Cryptography

Cryptography

:?• \MEl)NIVER% vvltSANCElfj^j. ^^l-LIBRARYOc. -v^lllBRARY^ , , ^ ^ o <rii]ONvsoi^ %a3AINn3WV^ ^<!/OJI]V0JO^ "^.i/ojnvDjo A\\EUNIVER5'//- v^lOSANCElfj> >;,OfCAllF0%, ^OFCAllFOfi! o r-n <rii3DNVsoi^ "^jiaAiNn-awv ^<?Aav}ian-^^ ^^Aavaan-^^ -^ILIBRARYQc. A^lllBRARYOc ^\\E•UNIVER% v^lOSANGElfj ^OdllVDJO"^ ^OJIIVDJO"^ %130NVS01^ ^/5aaAiNn-3v; .^OFCALIF0%, .>;,OFCAIIF0/?^ ,^WE•UNIVERS•//, vvlOSANCElf. %a3AiNn]Vi AWEINIVERJ/a ^10SANCEI% ^^UIBRARYQ^ -v^lllBRARY<: % § ^^—.^ ^ %a3AlN^•3W^^ %0JnV3JO'^ ^tfOJITVDJC AV\EUNIVER% ^lOSANCElfj-^ ^OFCAIIFO;?^ >^;OFCALIF0/i' S ^ <r7iinNV<:m?4^ ^ zini izini i^-^i 1^^ >&Aava8ii^^ ^d^AHvaaiH^ "^-TiUDNVSOV^^ %a3AINn]WV^ AWEUNIVERS/a vS:lOSANCElfj> ^IIIBRARYQ^ ^ILIBRARYQa 3 o "^AaJAINH-l^W ^<!/0JnVDJO>' %oi\mi^'^ .\\M\imm/A ^lOSANCElfjv ^OFCAllFOff^ ^OFCALIFO^^ o :5 -—'> I' § <rji]QNvsoi^ %a3AiNn-3WV ^CAavaan-^^ v^UIBRARYQ. ^tllBRARY^^., ^\WEIJNIVER% ^lOSANCElfj> ^<!/ojnv3jor' ^<i/odiiv3jo>^ ^riijoNvsoi^ ^/^a3AiNn-3Wv ^OFCAIIFO/?^ ^OFCAIIFO% ,^'rtE•UNIVER5•//i vvlOSANCElfjV. <rjl30NVS01^ %a3AINn3WV AWEUNIVERi-ZA ^VOSANCElfj> ^v^lLIBRARYQ^ ^IIIBRARYQ^ CO < -< so "^aaAiNH-awv^ v^lOSANCElfx> ^OFCAIIFO/?^ ^OFCAllFOff^ O cm < >Uul O m .V5o I uwunn ^\Vy CRYPTOGRAPHY CRYPTOGRAPHY BY ANDRK LANGIE TRANSLATED FROM THE FRENCH BY J. C. H. MACBETH AUTHOR OF " IHI' MARCONI CORE," " MARCONI DICTIONARY," ETC. CONSTABLE ^ COMPANY LIMITED LONDON BOMBAY SYDNEY 1922 %. P. DUTTON AND COMPANt Printed in Great Britain PREFACE 1 HAVE no intention of writing a complete manual of cryptography. Finality, even very relative, is not attainable in the domain of this art. Besides, good manuals are in existence on this subject, and the titles of some of them will be found at the end of this volume. A cryptographer of considerable experience, however, can always add a few details even to the most complete works of this kind. My object in writing this book is simply to explain what cryptography is, and to recall what it has been from antiquity to the present day; in short, to relate my experiences as a decipherer. The first part of the volume contains a description of the principal systems of cryptography, together with a note on the role played by cryptography in history. In the second part I relate how I succeeded in decipher- ing a dozen cryptograms of various kinds. In some chapters of this section I give the texts just as they came into my hands; but in the majority -of cases, though preserving the system of cryptography actually employed, I have, on grounds of expediency, substituted an approxi- mate reading for the actual text, and have modified the plan, and even radical features of the narrative, in such a way as to render abortive any attempt at identification and localisation. 8789C7 VI PREFACE In the third part I give sorae advice in a general way on Hnes which have proved profitable to me, and, further, a certain number of tables and formulae; but while I recognise these to be very useful, too much reliance should not be placed on them, under penalty of striking the wrong track, as I shall have occasion to repeat farther on. In point of fact, as I have found by experience, in cryptography the exceptions are infinitely more frequent than the rule. TRANSLATOR'S PREFACE I have to acknowledge with grateful thanks the valuable assistance I have received in preparing this work from the late Mr. W. Jarvis, Lieut. -Commander W. W. Smith of Washington, U.S.A., Mr. Albert M. Smoot of the Ledoux Laboratories, New York, and Miss A. Wishavt of the Radio Corporation of America. It was not an easy task substituting English text for the examples of ciphers in French, and if there are any errors which have inadvertently escaped detection I humbly beg forgiveness. J. C. H. MACBETH. CONTENTS PART I I'Aiii; Dksciui'tiun ok the Fkincii'ai, Systems of Grypt- - OGKAl'HY, NVrrii niSlOUICAL NOTICE - I PART II Examples of Deciphering 47 PART III Lists and Tajiles 122 BiBLIOCRAPHY 158 PART IV The P[,ayfaih Ciphek System, etc. - - - 159 : ACKNOWLEDGMENT Our thanks are due to the following gentlemen in connection with translating the book from the original French, working out and substituting English " Examples " for the French ones, adding additional matter, and seeing the work through the Press Mr. J. C. H. Macbeth. The late Mr. W. J. Jarvis. Mr. H. G. Telling. Commander Smith, U.S.N. Paymaster- Commander J. E. A. Brown, C.B.E., R.N. THE MARCONI INTERNATIONAL CODE CO., LTD. Makconi House, Strand, London, W.C. 2. 'Ibtli July, 1922. CRYPTOGRAPHY PART T DESCRIPTION OF THE PRINCIPAL SYSTEMS OF CRYPTOGRAPHY, WITH HISTORICAL NOTICE^ I. Everyone has, at some time or other, used crypto- graphy,^ or secret ciphers. Who has not had occasion to make some note, or to correspond with somebody, by dotting letters in a news- paper or book ? Even children amuse themselves in this way on their school desks. But a pen or pencil is not necessarily required to make use of a secret language. More than one of us, in our young days, have been embarrassed by a question from the schoolmaster. We have been required to give a proper name in answer, but it is precisely this proper name which has slipped our memory. So we have glanced at a comrade with whom we had previously come to an understanding. And the latter passes a finger over his /lair, his ear, his ^ips, his ear, and his none, whereby we understand " Helen." We have thus corresponded by means of mimetic cryptography. What is cryptography, after all ? Cryptography is the art of recording one's thoughts in such a way as to ^ This Part I. appeared in the BibliofMque uvwerseUe et revue Suisse in August, September, and October, 1917. - From the Greek words Kpi'irTns^ secret; and yf>ii(f)(ii'. to write. 1 : 2 CKYPTOGEAPHY make them unreadable to others. Particularly, more- over, it enables two persons to correspond under cover of complete secrecy—^at least in theory. A man will perhaps invent, on his own account, a system of writing by means of which he can write and preserve secrets which he prefers not to divulge, while ensuring the possibility of reading them again at any time. The great thinker, Alexandre Vinet, composed a system of cryptography which w^as as simple as he was noble- minded. He used it to note in his diary his qualms and trials. The phrases he wrote in this way can be read almost at a glance. The celebrated Swiss physiognomist, Jean-Gaspard Lavater, in his Diary of a Self-Ohserver, constructed several systems of secret writing to preserve his private reminiscences. These passages, which are omitted from the new French translation, are far more difficult to read than those of Vinet. Eight years after his death his countrymen had not succeeded in deciphering them all. Some years ago I was asked by a friend, a professor at a university in German Switzerland, to decipher a piece of yellow paper, covered with strange characters, found among the records of a Swiss politician, a contemporary of Napoleon I., and which was supposed to have some historical importance. Here is a specimen, a part of the first line and one word of the sixth PEINCIPAL SYSTEMS OF CRYPTOGRAPHY 3 My friend had consulted his colleagues : one had declared it was not Sanscrit, another that it was not Ethiopic, and still others that it was neither Slavonic nor Runic. These professors spoke truly, for it was French ! This system was one of the easiest to decipher. There were some 800 signs in the text. One of the signs, the second in the above example, and the most frequent, occurred something over ninety times, while another, the fourth, occurred seventy times. Now it is well known that in English, French, German, and most languages of Western Europe, the most fre- quently occurring letter is e; the letter which follows is, in French, n or s, according to the writer; in German, n; in English, t; in Italian, i; and in Spanish, a. In Russian the most frequently occurring letter is o, but i if the language is written in Roman characters. In Polish the most frequent consonant is z; not uncommonly three may be found in llie same word. In Arabic and Turkish the letter |, elij, corresponding to the French stopped or silent h, occurs oftenc^st. In Chinese —at least, in the newspapers—the characters found in order of frequency are ;5l {chi, of, genitive), 4^ (puli, not, negative), and X i^^ong, work). To ascertain which letters occur oftenest in any language, one must " calculate fre- quencies." The next thing to do is to study which letters most commonly adjoin. They are es in French and en in German. The most frequent groups of three are ent in French, the. in English, ein in German, che in Italian, etc. Bulky works have been written on this subject containing long lists, more or less complete, of the various articula- tions and disarticulations of words. Of course, this requires an enormous amount of labour, involving a 4 CEYPTOGKAPHY statistical study of texts containing many thousands of letters. To revert to our example, I encountered a difficulty at the first onset. The sign which came second in order of frequency, and which I supposed^ should represent either n or s, caused me some embarrassment. At last I abandoned the books I had been using, and began a new calculation of the frequency of letters in certain authors and French newspapers. In the letters of Voltaire I noted that the letter u occupied the second place in point of numbers, this being obviously due to the fact that the words 7ious and vous (" we " and " you ") are common in the epistolary and conversational style. In the sixth line of the document, a group of signs offered the peculiarity of conjoining twice in succession the two most frequent characters, the supposed e and the supposed 7i, separated by another sign and followed by one occurring rather rarely.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    208 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us