criteria: “This art should reflect life in all its positive aspects (e.g. truth, justice, courage, liberty etc.) It should engender feelings of well-being, hope and promise and such.” March 1988 – James Sanborn selected for sculpture and Matt Mullican for interior design. $450,000 total contract. April 1988 – Mullican declines. “When I think CIA, I think guns … I think international trauma. I think participating at the CIA would somehow imply my support for it. Context creates meaning.” Sanborn “signed on immediately” saying “… something on this scale … transforms you financially.” $250,000 contract. Creation (1988) November 1988 – model presented ”a sculpture composed primarily of slabs of red granite, with verdigris copper plates (pierced by frequency code alphabet tables), lodestone, and petrified wood used as secondary materials.” “Four aesthetically united sculptural groupings that are sophisticated, intellectual, and of a simple, strong, successful scale.
    [Show full text]
  • FOIA CASE LOGS for the Central Intelligence Agency (CIA)
    Description of document: FOIA CASE LOGS for: The Central Intelligence Agency (CIA) for FY 2005 – FY 2007 Requested date: 21-October-2007 Released date: 19-February-2008 Posted date: 29-April-2008 Title of Document FY 2005, FY 2006, FY 2007 Case Log Date/date range of document: 01-October-2004 – 21-November-2007 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: (703) 613-3007 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file Central Intelligence Agency Washington, o.c. 20505 • FEB 19 lOW Reference: F-2008-00211 This is a final response to your 21 October 2007 Freedom ofInformation Act (FOIA) request for "FOIA Case Logs for CIA for the time period FY2005 and FY2006 and FY2007-to-date." We processed your request in accordance with the FOIA, 5 U.S.C. § 552, as amended, and the CIA Information Act, 50 U.S.c. § 431, as amended.
    [Show full text]