Solving Cipher Secrets

Total Page:16

File Type:pdf, Size:1020Kb

Solving Cipher Secrets SOLVING CIPHER SECRETS Edited by M. E. Ohaver "A CARRIER PIGEON FELL EXHAUSTED AT THEIR FEET." WHAT MESSAGE DOES IT BEAR. IN JULES VERNE'S IMMORTAL STORY? ILLE, n. A system of bars, posedly impossible, or at least materially especially of wrought iron, retarded. forming an open work bar• Thus the use of a grille, for instance, at rier, large or small, as a a window, or in preparing a cryptogram, is high fence inclosing a pub• for the purpose of preventing surreptitious lic building or across a pas• access to whatever lies beyond. And in this sageway, or the grating of a window. sense Webster's definition is as nicely suited {Webster.) to cryptography as to the intended meaning, This is the generally accepted meaning of since the grille is an open work barrier in the word grille. But to the cryptographer both cases. it takes on an added significance in that it Of grille ciphers there are many. The has been found convenient, because of a cer• invention of the original grille is attributed tain resemblance, to use the same term in to Jerome Cardan, the celebrated Italian designating the apparatus used in accom• physician and mathematician of the six• plishing certain types of ciphers. teenth century. And the simple grille de• The grille of cryptography, also com• scribed in this author's works will be treat• monly called a lattice or grating, is made ed in some detail in a later article. from any suitable flat material, as metallic An ingenious cipher derived from the plate, parchment, cardboard, or even paper, grille is said to have been used by the Ger• pierced with openings. mans during the World War. But probably The process of enciphering with a grille the most famous of the true grilles, and the varies with different types. But in every subject of this article, is that perfected in well known cipher of this kind the signifi• 1881 by Eduard B. Fleissner von Wostro- cant letters of the message are written witz, Austrian colonel, and author of a work through the openings or interstices of the on ciphers entitled, " Handhiic'i der Kryp- grille, the letters, letter groups, or words, tograpltie," published at Wien in the same thus being broken up from their original year. arrangement. Fictionists have had their fling at grille The key to a grille cipher is the disposi• ciphers. Honore de Balzac used a form of tion or arrangement of these openings, with• the original grille in 1881 in his " Histoire out knowledge of which any unauthorized des Trieze "—The Thirteen. Foe mentions reading of an enciphered message is sup• it. And to Jules Verne's story, " Mathais 634 FLYNN'S Sandorf," first published in 1885, the world To begin, then, this cipher is of the trans• is indebted for an example of Fleissner's position class, the letters retaining their grille. original values, being changed only in their Verne was the author of numerous tales of relative order. This transposition is ef• extravagant voyage and adventure. This fected by means of the grille, which, in its author's was the peculiar genius of inter• most usual form, operates upon a square weaving scientific fact with fiction, yet with of letters consisting of an even number a skill that lent his narratives all the plausi• of rows and columns. bility of truth. This even number may be 2, 4, 6, 8, 10, And Verne, too, was one of the first writ• or any other even number whatsoever. ers to realize the value of ciphers in fiction. Suppose for illustrative purposes a square Solving Cipher Secrets for June 6 has al• of 6 rows and columns, having a capacity ready dealt with his use of the Gronsfeld of (6x6=) 36 letters, be selected. cipher; and this exposition will similarly The preparation of the grille consists of include his use of the Fleissner grille in determining the locations of its openings, " Mathais Sandorf." the arrangement used being the key to the This story differs, however, from the ac• cipher. To do this it is first required to customed Verne yarn. It tells no tale of a divide the square into four equal smaller mechanical monster of the skies or of the squares, as indicated in the subjoined dia• deep. Nor yet of a delving into the bowels gram by the Roman numerals I, II, III, of the earth, or of an interplanetary flight and IV, and then to number the cells or through space. spaces of each of these four squares in an A more usual narrative, this, being merely exactly similar manner, also shown in the the relation of a series of adventures, strung drawing. on the thread of governmental intrigue. The story opens on the eighteenth day of May, 1867, which finds two penniless ad• I venturers wandering aimlessly about 1 Z I-* Trieste, the capital city of Illyria. 3 In due course they ascend the slopes of 4 the Karst hills, and find themselves eventu• ally in an inclosure, formerly a cemetery. 8 6N Here an exhausted carrier pigeon falls al• 7 9 most at their feet. Concealed under its NO ON 9 wing they discover a cipher message, of I which one of them, scenting conspiracy, CO makes an exact copy. 9 They now revive the bird, and, climbing sH into a high church tower overlooking the Z T city, they release it and, watching the course of its flight, are fortunately able to observe its destination. m One of the adventurers now obtains em• In a grille of this size there are nine ployment at this place, obtains the key by numbers in each of these four smaller stealth, and deciphers the cryptogram. squares. Upon which hinges the remainder of the In grilles constructed on squares of 8, 10, story. or 12, there would be 16, 25, or 36 numbers, The cipher, as it happens, is Fleissner's; respectively; and so on. and the key is one of the innumerable forms Now, for reasons that will soon be obvi• of the grille possible with this cipher. In ous, the number of apertures or windows order to make this more understandable in any grille of the type being described some knowledge of the structure and use of is always the same as the number of cells this cipher is necessary. in each of the four subdivisions of the larger SOLVING CIPHER SECRETS 635 square. In other words the number of French. Besides, Verne took the additional openings is equal to one-fourth of the num• but unavailing precaution, which we will ber of cells in the entire square. not, of writing his message backward before In the present instance, then, there must enciphering it. Here is Verne's message in be g openings. And having determined English: their number, it is now required to decide ALL IS READY. AT THE FIRST SIG• on their locations. NAL TH.Vr YOU SEND TO US FROM This may be done by selecting any de• TRIESTE. EVERY ONE WILL RISE TO- sired numbers in any of the squares, with r.F:THER FOR THE INDEPENDENCE OF the single restriction that each number he HUNGARY. used once, but once only. To encipher this message, place the grille Suppose that it is decided to use cells upon a piece of paper, with the marked edge 2, and g in square I: cells /, 5, and 7 in on the upper side.and at the top. It is con• square II; j, 4, and B, in square HI; and 6 venient to use paper ruled in squares of the in square IV; all of the numbers thus being same size as the subdivisions of the grille. used, but each one only once. This key, But this is not absolutely necessary, as the more conveniently expressed, could be space occupied by the grille may be out• written: lined on the paper with a pencil mark. 1: 2-Q. Now, taking the letters of the message II: 1-5-7. in their regular order, write the first letters HI: 5-4-8. IV: 6. through the openings of the grille, placing but one letter in each opening, and using If openings be now cut or punched in each opening once. In doing this the lines any desired flat material in accordance with of the grille must be taken in their order this key, indicating the front and top of the from top to bottom, and any openings in apparatus by some distinguishing mark, as the same line must be used in their order an A', or the word TOP, the completed grille from left to right. will appear as shown in the accompanying In the present case the first nine letters illustration. of the message, A-L-L-l-S-R-E-A-D, will, upon removal of the grille, be found written TOP on the paper in the following order: 0 0 0 0 A Z zT 0 / 0 0 S 0 /? £ 0 A Incidentally, you may be interested to D know that the grille just constructed is iden• tical with that used by \'erne in his story. Now give the grille one-quarter of a com• The grille prepared, next let us proceed plete turn in a clockwise direction, so that to the manner of using it. And to demon• the marked edge will be at the right. Then, strate this phase of the cipher since we have placing it upon the same space of the paper, used Verne's grille, nothing could be more write the second group of nine letters, fitting than also to use that author's mes• Y-A-T-T-H-E-F-I-R.
Recommended publications
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • The Solving of a Fleissner Grille During an Exercise by the Royal Netherlands Army in 1913
    The Solving of a Fleissner Grille during an Exercise by the Royal Netherlands Army in 1913 Karl de Leeuw University of Amsterdam / Informatics Institute Science Park 904, 1098 XH Amsterdam [email protected] Abstract Initially the grille was intended for hiding that a secret message was being sent at all, rather than In 1885 the General Staff of the Royal as a means of encryption. This all changed dur- Netherlands Army had adopted a variant ing the course of the 18th century, when the grille of the turning grille devised by Edouard was increasingly used for jumbling the characters Fleissner von Wostrowitz as a means for in a message by rotating them, according to the encrypting messages, exchanged by tele- holes in the mask. The first description of such graph between the General Headquarters use we find by the German mathematician Carl and commanders in the field. Some staff Friedrich von Hindenburg (1796) who was aware members harbored serious doubts about that such use could only be made at the expense the security of this device, however, and of a loss in entropy and, therefore, cryptographic during a military exercise in 1913 it was strength. The perforation pattern in one quadrant solved with surprising ease by an army of the mask would automatically limit the possi- captain. The matter was investigated by bilities for perforation in all others, because two a committee of staff officers, concluding punch holes could not be allowed to cover the that the army lacked the expertise to judge same position after a rotation.
    [Show full text]
  • Transposition Cipher in Cryptography, a Transposition Cipher Is a Method of Encryption by Which the Positions Held by Units of P
    Transposition cipher In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt. Following are some implementations. Contents • 1 Rail Fence cipher • 2 Route cipher • 3 Columnar transposition • 4 Double transposition • 5 Myszkowski transposition • 6 Disrupted transposition • 7 Grilles • 8 Detection and cryptanalysis • 9 Combinations • 10 Fractionation Rail Fence cipher The Rail Fence cipher is a form of transposition cipher that gets its name from the way in which it is encoded. In the rail fence cipher, the plaintext is written downwards on successive "rails" of an imaginary fence, then moving up when we get to the bottom. The message is then read off in rows. For example, using three "rails" and a message of 'WE ARE DISCOVERED. FLEE AT ONCE', the cipherer writes out: W . E . C . R . L . T . E . E . R . D . S . O . E . E . F . E . A . O . C . A . I . V . D . E . N . Then reads off: WECRL TEERD SOEEF EAOCA IVDEN (The cipherer has broken this ciphertext up into blocks of five to help avoid errors.) Route cipher In a route cipher, the plaintext is first written out in a grid of given dimensions, then read off in a pattern given in the key.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Nomenclators Nomenclator Example Alberti's Cipher Disk
    Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution cipher with homophones Nomenclator Example Nomenclator used by Mary, Queen of Scots . in 1586 in the plot against Elizabeth I Taken from Simon Singh. The Code Book. Alberti’s Cipher Disk Invented by Leon Battista Alberti in 1460s. outer disk (fixed) plaintext inner disk (moving) ciphertext Agree on index letter on inner disk. Key: letter corresponding to index letter on outer disk. Key can change during encryption 1 Cipher Disk Examples Let’s choose “K” as index letter. Examples: rRVTZOK aKVtTRCK HKmZMEP Since the key can change, this cipher is no longer monoalphabetic, but polyalphabetic. Are there other ways to use the cipher disk? Johannes Trithemius 1462-1516, Germany Polygraphiae, 1518 First printed book on cryptography. • Ave Maria Cipher • Polyalphabetic substitution • Progressive key Steganographia, 1606 • hidden writing http://diglib.hab.de/drucke/12-3-rhet-2f/start.htm Polygraphiae I The Polygraphiae contains many pages of code. 2 Polygraphiae II: Ave Maria 1st and 2nd page Steganographia http://books.google.com/books?id=bQdC AAAAcAAJ&dq=Trithemius%20Stegano graphia&pg=PR6#v=onepage&q&f=false Polygraphiae III Tabula recta, from the 6th book of the Polygraphiae. • Polyalphabetic substitution • Progressive key The history of information security: a comprehensive handbook, de Leeuw, Bergstra 3 Polygraphiae IV Examples (starting with first alphabet) • Johannes • SUGKESUOWSUN The history of information security: a comprehensive handbook, de Leeuw, Bergstra Modern Tabula Recta More Examples (not from beginning) • XNNN • NUGUV http://commons.wikimedia.org/wiki/File:Vigenere-square.png Giovan Batista Belaso La cifra del.
    [Show full text]
  • Encoding with the Rail Fence Cipher
    More Fun with Ciphers! October 8th, 2015 Encoding with the Rail Fence Cipher 1. Encode the phrase WE NEED YOUR HELP using the Rail Fence cipher. (a) First, make an outline of the zig-zag pattern for the number of letters that are in your message. (WE NEED YOUR HELP has 14 letters.) _ _ _ _ _ _ _ _ _ _ _ _ _ _ i. Arrange the letters of the message on the zig-zag pattern: W E U L E E D O R E P N Y H ii. Then, the encoded phrase is written out left-to-right, top-to-bottom. This time, we have also divided the message into three “words” (each word has letters written on one of the lines above) . WEUL EEDOREP NYH (b) Use the Rail Fence cipher to encode the message I WILL BE THERE SOON _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ What will the encoded text read? 1 Decoding Rail Fence Cipher 1. Decode the following message: BRRT EAEFOOS WOB Since the message is divided into 3 “words” (corresponding to the first, second and third row), you can simply read off the message as follows: (a) Write down the first letters of each of the three words (first, second, third): BEW (b) Then, write down the second letters of each of the three words (second, first, third) (watch out for the order of the words!!!): BEW ... (c) Continue writing the next letters going back and forth from 1st word, to 2nd, to 3rd, to 2nd, to 1st, to 2nd, to 3rd, etc.
    [Show full text]
  • Codebreakers
    1 Some of the things you will learn in THE CODEBREAKERS • How secret Japanese messages were decoded in Washington hours before Pearl Harbor. • How German codebreakers helped usher in the Russian Revolution. • How John F. Kennedy escaped capture in the Pacific because the Japanese failed to solve a simple cipher. • How codebreaking determined a presidential election, convicted an underworld syndicate head, won the battle of Midway, led to cruel Allied defeats in North Africa, and broke up a vast Nazi spy ring. • How one American became the world's most famous codebreaker, and another became the world's greatest. • How codes and codebreakers operate today within the secret agencies of the U.S. and Russia. • And incredibly much more. "For many evenings of gripping reading, no better choice can be made than this book." —Christian Science Monitor THE Codebreakers The Story of Secret Writing By DAVID KAHN (abridged by the author) A SIGNET BOOK from NEW AMERICAN LIBRARV TIMES MIRROR Copyright © 1967, 1973 by David Kahn All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from the publisher. For information address The Macmillan Company, 866 Third Avenue, New York, New York 10022. Library of Congress Catalog Card Number: 63-16109 Crown copyright is acknowledged for the following illustrations from Great Britain's Public Record Office: S.P. 53/18, no. 55, the Phelippes forgery, and P.R.O. 31/11/11, the Bergenroth reconstruction.
    [Show full text]
  • A Anhang: Perfekte Sicherheit Und Praktische Sicherheit
    A Anhang: Perfekte Sicherheit und praktische Sicherheit "The logic of secrecy was the mirror-image of the logic of information" Colin Burke, 1994 Perfekte Sicherheit wurde seit jeher gerne von den Erfindern von Chiffriersy­ stemen, im besonderen von Chiffriermaschinen, versprochen (Bazeries: je suis indechiffrable, 2.1.1 Abb. 19). Jedoch gab erst 1949 Claude E. Shannon eine saubere Definition davon, was mit perfekter Sicherheit gemeint sei; er gab sie im allgemeinen Rahmen seiner Informationstheorie. 1 Da der wahrschein­ lichkeitstheoretische Apparat, den sie benutzt, auBerhalb des Rahmens dieses Buches liegt, geben wir nur eine verkiirzte, dafiir aber axiomatische Ubersicht. A.I Axiome einer axiomatischen Informationstheorie Man geht zweckmaBigerweise aus von der Unsicherheit (engl. uncertainty, equivocation) iiber eine Menge X von Ereignissen, der "Entropie" von X - eine reelle Zahl . Auch Y und Z seien Mengen von Ereignissen. Hy(X) bezeichne die Unsicherheit iiber X, falls Y bekannt ist. A.I.1 Intuitiv einleuchtende Axiome fUr die zweistellige Mengenfunktion H sind: (0) 0::; Hy(X) ("Unsicherheit ist nichtnegativ") Fiir 0 = Hy(X) sagen wir "Y bestimmt eindeutig X." (1) Hyuz(X) ::;Hz(X) ("Unsicherheit nimmtnicht zu, wennmehr bekannt") Fiir Hyuz(X)=Hz(X) sagen wir "Y sagt nichts aus iiber X." Von entscheidender Bedeutung ist das Axiom (2) Hz(X U Y) = Hyuz(X) + Hz(Y) . ("Unsicherheit kann additiv iiber der Vereinigung von Ereignissen aufgebaut werden"). 1 Shannon hatte friihzeitig Beriihrung mit der Kryptanalysej er arbeitete 1936-1938 im Team von Vannevar Bush, der den COMPARATOR zur Bestimmung der Zeichen­ Koinzidenz entwickelte. Seine bis 1940 zuriickreichende Arbeit in den Bell Laboratories (vgl. 16.5) fiihrte zu einem vertraulichen Bericht (A Mathematical Theory of Communi­ cation) vom 1.
    [Show full text]
  • Basic Cryptologic Glossary
    REF ID:A64719 CONFIDEN't'IAL i\lodi6ed Ila11dli1rg /1atl101i2.ed 0 0 DO DO ODO DOD BASIC CRYPTOLOGIC GLOSSARY t I BBB NATIONAL SECU-RITY AGENCY Washington 25, D. C. 000-----------------------000 DOD ODO CONFIDENTIAL tleftifiefl Iland:ling ltttthot izcd Declassified and approved for release by NSA on 01-09-2014 pursuant to E. 0. 1352B '\ .,. ... I .,.,L.r <JONCUnJ:i:bN~ ·'·'· ,_Jj.,_ )1 o;ff. iH I 'I I -- ---·---· ------ I NAME OR TITLE INITIALS CIRCULATE ~. ...,_ F. r......:...1. ORGANIZATION AND LOCATION DATE COORDINATION 2 FILE INFORMATION 3 NECESSARY ACTION NOTE AND RETURN 4 SEE ME SIGNATURE REMARKS "-- _..,• ~ 41e ..... ~ .._....- -........ ~ ¥· ...... JlllCc. • .- ~ ..!., &. • ,,... e;r{..... ,,J.. .. • ~ ~(I- ~·• ·~:) I ... ""nlll .. s cc...: -a--- ~"" ~ ~.... """::>" .... ~ 9L ~ .. I; ..4:) A. ,,. -~ -:> ~ •- :x-: a,. .::l ..... - """$• c.. ..... .. c.ks -I .......l.•• ~ •-<,_a..,.,.. '"""" ..:_ ~ .. £.:.1 J- ::ail. • etr..-- f-!-A. ..:z:: ~. FROM NAllE OR TITLE .. DATE {/4?:.• .L- 2.,. ~ ~1 ORGANIZATION AND LOCATION TELEPHONE "'"l FORM 95 Replaoes ElA AGO Ferm 39!i, 1Apr4Q, and AFHQ 16-48467·4 GPO "k DD 1 FEB 511 Form 12, 10 Nov 47, which meiy be used. REF ID:A64719 - ------------ e6NFIBEN'fIAL Hedified Handling Aathodzed NATIONAL SECURITY AGENCY Washington 25, D. C. Basic Cryptologic Glossary Office of Training i 7 October 1955 REF ID:A64719 Cf>NFIBEN'f IAL 27 June 1955 LEITER OF PROMULGATION The wide field of activity of modern cryptology, together with the unusual nature of its highly technical operations, has given rise to a diverse and uncoordinated terminology. Certain terms, through long usage, have become more or less standard and generally acceptable while other terms hold different meanings in different areas.
    [Show full text]
  • Solving Classical Ciphers with Cryptool 2
    Solving Classical Ciphers with CrypTool 2 Nils Kopal Applied Information Security – University of Kassel Pfannkuchstr. 1, 34121 Kassel, Germany [email protected] Abstract torians. In such cases, cryptanalysts and image- processing experts are needed to support decipher- The difficulty of solving classical ciphers ing the books, thus, enabling the historians to con- varies between very easy and very hard. tinue their research. For example, monoalphabetic substitution The ciphers used in historical books (from ciphers can be solved easily by hand. the early antiquity over the Middle Ages to the More complex ciphers like the polyalpha- early modern times) include simple monoalpha- betic Vigenere` cipher, are harder to solve betic substitution and transposition ciphers, code- and the solution by hand takes much more books and homophone ciphers. time. Machine ciphers like the Enigma With the open-source tool CrypTool 2 (CT2) rotor machine, are nearly impossible to (Kopal et al., 2014) historians and cryptanalysts be solved only by hand. To support have a powerful tool for the analysis as well as researchers, cryptanalysts, and historians for the (automatic) decryption of encrypted texts. analyzing ciphers, the open-source soft- Throughout this paper, we present how CT2 can ware CrypTool 2 (CT2) was implemented. be used to actually break real world ciphertexts. It contains a broad set of tools and meth- The following parts of this paper are structured ods to automate the cryptanalysis of dif- as follows: The next section gives a short introduc- ferent (classical and modern) ciphers. In tion to classical ciphers, as well as an overview of this paper, we present a step-by-step ap- cryptanalysis.
    [Show full text]
  • Anatomy of Failure
    An Anatomy of Failure: Investigating the Reasons behind Failed Attempts to Decrypt the Voynich Manuscript through an Examination of the Decipherment of Linear B and of the Partial Decryption of Kryptos By Adam Lewis Page 1! of 43! Acknowledgements: Many thanks to George Erving, Tony Mullen, Adam Smith, Ti Allshouse, my friends in the Honors program, Sara, Deanne, and countless others without whom I couldn’t have gotten this far. Page 2! of 43! Table of Contents Table of Contents………………………………………………………………………3 I. Abstract………………………………………………………………………………4 II. Introduction…………………………………………………………………………5 1. What is the Voynich Manuscript?……………………………………………5 III. Features of the Voynich Manuscript…………..……………………………………5 IV. Other Codes…………………………………………………………………………8 1. The Decipherment of Linear B………………………………………………8 2. Kryptos………………………………………………………………………13 V. Investigations of the Manuscript……………………………………………………18 1. The Hoax Hypothesis………………………..………………………………18 2. An Amateur Attempt…………………………………………………………23 VI. Conclusion………………………………………………….………………………25 VII. Bibliography………………………………………………………………………27 VIII. End Notes…………………………………………………………………………29 Page 3! of 43! Abstract The Voynich Manuscript is a medieval manuscript whose creation dates back to the 15th century. The manuscript is written in an unknown script, and since its discovery there have been no successful attempts to decrypt it. This paper notes the peculiarities of the Voynich Manuscript and compares it cryptographically with Linear B and the CIA’s Kryptos monument. This paper examines the decipherment of Linear B and the partial decryption of the CIA’s Kryptos monument in order to discern what elements made those decryptions successful. There is not a large enough corpus of “Voynichese” text to perform any significant breakthroughs in translation, and there is evidence supporting the hypothesis that the Manuscript may be a hoax with no actual meaning contained within.
    [Show full text]
  • Baconian-Rosicrucian Ciphers
    Baconian-Rosicrucian Ciphers An introduction to the cryptography used by Francis Bacon and the Rosicrucian-Freemasonic fraternity. Author: Peter Dawkins Cipher was extremely important to Francis Bacon. Not only did he regard mathematics (i.e. number and geometry) as a vitally important and metaphysical science, and one of the essential forms of things,1 but he also considered that Allusive or Parabolical Poesie, using fables, parables and symbolism, was “a sacred and venerable thing, especially seeing Religion itself hath allowed it a work of that nature, and by it traffics divine commodities with men,” and in addition was essential to veil the secrets and mysteries of religion, policy and philosophy from eyes unfit or unready to see them.2 Like the Platonists and Kabbalists before him, Bacon saw nature, and the underlying ‘forms’ of nature (i.e. their geometry, proportion, numerology and signature), as symbols of spiritual truths. Francis Bacon made use of several different kinds and types of cipher, some of them to sign various published works issued outwardly under different names or pseudonyms, some of them to give signposts, messages or teachings, some of them to provide geometric constructions (such as a Masonic square and compasses signature or a compass rose providing map directions), and some of them being a method by means of which to analyse and raise consciousness, and ultimately to know the metaphysical laws and intelligencies of the universe. Francis himself was a secretive person both by choice and by necessity. He learnt the use of ciphers early in his youth, first of all from his mother, Lady Ann Bacon, who used cipher in her literary works as well as letters, and later when he was employed by Lord Burghley and Sir Francis Walsingham on intelligence matters both at home and abroad.
    [Show full text]