Crypto 2
Crypto 2
BY LANAKI
September 27, 1995
LECTURE 1
SIMPLE SUBSTITUTION
INTRODUCTION
SIMPLE SUBSTITUTION
In some cases, step (2) may proceed step (1). This is the
classical approach to cryptanalysis. It may be further reduced
to:
(1) Frequencies
(2) Spacing
(3) Letter combinations
(4) Repetitions
EYEBALL
1 2 3 4 5
F Y V Y Z X Y V E F I T A M G V U X V Z E F A
5 6 7 8 9
I T A M F Y Q F M V Q D V E J D D A J T U V U
10 11 12 13
R O H O E F V D O. * Q G R V D F * E S Y M V Z F P V D
ANALYSIS OF A-1.
Note words 1 and 6 could be: ' The....That' and words 3 and 5
use the same 4 letters I T A M . Note that there is a
flow to this cryptogram The _ _ is? _ _ and? _ _. Titles
either help or should be ignored as red herrings. Elevated
might mean "high" and the thinker could be the proper
person. We also could attack this cipher using pattern
words (lists of words with repeated letters put into
thesaurus form and referenced by pattern and word length) for
words 2, 3, 6, 9, and 11.
5 6 7 8 9
t h a t e a e e
I T A M F Y Q F M V Q D V E J D D A J T U V U
10 11 12 13
t e a e t h e t e
R O H O E F V D O. * Q G R V D F * E S Y M V Z F P V D
Not bad for a start. We find the ending e_t might be 'est'.
A two letter word starting with t_ is 'to'. Word 8 is 'are'.
So we add this part of the puzzle. Note how each wedge leads
to the next wedge. Always look for confirmation that your
assumptions are correct. Have an eraser ready to start back
a step if necessary. Keep a tally on which letters have
been placed correctly. Those that are unconfirmed guesses,
signify with ? Piece by piece, we build on the opening wedge.
1 2 3 4 5
t h e h h e s t o e e s t o
F Y V Y Z X Y V E F I T A M G V U X V Z E F A
5 6 7 8 9
o t h a t e a r e s r r o e
I T A M F Y Q F M V Q D V E J D D A J T U V U
10 11 12 13
s t e r a e r t s h e t e r
R O H O E F V D O. * Q G R V D F * E S Y M V Z F P V D
1 2 3 4 5
t h e h i g h e s t n o w l e d g e i s t o
F Y V Y Z X Y V E F I T A M G V U X V Z E F A
5 6 7 8 9
n o w t h a t w e a r e s u r r o u n d e d
I T A M F Y Q F M V Q D V E J D D A J T U V U
10 11 12 13
s t e r a l b e r t s c h w e i t z e r
R O H O E F V D O. * Q G R V D F * E S Y M V Z F P V D
KEYING CONVENTIONS
4 2 5 1 3
M E T A L
=============
D E M O C
R A T B F
G H I J K
L N P Q S
U V W X Y
Z
PT a b c d e f g h i j k l m n o p q r s t u v w x y z
CT Q R S U V W X Y Z L I G H T A B C D E F J K M N O P
----------
KW = LIGHT
13 9 8 8 7 7 7 6 6 4 4 3 3 3 3 2 2 2 1 1 1 - - - - -
E T A O N I R S H L D C U P F M W Y B G V K Q X J Z
6 Vowels: A E I O U Y = 40 %
20 Consonants:
5 High Frequency (D N R S T) = 35 %
10 Medium Frequency (B C F G H L M P V W) = 24 %
5 Low Frequency (J K Q X Z) = 1 %
====
100.%
Letters-- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Initial-- 9 6 6 5 2 4 2 3 3 1 1 2 4 2 10 2 - 4 5 17 2 - 7 - 3 -
Final -- 1 - 1017 6 4 2 - - 1 6 1 9 4 1 - 8 9 11 1 - 1 - 8 -
Table 1.1
Probability Of Occurrence of 26 Letters
Groups
1. E, having a probability of about 0.127
Top digraphs:
TH: 17783 RE: 8139 ED: 6217 IS: 5566
HE: 17226 ND: 7793 AT: 6200 NG: 5564
IN: 10783 HA: 6611 EN: 5849 IT: 5559
ER: 10172 ON: 6464 HI: 5730 OR: 4915
AN: 9974 OU: 6418 TO: 5703 AS: 4836
V W H A Z S J X I H S K I M F M W C G M V W O J S I F -
A G F J A Q Q M N R J K Z M G R S W M F. J A T W X H -
A W F. F I Q Q W F F X I H F K H B A O Z J S M A H H F.
T G A H P K D X M A W O V F S A R F X H K I M A F S.
[ Hyphens mean a continuation of a word.]
F A H M W S I J K X G Q O R V Z T B C D N P
13 11 9 9 8 7 6 6 5 5 4 4 3 3 3 3 2 1 1 1 1 1
The Vowel Selection Method is: 1) separate the vowels from the
consonants, 2) assign vowel identities, 3) assign identities to
consonants.
A-2. [no clue] S-TUCK
1 2 3 4
. . . . .
V W H A Z S J X I H S K I M F M W C G M V W O J S I F -
3 8 9 + 3 7 6 5 6 9 7 5 6 9 * 9 8 1 4 9 3 8 3 6 7 6 *
5 6 7
. . . . .
A G F J A Q Q M N R J K Z M G R S W M F. J A T W X H -
+ 4 * 6 + 4 4 9 1 3 6 5 3 9 4 3 7 8 9 * 6 + 2 8 5 9
8 9 10
. . .
A W F. F I Q Q W F F X I H F K H B A O Z J S M A H H F.
+ 8 * * 6 4 4 8 * * 5 6 9 * 5 9 1 + 3 3 6 7 9 + 9 9 *
11 12 13
. . . . . .
T G A H P K D X M A W O V F S A R F X H K I M A F S.
2 4 + 9 1 5 1 5 9 + 8 3 3 * 7 + 3 * 5 9 5 6 9 + * 7
Second
A E I O U Y
A 0 0 .4 0 .1 .3
Total nonpairs = 5.1%
E .7 .4 .2 .1 0 .2 pairs = 0.7%
F
I I .2 .4 0 .7 0 0
R
S O .1 .1 .1 .3 1.0 0
T
U .1 .1 .1 0 0 0
Y 0 .1 0 .2 0 0
NYPHO's Robot says that the first four or last four letters of
a word contain a vowel. [TUCK]
When one of these letters changes its class, the least likely
exchange is one occurring between Class II and III.
Having all this information, we are well armed against even the
most resistant Aristocrat.
G. and K. have inside positions and look like vowels but can
not be identified.
1 2 3 4
d e l i g h t f u l h o u r s r e a r d e t h s
. v c v . c v c v v c c c v . v c . v . v c
V W H A Z S J X I H S K I M F M W C G M V W O J S I F -
3 8 9 + 3 7 6 5 6 9 7 5 6 9 * 9 8 1 4 9 3 8 3 6 7 6 *
5 6 7
i a s t i c c r t o g r h e r s t i f l
v v c v c c c . . v . c v . v c c v . v c c
A G F J A Q Q M N R J K Z M G R S W M F. J A T W X H -
+ 4 * 6 + 4 4 9 1 3 6 5 3 9 4 3 7 8 9 * 6 + 2 8 5 9
8 9 10
i e s s u c c e s s f u l s o l i g t h r i l l s
v v c c v c c v c c c v c c v c . v . . c v c c c
A W F. F I Q Q W F F X I H F K H B A O Z J S M A H H F.
+ 8 * * 6 4 4 8 * * 5 6 9 * 5 9 1 + 3 3 6 7 9 + 9 9 *
11 12 13
a i l o f r i e d s h i s f l u i s h
. v v c . v . c c v v . . c v . c c c v v c v c
T G A H P K D X M A W O V F S A R F X H K I M A F S.
2 4 + 9 1 5 1 5 9 + 8 3 3 * 7 + 3 * 5 9 5 6 9 + * 7
Pattern words are words for which one or more letters are
repeated such as awkward, successful, interesting, unusually.
Aegean Park Press publishes pattern word books from 3 - 16
letters. Pattern words lists are indexed by key letters or
figures or by vowel consonant relationships. [BARK] Pattern
words give a quick wedge into the cryptogram. One of the best
Pattern Word Dictionaries is the Cryptodyct. [GODD]
The Crypto Drop Box has the TEA computer program which gives
automated pattern searching and anagraming up to 20 words. It
is a very effective tool.
A B C C D A A E B F
F I Q Q W F F X I H
or
1 2 3 3 4 1 1 5 2 6 = (334) 11526 [10L]
F I Q Q W F F X I H
Non Pattern word lists are those with words that do not have
even one repeated letter, such as come, wrath, journey. They
are very useful in attacking Patristrocrats and very difficult
Risties.
one 1
V
two 1 2
V C
three 1 2 3
C C -
four 1 2 3 4
C V - C
five 1 2 3 4 5
C C V C C
six 1 2 3 4 5 6
C V C - - C
seven 1 2 3 4 5 6 7
C V C C - - C
eight 1 2 3 4 5 . . Final
plus C C - - - - - C
CODEX, MICROPOD and ZYZZ are among the best tough "risties"
constructors. A tough ristie is a fascinating form of simple
substitution with word division in which the message is of no
importance whatever and the encipherer's full attention has
been given to the manipulation of letter characteristics.
Both ELCY and S-TUCK present versions of George C. Lamb's
Variety of Contact or Consonant Line Approach. I shall use
ELCY's version and example and expand the consonant line
approach to make it more understandable. We start with:
U W Y M N X K A E H X R B Z U V X M U W B Z
4 5 6
O Y Z T W H V C X Y A C Y A U Z D B R A H V K B A;
7 8 9
Z W S V A H K U Z B K C, M S C X C Y X B S,
10
X V Z Y T R Y C X P. (104L)
CONSONANT-LINE METHOD
A-3. Contacts
5U6 4W7 7Y9 3M5 1N2 8X10 4K7 6A7 1E1 4H6 3R5 6B8
--- --- --- --- --- --- --- --- --- --- --- ---
-|W U|Y W|M Y|N M|X N|K X|A K|- -|H E|X X|B R|Z
-|V U|B O|Z X|U | H|R V|B Y|- | W|V B|A W|Z
M|W T|H X|A -|S | V|M H|U Y U | A|V T|Y D|R
A|Z Z|S C|A | | C|Y B|C R|H | A|K | K|A
K|Z | C|X | | C|- | B|- | | | Z|K
| | Z|T | | Y|B | V|H | | | X|S
| | R|C | | -|V | | | | | |
C|P
Freq: 8 7 6 5 4 4 6 5 4 7 / 3 3 6 3 / 2 1 1 1 1 1
VOC: 10 9 8 8 7 7 7 6 6 6 / 5 5 5 5 / 4 2 1 1 1 1
CT: X Y B V W K A U H Z / M R C S / T N E O D P
We start with the position that 20% of the text represented by
variety count are consonants. 20% of 104 = about 21. The line
of demarcation is between R and C but 4 letters have the same
VOC of 5, M,R,S,C. If we take one , we must take all and one
of these most likely is a vowel. The key to solution is the
VOC "step up" versus "step down" observation. Vowels tend to
step up and Consonants tend to step down. [i.e. 3M5 is a step
up of 2 points and 6C5 is a step down of one point.]
If any letter does not appear at all below the line, that
letter is most likely a consonant. A and U fall into this
catagory. We add these to analysis:
U W Y M N X K A E H X R B Z U V X M U W B Z
- - o - - o -- - o o - o - - - o - - - o -
4 5 6
O Y Z T W H V C X Y A C Y A U Z D B R A H V K B A;
- o - - - o - - o o - - o - - - - o - - o - - o -
7 8 9
Z W S V A H K U Z B K C, M S C X C Y X B S,
- - o - - o - - - o - - - o - o - o o o o
10
X V Z Y T R Y C X P. (104L)
o - - o - - o - o -
Let me fill in where ELCY stops. A-3 has vowels and consonants
separated. We have the PT letter h. Word 9 is either clever
or wrong. Using Barkers Pattern List on p39, we find bayou and
miaou. The same reference gives us thunderclaps for word 7.
Although not correct we find thunderstorm matching the pattern
under 819710/12W and word 8 suggests puma. The final message
reads: shipyard zealot snapshot kitchenmaid midst goldenrod;
thunderstorm, puma miaou, anticlimax.
1 2 3 4 5
A B C D E A C F G H I C J F H K C I B L K F B H L
6 7 8 9 10
K C M J N O M J P I B H L M C M R S P E B C A I H
11 12 13 14 15
T I A U H. K U M C E V D U H P. S C F G D J W B I L
16 17 18 19
J S U M L D U V N P, V E O M L C F G L E.
K F B H L A C F G H K C I B L B H L M C
1 b l a c k l c b a k a c k
2 c r a z y r z c a y a z y
3 w r o n g r n w o g o n g
4 c r o w d r w c o d o w d
5 d r u n k r n d u k u n k
6 f o u n d o n f u d u n d
1 2 3 4 5
b u r y b r o w n a r s o n f r a u d f o u n d
A B C D E A C F G H I C J F H K C I B L K F B H L
6 7 8 9 10
f r e e a u n d e r e y u r b a n
K C M J N O M J P I B H L M C M R S P E B C A I H
11 12 13 14 15
c a b i n f i e r y i n r o w u a d
T I A U H. K U M C E V D U H P. S C F G D J W B I L
16 17 18 19
i e d i y e d r o w d y
J S U M L D U V N P, V E O M L C F G L E.
All the vowels are id'ed and r, n. The message is "Burly brown
arson fraud found fresh vesta under empty cabin. Fiery glint.
Prowl squad spied light, gyved rowdy."
RECAP
4. Go with the flow of the cipher text and extract all the
information on frequency, position and contacts.
6. Work back and forth from the cryptogram and the keyword
alphabets. Expect the message to make some kind of sense.
8. Persevere.
CM REFERENCES
HOMEWORK PROBLEMS
N Z X U K Y D K V G U N A J U X O U B B S
X D K K G B P Z K D F N Y Z B U L Z .
H Y D F K X C , F Q M K X R L Q Q I Q H Y D L
M K L D X C T W R D C D L Q J Q M N K X T M B
P T B M Y E Q L K F K H C Y L Q Z K T L T C . "
* T D V S V K . B P W V G Q N V O M C M V B : L D X V
K Q A M S P D L V Q U , L D B Z I U V K Q F P O
W A M U X V , E M U V P X Q N V , U A M O Z
N Q K L M O V ( S A P Z V O ) .
E V Z F D A E S T U W X Q V S P F D B Y P Q Y V D A F S ,
H Y B P Q P F Y V C D Q S F I T X P X B J D H W Y Z .
O C B Z A Y W N = O G S J Q O S R Y U W , J N Y X U
O B Z A ( B C W S D U R B C ) T B G A W U Q E S L.
* C B S W
REFERENCES
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
Notes
OUTLINE
a. Eyeball
b. Frequency Distributions - General Nature of English
Letters
c. Friedman Techniques - Random vs Expected -Spaces
and a Wealth of Tables: Digram, Trigram, and more
d. C. C. Foster Techniques
e. S-Tuck Techniques
f. Pattern Words
g. ELCY : Consonant Line Attack
h. Sinkov Techniques
i. Barker's Vowel Separation and Position Table
j. Non Pattern Words: "Dooseys"
k. SI SI Patterns
l. CM References for Risties
m. Relationship to XENOS:French and German Solutions
n. Computer Program Aids - TEA Database, CDB, ABACUS,
Computer Supplement
o. References
4. Homework Problems
a. Friedman
b. Waxton
LECTURE 2
SUBSTITUTION WITH VARIANTS
Part I
SUMMARY
CIPHER CLASS
UFD
PHI(r) = .0385N(N-1)
PHI(p) = .0667N(N-1)
O W Q W Z A E D T D Q H H O B A W F T Z W O D E Q
T U W R Q B D Q R O X H Q D A G T B D H P Z R D K
f: 3 3 7 2 1 1 4 1 4 1 6 3 4 1 5 1 3
CT: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
f(f-1): 6 6 42 2 0 0 12 0 12 030 6 12 0 20 0 6
f: 1 1 2 3 4 2 1 4 2 1 1 3
CT: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
f(f-1): 0 0 2 612 2 0 12 2 0 0 6
N = 25 letters
PHI(o) = 42
PHI(r) = 0.0385x25x24 = 23
PHI(p) = 0.0667x25x24 = 40
f: 1 1 1 2 1 1 1 3 1 1 1 2 1 1 1 1 2 3
CT: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
f(f-1): 0 0 0 2 0 0 0 6 0 0 0 2 0 0 0 0 2 6
N = 25 letters
PHI(r) = 0.0385x25x24 = 23
PHI(p) = 0.0667x25x24 = 40
since the observed value is less than half of PHI random, this
would suggest that the letters of this phrase could not be
plain text in any language. Think about the cause of this
result. For a simplified derivation, see Sinkov [SINK]
Monoalphabetic Digraphic
Text Text
Random Text
Note that the English plain text value is slightly less than
Friedman's. [KULL] [SINK]
fi 14 13 12 12 10 10 8 5 5 4 4 4 3 3 3 3 3 3 2 2 2 2
CT D Q I N O P A L X E R V C F H M S Y J K W Z
c . c v . . v c c v
1. X W V I M S O Q P N V
s c o h a n t i
c v . c c . v . v c
2. Q I F E D Y I H O Q,
n o b l e w o m a n
. v . c v . v c c
3. Z I Y P I Y N Q L
o w t o w i n g
v . v c c v c v c v c c .
4. D K O L L D A O P D R E W ,
e x a g g e r a t e d l y
c v c . c v v v c
5. R N X M E D O X D R
d i s l e a e d
c v . v c v v c c
6. X I C D A D N L Q .
s o e r e i g n
. c v . v v v c v v c
7. M A I C I V O P N I Q
r o o e a t i o n
v c v c c v c v c v
8. N Q I A R N Q O P D ,
i n o r d i n a t e
. v c v c . . v c c
9. F O Q N X S H D Q P
a n i s h m e n t
v c c v c c c v . v c c v . c v
10. N Q V I Q P A I C D A P N F E D.
i n c o n t r o v e r t i b l e
v . c v c . v c .
11. O J P D A H O P S,
a f t e r m a t h
. v c c . v . v c
12. Z N Q L -J N K D A !!!
i n g f i x e r
PATRISTOCRATS
Given P-1:
EGHTV EAGXX
8 4 1 23 3 19 19 15 10 3 2 5 2 0 3 5 0 2 10 22 5 16 1 8 14 35
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The marked crests and troughs and the PHI test support the
monoalphabetic hypothesis. Friedman advises that "the beginner
must repress the natural tendency to place too much confidence
in the generalized principles of frequency and to rely too much
upon them. [i.e. setting Z=e, D=t ] It is far better to into
effective use certain other data concerning normal plain text,
such as digraphic and trigraphic frequencies."
DZ = 9x, DF = 5x, DV = 2x
ZDF = 4x, YDZ = 3x, BDV = 2x
-----------------------------------------------------
DZ - 9 TZ - 5 DZY - 4 HTZAITYDZY - 2
ZD - 9 TY - 5 HTZ - 4 BDVFHTZDF - 2
HT - 8 FH - 4 ITY - 4 ZAITYDZY - 3
ZY - 6 GH - 4 ZDF - 4 FHTZ - 3
DF - 5 IT - 4 AIT - 3
GZ - 5 VF - 4 FHT - 3
VT - 4 TYD - 3
ZF - 4 YDZ - 3
ZT - 4 ZAI - 3
ZZ - 4
--------------------------------------------------------
IE
ZF HV
GI ZG
SZ IY
VG DU AX ZK
YZ ZZ EH IY
ZO FH WH HZ
CZ ZF PD GT VY
ZT VS TU GX HC
ZZ DK ZH GU DH
ZF VH DZ KI HZ
BV DM YA FT IY
YZ EV LZ FT HZ
ZF DX YA HT UD AR ZH
IZ VH SZ TH DX YD VE
EG ZF YZ MZ FT HT RV VX
XS BV VV BI MT AT FL HZ
GV YZ DG TP TL XS IG VZ
ZI AZ TU TA FT AT SG UG JX PV
GV YD VF PH FY VT OY LV GT XB ZG
ZI SG ZS VA ZG SV VT GD ZS HL DZ UL DG IY
ZI ZD ZY DG ZI FZ FB AT ZZ TH PV FH XI SF SU YP HG
GD HZ TD FZ TF SD OH GL FO VV FZ HP VG IG LZ ZS -F HF
A B C D E F G H I J K L M N O P Q R S T
8 4 1 23 3 19 19 15 10 3 2 5 2 0 3 5 0 2 10 22
KD
TD
DY
TE TA UD
AD XD FT
ST ZS ZT UF
AF TZ GZ DG
DF ZG DY YY
LX TD TD ZT
FM TZ TB GZ
YT ZG JT DY
YT X- ZB FJ TA
DF GX TD DY OF
TT HA IV ZA YD
FI FH IW ZV DZ DR
RZ JF SI ZF BD GD
GP YJ VZ TD GD GY
HZ LD TO GV PF ZJ
FP GH XG FS DS DF DZ
U V W X Y Z
---------------------------------------------------------
ED EN ER ES NE RE SE TE VE
AN ND OR ST IN NT TH ON TO
Z as prefix 8 4 4 1 0
D(23) T (22) F(19) G(19) V(16)
Z as suffix 9 5 2 5 0
Z as prefix 0 6 0 0
H(15) Y(14) S(10 I(10)
Z as suffix 0 2 0 0
Vowels Consonants
Z=e, V, H, S, I D, T, F, G, Y
Diphthong: io ou ea ei ai ie au eo ay ue
Frequency: 41 37 35 27 17 13 13 12 12 11
ZZ = 4 VH = 4 HH = 1 HI = 1 IS = 1 SV = 1
Z = e, H = o, V = i
HI = oa value = 7 HI = ou value = 37
SV = ui value = 5 SV = ai value = 17
IS = au value = 13 IS = ua value = 5
==== ====
Total 25 59
B C E J K M O R W
-----------------------
Y �
D D �D D D vowel ?
S S �S S vowel
�G G G G G
Z Z Z Z �Z Z Z Z vowel
H �H H vowel
T T T �
V V V �V vowel
�A
F F �F vowel?
X X �
I �I vowel?
�U
The general principles are repeated. Vowels distinguish
themselves from consonants as they are represented by
PT: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
CT: S Z V T H D G F I
F G
P-1 revisited and rewritten:
S F D Z F I O G H L P Z F G Z D Y S P F H B Z D S
a t r e t u s o e t s e r a t o e r a
s s t s t s
G V H T F U P L V D F G Y V J V F V H T G A D Z Z
s i o n t i r t s i i t i o n s r e e
t s s t s t
A I T Y D Z Y F Z J Z T G P T V T Z B D V F H T Z
u n r e t e e n s n i n e r i t o n e
s t s
D F X S B G I D Z Y V T X O I Y V T E F V M G Z Z
r t a s u r e i n u i n t s e e
s t s t
T H L L V X Z D F M H T Z A I T Y D Z Y B D V F H
n o i e r t o n e u n r e r i t o
s
T Z D F K Z D Z Z J S X I S G Z Y G A V F S L G Z
n e r t e r e e a u a s e s i t a s e
s t t s t
D T H H T C D Z R S V T Y Z D O Z F F H T Z A I T
r n o o n r e a i n e r e t t o n e u n
s s
Y D Z Y G A V D G Z Z T K H I T Y Z Y S D Z G H U
r e s i r s e e n o u n e a r e s o
t t t
Z F Z T G U P G D I X W G H X A S R U Z D F U I D
e t e n s s r u s o a e r t u r
s t t t s
E G H T V E A G X X
s o n i s
t t
I have left out the frequencies above the letters for editorial
space only.
PT: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
CT: S U X Y Z L E A V N W O R T H B C D F G I J K M P Q
Once the cryptogram has been solved and the keying alphabet
reconstructed, subsequent messages which have been enciphered
by the same means solve readily.
P- 2.
I Y E W K C E R N W O F O S E L F O O H E A Z X X
PT a b c d e f g h i j k l m n o p q r s t u v w x y z
CT L E A V N W O R T H B C D F G I J K M P Q S U X Y Z
Cryptogram I Y E W K C E R N W
Equivalents P Y B F R L B H E F
I Y E W K C E R N W
P Y B F R L B H E F
Q Z C G S M C I F G
R A D H T N D J G H
S B E I U O E K H I
T C F J V P F L I J
U D G K W Q G M J K
V E H L X R H N K L
W F I M Y S I O L M
X G J N Z T J P M N
Y H K O A U K Q N O
Z I L P B V L R O P
A J M Q C W M S P Q
B K N R D X N T Q R
*** C L O S E Y O U R S
D M P T F Z P V S T
E N Q U G
F O R V H
G P S W I
H Q T X
I R U Y
J S V Z
K T W A
L U X B
M V Y C
N W Z D
O X A E
PT a b c d e f g h i j k l m n o p q r s t u v w x y z
CT F G I J K M P Q S U X Y Z L E A V N W O R T H B C D
Solving: Close your station at two PM.
VOWEL CIPHER
COLUMN
A E I O U
�-----------------
A �a b c d e
�
E �f g h i/j k
�
I �l m n o p
ROW �
O �q r s t u
�
U �v w x y z
VV-1.
1 2 3 4 5
OUOE OUAE OUIUIAAIUIUUOEOUAOAI OEEOUUOE OEEOAI
6 7 8
UOEUUEUEAIAEOE OOAIOEUUOUUEAE EEUO
9 10 11 12 13
UUUEUE OEUIEEEEIA IUEEAOAIIUAIOAOEAE IOAI EIUUUI-
14 15 16
AIUOEUUEUEEA EIEEIUIAOUUEAIOO UUOAOO AEAIOAOE
17 18 19
OEEE EUAE UIAIIIEUUEUUUIUEEA.
A E I O U
--------------------------
A s e v
E y o c h u
I p g b m
O n t d i
U l r f a
MIRABEAU'S CIPHER
1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
I S U W B K T D Q R X L P A E
6 8 4
1 2 3 4 5 1 2 3 4 5
G O Y V F Z M C H N
7 5
1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
O A G P U T C N H Y X M F I S
1 2 3
1 2 3 4 5 1 2 3 4 5
L Q W B V R E K Z D
4 5
2 2 5 4 1 2 3 5 1 2
- - - - - - - - - -
1 4 2 4 1 5 5 1 5 3
29 27 50 48 17 29 39 56 10 28
-- -- -- -- -- -- -- -- -- --
71 64 92 74 94 85 65 91 75 83
62 10 40 65 47 57 75 62 27 58 57 85
-- -- -- -- -- -- -- -- -- -- -- --
48 62 95 20 84 27 92 30 49 62 19 29
65 57 75 58 85
-- -- -- -- --
20 27 92 62 29
6 6 2 2
- - - -
4 8 4 8
65 6 6 5 5
the group -- would be catalogued - - - -
20 2 0 2 0
5
The fraction - (which is the real e) will eventually assume
2
its normal frequency and thus display its identity. Armed with
the fact that 5/2 represents e, we cancel out all the
non-values which occur with this fraction. Each time we
cancel out a non-value, we do so for the entire cryptogram.
Even if the 5/2 represents another letter, such as t, the
uniliteral frequency distribution will be present in the CT.
1 -
2 - A B C
3 - D E F
4 - G H I
5 - J K L
6 - M N O
7 - P R S NO Q use 99
8 - T U V
9 - W X Y NO Z use 98
* -
0 -
# -
J F M A M J JU A S O N D
CALLS A B C D E F G H I J K L
PUTS M N O P Q R S T U V W X
A B C D E F G H I J K L
5 10 15 20 25 30 35 40 45 50 55 60
105 110 115 120 125 130 135 140 145 150 155 160
205 210 215 220 225 230 235 240 245 250 255 260
305 310 315 320 325 330 335 340 345 350 355 360
M N O P Q R S T U V W X
1 2 3
1 - b b b
2 - A B C
3 - D E F
4 - G H I
5 - J K L b - represents available
6 - M N O information slot
7 - P R S
8 - T U V i.e. 9 = W X Y, but 93 = Y
9 - W X Y only
10 * - b b b
11 0 - b b b
12 # - b b b
HOMEWORK ASSIGNMENTS
Pd-1. Daniel
H Z K L X A L H X P N C I N Z X F L I X G N W Q X
P N Z K T L N K X O L X N I Z X G I N X P N E Z K
X W Q X P Z X L H X P N C I N Z X S N Q N T X W Q
X P N W V S N I K L K H B L X N W Q L X H F Z I L
N X A Z K S B W E N I.
F L B B A O I A F Q E A O M Z U I L O N R Z O Q A
O P I L O M O L S F P F L I P F L B B A O E R I C
A O Q E F O P Q B L O W A V H Z O W E A P X Z Q Q
G A P Z I V V A Z Q E G A Q E F H T E L G L S A P
L R O W L R I Q O U F I E F P E A Z O Q Z I V I L
Q T F Q E E F P G F M P L I G U B L G G L T H A.
1 2 3 4 5 6
V G S E U L Z K W U F G Z G O N G M V D G X Z A J U =
7 8 9 10
X U V B Z H B U K N D W V O N D K X D K U H H G D F =
11 12 13 14
N Z X U K Y D K V G U N A J U X O U B B S
15 16 17 18
X D K K G B P Z K D F N Y Z B U L Z .
Lots of two and three letter words. One of the three letter
words most likely 'the'. The GON GM combination is a possible
wedge. Note that N = 6/91 = 6.6% of CT, Z = 8/91 = 8.9% and
V = 5/91 = 5.5% of CT. Word 10 pattern is (556) 291 on 12L
word = disappointed. Note the 'ted' ending fits with word 17
t_e = the. so Y=h. Word 16 confirms DF = in.
Plugging in A-1, we have:
K D C Y L Q Z K T L J Q X C Y M D B C Y J Q L : " T R
H Y D F K X C , F Q M K X R L Q Q I Q H Y D L
M K L D X C T W R D C D L Q J Q M N K X T M B
P T B M Y E Q L K F K H C Y L Q Z K T L T C . "
Solve A-2 by eyball method. One letter word = a, look for you
.. your combination, the word to in the first four words
before quotation. The message reads: Auto repairmen to
customer: " If you want, we can freeze your car until future
mechanics discover a way to repair it."
* Z D D Y Y D Q T Q M A R P A C , * Q A K C M K
* T D V S V K . B P W V G Q N V O M C M V B : L D X V
K Q A M S P D L V Q U , L D B Z I U V K Q F P O
W A M U X V , E M U V P X Q N V , U A M O Z
N Q K L M O V ( S A P Z V O ) .
D V T U W E F S Y Z C V S H W B D X P U Y T C Q P V
E V Z F D A E S T U W X Q V S P F D B Y P Q Y V D A F S ,
H Y B P Q P F Y V C D Q S F I T X P X B J D H W Y Z .
CEHZAUIXP
-----------
TTTT �T VOWEL
VV �VVV VOWEL
YY �YY
Q �QQQ
DDDD �DD
WW �WWWW
SS �S
F �FFFFF VOWEL
BB�B
P �P
�
J can be wrongly assumed to be a consonant. Digraph HW and rt
/tr reversal fails but st/ts reversal gives information. The
word merchants can be found in a non-pattern word list. The ch
combination fits CT HW. The message reads: Neighborly
merchants glimpse beyond bright personal splendor, clasp solemn
profit staunchly. Kw(s)= sprightly; BEHAVIOR.
A S P D G U L W , J Y C R S K U Q N B H Y Q I X S P I N
O C B Z A Y W N = O G S J Q O S R Y U W , J N Y X U
O B Z A ( B C W S D U R B C ) T B G A W U Q E S L.
* C B S W
REFERENCES / RESOURCES
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
o Baconian Cipher
o Hayes Cipher
o Trithemian Cipher
LECTURE 4
LECTURE 1 ERRATA
CLASS NOTES
SUMMARY
XENOCRYPTS
The next step was to study syntax, the arrangement and order of
words in phrases and sentences.
Figure 5-1
Vowel Phonemes
Standard American English
According to Height of Tongue and Tongue Position
in Front, Center and Back of Mouth
Tongue High
i u
I U
ea ua o
e ou Mid
ae a
Tongue Low
TRANSFORMATIONAL-GENERATIVE GRAMMAR
Figure 5-2
Chomsky Model
For Message From Speaker to Hearer
or Writer on Both Sides
FOCAL VOCABULARY
HISTORICAL LINGUISTICS
Figure 5 -3
INDO-EUROPEAN
.
............................................................
. . . .
. . . .
CELTIC ITALIC GERMANIC .
. . . . . . . . .
. . . . .
o Welsh . . . .
o Irish . West North .
o Scots Gaelic . . . .
o Breton . . . .
. . . .
ROMANCE o Dutch o Danish .
. o English o Icelandic .
Latin o Flemish o Norwegian .
. o Frisian o Swedish .
. o German .
o Catalan o Yiddish .
o French .
o Italian .
o Portuguese .
o Provencal .
o Rumanian .
o Spanish .
.
.
.............................................................
. . .
. . . .
HELLENIC Albanian . .
. . .
. Armenian .
Ancient Greek .
. .
. .
Greek .
.
.
...............................................
. . .
. . .
INDO-IRANIAN BALTIC SLAVIC
. . .
. . .
. o Latvian o Bulgarian
. o Lithuanian o Czech
. o Macedonian
. o Polish
o Old Persian o Russian
o Persian o Serbo-Croatian
o SANSKRIT o Slovak
. o Slovenian
. o Ukrainian
.
o Bengali
o Hindi
o Punjabi
o Urdu
DEAD LANGUAGES
CRYPTOGRAPHIC THREAD
WRITING SYSTEMS
Logographic
Sumerian 600+
Egyptian 2,500
Hittite Hieroglyphic 497
Chinese 5,000+
"Pure" Syllabic
Persian 40
Linear B 87
Cypriote 56
Cherokee 85
Alphabetic or Consonantal
English 26
Anglo-Saxon 31
Sanskrit 35
Etruscan 20
Russian 36
Hebrew 22
Arabic 28
XENOCRYPTS
TABLE 5-1
Partial Frequency Distribution For Cracking Xenocrypts
16 8 7 6 5 4 2 <1
NORWEGIAN: E RNS T AI LDO GKM UVFHPA' JBO' YAECWXZQ
10 9 7 6 4 3 <2
LATIN: I E UTA SRN OM CPL (bal)
18 8 7 6 5 4 3 2 <1
FRENCH: E AN RSIT UO L D CMP VB F-Y
14 13 12 8 6 5 4 3 2 <1
PORTUGUESE: A E O RS IN DMT UCL P QV (bal)
18 11 8 7 5 4 3 2 <1
GERMAN: E N I RS ADTU GHO LBM CW (bal)
15 12 8 7 5 4 3 1 <1
CATALAN: E A S ILRNT OC DU MP BVQGF (bal)
16 13 8 6 5 4 3 <2
HUNGARIAN: E A T OS LNZ KIM RGU (bal)
13 12 11 9 7 6 5 3 2 <1
ITALIAN: E A I O L NRT SC DMO'U VG (bal)
20 10 7 6 5 4 3 2 <1
DUTCH: E N IAT O DL S GKH UVWBJMPZ (bal)
13 9 8 7 5 4 3 1 <1
SPANISH: EA O S RNI DL CTU MP GYB (bal)
ENGLISH REVISITED
% 12 10 8 8 7 7 7 6 5 4-3 2 1 < 1
ENGLISH: E / T A / O N I S R H / LDCU / PFMW / YBGV / KQXJZ
GROUP PERCENTAGES:
A E I O U 38.58%
L N R S T 33.43%
J K Q X Z 1.11%
E T A O N 45.08%
E T A O N I S R H 70.02%
ORDER
Digram Order: TH / HE / AN / IN / ER / RE / ES / ON / EA / TI
/ AT / ST / EN / ND / OR
Trigram Order: THE / AND / THA / ENT / ION / TIO / FOR / NDE
Initials: T A O S H I W C B P F D M R
Finals: E S T D N R O Y
Note that the English plain text value is slightly less than
Friedman's. [KULL] [SINK]
Monoalphabetic Digraphic
Text Text
Random Text
Absolute Frequencies
E 180 T 57 G 32 F 16 P 8
N 106 D 54 O 27 W 15 J 3
I 81 U 46 C 27 K 13 Y -
R 72 H 41 M 23 Z 11 X -
S 69 L 33 B 17 V 9 Q -
A 60 =======
1,000
Groups
Vowels: A, E, I, O, U, Y = 39.4%
High-Frequency Consonants: D, N, R, S, T = 35.8%
Medium-Frequency Consonants: B, C, F, G, H, L, M, W = 20.4%
Low-Frequency Consonants: J, K, P, Q, V, X, Z = 4.4 %
A B C D E F G H I J K L M
A 4 14 10 4 33 7 9 7 1 1 2 33 13
B 6 48 1 1 5 3
C 130 5
D 29 2 8 127 1 2 2 60 1 3 2
E 13 22 10 31 13 12 32 24 90 2 6 28 25
F 7 1 3 15 7 2 2 2 1
G 10 1 8 78 1 2 2 8 2 7 1
H 29 1 8 64 1 2 1 14 2 8 3
I 3 1 39 7 91 2 18 7 2 7 12 11
J 4 8
K 12 1 1 11 1 1 1 5
L 26 3 1 6 27 1 2 37 3 20 1
M 16 3 4 26 2 22 1 14 1 2 1 11
N 39 12 118 58 9 57 8 35 4 10 6 10 18
O 1 3 5 3 11 3 3 3 1 18 6
P 10 5 4 1 2 1
Q
R 34 11 5 35 60 9 12 9 37 2 11 6 8
S 14 6 55 13 46 3 7 3 30 1 5 4 7
T 25 3 17 88 2 4 6 40 1 3 7 3
U 1 2 8 2 37 15 5 1 2 2 11
V 1 19 3
W 16 24 20 3
X
Y
Z 1 1 8 5 1
N O P Q R S T U V W X Y Z
A 48 2 22 27 23 36 1 1 1
B 3 11 2 1 3 1 1
C
D 2 4 1 5 6 2 9 2 2 2
E 235 3 6 195 68 28 24 9 15 7
F 1 3 10 2 10 12
G 3 1 11 8 5 8 2 1 1
H 6 6 1 20 4 23 7 2 3 1
I 84 13 1 7 53 44 1 2 1 1
J 3
K 9 10 1 5 4
L 2 4 10 12 6 1 1
M 1 8 5 1 3 3 9 1 1 1
N 18 8 5 4 36 27 20 10 17 14
O 33 1 5 18 12 4 1 1 5 1
P 7 2 7 1 1
Q 1
R 12 19 3 6 22 18 26 6 8 5
S 3 16 6 2 40 57 9 5 5 1 5
T 4 4 14 20 7 16 2 10 13
U 76 2 18 28 14 1 1 2 1
V 21
W 6 6
X
Y
Z 2 4 27 4
SCH- 666 ERE- 313 NEN- 198 AUS- 162 IST- 142 HRE- 124
DER- 602 ENS- 270 SSE- 191 TIS- 159 STA- 141 HER- 122
CHE- 599 CHT- 264 REI- 190 BER- 157 DES- 140 ACH- 119
DIE- 564 NGE- 263 TER- 188 ENI- 157 FUE- 139 GES- 118
NDE- 541 NDI- 259 REN- 185 ENG- 155 NTE- 139 ABE- 117
EIN- 519 IND- 254 EIT- 184 ION- 154 UER- 138 ERA- 117
END- 481 ERD- 248 EBE- 178 SEN- 152 ERU- 137 BEN- 116
DEN- 457 INE- 247 ENE- 175 ITI- 151 TUN- 136 MEN- 115
ICH- 453 AND- 246 LIC- 175 AUF- 149 SEI- 133 RIE- 112
TEN- 425 RDE- 239 EGE- 173 IES- 149 ESE- 132 VER- 110
UNG- 377 ENA- 214 DAS- 172 ASS- 148 ERT- 128 LAN- 109
HEN- 332 ERS- 212 ENU- 171 ENW- 148 NDA- 127 ENB- 108
UND- 331 EDE- 209 NUN- 169 ENT- 146 IED- 126 ESS- 108
GEN- 321 STE- 205 NER- 166 ERI- 143 ERN- 125 LLE- 108
ISC- 317 VER- 204 RUN- 163 EST- 142 NAU- 108 TSC- 107
ENN- 106 ERG- 106 RIT- 106 EHR- 105 CHA- 104 VON- 104
SIC- 103 IGE- 102 ITE- 101 ENZ- 100 ERB- 100 EUT- 100
Two-letter words: ZU SO ER ES DU DA IN AN IM AM UM WO OB JA
Three-letter words: DER DIE UND IST DAS EIN ICH SIE MAN MIT DEN
DEM VON WAR WAS NUR MIR ALS AUF AUS BEI BIS
Four-letter words: SICH ABER WIRD SIND ODER AUCH NACH NOCH MICH
ALSO DOCH DREI FAST SEHR WELT ZWEI WERT OHNE
Common Pattern words: TUT NUN SEE ALLE EINE NEIN DASS DENN DANN
KANN MUSS WENN WILL SOLL KOMM HERR NEUE GING ALLES IMMER EINES
EINEN LEBEN KEINE JETZT
Common prefixes: BE- GE- AUF- ER- VER- HER- UN- HIN- ZU- VOR-
Common suffixes: -LICH -HEIT -KEIT -ISCH -SCHAFT --EN -ER -IG
Common articles:
masc fem neut plu masc fem neut
the der die das die a, one ein eine ein
of the des der des der of a eines einer eines
in the dem der dem den in a einem einer einen
by the den die das die by a einen eine ein
True Diphthongs: AI AU EI EU
Consonant Rules
1 2 3 4 5 6
e i ein e i ni en e e e
GD QSMJ TE GSK EVGHSIEKSDNRGK-OGFJDNRGH EVEJGFH
7 8 9 10 11
n n ne i i e e i e en
HFKOPFKI KGJL SV VSJJGUAGDJUSNRG DJEEJGK EV
12 13 14 15 16 17 18 19
en e n e en gi e en i n
Z. D. EUUGK PFKIGHK DXHGNRGK MGSOG GKQUSDNR FKO
20
e
OGFJDNR.
1 2 3 4 5 6
es i ein e i nis en deu s e eu
GD QSMJ TE GSK EVGHSIEKSDNRGK-OGFJDNRGH EVEJGFH
7 8 9 10 11
und n ne i i e es i e s en
HFKOPFKI KGJL SV VSJJGUAGDJUSNRG DJEEJGK EV
12 13 14 15 16 17 18 19
u s en u e n s e en eide en i s und
*Z. *D. EUUGK PFKIGHK DXHGNRGK MGSOG GKQUSDNR FKO
20
deu s
OGFJDNR.
1 2 3 4 5 6
es gibt ein e i nischen deutscher teur
GD QSMJ TE GSK EVGHSIEKSDNRGK-OGFJDNRGH EVEJGFH
7 8 9 10 11
rund n net i ittel estlic e st ten
HFKOPFKI KGJL SV VSJJGUAGDJUSNRG DJEEJGK EV
12 13 14 15 16 17 18 19
u s en un e n sprechen beide englisch und
*Z. *D. EUUGK PFKIGHK DXHGNRGK MGSOG GKQUSDNR FKO
20
deutsch
OGFJDNR.
1 2 3 4 5 6
es gibt a ein americanischen-deutscher amateur
GD QSMJ TE GSK EVGHSIEKSDNRGK-OGFJDNRGH EVEJGFH
7 8 9 10 11
rund n net im mittelwestliche staaten am
HFKOPFKI KGJL SV VSJJGUAGDJUSNRG DJEEJGK EV
12 13 14 15 16 17 18 19
u s allen un e n sprechen beide englisch und
*Z. *D. EUUGK PFKIGHK DXHGNRGK MGSOG GKQUSDNR FKO
20
deutsch
OGFJDNR.
1 2 3 4 5 6
es gibt ja ein americanischen-deutscher amateur
GD QSMJ TE GSK EVGHSIEKSDNRGK-OGFJDNRGH EVEJGFH
7 8 9 10 11
rundfunk netz im mittelwestliche staaten am
HFKOPFKI KGJL SV VSJJGUAGDJUSNRG DJEEJGK EV
12 13 14 15 16 17 18 19
u s allen funkern sprechen beide englisch und
*Z. *D. EUUGK PFKIGHK DXHGNRGK MGSOG GKQUSDNR FKO
20
deutsch
OGFJDNR.
1 2 3 4 5 6 7
JGKMH FDZJM JZMKJ IMRKJ ICGXR MYJWG XQXRI
8 9 10 11 12 13 14
IMJQJ RGELP MELJI XQQLJ MFCHJ WQMFI JQXRM
15 16 17 18 19 20 21
YJWGX QMGFI CGRME LFKCR DGMEL JWCPH JWFJM
22 23
RGFJM R.
J - 17 15.3% K - 5 4.5% O - 0
M - 15 13.5% C - 5 4.5% A - 0
R - 9 8.1% W - 5 4.5% B - 0
G - 9 8.1% E - 4 3.6% N - 0
I - 7 6.3% H - 3 2.7% T - 0
Q - 7 6.3% Z - 2 1.8% S - 0
X - 6 5.4% Y - 2 1.8% V - 0
F - 6 5.4% P - 2 1.8% U - 0
L - 5 4.5% D - 2 1.8%
Let J=e and note the patterns at groups 2 and 3 for the
hint zwei ewige. So Z=w, D=z, M=i K=g.
1 2 3 4 5 6 7
e gi zwei ewige i ge i e
JGKMH FDZJM JZMKJ IMRKJ ICGXR MYJWG XQXRI
8 9 10 11 12 13 14
ie e i e e i e i e i
IMJQJ RGELP MELJI XQQLJ MFCHJ WQMFI JQXRM
15 16 17 18 19 20 21
e i i g z i e e ei
YJWGX QMGFI CGRME LFKCR DGMEL JWCPH JWFJM
22 23
ei
RGFJM R.
1 2 3 4 5 6 7
esgib tzwei ewige i ge s i e s
JGKMH FDZJM JZMKJ IMRKJ ICGXR MYJWG XQXRI
8 9 10 11 12 13 14
ie e s i e e it be it e i
IMJQJ RGELP MELJI XQQLJ MFCHJ WQMFI JQXRM
15 16 17 18 19 20 21
e s i t s i tg z i e b e tei
YJWGX QMGFI CGRME LFKCR DGMEL JWCPH JWFJM
22 23
stei
RGFJM R.
8 9 10 11 12 13 14
dieme nschl iched ummhe itabe rmitd emuni
IMJQJ RGELP MELJI XQQLJ MFCHJ WQMFI JQXRM
15 16 17 18 19 20 21
versu mistd asnic htgan zsich eralb ertei
YJWGX QMGFI CGRME LFKCR DGMEL JWCPH JWFJM
22 23
nstei n
RGFJM R.
The kewords are (facts; SAD). The plain text x is over the
cipher text S for the initial position of the keying alphabets.
COMPONENTS
GR 28
BT TEXT
BT 011046Z K
where:
You can see where modern E-Mail and word processing systems
have made some of this information easier to handle by the
portable desk idea but traffic analysis would still apply.
ANALYSIS OF ROUTING
APPLICATIONS TO CRYPTANALYSIS
ADFGVX
Jaeger was a German code expert sent to stiffen the German Code
discipline in France in 1918. Ironically, the double "e" in
Jaeger's name gave US Army traffic analysis experts a fix on
code changes in 1918.
This told the Allies where and when the bombardment preceding
the next major German push was planned.
ENCIPHERING ADFGVX
26 letters and 10 digits of the ADFGVX were placed into a 6 x 6
Bipartite Square:
A D F G V X
A F L 1 A O 2
D J D W 3 G U
F C I Y B 4 P
G R 5 Q 8 V E
V 6 K 7 Z M X
X S N H 0 T 9
PT: a l l q u i e t o n t h i s
CT: AG AD AD GF DX FD GX XV AV XD XV XF FD XA
PT: f r o n t t o d a y
CT: AA GA AV XD XV XV AV DD AG FF
G E R M A N
3 2 6 4 1 5
A G A D A D
G F D X F D
G X X V A V
X D X V X F
F D X A A A
G A A V X D
X V X V A V
D D A G F F
ADFGVX CRYPTANALYSIS
A D F G X
A
D e
F
G
X
HOMEWORK PROBLEMS
Solve these:
REFERENCES / RESOURCES
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[LAKE] Lakoff, R., "Language and the Womans Place," Harper &
Row, New York, 1975.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson,
New York, 1992.
[MAZU] Mazur, Barry, "Questions On Decidability and
Undecidability in Number Theory," Journal of Symbolic
Logic, Volume 54, Number 9, June, 1994.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
LECTURE 3
SUBSTITUTION WITH VARIANTS PART II
MULTILITERAL SUBSTITUTION
SUMMARY
BILITERAL CIPHERS
W H I T E
.......................
W . A B C D E
.
H . F G H IJ K
.
I . L M N O P
.
T . Q R S T U
.
E . V W X Y Z
Figure 3-1
Plain : a b c d e f g h i j k l m
Cipher: WW WH WI WT WE HW HH HI HT HT HE IW IH
Plain : n o p q r s t u v w x y z
Cipher: II IT IE TW TH TI TT TE EW EH EI ET EE
1 2 3 4 5 6 7 8 9 0
................................. Figure 3-2
1 . A B C D E F G H I J
2 . K L M N O P Q R S T
3 . U V W X Y Z . , : ;
5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
.................... ............................
1 . A B C D E F 1 . A B C D E F G H I
2 . G H IJ K L M 2 . J K L M N O P Q R
3 . N O P Q R S 3 . S T U V W X Y Z *
4 . T UV W X Y Z
M U N I C H A B C D E F G H I
.................... .............................
B .A 7 E 5 R M A . A D G J M P S V Y
E .G 1 N Y B 2 B . B E H K N Q T W Z
R .C 3 D 4 F 6 C . C F I L O R U X 1
L .H 8 I 9 J 0 D . 2 3 4 5 6 7 8 9 0
I .K L O P Q S
N .T U V W X Z
Figure 3-7
B C D F G
..............
A . A B C D E
E . F G H IJ K
I . L M N O P
O . Q R S T U
U . V W X Y Z
Figure 3-8
1 2 3 4 5
..................
61 . A B C D E
72 . F G H IJ K
83 . L M N O P
94 . Q R S T U
05 . V W X Y Z
All the above matrices are bipartite. They can be divided into
two separate parts that can be clearly and cleanly defined by
row and column indicators. This is the primary weakness of
this type of cipher. [FR1]
Figure 3-9
1 2 3 4 5
..................
09 . H Y D R A
15 . U L IJ C B
21 . E F G K M
27 . N O P Q S
33 . T V W X Z
Plain A B C D E F G H I J K L M
Cipher 14 20 19 12 22 23 24 10 18 18 25 17 26
Plain N O P Q R S T U V W X Y Z
Cipher 28 29 30 31 13 32 34 16 35 36 37 11 38
The cipher units are biliteral but they are not bipartite.
Cipher text equivalent of plain text letter "A" is 14 and
digits 1 and 4 have no meaning per se. Plain text letters
whose cipher equivalents begin with 1 may be found in two
different rows of the matrix and those of whose equivalents end
in 4 appear in three different columns. [FR1]
TRITHEMIAN
Figure 3-10
A - 111 G - 131 M - 221 S - 311 Y - 331
B - 112 H - 132 N - 222 T - 312 Z - 332
C - 113 I - 133 O - 223 U - 313 * - 333
D - 121 J - 211 P - 231 V - 321
E - 122 K - 212 Q - 232 W - 322
F - 123 L - 213 R - 233 X - 323
BACON
A L l i s W E l L W I t H m E T o d a Y
a a b b b a a b a a a b a b a a b b b a
H E l P
HAYES CIPHERS
P P Y Y E M N S N Y Y Y P I M A S H N S Y Y S S I T E P A A E
N S H N S P E N N S S H N S M M P I Y Y S N P P Y E A A P I E
I S S Y E S H A I N S S S P E E I Y Y S H N Y N S S S Y E P I
A A N Y I T N S S H Y Y S P Y Y P I N S Y Y S S I T E M E I P
I M M E I S S E I Y Y E I S S I T E I E P Y Y P E E I A A S S
I M A A Y E S P N S Y Y I A N S S S E I S S M M P P N S P I N
S S N P I N S I M I M Y Y I T E M Y Y S S P E Y Y M M N S Y Y S
S I T S P Y Y P E E P P P M A A A Y Y P I I T
PP YY EM NS NY YY PI MA SH NS YY SS etc
A B C D E B F G H D B I etc
Message reads:
84 55 84 25 93 34 82 31 31 75 93 82 77 33 55 42
93 20 93 66 77 66 33 84 66 31 31 93 20 82 33 66
52 48 44 55 42 82 48 89 42 93 31 82 66 75 31 93
DANIEL
There were several messages of this type. They disclosed that
only 26 different numbers were used.
Message reads:
AA = O EN = Y IT = D NS = E PP = H SS = N
AI = U EP = C MA = B NY = M SH = L YE = F
EI = I IA = K MM = G PE = T SN = P YI = X
EM = V IM = S NN = J PI = R SP = W YY = A
-------------------------------------------------------
20 = D 33 = N 44 = H 62 = X 77 = G 89 = Y
25 = K 34 = W 48 = T 66 = A 82 = I 93 = E
27 = S 39 = P 52 = U 68 = F 84 = C 96 = M
31 = L 42 = R 55 = O 75 = B 87 = V 99 = J
H I S P A Y M E N T
1 2 3 4 5 6 7 8 9 0
-------------------------------
H 1 . .
I 2 . K S D .
S 3 . L N W P .
P 4 . R H T .
A 5 . U O .
Y 6 . X A F .
M 7 . B G .
E 8 . I C V Y .
N 9 . E M J .
T 0 . .
------------------------------
The blank squares may have contained proper names and money
designations. Key = HISPAYMENT for bribary seems to be
appropriate. [HIS1], [TRIB], [TILD], [FR1]
Chart 3-1
3 - End of a word
33 - End of a sentence
333 - End of message
22.22.22.3 - Signal of assent. Message understood
22.22.22.333 - Cease signaling
121.121.121.3 - Repeat
212121.3 - Error
211.211.211.3 - Move a little to the right
221.221.221.3 - Move a little to the left
As the Civil War wore on, Myer increased the wigwag motions to
four. This enabled more specialized words and abbreviations to
be used. In 1864, Myer invented a similar daytime system with
disks.
For night signals, Myer applied his system with torches on the
signal poles and lanterns. A foot torch was used as a
reference point. Thus the direction of the flying wave could
better be seen. Compare this to the semaphore system used by
ships at sea when radio silence is a must.
Colonel Evans turned his cannons and musket fire toward the
Federal troops before they could initiate their attack. Porter
was credited later (and decorated) for his vigilance led to
changes in the tactics of the entire struggle around Manassas
Junction. The application of the new signal system had
directly influenced the shocking Union defeat that eventful
July day.
LIMITED CHARACTERS
WORD SEPARATORS
For English, the average word length is 5.2 letters. The word
separator will be close to 16% frequency. [FR1] The letters
of the alphabet take on new percentage frequencies as follows:
ANAGRAMING
NUMERICAL CIPHERS
Plain - A B C D E F G H I J K L M
Cipher - 11 12 13 14 15 16 17 18 19 20 21 22 23
Plain - N O P Q R S T U V W X Y Z
Cipher - 24 25 26 27 28 29 30 31 32 33 34 35 36
Mixed numerical cipher alphabets are those that have been keyed
by a key word turned into numerical cipher equivalents or have
a random combination of two or more digits for each letter of
plain text.
Plain - A B C D E F G H I - J K L M
Cipher - 76 88 01 67 04 80 66 99 96 96 02 69 90
Plain - N O P Q R S T U V W X Y Z
Cipher - 77 05 87 60 39 79 03 78 68 98 86 70 97
The computer whizzes are now thinking that the example has
all numbers less than 100. Therefore, a brute force attack
on all combinations of two letter-equivalents of the above
ciphertext numerical values taken two at a time in combination
with the digram frequency data could be a good approach to the
cipher matrix construction problem. The ASOLVER computer
program at the CDB does this kind analysis and adds threshold
limitations on the search.
1 2 3 4 5 1 2 3 4 5 6 7 8 9
................ ............................
1 . A B C D E 1 . A B C D E F G H I
2 . F G H IJ K 2 . J K L M N O P Q R
3 . L M N O P 3 . S T U V W X Y Z *
4 . Q R S T U
5 . V W X Y Z
ONE-TIME PAD
Each key is used exactly once and for only one message.
The sender encrypts the message and destroys the pad's page.
The receiver does the same thing after decrypting the message.
New message - new page and new key letters/numbers - each time.
Brute force (trial and error) might bring out the true
plaintext but it would also yield every other text of the same
length, and there is no way to tell which is the right one.
The worst of it is that the possible solutions increase as the
message lengthens.
RANDOMNESS
The real issue for the one-time pad, is that the keys must be
truly random. Attacks against the one-time pad must be against
the method used to generate the key itself. [SCHN] Pseudo-
random number generators don't count; often they have nonrandom
properties. Reference [SCHN], Chapter 15, discusses in detail
random sequence generators and stream cipher. I take exception
to his remarks regarding keyboard latency measurement.
People's typing patterns are anything but random (especially us
two finger types). [SCHN] [MART]
PT: T A X A T I O N I S T H E F T
CE: 20 1 24 1 20 9 15 14 9 19 20 8 5 6 20
T A X A T I
20 1 24 1 20 9
10480 15011 01536 02011 81647 91646
----- ----- ----- ----- ----- ----- ...
10500 15012 01560 02012 81667 91655
[MARO]
CONCURRENT DEVELOPMENTS
The Soviet Union has employed the one-time pad to protect ALL
her diplomatic missions from 1930 on. Consequently her
crucial Foreign Office messages were not read by foes,
neutrals, nor allies. The GRU and the Soviet Spy rings -
"LUCY", "RED ORCHESTRA, and "Sorge's Net" all used the one-
time pad. They also used a straddling checkerboard variant
(not unbreakable).
The U.S. history was different. Some would argue that the U.S.
became serious and superplayers in 1953. Some would argue
1943. But not many will argue 1925 (we still had SIGTOT then).
[SISI]
LECTURE 4
LECTURE 5 - 6
BOZOL gets the kudo for best solution on the homework. Both
problems were unkeyed.
Pd-1. Daniel
H Z K L X A L H X P N C I N Z X F L I X G N W Q X
P N Z K T L N K X O L X N I Z X G I N X P N E Z K
X W Q X P Z X L H X P N C I N Z X S N Q N T X W Q
X P N W V S N I K L K H B L X N W Q L X H F Z I L
N X A Z K S B W E N I.
HXPNCI 2 5 19 6 17 2 8
LHXPNC 2 10 5 19 6 17 2
NCINZX 2 17 2 8 17 9 19
PNCINZ 2 6 17 2 8 17 9
XPNCIN 2 19 6 17 2 8 17
5 grams
CINZX 2 2 8 17 9 19
HXPNC 2 5 19 6 17 2
LHXPN 2 10 5 19 6 17
NCINZ 2 17 2 8 17 9
PNCIN 2 6 17 2 8 17
WQXPN 2 6 5 19 6 17
XPNCI 2 19 6 17 2 8
XWQXP (THATS)? 2 19 6 5 19 6
4 grams
CINX 2 2 8 17 9
HXPN 2 5 19 6 17
INZX 2 8 17 9 19
LHXP 2 10 5 19 6
NCIN 2 17 2 8 17
PNCI 2 6 17 2 8
QXPN 2 5 19 6 17
WQXP 2 6 5 19 6
YPNC 2 19 6 17 2
XWQX (THAT)? 2 19 6 5 19
3 grams
CIN 2 2 8 17
HXP 2 5 19 6
INZ 2 8 17 9
LHX 2 10 5 19
LXN 2 10 19 17
NCI 2 17 2 8
NWQ 2 17 6 5
NZX 2 17 9 19
PNC 2 6 17 2
QXP 3 5 19 6
WQX 3 6 5 19
XPN 5 19 6 17
XWQ 2 19 6 5
CI 2 2 8
HX 2 5 19
IN 3 8 17
KL 2 7 10
KX 2 7 19
LH 2 10 5
LN 2 10 17
LX 4 10 19
NC 2 17 2
NI 2 17 8
NW 3 17 6
NX 2 17 19
NZ 3 17 9
PN 5 6 17
QX 3 5 19
SN 2 3 17
WQ 4 6 5
XA 2 19 2
XG 2 19 2
XN 2 19 17
XP 6 19 6
XW 2 19 6
ZK 4 9 7
ZX 4 9 19
>From above data we try X= t and N=e, P=h. Then E=y, L=i,
W=o, S = D.
F L B B A O I A F Q E A O M Z U I L O N R Z O Q A
O P I L O M O L S F P F L I P F L B B A O E R I C
A O Q E F O P Q B L O W A V H Z O W E A P X Z Q Q
G A P Z I V V A Z Q E G A Q E F H T E L G L S A P
L R O W L R I Q O U F I E F P E A Z O Q Z I V I L
Q T F Q E E F P G F M P L I G U B L G G L T H A.
Problem 2 breaks down as follows:
FLBBAO 2 12 15 6 6 14 15
5 grams
FLBBA 2 12 15 6 6 14
LBBAO 2 15 6 6 14 15
4 grams
BBAO 2 6 6 14 15
FLBB 2 12 15 6 6
LBBA 2 12 6 6 14
3 grams
BAO 2 6 14 15
BBA 2 6 6 14
EFP 2 11 12 10
FLB 2 12 15 6
FQE 2 12 12 11
ILO 2 11 15 15
LBB 2 15 6 6
PFL 2 10 12 15
QEF 2 12 11 12
ZIV 2 8 11 4
ZOQ 2 8 15 12
AO 5 14 15
AP 3 14 10
AZ 2 14 8
BA 2 6 14
BB 2 6 6
BL 2 6 15
EA 3 11 14
EF 4 11 12
FL 3 12 15
FP 3 12 10
FQ 2 12 12
GA 2 7 14
GL 2 7 15
IL 3 11 15
IV 2 11 4
LB 2 15 6
LG 2 15 7
LI 2 15 11
LO 3 15 15
LR 2 15 4
LS 2 15 2
OM 2 15 3
OP 2 15 10
OQ 3 15 12
OW 3 15 3
PF 2 10 12
PL 2 10 15
QE 5 12 11
RI 2 4 11
ZI 2 8 11
ZO 3 8 15
ZQ 2 8 12
O 15 13 195 AIMLNZQPEFWRU
P 10 11 110 OIFQAXZLEGM
Q 12 12 144 FEOAPBZQGILT
R 4 6 24 NZEILO
S 2 3 6 LFA
T 3 5 15 HEQFL
U 3 6 18 ZIOFGB
V 4 4 16 AHIV
W 3 4 12 OAEL
X 1 2 2 PZ
Y 0 0 0
Z 8 10 80 MUROHQXPIA
BOZOL tried the crib word World from "Join the Army ..see the
world" The crib failed but did show him some possibilities.
LANAKI's caveat - Forget the tip, it is usually a red hering.
Try the A=e, Q=t, e=h, O=r, and I=n. Look for words offer,
battles, death, country.
HOMEWORK LECTURE 3
8 5 1 8 5 1 9 1 1 9 9 1 3
1 6 1 2 5 1 1 2 1 6 8 1 2 5
2 0 9 3 3 1 5 4 5 2 0 8 1
2 0 9 2 2 5 1 4 5 2 2 5
1 8 1 9 5 5 1 4 2 5 6 1 5
1 8 5 1 3 1 2 5 2 5 2 5 1 5
2 1 3 1 1 4 2 1 1 9 5 9 2 0
9 1 4 2 5 1 5 2 1 1 8 3 1 5
1 2 2 1 1 3 1 4
1 3 1 1 8 2 0 9 1 4 7 1 1 8 4 1 4 5 1 8
8 5 1 4 4 5 1 8 1 9 1 5 1 4 2 2 9 1 2 1 2 5
1 4 1 5 1 8 2 0 8 3 1 1 8 1 5 1 2 9 1 4 1
Mv-2.
0 6 0 2 1 0 0 5 0 1 0 1 0 5 1 5 2 2 0 2 0 6 0 8 2
3 2 5 1 0 0 8 0 4 0 2 2 1 0 9 0 8 0 4 0 8 2 2 1 1
0 8 0 4 1 7 1 5 1 3 1 4 2 2 2 1 0 2 2 4 0 2 0 1 2
2 0 2 0 2 0 1 0 8 1 9 0 6 1 5 1 7 0 8 0 1 1 1 2 2
1 4 0 2 0 1 1 9 0 6 0 5 1 0 0 2 0 2 1 1 2 2 1 4 0
6 2 3 1 9 0 5 1 5 0 1 2 2 1 3 0 2 0 5 0 6 1 3 0 2
0 5 0 1 1 0 0 5 2 3 0 6 2 1 0 2 2 2 1 4 0 6 0 2 0
2 2 2 1 4 0 6 0 2 0 2 2 6 0 2 0 6 0 5 2 1 1 9 0 2
0 2 1 1 2 2 0 3 0 2 1 7 2 4 0 2 1 9 0 2 0 6 1 5 0
5 1 1 0 6 0 2 1 9 0 5 0 6 2 2 0 1 0 5 0 5 0 1 1 9
0 5 2 1 1 5 2 2 1 5 0 5 0 1 2 2 0 5 1 8 0 5 0 6 0
6 0 5 0 3
Mv-3.
5 3 2 4 1 5 4 5 3 2 2 4 4 3 2 5 1 2 4 3 2 4 2 3 1
5 4 4 4 5 4 5 3 2 5 1 4 3 4 4 1 4 1 5 2 1 4 1 1 5
4 3 4 5 3 5 2 1 2 3 3 5 1 2 5 1 1 4 2 1 5 3 3 3 4
5 3 2 4 4 2 3 1 5 4 5 4 5 2 4 4 3 2 4 1 4 4 4 3 2
1 2 5 3 2 4 4 3 4 4 2 4 1 5 4 4 4 5 2 4 4 3 3 5 2
1 5 3 3 3 1 3 1 4 4 4 1 5 4 5 4 4 5 1 4 3 2 5 1 5
2 3 2 4 1 5 5 2 2 4 4 3 1 5 3 1 3 3 1 3 3 1 4 5 5
3 2 4 1 3 4 5 2 1 2 5 3 3 5 2 2 4 3 4 1 3 1 2 4 5
4 4 5 2 3 3 4 4 3 3 2 2 3 3 3 5 3 3 4 5 2 1 3 5 2
4 4 4 4 4 4 5 3 2 1 5 1 3 1 5 5 2 2 4 4 3 1 5 3 1
2 4 5 1 1 3 1 4 2 4 4 4 3 3 4 3 1 5 2 2 3 5 2 4 2
5 3 5 2 1 3 3 1 3 3 1 2 3 1 2 1 3 1 4 3 3 4 5 3 3
1 2 1 3 4 4 4 1 2 4 4 3 3 3 1 2 1 4 3 2 2 4 3 3 3
1 3 2 4 5 1 2 2 5 3 5 1 2 5 3 2 3 3 5 1 2 5 1 1 4
4 4 1 5 4 5 4 1 4 3 2 4 4 4 2 4 1 3 4 5 1 5 2 2 1
2 5 1 4 5 1 2 1 3 2 4 4 5 3 2 1 2 5 1 4 4 1 5 1 3
1 4 2 5 2 4 2 4 4 5
REFERENCES / RESOURCES
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
LECTURE 4
SUBSTITUTION WITH VARIANTS PART III
MULTILITERAL SUBSTITUTION
SUMMARY
Plain: A B C D E F G H I L M N O P Q R S T U V X Z
Cipher: L G O R F Q A H C M B T I D N P U S Y E W J
K X Z
V
(Note that the Captain was not an ACA member. The H=H
combination is not allowed.)
Enciphering Alphabet:
Plain : a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher: N O W I S T H E T I M E F O R A L L G O O D M E N T
Cipher: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Plain : p v h m s g d q k a b o e f c
l j r w y n i
x t z
u
THEORETICAL DISTINCTIONS
6 7 8 9 0 V W X Y Z
1 2 3 4 5 Q R S T U
. .............. . ..............
6 1 . A B C D E L F A . A B C D E
7 2 . F G H IJ K M G B . F G H IJ K
8 3 . L M N O P N H C . L M N O P
9 4 . Q R S T U O I D . Q R S T U
0 5 . V W X Y Z P K E . V W X Y Z
Figure 4-3
A E I O U
. ..............
T N H B . A B C D E
V P J C . F G H IJ K
W Q K D . L M N O P
X R L F . Q R S T U
Z S M G . V W X Y Z
Figure 4-4
V W X Y Z
Q R S T U
L M N O P
F G H I K
A B C D E
. ..............
V Q L F A . A B C D E
W R M G B . F G H IJ K
X N S H C . L M N O P
Y T O I D . Q R S T U
Z U P K E . V W X Y Z
Figure 4-5
O
M N
J K L
F G H I
A B C D E
. ...............
O M J F A . E N A L U
N K G B . T R S F W
L H C . O IJ H Y X
I D . D C M V K
E . P G B Q Z
.
Figure 4-6
Z
W X Y
S T U V
N O P Q R
. ...............
M J F A . E N A L U
K G B . T R S F W
L H C . O IJ H Y X
I D . D C M V K
E . P G B Q Z
.
Figure 4-7
1 2 3 4 5 6 7 8 9 0
.................................
7 4 1 . A B C D E F G H I J
8 5 2 . K L M N O P Q R S T
9 6 3 . U V W X Y Z . , : ;
.
Figure 4-8
1 2 3 4 5 6 7 8 9
.............................
7 4 1 . A B C D E F G H I
8 5 2 . J K L M N O P Q R
9 6 3 . S T U V W X Y Z *
.
Figure 4-9
1 2 3 4 5 6 7 8 9
.............................
5 1 . A B C D E F G H I
6 2 . J K L M N O P Q R
7 3 . S T U V W X Y Z 1
8 4 . 2 3 4 5 6 7 8 9 0
Figure 4-10
1 2 3 4 5 6 7 8 9
.............................
0 8 5 1 . T E R M I N A L S
9 6 2 . B C D F G H J K O
7 3 . P Q U V W X Y Z 1
4 . 2 3 4 5 6 7 8 9 0
The variant equivalents for any plain text letter may be chosen
at will; thus, in Figure 4-1, e= 10, 15, 60, or 65; in Figure
4-2, e= AU, AZ, FU, FZ, LU or LZ.
In Figures 4-5 and 4-6, the letters in the square have been
inscribed in such a manner that, coupled with the particular
arrangement of the row and column coordinates, the number of
variants available for each plain text letter is roughly
proportional to the frequencies of the letters in the
plain text. Figure 35 incorporates a keyword on top of this
idea. [FR1]
HOMOPHONIC
Figure 4-11
A B C D E F G H IJ K L M N
08 09 10 11 12 13 14 15 16 17 18 19 20
35 36 37 38 39 40 41 42 43 44 45 46 47
68 69 70 71 72 73 74 75 51 52 53 54 55
87 88 89 90 91 92 93 94 95 96 97 98 99
O P Q R S T U V W X Y Z
21 22 23 24 25 01 02 03 04 05 06 07
48 49 50 26 27 28 29 30 31 32 33 34
56 57 58 59 60 61 62 63 64 65 66 67
00 76 77 78 79 80 81 82 83 84 85 86
The keyword TRIP is found by inspecting dinomes 01, 26, 51, and
76. (The lowest number in each of the four sequences.)
[FR1] [FR5]
The Russians added an interesting gimmick called the Disruption
Area. Consider Figure 4-12 and note the slashes under U - X
for the fourth level of dinomes. The famous VIC cipher used
this feature very effectively. [NIC4]
Figure 4-12
A B C D E F G H I J K L M N
14 15 16 17 18 19 20 21 22 23 24 25 26 01
27 28 29 30 31 32 33 34 35 36 37 38 39 40
58 59 60 61 62 63 64 65 66 67 68 69 70 71
81 82 83 84 85 86 87 88 89 90 91 92 93 94
O P Q R S T U V W X Y Z
02 03 04 05 06 07 08 09 10 11 12 13
41 42 43 44 45 46 47 48 49 50 51 52
72 73 74 75 76 77 78 53 54 55 56 57
95 96 97 98 99 00 ////////////// 79 80
The keyword NAVY is represented by dinomes 01, 27, 53, and 79.
01 I-J 26 U 51 N 76 E
02 K 27 V 52 O 77 F
03 L 28 W 53 P 78 G
04 M 29 X 54 Q 79 H
05 N 30 Y 55 R 80 IJ
06 O 31 Z 56 S 81 K
07 P 32 A 57 T 82 L
08 Q 33 B 58 U 83 M
09 R 34 C 59 V 84 N
10 S 35 D 60 W 85 O
11 T 36 E 61 X 86 P
12 U 37 F 62 Y 87 Q
13 V 38 G 63 Z 88 R
14 W 39 H 64 A 89 S
15 X 40 IJ 65 B 90 T
16 Y 41 K 66 C 91 U
17 Z 42 L 67 D 92 V
18 A 43 M 68 E 93 W
19 B 44 N 69 F 94 X
20 C 45 O 70 G 95 Y
21 D 46 P 71 H 96 Z
22 E 47 Q 72 IJ 97 A
23 F 48 R 73 K 98 B
24 G 49 S 74 L 99 C
25 H 50 T 75 M 00 D
68 32 10 90 22 48 05 76 51 11 88 64 84 20 36 45 23
e a s t e r n e n t r a n c e o f
48 22 68 84 23 52 09 99 36 04 76 05 90 56 51 36 68 35 22 67 97
--------------------------------------------------------------
2 1 3 4 1 3 1 4 2 1 4 1 4 3 3 2 3 2 1 3 4
11 45 44 66 76
--------------
1 2 2 3 4
Levels
(1) 22 23 09 04 05 22 11
(2) 48 36 36 35 45 44
(3) 68 52 56 51 68 67 66
(4) 84 99 76 90 97 76
A B C D E F G H IJ K L M N
01 02 03 04 05 06 07 08 09 10 11 12 13
26 27 28 29 30 31 32 33 34 35 36 37 38
51 52 53 54 55 56 57 58 59 60 61 62 63
76 77 78 79 80 81 82 83 84 85 86 87 88
O P Q R S T U V W X Y Z
14 15 16 17 18 19 20 21 22 23 24 25
39 40 41 42 43 44 45 46 47 48 49 50
64 65 66 67 68 69 70 71 72 73 74 75
89 90 91 92 93 94 95 96 97 98 99 00
So:
Levels
This method works because both the plain component (A,B..) and
the cipher component (01, 02..) are known sequences.
48 22 68 84 23 52 09 99 36 04 76 05 90 56 51 36 68 35 22 67 97
E F R M N E
R E E D
E O S N E D
N C E T A
Figure 4-11
A B C D E V W X Y Z
.........................................
A . T G A U R I E C A P .
B . S L I E Y F R N S T .
C . C N D O M E L T I H .
D . R A P T F ..... O Y S O V .
E . N T X N E C E R E D .
. . . .
. . . .
V . N O A T E A L E Z H .
W . I H R O Q ..... E T R T B .
X . O I E T A C N P E S .
Y . F T L O S A M T I U .
Z . I S N D R I E D O N .
.........................................
Figure 4-12
6 8 9 1 5 4 3 7 2 0
......................
7 .A A A C D E E I L N .
1 .A A C D E E H K N O .
3 .A B D E E H J N O R .
8 .A D E E H I N O R S .
9 .C E E G I N O R S T .
2 .E E F I M O Q S T T .
0 .E F I M O P R T T U .
5 .F I L N P R S T U X .
6 .I L N P R S T U W Y .
4 .L N O R S T T V Y Z .
......................
Figure 4-13
"Grandpre"
0 1 2 3 4 5 6 7 8 9
......................
0 .E N T R U C K I N G .
1 .Q U A R A N T I N E .
2 .U N E X P E C T E D .
3 .I M P O S S I B L E .
4 .V I C T O R I O U S .
5 .A D J U D I C A T E .
6 .L A B O R A T O R Y .
7 .E I G H T E E N T H .
8 .N A T U R A L I Z E .
9 .T W E N T Y F I V E .
......................
SACCO
BACONIAN
SUMMING-TRINOME
Q M D C V P L F N F D H N W J W L K D K N H B P V
R L T V M B K L W D W V H V K S H B C L P Q K J R
V W S M L K G C N R L R N K V M G F X W J R G M V
W G T J H Q K X F N Z V F D M L T B P L P V F L M
D C N W N H B C V Z N M L W Q F D H D W V Z B R V
K L C V C V R D H L R V T L F N C D K G M X W X M
D T S C B C L Z L R L M V T S Z N K B W V P B R N
C L R X R D C N K V P B T N T G H J Z L F Q F V K
B W D Z X P N H S P G H L K L F V Z L T V M L K D
P Q R N Z L Z D T B M N T G M N Z V F X K S F D C
L Z V T V F D F V R G C L P Q P N C D W V R J T N
H L Z L M V W N P V P D Z D W J P N W L R J K V M
X M D T S M G F D R D K L W J F L P J M S F Q W B
F N C B Z D K V W G Z S H B H D H J C X
C F H K M P R T W Z
...............................
B . 3 1 1 1 1 2 2 1 2 1 .
D . 4 1 3 3 1 1 1 3 4 2 .
G . 2 2 2 3 1 1 .
J . 1 1 1 1 1 1 2 1 1 1 .
L . 1 4 4 3 4 5 3 3 4 .
N . 4 1 4 3 1 1 1 2 3 3 .
Q . 2 2 1 1 1 1 .
S . 1 2 2 2 1 1 .
V . 1 4 1 3 4 4 4 3 4 3 .
X . 1 1 2 1 1 2 .
...............................
C F H K M P R T W Z
L . 1 4 4 3 4 5 3 3 4 .
V . 1 4 1 3 4 4 4 3 4 3 .
D . 4 1 3 3 1 1 1 3 4 2 .
N . 4 1 4 3 1 1 1 2 3 3 .
G . 2 2 2 3 1 1 .
B . 3 1 1 1 1 2 2 1 2 1 .
G*B + 6 2 2 3 1 1 = 15
G*B + 6 2 2 3 1 1 = 15
G*J + 2 2 2 3 1 1 = 11
G*Q + 4 3 = 7
G*S + 2 4 4 6 1 = 17 !
G*X + 2 6 = 8
B*J + 3 1 1 1 1 2 4 1 2 1 = 17
B*Q + 2 2 1 2 2 2 1 = 12
B*X + 1 1 2 2 2 4 = 12
C F H K M P R T W Z
...............................
B J . 4 2 2 2 2 3 4 2 3 2 .
D N . 8 2 8 7 2 2 2 5 7 5 .
G S . 3 4 4 5 1 1 2 .
L V . 2 8 1 7 7 8 9 6 7 7 .
Q X . 3 3 3 2 2 3 .
................................
K*T+: 4 35 - 42 - = 81
K*W+: 4 49 - 49 9 = 113
K*Z+: 4 35 - 49 - = 88
T*W+: 6 35 - 42 - = 83
T*Z+: 4 25 2 42 - = 73
W*Z+: 6 35 - 49 - = 90
Combinations:
C F K P T
H M W R Z
..................
B J . 6 4 5 7 4 . PHI(p) = 1962
D N . 16 4 14 4 10 . PHI(r) = 1132
G S . 7 9 - 1 3 . PHI(o) = 1670
L V . 3 15 14 17 13 .
Q X . - 6 6 - 4 .
..................
We convert the multiliteral text to uniliteral equivalents
using an arbitrary square for reduction to plain text.
C F K P T
H M W R Z
.................
B J . A B C D E .
D N . F G H IJ K .
G S . L M N O P .
L V . Q R S T U .
Q X . V W X Y Z .
.................
C F K P T
H M W R Z
.................
B J . A T M O S .
D N . P H E R I .
G S . C B D F G .
L V . K L N Q U .
Q X . V W X Y Z .
.................
ISOLOGS
Group No.
5 10 15
.............................................
A 82 26 56 31 03 74 83 96 98 42 32 52 97 01 15
A' 30 15 08 74 97 14 51 19 73 60 49 67 65 01 06
B 80 27 78 91 06 94 00 01 38 28 54 08 24 00 65
B' 45 64 79 91 81 69 67 25 38 89 41 56 32 52 03
C 63 62 93 39 18 43 15 88 10 48 26 45 84 50 39
C' 90 62 87 75 36 20 35 11 05 70 89 27 77 50 11
D 81 71 35 25 38 73 30 92 07 49 61 75 21 64 76
D' 35 19 99 01 38 99 97 45 02 32 04 11 58 92 16
E 38 72 89 11 47 99 92 64 14 68 13 36 53 38 81
E' 38 46 31 75 47 14 64 80 06 46 85 86 45 38 98
F 89 69 79 38 16 51 75 05 70 74 11 80 44 32 55
F' 26 12 18 38 78 94 88 93 37 28 11 27 22 05 04
G 28 12 02 77 30 31 19 97 99 62 27 86 56 06 53
G' 06 48 43 21 03 98 71 54 26 62 80 76 08 98 80
H 90 87 04 08 67 46 59 41 98 55 10 82 22 29 87
H' 44 10 55 29 00 59 72 82 28 55 87 30 07 08 93
J 46 72 93 62 45
J' 59 68 24 62 53
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
................... ....................
1 . 2 1 1 1 2 1 - 1 1 2 1 . 4 1 - 2 1 1 - 1 2 1
2 . 1 1 - 1 1 2 2 2 1 - 2 . 1 1 - 1 1 2 2 2 1 1
3 . 2 2 - - 1 1 - 5 2 2 3 . 1 2 - - 2 1 1 5 - 2
4 . 1 1 1 1 2 2 1 1 1 - 4 . 1 - 1 1 3 2 1 1 1 -
5 . 1 1 2 1 2 2 - - 1 1 5 . 1 1 1 1 2 1 - 1 2 1
6 . 1 3 1 2 1 - 1 1 1 - 6 . - 3 - 2 1 - 2 1 1 1
7 . 1 2 1 2 2 1 1 1 1 1 7 . 1 1 1 1 2 1 1 1 1 1
8 . 2 2 1 1 - 1 2 1 2 2 8 . 1 1 - - 1 1 2 1 2 3
9 . 1 2 2 1 - 1 2 2 2 1 9 . 1 1 2 1 - - 2 3 2 1
0 . 2 1 1 1 1 2 1 2 - 2 0 . 2 1 2 2 2 3 1 3 - 1
Message A Message B
(06 14 15 26 28 31 35 73 74 81 89 98 99)
(02 07 20 22 43 44 63 90)
(12 37 48 51 69 70 83 94)
(03 30 41 54 65 82 97)
(05 10 24 32 49 87 93)
(16 18 36 76 78 79 86)
(27 45 53 64 80 92)
(11 39 75 88)
(21 58 77 84)
(46 59 68 72)
(00 52 67)
(04 55 61)
(08 29 56)
(19 71 96)
(01 25)
(13 85) Single Dinomes:
(42 60) (38) (47) (50) (62) (91)
1 2 3 4 5 6 7 8 9 0
...................
1 . D N H E E A - A C O
2 . I T - O M E S E F T
3 . E O - - E A N B D R
4 . R Y T T S L V N O -
5 . N U S R P F - I L X
6 . P W T S R - U L N Y
7 . C L E E D A I A A N
8 . E R N I H A O D E S
9 . G S O N - C R E E T
0 . M T R P O E T F - U
6 8 9 1 5 4 3 7 2 0
...................
7 . A A A C D E E I L N
1 . A A C D E E H K N O
3 . A B D E E H J N O R
8 . A D E E H I N O R S
9 . C E E G I N O R S T
2 . E E F I M O Q S T T
0 . E F I M O P R T T U
5 . F I L N P R S T U X
6 . I L N P R S T U W Y
4 . L N O R S T T V Y Z
I can not over emphasize the value of isologs. The value goes
far beyond simple variant systems. Isologs produced by two
different code books or two different enciphered code versions
of the same plain text; or two encryptions of identical plain
text at different settings of a cipher machine, may all prove
of inestimable value in the attack on a difficult system.
Cryptograms
.
.
------------------------------------------
Cipher Code Enciphered Code
.
.
--------------------------------------------
Substitution Transposition Combined
. Substitution -
. Transposition
.
.-------------------------------------------
Monoalphabetic Multiple- Polyalphabetic
. Alphabetic
. Systems
.
.
Uniliteral ......................... Multiliteral
. .
. .
. .
Standard ... Mixed .
Alphabets Alphabets .
. .
. .
Keyword ... Random .
Mixed Mixed .
.
.
.
...............................
. .
Single Equivalent Variant ........
. .
. .
.................... .
. . .
Fixed Length Mixed Length .
Cipher Groups Cipher Groups .
. . .
. ....................... .
Biliteral...N-literal . . .
Monome-Dinome Others .
.
.
.
...................................
.
.
..........................
. .
Matrices with Non Bipartite
Coordinates
(Bipartite)
Here is the tentative plan for the balance of the course. Just
a plan - subject to revision.
LECTURES 5 - 7
LECTURES 8 - 12
LECTURES 13 - 18
LECTURE 19
LECTURES 20 - 23
LECTURES 24 - 25
1 3 1 1 8 2 0 9 1 4 7 1 1 8 4 1 4 5 1 8
8 5 1 4 4 5 1 8 1 9 1 5 1 4 2 2 9 1 2 1 2 5
1 4 1 5 1 8 2 0 8 3 1 1 8 1 5 1 2 9 1 4 1
Mv-2.
0 6 0 2 1 0 0 5 0 1 0 1 0 5 1 5 2 2 0 2 0 6 0 8 2
3 2 5 1 0 0 8 0 4 0 2 2 1 0 9 0 8 0 4 0 8 2 2 1 1
0 8 0 4 1 7 1 5 1 3 1 4 2 2 2 1 0 2 2 4 0 2 0 1 2
2 0 2 0 2 0 1 0 8 1 9 0 6 1 5 1 7 0 8 0 1 1 1 2 2
1 4 0 2 0 1 1 9 0 6 0 5 1 0 0 2 0 2 1 1 2 2 1 4 0
6 2 3 1 9 0 5 1 5 0 1 2 2 1 3 0 2 0 5 0 6 1 3 0 2
0 5 0 1 1 0 0 5 2 3 0 6 2 1 0 2 2 2 1 4 0 6 0 2 0
2 2 2 1 4 0 6 0 2 0 2 2 6 0 2 0 6 0 5 2 1 1 9 0 2
0 2 1 1 2 2 0 3 0 2 1 7 2 4 0 2 1 9 0 2 0 6 1 5 0
5 1 1 0 6 0 2 1 9 0 5 0 6 2 2 0 1 0 5 0 5 0 1 1 9
0 5 2 1 1 5 2 2 1 5 0 5 0 1 2 2 0 5 1 8 0 5 0 6 0
6 0 5 0 3
Divide the original cipher into pairs, noting that each pair
started with 0,1, or 2 and ended with 0 - 9. Construct a
matrix similar to Figure 3-2. (3 x 10) Fill in the matrix with
A=01, ending with Z=26. Used 00 =blank. Reduce by converting
dinomes to letters. Apply the Phi test and found mon-
alphabetic. Used frequency, VOC count, and consonant line to
identify B, H, E as vowels and N,D,X,C,I,Y,R,J, as possible
consonants. Marking the message with these assumptions, found
last eight characters to be a pattern word in Cryptodict as
TOMORROW. Working between cipher text and key alphabet
matrix, rest fell.
Mv-3.
5 3 2 4 1 5 4 5 3 2 2 4 4 3 2 5 1 2 4 3 2 4 2 3 1
5 4 4 4 5 4 5 3 2 5 1 4 3 4 4 1 4 1 5 2 1 4 1 1 5
4 3 4 5 3 5 2 1 2 3 3 5 1 2 5 1 1 4 2 1 5 3 3 3 4
5 3 2 4 4 2 3 1 5 4 5 4 5 2 4 4 3 2 4 1 4 4 4 3 2
1 2 5 3 2 4 4 3 4 4 2 4 1 5 4 4 4 5 2 4 4 3 3 5 2
1 5 3 3 3 1 3 1 4 4 4 1 5 4 5 4 4 5 1 4 3 2 5 1 5
2 3 2 4 1 5 5 2 2 4 4 3 1 5 3 1 3 3 1 3 3 1 4 5 5
3 2 4 1 3 4 5 2 1 2 5 3 3 5 2 2 4 3 4 1 3 1 2 4 5
4 4 5 2 3 3 4 4 3 3 2 2 3 3 3 5 3 3 4 5 2 1 3 5 2
4 4 4 4 4 4 5 3 2 1 5 1 3 1 5 5 2 2 4 4 3 1 5 3 1
2 4 5 1 1 3 1 4 2 4 4 4 3 3 4 3 1 5 2 2 3 5 2 4 2
5 3 5 2 1 3 3 1 3 3 1 2 3 1 2 1 3 1 4 3 3 4 5 3 3
1 2 1 3 4 4 4 1 2 4 4 3 3 3 1 2 1 4 3 2 2 4 3 3 3
1 3 2 4 5 1 2 2 5 3 5 1 2 5 3 2 3 3 5 1 2 5 1 1 4
4 4 1 5 4 5 4 1 4 3 2 4 4 4 2 4 1 3 4 5 1 5 2 2 1
2 5 1 4 5 1 2 1 3 2 4 4 5 3 2 1 2 5 1 4 4 1 5 1 3
1 4 2 5 2 4 2 4 4 5
[BAR2] Barker, W., ed., History of Codes and Ciphers in the U.S.
During the Period between World Wars, Part II, 1930 -
1939., Aegean Park Press, 1990.
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[BRIT] Anonymous, "British Army Manual of Cryptography", HMF,
1914.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 11
SUMMARY
ZEN CRYPTO
10 20 30 40
BGZEY DKFWK BZVRM LUNYB QNUKA YCRYB GWMKC DDTSP
50 60 70 80
OFIAK OWWHM RFBLJ JQFRM PNIQA VQCUP IFLAZ HKATJ
130 140
JFTAJ EMRAS QKZSQ FOPHM W.
Delta Factors
BG 29 -
RM 45 3,5,9
KA 53 -
MR 77 7,11
QA 39 3,13
VQ 17 -
AZ 40 4,5,8,10
AT 26 13
UV 31 -
EK 9 3,9
KES 10 5,10 .... this trigraph more important
SQ 4 4 than QA or AT digraphs.
Suggest that the period is
either 5 or 10. Practice dictates
that the larger number is the
proper.
Given:
10 20 30 40
RNQJH AUKGV WGIVO BBSEJ CRYUS FMQLP OFTLC MRHKB
50 60 70 80
BUTNA WXZQS NFWLM OHYOF VMKTV HKVPK KSWEI TGSRB
MWWK.
A 6 45 83 89 92 115
B 16 17 40 41 80 86 104
C 21 35
D ---
E 19 74 91 93
F 26 32 52 60 87
G 9 12 77 84 98 100 109
H 5 38 57 66 108 116
I 13 75 106
J 4 20 85 94 111
K 8 39 63 67 70 71 105 112 118 124
L 29 34 54 81 88 103 117
M 27 36 55 62 90 121
N 2 44 51 82
O 15 31 56 59
P 30 69
Q 3 28 49
R 1 22 37 79
S 18 25 50 72 78 101
T 33 43 64 76 110 119
U 7 24 42 114 120
V 10 14 61 65 68 97 102
W 11 46 53 73 95 96 122 123
X 107
Y 23 47 58 113
Z 48 99
Table 11-1
3 4 5 6 7 8 9 10 11 12
-------------------------------
A 3 1 1 1 1 1 2 1
B 9 7 4 5 3 7 4 2 1 2
C 1 1 1 1 1
D
E 1 1 1 1 1 1 1
F 2 3 3 1 2 1 1 1 1
G 5 5 4 1 4 3 2 1 3 1
H 6 3 2 2 3 1 1 2 1
I 1
J 3 1 2 1 1 1 3 1
K 13 10 4 9 8 5 3 1 2 3
L 4 3 4 1 4 1 3 1 2
M 4 2 3 2 6 3 1 1
N 1 1 1 1 3 1 1
O 1 3 1 1 1 1
P 1
Q 1 1 1
R 5 1 1 3 2 1 1
S 4 4 2 3 2 1 1 1 1
T 4 3 1 1 2 1 1 2 2
U 5 1 2 5 1 2 3 1 2 2
V 5 6 2 2 1 2 3 1 1
W 9 4 5 3 8 1 4 4 3 1
X
Y 2 2 3 2 1 2 1 3 1
Z 1
---------------------------------
87 61 47 43 57 30 35 21 25 16 Columns total
X 3 4 5 6 7 8 9 10 1 112 times period
----------------------------------
261 244 235 258 399 240 315 210 275 192 Total
===
The period is 7.
Figure 11-1
a b c d e f g h i j k l m n o p q r s t u v w x y z
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
Figure 11-2
ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZ
GHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZABCDEF
* *
WHICH WAY ?
Key B E D B E D B E D
Plain S E N D S U P P L
Cipher T I Q E W X Q T O
I E S T O M O R L
J I V U S P P V O
E Y S S T A T I O
F C V T X D U M R
N
O
which gives:
5 10 15 20 25
T I Q E W X Q T O J I V U S P P V O F C V T X D U
30
M R O X X (two ending nulls and a bad choice at that)
Figure 11-3
Deciphering with the Key:
Key : B E D B E D B E D B E D ........
Cipher: T I Q E W X Q T O J I V ........
Plain : S E N D S U P P L I E S ........
U S Z H L W D B P B G G F S ...
Figure 11-4
Probable Word:
*
S C A H P T E L J X J O O N A
U Y F N R C J H V H M M L Y
P K S W H O M A M R R Q D
P S W H O M A M R R Q D
L A L S Q E Q V V U H
I O V T H T Y Y X K
E Z X L X C C B O
S O
*
Look down at an angle between the stars to find the key word
COMET. The first letter S was used to decipher every possible
key letter which can produce S. The entire row of equivalents
were produced at the same time. The resulting rows of
decipherment indicate all the possible keyletters that could
produce S, then U, then P, and so on. Carter actually
shortened the procedure to three full rows and then partials
thereafter. He assumes that the keyword is readable and
discards non readable text.
A scheme like Carters can be used with the trigrams THE, AND..
replacing the word SUPPLIES. Refer to Figure 11-5.
Given:
10 20 26
L N F V E O L N V M R N G Q F H H R N H I R V F E B
Figure 11-5
ION Trial 1
LNF NFV FVE VEO EOL OLN LNV NVM VMR MRN RNG NGQ
AZS FRI XHR NQB WAY GXA DZI FHZ NYE EDA JZT FSD
---
GQF QFH FHH HHR HRN RNH NHI HIR IRV RVF VFE FEB
YCS IRU XTU ZTE ZDA ZJU FTV ZUE ADI JHS NRR XQO
EDA Trial 2
LNF NFV FVE VEO EOL OLN LNV NVM VMR MRN RNG NGQ
HKF JCV BSE RBO ALL KIN HKV JSM RJR ION NKC JDQ
---
GQF QFH FHH HHR HRN RNH NHI HIR IRV RVF VFE FEB
CNF MCH BEH DER DON NKH JEI DFR EOV NSF RCE BBB
Trial 1 tests for THA, THE, AND fail but ION gives us FRI and
WAY. But anyone of these 24 decipherments on the second row
might be a fragment of the original key. Trial 2 fails to
confirm FRI or WAY but test of key-fragment EDA yields ION.
If this sequence is actually a portion of the original key,
then the plaintext will be brought out at some constant
distance apart. The point we found the trigram is the tenth
cryptogram letter; that is every trigram presents only one new
letter so to find a completely different trigram in either
direction, we must count backwards or forwards a distance of
three trigrams.
1234567
PXIZHGV
GEUUOXI
XMYEEJZ
COCMOWZ
CLFMTOR
ISIGHLK
WPSMSID
XWCFBRK
PYXOPRJ
ILHFMCR
IHUDULV
RLJFVVV
SHTYFRR
GPHQWII
BLXQXMM
TDVGUEI
TFMQEEJ
HWUHFW
Now each column represents a separate simple substitution
cipher. They will not produce consecutive plaintext, but
merely show isolated letters in that particular substitution,
to be coupled with those letters that fall on either side in
other substitutions, to make a true plain text sequence. Here's
where the underlined high-frequency letters on the slide come
in:
High frequency letters don't always show up. Some times medium
frequency letters may be required. So with C under A: G-E, I-
G,P-N, T-R, X-V; With C under E:G-I, I-K, P-R, T-V, X-Z; With C
under the H: G-L, I-N, P-U, T-Y, X-C; with C under the I: G-
M,I-O,P-V, T-Z, X-D; and with C under the N: G-R, I-t, P -A, T-
E, X-I (six hits); and we have found the setting. So we set P
under the A in the top slide, and decipher the entire column A
R I N N T H I A T T C D R, and write it into a blank column as
column 1.
B E R
-----
G C E
N T R
O F I
N S I
S K A
G H T
R E M
A N T
O N S
L Y A
T H E
U R E
E N A
V E R
W I V
T A R
D A S
E S -
These are almost all good fragments. The GHT must have an I or
U before it. Since cipher letter G is involved, we place the G
under the I which results in the Y we already had and putting G
under the U gives us M under the A, we choose the latter.
With the Viggy cipher, remember to read the setting for the
keyword letter below the A of the Stationary slide; and the
plain text appears on the same slide as this A, while the
cipher text is in the lower slide.
PRIMARY COMPONENTS
There are, not two, but four letters involved in every case of
finding equivalents by means of sliding components;
furthermore, the determination of an equivalent for a given
plaintext letter is represented by two equations involving four
equally important elements, usually letters.
Consider this juxtaposition:
1. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
2. F B P Y R C Q Z I G S E H T D J U M K V A L W N O X
Figure 11-6
Index Plain
* *
1. Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
2. Cipher:FBPYRCQZIGSEHTDJUMKVALWNOXFBPYRCQZIGSEHTDJUMKVALWNOX
* *
Key Cipher
Figure 11-6b
Index Cipher
* *
1. Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
2. Cipher:FBPYRCQZIGSEHTDJUMKVALWNOXFBPYRCQZIGSEHTDJUMKVALWNOX
* *
Key Plain
Since equations (I) and (II) yield different results even with
the same index, key and plain text letters, it is obvious that
a more precise formula is required. Adding locations to these
equations does the trick.
In shorthand notation:
Table 11-2
The first two equations (1) and (2) define the Vigenere type of
encipherment and are widely used. Equations (5) and (6) define
the Beauford type and Equations (9) and (10) define the
Delastelle type of encipherment. [FR7]
Table 11-3
Table 11-4
Number Expected Number of Trigraphs Occurring
of Exactly x Times
Letters E(2) E(3) E(4)
--------------------------
100 .269 .001
200 1.10 .004
300 2.48 .014
400 4.40 .033
500 6.85 .064
600 9.81 .111 .001
700 13.3 .175 .002
800 17.3 .261 .003
900 21.8 .371 .005
1000 26.8 .505 .008
Table 11-5
Table 11-6
Plaintext Message:
Cipher Alphabets
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
---------------------------------------------------
1. B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
2. L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
3. U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
4. E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
B L U E B L U E B L U E B L U E B L U E B L U E ...
T H E A R T I L L E R Y B A T T I L I O N M A R ...
Cipher Text
USYES ECPMP LCCLN XBWCS OXUVD SCRHT
HXIPL IBCIJ USYEE GURDP AYBCX OFPJW
JEMGP XVEUE LEJYQ MUSCX JYMSG LLETA
LEDEC GBMFI
4 1 4 1 1 1 1 1 3 1 1 1 1 1 4 Phi =42
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z I.C.=1.68
1 2 4 1 2 1 4 4 1 1 2 2 Phi=44
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z I.C.=1.91
1 5 1 1 1 1 5 2 1 1 2 1 1 2 Phi=46
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z I.C.=1.99
1 6 2 2 1 1 1 1 2 2 1 1 3 1 Phi=44
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z I.C.=1.91
5 10 15 20 25
A. A U K H Y J A M K I Z Y M W M J M I G X N F M L X
B. E T I M I Z H B H R A Y M Z M I L V M E J K U T G
C. D P V X K Q U K H Q L H V R M J A Z N G G Z V X E
D. N L U F M P Z J N V C H U A S H K Q G K I P L W P
E. A J Z X I G U M T V D P T E J E C M Y S Q Y B A V
F. A L A H Y P O I X W P V N Y E E Y X E E U D P X R
G. B V Z V I Z I I V O S P T E G K U B B R Q L L X P
H. W F Q G K N L L L E P T I K W D J Z X I G O I O I
J. Z L A M V K F M W F N P L Z I O V V F M Z K T X G
K. N L M D F A A E X I J L U F M P Z J N V C A I G I
L. U A W P R N V I W E J K Z A S Z L A F M H S
Figure 11-7
0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
2 H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
3 I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
4 T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
5 E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
A U K H Y J A M K I Z Y M W M J M I G X N F M L X
E N C O U N T E R E D R E D I N F A N T R Y E S T
Sigma(I.C.)= 7.0711/sqrt[N(N-1)]
Using the previous example, we let the first ten cipher letters
in each alphabet be set down in a horizontal line and the
assumption is made that the alphabets are direct standard with
normal sequences. See Figure 11-8.
We use the following selection rules:
Figure 11-8
Alphabet 5
1 YIMXXIRMEG
2 ZJNYYJSNFH
3 AKOZZKTOGI
4 2 BLPAALUPHJ
5 CMQBBMVQIK
6 4 DNRCCNWRJL
7 EOSDDOXSKM
8 5 FPTEEPYTLN
9 GQUFFQZUMO
10 4 HRVGGRAVNP
11 4 ISWHHSBWOQ
12 JTXIITCXPR
13 KUYJJUDYQS
14 LVZKKVEZRT
15 3 MWALLWFASU
16 NXBMMXGBTV
17 3 OYCNNYHCUW
18 PZDOOZIDVX
19 QAEPPAJEWY
20 RBFQQBKFXZ
21 4 SCGRRCLGYA
22 3 TDHSSDMHZB
23 *8 UEITTENIAC
24 VFJUUFOJBD
25 WGKVVGPKCE
26 XHLWWHQLDF
VARIANT CIPHER
T E N T T E N T
------- -------
C O M E J K Z L
A T O N H P B U
C E - - J A - -
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
UALOT SILKH RWEBN NRHNL THURD VPVCH DLSUC OABSM YMXFO QAUBR
NFHFR IBAOH YTMWT ENJVQ UPZHF AQWGZ MVHTB OENJD IGIMF SULUA
BPMLZ RNFNX SMJTG DJHAF EKKSZ QWDZQ CLVRN FZXBZ WISTJ LMRNH
RZ.
BEAUFORT CIPHER
A third member of the Viggy family, the Beaufort, and while the
same procedure is applied, the slides (or tables) are
different. One is a normal alphabet, extending double length
A-Z; the other is reversed, double length Z-A. So if I = T at
one setting, then T=I at the same setting. It does not matter
what the index for the key is, the results are the same.
So:
ABCDEFGHIJKLMNOBQRSTUVWXYZABCDEFGHIJKL
TSRQPONMLKJIHGFEDCBAZYWXVUTSRQPONMLKJI
* *
T E N T T E N T
------- -------
C O M E R Q B P
A T O N T L Z G
C E - - R A --
BEAUFORT SOLUTION BY COMPUTER NEEDS WORK
LDYUP AKUPT LVDTO BXUFW SERZP QMQPD NITHA NXUHE UGZTG HMGSM
SRCUF LBQPZ XRYOB FDMNZ TGCUP QQUFB PANAQ HBOON XOOQP DJCJK
TPFDV TBRKL TTSZG ODUFB TETEL POIEB HRTSM DBGGA YUT.
RELATIONSHIPS
a. Plaintext = (Ciphertext(Variant)) +
Ciphertext(Vigenere))/2(modulo 13)
c. Plaintext = (Ciphertext(Vigenere)) -
Ciphertext(Beaufort))/2(modulo 13)
d. Key = (Ciphertext(Vigenere) +
Ciphertext(Beaufort))/2(modulo 13)
Table 11-7
A B C D E F G H I J K L M
AB N O P Q R S T U V W X Y Z
A B C D E F G H I J K L M
CD O P Q R S T U V W X Y Z M
A B C D E F G H I J K L M
EF P Q R S T U V W X Y Z N O
A B C D E F G H I J K L M
GH Q R S T U V W X Y Z N O P
A B C D E F G H I J K L M
IJ R S T U V W X Y Z N O P Q
A B C D E F G H I J K L M
KL S T U V W X Y Z N O P Q R
A B C D E F G H I J K L M
MN T U V W X Y Z N O P Q R S
A B C D E F G H I J K L M
OP U V W X Y Z N O P Q R S T
A B C D E F G H I J K L M
QR V W X Y Z N O P Q R S T U
A B C D E F G H I J K L M
ST W X Y Z N O P Q R S T U V
A B C D E F G H I J K L M
UV X Y Z N O P Q R S T U V W
A B C D E F G H I J K L M
WX Y Z N O P Q R S T U V W X
A B C D E F G H I J K L M
YZ Z N O P Q R S T U V W X Y
T E N T T E N T
C O M E Y M S N
A T O N W E I E
C E - - Y T - -
Table 11-8
Plain Text
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
---------------------------------------------------
A,B N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
C,D O P Q R S T U V W X Y Z N M A B C D E F G H I J K L
E,F P Q R S T U V W X Y Z N O L M A B C D E F G H I J K
G,H Q R S T U V W X Y Z N O P K L M A B C D E F G H I J
I,J R S T U V W X Y Z N O P Q J K L M A B C D E F G H I
K,L S T U V W X Y Z N O P Q R I J K L M A B C D E F G H
M,N T U V W X Y Z N O P Q R S H I J K L M A B C D E F G
O,P U V W X Y Z N O P Q R S T G H I J K L M A B C D E F
Q,R V W X Y Z N O P Q R S T U F G H I J K L M A B C D E
S,T W X Y Z N O P Q R S T U V E F G H I J K L M A B C D
U,V X Y Z N O P Q R S T U V W D E F G H I J K L M A B C
W,X Y Z N O P Q R S T U V W X C D E F G H I J K L M A B
Y,Z Z N O P Q R S T U V W X Y B C D E F G H I J K L M A
2 6 2 1 6 1 5 3 1 6 5 1 2 3 3 3 2 2 1
1. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
4 2 5 1 3 4 4 1 2 3 1 2 4 9 1 2 5
2. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
5 3 3 2 5 1 1 3 4 7 2 2 4 8 1 1 2
3. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 1 4 4 2 2 3 3 1 9 2 2 3 1 1 3 3 2 2 4
4. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
5 2 2 2 4 3 2 1 6 2 4 9 1 3 7 1
5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Now we can divide the M and N distributions, and each half may
be used to fit a normal distribution. In alphabet 1, the
sequence CDEFGHIJ cipher may easily be recognized as NOPQRSTU
plain; this would fix the keyletters as WX, and therefor the
A...Mplain sequence should begin with Ycipher. In alphabets
2,3, and 5 the RSTplain sequence may be spotted at BCDcipher,
ABCcipher, and CDEcipher, respectively, whereas in alphabet 4,
if Ncipher = Eplain, then Ecipher = Nplain; therefore the
original assumptions for the first halves will be confirmed by
the goodness of fit of the distributions for the second halves.
The keys fore these 5 alphabets are derived as (W,X), (G,H)
(I,J), (S,T), and (E,F); from these letters we get WHITE.
P K T F F C D V I T O B V Z X C V R E E G I V J E
T P R K T O Q C F L P B V P X ....
The generatrixes with the highest scores are the correct ones.
MODIFIED PORTA
A,B A B C D E F G H I J K L M
Z Y X W V U T S R Q P O N
C,D A B C D E F G H I J K L M
N Z Y X W V U T S R Q P O
P K T F F C D V I T O B V Z X C V R E E G I V J E
2 1 2 1 1 1 1 2 1 2 2 1 2 2 2 1 2 2 1 1 1 1 2 1 1
T P R K T O Q C F L P B V P X ....
2 2 2 1 2 2 2 1 1 1 2 1 2 2 2
Use the probable word INFANTRY, which has the class notation of
12112222, but in encipherment is reversed to 21221111 pattern.
At position 15, X C V R E E G I, we find:
plain I N F A N T R Y
cipher X C V R E E G I
key E W G I S E W G
derived F X H J T F X H
The process took less than two minutes but did not yield the
actual keyword or require it.
GRONSFELD
... 9 8 7 6 5 4 3 2 1 0 1 2 3 4 5 6 7 8 9 ...
One half the digits are used for encipherment and the other
half for decipherment. For example the key is derived as
follows:
C O N S T I T U T I O N
1 6 4 8 9 2 10 12 11 3 7 5
So back to:
6 2 3 4 6 2 3 4
C O M E I Q P I
A T O N G V R R
C E - - I G - -
Slide method: put the 0 over the C, take the letter to the
right in juxtaposition of the 6 = I, same for A which is G
and so on. We decipher by looking to the left.
A typical decipherment might look like this for the test word
"YOUR":
0 2 4 7 0 2 4 7 0 2 4 7 0 2
T S V H Y Q B V Y I G L M G U X A S R M F K C I A A O V I Z
-----------------------------------------------------------
S R U G Y O U R X F H K M E N T Z R Q L F I V E Z Z N U I X
------- ------- ------- ---
R Q T F W G E J Y Q P K Y Y M T
Q P S E V F D I X P O J W W K R
T S V H Y Q B V Y I G L M G U X A S R M F K C I A A O V I Z
-----------------------------------------------------------
Y 9 0 3 0 8 8 2 7 4 2 2
O 2 7 6 4 0
U 7 4 3 1
R 4 9
LECTURE 11 PROBLEMS
11.1 Viggy.
11.2 Beaufort.
11.3 Variant.
11.4 Gronsfeld.
0 D E C O R A T I V B F G H J K L M N P Q S V W X Y Z
1 H J K L M N P Q S V W X Y Z D E C O R A T I V B F G
2 A T I V B F G H J K L M N P Q S V W X Y Z D E C O R
3 R A T I V B F G H J K L M N P Q S V W X Y Z D E C O
4 D E C O R A T I V B F G H J K L M N P Q S V W X Y Z
5 E C O R A T I V B F G H J K L M N P Q S V W X Y Z D
(BUSINESSACTIVITYDURINGAPERIOD)
0 S T O C K A B D E F G H I J L M N P Q R U V W X Y Z
1 E T B C D F G H I J L N O P Q S U V W X Y Z M A R K
2 X Y Z M A R K E T B C D F G H I J L N O P Q S U V W
3 C D F G H I J L N O P Q S U V W X Y Z M A R K E T B
4 H I J L N O P Q S U V W X Y Z M A R K E T B D E F G
5 A R K E T B C D F G H I J L N O P Q S U V W X Y Z M
6 N O P Q S U V W X Y Z M A R K E T B D E F G H I J L
7 G H I J L N O P Q S U V W X Y Z M A R K E T B D E F
8 E T B C D F G H I J L N O P Q S U V W X Y Z M A R K
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[FOWL] Fowler, Mark and Radhi Parekh, " Codes and Ciphers,
- Advanced Level," EDC Publishing, Tulsa OK, 1994.
(clever and work)
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[KAH3] Kahn, David, "Seizing The Enigma: The Race to Break the
German U-Boat Codes 1939-1943 ", Houghton Mifflin, New
York, 1991.
[LAIM] Lai, Xuejia, and James L. Massey, "A Proposal for a New
Block Encryption Standard," Advances in Cryptology -
Eurocrypt 90 Proceedings, 1992, pp. 55-70.
[LAKE] Lakoff, R., "Language and the Women's Place," Harper &
Row, New York, 1975.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson,
New York, 1992.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[OTA] "Defending Secrets, Sharing Data: New Locks and Keys for
Electronic Information," Office of Technology
Assessment, 1988.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
April 6, 1996
Revision 0
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 10
SUMMARY
POLYALPHABETIC SUBSTITUTION
Example:
Plain A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher 1 R T U V W X Y Z P E N C I L S A B D F G H J K M O Q
" 2 E N C I L S A B D F G H J K M O Q R T U V W X Y Z P
" 3 D F G H J K M O Q R T U V W X Y Z P E N C I L S A B
1-2-3-1-2-3-1-2-3-1-2-3-1-2-3-1-2-3-1-2-3-1-2-3
Plain - M Y C O U R S E Z E R O T H R E E Z E R O A T T
Cipher - I Z G S V P F L B W R X G B P W L B W R X R U N
1-2-3-1-2-3-1-2-3-1-2-3-1-2-3-1-2-3
Plain - H I R T E E N T H I R T Y T H R E E
Cipher - Z D P G L J L U O P R N O U O D L J
PRINCIPLES OF FACTORING
A simple example:
Factoring:
LBWRX 9 3,3 3
LJ 12 2,2,3 3
UO 6 2,3 3
Alpha. - 1 2 3 4 5 6 7 8 9 10 Alpha. - 1 2 3 4 5 6 7 8 9 10
1 K P T X S L I C T M 16 M V H A W A D G G Z
2 I A M C B B N M S Z 17 Y F A R Q V K M M Q
3 M J K A Q J B F Z A 18 K F M P S L G X A H
4 J G M B S L N P H H 19 E F W K G C B F T H
5 E E J Z W N C L O W 20 S V C B B U A H S S
6 Z F S A A S Z D E P 21 K P K D E C G O H Z
7 Z X C D J D D H A J 22 L V O D S C O C H A
8 O D B K A H P L G H 23 G V W B Z C A M O Z
9 A J M K T V A M K H 24 M J K A Q J B F J H
10 M B C A A C N W S Z 25 X B H A A V A K O S
11 Z D W I J K G M C X 26 K P K G U L T J O Q
12 M V X X U N B W Z T 27 D F Q Q J K K M H Z
13 I Y N C P O G H H W 28 H V H A E P Z W Q R
14 L G T B W P L V T T 29 O P L A U L B M O Z
15 O B O X J L R M H Z 30 M J K A Q J B F
Collateral Information:
The Black and Blue Fleets are engaged in war maneuvers in the
Caribbean Sea. The Fleets are not in contact. The location of
the enemy (the Black Fleet) is unknown. The message in
question was intercepted by the Blue Flagship at 0015 on 14
April 1930. The operator had reason to believe that a cruiser
sent the message.
The composition of the Black Fleet is as follows:
Battleships Cruisers
Factoring:
Frequency Tables
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
A 1 A 1 A 1 A 9 A 4 A 1 A 4 A A 2 A 2
B B 3 B 1 B 4 B 2 B 1 B 6 B B B
C C C 3 C 2 C C 5 C 1 C 2 C 1 C
D 1 D 2 D D 3 D D 1 D 2 D 1 D D
E 2 E 1 E E E 2 E E E E 1 E
F F 5 F F F F F F 4 F F
G 1 G 2 G G 1 G 1 G G 4 G 1 G 2 G
H H H 3 H H H 1 H H 3 H 6 H 6
I 2 I I I 1 I I I 1 I I I
J 1 J 4 J 1 J J 4 J 3 J J 1 J 1 J 1
K 4 K K 5 K 1 K K 2 K 2 K 1 K 1 K
L 2 L L 1 L 1 L L 6 L 1 L 2 L L
M 7 M M 4 M M M M M 8 M 1 M 1
N N N 1 N N N 2 N 3 N N N
O 3 O O 2 O O O 1 O 1 O 1 O 5 O
P P 4 P P 1 P 1 P 2 P 1 P 1 P P 1
Q Q Q 1 Q 1 Q 4 Q Q Q Q 1 Q 2
R R R R 1 R R R 1 R R R 1
S 1 S S 1 S S 4 S 1 S S S 3 S 2
T T T 2 T T 1 T T 1 T T 3 T 2
U U U U U 3 U 1 U U U U
V V 6 V V V V 3 V V 1 V V
W W W 3 W W 3 W W W 3 W W 2
X 1 X 1 X 1 X 3 X X X X 1 X X
Y 1 Y 1 Y Y Y Y Y Y Y Y
Z 3 Z Z Z 1 Z 1 Z Z 2 Z Z 2 Z 9
30 30 30 30 30 30 30 30 29 29
OBVIOUS LOCATION
Original Assumptions -
Check
Check
MCZ MVX lines 1-12
TWE NTY excellent
M M PH poor
H V DP poor
HZ =1 ZMV=1 ZM =4 HA=1
RE ENT EN ON Trenton is only assumption
EM MPH MP IS
UN NDR ND ED
With a non repeating key or very long key, this method fails.
With a fairly short key we employ this method provided:
Our Navy students would try the scouting line of cruisers as:
4 3 1 2
MEMPHIS RICHMOND TRENTON MARBLEHEAD
2 1 OR 3 4
MARBLEHEAD TRENTON RICHMOND MEMPHIS
(flag)
MEMPHISRIC MARBLEHEAD
HMONDTRENT OR TRENTONRIC
ONMARBLEHE HMONDMEMPH
AD IS
Line 14 LGTBWPLVTT
--MEMPHISR
Line 15 OBOXJLRMHZ
ICHMONDTRE
Line 16 MVHAWADGGZ
NTONMARBLE
check
COURSEZERO COURSETHRE
FOUR EZERO
COURSEONET COURSETHRE
WO EONE
COURSETHRE
ETHREE (checks with #9 in Table I)
Assumption
Line 22 LVODSCOCHA
ETHREEZERO
TABLE I
Lines Reference
6-7 ZFSAASZDEPZXCDJD 1
8-9 KAHPLGHAJMKTVAMK 2
8-9 HAJMKTVAMKHMBCAA 3
10-11 ZZDWIJKGMCZMVXXU 4
15-16 ZMVHAWADGGZYFARQ 5
17-18 FARQVKMMQKFMPSLG 6
18-19 FPMSLGXAHEFWKGCB 7
18-19 HEFWKGCBFTHSVCBB 8
21-22 DECGOHZLVODSCOCH 9
21-22 CGOHZLVODSCOCHAG 10
21-22 HZLVODSCOCHAGVWB 11
22-23 VCDSCOCHAGVWBZCA 12
22-23 COCHAGVWBZCAMOZM 13
24-25 AQJBFJHXBHAAVAKO 14
25-26 OSKPKGULTJOQDFQQ 15
28-29 AEPZWQROPLAULBMO 16
29-30 AVLBMOZMJKAQJBF 17
TABLE II
Alpha. - 1 2 3 4 5 6 7 8 9 10 Alpha. - 1 2 3 4 5 6 7 8 9 10
1 K P T X S L I C T M 16 M V H A W A D G G Z
C O M E N E N T O N R E
2 I A M C B B N M S Z 17 Y F A R Q V K M M Q
T N A T T E D S T
3 M J K A Q J B F Z A 18 K F M P S L G X A H
N H U N D R E D O C T E N T Y I
4 J G M B S L N P H H 19 E F W K G C B F T H
T E E N A R I S S P E E D I
5 E E J Z W N C L O W 20 S V C B B U A H S S
R L N E T E E N K N O T S
6 Z F S A A S Z D E P 21 K P K D E C G O H Z
N C O U R S E T H R E
7 Z X C D J D D H A J 22 L V O D S C O C H A
E R R O E T H R E E Z E R O
8 O D B K A H P L G H 23 G V W B Z C A M O Z
S O N I A T S E V E N T E E
9 A J M K T V A M K H 24 M J K A Q J B F J H
H T S N T I N H U N D R E D I
10 M B C A A C N W S Z 25 X B H A A V A K O S
N E N E A S T E O N N U E S
11 Z D W I J K G M C X 26 K P K G U L T J O Q
S U T T W E C O U T I N R E
12 M V X X U N B W Z T 27 D F Q Q J K K M H Z
N T Y M I L E S U S T R E
13 I Y N C P O G H H W 28 H V H A E P Z W Q R
I H T O R N T O N S S
14 L G T B W P L V T T 29 O P L A U L B M O Z
E E O N N I N E T E E
15 O B O X J L R M H Z 30 M J K A Q J B F
H M N T R E N H U N D R E D
TABLE III
DECIPHERING TABLE
PLAIN- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 G K L M
2 J P V
3 C O H J W K X
4 B X A D K
5 Q S U B G E Z
6 C U N L
7 N B A G O
8 F C O H W M
9 O H S C
10 Z H A S
TABLE IV
ENCIPHERING TABLE
PLAIN- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 G K L M
2 J P V
3-6-8 F C O U N L H J W M K X
4-7 N B X A D K G O
5 Q S U B G E Z
9 O H S C
10 Z H A S
Example:
1 3 5 7 9 11
1 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
2 A D G J M P S V Y B E H K N Q T W Z C F I L O R U X
3 A F K P U Z E J O T Y D I N S X C H M R W B G L Q V
4 A H O V C J Q X E L S Z G N U B I P W D K R Y F M T
5 A J S B K T C L U D M V E N W F O X G P Y H Q Z I R
6 A L W H S D O Z K V G R C N Y J U F Q B M X I T E P
Example:
Plain - D I P L O M A C Y B E F G H J K N Q R S T U V W X Z
Cipher - V W X Z T H U R S D A Y B C E F G I J K L M N O P Q
Plain - D L A B G K R U X I O C E H N S V Z P M Y F J Q T W
Cipher - V Z U D B F J M P W T R A C G K N Q X H S Y E I L O
Example:
Plain - D I P L O M A C Y B E F G H J K N Q R S T U V W X Z
Cipher - X Z T H U R S D A Y B C E F G I J K L M N O P Q V W
Plain - D L A B G K R U X I O C E H N S V Z P M Y F J Q T W
Cipher - X H S Y E I L O V Z U D B F J M P W T R A C G K N Q
When the same sequence has been used for each of the cipher
components of a multiple alphabet system, there are definite
relationships between the individual cipher values which may be
used in recovering other cipher values after a few have been
identified through analysis.
(b) When the plain and cipher components are originally the
same mixed sequence, the plain component enters into the
reconstruction in the same manner as the other cipher
component.
Plain 0 - D I P L O M A C Y B E F G H J K N Q R S T U V W X Z
Cipher 1 - O P Q V W X Z T H U R S D A Y B C D F G I J K L M N
2 - N O P Q V W X Z T H U R S D A Y B C E F G I J K L M
3 - E F G I J K L M N O P Q V W X Z T H U R S D A Y B C
Plain 0 - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher 1 - Z U T R D A P V C W G I H
2 - X H Z N U D O W B V E F G T
3 - L E P W F I K T J U R S
0 T S E I R B Y
1 I S G R P F U O E H T
2 I S G R P F U O E H T
3 I S G R P F U O E H T
0 O L T S E I R B Y N C
1 W J V I S G R P F U O E H C T B Z
2 W J V I S G R P F U O E H C T B Z
3 W J V I S G R P F U O E H C T B Z
0 M H O G L T S E I R B Y N C A
1 L X K A W J D V I S G R P F U O E H C T B Z
2 K A W J D V I S G R P F U O E H C T B Z L X
3 X K A W J D V I S G R P F U O E H C T B Z L
The intervals between E, F, G and between V, W, X in the cipher
sequence obtained above, indicate the equivalent alphabets have
been recovered which should be re-spaced by counting off every
third letter in the reverse direction.
0 I L O M A C Y B E G H N R S T
1 O P V W X Z T H U R S D A B C E F G I J K L
2 O P V W X Z T H U R S D A B C E F G I J K L
3 E F G I J K L O P V W X Z T H U R S D A B C
Line 1 Line 18
Alpha 1 2 3 4 5 6 7 8 9 10 Alpha 1 2 3 4 5 6 7 8 9 10
Cipher K P T X S L I C Cipher K F M P S L G X A H
Plain C O M E N E Plain C T E N T Y I
New M C New W
Line 3 to 5
Alpha 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1
Cipher M J K A Q J B F Z A J G M B S L N P H H E
Plain N H U N D R E D O T E E N A R I
New F U R P L
TABLE IV
Revised
ENCIPHERING TABLE
PLAIN- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 G K L E M J
2 J P V
3-6-8 F C O U N T L H P J W M K X
4-7 N I B X A D K G P O
5 Q S U B G E Z
9 O Z H S C
10 Z H A S
PLAIN- W T A O R P L
1 P G N W E
2 V P G N
3-6-8 M A H J P G N
4-7 P G N D
5 P G N
9 C S H J
10 M A
PLAIN- H E W T A S O R Z N P L U
1 L B P G N O C S M A W E H J
2 H J V L
B P G N
3-6-8 O C S M A W
E H J V L B P G N K
4-7 L B P G N K
I D O C S M A
5 O C S M A W E
H J V L B P G N
9 O G S M A W E H J V
10 O C S M A
PLAIN- H E W T A S O R Z N P L U
1 L B P G N O C S M A W E H J
2 H J V L B P G N
3-6-8 O C S M A W E H J V L B P G N K I D
4-7 L B P G N K I D O C S M A
5 O C S M A W E H J V L B P G N
9 O G S M A W E H J V
10 Z O C S M A
I think you can see that most of the cipher sequence could be
obtained without considering the fact that the plain component
is the same sequence reversed. The important point is that the
complete system may be reconstructed from relatively few values
obtained through analysis of the cryptogram.
FURTHER REMARKS
QUAGMIRE I
E N C I P H R M T A B D F G J K L O Q S U V W X Y Z
Plain 0 E N C I P H R M T A B D F G J K L O Q S U V W X Y Z
Cipher 1 C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
2 I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
3 P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
4 H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
5 E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
6 R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
QUAGMIRE I ATTACK
Given:
----X------Y-----XY---.
1234567 1234567 1
KJORCYZ DBYDHYH R.
Plain 0 E
-----------------------------------------------------
Cipher 1
2
3
4 U V W X Y Z A B C D E F G H I J K L M N O P Q R S T 5
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
6
7 F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
Since we have the plain L, the second alphabet comes in too and
hence the plain H and T. This gives us the third alphabet and
the plain I. There is more help. Looking down the various
columns we find the Keyword COUNTRY which must have been placed
under the first letter of the plain sequence. Snowballs.
Plain 0 A B C D E H R T P L W I N G
-----------------------------------------------------
Cipher 1 J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
2 V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
3 B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
4 U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
5 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
6 Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
7 F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
The clues add up. The Keywords are PLOWING and COUNTRY.
QUAGMIRE II
TAPHORICOR
TABOONATURe I have added the e
possibility.
RXVVVOBVYY SR
Plain 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-----------------------------------------------------
Cipher 1 U H
2 I
3 H A
4 H N
5 W
6 Q Z
7 U O
8 T Q
9 F D
10 N
QUAGMIRE II ATTACK
We know that the cipher text reads from left to right just as
we see it. The skeleton sequence is:
Plain 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-----------------------------------------------------
Cipher 1 V W X Z U ? ? A T O H Q
2 I
3 H Q V W X Z U ? ? A T O
4 H Q V W X Z U A T
5 H Q V W X Z U A T O
6 O H Q V W X Z U A T
7 U T O H Q V W X Z
8 A T O H Q V W X Z U
9 F D
10 N
Plain 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-----------------------------------------------------
Cipher 1 V W X Z U n s A T i f c O r Y b d e g H j k l m p Q
2 I
3 H Q V W X Z U ? ? A T O
4 H Q V W X Z U A T
5 H Q V W X Z U A T O
6 O H Q V W X Z U A T
7 U T O H Q V W X Z
8 A T O H Q V W X Z U
9 F D
10 N
QUAGMIRE III
Note the repeat of the first three letters IBW at interval 81.
If the message starts with THE and the period turns out to be 9
we have found a wedge. Next place the tip in columnar line for
a cycle of nine.
A N D T H R E E C A I K P S R T C O
A L L I N G F O R J J W P R R V O L
A M A N T O S T A A A A R U R J N U
N D O N t w o f e e t ? I X M X P Q B V U
t h e ------- ? I B W O G P C D P
The three A's in the first column followed by the two N's
prove the period of 9. This is not accidental. My guesses
of additional plain text are partially right - 'the' as you
will see later. Note the triple R's, two U's and Two I's in
the ciphertext lined up by columns in a period of 9.
Plain 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-----------------------------------------------------
Cipher1 J A I
2 A B X J
3 W A M
4 P R X
5 P R U
6 R Q
7 B V J T
8 N C O V
9 L U O
Let us write down all the pairs we get by going from plain to
cipher in each of the alphabets in turn. We can also write
down the from the sidewise relationships. For instance, A to C
on the plain sequence is the same distance P to R on Row 5. In
addition, Row 7 to Row 8 tells us that BC is the same distance
apart as VO.
But I did make sense of the three letter chains; if L-O is the
same as O-V we have a three letter segment. Do you see that
the pairs in the listing above are separated by one letter in a
sequence obtained from the next set, as evidenced by LV in 7
and LOV in 8? We can add the two together:
DCB LOV M-J AN-T
Look at the fragments, and realize that we have found some good
information about the sequence. First of all the sequences are
reversed alphabets. The sequence has BCD, VOL, JKM since we
have used L and T-NA in it? [We can also look at a process
called decimination to bring the sequence to bear. We will do
that in the Friedman section.] Remember the very important
part of the tool of symmetry - that because the plain and all
the cipher alphabets are the same, we can associated pairs in
the straight, sideways, down etc as we find them, using the
plain or all nine cipher alphabets. In a QUAGMIRE IV, we
cannot use the plain sequence in this way because of a
different key.
VOL/TINABCD/GHIJM/QR
Plain 0 V O L T I N A B C D F G H J M P Q R S
-----------------------------------------------------
Cipher1 V O L T I N A B C D F G H J M P Q R S w
2 X T I N A B C D F G H J M P Q
3 T I N A B C D F G H J M P
4 Q R S W? X
5
6
7
8 V O L T I N A B C F G H J M P Q R S
9
The line ups are not correct. We can find where alphabets 1,
2 and three start by putting the low frequency X in the right
spot. I leave this part of the work to the you all. [ Hint:
compress the V O L -----T I N A space and what keyword will fit
into - V O L u? T I (O)N. and place the E in the beginning.]
The answer is with Keywords EVOLUTION and BLUEPRINT:
Plain 0 E V O L U T I N A B C D F G H J K M P Q R S W X Y Z
-----------------------------------------------------
Cipher1 V O L U T I N A B C D F G H J K M P Q R S W X Y Z E
2 S W X Y Z E V O L U T I N A B C D F G H J K M P Q R
3 W X Y Z E V O L U T I N A B C D F G H J K M P Q R S
4 P Q R S W X Y Z E V O L U T I N A B C D F G H J K M
5 C D F G H J K M P Q R S W X Y Z E V O L U T I N A B
6 F G H J K M P Q R S W X Y Z E V O L U T I N A B C D
7 Y Z E V O L U T I N A B C D F G H J K M P Q R S W X
8 Z E V O L U T I N A B C D F G H J K M P Q R S W X Y
9 X Y Z E V O L U T I N A B C D F G H J K M P Q R S W
QUAGMIRE IV
We are given:
QUAGMIRE IV ATTACK
The Title is "Lost Horsepower", the tips are starts with THE
GREAT and has WEENLATESEPTEMBERANDDECEMBEROFTHATYEAR in the
text. The letters bet?WEEN might be inferred.
OYWWHQJRFGYVPGILWVWGPTFMLYKXTAKOZATFGLAUT
betweenlateseptemberanddecemberofthatyear
* --9-- *
Thus the Y over E and H and Q over E "knock out" the intervals
3, 4 which are too short anyway, and also 11 because of the Y
over P. Note the +9 hit for Y over E. So we write out the
cipher in a period of nine:
Even with all the help and correct hits, the message is not a
give a way.
Plain 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-----------------------------------------------------
Cipher1 U P T K M W
2 F H W O G T
3 M Q Z I
4 L Y J A
5 Y T R W D
6 F V K
7 M O W X G
8 T Y G C
9 P A C V W
Since the alphabets are different we can not chain from the
plain to cipher. However, WITHIN the cipher, the same rules
apply as before - except their isn't nearly as much
information. In Cipher 1 row we see that U to P is the same
distance as F to K , M to W and P to A. Ok. Remember that we
are dealing with unknown decimations, so the relationships
between UPA, PK and PT is unknown.
LAWG is our best bet for the wedge. It ties together E and T
in the same decimation. So:
Plain E T
Cipher P M
H
Q I
L A W G
K
L A W G
Y C
L A W G
Plain 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-----------------------------------------------------
Cipher1 U P T K L M W
2 F H W O G T
3 M Q Z W I G
4 L Y J A
5 Y T R W M D
6 F V K J E
7 M O W X G
8 T Y G C
9 P A C V W
JKLMQVWXYZ
0 A N D E I C B F G H
---------------------------------------------
1 U T P R A
2 F H J K L M Q V W X Y Z
3 F H J K L M Q V W X Y Z
4 F H J K L M Q V W X Y Z
5 F H J K L M Q V W X Y Z
6 F H J K L M Q V W X Y Z
7 F H J K L M Q V W X Y Z
8F H J K L M Q V W X Y Z
9 P R A
(BUSINESSACTIVITYDURINGAPERIOD)
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[FOWL] Fowler, Mark and Radhi Parekh, " Codes and Ciphers,
- Advanced Level," EDC Publishing, Tulsa OK, 1994.
(clever and work)
[FREB] Friedman, William F., "Cryptology," The Encyclopedia
Britannica, all editions since 1929. A classic article
by the greatest cryptanalyst.
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[KAH3] Kahn, David, "Seizing The Enigma: The Race to Break the
German U-Boat Codes 1939-1943 ", Houghton Mifflin, New
York, 1991.
[LAIM] Lai, Xuejia, and James L. Massey, "A Proposal for a New
Block Encryption Standard," Advances in Cryptology -
Eurocrypt 90 Proceedings, 1992, pp. 55-70.
[LAKE] Lakoff, R., "Language and the Women's Place," Harper &
Row, New York, 1975.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson,
New York, 1992.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
[TRIT] Trithemius:Paul Chacornac, "Grandeur et Adversite de
Jean Tritheme ,Paris: Editions Traditionelles, 1963.
[WINT] Winton, J., " Ultra at Sea: How Breaking the Nazi Code
Affected Allied Naval Strategy During WWII," New Uork,
William Morror, 1988.
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 8
INTRODUCTION TO CRYPTARITHMS
AND
HILL CIPHER
SUMMARY
PART I
2. From 9 to 0 (9-0) 9 8 7 6 5 4 3 2 1 0
3. From 1 to 0 (1-0) 1 2 3 4 5 6 7 8 9 0
4. From 0 to 1 (0-1) 0 9 8 7 6 5 4 3 2 1
_V__T__O
Rewritten: {VO'TI'NG
IN___
NN TI
NN_NT
HO NG
UI_GG
NU FE
____UE
Rewritten: SHEEP/AUSSIE
SHEEP
SUMAIE
SPIBHP
LUHE
Rewritten: OTTAWA
___xON
HNNTLIL
IIIEHE_
TOOINRL
28
+5
33 or 20 + 13 (8 + 5).
OTTAWA
___xON
HNNTLIL
IIIEHE_
TOOINRL
ABCDE
-DCFE
GHIJ
____UE
SHEEP/AUSSIE
SHEEP
SUMAIE
SPIBHP
LUHE
Before reading on, see what you can do with this problem.
Remember, the key is three words, 9-0. When you are ready, read
on for the solution.
Now let's find the letter for 9. In the first subtraction, note
that U - H = U. That could make H be zero or nine. In the
absence of other information, you could not be sure which of
those is true. Here you already know that zero is represented
by P. Thus, H = 9.
9 8 7 6 5 4 3 2 1 0
H I E B S U P
21MA87
-208390
L197
OTTAWA
___xON
HNNTLIL
IIIEHE_
TOOINRL
1NN7LIL
555EHE_
7225NRL
0 1 2 3 4 5 6 7 8 9
H O I N T
277AWA
____x26
1667L5L
555E1E_
72256RL
Now let's extract the square root of 45678. First mark after
every second number starting at the decimal point.
_______
{4'56'78 The first pair of numbers is 04. The
square root of 4 is 2, a number we'll
place above the 4. We'll then square 2
getting 4 and placing it under the 4 in
the number and subtracting. Since the
remainder is zero we'll merely pull down
the next pair, 56, and produce our trial
divisor. The work looks like:
2______
{4'56'78
4___
56 The trial divisor is produced by
multiplying the root we have, 2, by 20
making 40. 40 divides into 56 one time
(trial y) which is added to 40 making
41. The trial y, 1, is placed over the
second digit of the new pair, 6. 41 is
multiplied by y (1) and subtracted from
56. Then 78 is pulled down at the end of
the difference. The work looks like:
2__1___
{4'56'78
4___
41 56
41___
15 78 Again the root, now 21 is multiplied by
20 giving 420. 1578 divided by 420
gives 3, our new y which is added to
420 giving 423. 3 x 423 or 1269 is
then subtracted from 1578 giving a
remaider of 309. The 3 is put above the
8 of 78 making the new root 213 with a
remainder. If it were desired to extend
the calculation to the right of the
decimal point, a pair of zeroes could
be appended to the remainder and the
process repeated with a decimal point
placed in the root after the 3. The
work without going past the decimal
point becomes:
2__1__3
{4'56'78
4___
41 56
41___
423 15 78
12_69
3 09
You can check that by squaring 213 (213
x 213) and adding 309. You should get
45,678. Practice by taking the square
root of another 5 or 6-digit number and
checking your outcome. Solve C-1 on
page 2 for homework.
LEDGE
January 2, 1996
OBSERVATIONS ON SQUARES (LANAKI)
| 1 5 3 |
M = | 0 2 1 |
| 2 5 0 1 |
N = | 7 6 1 3 |
| 3 3 0 1 |
Then the product MN can be formed since M has three columns and
N has three rows. On the other hand, the product NM is not
defined. For these two matrices the product is
| 1 5 3 | | 2 5 0 1 | | 46 44 5 19 |
MN = | 0 2 1 | X | 7 6 1 3 | = | 17 15 2 7 |
| 3 3 0 1 |
| 1 5 3 | | 2 5 0 1 | | 20 18 5 19 |
MN = | 0 2 1 | X | 7 6 1 3 | = | 17 15 2 7 |
| 3 3 0 1 |
| 1 7 22 |
E = | 4 9 2 |
| 1 2 5 |
| 1 7 22 | | s | | 1 7 22 | |18 | |20| | U |
EP = | 4 9 2 | X | e | = | 4 9 2 | X | 4 |= | 4|= | E |
| 1 2 5 | | n | | 1 2 5 | |13 | |13| | N |
| 1 7 22 | | d | | 1 7 22 | | 3 | | 5| | F |
EP = | 4 9 2 | X | m | = | 4 9 2 | X |12 |= |18|= | S |
| 1 2 5 | | o | | 1 2 5 | |17 | |19| | T |
| 21 23 18 |
D = | 6 23 6 |
| 9 7 15 |
| U | | 21 23 18 | | 20 | | 18 | | s |
D | E | = | 6 23 6 | X | 4 | = | 4 | = | e |
| N | | 9 7 15 | | 13 | | 13 | | n |
| 0 0 0 |
Z = | 0 0 0 |
| 0 0 0 |
| 4 3 |
det | 8 2 | = (4) (det |2| ) -(3) ( det |8| ) =
4 x 2 - 3 x 8 = 8 - 24 = -16.
| 1 7 22 | |9 2| | 4 2 |
det | 4 9 2 | = 1 x det |2 5| - 7 x det | 1 5 |
| 1 2 5 |
| 4 9 |
+ 22 x det | 1 2 | = 1 x 41 - 7 x 18 + 22 x(-1) = 23
Check a Number Theory text for details. Set the number d aside
for a minute.
Next, the matrix is flipped over the diagonal from the upper
left corner to the lower right corner so that the first row be
comes the first column, the second rows becomes the second
column, and so on.
| 9 2 |
det | 2 5 | = (9)(5)-(2)(2) = 45 - 4 = 41 = 15 (mod 26).
The replacement for the 7 in the first row and second column is
| 4 2 |
det| 1 5 | = (4)(5)-(2)(1) = 18 (mod 26).
The replacement for the 9 in the second row and second column
is
| 1 22 |
det| 1 5 | = (1)(5) - (22)(1) = - 17 = 9 (mod 26).
When all nine entries in E have been replaced, the matrix looks
like
| 15 18 25 |
| 17 9 21 |
| 24 18 7 |
| 15 -18 25 | | 15 8 25 |
| -17 9 -21 | = | 9 9 5 |
| 24 -18 7 | | 24 8 7 |
| 15 9 24 |
| 8 9 8 |
| 25 5 7 |
Finally, multiplying every entry of the last matrix by the
d=17 computed earlier, and reducing the entries modulo 26, the
result is
C = MP.
M^(-1) C = M^(-1) MP = IP = P.
On the actual devise, there are six axles, and their gears can
be moved to engage the accumulator drive chain one axle at a
time. The placement of the gears on the axles vary from one
axle to the next. On the illustrated machine in the patent,
the sequence is:
axle 1: 101,202,303
axle 2: 202,303,101
axle 3: 303,101,202
axle 4: 101,303,202
axle 5: 202,101,303
axle 6: 303,202,101
axle 1: 23,
axle 2: 10,
axle 3: 88,
axle 4: 17,
axle 5: 41, and
axle 6: 51.
| 23 |
| 10 |
| 1 2 3 1 2 3 | | 88 | | 59 |
| 2 3 1 3 1 2 | . | 17 | = | 55 |
| 3 1 2 2 3 1 | | 41 | | 54 |
| 51 |
Weisner and Hill also explain how the Message Protector could
be modified to act as a cryptographic devise. First of all,
the numbers on the various gears would be replaced by letters,
and the number of teeth on the accumulator gears would be 26 so
that the arithmetic operations would be carried out modulo 26.
Next, the axles would now carry six gears each, with the number
of teeth on each gear being a multiple of 26. There would be
six accumulators, so that six plaintext are converted to six
ciphertext letters. They say that the number of teeth on
the various gears "have to be selected according to certain
mathematical principles". What they mean, of course, is the
6 x 6 matrix, each entry of which gives the multiple of 26 that
gives the number of teeth on the corresponding gear, has to be
non-singular modulo 26. It is suggested that the matrix may be,
but does not have to be, selected to be involuntary.
NORTH DECODER advises that the Hill cipher patent diagrams (GIF
format) scanned in reasonable well into the CDB. If you would
like to look at them, the files they are at the CDB in
/lanaki.crypt.class/docs/hill-gifs
/msdos/gif-viewers
P Q N X B M H Q I Q A B C I Q D K E X Q B Q O Q
P' W M R R Q; D K E X Q B Q O Q U Q I Q E Q Q M C
T E X R X B X D Q , X P Q A B K P' W M R R Q N Q
V C Q N W K B O Q U M C B B X Q E Q Q A B K C
N W K B A K C D K U Q.
D G X Z Q N J D P M C J P U P L S U E' Z D
Z D H U Q J S E J S N P U Q E Z H Z D P M J H -
K N D P: G Z K U D I Q S N U , G Z H S P D L S U,
U Q G U P O Z H U P . * R J I Q U I U G G U
NADXN VMXUF
PAT format reads: JAIOU IDIRE AUNGR ANDPH ILOSO PHEQU ELESA
MESHA UTAIN ESSON TCAPA BLESD ESPLU SGRAN DSCRI MESAU SSIBI
ENQUE DACTE SMERV EILLE UXETC ELEBR ESDAN SLHIS TOIRE.
ITA-2. K2. (88) ( ne, han, con) Thirty days hath September.
LABRONICUS
I D S A I K Q W P L A I K A L B S C M D S P L A
K E D W Z S, U W O U A L S R S I I S C M D S . Q W
B S A I L I I L P S A ' S O A L. I O I I W U Z W
K Z I D W A S V K A I D S A U I O A L.
G Z Q K E A F S Z L T K F Q A Q S F N F Q K G K Q
T G G Z P Z Q F R A T J Z E F N S Z M T Z J S A S
Z R A P T D A F F Q K G K Z L Z S S K E O F J F Q
Q T J K R A E Z F Q Z S S Z H F J S F M T F G G K
E O F L F J Q Z G A J X T S Z J D.
SPA-1. BARKER
Z K E P C U K Y T C Y D M S R V C T P E R A
Z P Z N D Z K G C T Y R Z K R N T D G R Y C V K
K S T P Q D P E R M K T C Y G R Z Y P Q P M P E K E
E C M K S C Z S K E R G R T C M U R U C Z S R.
T I Z Q B J N A Z K J K T F Z N B P L T B B F
K N A G B N A G K T F P J G T P A O Z F M B F
S J G H N B R T B T I K T N Z G B I Q B
B P K J I Q Z I B J M P B B J N A Q G A O J M B
M Z I Y Z N.
N S P Y K I X P U A K P Z D X P S P E X K R L K O
K A X T S P Q K D X R K R R S S I N K Y K R L A R
S D K T Q L D L P X K T A S Q X S P X P R S O S P
R X J K R K T O A S T S P Q X L S D O A X I S A E
C S D L R S C P V D L N L B A X O C D K R L.
E P E J T X D U R T C J Z X G C V R J D J
X I N R S O C H C D T C V R P U C D V R J
Z J U D C T J H J D G X U M P C H J A X H X
O X T J T V R J A J U A C M C B J S X.
*O. *T R T M X I H *Q X U J D
U C U C G V C J F D E F W E O C B G C V S I H C L
I T I W F Y C V F U H F W F T L F R F B C H W F C
E S H I L F G I C D E G T I J H C V G R P C V C J
F V D E F W F H C V L F V F H J I S K I X J I Z U
I G V T I V V I V B C D E F G H I V V C I F Y K F
R F T W F V.
NEW PROBLEMS
R, A, T, S
-----------
|Q UA RT ET
-A
-----
T UA
-T SI
-----
U RT
-A UT
-----
E AO ET
-E ES UB
---------
R AR
Hill-1
Hill-2
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[KAH3] Kahn, David, "Seizing The Enigma: The Race to Break the
German U-Boat Codes 1939-1943 ", Houghton Mifflin, New
York, 1991.
[LAIM] Lai, Xuejia, and James L. Massey, "A Proposal for a New
Block Encryption Standard," Advances in Cryptology -
Eurocrypt 90 Proceedings, 1992, pp. 55-70.
[LAKE] Lakoff, R., "Language and the Women's Place," Harper &
Row, New York, 1975.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson,
New York, 1992.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 14
SUMMARY
UNIQUE SOLUTION
For ease in reading we will now use "mod" for "modulo. See
the previous cryptarithm lecture for the meaning of the term.
MULTIPLICATION
478
x52
---
956
2390
----
24856
OBSERVATIONS
The units digits of the products (the digit on the right end
of each product) also can produce useful information which we
will address later.
LARK
xCAR
-----
OOYRR
ORLOA
LEECC
-------
LOSBRLR
SOLUTION OF EXAMPLE 1
9 8 7 6 5 4 3 2 1 0
C R K E.
S C A R Y B L O K E
OTTAWA
xON
------
HNNTLIL
IIIEHE
-------
TOOINRL
SOLUTION OF EXAMPLE 2
0 1 2 3 4 5 6 7 8 9
O I T
0 1 2 3 4 5 6 7 8 9
W H O L I N T E A.
Notice also that we have ten different characters for the ten
different digits. When we count from zero up in whole numbers
we use all ten (0-9) to get to 9 and then we move on to two
digits, using a one in the tens place and starting anew with
zero in the units place. It takes a lot of words to explain
it, but we're so used it; we just spout the number and go on.
Base 2: 0 1 10 11 100 101 110 111 1000 1001 1010 1011 1100
1101
Base 10: 0 1 2 3 4 5 6 7 8 9 10 11 12
13
DUODECIMAL
Example 2. Subtraction. 67
-39
--
2t.
Example 3. Multiplication. 67
x39
---
4e3
179
----
2083
Example 4. Division. 2e
---
17/48t
32
--
16t
155
---
15
MULTIPLICATIVE STRUCTURES
1 x 7 = 7 7 x 7 = 9 9 x 7 = 3 3 x 7 = 1
1 => 7
^ |
| V
3 <= 9.
2 x 7 = 4 4 x 7 = 8 8 x 7 = 6 6 x 7 = 2 or
BASE 10.
O: n x 0 <=
2: 1 7 9 3 2 X 2 = 4 4 X 2 = 8 etc.
| | | | 1 x 2 = 2 7 x 2 = 4 etc.
V V V V and 5 => 0 <=.
(= 2 => 4 => 8 => 6 =)
6. 1 => 6 <=; 3 => 8 <=; 5 => 0 <=; 7 => 2 <=; 9 => 4 <=.
8. 1 3 9 7 5 => 0 <=
| | | |
V V V V
(= 8 => 4 => 2 => 6 =)
BASE 11 (UNDECIMAL)
0. n x 0 => 0 <=
1. n x 1 => n <=
3. (= 1 => 3 => 9 => 5 => 4 =); (= 2 => 6 => 7 => t => 8 =);
0 <=
4. (= 1 => 4 => 5 => 9 => 3 =); (= 2 => 8 => t => 7 => 6 =);
0 <=
6. (= 1 => 6 => 3 => 7 => 9 => t => 5 => 8 => 4 => 2=); 0 <=
7. (= 1 => 7 => 5 => 2 => 3 => t => 4 => 6 => 9 => 8 =); 0 <=
8. (= 1 => 8 => 9 => 6 => 4 => t => 3 => 2 => 5 => 7 =); 0 <=
9. (= 1 => 9 => 4 => 3 => 5 =); (= 2 => 7 => 8 => 6 => t =);
0 <=
BASE 12 (DUODECIMAL)
0. n x 0 => 0 <=
1. n x 1 => n <=
2. 1,7 => 2 => 4 (==> 8 <= t <= 5,e; 3,9 => 6 => 0 <=
3. 1,5 => 3 <==> 9 <= 7,e; 2,t => 6 <=; 4,8 => 0 <=
9. 1,5 => 9 <=; 2,7 => 6 <=; 7,e => 3 <=; 4,8 => 0 <=;
t. 1,7 => t => 4 <=; 5,e => 2 => 8 <=; 3,9 => 6 => 0 <=;
YOUR
TAB
----
IYATR
UOYLN
PYPRR
-------
YCRORTR
B T R U
7 t 4
t 7 4
7 t 8
t 7 8
4 t 8
t 4 8
1) B = 7, T = t, R = 4, TR = t4. B x R = 7 x 4 = 28 base 10
or 24 base 12. Carry the 2. B x U + 2 => T or t. 7 x U + 2 =>
4, U = 8. Check: 7 x 8 + 2 = 58 base 10 or 4t base 12 or t
mod 12. Our trial value for U is 8. Let's check that with
the third partial product T x YOUR = PYPRR. T = t etc. as
before. RR = 44. t x 4 = 40 base 10 or 34 base 12. Carry the
3. t x 8 + 3 = 83 base 10 or 6e base 12 or e mod 12, but we
needed a 4 for 44. It doesn't work.
0 e t 9 8 7 6 5 4 3 2 1
N T R U B
UOYLN
+YOUR
-----
PYPRR
0 e t 9 8 7 6 5 4 3 2 1
N T A R U B L
5OY30
+YO58
-----
PYP88
I79t8
5e730
+67688
--------
7C8et8
Although this problem was given the number C-11, for someone
familiar with duodecimal arithmetic it is of medium
difficulty. There are problems in the Cryptarithm section
that provide far fewer clues and necessitate trying out many
more possibilities. In the next lecture we will take a look
at organizing that process so as not to get lost in the
bookkeeping aspect of finding a solution. We may also find a
few more relationships that can be helpful at times.
REFERENCES
Table 14-1
1 2 3 4 5 6 7 8 9 t
1 | 1 2 3 4 5 6 7 8 9 t
2 | 2 4 6 8 t 11 13 15 17 19
3 | 3 6 9 11 14 17 1t 22 25 28
4 | 4 8 11 15 19 22 26 2t 33 37
5 | 5 t 14 19 23 28 32 37 41 46
6 | 6 11 17 22 28 33 39 44 4t 55
7 | 7 13 1x 26 32 39 45 51 58 64
8 | 8 15 22 2x 37 44 51 59 66 73
9 | 9 18 25 33 41 4t 58 66 74 82
t | t 19 28 37 46 55 64 73 82 91
Table 14-2
1 2 3 4 5 6 7 8 9 t e
1 | 1 2 3 4 5 6 7 8 9 t e
2 | 2 4 6 8 t 10 12 14 16 18 1t
3 | 3 6 9 10 13 16 19 20 23 26 29
4 | 4 8 10 14 18 20 24 28 30 34 38
5 | 5 t 13 18 21 26 2e 34 39 42 47
6 | 6 10 16 20 26 30 36 40 42 50 56
7 | 7 12 19 24 2e 36 41 48 53 5x 65
8 | 8 14 20 38 34 40 48 54 60 68 74
9 | 0 16 23 30 39 46 53 60 69 76 83
t | t 18 26 34 42 50 5x 68 76 84 92
e | e 1t 29 38 47 56 65 74 83 92 t1
Table 14-3
1 2 3 4 5 6 7 8 9 t
1 | 2 3 4 5 6 7 8 9 t 10
2 | 3 4 5 6 7 8 9 t 10 11
3 | 4 5 6 7 8 9 t 10 11 12
4 | 5 6 7 8 9 t 10 11 12 13
5 | 6 7 8 9 t 10 11 12 13 14
6 | 7 8 9 t 10 11 12 13 14 15
7 | 8 9 t 10 11 12 13 14 15 16
8 | 9 t 10 11 12 13 14 15 16 17
9 | t 10 11 12 13 14 15 16 17 18
t |10 11 12 13 14 15 16 17 18 19
Table 14-4
LECTURE 13 SOLUTIONS
13-1 Beaufort
13-2 Vigenere.
LECTURE 14 PROBLEMS
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 12
SUMMARY
The Resources Section has been updated with more than 50 ACA
published references on these and similar systems - focusing
on the cryptanalytic attack and areas of historical interest.
Thanks to PHOENIX for his help in compiling these sources.
[INDE]
"INCOMING"
PORTAX CIPHER
A B C D E F G H I J K L M (stationary)
. N O P Q R S T U V W X Y Z N O P Q R S T U V W X Y Z ...
. C E G I H M O Q S U W Y A C E G I K M O Q S .. (sliding
. D F H J L N P R T V X Z B D F H J L N P R T .. key)
*
A B C D E F G H I J K L M (stationary)
. N O P Q R S T U V W X Y Z N O P Q R S T U V W X Y Z ...
. C E G I K M O Q S U W Y A C E G I K M O Q S .. (sliding
. D F H J L N P R T V X Z B D F H J L N P R T .. key)
*
O F T E N (keyword)
---------
I N N O V
A T I O N
g w
e b
---------
S A R E F
O U N D x
u i
k e
Assuming a period of 6:
S N P O W L
B A M P I S
n t u r natural ?
l e d s good
-----------
C W U O O B
X C W K M A
o y s
s o c ok
-----------
T Z K T O W
J C B L N C
r o s t o
n y n d s better
-----------
B J G B T A
A J D I W U
y
m
-----------
K W H H V Z
N M N U F M
t p t
s r y
-----------
A P B J W P
C B S X J C
n r o
f t e
-----------
J Q X T M V
U B M D C B
n t o n
h u n r
-----------
J C R - -
U G R
-----------
Figure 12-1a
1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z
Figure 12-1b
1 2 3 4 5
1 U N I T E
2 D S A O F
3 M R C B G
4 H K L P Q
5 V W X Y Z
B D V L E W A F X C G Y K N Z S O M P I Q T R H U
Figure 12-1c
1 2 3 4 5
1 B D V L E
2 W A X F C
3 G Y K N Z
4 S O M P I
5 Q T R H U
WEAKNESSES
SHORT METHOD
LONG METHOD
The long way is to assume a 3 period and test the 1'st and
4'th, 2'nd and 5'th, 3'rd and 6'th in the same manner as the
short method. When conflicts arise, discard the choice.
We continue with an assumption of periods 4, 5, 6, etc. and
increase the differentials between ciphertext numbers. [BRYA]
Four giveaways are 22, 30, 102, and 110. The presence of any
one of these numbers gives away the key to the whole cipher
alphabet.
Table 12-1
11 12 13 14 15 21 22 23 24 25 31 32
A B C D E F G H I/J K L M
A 11 22 23 24 25 26 32 33 34 35 36 42 43
B 12 23 24 25 26 27 33 34 35 36 37 43 44
C 13 24 25 26 27 28 34 35 36 37 38 44 45
D 14 25 26 27 28 29 35 36 37 38 39 45 46
E 15 26 27 28 29 30 36 37 38 39 40 46 47
F 21 32 33 34 35 36 42 43 44 45 46 52 53
G 22 33 34 35 36 37 43 44 45 46 47 53 54
H 23 34 35 36 37 38 44 45 46 47 48 54 55
I 24 35 36 37 38 39 45 46 47 48 49 55 56
K 25 36 37 38 39 40 46 47 48 49 50 56 57
L 31 42 43 44 45 46 52 53 54 55 56 62 63
M 32 43 44 45 46 47 53 54 55 56 57 63 64
N 33 44 45 46 47 48 54 55 56 57 58 64 65
O 34 45 46 47 48 49 55 56 57 58 59 65 66
P 35 46 47 48 49 50 56 57 58 59 60 66 67
Q 41 52 53 54 55 56 62 63 64 65 66 72 73
R 42 53 54 55 56 57 63 64 65 66 67 73 74
S 43 54 55 56 57 58 64 65 66 67 68 74 75
T 44 55 56 57 58 59 65 66 67 68 69 75 76
U 45 56 57 58 59 60 66 67 68 69 70 76 77
V 51 62 63 64 65 66 72 73 74 75 76 82 83
W 52 63 64 65 66 67 73 74 75 76 77 83 84
X 53 64 65 66 67 68 74 75 76 77 78 84 85
Y 54 65 66 67 68 69 75 76 77 78 79 85 86
Z 55 66 67 68 69 70 76 77 78 79 80 86 87
Table 12-1
continued
33 34 35 41 42 43 44 45 51 52 53 54 55
N O P Q R S T U V W X Y Z
A 11 44 45 46 52 53 54 55 56 62 63 64 65 66
B 12 45 46 47 53 54 55 56 57 63 64 65 66 67
C 13 46 47 48 54 55 56 57 58 64 65 66 67 68
D 14 47 48 49 55 56 57 58 59 65 66 67 68 69
E 15 48 49 50 56 57 58 59 60 66 67 68 69 70
F 21 54 55 56 62 63 64 65 66 72 73 74 75 76
G 22 55 56 57 63 64 65 66 67 73 74 75 76 77
H 23 56 57 58 64 65 66 67 68 74 75 76 77 78
I 24 57 58 59 65 66 67 68 69 75 76 77 78 79
K 25 58 59 60 66 67 68 69 70 76 77 78 79 80
L 31 64 65 66 72 73 74 75 76 82 83 84 85 86
M 32 65 66 67 73 74 75 76 77 83 84 85 86 87
N 33 66 67 68 74 75 76 77 78 84 85 86 87 88
O 34 67 68 69 75 76 77 78 79 85 86 87 88 89
P 35 68 69 70 76 77 78 79 80 86 87 88 89 90
Q 41 74 75 76 82 83 84 85 86 92 93 94 95 96
R 42 75 76 77 83 84 85 86 87 93 94 95 96 97
S 43 76 77 78 84 85 86 87 88 94 95 96 97 98
T 44 77 78 79 85 86 87 88 89 95 96 97 98 99
U 45 78 79 80 86 87 88 89 90 96 97 98 99 00
V 51 84 85 86 92 93 94 95 96 02 03 04 05 06
W 52 85 86 87 93 94 95 96 97 03 04 05 06 07
X 53 86 87 88 94 95 96 97 98 04 05 06 07 08
Y 54 87 88 89 95 96 97 98 99 05 06 07 08 09
Z 55 88 89 90 96 97 98 99 00 06 07 08 09 10
24 66 35 77 37 77 55 59 55 45 55 88 28 66 46
88 37 67 33 59 58 65 45 66 67 58 44 55 34 79
44 59 55 45 42 87 28 76 43 78 46 86 26 67 24
85 26 67 28 76 26 78 46 65 65 88 36 49 54 67
28 65 42 88 36 49 44 89 57 58 54 66 47 67 26
24 66 35 77
37 77 55 59
55 45 55 88
28 66 46 88
37 67 33 59
58 65 45 66
67 58 44 55
34 79 44 59
55 45 42 87
28 76 43 78
46 86 26 67
28 76 26 78
46 65 65 88
36 49 54 67
28 65 42 88
36 49 44 89
57 58 54 65
47 67 26 -
GROMARK
Example:
Example:
7 7 2 6 6 4 9 8 2 0 3 7 0 2 3 0 7 2 5 3 7 9 7
J C N W Z Y C A C J N A Y N L Q P W W S T W P
J K L M N O P Q R S T U V W X
C
*
Table 12-1
adjacent 19 21 2 19 20 9 20 21 20 5 19
diff's S U B S T I T U T E S
xx 2 7 17 1 15 11 1 25 11 14
x-x 9 24 18 16 0 12 0 10
x--x 0 25 7 ...
7 7 2 6 6 4 9 8 2 0 3 7 0 2 3 0 7 2 5 3 7 9 7
J C N W Z Y C A C J N A Y N L Q P W W S T W P
S U B S T I T U T E S
This is a good tip placement and confirmed by the N-N hit.
The A---A in the cipher matches the S---T plain. We build
the cipher component by writing the cipher component, and a
normal alphabet, count along it from any given plain the
number of steps given by the key, then write the cipher
value. Find S on the top strip, count 8 to right, place an
A. C is two spaces to the right of the position held by the
U, and so on. Decipher other letters by counting backwards
the number of steps given by the key. Cipher C ahead of thew
crib translates to N.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A J Y P Q W N C L
O1
* *
Plain: QUESTIONABLYCDFGHJKMPRVWXZ
Cipher: QUESTIONABLYCDFGHJKMPRVWXZQUESTIONABLYCDFGHJKMPRVWXZ
* *
Ok
O1 * *
Plain: QUESTIONABLYCDFGHJKMPRVWXZ
Cipher: QUESTIONABLYCDFGHJKMPRVWXZQUESTIONABLYCDFGHJKMPRVWXZ
* *
Ok
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: H J P R L V W X D Z Q K U G F E A S Y C B T I O M N
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: J K R V Y W X Z F Q U M E H G S B T C D L I O N P A
Table 12-2
Partial Reconstruction
QUESTIONABLYCDFGHJKMPRVWXZ
UESTIONABLYCDFGHJKMPRVWXZQ
ESTIONABLYCDFGHJKMPRVWXZQU
STIONABLYCDFGHJKMPRVWXZQUE
TIONABLYCDFGHJKMPRVWXZQUES
IONABLYCDFGHJKMPRVWXZQUEST
ONABLYCDFGHJKMPRVWXZQUESTI
NABLYCDFGHJKMPRVWXZQUESTIO
ABLYCDFGHJKMPRVWXZQUESTION
BLYCDFGHJKMPRVWXZQUESTIONA
LYCDFGHJKMPRVWXZQUESTIONAB
YCDFGHJKMPRVWXZQUESTIONABL
CDFGHJKMPRVWXZQUESTIONABLY
. .
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: J K R V Y W X Z F Q U M E H G S B T C D L I O N P A
A J Q B K U L M E Y P S C R T D V I F W O G X N H Z
* *
Plain: QUESTIONABLYCDFGHJKMPRVWXZ
Cipher: QUESTIONABLYCDFGHJKMPRVWXZQUESTIONABLYCDFGHJKMPRVWXZ
* *
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: J K R V Y W X Z F Q U M E H G S B T C D L I O N P A
* *
Plain: AJQBKULMEYPSCRTDVIFWOGXNHZ
Cipher: AJQBKULMEYPSCRTDVIFWOGXNHZAJQBKULMEYPSCRTDVIFWOGXNHZ
* *
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: J K R V Y W X Z F Q U M E H G S B T C D L I O N P A
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 W
X Z Q U E S T I O N A B L Y C D F G H J K M
24 25 26
P R V
JK>QU>BL>KM>UE>LY>MP>ES>YC>PR>ST>CD>RV>TI>DF>VW>IO>FG>WX>
ON>GH>XZ>NA>HJ>ZQ>AB>JK.....
JK>KM>MP>PR>RV>VW>WX>XZ>ZQ>QU>UE>ES>ST>TI>IO>ON>NA>
AB>BL>LY>YC>CD>DF>FG>GH>HJ>JK.....
or:
JKMPRVWXZ-QUESTIONABLY-CDFGH
HALF CHAINS
TABLE 12-3
Total Number
Of
Sequences 14 6 10 16 10 18 6 8 10 6 4 6
ISOLOGS
24 25 26
V J C
E S T I O
2 3 1 1 1 1 3 4 1 7 4 1 6 1 1 7 1 4 1 1 2 3 2 1 1 1
2: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
We set up two key word mixed alphabets and slide against each
other. With some trial and error we find:
NABLYCDFGHJKMPRVWXZQUESTIO
QUESTIONABLYCDFGHJKMPRVWXZ
Message 1
Message 2
CGSLZ QUBMN CTYBV HLQFT FLRHL MTAIQ
ZWMDQ NSDWN LCBLQ NETOC VSNZR BJNOQ
1 2 3 4 5 6 7 8 9101112131415161718192021222324252627282930
Y H Y E X U B U K A P V L L T A B U V V D Y S A B P C Q T U
C G S L Z Q U B M N C T Y B V H L Q F T F L R H L M T A I Q
313233343536373839404142434445464748495051525354555657585960
N G K F A Z E F I Z B D J E Z A L V I D T R O Q S U H A F K
Z W M D Q N S D W N L C B L Q N E T O C V S N Z R B J N O Q
4 44 6 18 30
E and E are separated by 40 letters, U, U and U which
L L Q Q Q
0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
------------------------------------------------------
1 L F S J O M Y N I Z C Q
2 N C D G B M Z Q L
3 Q U T O W B E Z C R V F S
4 H L W Q A S B T N
------------------------------------------------------
BL, DF, ES, HJ, IO, KM, LY, ON,TI, XZ, YC, ZQ.
Q U E S T I O N A B L Y C D F G H J K M P R V W X Z
The fact that the original primary component was exposed was
pure chance, it could have been an equivalent primary
sequence alphabet.
1 2 3 4
A L L A
R R A N
G E M E
N T S F
O R R E
L I E F
O F Y O
U R O R
G A N I
Z A T I
S O U P S O U P S O U P S O U P S O U P S O U P
----------------------------------------------------
Y H Y E X U B U K A P L L L T A B U V V D Y S A
A L L A R R A N G E M E N T S F O R R E L I E F
B P C Q T U N G K F A Z E F I Z B D J E Z A L V
O F Y O U R O R G A N I Z A T I O N H A V E B E
I D T R O Q S U H A F K
E N S U S P E N D E D X
T I M E T I M E T I M E T I M E T I M E T I M E
____________________________________________________
C G S L Z Q U B M N C T Y B V H L Q F T F L R H
A L L A R R A N G E M E N T S F O R R E L I E F
L M T A I Q Z W M D Q N S D W N L C B L Q N E T
O F Y O U R O R G A N I Z A T I O N H A V E B E
O C V S N Z R B J N O Q
E N S U S P E N D E D X
Figure 12-1
Q U E S T I O N A B L Y C D F G H J K M P R V W X Z
U E S T I O N A B L Y C D F G H J K M P R V W X Z Q
E S T I O N A B L Y C D F G H J K M P R V W X Z Q U
S T I O N A B L Y C D F G H J K M P R V W X Z Q U E
T I O N A B L Y C D F G H J K M P R V W X Z Q U E S
I O N A B L Y C D F G H J K M P R V W X Z Q U E S T
O N A B L Y C D F G H J K M P R V W X Z Q U E S T I
N A B L Y C D F G H J K M P R V W X Z Q U E S T I O
A B L Y C D F G H J K M P R V W X Z Q U E S T I O N
B L Y C D F G H J K M P R V W X Z Q U E S T I O N A
L Y C D F G H J K M P R V W X Z Q U E S T I O N A B
Y C D F G H J K M P R V W X Z Q U E S T I O N A B L
C D F G H J K M P R V W X Z Q U E S T I O N A B L Y
D F G H J K M P R V W X Z Q U E S T I O N A B L Y C
F G H J K M P R V W X Z Q U E S T I O N A B L Y C D
G H J K M P R V W X Z Q U E S T I O N A B L Y C D F
H J K M P R V W X Z Q U E S T I O N A B L Y C D F G
J K M P R V W X Z Q U E S T I O N A B L Y C D F G H
K M P R V W X Z Q U E S T I O N A B L Y C D F G H J
M P R V W X Z Q U E S T I O N A B L Y C D F G H J K
P R V W X Z Q U E S T I O N A B L Y C D F G H J K M
R V W X Z Q U E S T I O N A B L Y C D F G H J K M P
V W X Z Q U E S T I O N A B L Y C D F G H J K M P R
W X Z Q U E S T I O N A B L Y C D F G H J K M P R V
X Z Q U E S T I O N A B L Y C D F G H J K M P R V W
Z Q U E S T I O N A B L Y C D F G H J K M P R V W X
Message 1
Message 2
34123 41234
No. 1 CTMZZ VMVAJ.
No. 2 GDKDS XCEEC.
12345 61234
0 1 2 3 4 5 6 7 8 91011121314151617181920212223242526
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
---------------------------------------------------
1-1 I J P D Q G C E K O R Z
2-2 H V N G U W E D M L X
3-3 E M X G I D J N R A O
4-4 X O C D K A F Y Q V N
1-5 B T W L R E M N Y U A
2-6 M O I C D U V F R
3-1 O G R L P S D Z
4-2 L P H U V E D M F
1-3 Q J V W K O X Y M A
2-4 B J X P O A F Y D
3-5 N R Y B C G Q S
4-6 M L O S U V W X
---------------------------------------------------
We construct the complete equivalent primary component:
1 2 3 4 5 6 7 8 91011121314151617181920212223242526
I T K N P Z H M W B Q E U L F C S J A X R G D V O Y
Ok. We have the cipher component. Is it normal? reversed?
Mixed? Same questions for the plain component sequence.
We assume that the primary plain component is normal direct
sequence. We attempt to solve and fail. Normal reverse will
also fail. We assume a K3 situation, i.e. the plain and
cipher components are identical. Again the test fails. We
assume that the plain is in reverse mode. Nope. So we have a
K4 situation, both primary components are different mixed
sequences.
Message 1
1 15 1 2 1 1 3 2 4 2 3 1 1 2 5 3 1 1
1A A B C
D E F G H I J K L M N O P Q R S T U V W X Y Z
6 2 21 2 2 1 4 1 1 1 5 4 2 2 4
2A A B C
D E F G H I J K L M N O P Q R S T U V W X Y Z
4 1 2 7 1 2 3 1 3 1 4 1 1 7 2
3A A B C
D E F G H I J K L M N O P Q R S T U V W X Y Z
1 3 4 1 4 4 2 1 3 4 5 3 1 1 1 1
4A A B
C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 3 2 1 1 4 1 5 2 2 1 2 1 1 1 5 3 3 1
1B I T K N P Z H M W B Q E U L F C S J A X R G D V O Y
2 1 2 4 4 3 2 2 1 1 6 2 1 5 1 2
2B I T K N P Z H M W B Q E U L F C S J A X R G D V O Y
1 1 2 1 1 2 3 1 4 7 2 1 4 3 7
3B I T K N P Z H M W B Q E U L F C S J A X R G D V O Y
1 5 4 1 1 3 4 3 4 4 1 1 3 1 1 2 1
4B I T K N P Z H M W B Q E U L F C S J A X R G D V O Y
1 3 2 1 1 4 1 5 2 2 1 2 1 1 1 5 3 3 1
1B I T K N P Z H M W B Q E U L F C S J A X R G D V O Y
2 1 1 6 2 1 5 1 2 2 1 2 4 3 2
2B E U L F C S J A X R G D V O Y I T K N P Z H M W B Q 2 1 1
2 3 1 4 7 2 1 4 3 7
3B K N P Z H M W B Q E U L F C S J A X R G D V O Y I T
1 1 3 4 3 4 4 1 1 3 1 1 2 1 1 5 4
4B P Z H M W B Q E U L F C S J A X R G D V O Y I T K N
6 2 5 4 2 7 15 9 2 21 9 6 410 3 1 1 7 2 918 9 1
1B-4B I T K N P Z H M W B Q E U L F C S J A X R G D V O Y
combinedH M L R S O A I Y N E T
Plain
Equiv's
1 2 3 4 5 6 7 8 9 1011121314151617181920212223242526
H M P C B L . R S W . . O D U G A F Q K I Y N E T V
Message 2
The above table is about 85% reduced and note the idiomorphic
repetition ACHDIIFC representing Artillery becomes patent in
the reduction process. This is rather exciting. From no
patent clues to reduction and latent clues exposed. Clever.
0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
------------------------------------------------------
1 B V H O W J G D S R I X F K Y E
2 L Q W K S E B Z O H C X
3 U P V Q B C X N S I W
4 E W Y P X K R T A Z G D
-------------------------------------------------------
0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
------------------------------------------------------
1 J H T F G Y V D M S C
2 S E H U W A Z I V N X
3 F U C A M L H K B G
4 I T K E S Z U N A J B Y Q
5 G F E C D B Y J A U M L
------------------------------------------------------
Given:
Message A
* *
ZFWAY ITBVX XWZQV PEBGS GGFIZ TUAMF
RFEQX PEPPO PCNBP QPOTX VNAIH HVRXC
NHVGM FRFSI ESQMV
*
Message B
* *
ZFWAY ITBVX XWZQV PDRKF USVAG XLJKC
NDVPR OWBRH YFJMS HRFVS BAHWG ZFAJO
JMFAV CNDVD ORZPH A
*
56123456123456123456123456123456123456123456123456123456123
EBGSGGFIZTUAMFRFEQXPEPPOPCNBPQPOTXVNAIHHVRXCNHVGMFRFSIESQMV
RKFUSVAGXLJKCNDVPROWBRHYFJMSHRFVSBAHWGZFAJOJMFAVCNDVDORZPHA
0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-------------------------------------------------------
1-2 B F Z M P D S X
2-3 S V F H R U L B
3-4 P S H D J A
4-5 K V O H Y R J
5-6 W R A C F O
6-1 K J N G V W Z
-------------------------------------------------------
CONCLUSION
LECTURE 11 SOLUTIONS
BOZOL reports that the tip did not help him and that the
first pass at the key was ORCUPATMON which he mystically
came up with organization.
LECTURE 12 PROBLEMS
74 46 66 44 79 47 45 37 58 66 37 60 25 54 33 69 78 35 68 27
47 36 28 88 36 60 33 48 43 29 87 35 49 57 76 37 37 88 36 60
33 77 74 50 86 55 47 27 76 45 40 55 56 58 66 78 57 30 94 58
38 26 55 57 59 88 56 79 46 46 66 60 58 55 48 56. (DGGLWLRQ,
ends WXEOIW)
38 76 54 76 64 76 76 54 74 55 35 76 77 76 47 58 76 85 74 44
65 88 63 74 47 36 95 74 63 44 37 58 57 96 65 36 66 85 74 63
55 79 53 67 57 56 58 64 67 67 56 67 57 74 55 55 57 86 03 43
46 67 73 96 67 39. (ETARVQITCO, ends HSMX)
12.3 PORTA
12.4 PORTA
12.5 PORTAX
UXCUD ZMVBA FWWPV DIKDO JISMA
WRBBA YLOYX AKUXR JGDCJ MYAPV RJWJA
DMUKL KLUAM KAOEN YBFCC IQGFK QZAA. (PQXKEG)
12.6 PORTAX
12.7 GROMARK
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[BRAS] Brasspounder, "Language Data - German," MA89, The
Cryptogram, American Cryptogram Association, 1989.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[FOWL] Fowler, Mark and Radhi Parekh, " Codes and Ciphers,
- Advanced Level," EDC Publishing, Tulsa OK, 1994.
(clever and work)
[LAKE] Lakoff, R., "Language and the Women's Place," Harper &
Row, New York, 1975.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
[WINJ] Winton, J., " Ultra at Sea: How Breaking the Nazi Code
Affected Allied Naval Strategy During WWII," New Uork,
William Morror, 1988.
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 9
SUMMARY
ENIGMA
ENIGMA was the generic term for the German machine ciphers. It
was both the name of the first enciphering device and the many
variations used during WWII. ULTRA was the British code-name
for intelligence derived from cracking the Enigma machine
ciphers by an organization of about 10,000 at Bletchley Park
(BP). The extent of the penetration of the German command
structure was so profound and so pervasive that it is clear that
BP's work changed not only the conduct but the outcome of Allied
European Operations in WWII. Most brilliant of ULTRA successes
was against German Afrika Korps whereby the 8th Army HQ read
Enigma telegrams before Rommel himself. [ASIR] [KAH2]
A: HISTORY
A2. Discussion:
In the first two phases of the Battle of the Atlantic, there was
a clear superiority with cryptanalytic success on the German
side. Intelligence was of limited value to actual operations.
The Germans introduced the short signal system, using a codebook
to shorten communications to a few four letter groups which were
superenciphered with daily settings of the Schlussel M [M Key]
in the circuit of Heimische Gewasser (home waters). The Royal
Navy used two crypto-systems - the first was the Naval Cypher
which used 4 figure codebooks and the second was the 5 figure
codebook Naval code. Both used subtractor tables of 5000 groups
changed monthly. B-dienst was reading about 30 -50 % of the
Naval Cypher, used by officers. The Merchant Navy Code was
broken by the B-dienst in March 1940.
The early history of the Enigma, the Polish attack and the
beginnings of BP covered in [KAH3] ,[WINT] Winterbotham and
Beesley give us special insights into the fray. [BEES] Other
perspectives found in [ANTH] and [HYDE].
B: SPECIFICATIONS
Address: http://www.informatik.uni-hamburg.de
Select "international homepage"
From 2nd entry "groups", select AGN
(first of the working groups)
C: PATENTS
D: ENCIPHERING PROCESS
E: CRYPTANALYSIS
Perhaps the earliest and best attack, Marian Rejewski wrote the
brilliant "Mathematical Solution of the Enigma Cipher" published
in [REJE].
E49: ENIGMA
-----------------------------------------------------------
F: ROTOR SYSTEMS
G: ENIGMA IMPROVEMENTS
H1:BP
H2:OSS
H3:German Navy - U Boat Command
H4:B-Dienst
H5:Bureau De Chiffer
H6:Polish Biuro Szyfrow
H7:French Service Renseignements
H8:AVA Telecomunications
H9:German Army Command
H10:SOE
H11:RAF-SLU
H12:Siemans und Halske Aktiengesellschaft
H13:AC Bridge Laboratory
ENIGMA 95
ABSTRACT : An exploration into the possibilities of what can be done with the
operating methods of the Enigma on the personal computer. The same concept of
employing keyboard input, a plugboard, rotors ( both normal and reflecting ),
Uhr
box and visual output are used, but are expanded by using 100-position rotors
that
intermittently rotate a prime amount after each input, allowing the number of
rotors to vary from 1 to 12, in front or backwards orientation, top permit any
keyboard character ( including spaces ) to be encrypted, and to simultaneously
display cipher and clear text for editing. A rotating Character Set converts
single-character input into 2-digit numbers for processing and
superencipherment
of numeric output into alpha bigrams is possible. Regular rotors, Reversing
rotors, Character Sets and Superencipherment Tables are provided in sets of 100
for extensive variety. Visual monitor display and paper printout are
employed
and other controls are provided. It is a "what if" speculation that shows what
could have been possible if the technology had been available.
Everyone is familiar with the Enigma Cipher Machine and the way it operates.
However, the more you learn about it and read about the cryptanalysis that
overcame it in World War II, the more you wonder if it could be improved without
becoming impossibly complicated. The personal computer provides a means to
improve the concepts that made the original Enigma work, and it can make it work
much better.
This project started as a simulation of the original Enigma. The pathway of the
electric circuit caused by pressing a key is easy to understand. It goes from
the
keyboard through the plugboard to the rotors, is reflected from the reversing
rotor, back through the rotors, through the plugboard and finally to a lamp that
lights under a round window with an alphabet on it. At least one rotor will
rotate during the pressing of the key and the pathway through the rotors will
change from what it was previously. The internal wiring of the rotors is random
and the cumulative circuit offset combinations produce an extensive number of
substitution alphabets. The plugboard adds to this, as did the Uhr box.
Aside from administrative and operator errors, the weaknesses of the enigma were
as follows:
1. The internal wiring of the rotors was fixed. It never changed except for
a
few specialized purposes. While the mathematical possibilities were
astronomical, only a small portion of them were utilized probably because of
manufacturing, cost and logistics considerations.
2. There were only eight rotors in a set and only 3 or 4 could be used at a
time.
3. The rotors rotated only very restricted basis. One moved one position
each time. The second moved only after the first had moved 1 to 26 positions.
The 3rd moved only after the 2nd had moved 1 to 26 positions. There were
notches
on the rotors to accomplish this and the rotors could be set so that the
movements
occurred at different times, but movement of two rotors was infrequent, and
movement of all rotors was limited and somewhat predictable.
4. The reversing ( reflecting ) rotor did not move, nor could it be moved (
except on the earlier models ).
I don't know how Mr. Hebern did it, but it is a job perfectly suited for a
computer. At any rate, "wiring" a rotor using the Interval Method can be very
tedious because it involves a lot of trial and error if done manually ( or, as
it
turned out, by computer ). It would be interesting to know if there is a simple
algorithm. It is supposed to produce a more secure encryption. After trying to
do it manually ( by diagramming on paper ), programs were written to do it for
both regular and reversing rotors. The programs also produce a file on a floppy
disk to simulate a set of rotors and print the results for record purposes.
Each
rotor had to be unique from all others so use of random numbers was involved.
The plugboard was programmed so that it was possible to enter the 2-point ( from
-
to ) sets that were to be connected. Multiple sets could be created, just as it
is possible to have multiple cable connections on a mechanical Enigma.
A file of plugboards is not needed because the variance within fixed fields is
derived from the connections, and to allow numbers of connections to be varied.
It was necessary though to provide for editing to insure that each position was
used only once ( as in real life ).
At this point, the idea of expanding the Enigma came into being in the form of
introducing variability between the keyboard and the plugboard such as the Uhr
Box
does. It was decided to make the Enigma process the data in numerical form and
expand it from a 26 to a 100 character format. This numerical format ( 00 -99 )
has the disadvantage of doubling the length of a message, but it has certain
advantages. In addition to handling alphabetic letters, it can also:
This format required a method of converting input into 2-digit form. It was
done
by creating what are called "Character Sets". These are randomly organized sets
of 100 characters ( upper and lowercase ) that appear on the keyboard. The
entire
100 positions are not used and the unused are filled with a seldom-used accent
mark. One hundred sets are available in a file on floppy disk. The sets are
used
in both encryption and decryption to convert from and back to cleartext.
Using 100 as a common feature, brought into use the digits 00 - 99 to identify
rotors, sets, tables and plugboard positions. Sets of these components have 100
of each ( "00" means "100" ).
The next feature was to provide for the unique rotation or non-rotation (
movement
of each rotor is randomly intermittent ) of each regular and the reversing rotor
after each input. The Character Set also rotates so that doubles ( like "oo" in
book ) are converted differently. Rotation is by a prime amount to 100 ( 2 and
5
are not used ). Editing prevents using other numbers. An additional feature
was
to provide a Rotor Display similar to the windows on the Enigma. This is
primarily
informational but has proven to be helpful in de-bugging the program.....and it
does provide a sense of rotor movement.
Another idea was borrowed from Mr. Hebern. That was the ability to "insert"
rotors into the machine either forwards or backwards which doubles the number of
rotors in a given set. It was also possible to provide for a variable number of
rotors. An arbitrary limit of 12 was chosen but it would be possible to have
more
( though that might be considered overkill ). The important thing here is that
it
would be possible to employ from 1 to 12 rotors ( from a set of 100 ), depending
on the security desired. The rotor display automatically adjusts to the
selected
number.
The next feature that was added was the ability to optionally superencipher the
resulting numeric ciphertext. This involves replacing a 2-digit numeric cipher
with a 2-character alphabetic bigram (e.g., 36 to HK ). It also permits each
numeric cipher to be represented by one of 6 or 7 bigrams (e.g., 36 could be
HK,
UM, RY, AU, ZM or BI ). The 7th bigram appears only for selected numerics
because
the 676 ( 26 x 26 ) possible bigrams are evenly distributed amongst the 100
numerics. In addition, the use of a given bigram in a set for each numeric is
incremented sequentially so using this example, the numeric "36" would be
converted to HK the first time it appears, to UM the second time, etc. The
first
selection can start at any of the first 6 positions and it cycles around to
position 1 when position 6 or 7 is used. A SuperEnciphering Table ( Figure 18
)
accomplishes this and there is a matching SuperDeciphering Table ( Figure 19 )
to
reverse it.
Text input requires no use of the <enter> key and the computer buffer handles
rapid input so that the entry of clear or cipher text is faster than that of the
original Enigma. Input is displayed on the monitor and the resulting
cipher/clear
text is displayed immediately below so that it is possible to visually check it.
If an error occurs, a simple procedure allows you to correct it without having
to
re-type everything. A screenful of data consists of 6 sets of double lines
( one input, one output ) double spaced with the sets separated by a dotted line
for clarity. There are 27 inputs per line for a total of 162. When the 159th
-
161st are entered, a beep sounds to alert you to the approaching end of a
screen.
This allows you to make a final check of the input for errors (and easily
correct
them) before entering the 162nd which triggers printing that screenful to paper.
During the printing you can start entering the next screenful. A limit of 1943
inputs ( 12 screenfuls less 1 ) was arbitrarily chosen for demonstration
purposes
( more would be possible, depending on memory available ). This limit can be
easily set to a shorter value to control message length to make cryptanalysis
more
difficult.
Printing is considered essential for the purpose of having a record of what was
sent and how it was encrypted or decrypted ( e.g., was the cleartext entered
correctly and was the machine correctly set ? ). It also eliminates the need
for
a second person to transcribe the output. Attached are four exhibits that are
examples of the printouts that can be produced:
This checksum is printed. If it does not agree with that provided in the SOI,
then all the settings must be re-entered by restarting the program.
Intermittent
rotation of each rotor is a function of the installed rotors and previous
entries
and does not have to be specified.
3. The External Control Settings: This lists the settings that the
operator selects and enters for the specific message. They consist of the
Initial
Settings of each rotor and optionally the Superencipherment Table number if it
is
used. These settings add to the Internal Checksum and produce an External
Checksum in the form of a 2-digit number ( mod-100 of the total sum ) that is
sent
with the message. The superencipherment table counter setting is NOT included
and
is NOT sent because the recipient does not have to know it. (See A1, B1, C1, D1
)
4. The Input / Output Message Text: This duplicates that which appears
on the monitor screen and is provided primarily for a message audit ( to insure
that the message was entered correctly ). Each "line" has 27 inputs with the 27
outputs below. Twenty-seven was used to provide legibility on an 80-column
screen. Six such "lines" are possible for each screenful. (See A1, B1, C1 or D1
)
The Enigma 95 is a program written in Microsoft QBasic. This was done so that
it
could be run on any standard MS DOS computer using MS DOS 5 or higher ( QBasic
is
bundled with MS DOS ) thereby eliminating the need for a specialized computer.
It
fits onto a 3.5 inch floppy disc, together with the necessary data files that
constitute the Regular Rotors Set, Reversing Rotors Set, Character Sets and
Superencipherment Tables. It is possible to also have on the same disk, the
programs that create these files and the necessary documentation ( .DOC ) text
files for each one. This makes the Enigma 95 very portable, very inexpensive
and
very easy to replicate.
Any computer that will run MS DOS QBasic is suitable for the Enigma 95. A color
monitor is preferred but not essential. A printer is very useful, but could be
eliminated if one is willing to copy output manually from the monitor screen (
as
the original Enigma required ).
1. The computer is turned on, QBasic is selected and the Enigma95 program is
loaded and run.
2. You are asked to place the data files disk in the Drive B so that they will
be
available.
01 03 04 05 06 08 09 10 11 13 15 16 18 19 20
21 22 24 25 27 28 29 30 34 36 38 39
41 42 46 47 49 51 57 58 60
61 63 64 65 68 70 71 72 73 74 75 76 78 79
82 83 86 89 90 92 95 96 97 00
---------------------------------------- Figure 1
----------------------------------------
c. Number of rotors to be used ( 1 to 12 )
d. The rotor number ( 1 to 100 ) for each position and its orientation (
1=Fwd,
2 = Bkwd )
e. The reversing rotor number ( 1 to 100 ) ( Figure 2 )
--------------------------------------------------------------------------------
----------
For example : < RO > or < RRO > or < RRRO > <enter>
< 71 > < 232 > < 1001 >
ROTOR ORIENTATION
f. The rotational shift value for each rotor ( a prime number between 0
and 97
inclusive less 2 and 5 ) ( Figure 3 )
--------------------------------------------------------------------------------
----------
0,1,3,7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97
---------------------------------------- Figure 3
----------------------------------------
( See S.O.I. )
---------------------------------------- Figure 4
----------------------------------------
h. The rotational value for the character set ( the same range as f.
above ). (
Figure 5 )
--------------------------------------------------------------------------------
----------
( See the current S.O.I. for the values to use )
USING ONE OF THE FOLLOWING PRIME NUMBERS NOT USED FOR THE ROTORS
0,1,3,7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97
ROTATIONAL VALUE : 89
----------------------------------------- Figure 5
---------------------------------------
5. The Internal Checksum is displayed and then you are asked for the
External
Control Settings:
a. Initial settings for the regular rotors ( 1 to 100 ).
b. Initial setting for the reversing rotor ( 1 to 100 ).
( Figure 6 )
--------------------------------------------------------------------------------
----------
ROTOR 1 : 15
ROTOR 2 : 22
ROTOR 3 : 09
ROTOR 4 : 41
ROTOR 5 : 87
ROTOR 6 : 36
ROTOR 7 : 08
ROTOR 8 : 01
ROTOR 9 : 57
ROTOR 10 : 91
ROTOR 11 : 03
ROTOR 12 : 49
REVERSING ROTOR : 77
---------------------------------------- Figure 6
----------------------------------------
--------------------------------------------------------------------------------
----------
( See your list )
----------------------------------------- Figure 7
---------------------------------------
6. The opening screen for beginning the message entry appears with: (
Figure 8 )
a. The External Checksum.
b. Instructions for starting and stopping text entry and making
corrections.
--------------------------------------------------------------------------------
----------
ENTERNAL CHECKSUM = 99
---------------------------------------- Figure 8
----------------------------------------
7. After pressing <enter>, a blank screen will appear with the initial Rotor
Display at
the bottom and START ENTERING MESSAGE will appear in the middle of the screen. (
Figure 9 )
--------------------------------------------------------------------------------
----------
Rotor Display 15 22 09 41 87 36 08 01 57 91 03 49
77
---------------------------------------- Figure 9
----------------------------------------
8. At this point you can start entering text and see it appear on the
monitor,
starting at the upper left corner, and filling left to right. The input
and its
related output will appear simultaneously. At the bottom of the screen,
above the
rotor display, are instructions for ending the input and for making
corrections to
the input. There is also a count of input at the right corner. ( Figure
10 )
--------------------------------------------------------------------------------
----------
F O U R S C O R E A N D S E V E N Y E A R S
A
FM VQ ND OU UF OF EN MX FE ZR DO YD BS YW VO RB BB HC QI UR ZD BW BZ TQ EO
WD RF
----------------------------------------------------------------------------
----
G O , O U R F
FW DP JA XW QN ZX OT DA WX
Enter '\' to end message. Press 'Shift |' to make correction. Input No.
36
Rotor Display 41 73 31 61 44 79 62 00 11 72 25 67
04
---------------------------------------- Figure 10
---------------------------------------
When numbers are repeated in a rotor column, this indicates that the rotor
did not
rotate after that specific input. When rotation does occur, it rotates
the amount
previously set for that rotor. This illustration is not part of the
regular
operating display. It was used only as a test and to illustrate
intermittent
movement.
--------------------------------------------------------------------------------
----------
Start 15 22 09 41 87 36 08 01 57 91 03 49 77
-- -- -- -- -- -- -- -- -- -- -- -- --
1 F 87 15 51 10 12 87 49 19 48 60 52 03 68 08 52
FM
2 O 26 15 51 11 83 87 49 19 48 63 52 03 68 39 18
VQ
3 U 64 15 51 12 54 04 62 19 48 66 52 03 68 70 06
ND
4 R 57 15 51 13 54 21 62 30 48 69 13 26 87 01 15
OU
5 S 79 22 80 14 25 21 62 30 95 69 13 26 06 32 03
UF
6 C 10 29 09 15 96 21 75 41 42 69 74 49 06 32 64
OF
7 O 81 29 09 15 96 38 75 41 42 69 35 49 06 32 69
EN
8 R 01 36 38 15 67 38 75 52 42 69 35 72 25 32 03
MX
9 E 65 36 38 15 38 38 75 63 42 72 96 72 44 32 92
FE
10 06 43 67 16 09 55 88 74 89 75 96 72 63 32 37
ZR
11 A 20 50 67 16 80 72 88 74 89 78 57 72 82 63 53
DO
12 N 12 50 96 16 80 89 88 85 89 81 18 95 01 94 34
YD
13 D 61 57 25 17 80 89 88 85 89 81 79 18 01 94 46
BS
14 50 57 25 18 51 06 88 96 89 81 79 18 20 94 93
YW
15 S 89 64 25 18 51 06 01 96 36 84 79 18 39 25 42
VO
16 E 42 64 54 19 22 23 14 96 36 84 40 18 39 25 65
RB
17 V 71 64 83 20 22 23 27 96 36 84 01 41 58 25 13
BB
18 E 64 64 83 21 93 40 40 96 83 84 62 64 77 56 66
HC
19 N 89 64 83 21 93 57 40 96 83 87 62 87 77 56 53
QI
20 16 71 12 22 64 57 53 07 30 87 62 10 96 56 20
UR
21 Y 84 71 12 22 64 74 53 07 30 90 23 10 15 56 60
ZD
22 E 8 78 12 22 35 91 66 07 77 93 23 10 34 56 93
BW
23 A 52 78 12 23 06 08 66 07 77 96 84 10 53 56 80
BZ
24 R 77 85 41 24 06 25 66 07 24 96 84 10 72 87 39
TQ
25 S 99 92 41 25 06 42 66 18 71 96 84 10 91 18 55
EO
26 82 92 70 25 06 59 66 29 18 96 84 33 10 18 20
WD
27 A 96 92 99 25 77 59 66 29 18 96 45 33 10 49 92
RF
28 G 65 99 99 26 77 76 66 29 65 99 06 33 29 49 01
FW
29 O 23 99 28 26 77 76 66 40 12 02 67 33 48 49 01
DP
30 ' 36 06 57 27 77 93 66 40 59 05 28 56 67 80 65
JA
31 37 13 86 27 48 10 66 40 59 05 89 79 67 11 59
XW
32 O 56 20 15 28 19 10 66 40 06 08 50 79 67 11 18
QN
33 U 94 27 15 28 19 27 66 40 06 08 50 02 67 11 38
ZX
34 R 87 34 44 29 90 27 79 40 53 11 50 02 67 42 34
OT
35 81 34 44 30 61 27 79 51 53 11 11 02 67 73 28
DA
36 F 72 41 73 31 61 44 79 62 00 11 72 25 67 04 17
WX
----------------------------------------- Figure 11
--------------------------------------
- 13 -
Rotor No. 01 02 03 04 05 06 07 08 09 10 11 12 RR
Rotation 7 29 1 71 17 13 11 47 3 61 23 19 31
Start Posn 15 22 09 41 87 36 08 01 57 91 03 49 77
-- -- -- -- -- -- -- -- -- -- -- -- --
1 F 87 [] 51 10 12 [] 49 19 48 60 52 [] 68 08 52
FM
2 O 26 [] [] 11 83 [] [] [] [] 63 [] [] [] 39 18
VQ
3 U 64 [] [] 12 54 04 62 [] [] 66 [] [] [] 70 06
ND
4 R 57 [] [] 13 [] 21 [] 30 [] 69 13 26 87 01 15
OU
5 S 79 22 80 14 25 [] [] [] 95 [] [] [] 06 32 03
UF
6 C 10 29 09 15 96 [] 75 41 42 [] 74 49 [] [] 64
OF
7 O 81 [] [] [] [] 38 [] [] [] [] 35 [] [] [] 69
EN
8 R 01 36 38 [] 67 [] [] 52 [] [] [] 72 25 [] 03
MX
9 E 65 [] [] [] 38 [] [] 63 [] 72 96 [] 44 [] 92
FE
10 06 43 67 16 09 55 88 74 89 75 [] [] 63 [] 37
ZR
11 A 20 50 [] [] 80 72 [] [] [] 78 57 [] 82 63 53
DO
12 N 12 [] 96 [] [] 89 [] 85 [] 81 18 95 01 94 34
YD
13 D 61 57 25 17 [] [] [] [] [] [] 79 18 [] [] 46
BS
14 50 [] [] 18 51 06 [] 96 [] [] [] [] 20 [] 93
YW
15 S 89 64 [] [] [] [] 01 [] 36 84 [] [] 39 25 42
VO
16 E 42 [] 54 19 22 23 14 [] [] [] 40 [] [] [] 65
RB
17 V 71 [] 83 20 [] [] 27 [] [] [] 01 41 58 [] 13
BB
18 E 64 [] [] 21 93 40 40 [] 83 [] 62 64 77 56 66
HC
19 N 89 [] [] [] [] 57 [] [] [] 87 [] 87 [] [] 53
QI
20 16 71 12 22 64 [] 53 07 30 [] [] 10 96 [] 20
UR
21 Y 84 [] [] [] [] 74 [] [] [] 90 23 [] 15 [] 60
ZD
22 E 8 78 [] [] 35 91 66 [] 77 93 [] [] 34 [] 93
BW
23 A 52 [] [] 23 06 08 [] [] [] 96 84 [] 53 [] 80
BZ
24 R 77 85 41 24 [] 25 [] [] 24 [] [] [] 72 87 39
TQ
25 S 99 92 [] 25 [] 42 [] 18 71 [] [] [] 91 18 55
EO
26 82 [] 70 [] [] 59 [] 29 18 [] [] 33 10 [] 20
WD
27 A 96 [] 99 [] 77 [] [] [] [] [] 45 [] [] 49 92
RF
28 G 65 99 [] 26 [] 76 [] [] 65 99 06 [] 29 [] 01
FW
29 O 23 [] 28 [] [] [] [] 40 12 02 67 [] 48 [] 01
DP
30 ' 36 06 57 27 [] 93 [] [] 59 05 28 56 67 80 65
JA
31 37 13 86 [] 48 10 [] [] [] [] 89 79 [] 11 59
XW
32 O 56 20 15 28 19 [] [] [] 06 08 50 [] [] [] 18
QN
33 U 94 27 [] [] [] 27 [] [] [] [] [] 02 [] [] 38
ZX
34 R 87 34 44 29 90 [] 79 [] 53 11 [] [] [] 42 34
OT
35 81 [] [] 30 61 [] [] 51 [] [] 11 [] [] 73 28
DA
36 F 72 41 73 31 [] 44 [] 62 00 [] 72 25 [] 04 17
WX
---------------------------------------- Figure 12
---------------------------------------
9. Corrections are made by pressing the " shift and | " keys
simultaneously.
Light magenta numbers appear between the lines of input and output so that
you can
identify where the error is. This position number ( note 37 below ) is
entered (
Figure 13 ).
--------------------------------------------------------------------------------
----------
F O U R S C O R E A N D S E V E N Y E A R S
A
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
26 27
FM VQ ND OU UF OF EN MX FE ZR DO YD BS YW VO RB BB HC QI UR ZD BW BZ TQ EO
WD RF
----------------------------------------------------------------------------
----
G O , O U R F U R F A Y T H E R S
28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52
53 54
FW DP JA XW QN ZX OT DA WX MG LY QW KM WQ EL WM DG XB HY
55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79
80 81
82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00 01 02 03 04 05 06
07 08
09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
34 35
36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
61 62
Enter '\' to end message. Press 'Shift |' to make correction. Input No.
46
ENTER THE (FIRST) POSITION TO CORRECT 37
----------------------------------- Figure 13
--------------------------------------------
10. The <enter> key is pressed twice. The screen will blank and then
automatically
refill with "good" text up to that number and stop. CONTINUE ENTERING
MESSAGE will
appear in the middle of the screen. Entry of correct text is then
continued from that
point onwards ( Figure 14 ).
--------------------------------------------------------------------------------
----------
F O U R S C O R E A N D S E V E N Y E A R S
A
FM VQ ND OU UF OF EN MX FE ZR DO YD BS YW VO RB BB HC QI UR ZD BW BZ TQ EO
WD RF
----------------------------------------------------------------------------
----
G O , O U R F
FW DP JA XW QN ZX OT DA WX
CONTINUE ENTERING MESSAGE
Enter '\' to end message. Press 'Shift |' to make correction. Input No.
36
Rotor Display 41 73 31 61 44 79 62 00 11 72 25 67
04
--------------------------------------- Figure 14
----------------------------------------
11. When the first screen is filled ( 162 characters input ) or is ended
with a
backslash ( \ ), the above control settings, etc. are printed, followed by
the text
screen. As each subsequent screenful is completed it will be printed.
This
continues until the end of the message is reached and the backslash ( \ )
key is
pressed. This causes any partial screen to be printed before the message
control
data, message form and other output is printed.
The term "data files" encompasses the files that constitute the 100 each
groupings of
Regular Rotors, Reversing Rotors, Character Sets and Superencipherment
Tables that
are used by Enigma 95. They have been described earlier and now they are
presented
for inspection. They were used in the examples discussed earlier.
A From 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
24 25
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
B To 58 28 56 40 80 78 05 92 49 31 14 93 30 77 62 64 79 25 13 22 41 65 29
43 39
A From 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
49 50
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
B To 51 19 73 02 01 42 83 94 08 69 04 07 66 57 84 26 54 44 09 68 85 52 34
03 46
A From 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73
74 75
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
B To 27 10 17 70 37 23 06 38 59 97 91 71 95 88 96 32 45 18 82 53 61 99 81
12 16
A From 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98
99 00
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
B To 36 60 24 48 67 33 11 72 63 76 21 75 87 86 00 50 47 35 98 90 89 74 20
55 15
From 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
24 25
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
To 48 65 34 39 86 95 82 51 12 71 17 09 90 26 43 42 11 91 67 60 59 89 87
25 24
From 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
49 50
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
To 14 83 78 99 72 77 61 35 03 33 53 57 97 04 50 96 16 15 93 49 62 54 01
45 40
From 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73
74 75
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
To 08 70 36 47 63 69 37 73 21 20 32 46 55 85 02 00 19 92 56 52 10 30 58
79 84
From 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98
99 00
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-- --
To 98 31 28 74 94 88 07 27 75 64 05 23 81 22 13 18 68 44 80 06 41 38 76
29 66
Posn 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Char # q . c j t + 9 A * 4 f r O ~ , { 8 d
Posn 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Char y o 5 R n h w X D p g M ~ 3 S e m l T -
Posn 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Char [ U 1 & @ / z ~ ~ Q a = P ! C 7 ~ 0 K u
Posn 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Char B ' ~ Y s b < G W v ? I ~ H ( > E : ~ x
Posn 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 00
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Char } L J ~ k Z F ~ _ ) N ~ 2 ; V i 6 ] % $
Letter "A" = 10 initially. After the first input, "A" = "99", then "88" (
For a
rotation values of 89 ), etc.
01 02 03 04 05 06 07 01 02 03 04 05 06 07
-- -- -- -- -- -- -- -- -- -- -- -- -- --
01 HO HI BV FW DP PX BK 51 AO YC JI VC CT ET IX
02 EF DS SJ QJ MK BH GS 52 DD NO NL FM XA EM
03 BG HD EP UF MX YB WV 53 NT PJ CJ DO QI AN FC
04 JG OO TI QW UJ IQ 54 TD VR TV QG EE JU RK
05 VW ZL BX LD KF TL CM 55 QD GE MD EO OX JW IH
06 DQ XZ CK ND AM MH LE 56 XP BL UN FQ KR MV
07 WO FH PT FY WN GN SI 57 OL CH SU NI GX HZ DU
08 UW FN RA YU YR ZZ 58 MS MJ FA EW TY YX WJ
09 WB DZ OJ LU QL WZ SK 59 VA TO OI XW ZQ ZA WG
10 XG KL OB RE QP UQ JH 60 RJ IK YH ZD SR HJ
11 FU WI QS MP UX ZH IF 61 M0 AA NZ AP IV JB VS
12 KP OA SF IG SO FS 62 DE LF FO UP EV CB GB
13 CY BJ TJ BB KQ WE PA 63 GH UV IM OE XL ST QF
14 NK BQ HA HU FG XS CN 64 GF TX NS OF NU VY
15 VU FI UB OU YV GT PH 65 SG KC MN RB JA KE TE
16 UH PI RU LC HB NJ 66 VX CW QO HC BM SC ES
17 LQ NM UD WX WM EH PQ 67 VJ PF QQ QR LS XI BE
18 CF HM DY VQ QN HW AS 68 LJ LV ZT LY DM WC
19 JV CX ED XC OG ID KS 69 JN YG XV EN FL AB TT
20 HH AX AJ UR WD MY 70 VP AT GL PO KI IY WK
21 YY KA NF AI VT ZO TM 71 ME UU SX XN RN HE KD
22 ER DX JF QK TF MA FT 72 YI QA GA EL KO QH
23 HF OH DC VM VD VG RR 73 LX CS FK PE JO YN VK
24 JX FZ SD UZ DN FX 74 WU LT DR ZC IE BC XK
25 RG PG HX RM IJ RQ LZ 75 XR US KG EQ JZ QT MB
26 KX YA GO XQ OM FD NC 76 CP IU PK ZN IZ AW
27 IA BP PZ II KH PP IO 77 GU QB EY ZV LM XF TG
28 MM UL IT DA GQ IB 78 EC SS VH NP PS ZI ON
29 IW CU IC GI KY BR CL 79 MR TU NW AY QM ZY BY
30 KJ PL JE DJ RT XU PU 80 QC OD RW BZ CZ SW
31 CE JK WS UT AD AK JJ 81 ZP SA XO YZ NG EU QE
32 UK XJ PR JY XY SQ 82 GJ ZW RX RH EK AC JC
33 WL KV LG YM NR BA EB 83 TA OS KZ CQ UA WP AV
34 IP CR LB YD OT XB GC 84 TK OW AH UY HP DW
35 QU YP JT VB KT AR VI 85 FR WW PY KM WQ MQ LN
36 HK UM RY AU ZM BI 86 SY GZ TR RC BO UC EI
37 MZ PD YK ZR UE JL NA 87 AQ DV RD YL RO PM KK
38 OC TZ DF ZX CC NB IS 88 KU CA CQ MG QV YS
39 BF XE NH TQ HN SE JM 89 NV BU GK EJ GR LW MW
40 SL LI WF NQ NN XT 90 PB OR TB RV VN CV VL
41 MF MC WH OZ VE ZG AG 91 DL TN DB LP YO LH LL
42 HG GD GG VO OQ UO HS 92 QZ DI XM FE RF WA
43 HL SM VF SZ PW HV RL 93 YQ MI NX YW BW PN GY
44 KW JQ SN ZB BD VZ 94 LO JS GV YE ML YT FP
45 WY EZ SB AZ GW ZS ZF 95 OV JD DT DG QX PV JR
46 OP NE GP BS RS CO HQ 96 NY EA MU AL FJ CD
47 LK YJ IN ZJ XH CI PC 97 OY KB ZU HY GM QY TW
48 RI WT FF RP SH EX 98 FB TS HR UG TH BN IL
49 MT XD ZE WR AF DH RZ 99 EG YF IR LR SP TC LA
50 DK ZK UI JP VV HT TP 00 AE KN SV FV XX BT OK
The Enigma rotor operation principle has probably been long superseded by
much more
sophisticated methods of encryption that are faster and more secure, but
it will
remain interesting for a long time to amateurs such as myself. It is
something that
is understandable and before the advent of the computer, resulted in some
beautiful
machines.
The Enigma 95 is not one now, but I believe that it could be "translated"
into a
handsome electro-mechanical device. It is something to dream about.
The only absolutely secure cipher is the One Time Pad and it has the
disadvantage of
requiring copies to be destroyed after one use. The Enigma 95 is an
attempt to
approach this holy Grail of cryptography by providing an almost unlimited
supply of
enhanced (both in size and method of rotation) Rotors, Character Sets,
Superencipherment Tables and a lengthened Plugboard. While I cannot prove
it
mathematically or otherwise, I suspect that the ability to use almost
unlimited
expendable sets of all possible combinations of these for very limited
periods (throw
away feature) such as is possible in the Enigma 95, would strengthen any
cipher
considerably by preventing the accumulation of sufficient material on
which to base
an in-depth cryptanalysis. Any comments would appreciated.
The disk accompanying this article contains ENIGMA 95 and the necessary
supporting
files needed in its operation. Also included are program files to create them
and to
analyze and test its operation. DOC files are included for each file to explain
them. Start with CRYPTO.1ST, then read ENIGMA95.DOC and study ENIGMA95.FLO to
gain
an understanding of Enigma 95 before running it. The list of files is:
ENIGMA95.WRI : The article about Enigma 95. ( Created using Windows 3.1
Write )
EXHIBIT A-1
EXHIBIT A-2
108 02
--------------------------------------------------------------------------------
Column and row totals. Do not transmit unless requested.
33 24 15 85 06 34 88 93 96 01 56 61 81 69 69 62 02 55 35 64 78 69 19 36 39 29 03
83 67 78 74
EXHIBIT A-3
INPUT FREQUENCY ANALYSIS
Total = 108
Total = 108
EXHIBIT A-4
EXHIBIT B-1
EXHIBIT B-2
Messsage No.--------------------From----------------------------------Date/Time
of Receipt
: :
: / :
: :
: / :
--------------------------------------------------------------------------------
----------
FOURSCORE AND SEVEN YEARS AGO, OUR FOREFATHERS BROUGHT FORTH UPON THIS CONTINENT
A NEW NAT
ION. 1234567890(*)
EX
HIBIT B-3
EXHIBIT C-1
--------------------------------------------------------------------------------
15 22 09 41 87 36 08 01 57 91 03 49 77 35 99 10 31 95 17 00 58
--------------------------------------------------------------------------------
FM VQ ND OU UF OF EN MX FE ZR DO YD BS YW VO RB BB HC QI UR ZD BW BZ TQ EO WD RF
FW DP JA XW QN ZX OT DA WX SZ OE UG SR NU OZ UT MP KQ FQ MY XB KE NI EL PE DG RE
AN XC AI VM GX VT ZQ JY AL AZ JP VD AY GI PX WA DJ IG RT OQ QW EW RH BM RC NQ GQ
II BO VG MG IB UX XQ XU LP ZN RV AM FJ CQ KM ZC RP VY CD EK CZ FC FV ZA RM IE JO
108
EXHIBIT C-2
Total = 108
OUTPUT FREQUENCY ANALYSIS
\2 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Total
1\ -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-----
A 1 1 1 1 1 1
6
B 1 1 1 1 1 1
6
C 1 1 1
3
D 1 1 1 1 1
5
E 1 1 1 1 1
5
F 1 1 1 1 1 1 1
7
G 1 1 1
3
H 1
1
I 1 1 1 1
4
J 1 1 1 1
4
K 1 1 1
3
L 1
1
M 1 1 1 1
4
N 1 1 1 1
4
O 1 1 1 1 1 1
6
P 1 1
2
Q 1 1 1
3
R 1 1 1 1 1 1 1 1 1
9
S 1 1
2
T 1
1
U 1 1 1 1 1
5
V 1 1 1 1 1 1 1
7
W 1 1 1
3
X 1 1 1 1 1
5
Y 1 1
2
Z 1 1 1 1 1 1 1
7
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-----
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Total
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
-----
4 4 5 6 6 3 5 1 5 2 1 2 6 4 5 5 10 3 1 4 3 2 6 6 4 5
108
EXHIB
IT C-3
EXHIBIT D-1
Messsage No.--------------------From----------------------------------Date/Time
of Receipt
: :
: / :
: :
: / :
--------------------------------------------------------------------------------
----------
FOURSCORE AND SEVEN YEARS AGO, OUR FOREFATHERS BROUGHT FORTH UPON THIS CONTINENT
A NEW NAT
ION. 1234567890(*)
R, A, T, S A= E+1 +4,9
----------- B
|Q UA RT ET E
-A I > A
----- O=0
T UA Q >A, T
-T SI R =2,3
----- S
U RT T
-A UT U =S+1 > A, E
----- T
E AO ET U
-E ES UB
---------
R AR
2 4 1 7 4=4,9
+ ------------ 9> 1
| 5 84 21 31 3
-4 6
---------------- 0=0
1 84 5>4,1
-1 76 2=2,3
---------------- 7
1
8 21 8=7+1 >4,3 =7,8
-4 81 1
---------------- 8
3 40 31
-3 37 89
----------------
2 42
A B E I O Q R S T U 1 2 3 4 5 6 7 8 9 0
T R E A Q I S U B O
A B E I O Q R S T U 0 1 2 3 4 5 6 7 8 9
O T R E A Q I S U B
A B E I O Q R S T U 0 9 8 7 6 5 4 3 2 1
O B U S I Q A E R T
A B E I O Q R S T U 9 8 7 6 5 4 3 2 1 0
B U S I Q A E R T O
Hill-1
P1 = 5(C1) + 1(C2)
P2 = 2(C1) + 7(C2)
-------------------
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[FOWL] Fowler, Mark and Radhi Parekh, " Codes and Ciphers,
- Advanced Level," EDC Publishing, Tulsa OK, 1994.
(clever and work)
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[KAH3] Kahn, David, "Seizing The Enigma: The Race to Break the
German U-Boat Codes 1939-1943 ", Houghton Mifflin, New
York, 1991.
[LAIM] Lai, Xuejia, and James L. Massey, "A Proposal for a New
Block Encryption Standard," Advances in Cryptology -
Eurocrypt 90 Proceedings, 1992, pp. 55-70.
[LAKE] Lakoff, R., "Language and the Women's Place," Harper &
Row, New York, 1975.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson,
New York, 1992.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
[WINT] Winton, J., " Ultra at Sea: How Breaking the Nazi Code
Affected Allied Naval Strategy During WWII," New Uork,
William Morror, 1988.
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 15
STATISTICAL ATTACKS
SUMMARY
Lecture 15 considers the role and influence that statistics
and probability theory exert on the cryptanalysis of unknown
ciphers. We develop our subject by the following references:
[FRE3], [SINK], [MAST], [ELCY], [GLEA], [KULL].
DISCUSSION
SCOPE
No. 1
Alpha 16 21 13 5 6 4 17 19 21 21 2 6 3 6 13 13 1 7 12 6
Plain W H E N I N T H E C O U R S E L O N G M
Cipher E Q N B T F Y R C X X L Q J N Z O Y A W
No. 2
Alpha 16 21 13 5 6 4 17 19 21 21 2 6 3 6 13 13 1 7 12 6
Plain T H E G E N E R A L A B S O L U T E L Y
Cipher P Q N T U F B W D J L Q H Y Z P T M Q I
No. 1
Alpha 16 21 13 5 6 4 17 19 21 21 2 6 3 6 13 13 1 7 12 6
Plain W H E N I N T H E C O U R S E L O N G M
Cipher E Q N B T F Y R C X X L Q J N Z O Y A W
No. 2
Alpha 16 21 13 5 6 4 17 19 21 21 2 6 3 6 13 13 1 7
Plain T H E G E N E R A L A B S O L U T E
Cipher P Q N T U F B W D J L Q H Y Z P T M
(8) Note the two Z's and they represent the plain text L.
This occurred because the same cipher alphabet came into
play by chance twice to encipher the same plain text
letter both times. This may distort the Kr value for
some systems.
nCr = n!/r!(n-r)!
n(n-1)(n-2)!/2(n-2)!
becomes n(n-1)/2
RULE
Table 15 -1
2 1 16 120
3 3 17 136
4 6 18 153
5 10 19 171
6 15 20 190
7 21 21 210
8 28 22 231
9 36 23 253
10 45 24 276
11 55 25 300
12 66 26 325
13 78 27 351
14 91 28 378
15 105 29 406
30 435
C
K
B
K
Z
K
C
B
B
K
There are 10 letters with 3B's, 2C's 4K's and 1 Z. The 3B's
yield 3 coincidences, the 2 C's yield 1 coincidence, the 4
K's yield 6 coincidences. The sum is 3 + 1 + 6 = 10
coincidences in 45 comparisons = 0.2222
The method:
(7) Continue the process until all the messages are lined up
correctly.
Message 1
Message 2
CWHPK KXFLU MKURY XCOPH WNJUW KWIHL
OKZTL AWRDF GDDEZ DLBOT FUZNA SRHHJ
NGUZK PRCDK YOOBV DDXCD OGRGI RMICN
HSGGO PYAOY X. [101]
Message 3
Message 4
* * *
No. 1 PGLPN HUFRK SAUQQ AQYUO ZAKGA EOQCN
No. 2 CWHPK KXFLU MKURY XCOPH WNJUW KWIHL
*
No. 1 PRKOV HYEIU YNBON NFDMW ZLUKQ AQAHZ
No. 2 OKZTL AWRDF GDDEZ DLBOT FUZNA SRHHJ
* * *
No. 1 MGCDS LEAGC JPIVJ WVAUD BAHMI HKORM
No. 2 NGUZK PRCDK YOOBV DDXCD OGRGI RMICN
*
No. 1 LTFYZ LGSOG K. [101]
No. 2 HSGGO PYAOY X. [101]
* * *
No. 1 PGLPNHUFRKSAUQQAQYUOZAKGAEOQCN
No. 2 CWHPKKXFLUMKURYXCOPHWNJUWKW
* *
No. 1 PRKOVHYEIUYNBONNFDMWZLUKQAQAHZ
No. 2 IHLOKZTLAWRDFGDDEZDLBOTFUZNASR
* **
No. 1 MGCDSLEAGCJPIVJWVAUDBAHMIHKORM
No. 2 HHJNGUZKPRCDKYOOBVDDXCDOGRGIRM
*
No. 1 LTFYZLGSOGK.
No. 2 ICNHSGGOPYAOYX. [98]
1 2 3
-----------------
1| x 9 3
|
2| x x 3
|
3| x x x
*
No. 1 PGLPNHUFRKSAUQQAQYUOZAKGAEOQCN
No. 2 CWHPKKXFLUMKURYXCOPHWNJUWKW
No. 3 WFWTDNHTGMRAAZGPJDSQAUPFROXJRO
* * *
No. 1 PRKOVHYEIUYNBONNFDMWZLUKQAQAHZ
No. 2 IHLOKZTLAWRDFGDDEZDLBOTFUZNASR
No. 3 HRZWCZSRTEEEVPXOATDQLDOQZHAWNX
* *
No. 1 MGCDSLEAGCJPIVJWVAUDBAHMIHKORM
No. 2 HHJNGUZKPRCDKYOOBVDDXCDOGRGIRM
No. 3 THDXLHYIGKVYZWXBKOQOAZQNDTNALT
No. 1 LTFYZLGSOGK.
No. 2 ICNHSGGOPYAOYX.
No. 3 CNYEHTSCT.
so:
1 2 3
-----------------
1| x 9 3
|
2| x x 3
|
3| x x x
1 - 3 99 ~ 7 3 -57
2 - 3 96 ~ 6 3 -50
1- 2- 3 293 ~ 20 15 -21
*
No. 1 PGLPNHUFRKSAUQQAQYUOZAKGAEOQCN
No. 2 CWHPKKXFLUMKURYXCOPHWNJUWKW
No. 3 WFWTDNHTGMRAAZGPJDSQAUPFROXJR
* * * *
No. 1 PRKOVHYEIUYNBONNFDMWZLUKQAQAHZ
No. 2 IHLOKZTLAWRDFGDDEZDLBOTFUZNASR
No. 3 OHRZWCZSRTEEEVPXOATDQLDOQZHAWN
* *
No. 1 MGCDSLEAGCJPIVJWVAUDBAHMIHKORM
No. 2 HHJNGUZKPRCDKYOOBVDDXCDOGRGIRM
No. 3 XTHDXLHYIGKVYZWXBKOQOAZQNDTNAL
* *
No. 1 LTFYZLGSOGK.
No. 2 ICNHSGGOPYAOYX.
No. 3 TCNYEHTSCT.
1 2 3
-----------------
1| x 9 10
|
2| x x 7
|
3| x x x
1 - 3 99 ~ 7 10 +43
2 - 3 97 ~ 6 6 0
1- 2- 3 294 ~ 20 25 +25
No. 1 PGLPNHUFRKSAUQQAQYUOZAKGAEOQCN
No. 2 CWHPKKXFLUMKURYXCOPHWNJUWKW
No. 3 WFWTDNHTGMRAAZGPJDSQAUPFROXJR
No. 4 TULDHNQEZZUTYGDUEDUPSDLIOLNN
No. 1 PRKOVHYEIUYNBONNFDMWZLUKQAQAHZ
No. 2 IHLOKZTLAWRDFGDDEZDLBOTFUZNASR
No. 3 OHRZWCZSRTEEEVPXOATDQLDOQZHAWN
No. 4 BONYLQQVQGCDUTUBQXSOSKNOXUVKCY
No. 1 MGCDSLEAGCJPIVJWVAUDBAHMIHKORM
No. 2 HHJNGUZKPRCDKYOOBVDDXCDOGRGIRM
No. 3 XTHDXLHYIGKVYZWXBKOQOAZQNDTNAL
No. 4 JXCNJKSANGUIFTOWOMSNBQDBAIVIKN
No. 1 LTFYZLGSOGK.
No. 2 ICNHSGGOPYAOYX.
No. 3 TCNYEHTSCT.
No. 4 WGVSHIEP.
1 2 3 4
----------------------
1| x 9 10 7
|
2| x x 7 7
|
3| x x x 5
|
4| x x x x
1 - 3 96 ~ 6 7 +16
2 - 3 95 ~ 6 7 +16
3 - 4 96 ~ 6 5 -16
1,2,3,4 581 ~39 44 +10
No. 1 PGLPNHUFRKSAUQQAQYUOZAKGAEOQCN
No. 2 CWHPKKXFLUMKURYXCOPHWNJUWKW
No. 3 WFWTDNHTGMRAAZGPJDSQAUPFROXJR
No. 4 TULDHNQEZZUTYGDUEDUPSDLIOLN
No. 1 PRKOVHYEIUYNBONNFDMWZLUKQAQAHZ
No. 2 IHLOKZTLAWRDFGDDEZDLBOTFUZNASR
No. 3 OHRZWCZSRTEEEVPXOATDQLDOQZHAWN
No. 4 NBONYLQQVQGCDUTUBQXSOSKNOXUVKC
No. 1 MGCDSLEAGCJPIVJWVAUDBAHMIHKORM
No. 2 HHJNGUZKPRCDKYOOBVDDXCDOGRGIRM
No. 3 XTHDXLHYIGKVYZWXBKOQOAZQNDTNAL
No. 4 YJXCNJKSANGUIFTOWOMSNBQDBAIVIK
No. 1 LTFYZLGSOGK.
No. 2 ICNHSGGOPYAOYX.
No. 3 TCNYEHTSCT.
No. 4 NWGVSHIEP.
1 2 3 4
----------------------
1| x 9 10 3
|
2| x x 7 3
|
3| x x x 2
|
4| x x x x
Ciphertext P G L P N H U F R K S A U Q Q
Assumed Plain D I V I S I O N
Resultant Key S O G X F
Ciphertext P G L P N H U F R K S A U Q Q
Assumed Plain . D I V I S I O N
Resultant Key . J T K
nope, shift one more, and one and finally to the end with no
resultant intelligent key.
Ciphertext P G L P N H U F R K S A U Q Q
Assumed Plain R E G I M E N T N O
Resultant Key E L A N D O F T H E
Key E L A N D O F T
No 1 Ciphertext P G L P N H U F R K S A U Q Q
Plain R E G I M E N T
No 2 Ciphertext C W H P K K X F L U M K
Plain I E L D T R A I
No 3 Ciphertext W F W T D N H T G M R A A Z
Plain L I N G K I T C
No 4 Ciphertext T U L D H N Q E Z Z U T Y
Plain T I T A N K G U
UNKNOWN SEQUENCES
Two things are required for solution: the logical answer must
be offered and it must be unique. The Bacon-Shakespeare
"cryptographers tend to overlook the latter issue.
To attempt to solve a cryptogram enciphered as previously
described is like solving an equation in two unknowns with
absolutely no data available for solution but the solution
itself. The key is one unknown and the plain text is the
other. Any one quantity may be chosen and yield a viable
result without the required uniqueness constraint being
observed. There are an infinite number of solutions
possible.
The problem is better defined when the running key
constitutes intelligent test, or if it is used to encipher
more than one message, or if it is the secondary result of
the interaction of two or more short primary keys which go
thru cycles themselves. The additional information in these
cases are enough to meet the uniqueness constraint.
Table 15-2
3 1 1 7 1 2 3 1 2 5 6 2 5 6 2 2
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
3 1 1 7 1 2 3 1 2 5 6 2 5 6 2 2
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
3+0+0+1+21+0+0+1+3+0+0+0+1+10+15+0+0+1+10+15+1+0+1+0+0+0=83
.0067N(N-1)/2
Fa(Fa-1)/2 +Fb(Fb-1)/2+...+Fz(Fz-1)/2.
Let Fa = any letter A..Z and d = the sum of all terms that
follow it. The distribution d(Fa**2-Fa)/2 represents the
actual coincidences.
and dFa = N
expanding terms:
and rearranging:
further reducing:
finally:
1 4 3 1 1 1 1 3 2 2 1 1 3 2
F1 - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
2 3 1 1 1 1 3 1 1 1 2
F2 - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
We juxtapose the frequencies for convenience.
N1 = 26
Fa1 1 4 3 1 1 1 1 3 2 2 1 1 3 2
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Fa2 2 3 1 1 1 1 3 1 1 1 2
N2 = 17
Fa1Fa2 0 8 0 0 0 3 0 0 1 0 0 0 0 0 1 0 0 9 2 2 0 0 0 0 0 4
d=30
N1N2 = 26 x 17 = 442
dFa1Fa2 30
------- = -- = 0.0711
N1N2 442
N1=26
1 4 3 1 1 1 1 3 2 2 1 1 3 2
F1 - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
F2 - B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
2 3 1 1 1 1 3 1 1 1 2
N2=17
Fa1Fa2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 3 2 0 0 0 0 3 0 0
dFa1Fa2=2+3+2+3= 10
dFa1Fa2 10
-------- = ---- = 0.226
N1N2 442
1 . . . 5 . . . . 10 . . . . 15 . . . . 20 . . . . . 26
A 7 3 4 8 3 1 12 3 2 3 8 7 3 6 9 1 1 3 2 4 8
B 112 3 2 3 8 7 3 6 9 1 1 3 2 4 8 7 3 8 3 1
C 3 112 3 2 3 8 7 3 6 9 1 1 3 2 4 8 7 3 4 8
..... A U L I C B ......
0 1 2 3 4 5
FIGURE 15-1
ALPHABET NO
1 5 10 15 20 26
A | AULICBEFGJKMNOPQSTVWXZHYDR
B | BEFGJKMNOPQSTVWXZHYDRAULIC
C | CBEFGJKMNOPQSTVWXZHYDRAULI
D | DRAULICBEFGJKMNOPQSTVWXZHY
E | EFGJKMNOPQSTVWXZHYDRAULICB
F | FGJKMNOPQSTVWXZHYDRAULICBE
C H | HYDRAULICBEFGJKMNOPQSTVWXZ
I I | ICBEFGJKMNOPQSTVWXZHYDRAUL
P J | JKMNOPQSTVWXZHYDRAULICBEFG
H K | KMNOPQSTVWXZHYDRAULICBEFGJ
E L | LICBEFGJKMNOPQSTVWXZHYDRAU
R M | MNOPQSTVWXZHYDRAULICBEFGJK
N | NOPQSTVWXZHYDRAULICBEFGJKM
O | OPQSTVWXZHYDRAULICBEFGJKMN
L P | PQSTVWXZHYDRAULICBEFGJKMNO
E Q | QSTVWXZHYDRAULICBEFGJKMNOP
T R | RAULICBEFGJKMNOPQSTVWXZHYD
T S | STVWXZHYDRAULICBEFGJKMNOPQ
E T | TVWXZHYDRAULICBEFGJKMNOPQS
R U | ULICBEFGJKMNOPQSTVWXZHYDRA
V | VWXZHYDRAULICBEFGJKMNOPQST
W | WXZHYDRAULICBEFGJKMNOPQSTV
X | XZHYDRAULICBEFGJKMNOPQSTVW
Y | YDRAULICBEFGJKMNOPQSTVWXZH
Z | ZHYDRAULICBEFGJKMNOPQSTVWX
Figure 15-2
Test 1
FV 1 2 2 6 4 8 7 2 1 1 1 1 1 6 4 2 4
1 . . . 5 . . . .10 . . . .15 . . . .20 . . . . . 26
FW 4 2 1 1 5 3 1 2 8 1 7 6 1 2 3 2 1 2
24. . 1 . . . 5 . . . .10 . . . .15 . . . .20 . . .
FVFW 4 1018 8 14 14 6 1 18 2 8
NV = 53, NW =52
dFVFW = 103
dFVFW = 103
----- --- = 0.037 nok.
NVNW 2756
Test 2
FV 1 2 2 6 4 8 7 2 1 1 1 1 1 6 4 2 4
1 . . . 5 . . . .10 . . . .15 . . . .20 . . . . . 26
FW 2 3 2 1 2 4 2 1 1 5 3 1 2 8 1 7 6 1
. .20 . . . 24. . 1 . . . 5 . . . .10 . . . .15 . .
FVFW 2 4 16 16 35 2 2 8 1 36
NV = 53, NW =52
dFVFW = 122
dFVFW = 122
----- --- = 0.044 nok.
NVNW 2756
Test 3
FV 1 2 2 6 4 8 7 2 1 1 1 1 1 6 4 2 4
1 . . . 5 . . . .10 . . . .15 . . . .20 . . . . . 26
FW 3 1 2 8 1 7 6 1 2 3 2 1 2 4 2 1 1 5
. 5 . . . .10 . . . .15 . . . .20 . . . . .26 1 . .
FVFW 3 2 4 48 4 56 7 4 3 2 1 2 24 8 2 20
NV = 53, NW =52
dFVFW = 190
dFVFW = 190
----- --- = 0.069 OK!
NVNW 2756
1 2 3 4
. . . V . . W . . .
Test 4
FV 1 2 2 6 4 8 7 2 1 1 1 1 1 6 4 2 4
1 . . . 5 . . . .10 . . . .15 . . . .20 . . . . . 26
FF 1 1 2 1 6 3 9 3 2 2 1 1 1 2 4 2 3 7
. .10 . . . .15 . . . .20 . . . . .26 1 . . . 5 . .
FVFF 1 4 36 12 72 14 2 1 1 1 2 24 8 6 28
NV = 53, NF =51
dFVFF = 212
dFVFW = 212
----- --- = 0.078
NVNF 2703
Test 5
FW 1 1 5 3 1 2 8 1 7 6 1 2 3 2 1 2 4 2
1 . . . 5 . . . .10 . . . .15 . . . .20 . . . . . 26
FF 3 7 1 1 2 1 6 3 9 3 2 2 1 1 1 2 4 2
5 . . . .10 . . . .15 . . . .20 . . . . .26 1 . . .
FVFF 3 35 2 48 3 63 18 2 6 2 1 4 16 4
NW = 52, NF =51
dFWFF = 210
dFWFF = 210
----- --- = 0.078
NWNF 2703
Test 6
dF(W+V)FF = 422
-------- --- = 0.079
N(W+V)NF 5355
1 2 3 4 5 6 7 8 9
V . . W . . . F .
2 R Y N N B U F R W W W W Y O I H F J K O K H T T A Z
R P L A I N A N D T H E M E A N S O F C O M M U N I
3 C L J E P P F R W C K O O F F F G E P Q R Y Y I W X
C A T I O N A N D W I T H T H E V A S T S I Z E O F
Take:
Plain HYDRAULICBEFGJKMNOPQSTVWXZ
Cipher FBPYRCQZIGSEHTDJUMKVALWNOX
1 2 3 4 5 6 7 8 91011121314
Plain F I R S T B A T T A L I O N
Cipher E I C N X D S P Y T U K Y Y
Index F E B C I L U A R D Y H Z X
shift(-) 1 2 3 4 5 6 7 8 910111213
Repeated letters in the text are two I's, three T's and two
A's. Lets look at them:
F I R S T B A T T A L I O N
1 2 3 4 5 6 7 8 91011121314
Plain . I . . . . . . . . . I . .
Cipher . I . . . . . . . . . K . .
Plain . . . . T . . T T . . . . .
Cipher . . . . X . . P Y . . . . .
Plain . . . . . . A . . A . . . .
Cipher . . . . . . S . . T . . . .
The two I's are 10 letters apart in both the plain and cipher
components. Since the cipher component is displaced one step
after each encipherment, two identical letters n intervals
apart in the plain text must yield cipher equivalents which
are n intervals apart in the cipher component. This leads to
the probable word and indirect symmetry attack on the
progressive cipher.
1 2 3 4 5 6 7 8 91011121314
Plain . . . . . . . . T . . . O N
Cipher . . . . . . . . Y . . . Y Y
1.......................26
Figure 15-3
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 I
2 K
3 M
4 K
5 I
6 L
7 I
8 D
9 O
10 L
11 W
12 L
13 P
14 N
15 M
16 V
17 W
18 P
19 X
20 W
21 D
22 U
23 F
24 F
25 T
26 F
1 2 3 4 5 6 7 8 9 10 11 12
Plain N I I G X G A M X C A D
Cipher . I L . . . . E O . . R
The next word after ARMY might be WILL. We then insert the
W in the plain and G in the Cipher.
MACHINE CRYPTOGRAPHY
from the discussion on the Chi (a) test we found that the
expected value of Fa(Fa-1)/2 +..+Fz(Fz-1) for A...Z is equal
to the theoretical number of coincidences of two letters to
be expected in N(N-1)/2 for N letters, which for normal
English plaintext is Kp x N(N-1)/2 and for random text is Kr
x N(N-1)/2.
Example 1:
1 1 2 3 4 2 1 4 2 1 1 3 N=25
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
E(ao) = 1x0+1x0+2x1+3x2+4x3+2x1+1x0+4x3+2x1+1x0+1x0+3x2=
2+6+12+2+12+2+6 = 42 o = observed
Example 2:
Y O U I J Z M M Z Z M R N Q C X I Y T W R G K L H
The distribution is
1 1 1 2 1 1 1 3 1 0 2 1 2 1 1 1 1 2 3 N=25
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d Fi(Fi-1) = 18
Table 15 - 3
DECIMAL - BASE 10
ADDITION
0 1 2 3 4 5 6 7 8 9
----------------------------
0 | 0 1 2 3 4 5 6 7 8 9
1 | 1 2 3 4 5 6 7 8 9 10
2 | 2 3 4 5 6 7 8 9 10 11
3 | 3 4 5 6 7 8 9 10 11 12
4 | 4 5 6 7 8 9 10 11 12 13
5 | 5 6 7 8 9 10 11 12 13 14
6 | 6 7 8 9 10 11 12 13 14 15
7 | 7 8 9 10 11 12 13 14 15 16
8 | 8 9 10 11 12 13 14 15 16 17
9 | 9 10 11 12 13 14 15 16 17 18
MULTIPLICATION
0 1 2 3 4 5 6 7 8 9
----------------------------
0 | 0 0 0 0 0 0 0 0 0 0
1 | 0 1 2 3 4 5 6 7 8 9
2 | 0 2 4 6 8 10 12 14 16 18
3 | 0 3 6 9 12 15 18 21 24 27
4 | 0 4 8 12 16 20 24 28 32 36
5 | 0 5 10 15 20 25 30 35 40 45
6 | 0 6 12 18 24 30 36 42 48 54
7 | 0 7 14 21 28 35 42 49 56 63
8 | 0 8 16 24 32 40 48 56 64 72
9 | 0 9 18 27 36 45 54 63 72 81
N 1 2 3 4 5 6 7 8 9
----------------------------------------------------
N Square 1 4 9 16 25 36 49 64 81
N Cube 1 8 27 64 125 216 343 512 729
N Fourth 1 16 81 256 625 1296 2401 4096 6561
N Fifth 1 32 243 1024 3125 7776 16807 32768 59049
N Sixth 1 64 729 4096 15625 46656 117649 262144 531441
N Sevnth 1 128 2187 16384 78125 279936 823543 2097152 4782969
X 2 4 5 5 5 5 6 8
Y 6 6 3 5 7 9 6 6
X * Y 12 24 15 25 35 45 36 48
Table 15 - 4
UNDECIMAL - BASE 11
ADDITION
1 2 3 4 5 6 7 8 9 A
----------------------------
1 | 2 3 4 5 6 7 8 9 A 10
2 | 3 4 5 6 7 8 9 A 10 11
3 | 4 5 6 7 8 9 A 10 11 12
4 | 5 6 7 8 9 A 10 11 12 13
5 | 6 7 8 9 A 10 11 12 13 14
6 | 7 8 9 A 10 11 12 13 14 15
7 | 8 9 A 10 11 12 13 14 15 16
8 | 9 A 10 11 12 13 14 15 16 17
9 | A 10 11 12 13 14 15 16 17 18
A |10 11 12 13 14 15 16 17 18 19
MULTIPLICATION
1 2 3 4 5 6 7 8 9 A
----------------------------
1 | 1 2 3 4 5 6 7 8 9 A
2 | 2 4 6 8 A 11 13 15 17 19
3 | 3 6 9 11 14 17 1A 22 25 28
4 | 4 8 11 15 19 22 26 2A 33 37
5 | 5 A 14 19 23 28 32 37 41 46
6 | 6 11 17 22 28 33 39 44 4A 55
7 | 7 13 1A 26 32 39 45 51 58 64
8 | 8 15 22 2A 37 44 51 59 66 73
9 | 9 17 25 33 41 4A 58 66 74 82
A | A 19 28 37 46 55 64 73 82 91
N 1 2 3 4 5 6 7 8 9 A
-------------------------------------------------
N Square 1 4 9 15 23 33 45 59 74 91
N Cube 1 8 25 59 104 187 292 427 603 82A
Table 15 - 5
DUODECIMAL - BASE 12
ADDITION
1 2 3 4 5 6 7 8 9 A B
-------------------------------
1 | 2 3 4 5 6 7 8 9 A B 10
2 | 3 4 5 6 7 8 9 A B 10 11
3 | 4 5 6 7 8 9 A B 10 11 12
4 | 5 6 7 8 9 A B 10 11 12 13
5 | 6 7 8 9 A B 10 11 12 13 14
6 | 7 8 9 A B 10 11 12 13 14 15
7 | 8 9 A B 10 11 12 13 14 15 16
8 | 9 A B 10 11 12 13 14 15 16 17
9 | A B 10 11 12 13 14 15 16 17 18
A | B 10 11 12 13 14 15 16 17 18 19
B |10 11 12 13 14 15 16 17 18 19 1A
MULTIPLICATION
1 2 3 4 5 6 7 8 9 A B
-------------------------------
1 | 1 2 3 4 5 6 7 8 9 A B
2 | 2 4 6 8 A 10 12 14 16 18 1A
3 | 3 6 9 10 13 16 19 20 23 26 29
4 | 4 8 10 14 18 20 24 28 30 34 38
5 | 5 A 13 18 21 26 2B 34 39 42 47
6 | 6 10 16 20 26 30 36 40 46 50 56
7 | 7 12 19 21 2B 36 41 48 53 5A 65
8 | 8 14 20 28 34 40 48 54 60 68 74
9 | 9 16 23 30 39 46 53 60 69 76 83
A | A 18 26 34 42 50 5A 68 76 84 92
B | B 1A 29 38 47 56 65 74 83 92 A1
N 1 2 3 4 5 6 7 8 9 A B
---------------------------------------------
N Square 1 4 9 14 21 30 41 54 69 84 A1
N Cube 1 8 23 54 A5 160 247 368 569 874 92B
X 2 3 3 4 4 6 6 6
Y 6 4 8 3 6 2 4 6
X * Y 10 10 20 10 20 10 20 30
X 6 6 8 8 8 9 9 2
Y 8 A 3 6 9 4 8 1
X * Y 40 50 20 40 60 30 60 2
X 2 3 3 3 4 4 4 4
Y 7 1 5 9 1 4 7 A
X * Y 12 3 13 23 4 14 24 34
Table 15 - 6
TERDECIMAL - BASE 13
ADDITION
1 2 3 4 5 6 7 8 9 A B C
----------------------------------
1 | 2 3 4 5 6 7 8 9 A B C 10
2 | 3 4 5 6 7 8 9 A B C 10 11
3 | 4 5 6 7 8 9 A B C 10 11 12
4 | 5 6 7 8 9 A B C 10 11 12 13
5 | 6 7 8 9 A B C 10 11 12 13 14
6 | 7 8 9 A B C 10 11 12 13 14 15
7 | 8 9 A B C 10 11 12 13 14 15 16
8 | 9 A B C 10 11 12 13 14 15 16 17
9 | A B C 10 11 12 13 14 15 16 17 18
A | B C 10 11 12 13 14 15 16 17 18 19
B | C 10 11 12 13 14 15 16 17 18 19 1A
C |10 11 12 13 14 15 16 17 18 19 1A 1B
MULTIPLICATION
1 2 3 4 5 6 7 8 9 A B C
----------------------------------
1 | 1 2 3 4 5 6 7 8 9 A B C
2 | 2 4 6 8 A C 11 13 15 17 19 1B
3 | 3 6 9 C 12 15 18 1B 21 24 27 2A
4 | 4 8 C 13 17 1B 22 26 2A 31 35 39
5 | 5 A 12 17 1C 24 29 31 36 3B 43 48
6 | 6 B 15 1B 24 2A 33 39 42 48 51 57
7 | 7 11 18 22 29 33 3A 44 4B 55 5C 66
8 | 8 13 1B 26 31 39 44 4C 57 62 6A 75
9 | 9 15 21 2A 36 42 4B 57 63 6C 78 84
A | A 17 24 31 3B 48 55 62 6C 79 86 93
B | B 19 27 35 43 51 5C 84 78 86 94 A2
C | C 1B 2A 39 48 57 66 75 84 93 A2 B1
N 1 2 3 4 5 6 7 8 9 A B C
-------------------------------------------------
N Square 1 4 9 13 1C 2A 3A 4C 63 79 94 B1
N Cube 1 8 21 4C 98 138 205 365 441 5BC 785 A2C
Table 15 - 7
QUADECIMAL - BASE 14
ADDITION
1 2 3 4 5 6 7 8 9 A B C D
-------------------------------------
1 | 2 3 4 5 6 7 8 9 A B C D 10
2 | 3 4 5 6 7 8 9 A B C D 10 11
3 | 4 5 6 7 8 9 A B C D 10 11 12
4 | 5 6 7 8 9 A B C D 10 11 12 13
5 | 6 7 8 9 A B C D 10 11 12 13 14
6 | 7 8 9 A B C D 10 11 12 13 14 15
7 | 8 9 A B C D 10 11 12 13 14 15 16
8 | 9 A B C D 10 11 12 13 14 15 16 17
9 | A B C D 10 11 12 13 14 15 16 17 18
A | B C D 10 11 12 13 14 15 16 17 18 19
B | C D 10 11 12 13 14 15 16 17 18 19 1A
C | D 10 11 12 13 14 15 16 17 18 19 1A 1B
D |10 11 12 13 14 15 16 17 18 19 1A 1B 1C
MULTIPLICATION
1 2 3 4 5 6 7 8 9 A B C D
-------------------------------------
1 | 1 2 3 4 5 6 7 8 9 A B C D
2 | 2 4 6 8 A C 10 12 14 16 18 1A 1C
3 | 3 6 9 C 11 14 17 1A 1D 22 25 28 2B
4 | 4 8 C 12 16 1A 20 24 28 2C 32 36 3A
5 | 5 A 11 16 1B 22 27 2C 33 38 3D 44 49
6 | 6 C 14 1A 22 28 30 36 3C 44 4A 52 58
7 | 7 10 17 20 27 30 37 40 47 50 57 60 67
8 | 8 12 1A 24 2C 36 40 48 52 5A 64 6C 76
9 | 9 14 1D 28 33 3D 47 52 5B 66 71 7A 85
A | A 16 22 2C 38 44 50 5A 66 72 7C 88 94
B | B 18 25 32 3D 4D 57 64 71 7C 89 96 A3
C | C 1A 28 36 44 52 60 6C 7A 88 96 A4 B2
D | D 1C 2B 3A 49 58 67 76 85 94 A3 B2 C1
N 1 2 3 4 5 6 7 8 9 A B C D
-----------------------------------------------
N **2 1 4 9 12 1B 28 37 48 5B 72 89 A4 C1
N **3 1 8 1D 48 8D 116 1A7 288 3A1 516 6B1 8B6 B2D
X 2 4 6 7 7 7 7 7
Y 7 7 7 2 4 6 8 A
X * Y 10 20 30 10 20 30 40 50
X 7 8 A C 2 4 6 7
Y C 7 7 7 8 8 8 3
X * Y 60 40 50 60 12 24 36 17
X 7 7 7 7 7 8 A C
Y 5 7 9 B D 8 8 8
X * Y 27 37 47 57 67 48 5A 6C
Table 15 - 8
QUINDECIMAL - BASE 15
ADDITION
1 2 3 4 5 6 7 8 9 A B C D E
----------------------------------------
1 | 2 3 4 5 6 7 8 9 A B C D E 10
2 | 3 4 5 6 7 8 9 A B C D E 10 11
3 | 4 5 6 7 8 9 A B C D E 10 11 12
4 | 5 6 7 8 9 A B C D E 10 11 12 13
5 | 6 7 8 9 A B C D E 10 11 12 13 14
6 | 7 8 9 A B C D E 10 11 12 13 14 15
7 | 8 9 A B C D E 10 11 12 13 14 15 16
8 | 9 A B C D E 10 11 12 13 14 15 16 17
9 | A B C D E 10 11 12 13 14 15 16 17 18
A | B C D E 10 11 12 13 14 15 16 17 18 19
B | C D E 10 11 12 13 14 15 16 17 18 19 1A
C | D E 10 11 12 13 14 15 16 17 18 19 1A 1B
D | E 10 11 12 13 14 15 16 17 18 19 1A 1B 1C
E |10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D
MULTIPLICATION
1 2 3 4 5 6 7 8 9 A B C D E
----------------------------------------
1 | 1 2 3 4 5 6 7 8 9 A B C D E
2 | 2 4 6 8 A C E 11 13 15 17 19 1B 1D
3 | 3 6 9 C 10 13 16 19 1C 2A 2E 33 37 3B
4 | 4 8 C 11 15 19 1D 22 26 2A 2E 40 45 4A
5 | 5 A 10 15 1A 20 25 2A 30 35 3A 40 45 4A
6 | 6 C 13 19 20 26 2C 33 39 40 46 4C 53 59
7 | 7 E 16 1D 25 2C 34 3B 43 4A 52 5E 61 68
8 | 8 11 19 22 2A 33 3B 44 4C 55 5D 66 6E 77
9 | 9 13 1C 26 30 39 43 4C 56 60 69 73 7C 86
A | A 15 20 2A 35 40 4A 55 60 6A 75 80 8A 95
B | B 17 23 2E 3A 46 52 5D 69 75 81 8C 98 A4
C | C 19 26 33 40 4C 5E 66 73 80 8C 99 A7 B3
D | D 1B 29 37 45 53 61 6E 7C 8A 98 A7 B4 C2
E | E 1D 2C 3B 4A 59 68 77 86 95 A4 B3 C2 D1
N 1 2 3 4 5 6 7 8 9 A B C D E
---------------------------------------------------
N **2 1 4 9 11 1A 26 34 44 56 6A 81 99 B4 D1
N **3 1 8 1C 44 85 E6 17D 242 339 46A 5DB 7A3 9B7 C2E
X 3 3 5 5 5 5 6 6
Y 5 A 3 6 9 C 5 A
X * Y 10 20 10 20 30 40 20 40
X 9 9 A A A A C C
Y 5 A 3 6 9 C 5 A
X * Y 30 60 20 40 60 80 80 40
X 3 3 5 5 5 5 6 9
Y 6 B 4 7 A D B 6
X * Y 40 80 13 23 10 25 35 45
Table 15 - 9
SEXDECIMAL - BASE 16
ADDITION
1 2 3 4 5 6 7 8 9 A B C D E F
-------------------------------------------
1 | 2 3 4 5 6 7 8 9 A B C D E F 10
2 | 3 4 5 6 7 8 9 A B C D E F 10 11
3 | 4 5 6 7 8 9 A B C D E F 10 11 12
4 | 5 6 7 8 9 A B C D E F 10 11 12 13
5 | 6 7 8 9 A B C D E F 10 11 12 13 14
6 | 7 8 9 A B C D E F 10 11 12 13 14 15
7 | 8 9 A B C D E F 10 11 12 13 14 15 16
8 | 9 A B C D E F 10 11 12 13 14 15 16 17
9 | A B C D E F 10 11 12 13 14 15 16 17 18
A | B C D E F 10 11 12 13 14 15 16 17 18 19
B | C D E F 10 11 12 13 14 15 16 17 18 19 1A
C | D E F 10 11 12 13 14 15 16 17 18 19 1A 1B
D | E F 10 11 12 13 14 15 16 17 18 19 1A 1B 1C
E | F 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D
F |10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E
MULTIPLICATION
1 2 3 4 5 6 7 8 9 A B C D E F
-------------------------------------------
1 | 1 2 3 4 5 6 7 8 9 A B C D E F
2 | 2 4 6 8 A C E 10 12 14 16 18 1A 1C 1E
3 | 3 6 9 C F 12 15 18 1B 1E 21 24 27 2A 2D
4 | 4 8 C 10 14 18 1C 20 24 28 2C 30 34 38 3C
5 | 5 A F 14 19 1E 23 28 2D 32 37 3C 41 46 4B
6 | 6 C 12 18 1E 24 2A 30 36 3C 42 48 4E 54 5A
7 | 7 E 15 1C 23 2A 31 38 3F 46 4D 54 5B 62 69
8 | 8 10 18 20 28 30 38 40 48 50 58 60 68 70 78
9 | 9 12 1B 24 2D 36 3F 48 51 5A 63 6C 75 7E 87
A | A 14 1E 28 32 3C 46 50 5A 64 6E 78 82 8C 96
B | B 16 21 2C 37 42 4D 58 63 6E 79 84 8F 9A A5
C | C 18 24 30 3C 48 54 60 6C 78 84 90 9C A8 B4
D | D 1A 27 34 41 4E 5B 68 75 82 8F 9C A9 B6 C3
E | E 1C 2A 38 46 54 62 70 7E 8C 9A A8 B6 C4 D2
F | F 1E 2D 3C 4B 5A 69 78 87 96 A5 B4 C3 D2 E1
N 1 2 3 4 5 6 7 8 9 A B C D E F
-----------------------------------------------------
N **2 1 4 9 10 19 24 31 40 51 64 79 90 A9 C4 E1
N **3 1 8 1B 40 7D D8 157 200 2D9 3E8 533 6C0 895 AB8 D2F
LECTURE 14 SOLUTIONS
0123456789
SLOWMINUET
O123456789
TASKCOMING
0123456789
DBARTMPIYS
0123456789X
CLOUDYNIGHT
LECTURE 15 PROBLEMS - Taken from OP- 20 -G course:
J Z S S W B P D Z Z L F O M E K Q P D J H C K U M C
A B C O O X M Y S I I G B S G G Y V D S W A J O Q E
K U P W K N J K C C H W O Z Q Q B P Y N V J J O Q E
K U C D S L R W C F Q I A V M S R S I X Y T P O P G
D H U V N K V K C Y Y A L R Q O O Q D N Z C G L R E
K F H Q R N J B.
A U V Z I S Z F B F Y E I R B I O W A O Y J L B L D
D G K U I T T Z B D B E Q I O C J R F W X D Y H G M
S P P I S W Y P F V S Y G G S H Q K L A L Z A Q F N
U T C Q H D G Y L B Z P D V C S J N W G N T P T M S
H J T W C K O C M X Z P Z R R U Y I W H H M E Z F L
O C F I S W L P D N W T Z H H T I R L Y I P N Q F N
U T C Q H D G Y L B Z P D V C S J N W G N T P T M E
O S V B W J B L V X Z P Z R R U Y I W H H P L P F T
R B P G X B U L V N W J P R H I H F Q X L N B L P S
H J T W I J T T Q W E E Q F O I I Z P M B J Q P Y M
D U Q W A T Z O W D C L Z Q M P U K.
REFERENCES / CRYPTOGRAPHIC RESOURCES [updated 01 July 1996]
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[FOWL] Fowler, Mark and Radhi Parekh, " Codes and Ciphers,
- Advanced Level," EDC Publishing, Tulsa OK, 1994.
(clever and work)
[LAKE] Lakoff, R., "Language and the Women's Place," Harper &
Row, New York, 1975.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
[WINJ] Winton, J., " Ultra at Sea: How Breaking the Nazi Code
Affected Allied Naval Strategy During WWII," New Uork,
William Morror, 1988.
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 13
APERIODIC SYSTEMS
Lecture 14 -
Cryptarithms by LEDGE
Lecture 15 -
Statistical Methods (Sinkov, Kullback, Friedman)
Lecture 16 -
Transposition
Lecture 17 -
Transposition
Lecture 18 -
Fractionation, Advanced Monome - Dinome Systems
Lecture 19 -
Law and Politics of Cryptography
Lecture 20 -
Cipher Exchange Systems
Lecture 21 -
Cipher Exchange Systems
Lecture 22 -
Modern Crypto-Systems, Double Key Cryptography,
Cipher Machines, PGP and PGPphone, Diamond
Cipher Family
Lecture 23 - Volume I and II References / Resources, Index to
Volume II Lectures 11 - 22. Table of Figures,
Table of Tables; Presentation of Certificates of
Achievement to my Students and Grateful Thanks
form LANAKI!
Lets assume that the keying units are kept constant and vary
the plain-text groupings. The effect is to suppress
periodicity, even though the key may repeat itself many times
in the cryptogram. This is true unless the law governing the
variation in plain-text groupings is itself cyclic in
character, and the length of the message is at least two or
more times that of the cycle applicable to this variable
grouping. [FRE3]
S I G N A L S I G N A L S I G
1 12 123 1234 12345 1 12 123 1234 12345 1 12 123 1234 12345
C OM MAN DING GENER A LF IRS TARM YHASI S SU EDO RDER SEFFE
Q UW UGT KFAH UWNWJ L HN ARQ NGPU PGNVF I TR OPE RFER OCBBC
N A L S I G N A L S I G N A L
1 12 123 1234 12345 1 12 123 1234 12345 1 12 123 1234 12345
C TI VET WENT YFIRS T AT NOO NDIR ECTIN G TH ATT ELEP HONES
L HS QHS WOFZ KDARQ N NU NMM YIDU OQZKF C NZ NUU WPWL EXYHT
S I G N A L S I
1 12 123 1234 12345 1 12 123...
C OM MAS WITC HBOAR D SC OMM...
Q UW UGO RFUL TZMAJ I AQ UWW...
Cryptogram
D E C L A R A T I O N O F I N D E P E N D E N C E
3 1 4 4 2 3 2 1 2 3 2 3 4 2 2 3 1 4 1 2 3 1 2 4 1
Given:
T R E C S Y G E T I L U V W V I K M Q I R X S P J
S V A G R X U X P W V M T U C S Y X G X V H F F B
L L B H G.
T R E C S Y G E T I
U S F D T Z H F U J
V T G E U A I G V K
W U H F V B J H W L
X V I G W C K I X M CAN YOU GET
Y W J H X D L J Y N
Z X K I Y E M K Z O
A Y L J Z F N L A P
B Z M K A G O M B Q
C A N L B H P N C R
D B O M C I Q O D S
E C P N D J R P E T
F D Q O E K S Q F U
G E R P F L T R G V
H F S Q G M U S H W
I G T R H N V T I X
J H U S I O W U J Y
K I V T J P X V K Z
L J W U K Q Y W L A
M K X V L R Z X M B
N L Y W M S A Y N C
O M Z X N T B Z O D
P N A Y O U C A P E
Q O B Z P V D B Q F
R P C A Q W E C R G
S Q D B R X F D S H
We place these over the first ten cipher letters to backout
the keying letters of R E A. We can either set up the
remaining letters of the message on a sliding normal alphabet
scale or assume various keywords such as READ, REAL, REAM.
The completed solution is:
R E A D E R
C A N Y O U G E T F I R S T R E G I M E N T B Y
T R E C S Y G E T I L U V W V I K M Q I R X S P
S D I G E S
R A D I O O U R P H O N E N O W O U T O F
J S V A G R X U X P W V M T U C S Y X G X
C O M M I S S I O N
V H F F B L L B H G. Key = READERS DIGEST
The slide is very quick. We place the C(1) over T(2) and
back out the index A(1) over the Key letter R(2). For the
second group the Y(1) over C(2) will back out the A(1) over
E(2). If reversed standard alphabets are employed we either
convert the cipher letter to normal alphabets or employ the
reverse alphabet slide. The slides, if not out of stock,
referred to are available from ACA for about $3. It may be
used to aid solutions for the entire Viggy family.
BATTALIONS ARTILLERY
1233245678 123455627
OAS XYQ ARVVRKFONT BH SFJDUUXFP OUVIGJPF ULBFZ
OCLOCK
123124
RV DKUKW ROHROZ.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
DIVISION|---------------------------------------------------
OCLOCK | n O P s t v W x Z H D R a u I E f j k
|
BATTA- |---------------------------------------------------
LIONS |R A F K N O T V
|
ARTILL- |---------------------------------------------------
ERY |
|S X D U F J P
|---------------------------------------------------
The key for this message is SUPREME COURT and the complete
message is:
AT SEVEN OCLOCK
RV DKUKW ROHROZ.
1) a VCLLKIDVSJDCI 2) a IXHMPPFXU
b CSPPHQKCLZKSQ b HOQCFFAOX
c PADDERXPNBXAR
3) a NAKFORA
b ROYXANO
We find:
CPD SA HE QR KX LN ZB
and:
LDX VP CA KE IR SN JB
1 2 3 4 5 6 7 8 9 10 11 12 13
1. V C S L P A N D K H . X E
2. I Q . . R
3. J Z . . B
1 2 3 4 5 6 7 8 9 10
The placement of the letters V . S . P . N . K . suggests a
reversed alphabet; we reverse the half-chain and extend to 26
places as follows:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
E j K N P q S V X z H D r A
23 24 25 26
L i C b
We add the data from the two partial chains (JZ..B and
IQ..R). [Small letters]
1234567891011121314151617181920212223242526
HYDRAULIC B E F G J K M N O P Q S T V W X Z
S T R I K
COMMUNICATION WITH FIRST ARTILLERY WILL
VCLLKIDVSJDCI ORKD CFSTV IXHMPPFXU EVZZ
E W H I L E
BE THROUGH CORPS AND COMMUNICATION WITH
FK NAKFORA DKOMP ISE CSPPHQKCLZKSQ LPRO
T H E I
SECOND ARTILLERY THROUGH DIVISION
JZWBCX HOQCFFAOX ROYXANO EMDMZMTS
R O N I S
SWITCHBOARD NO COMMUNICATION AFTER TEN
TZFVUEAORSL AU PADDERXPNBXAR IGHFX JXI.
Take the same problem as above and destroy the word lengths.
The problem is a little more difficult and requires more
trial and error.
1. VCLLKIDVSJDCI
2. CSPPHQKCLZKSQ Column ends IQR
3. PADDERXPNBXAR
Number 1 is the "header" and the left-hand boundary is known.
The right hand boundary marked by IQR is fortuitous. Not
knowing the exact length by one or two letters is not fatal
to the solution because we are interested in reconstructing
cipher equivalents not looking up the pattern words.
Letter No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Key Element No1-2-3-4*-1-2-3-4-5-6-* -1- 2- 3-*-1- 2- 3
Letter No 17 18 19 20 21 22 23 24 25 26 27 28 29 30
(1) Key Element No-4 -5 -6 -7-* 1 -2 -3 -4 -5 -6 -7 -8 -9 -10
Letter No 31 32 33 34 35
Key Element No_*-1 -2 -3-*- 1 -2
Letter No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Key Element No1-2-3-*-7-8-9-10-1-2-*-4- 5- 6-*-3- 4- 5- 6
Letter No 17 18 19 20 21 22 23 24 25 26 27 28 29
(2) Key Element No-7 -8 -9-10- 1-*-8- 9- 10 -1-2-* -5 -6 -7-*
Letter No 30 31 32 33 34 35
Key Element No - 9-10 -1-*-5 -6 -7-
Letter No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Key Element No1-2-3-4-5-*-4-3-*4-5 -6 -7 -8 -9-10 -1-*-10
Letter No 17 18 19 20 21 22 23 24 25 26 27 28 29 30
(3) Key Element No 9- 8- 7-*-8- 9-10- 1- 2- 3-*-2- 1-10- 9-8-
Letter No 31 32 33 34 35
Key Element No *-9-10- 1- 2- 3
We will use the mnemonic key BUSINESS MACHINES and the cipher
alphabet HYDRAULIC...XZ sequence which slides:
1234567891011121314151617181920212223242526
HYDRAULIC B E F G J K M N O P Q S T V W X Z
Table 13-1
Method (1)
Keying Element No 1 2 3 4 5 6 7 8 9 10
------------------------------
Letter No 1 2 3 4|
Letter No 5 6 7 8 9 10|
Letter No 11 12 13|
Letter No 14 15 16 17 18 19 20|
Letter No 21 22 23 24 25 26 27 28 29 30|
Letter No 31 32 33
Letter No 34 35
Method (2)
Keying Element No 1 2 3 4 5 6 7 8 9 10
------------------------------
Letter No 1 2 3 - - - 4 5 6 7
Letter No 8 9| - 10 11 12|
Letter No - - 13 14 15 16 17 18 19 20
Letter No 21|- - - - - - 22 23 24
Letter No 25 26|- - 27 28 29| - 30 31
Letter No 32|- - - 33 34 35
Method (3)
Keying Element No 1 2 3 4 5 6 7 8 9 10
------------------------------
Letter No 1 2 3 4 5| - - - - -
Letter No - - 7 6 - - - - - -
Letter No - - - 8 9 10 11 12 13 14
Letter No 15|- - - - -| 19 18 17 16
Letter No 23 24 25|- - - - 20 21 22
Letter No 27 26 - - - - - |30 29 28
Letter No 33 34 35 31 32
Index A(1)
Key K(2) B U S I N E S S M A C H I|B U S|B U S I|B U S I
Plain P(1) A M M U N I T I O N F O R F I R S T A R T I L L
Cipher C(2) B O L Y R P J D R O J K X K J F Y X S X D J U P
Index A(1)
Key K(2) N E|B U S I N E S S M A C H I N E S B U|B U S I
Plain P(1) E R Y W I L L B E L O A D E D A F T E R A M M U
Cipher C(2) S Y I Y D P Y F X U R A F A E N M J J V B O L Y
Index A(1)
Key K(2) N E S S M A C H I|B U S I|B U S|B U S I N E|
Plain P(1) N I T I O N F O R T H I R D A R T I L L E R
Cipher C(2) R P J D R O J K X D G D X G U F D J U P S Y
Index A(1)
Key K(2) B U S I N|
Plain P(1) Y . . . .
Cipher C(2) I
Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher HYDRAULICBEFGJKMNOPQSTVWXZHYDRAULICBEFGJKMNOPQSTVWXZ
* *
group 1, plain letter 3 = M ; key S ; cipher L
Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher HYDRAULICBEFGJKMNOPQSTVWXZHYDRAULICBEFGJKMNOPQSTVWXZ
* *
group 2, plain letter 1 = F ; key B ; cipher K
Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher HYDRAULICBEFGJKMNOPQSTVWXZHYDRAULICBEFGJKMNOPQSTVWXZ
* *
Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher HYDRAULICBEFGJKMNOPQSTVWXZHYDRAULICBEFGJKMNOPQSTVWXZ
* *
Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher HYDRAULICBEFGJKMNOPQSTVWXZHYDRAULICBEFGJKMNOPQSTVWXZ
* *
Cryptogram
B O L Y R P J D R O J K X K J F Y X S X D J U P S
Y I Y D P Y F X U R A F A E N M J J V B O L Y R P
J D R O J K X D G D X G U F D J U P S Y I X X X X
INTERRUPTOR CASES
Cipher S X D J U P S Y I
Plain A R T I L L E R Y
'Key' S I B U S I N E B
* *
Key B U S I N E S S B U S
Cipher B O L Y R P J D R O J
Plain A M M U N I T I U M T
The last three letters suggest that there is more to the key.
Using Ammunition and back calculating the Key, we find
MA. We use the cipher and the plain back and forth to find
the total key, taking into account the interruptor letter R.
Assume that the repetitive key is very long and that the
message is short. Solution is difficult because there are not
enough superimposable periods to help line up the alphabets
to yield monoalphabetic distributions that can be solved by
frequency principles. This is the first step in the
cryptanalytic attack. The superimposed periods essentially
line up the letters in the columns so that the same treatment
has been used to process both plain and cipher components.
Key K(2) B U S I N E S S M A C H I N E S B U S I N E S S
Plain P(1) A M M U N I T I O N F O R F I R S T A R T I L L
Cipher C(2) B O L Y R P J D R O J K X T P F Y X S X B P U U
Cryptogram
B O L Y R P J D R O J K X T P F Y X S X B P U U Q
H R N M Y T T X H P C R F Q B E J F I E L L B O N
Q O Q V E C X B O D F P A Z Q O N U F I C x x x x
Index A(1) A1
Key K(2) X N O T I F Y Q U A R T E R M A S T E R . .
Plain P(1) N O T I F Y Q U A R T E R M A S T E R . . .
Cipher C(2) K B H B N D O K U R K X V D M S L X V . . .
Index A(1) A1
Key K(2) T Y P E W R I T E R|N O T I F Y Q U A R . .
Plain P(1) N O T I F Y Q U A R T E R M A S T E R . . .
Cipher C(2) G M I M B P Y N E I G S K U F Q J Y R . . .
Type PORTA
Key K(2) OFFICERSANDDIRE
Plain P(1) CTORSOFTHELOCAL
Cipher C(2) WEMAEMNKUXZATVN
Index A(1) A1
Key K(2) X K Y R Z E C S M M D W A R D D V O S . . .
Plain P(1) N O T I F Y Q U A R T E R M A S T E R . . .
Cipher C(2) K Y R Z E C S M M D W A R D D V O S J . . .
Index A(1) A1
Key K(2) T Y P E W R I T E R|G M I M B P Y N E I . .
Plain P(1) N O T I F Y Q U A R T E R M A S T E R . . .
Cipher C(2) G M I M B P Y N E I G S K U F Q J Y R . . .
Cipher text auto key with key phrase TYPEWRITER using only
the last letter of keyphrase to seed progression:
Index A(1) A1
Key K(2) T Y P E W R I T E R|I B F W I I A T X . . .
Plain P(1) N O T I F Y Q U A R T E R M A S T E R . . .
Cipher C(2) G M I M B P Y N E I B F W I I A T X O . . .
Cryptogram
W S G Q V O H V M Q W E Q U H A A L N B N Z Z M P
E S K D
Key F O R C E V O H V M Q . .
Cipher W S G Q V O H V M Q . . .
Plain R E P O R T T O R E . . .
REDUCED REPETITIONS
Key X C K B T M D H N V H L Y...K D K S J M D H N V H L Y
Plain F I R S T R E G I M E N T T H I R D R E G I M E N T
Cipher C K B T M D H N V H L Y R .KD K S J M D H N V H L Y R
DOUBLETS
Define the 'base letter' as the letter opposite which the key
letter is placed. We also know this as the index. For
convenience, we have chosen A or the initial letter in the
Viggy sequence. When the first key is a single letter, if the
base letter occurs as a plain-text letter its cipher
equivalent is identical with the immediately preceding cipher
letter; there is produced a double letter in the cipher text,
no matter what the cipher component is and no matter what the
key letter happens to be for encipherment.
ex. use HYDRAULIC..XZ sequence for both primary components,
with H, the initial letter of the plain component as a base
letter, and using introductory X as key letter:
Key X J O I I F L Y U T T D K K Y C X G
Plain M A N H A T T A N H I G H J I N K S
Cipher J O I I F L Y U T T D K K Y C X G L
2.
3.
Message 1 (1) D B D D Q G S U N S F B O B E K . . .
(2) N E V V J L K Z E K U R C N I F . . .
(3) T N K K U X O L D L W T H C Z R| end of
message
Message 3 (5) C Q V V J L K Z E K U R F R F X ..
24 25 26
D O L
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
T V W X Z . . D R . U L I . B E F G J K . N O
24 25 26
. Q S
Plain A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher H Y D R A U L I C B E F G J K M N O P Q S T V W X Z
Key ? U S Y P W T R X D I M L E X R K V D B D D Q G S
Cipher U S Y P W T R X D I M L E X R K V D B D D Q G S U
Plain ? P H R F Y I V E F I R E O F L I G H T A R T I L ...
Key W I C K E R|T R X D I M L E X R K V D B D D Q G S
Cipher U S Y P W T R X D I M L E X R K V D B D D Q G S U
Plain I N T E N S I V E F I R E O F L I G H T A R T I L ...
Key P R O M I S E R X L G H O U Z O ..
Cipher R E Q U E S T V I G O U R O U S
Plain B I I B F G R X L G H O U Z O ....
Key C H A R G E D R R V M M H C V B
Cipher S E C O N D B A T T A L I O N
Plain H A L O Z J R R V M M H C V B
COMMANDANT BASSIERES
With Hurst's method the Index A(1) over Key O(2) for plain
O(1) yields cipher C(2) for a Viggy. Hurst's Table 13-2a gets
the answer on the first try.
Table 13-2a
Tables of High Frequency Coefficients for Autoclave
Vigenere
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
---------------------------------------------------
E | A E H I N O R S T
T | H I N O R S T A E
A | A E H I N O R S T
O | N O R S T A E H I
N | N O R S T A E H I
I | S T A E H I N O R
S | I N O R S T A E H
H | T A E H I N O R S
R | N O R S T A E H I
6 4 1 - 4 4 4 4 4 2 3 4 3 2 3 2 1 4 4 2 2 6 4 4 2 4
Table 13-2b
Tables of High Frequency Coefficients for Autoclave
True Beaufort/ Variant
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A Z Y X W V U T S R Q P O N M L K J I H G F E D C B
---------------------------------------------------
E | E A T S R O N I H
T | T S R O N I H E A
A | A T S R O N I H E
O | O N I H E A T S R
N | N I H E A T S R O
I | I H E A T S R O N
S | S R O N I H E A T
H | H E A T S R O N I
R | R O N I H E A T S
9 4 1 2 4 3 3 3 2 3 3 3 3 4 3 3 3 3 2 3 3 3 3 2 1 4
Table 13-2c
Tables of High Frequency Coefficients for Autoclave
Porta
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
---------------------------------------------------
E | R S T N O A E H I
T | N O R S T E H I A
A | N O R S T A E H I
O | N O R S T H I A E
N | T N O R S H I A E
I | R S T N O A E H I
S | N O R S T E H I A
H | R S T N O A E H I
R | N O R S T H I A E
3 3 3 2 4 4 3 2 3 4 6 5 3 4 2 3 4 4 -2 3 3 3 3 3 3 2
Table 13-3
Beaufort and
Variant
A N E W O M Z BQKJRTHVFGUDX P L S I YC
480 262 246 246 196 196 191 intermediate 121 121 104 104 57
Porta
Key . B A T T A L I O N
Plain B A T T A L I O N .
Cipher . B T M T L T W B .
Key . C O M M A N D I N G
Plain C O M M A N D I N G .
Cipher . Q A Y M N Q L V T .
Key . D I V I S I O N .
Plain D I V I S I O N
Cipher . L D D A A W B
Key . C A P T A I N
Plain C A P T A I N .
Cipher . C P I T I V .
Five observations:
Message 1
B E C J I B T M T L T W B P Q A Y M N Q H V N E T
B A T T A L I O N
W A A L C
B E C J I B T M T L T W B P Q A Y M N Q H V N E T
E A C H B A T T A L I O N C O M M A N D E R W I L
W A A L C
L P L A C
CRITICAL REVIEW
Mnemonic Key C H R I S T M A S
Numerical Key 2-3-6-4-7-9-5-1-8
Extended key
1 2 3 4 5 6 7
C H R I S T M A|C|CH|C H R I|C H R I S T M|C H R|C H R I S|
8 9
C H R I S T M A S|C H R I S T|
Letter 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Alpha 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Plain E N E M Y H A S P L A C E D H E A V Y I N
Cipher E O G P U U E Y H M K Q V M K Z S J Q H E
Letter 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
Alpha 22 23 24 25 26 1 2 3 4 5 6 7 8 9 10 11 12 13
Plain T E R D I C T I O N F I R E U P O N
Cipher N L H H L C V B S S N J E P K D D D
Letter 40 41 42 43 44 45 46 47 48 49 50 51 52 53
Alpha 14 15 16 17 18 19 20 21 22 23 24 25 26 1
Plain Z A N E S V I L L E R O A D
Cipher G P U H F K H H Y L H M R D
Figure 13-1
H I D C T E H U X I
Y C R B V F Y L Z I
D B A E W G D I H C
R E U F X J R C Y B
A F L G Z K A B D E
U G I J H M U E R F
L J C K Y N L F A G
I K B M D O I G U J
C M E N R P C J L K
B N F O A Q B K I M
E O G P U S E M C N
F P J Q L T F N B O
G Q K S I V G O E P
--------------------------
. POLYALPHABETIC CIPHERS .
-------------------------
| |
------------------- -------------------
| PERIODIC SYSTEMS | | APERIODIC SYSTEMS |
------------------- -------------------
. .
. .
. II
.
.
.
............................
. . .
---------------- . --------------
. Repeating Key. . . Progressive .
. Systems . . . Alphabet .
. . . . Systems .
---------------- . --------------
. ............................
. ---------------
. . Enciphered .
. .. .. Numerical .
. Systems .
--------------
|..........|
----------- --------------
. Additive . . Subtraction .
----------- -------------
|----------------------|-----------------------|
| | |
----------- ---------- ----------
.Monographic. .Digraphic . .N-Graphic .
----------- ---------- ----------
. ...e
.
.................................
. .
---------------- ---------------
. Interrelated . . Unrelated .
. cipher . . cipher .
. alphabets . . alphabets .
---------------- ----------------
.
............................
. .
---------------- ---------------
. Standard . . Mixed .
. Alphabets . . alphabets .
. . . ...a
---------------- ----------------
..............................
. .
---------------- ---------------
. Direct . . Reversed .
. Standard . . Standard .
---------------- ----------------
a..........................................
. .
---------------- ---------------
. One component . . Both components .
. mixed . . mixed .
---------------- ----------------
. .
. .
b c
b.......
.
.
............................
. .
---------------- ---------------
. Normal . . Normal .
. plain . . cipher .
. component . . component .
---------------- ----------------
c....
......................................
. .
---------------- ---------------
. Identical . . Different .
. components . . components .
---------------- ----------------
.
.
.
.
............................
. .
---------------- ---------------
. Sequences . . Sequences .
. proceed in same. . proceed in .
. direction . . different .
---------------- . directions .
e......
.
.... ............................
. .
---------------- ---------------
. Related . . Unrelated .
. Digraphic . . Digraphic .
. encipherment . . encipherment .
---------------- ----------------
II
.
-------------------
| APERIODIC SYSTEMS |
---------.---------
. . . .
--------------------------- . . . .
. Constant Length Keying .. a b c
. Units on Variable Length .
. Plain Text Groups .
---------------------------
. .
. .
| ------------ | | ----------|
| Word Lengths | | Non-Word |
| ------------ | | Lengths |
. |-----------|
. .
. ....................................
. .
--------------------------- ------------------------
. Original Plain Text Groups . . Original Plain Text .
. retained in Cryptograms . . Groupings not retained .
---------------------------- . in Cryptograms .
------------------------
a
.
.
-----------------------------------------
. Variable-length keying units encipher .
. constant length plain-text .
. groupings. .
-----------------------------------------
.
............................
. .
---------------- ---------------
. Interruptor . . Interruptor .
. plain text . . cipher text .
. letter . . letter .
---------------- ----------------
b
.
.
----------------------
. Auto Key Systems .
----------------------
.
.
............................
. .
---------------- ---------------
. Cipher Text . . Plain Text .
. auto keying . . Auto Keying .
. systems . . systems .
---------------- ........... ----------------
.
............................
. .
---------------- ---------------
. Introductory . . Introductory .
. key is a . . key is a word .
. single letter. . or phrase .
---------------- ----------------
c
.
.
-------------------------------
. Systems Using Lengthy Keys .
-------------------------------
.
.
............................
. .
---------------- --------------
. Running Key . . Progressive .
. systems . . Key systems .
---------------- ---------------
LECTURE 12 SOLUTIONS
12.3 Porta
Conservative scientists have predicted the end of change at
various times but they have always been proved wrong.
Keyword: CHANGE
12.4 Porta
In a leisure society constant rebuilding of your own home to
your own taste, filling it with personal ingenuities and bold
signs might become the fashionable thing to do.
Keyword: EQUALITY
12.5 Portax
Thank you for your letters and suggestions for the Novice
Notes series. Keep them coming. (signed) LEDGE
Keyword: THANKS
12.6 Portax
Now, that the new year has come, might be the time to realize
that even the best resolutions are meant to be broken.
Keyword: BROKEN
12.7 Gromark
The crazy person says "I am Abraham Lincoln" and the neurotic
says "I wish I were Abraham Lincoln" and the healthy person
says "I am I and you are you". Frederick Perls
Keyword: Neurotics
LECTURE 13 PROBLEMS
13-1 Beaufort
13-2 Vigenere.
REFERENCES / RESOURCES
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 18
SUMMARY
INTRODUCTION
SQUARE ROOTS
1 9 4 1
___________
V 3'76'85'04
-1
----
2 76
-2 61
-------
15 85
-15 36
--------
49 04
-38 81
-----
10 23
Unless you are aware of it, you may not have recognized
that the number 1 in the quotient is no longer just
itself. It has become the highest order digit of a two
digit number. That means that it has become a ten. The
square that we are looking for has become:
(10a + b)**2
N N C
________
VON'LY'IF
CT
-----
IA LY
IB TT
--------
I SL IF
I RB OT
-----
II SC
N 5 6 7 8 9 t e
n**2 21 30 41 54 69 84 t1
12/625
***
12/52 r1 625 = 52*12 + 1
**
4 r4 625 = 4*12**2 + 4*12 + 1
E L I
3_____________
VWIE'LDI'EST
WYT
-------
IW LDI
WS DEE
----------
W AYA EST
W TIL PLA
-------
LNT NDP
1) Following the same steps as before try to identify
the letter representing zero, or at least the non-
zero letters. Here we are more fortunate than before.
I - Y = I. If Y were = t, borrowing from W of WIE
would be necessary. The evidence indicates no such
borrowing could have taken place; thus Y = 0. Along
the way we might notice that W - S = W. Since Y = 0
and we're working in base 11, S = t.
N 5 9
N**3 104 603
These two are the only ones that meet all the discovered
criteria. Can we find other evidence to be able to
decide between them? It turns out we can.
E T E-T W
5 4 1 1
9 3 6 6
11/28737
-----
11/2612 r5 28,737 = 2612*11 + 5
----
11/237 r5 28,737 = 237*11**2 + 5*11 + 5
--
11/21 r6 28,737 = 21*11**3 + 6*11**2 + 5*11 + 5
-
1 rt 28,727 = 1*11**4 + t*11**3 + 6*11**2 +
5*11 + 5 or 1t655
N 1 2 3 4 5 6 7 8 9 A B C
D E
N**4 1 11 56 121 2BA 5B6 AA1 1331 1E26 2E6A 4511 68C6
86E1 B5B1
S L B
4______________
VNA'STYS'HIPS
WH
-------
WB STYS
YR POPB
-----------
B'WBAU'HIPS
GGGN ALUB
----------
LYNA RBNU
EXPONENTIATION
RATTLE LO
+ SNAKE +GO
------ ---
RRKGKK SGG
5) Since L + K + 1 = 10 + K, T + A + 1 = G and T + N (+
1?) = K.
O G E K (T, A) N
6 2 5 0
7 4
7 4 5 0
6 2
8 6
8 6 5 0
7 5
9 8 7 6 5 4 3 2 1 0
L O N G E T A S K
The only letter left to place is the letter, R, which
must be 4.
r h l d b
*****************
i l l a d/G O L D E N A G E
i l l a d
***********
A Y Y G L N
l y d t i d
*************
U M U Y Y A
r h i b h y
*************
U L O N A G
r l r e h h
***********
S N Y L B E
d r u c u h
*************
S L D O U
As in any division problem, we have a series of
multiplications, or products, and a series of
subtraction (or additions). The subtractions involve
both sets of letters, but, interestingly, the
multiplications involve only the lower case letters. We
cannot do the subtractions without both sets of letters.
We can, however, attack the multiplications by
considering only the lower case letters. Let's see what
can be done to identify the numerical equivalents of the
lower case letters.
0 E X 9 8 7 6 5 4 3 2 1
y r
d h b l
3 <=> 9 <= E, 7 4, 8
8 <=> 4 <= 2, 5, E 3, 6, 9
0 E X 9 8 7 6 5 4 3 2 1
y a h t i l d r. Letters without values are b,
c, u and e.
LECTURE 17 ANSWERS
ANS:
Setting = ANOLE Key = GECKO Hat= CHAMELEON
Key Square:
H U C K L
E B R Y F
I N A D G
M O P Q S
T V W X Z
UB XB MS SF SQ MS TH DE UB HM GL NL BW GB LW NQ NF UB FM
QH EM BW BI GT LD UQ IG WM CF TQ ET CT NF IP LS UQ FK UH
IZ UQ YF TN XP NS FF UV HV NF HI CE NQ UO UQ GK ET HT ND
PV BI BE ND BD YM DE LX UB GA CX ET XT DE PE NL BF PY IQ
NG QW IS NC CK XB TF GK ED LA EL LE RW MI EX SF MS UP XQ
NF EV FF BI KK NA MX.
LECTURE 18 PROBLEMS
The CDB (Crypto Drop Box) was updated last week with
140,000 bytes of references. I will update them again
after Lecture 19 is complete.
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 7
XENOCRYPT MORPHOLOGY
Part III
SUMMARY
Absolute Frequencies
Groups
Vowels: A, E, I, O, U, Y = 43.8%
High-Frequency Consonants: N, R, S, T = 30.7% ; with L =34.0%
Medium-Frequency Consonants: C, D, L, M, P = 18.3%
Low-Frequency Consonants:B,F,G,H,J,K,Q,V,W,X,Z = 7.2 %
A B C D E F G H I J K L M
A 2 6 20 12 4 6 11 50 1 36 12
B 4 4 4 12
C 15 6 47 11 20 5
D 18 1 109 1 20 1 1
E 30 4 49 48 30 15 14 3 13 5 56 58
F 10 2 1 9 6 8 1
G 6 16 1 2 3 1
H 6 6 4
I 9 3 12 10 41 4 4 1 27 8
J 4 6
K
L 57 1 5 95 1 1 23 26
M 22 9 1 1 52 23 13
N 19 1 29 40 54 9 11 1 20 1 3 2
O 5 7 3 1 1 2 1 21 1 10 21
P 30 1 1 13 2 3 11
Q 1
R 62 2 10 13 127 2 6 24 1 16 11
S 42 2 16 32 75 5 2 1 36 2 15 8
T 40 1 7 22 78 4 1 2 67 11 12 4
U 12 3 10 5 39 14 3 1 24 3 13 6
V 9 24 16
W
X 4 3 3 3 1 1 1
Y 2 2
Z 3 1
N O P Q R S T U V W X Y Z
A 68 1 21 3 41 17 46 29 13 2 1
B 4 5 2 1 2
C 48 4 1 8 8
D 10 1 6 2 26
E 105 4 38 12 89 154 58 27 17 8 3
F 8 1 10 1 1
G 7 6 8 4 2
H 3 1 4
I 49 51 5 12 27 52 47 9 7 1
J 5 2
K 1
L 3 10 1 5 4 12 1
M 8 9 1 4
N 10 19 6 4 3 53 99 4 7 1
O 109 7 23 13 8 52 2 2
P 35 9 34 1 6 4
Q 54
R 8 27 5 3 7 14 19 6 7 1
S 6 22 24 11 8 41 33 24 4 1
T 4 14 11 7 44 23 10 11 2
U 26 1 8 1 48 26 19 1 8 13 1
V 16 5 2
W
X 1 4 1 1 2 3 1
Y 1 2
Z 1
DE- 501 RE- 283 PI- 222 SU- 168 AU- 150 DI- 124 SO- 117
CO- 394 PA- 268 IN- 178 CE- 163 NO- 133 AL- 122 VO- 112
QU- 347 LE- 240 SE- 178 ET- 153 TR- 127 UN- 122 FR- 101
PR- 291
ENT- 588 CON- 271 EST- 188 ESS- 151 NSE- 130 EUR- 115
ION- 555 ERE- 267 ERA- 185 AIT- 147 REN- 127 NTA- 115
TIO- 433 ANT- 238 ECO- 184 POU- 146 SQU- 124 SER- 115
ONS- 373 ESE- 230 ESD- 179 TER- 146 AIR- 123 ESO- 112
RES- 367 ELA- 227 OND- 175 COM- 143 EPA- 120 DEC- 110
QUE- 338 LLE- 216 LEM- 175 ESP- 139 QUI- 120 EPR- 110
DES- 313 PAR- 213 NCE- 173 OUS- 139 SET- 120 ALL- 109
EDE- 305 NDE- 211 ELE- 172 AIS- 137 REC- 119 ECE- 109
EME- 288 SDE- 210 ESA- 163 EMA- 137 AND- 118 UNE- 108
ATI- 287 DEL- 209 TDE- 163 IER- 136 ETA- 118 RAI- 106
LES- 284 PRE- 206 ITE- 162 NTS- 135 SEN- 118 RLE- 106
NTE- 282 OUR- 205 SSE- 160 TES- 135 PRO- 117 SSI- 106
TRE- 280 RAN- 196 ONT- 157 EQU- 133 ISE- 116 ENE- 105
MEN- 272 IRE- 191 ANC- 153 IQU- 131 REP- 116 SUR- 105
TRA- 105 TEN- 103 BLE- 101 ETE- 100 TAT- 100
ISS- 104 UEL- 102 QUA- 101 ERE- 100
INT- 103 ANS- 101 CES- 101 OMM- 100
VOU- 56 FAI- 50
Two-letter words: DE LA LE ET UN EN NE AU IL DU JE ON SI SE OU
SA MA ME CE VA
Three-letter words: LES QUE DES QUI EST PAS UNE AUX PAR DIT ONT
LUI PEU SON SUR CES CET MOT MON VIE BON CAR ILS PUR AMI VIE
Four-letter words: AVEC AVEZ BIEN CEUS COUP DANS DEUX DOIS DOIT
DONT DOUX FAIT FAUT LEUR LUNE MAIS MOIS NOUS PEUT PLUS POUR
QUEL SAIT SONT TOUS TRES TROP VOUS
Common Pattern Words - Three and Four letters: ETE ICI NON SES
TOT D'UN J'AI L'AI L'ON L'OR L'OS M'EN S'EN S'IL; CECI MEME
SAIS SANS SOUS SUIS TOUT ELLE MERE PERE IDEE C'EST D'UNE N'EST
QU'IL QU 'ON N'ONT
18 8 8 7 7 7 7 6 6 5 4 3 3 3 2 1 1 1 1 1--
E A N R S I T U O L D C M P V B F G H JQZXY
from [XEN1]
FRE-1 [FIDDLE]
1 2 3 4 5
F' U O N Y O L M' Y M N Y Z Z I L W Y X Y Z U C L Y
6 7 8 9 10
O H W B I C R L U C M I H H Y Y N G Y N B I X C K O Y
11 12 13 14 15 16
X Y M G I N M F Y M J F O M O M C N Y M, F Y M
17 18 19 20 21
J F O M H Y W Y M M U C L Y M U F U W I H P Y L M U -
22 23 24 25
N C I H Y N U F U W I L L Y M J I H X U H W Y.
18 8 8 7 7 7 7 6 6 5 4 3 3 3 2 1 1 1 1 1--
E A N R S I T U O L D C M P V B F G H JQZXY
normal
21 16 10 9 8 8 8 7 7 7 6 3 3 3 2 2 1 1 1
Y M U I H L N C F O W J X Z B G K P R
cipher
Take the gimmes. The 1 letter word U=a (has,to) and the
repeated U F U should be a la (to the), so F=l. Y is the
highest frequency and most likely an E. M is most likely an
S from position and frequency. So FYM = les (the). XYM, es
may be either des or ces with X=d or c. Using the pattern
table above, word 2 should be s'est.
FRE-1 [FIDDLE]
1 2 3 4 5
F' U O N Y O L M' Y M N Y Z Z I L W Y X Y Z U C L Y
l ' a t e s ' e s t e o e d e a i e
himself is of
6 7 8 9 10
O H W B I C R L U C M I H H Y Y N G Y N B I X C K O Y
n n i a i s u n n e e t e t o d i e
o and u c
11 12 13 14 15 16
X Y M G I N M F Y M J F O M O M C N Y M, F Y M
d e s u t s l e s l s s i t e s l e s
of the the the
17 18 19 20 21
J F O M H Y W Y M M U C L Y M U F U W I H P Y L M U -
l s n e e s s a i e s a l a o n e s a
to the u
22 23 24 25
N C I H Y N U F U W I L L Y M J I H X U H W Y.
t i o n e t a l a o e s o n d a n e
u and to the u u
where:
18 8 8 7 7 7 7 6 6 5 4 3 3 3 2 1 1 1 1 1--
E A N R S I T U O L D C M P V B F G H JQZXY
Y U H M C N I F X normal
21 16 10 9 8 8 8 7 7 7 6 3 3 3 2 2 1 1 1
Y M U I H L N C F O W J X Z B G K P R
e s a o n t i l d
u c cipher
KERCKHOFF
ROSSIGNOL
WALLIS
Absolute Frequencies
E 117 R 70 P 28 F 11 K -
A 117 L 62 U 27 B 11 J -
I 113 S 51 M 25 Z 9 Y -
O 87 C 41 G 20 H 9 W -
T 72 D 39 V 18 Q 4 X -
N 71 =======
1,000
Groups
Vowels: A, E, I, O, U, Y = 46.1%
High-Frequency Consonants: L, N, R, T = 27.4%
Medium-Frequency Consonants: C, D, G, M, P, S = 22.2%
Low-Frequency Consonants:B,F,H,J,K,Q,W,X,Z = 4.3 %
8 most frequent letters (E, A, I, O, T, N, R and L) = 70.8%
(descending order)
Note again that similarities of group frequencies for German,
French, English and Italian are statistically significant.
A B C D E F G H I J K L M
A 18 9 39 41 14 12 22 1 19 76 24
B 10 7 7 10 1
C 32 10 20 33 33 2
D 31 1 65 64
E 23 7 31 53 15 8 22 2 25 66 18
F 9 11 7 11 1
G 9 11 8 2 20 17
H 6 27 9
I 66 8 52 30 31 11 11 2 11 35 31
J
K
L 62 3 8 6 49 2 7 56 52 4
M 31 5 35 17 4
N 32 1 15 26 51 6 11 1 37 3 1
O 17 4 22 27 10 5 10 1 20 45 24
P 23 30 14 2
Q
R 64 1 8 8 71 1 7 63 4 13
S 20 15 1 32 2 45 2 3
T 83 1 65 1 59 1
U 12 2 4 3 15 1 3 10 6 3
V 26 23 23
W
X
Y
Z 13 4 20
Digraphs [Frequency Distribution of Digraphs based on 57,847
letters of Italian plain text reduced to 5,000 digraphs]
N O P Q R S T U V W X Y Z
A 78 5 24 4 57 36 63 6 24 12
B 4 4 2
C 64 1 5 6
D 23 2 9
E 73 6 22 4 96 62 27 6 17 4
F 10 6 3
G 8 9 11 6
H
I 62 44 20 3 20 48 45 15 16 7
J 1
K
L 2 21 5 1 3 6 15 7 3
M 18 13 2
N 10 50 4 5 2 11 66 8 4 11
O 86 4 25 2 55 40 14 3 18 2
P 28 11 23 7
Q 20
R 9 45 2 12 9 16 10 3 3
S 25 9 31 58 12 1
T 1 56 43 1 37 10
U 24 8 6 9 11 150 1
V 10 2 2 2
W
X
Y
Z 3 5
CO- 543 PE- 210 PR- 184 NO- 154 SE- 121 MA- 112 RE- 108
DE- 505 CH- 197 QU- 172 PA- 153 SO- 121 UN- 111 ES- 107
ST- 222 AL- 186 NE- 169 PO- 141 TR- 121 SU- 109 TE- 103
DI- 215 IN- 185 RI- 162 CA- 132 DA- 120
DEL- 348 STA- 215 ERE- 169 ICA- 145 SSI- 130 ODI- 114
ENT- 348 ALI- 213 ZIO- 166 RAN- 145 NEL- 127 ORI- 114
ELL- 314 EDI- 212 ATO- 165 STR- 145 ACO- 125 RMA- 114
CON- 306 ALL- 201 NTI- 165 ALE- 144 ATI- 125 AME- 113
CHE- 276 ITA- 198 ANT- 163 IDI- 143 IDE- 123 ETT- 113
LLA- 274 ANO- 197 ERA- 163 COM- 139 ADI- 121 ODE- 113
ION- 265 OST- 196 TRA- 160 ECO- 137 AND- 121 PRE- 112
ONE- 247 ERI- 187 ESS- 158 LLE- 137 TEN- 120 NDO- 110
PER- 238 ARE- 186 ATT- 157 ONT- 136 ONO- 119 ONI- 110
EDE- 228 TAL- 184 NTO- 156 TER- 136 ARI- 117 AZI- 109
NTE- 227 LIA- 180 ADE- 155 TAT- 134 NTR- 117 ENE- 109
ICO- 216 IST- 174 EST- 151 TTA- 132 PAR- 116 ELA- 107
MEN- 216 CLI- 171 RES- 146 ATA- 130 TRO- 116 ERO- 107
ESI- 107
COR- 106
IAN- 106
TAN- 105
ATE- 104
NON- 103
VER- 103
ICA- 101
OLA- 101
STI- 101
OCO- 100
RIA- 100
GRA- 53 STO- 51
Two-letter words: DI LA UN IL SI LE DA MA IN AL VI SE HA NE
HO LO AD ED VA IO
Three-letter words: CHE UNA PER CON DEL PIU GLI NEL DEI MIA SIA
DUE ERA MIO MAI CHI;
Four-letter words: BUON COME COSA COSI DICE DIRE DOVE ERAN FARE
GREAN OGNI PERO QUEL VITA
Common Pattern Words - Three and Four letters: NON ; ALLA ANNI
ANO BENE ESSA ESSE MODO POCO SONO UOMO VEDE
18 12 11 9 7 6 6 6 5 5 3 3 3 3 2 2 1 1 1 1 -
E A I O L N R T S C D M P U V G Z F B H Q
1 2 3 4 5 6 7 8 9 10
YT GNLYJO *LSISVAS, KN JH TST JY MHOLYKEY IOY JHSY
11 12 13 14 15 16 17 18 19
GYBYY, JH AYTYLOY OI HRRYIYLN VSLS, ESUN HTS KEZYOGS
20 21 22 23 24
EZN HRRYIYKEN YV KHS QOILSTN.
1 2 3 4 5 6 7 8 9 10
YT GNLYJO *LSISVAS, KN JH TST JY MHOLYKEY IOY JHSY
in eri ro ol o se u non i u ris i i uoi
11 12 13 14 15 16 17 18 19
GYBYY, JH AYTYLOY OI HRRYIYLN VSLS, ESUN HTS KEZYOGS
i ii u inir i u i ire loro co e uno s hi o
20 21 22 23 24
EZN HRRYIYKEN YV KHS QOILSTN.
che u i is e il suo rone
Absolute Frequencies
E 130 S 69 U 36 V 10 J 3
A 111 T 53 P 30 F 8 Z 3
O 97 C 52 M 29 Y 7 X 2
I 82 D 45 G 14 H 6 W 1
N 80 L 36 B 13 Q 6 K -
R 77 =======
1,000
Groups
Vowels: A, E, I, O, U, Y = 46.3%
High-Frequency Consonants: N, R, S = 22.6%
Medium-Frequency Consonants: C, D, L, M, P, T = 24.5%
Low-Frequency Consonants:B,F,G,H,J,K,Q,V,W,X,Z = 6.6 %
A B C D E F G H I J K L M
A 12 14 54 64 15 5 8 4 10 8 41 30
B 11 5 14 1 12
C 39 5 17 8 80 3
D 32 1 2 84 1 30
E 20 5 47 26 17 8 21 6 9 3 44 26
F 2 9 12 1
G 12 12 5 1
H 15 3 5
I 43 8 42 29 40 5 8 1 14 16
J 4 5
K 1
L 44 5 5 35 1 3 28 9 5
M 32 10 42 30
N 41 2 33 37 41 10 6 2 28 1 5 4
O 19 17 28 26 16 6 5 5 4 1 22 33
P 30 1 16 5 8
Q
R 74 1 12 10 94 1 12 45 1 1 6 15
S 32 2 18 15 57 3 2 4 41 1 5 7
T 60 1 67 35
U 13 6 11 5 52 1 3 9 9 6
V 12 1 15 15
W 1 1
X 1 4
Y 5 1 3 2 5 1 1 1 1
Z 6 1 1
CO- 684 PR- 307 PA- 263 SE- 189 CA- 151 PE- 111 MA- 101
RE- 335 ES- 286 PO- 247 DI- 175 SI- 137 UN- 109 CU- 100
DE- 323 QU- 286 IN- 235 PU- 157 MI- 117 HA- 108 SO- 100
ENT- 596 ARA- 229 POR- 176 OSE- 147 ERO- 131 NDE- 121
ION- 564 ONE- 227 TER- 174 ONS- 144 ONT- 131 RAN- 121
CIO- 502 ESE- 202 ODE- 168 REC- 144 ANA- 130 STE- 119
NTE- 429 ADE- 293 ERE- 166 ORE- 143 ARE- 129 REN- 118
CON- 415 PAR- 190 ERA- 165 OCO- 142 UNT- 127 ARI- 117
EST- 355 CIA- 190 TRA- 165 EDE- 141 ANO- 127 TEN- 116
RES- 335 ENC- 188 AME- 165 ICI- 140 TAR- 126 OND- 115
ADO- 307 NCI- 184 ERI- 163 END- 139 ANT- 126 RIA- 115
QUE- 294 PRE- 183 MER- 162 SEN- 139 ESA- 126 ECI- 114
ACI- 277 DEL- 183 ELA- 159 TAD- 138 IER- 125 IST- 113
NTO- 270 NDO- 183 PRO- 158 ECO- 135 ADA- 125 ONA- 113
IEM- 267 NES- 183 ACO- 155 STR- 134 DEN- 124 DAD- 112
COM- 246 DOS- 182 ENE- 153 TOS- 133 AND- 123 INT- 112
ICA- 242 MEN- 181 UES- 151 IDA- 132 DES- 121 NTR- 112
STA- 240 NTA- 176 ESP- 149 SDE- 132 IDO- 121 ESI- 111
PER- 111
ASE- 109
CAN- 109
UNI- 108
OSI- 107
GEN- 105
NCO- 105
RIO- 105
ERN- 104
OMI- 104
SCO- 104
TES- 103
BIE- 101
NTI- 100
TOR- 100
Two-letter words: DE LA EL EN ES UN NO SE SU LO LA HA MI ME AL
YO
Three-letter words: QUE LOS UNA POR DEL CON LAS MAS SON SER UNO
SIN HAY MIS SUS ESE
Initials: C P A S M E D T H V R U N I L B O F Q G
Finals: O A S E N R B D L I Z
Rearranged Frequency:
13 13 9 8 7 7 7 5 5 4 4 4 3 3 1 1 1 1 1 1 1 - - - - - - - -
E A O S R N I D L C T U M P G Y B Q V H F Z J X CH LL RR N^
Peculiarities:
Q is followed by UE or UI.
The article the and pronouns he, she, it, they, are expressed
by: el=the, he; la=the, she; lo=the, it; los =the, they;las
=the, they (fem).
A. at, to, on, by, in, up,as, if, for, like, with of
E. and
O. or, repeated
U. before o or ho
Y. and
Ni. nor
Mas. but, yet, more, over
Como. How
Un, una. an, one.
Este, estos, estas, esta. this, these
Yo, I; mi=me; mia=my, mine
Usted. you
La, elle. she, the
Su. possesive pronoun
Ese,esa,eso. who
Quien. who, whom
Cual. which
Estar. to be
haber. to have
Absolute Frequencies
E 121 N 65 U 33 F 11 X 4
A 119 T 59 P 30 B 10 J 3
O 111 C 51 L 28 Q 8 W 1
S 76 D 42 V 16 H 7 Y -
I 73 M 38 G 16 Z 5 K -
R 73 =======
1,000
Groups
Vowels: A, E, I, O, U, Y = 45.8%
High-Frequency Consonants: N, R, S, =21.3%
Medium-Frequency Consonants: C, D, L, M, P, T= 24.8%
Low-Frequency Consonants:B,F,G,H,J,K,Q,V,W,X,Y,Z = 8.1 %
A B C D E F G H I J K L M
A 11 11 52 60 15 9 14 2 18 2 38 36
B 11 1 10 5 2 1
C 60 2 30 4 39 5
D 45 61 33 1
E 15 5 48 22 11 11 23 1 27 6 1 31 44
F 9 14 13 1
G 15 14 4 1
H 10 8 3
I 42 3 34 31 6 7 9 1 16 22
J 7 2
K
L 24 1 4 4 24 1 5 9 21 2 4
M 41 10 3 4 51 1 26 1 1 2
N 31 29 35 14 7 8 12 18
O 21 9 32 25 27 10 7 3 20 4 20 36
P 26 2 25 2 4
Q 1
R 75 2 14 9 86 3 7 1 46 1 2 18
S 41 6 22 10 62 6 3 2 23 2 3 12
T 65 1 1 69 1 26
U 22 5 5 7 26 1 4 18 1 14 11
V 11 37 23
W 1
X 10 3 1 2
Y
Z 7 1 9 2 1
N O P Q R S T U V W X Y Z
A 56 49 23 8 68 72 22 8 16 1 5
B 9 9 2 1 2
C 1 85 7 8 12
D 61 2 1 1 5
E 97 6 18 6 76 95 20 7 12 1 15 5
F 15 2 3
G 1 14 14 15
H 11 1
I 53 26 5 2 25 39 27 2 10 2 7
J 2 7
K
L 2 14 4 2 1 4 7 6 2
M 1 16 15 1 3 5 2 6 2
N 25 1 19 114 4 4 1
O 79 5 35 8 71 85 18 12 22 1 1 1 1
P 1 60 1 1 28 1 1 3
Q 37
R 8 34 7 3 11 8 18 4 6 1
S 5 23 35 7 4 40 47 18 5
T 1 88 33 1 13
U 17 2 4 7 9 6 11 1 2
V 9 1
W
X 3 1
Y
Z 1 1 1
CO- 464 RE- 276 IN- 188 PA- 143 MA- 130 ME- 111 TR- 103
PO- 386 DE- 259 ES- 173 NA- 133 PE- 122 MI- 105 DI- 102
SE- 333 QU- 220 PR- 169 TE- 132 VE- 115 NO- 104
ENT- 474 TOS- 191 ERE- 150 IDA- 133 OSE- 126 ECE- 115
NTO- 457 EST- 186 CIA- 145 TER- 132 ARE- 125 NCI- 114
ONT- 303 ACA- 182 ADE- 143 OPO- 130 ESE- 124 REC- 113
NTE- 284 PES- 181 STA- 143 SPO- 130 OVE- 124 PAR- 112
CON- 255 QUE- 172 ICA- 142 ADA- 129 SSA- 124 ESS- 110
PON- 236 NTA- 167 OCO- 140 TRA- 129 DES- 123 DAD- 109
CAO- 227 POR- 159 ARA- 136 NDO- 127 ECO- 121 ORE- 108
ADO- 211 ACO- 158 DOS- 134 ENC- 126 ODE- 118 EDI- 107
MEN- 205 COM- 154 OES- 134
ASE- 105
ITO- 104
ELE- 103
ERI- 103
PRO- 102
AME- 101
OSS- 101
IME- 100
REC- 51
Two-letter words: DE UM AS SE DO OS EM NA NO
Three-letter words: QUE NAO UMA COM POR TAO MAS MEU DAS ERA LHE
NEM NOS SER SIM SUA; ELE
Four-letter words: AZUL DIAS DUAS ESTA MAIS MEUS NOME PODE QUEM
TRES VIDA; SEUS SUAS COMO PARA TODO
14 13 12 8 8 6 6 5 5 5 4 4 4 3 2 2 1 1 1 1 1 - -
A E O R S I N D M T U C L P Q V F G H B J Z X
from [XENO]
Peculiarities:
Plurals end in -s; such as -es,-is, -oes, and -aes are common.
Adjectives carry the plural along with the noun they modify.
1 2 3
P J G J R B P H G Y R G J I C W Q G B G B G A
3 4 5 6 7
U Y C G B C W Y X C B G W G P I C I P D J
8 9 10
Y G R C Q D R C J G I C B D Z G
11 12 13 14
W P H J R D R Y D G Y A G X B P Z G I G
15 16 17 18
Z C B J G R D Q D I G I C I G H G Z C C
19 20 21 22 23
A G D J Y A X G J J P X G B G G
24 25 26 27
W P H J R B Y W G P H P C J X G W P I C
28 29 30
Y A G C J R G W G P X C B A G H C H R C.
31 18 14 12 11 10 9 8 8 8 7 6 6 4 3 1 0
G C J P B R I Y W D H A X Z Q U EFKLMNOSTV
-Cipher
14 12 12 8 8 6 6 5 5 5 4 4 4 3 2 2 1 1 0
A E O R S I N D M T U C L P Q V F GHBJ ZX
-Normal
1 2 3
s a a a s e a a a
P J G J R B P H G Y R G J I C W Q G B G B G A
3 4 5 6 7
e a e e a a e s
U Y C G B C W Y X C B G W G P I C I P D J
8 9 10
a e e s a e a
Y G R C Q D R C J G I C B D Z G
11 12 13 14
s a a a a
W P H J R D R Y D G Y A G X B P Z G I G
15 16 17 18
e s a a e a a e e
Z C B J G R D Q D I G I C I G H G Z C C
19 20 21 22 23
a s a s s a a a
A G D J Y A X G J J P X G B G G
24 25 26 27
s a e s a e
W P H J R B Y W G P H P C J X G W P I C
28 29 30
a e s a a e a e e
Y A G C J R G W G P X C B A G H C H R C.
1 2 3
o s a s t r o n a u t a s d e c l a r a r a m
P J G J R B P H G Y R G J I C W Q G B G B G A
3 4 5 6 7
q u e a r e c u p e r a c a o d e d o i s
U Y C G B C W Y X C B G W G P I C I P D J
8 9 10
s a t e l i t e s a d e r i v a
Y G R C Q D R C J G I C B D Z G
11 12 13 14
c o n s t i t u i a u m a p r o v a d a
W P H J R D R Y D G Y A G X B P Z G I G
15 16 17 18
v e r s a t i l i d a d e d a n a v e e
Z C B J G R D Q D I G I C I G H G Z C C
19 20 21 22 23
m a i s u m p a s s o p a r a a
A G D J Y A X G J J P X G B G G
24 25 26 27
c o n s t r u c a o n o e s p a c o d e
W P H J R B Y W G P H P C J X G W P I C
28 29 30
u m a e s t a c a o p e r m a n e n t e
Y A G C J R G W G P X C B A G H C H R C.
Note the -cao endings
WHAT'S NEXT?
OTHER STUFF
P Q N X B M H Q I Q A B C I Q D K E X Q B Q O Q
P' W M R R Q; D K E X Q B Q O Q U Q I Q E Q Q M C
T E X R X B X D Q , X P Q A B K P' W M R R Q N Q
V C Q N W K B O Q U M C B B X Q E Q Q A B K C
N W K B A K C D K U Q.
FRE-3. K2. (87) (jamais, A=b) It's fun trying. GUNG HO
D G X Z Q N J D P M C J P U P L S U E' Z D
Z D H U Q J S E J S N P U Q E Z H Z D P M J H -
K N D P: G Z K U D I Q S N U , G Z H S P D L S U,
U Q G U P O Z H U P . * R J I Q U I U G G U
NADXN VMXUF
ITA-2. K2. (88) ( ne, han, con) Thirty days hath September.
LABRONICUS
I D S A I K Q W P L A I K A L B S C M D S P L A
K E D W Z S, U W O U A L S R S I I S C M D S . Q W
B S A I L I I L P S A ' S O A L. I O I I W U Z W
K Z I D W A S V K A I D S A U I O A L.
G Z Q K E A F S Z L T K F Q A Q S F N F Q K G K Q
T G G Z P Z Q F R A T J Z E F N S Z M T Z J S A S
Z R A P T D A F F Q K G K Z L Z S S K E O F J F Q
Q T J K R A E Z F Q Z S S Z H F J S F M T F G G K
E O F L F J Q Z G A J X T S Z J D.
SPA-1. BARKER
Z K E P C U K Y T C Y D M S R V C T P E R A
Z P Z N D Z K G C T Y R Z K R N T D G R Y C V K
K S T P Q D P E R M K T C Y G R Z Y P Q P M P E K E
E C M K S C Z S K E R G R T C M U R U C Z S R.
T I Z Q B J N A Z K J K T F Z N B P L T B B F
K N A G B N A G K T F P J G T P A O Z F M B F
S J G H N B R T B T I K T N Z G B I Q B
B P K J I Q Z I B J M P B B J N A Q G A O J M B
M Z I Y Z N.
N S P Y K I X P U A K P Z D X P S P E X K R L K O
K A X T S P Q K D X R K R R S S I N K Y K R L A R
S D K T Q L D L P X K T A S Q X S P X P R S O S P
R X J K R K T O A S T S P Q X L S D O A X I S A E
C S D L R S C P V D L N L B A X O C D K R L.
E P E J T X D U R T C J Z X G C V R J D J
X I N R S O C H C D T C V R P U C D V R J
Z J U D C T J H J D G X U M P C H J A X H X
O X T J T V R J A J U A C M C B J S X.
*O. *T R T M X I H *Q X U J D
U C U C G V C J F D E F W E O C B G C V S I H C L
I T I W F Y C V F U H F W F T L F R F B C H W F C
E S H I L F G I C D E G T I J H C V G R P C V C J
F V D E F W F H C V L F V F H J I S K I X J I Z U
I G V T I V V I V B C D E F G H I V V C I F Y K F
R F T W F V.
a b c d e f g h i j k l m n o p q r s t u v w x y z
Z J U G R T H I N E A B C D F K L M O P Q S V W X Y
K2 = JUGRTHINE
After placing the very generous tips, the solution was a simple
matter of filling in the key alphabet. Solution time about 5
minutes.
K2 = FYSIKK LOVA
a b c d e f g h i j k l m n o p r s t u v y z aa ao ae
F Y S I K L O V A B C D E G H J M N P Q R T U W X Z
Letting e=K, there was only one position for VERDEN. This gave
the interesting pattern ERE??ERE at letter 18. Trying the
pattern ABaCcaba in my Norwegian word list gave the word
INTERESSERER. This in turn gave ERTEINSTEIN at the end of the
gram, which implied Albert Einstein. From that point on the
solution was a matter of filling in the key alphabet. Solution
time about 1 hour.
REFERENCES / RESOURCES [updated 3 February 1996]
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[LAKE] Lakoff, R., "Language and the Womans Place," Harper &
Row, New York, 1975.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson,
New York, 1992.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
LECTURE 6
XENOCRYPT MORPHOLOGY
Part II
SUMMARY
SHAREWARE
The French formed the word "chiffre" and conceded the Italian
word "zero". The English used "zero" and "Cipher" from the
word ciphering as a means of computing. The Germans used the
words "ziffer" and "chiffer".
ELINT
Tom Roach [ROAC] has been monitoring Russian messages for some
time. He uses a Watkins-Johnson HF-1000 receiver, a Rhombic
antenna, a Singer MT-5 Spectrum Analyzer, a Universal M-7000
decoder ( allows viewing the Russian in its native Cyrillic
alphabet) a Sony TCD-07 recorder, and Hitachi V-302F
Oscilloscope with X/Y tuning capability for RTTY
communications.
[ROAC] suggests that the best hunting grounds for Russian RTTY
traffic are:
and
6385 kHz (Morse) at around 1400 UTC
NIHILIST SUBSTITUTION
For some reason, Russian prisoners were not allowed computers
in their cells. Inmates were forbidden to talk, and to outwit
their jailers they invented a "knock" system to indicate the
rows and columns of a simple checkerboard (Polybius square at
5x5 for English or 6x6 for 35 Russian letters). For ex:
1 2 3 4 5
1 U N Ij T E
2 D S A O F KW=United States Of
3 M R C B G America
4 H K L P Q i/j = same cell
5 V W X Y Z repeats omitted
PT: g o t a c i g a r e t t e ?
CT: 35 24 14 23 33 13 35 23 32 15 14 14 15
B L A C K S M I T H
D E F G N O P Q R U
V W X Y Z
B D V L E W A F X C G Y K N Z S O M P I Q T R H U
1 2 3 4 5
1 B D V L E
2 W A F X C
3 G Y K N Z
4 S O M P I
5 Q T R H U
Let KW = ARISE 22 53 45 41 15
CT: 33 97 88 52 36 67 87 97 56 68 66 75 59 63 40 37
or with bifurcation:
nulls=774
NIHILIST TRANSPOSITION
S C O T I A
5 2 4 6 3 1 1 2 3 4 5 6
1 S E U H T L (let us h) S 5 E U J W T O
2 R A F O R E C 2 R A F O R E
3 A Y U T O M O 4 A N E B C O
4 A N E B C O T 6 X L X X S E
5 E U J W T O I 3 A Y U T O M
6 X L X X S E A 1 S E U H T L
E U J W T O R A F O R E A N E B C O X L X X S E A
Y U T O M S E U H T L.
VIC-DISRUPTION CIPHER
The ICT from TT1 is inscribed into TT2 horizontally from left
to right skipping the D areas. When all the non D area is
filled , then the D areas are filled in the same way. The
cipher text is removed by column per key order without regard
to the D areas.
KEYS
The VIC system used four memorized keys. Key 1 - the date of
WWII victory over Japan - 3/9/1945; Key 2 - the sequence of 5
numbers like pi - 3.1415; Key 3 - the first 20 letters of the
"Lone Accordion", or famous Russian song/poem, and Key 4 - the
agent number, say 7. Key 1 was changed regularly. Key 4 was
changed irregularly.
DISRUPTION ALGORITHM
The keys were used to generate the keys for transposition and
the coordinates for a checkerboard for substitution through a
complex LRE (Left to right enumeration) logic. The process
injected an arbitrary 5 number group into the cipher text which
strongly influenced the end result. This group changed from
message to message, so the enciphering keys (and cipher text)
would bear no exploitable relationship to each other. Not only
did TT1 and TT2 keys differ but also the widths of the blocks
did as well.
KEY GENERATION
4 9 1 6 0 8 5 2 3 7
R E A S O N b
2 B C D F G H J K L M
3 P Q I U V W X T Z 1
7 3 5 7 9 . , b $ % -
b = space character
RUSSIAN IMPROVEMENTS
MERITS
The cipher text is only 62% increased over plain text because
of the high frequency letters in the first row of the ST.
RANDOMNESS
The real issue for the One-Time Pad, is that the keys must be
truly random. Attacks against the One-Time Pad must be
against the method used to generate the key itself. Pseudo-
random number generators don't count; often they have nonrandom
properties. Reference [SCHN] Chapter 15, discusses in detail
random sequence generators and stream cipher. [SCHN], [KAHN],
[RHEE]
CHINESE CRYPTOGRAPHY
ENCIPHERING
Dr. August suggests that the Four Corner System and the Chinese
Phonetic Alphabet System lend themselves to manual
cryptographic treatment. His treatment of these two systems
is easier to understand than some military texts on the
subject. [AUG1]
3
Xj = U v1 eq 1
1-3
A) Phonetic Alphabet:
12.6 7 5.7 4.8 4.2 3.8 3.4 3 2.9 2.8 2.4 2.2
I U D ENG/E an/en SH X/ZH J/u G O ao H
Initials: sh, d
Medials: i
Common Digraphs: ji, ieng, ueng, gu, de, ian, iie, li, ien,
qi, xi, uo, izh, zu, shi
Positional Limitations:
B) Four Corner
DEPENDENCE
HISTORICAL PERSPECTIVES
China appears to have had a much delayed entry into the cipher
business. Partially because so many Chinese did not read or
write, and partially because the language was so complex,
Chinese cryptography was limited until the 19 century. But
there were seeds:
The Anjohan not only mastered the basics of Chinese codes and
ciphers but also broke the Nanking Government and the Chinese
Legation codes in Tokyo. [YOKO]
The tokujo operations against the North China Area Army and the
Chinese Communist codes was tragic failure. [HISA] The IJA's
China experts held a highly negative image towards the Chinese.
When the Sian mutiny broke out and Chiang Kai-shek was
kidnapped in December 1936, Major General Isogai (IJA's leading
expert in COMINT for China) toasted (more like roasted) the
demise of Chiang. Colonel Kanji Ishiwara (Japan's chief
military strategist) deplored the incident because he felt
China was on the brink of unity because of Chiang Kai-shek's
efforts. He considered the ability to read Chiang's codes just
a matter of doing the business of war. [SHIN]
LATIN
Vowels: I E U A O
Consonants: T S R N M C P L D Q B F V X H
Initials: S I A P E Q C V M D N F H R T U L O G J
Finals: S E T M A I O N D R L C U
Doubled Letters: S L M P T C N R U Z
Vowel Combinations:
AE AU AI ; EA EI EO ; IA IO IE IAE ; OA OE OI OAE OIA ;
UA UE UI UO UU UAE UIA UIU
Consonant combinations:
NT ST ND SP PB CT SG NS NP LT
Frequent reversals:
UM EN ER NT TI TE ON RT RE ES IS ME IT TA US SE IC TU
ST IE PE CI RU
Digraph endings:
IS UM US AM AE TA NT EN RE OS AS UE ES RA AT IT ET IA IO
OB ST SE TE RI OR UR ER NI RI UI NO EL DI PE NA VA NS ED IN NE
SA MO SI SO RO
A H 2H 2E N 2E E
B H O 2H 2E
C H P H
D H E Q H 2H
E H 2H E R 2H 2E
F H S E H
G E H T E 2E H
H 2H E H U 2H 2E
I 3E 2E 2H V H
J H W (rare) H
K E X 2H 2E
L 2E 2H Y E 2H
M H Z 2E E H
IN ET AD SI PER UBI SED UNA VIA HIC PRO CUM QUI QUO QUOD
IPSE ATQUE QUARE QUIDEM
Pattern words:
NON BENE FERE QUISQUE
One-letter words: A E I O
Two-letter words:
AB AC AD AB AT DA DE DO EA EI EN EO ES ET EX HI ID II IN IS IT
ME NE NI OB OS RE SI TE TU UT
Second Letter
A E I O U B C D F G H K
- 156 145 146 36 60 11 99 65 39 7 35 4
A 113 77 8 20 42 15 58 6
E 197 27 7 7 1 5 26 18 4 11 1
I 89 43 12 6 59 68 51 60 34 12 26 4
O 61 1 3 10 37 19 1 2
U 8 73 61 50 22 2 17 2 11
B 15 12 26 33 3 22
C 29 49 28 31 68 3 4 3
F D 53 16 61 87 9 17 3 1
i F 3 7 9 23 11 9 5
r G 2 5 18 14 4 10 1
s H 23 3 14 8 4
t K 4 8
L 10 46 39 106 10 13 2 1
L M 248 28 33 28 22 23 1
e N 57 48 49 59 40 38 33 39 4 19
t P 2 12 34 12 43 14 1
t Q 4 167
e R 87 96 76 101 30 56 4 6 7 1 2 1
r S 276 14 64 83 30 47 34 1 2
T 191 96 125 142 20 91 6
V 3 7 42 24 27 1
X 28 1 2 7 2
Y 5
Z 1
L M N P Q R S T V X Y Z
53 36 79 113 92 36 151 46 68 3 1
A 63 89 62 12 4 59 45 81 4 2
E 18 78 85 11 21 175 84 93 3 35
I 25 49 143 24 9 10 137 113 3 4
O 13 27 134 6 4 65 46 13 5 2
U 37 119 63 9 60 105 70 1
B 1 4 5
C 2 24 40 5
D 2 1 1 1 2 2
F 1 12
G 1 13 8
H
K
L 33 12
M 7 10 13 5 2
N 4 3 56 136 10
P 17 3 42 15 11
Q
R 1 6 1 3 2 2 9 26 3 1
S 7 5 11 39 72 3 7
T 19 23 35
V
X 6 1
Y
Z
NORWEGIAN
16 8 7 6 5 4 2 1 - 0
E RNS T AI LDO GKM UVFHPA' JB0 Y AE C WXZQ
IC = .0647
Vowels A, E I O - 33%
Consonants D L N R S T - 41% of letters
Doubles:
LL KK NN TT MM SS PP GG RR DD FF
Digraphs:
EN ER DE ET TE ST NE OR RE KE AN ME SE SK
Reversals:
EN ER DE ET ES EL LI AV GE
Initials:
Finals:
HUNGARIAN
2. It has vowel harmony - they fall into high and low vowel
categories. High - E, I, OE, UE and Low- A O U. In a word
they are all either high or low.
TT 104 BB 25 RR 10
SS 42 KK 24 II 9
LL 35 NN 22 GG 7
AA 31 ZZ 11
EE 27 MM 11
OE 229 AL 126 SA 94
EL 225 AS 123 KA 91
TA 219 LE 118 ZA 90
SZ 207 NE 110 LA 89
ES 201 UE 110 ZO 88
EN 185 EM 110 AK 87
EG 155 GY 108 KE 87
ET 151 AZ 101 AM 86
TE 149 EK 97 KO 86
AN 145 LA 96 EZ 80
AT 136 AR 95 MA 79
ER 133 SE 95 RE 79
ME 127 TO 95
Initials:
V E M K S A H T F N L B I O J C U P R G D
Finals:
T N K E A S I M L G Y Z R D O B U P C
Groups:
Vowels A E I O U 41.77 %
LNRST 29.54
JKQYZ 9.93
EATOS 50.06
EATOSLNZK 70.47
HJFCP 4.39
Second Letter
A B C D E F G H I J K
A 31 41 4 22 15 22 56 55 33 28 87
B 57 25 52 1 3 1
C 6 3 5
D 28 1 1 3 48 3 3 15 1
E 28 26 3 47 27 21 155 19 19 21 97
F 7 21 3 25
G 40 9 46 4 7 11 13 3 6
F H 67 21 15
i I 34 7 6 16 9 1 26 2 9 5 59
r J 35 1 6 16 3 1
s K 91 6 3 1 87 6 4 2 38 1 24
t L 96 5 3 7 118 7 6 4 15 10 18
M 79 18 5 1 127 5 9 58 5 3
L N 59 7 8 40 110 7 9 2 18 1 38
e O 3 11 1 13 229 1 25 2 1 51
t P 7 16 3 3 3
t R 50 1 13 10 79 5 6 1 19 1 10
e S 94 3 1 5 95 5 1 8 18 5 22
r T 219 10 3 3 149 1 6 14 59 5 19
U 4 1 12 110 1 9 2 4 4 1
V 89 5 61 13
Y 41 1 1 1 43 1 5 18 2
Z 90 6 122 1 6 2 28 3 3
L M N O P R S T U V Y Z
Kw= LICHT
PT: a b c d e f g h i j k l m n o p q r s t u v w x y z
CT: F G J K M N O P Q R S U V W X Y Z L I C H T A B D E
After placing the crib at the 5th word, der, dess, and die
were immediately identified.
Student besteht Pruefung zum zweiten mal nicht wieso fragt der
Freund Schicksalsschlag das selbe zimmer der selbe Professor
die selben fragen.
PT: z q u e s t i o n a b c d f g h j k l m p r v w x y
CT: U N F A I R B C D E G H J K L M O P Q S T V W X Y Z
Fre-1.
F G H I J K
A N E Z P I L
B S O T H U M
C B A R C D F
D G J K Q V W
E X Y - - - -
Split the cipher text after message group 13. Message reads:
Que Noel vous soit des plus agreables et l'an nouve aplein de
desirs accomplis.
HOMEWORK PROBLEMS
F C D R J R B B Q C O Q C N T Z U N B R,
U R P R M Q C Z R H R M M Q C R G R O N D R M R.
N D U N K R M R U Q N S N O, R P N Z C N H D Z S F
B N U R M R , G R K F D N , U Q C S N U P F M R O
S R B N D P. * O Z B B Q O P [cum, bdghj=JGHIE]
I K P N H E R A M C K D A O A G P K M K N N K M K
M E K O K M Z L A G G K Q P H E V K M M K G K O K
G P D A O V F I I K G H K R F D O I F V F G N C F
J P K R K M I K G N F E K G G K N C K P F D Y K M
P K A G N P K A G.
REFERENCES / RESOURCES
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and Sons,
NY, 1982.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
Ciphers," Ambassador Books, Toronto, Canada, 1956.
[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.
[LAKE] Lakoff, R., "Language and the Womans Place," Harper &
Row, New York, 1975.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson,
New York, 1992.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
the Navy with Brief Description of the Ardois Hight
System," In Proceedings of the United States Naval
Institute, Annapolis: U. S. Naval Institute, 1891.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
Code System," The Cryptogram, SO95, ACA publications,
1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
1995.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
Dispatches, New York, 1879.
13 NOVEMBER 1996
Revision 0
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 19
SUMMARY
PASSWORD VULNERABILITY
UNIX VULNERABILITY
COLLECTION
KLEIN'S SURVEY
SAFE PASSWORDS?
METHOD OF ATTACK
1. Name Variations
2. Dictionaries
3. Permutations of Item 2
4. Capitalization
5. Foreign Words
6. Word Pairs.
SUMMARY OF RESULTS
Table Notes
TABLE 19-2
PRIVACY REFERENCES/RESOURCES
John Vacca and Derek Atkins, et. al. have produced two
of the best internet security books. [VACC], [NEWR]
Bruce Schneier has produced the modern reference on
professional cryptography algorithms. [SCH2] But James
Nechvatal's State of the Art Survey on Public-Key
Cryptography for NIST and NCSL is terrific. [NIST90].
Privacy Law and Practice, a three volume treatise edited
by Professor George Trubow of John Marshall Law School,
is probably the leading source in the United states.
ACA's RENARD is a contributor and a very modest expert
in the field of intellectual property rights law. NCSA
provides an up to date source of information on the
encryption legislation. Appendix 2 gives two of the most
recent issues of interest: the Bernstein Case and the 56
bit key recovery proposal by the White House. There are
other organizations like ACLU, EFF, EPIC and EDUPAGE
that update the net regularly regarding privacy. Any
netbrowser will find them. Don't forget that the
government agencies CIA, NSA, DIA, DOD all have home
pages as does the White House and various government-
wide security consultants like SAIC.
INTRODUCTION TO PRIVACY ISSUES
MIB
NCOA
NCIC
The above are just three examples of the more than 2000
databases that destroy our collective privacy. The
Internet is a global network of databases. Our personal
profiles are so complete and available, it is like
having another self living in a parallel dimension; its
a self you can't see, but effects your life just the
same. Even if you don't own a computer, you have joined
the revolution.
EMPLOYEE RIGHTS
INTERNATIONAL PRIVACY
http://www.tis.com/crypto/
This is not a static list. TIS updates it weekly. I read
in the (11 November 1996) Edupage that Phelps Dodge
plans to market in Japan a scrambler/decoder that works
on 128 bit keys. Since 40 bits is the maximum (56 bits
under the temporary position of the White House
proposal) under ITAR regulations, and the government
supports a trusted third party key escrow via the
Clipper chip, I suspect that Phelps may have a challenge
on its hands. Since I have brought up the subject of
ITAR, lets take a brief side trip.
ITAR EXCEPTIONS
o at libraries
C = E(K, P) eq. 1
The best known public key algorithm is RSA. The keys are
generated mathematically, in part by combining prime
numbers. Each user has a public and a private key.
Devised in 1978 at MIT, this system has 512 bit, and
1024 bit ( in some commercial versions higher) keys and
provides authentication in addition to encryption.
CRYPTOGRAPHIC NETWORKS
Figure 19-1
A Fully Connected End-To-End Network
ZDDD? K6 ZDDD?
3 2 3 <----------> 3 4 3DDDD? K4
@DDDYD? @DDDY 3
3K1 @?K2 3 K5 3
3 @DDDDDD? 3 3
ZDDD? K3@DDDDDZDDD? 3
3 1 3 <-----------> 3 3 3 3
@DBDY @DDDY 3
@DDDDD<DDDDDD>DDDDDDDDDDDDDY
Figure 19-2
A Link Encrypted Network
Figure 19-3
A Hybrid Network
ZDD? K1 K5 ZDD?
32 3 >DDD? ZDD<36 3
@DDY 3 3 @DDY
3 3
ZDD? K2 ZDD? K4 ZDD? K6 ZDD?
31 3 DDDDDDD> 33 3 <DDDDDD-> 35 3 <DDDDDDD 3 73
@DDY @BDY @DDY @DDY
3 3
ZDD? 3 3 ZDD?
34 3 >DDDY @DD<38 3
@DDY K3 K7 @DDY
Figure 19-4
A Central Key Distribution Facility
ZDD?
ZDDDDDDDD 32 3 DD DD D?
@DDY 3
3 3
3 K1 3
3 3
ZDD? 3
3 31 3
@DDY 3
3 3
3 3
3 3
ZDD? K2 3 K3 ZDD?
34 3 D D D DAD D D DD 33 3
@DDY @DDY
IMPLEMENTATION CONSIDERATIONS
Media
Configurations
CYBER NOTARIES
KERBEROS
TEMPEST
LECTURE 18 SOLUTIONS
18-1. Unidecimal square root. (Three words 0-E) MARSHEN
Appendix 1
TIS Worldwide Survey of Cryptographic Products
ARGENTINA
Hugo D. Scolnik
Newnet S.A.
AUSTRALIA
Cybanim Pty Ltd.
Eracom Pty Ltd.
Eric Young
Microlock
Mosaic Industries
News Datacom
Randata
AUSTRIA
Siemens AG Austria
BELGIUM
CNET
Highware, Inc.
Lintel Security
UTI-MACO Belgium
CANADA
Border Network Technologies, Inc.
CRYPTOCard Corporation
Certicom
Chrysalis ITS
Compression Technologies, Inc.
FSA
Isolation Systems
Micro Tempus, Inc.
Milkyway Networks Corporation
Northern Telecom Canada Ltd. (Data Comm. Products)
Northern Telecom Canada Ltd. (Secure Networks)
Okiok Data
Queen's University
Secured Communications Inc. (SCI)
Sierra Wireless
The Enigma Group
TimeStep Corporation
Tundra Semiconductor Corp.
Zoomit Corporation
CZECH REPUBLIC
Decros spol. s r .o.
DENMARK
Aarhus University, Computer Science Department
CryptoMathic
GN Datacom
LSI Logic/Dataco AS
FINLAND
Antti Louko
Jetico, Inc.
SSH Communications Security Oy
FRANCE
ActivCard
Atlantis
Digital Equipment Corp. (DEC), Paris Research Lab
Hewlett Packard France
Philips Communication Systems
GERMANY
Andreas Kupries
Baller & Huwig
CE Infosys GmbH
Celticon
DataSafe
EZI GmbH
FAST ComTec GmbH
GMD
Gliss & Herweg
Jurgen Meyer, Frank Gadegast
Karl Huwig
KryptoKom
SIT
Siemens-Nixdorf
Stefan D. Wolf
TeleSecurity Timmann
Telenet Kommunikation Systeme
UTI-MACO GmbH
HONG KONG
Triple D Ltd.
INDIA
Bharat Electronics Ltd.
Chenab Info Technology
IRAN
Communications Industries Group
IRELAND
Baltimore Technologies Ltd.
Eurologic Systems, Ltd.
Systemics Ltd.
ISRAEL
Aladdin Knowledge Systems, Ltd.
Algorithmic Research Ltd.
Aliroo Ltd.
Carmel Software Engineering Ltd.
Elementrix Technologies Ltd.
EliaShim Microcomputers Ltd.
Secure Network Systems, Ltd.
ITALY
AMTEC SPA
CERT-IT
Eutron Spa
JAPAN
Fujitsu Labs Ltd.
MEXICO
The King of Hearts
NETHERLANDS
Concord Eracom Nederland BV
DigiCash
Incaa Datacom BV
Philips Crypto B.V.
Pijnenburg
Verspeck & Soeters b.v.
NEW ZEALAND
LUC Encryption Technology, Ltd. (LUCENT)
Peter Gutmann
POLAND
Enigma Information Security Systems
RUSSIA
Ancort
Askri
Elias Ltd.
INFORM -RTG
LAN Crypto
ScanTech
TELECRYPT, Ltd.
SOUTH AFRICA
Denel Informatics
NetSec
Sentera
SWEDEN
AU-System Communication AB
Ardy Elektronics
Business Security AB
COST Computer Security Technologies International
DynaSoft
Henry Padilla
SECTRA AB
SONNOR Crypto AB
Stig Ostholm
SWITZERLAND
ASCOM Tech AG
Crypto AG
Gretacoder Data Systems AG
Omnisec AG
Safeware AG
UK
Apricot Computers, Ltd.
Avant Guardian Ltd.
British Telecom
Data Innovation Ltd.
DataSoft International Ltd.
Digital Crypto
Finansa
GEC-Marconi Secure Systems
Global CIS Ltd.
ICL Secure Systems
IQ International
International Data Security, Ltd.
J.R.Ward Computers Ltd.
J.S.A. Kapp
JPY Associates Ltd.
Jaguar Communications Ltd.
Microft Technology Ltd.
PC Security Ltd.
Plessy Crypto
Plus 5 Engineering Ltd.
Portcullis Computer Security Ltd.
Protection Systems Ltd.
Racal Airtech Computer Security
S&S International PLC
Sophos Ltd.
University College London
Zergo, Ltd.
Zeta Communications Ltd.
Appendix 2
Case Background
Legal Arguments
http://www.eff.org/pub/EFF/Policy/Crypto/
ITAR_export/Bernstein_case/ ftp.eff.org,
pub/EFF/Policy/Crypto/ITAR_export/Bernstein_case
/ gopher.eff.org,
1/EFF/Policy/Crypto/ITAR_export/Bernstein_case/
Appendix 3
FEDERAL REGISTER
VOL. 58, No. 139
Rules and Regulations
DEPARTMENT OF STATE
Bureau of Politico-Military Affairs
22 CFR Parts 120, 121, 122, 123, 124, 125, 126, 127,
128, and 130
[Public Notice 1832]
Amendments to the International Traffic in Arms
Regulations
Part II
58 FR 39280
Appendix 4
28 NOVEMBER 1996
Revision 0
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 20
CODES
SUMMARY
CODE SYSTEMS
Table 20-1
A Sincerely Preached
B Really Announced
C Saintly Published
D Evangelically Revealed
E Devotedly Denounced
F Intelligibly Acclaimed
G Evidently Exalted
H Publicly Sermoned
IJ Faithfully Interpreted
K Ardently Reported
L Constantly Narrated
M Sagely Served
N Carefully Praised
O Virtuously Recited
P Catholically Pronounced
Q Cordially Repeated
R Reverently Treated
S Theologically Speculated
T Justly Collated
UVW Divinely Spread
X Learnedly Cognitized
Y Entirely Recognized
Z Studiously Contemplated
& Spiritually Produced
Amen
Example:
D O N O T U S E B E A R E R
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Cipher text:
ABC CODE
Table 20-2
MORSE CODE
Samuel Finley Breese Morse was born in 1791 in
Charlestown, Mass. His invention of the electrical
telegraphy was second only to the famous 'Morse Code'.
He based his Morse Code on the frequencies of letters
calculated on quantities of type found in the printing
office. Since his frequency tables are an enormous help
in deciphering every code, lets compare here the
original calculation made by Morse with the Normal
Frequency and the Telegraph Frequency. (See Table 20-3)
Table 20-3
Order 1 2 3 3 3 3 3 4 5 6 7 8 9 9
Morse: E, T, A,I,N,O,S, H,R,D,L,U, C,M
Telegraph: E, O, A, N, I, R, S, T, D, H, L, U
Order 10 11 12 13 14 15 16 17 18
Morse: F, W,Y, G,P, B, V, K, Q, J,X, Z
Telegraph: C, M, P, Y, F, G, W, B, V, K, X, J, Q, Z
The Morse code was not only used in telegraphy but also
in signalling by flags, by flashes of lights, by long
and short blasts from a whistle, and for some of us
knocks on the wooden cages to fellow prisoners in Viet
Nam.
Table 20-4
Morse Phonetic
The famous message SOS = SAVE OUR SHIP = ... --- ... =
dit dit dit dah dah dah dit dit dit.
COMMERCIAL CODES
MARCONI CODE
1st Syllable.
2nd Syllable.
3rd Syllable.
4th Syllable.
0 1 2 3 4 5 6 7 8 9
Blanc AR EN BU HI JA NA OY TO VA YG
Anout AC EP BY HO JE NE OZ TU YE YH
Average AD ER CA HU JI NI PA TY VI YI
C.I.F. AF ES CE HY JO NO PE WB VO YJ
(Cost
Insurance
Freight)
each AG ET CI IB JU NU PI UC VU YK
NON-SECRET CODES
Encoding
47 - 326 - 51
The 3rd, 4th, and 5th figures determine the page from
which we apply the condensation codes. 326 is found on
page 3 of the codebook. (Table 20-6a&b reproduces part
of the pages.)
Alongside the figures 326 are the two letter groups YM,
YN, YO, YP, which gives us the 3rd and 4th letters of
the codeword we will form.
To determine the group to use, we look at the 6th and
7th figures table and find the fifth letter. The figures
51 are in the same column as YP and the letter alongside
of 51 is M. Thus we have the 3rd, 4th, and 5th letters
of our codeword YPM.
Table 20-6a
page 3
326 YM YN YO YP
327 YQ YR YS YT
328 YU YV YW YX
329 YY YZ ZA ZB
330 ZC ZD ZE ZF
. . . .
39 J
6th and 43 K
7th 47 L
Figures 51 M
Fifth 55 N
Letter 59 O
. . . . .
.. ..
45 FP
46 FQ
47 FR 1st and 2nd
48 FS Figures
49 FT First and
50 FU Second Letters
.. ..
Decoding
ST - RO - W
Table 20-6b
page 6
782 RO RP RQ RR
783 RS RT RU RV
784 RW RX RY RZ
785 SA SB SC SD
786 SE SF SG SH
. . . .
6th and 84 85 86 87 W
7th 88 89 90 91 X
Figures 92 93 94 95 Y
Fifth 96 97 98 99 Z
Letter .. .. .. .. .
.. ..
85 SR
86 SS
87 ST 1st and 2nd
88 SU Figures
89 SV First and
90 SW Second Letters
.. ..
BREVITY CODES
Table 20-7
Sample Entries from INTERCO Codebook
Distress - Emergency
Code Meaning
ABANDON
Accident
Doctor
ASSISTANCE
Required
Given-Not Given
DISABLED-DRIFTING-SINKING
Proceeding To Assistance
Results of Search
ICEBREAKER
SEA
Height
In Meters In Feet
0 Calm (glassy) 0 0
1 Calm (rippled) 0 - 0.1 0 - 1/3
2 Smooth (wavelets) 0.1 - 0.5 1/3 - 1 2/3
3 Slight 0.5 - 1.25 1 2/3 - 4
4 Moderate 1.25 - 2.5 4 - 8
5 Rough 2.5 - 4 8 - 13
6 Very Rough 4 - 6 13 - 20
7 High 6 - 9 20 - 30
8 Very High 9 - 14 30 - 45
9 Phenomenal over 14 over 45
MEDICAL
Special Treatment
To indicate DISTRESS:
example:
Table 20-8
Phonetic Alphabet used with INTERCO
A Alfa AL FAH
B Bravo BRAH VOH
C Charlie CHAR LEE or SHAR LEE
D Delta DELL TAH
E Echo ECK OH
F Foxtrot FOKS TROT
G Golf GOLF
H Hotel HOH TELL
I India IN DEE AH
J Juliett JEW LEE ETT
K Kilo KEY LOH
L Lima LEE MAH
M Mike MIKE
N November NO VEM BER
O Oscar OSS CAR
P Papa PAH PAH
Q Quebec KEH BECK
R Romeo ROW ME OH
S Sierra SEE AIR RAH
T Tango TANG GO
U Uniform YOU NEE FORM or OO NEE FORM
V Victor VIK TAH
W Whiskey WISS KEY
X Xray ECKS RAY
Y Yankee YANG KEE
Z Zulu ZOO LOO
0 NADAZERO NAH-DAH-ZAY-ROH
1 UNAONE OO-NAH-WUN
2 BISSOTWO BEES-SO-TOO
3 TERRATHREE TAY-REE-TREE
4 KARTEFOUR KAR-TAY-FOWER
5 PANTAFIVE PAN-TAH-FIVE
6 SOXISIX SOK-SEE-SIX
7 SETTESEVEN SAY-TAH-SEVEN
8 OKTOEIGHT OH-TAY-AIT
9 NOVENINE NO-VAY-NINER
. DECIMAL DAY-SEE-MAL
PARALLEL SETS
TWO-LETTER DIFFERENTIAL
TYPES
Table 20-9
One-part code
ABABD A
ABACF Abaft
ABAHK Abandon
ABAJL .....it
ABALN Abandoned
ABAMP .....by
ABAWZ Abandoning
ABBAD Abandonment
......................
......................
ZYZYZ Zero
Table 20-10
Two-part code
Table 20-11
Caption code
Assistance
Give assistance
Require assistance
No assistance
Assistance has been sent
Assistance for
Assistance from
Assistance to
Assistant
Assisted
Table 20-12
Strictly-alphabetical
Assistance
Assistance for
Assistance from
Assistance has been sent
Assistance to
Assistant
Assisted
.........................
Give
Give assistance
.........................
No
No assistance required
.........................
Require
Require assistance
(1) When the code has a wide distribution and may fall
into enemy hands,
Table 20-13
Indicators and Key Blocks
Block 00
1 2 3 4 5 6 7 8 9 0
1 0378 9197 3260 3607 2699 9053 9733 1844 6622 4213
2 7185 0135 6091 2387 4957 3113 7284 0750 3501 1945
3 5037 3365 1294 8261 2149 0718 3678 2510 7238 5268
4 8004 5199 3859 1293 5311 3550 9915 0512 1518 3776
5 9282 6893 4229 9736 0927 1418 1930 9864 0090 8974
6 7259 9399 0769 3144 9801 1378 4732 5134 1435 5282
7 2878 9963 7943 4519 3404 9810 1090 4467 7069 5348
8 1620 5879 0218 1064 9560 5732 6661 0883 1883 2619
9 3868 1905 2500 6654 0824 3710 3875 6332 1503 7259
0 4319 3298 7819 8721 1549 6630 6301 5701 3586 1907
Block 01
1 2 3 4 5 6 7 8 9 0
1 9328 1135 3871 1549 0839 8790 1771 8251 3274 1173
2 2297 9550 5033 0102 6817 5579 0847 4038 1200 2949
3 3640 3984 3299 1181 3811 8844 2500 4557 4133 0487
4 1256 9614 5520 8372 1941 2417 1098 4039 3943 8282
5 1751 4254 8479 8647 2684 5511 8680 4660 2315 4857
6 4587 5968 2568 1254 0258 1254 3568 2548 4521 8795
7 1258 6241 0125 2458 4587 5632 2589 1548 1235 1458
8 1254 2548 0004 4561 2565 2437 7849 1245 3265 4879
9 4582 1546 2589 2145 7854 7895 4589 6369 3698 1254
0 1255 1544 7850 2569 9989 8754 2548 1220 0387 0589
DICTIONARY CODES
Code:
Ciphertext:
Table 20-14
1 3 5 2 4 9 7 8 6 0
9 AN DA HN JT MB KC GF ES BZ ZA
2 CK AO DB HO JS GE ER BY FR YB
7 IR CJ AP DC GD EQ BT FQ LH VA
4 MC IY CI AR DD BS FP LI NL VB
8 MA KB GC CG AS DF HP JU OB VC
1 KA GB EP BR CE AT DG HQ JQ TZ
5 GA EO BP FO IX CC AX DH HR TY
3 EN BO FN LJ NK IZ CB AY DJ SB
6 BN FM LK NJ OA OC IV CB AZ QA
0 XY YA BY YB XC XE YD YE YX QC
Given:
THE RE--- OF THE RO--- TO- THE SE- -HA - RE- TH- THE
RE- DE- - WA- OV- THE TO-
The R group is: -RE- (42872) and RE- (44234) and RO-
(45174). RE stands 300 words from the end of the RA's
which stop at 42573, according to Mansfield's tables.
This gives us the following words to select from:
RECLINE, RECOMMEND, RECOMPOSE, RECONNAISSANCE, RECOUP,
and RECOVER. We choose RECONNAISSANCE. The next look at
our cipher is:
SE- should be sea 46882 and OVER for OV- 36173. The of-
is in fact OF, and the HA- is has, and the WA- is was.
The complete message reads:
DIPLOMATIC CODES
Table 20-15
1/3 Sample page WE029
ekf Lamentation
elf Language
emf Languid
enf Languidly
eof Languish
epf Languishing
eqr Lapse
erf Large
esf Largely
etf Lasting
euf Lastly
evf Late
exf Latent
eyf Latently
ezf Latin
faf Latitude
fbf Later
fcf Laugh
fdf Launch
fef Lavish
fff Lavishly
fgf Lawyer
fhf Lawful
fif Lawfully
fjf Lawfulness
fkf Lawless
flf Lawlessly
fmf Lawlessness
fnf Lax
fof Laxity
fpf Laxly
fqf Laxness
frf Lay
fsf Laziness
ftf Lazy
fuf Leader
fvf League
fxf Leak
fzf Lean
gaf Leap
gbf Learning
gcf Leave
gdf Lecture
gef Lecturer
gff Left
ggf Legal
ghf Legally
gif Legibility
Table 20-16
1866 11
1867
1868 38
1869 122
1870 6 184
1871 259 61
1872 3 189
1873 1
1874 17
1875 20
1876
Total 305 606
25 DECEMBER 1996
Revision 0
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 21
SUMMARY
PICS
WHEELS OR ROTORS
THE SQUIRREL-CAGE
LETTER ENCIPHERMENT
Plain : ZYXWVUTSRQPONMLKJIHGFEDCBA
Cipher: ABCDEFGHIJKLMNOPQRSTUVWXYZ
V W X Y Z
22 23 24 25 0
Rotor I : ABCDEFGHIJKLMNOPQRSTUVWXYZ
..xxx.x.x x...xx.xxxx..x.x
Rotor II : ABCDEFGHIJKLMNOPQRSTUVXYZ
.x.x.x..x.x....xxxx.xxxx.
Rotor IV : ABCDEFGHIJKLMNOPQRSTU
xx.x.x.x.xxx....x...x
Rotor V : ABCDEFGHIJKLMNOPQRS
..xxxx.x.x..x...xxx
Rotor VI : ABCDEFGHIJKLMNOPQ
x..xxxx...x...x.x
I II III IV V VI
|--2--| |-----1------|
8 9 4 1 6 2
1 2 3 4 5 6 7 8 9 10 11 12 13 14
--------------------------------------------
--- I . 8 . 8 . . . 8 8 . 8 8 8 8
2
--- II . 9 . 9 . . . . 9 9 9 9 . 9
---
III 4 . . 4 . . 4 4 4 4 . 4 . 4
IV . . . 1 . . . 1 1 1 . 1 . 1
1
--- V . . 6 . . . 6 6 6 . . 6 6 6
VI 2 2 . . . 2 . . . 2 . 2 2 .
Total 6 17 6 20 0 2 10 19 25 16 15 27 16 25
Key
15 16 17 18 19 20 21 22 23 24 25 26
---------------------------------------------
--- I . . 8 . 8 . . 8 8 8 . 8]
2
--- II 9 9 9 . . 9 . 9 . 9 .] .
---
III . 4 4 . 4 . 4 4 .] 4 . .
IV . 1 . 1 1 1 .] . . . 1 .
1
--- V 6 . 6 . 6 . . 6 . . . 6
VI . 2 2] 2 2 . . . 2 . . .
Total 14 16 26 3 21 10 4 24 10 19 1 14
Key
27 28 29 30
-------------
--- I . 8 . 8
2
--- II 9 . 9 .
---
III 4 . . 4
IV . . 1 1
1
--- V 6 6 . .
VI 2 . 2 2
Total 20 14 12 15
Key
MESSAGE ENCIPHERMENT
(1) First, the pins and lugs are set up according to the
key for the particular date. A slide is selected and
is set on the machine. An initial message rotor
alignment is chosen and recorded for future use. The
slide and the initial alignment will be incorporated
as indicator groups which are usually included with
the final cryptogram. These indicator groups are
usually not sent in the clear. The letter counter is
reset to a multiple of 5 and recorded; the knob is
set to "C" for cipher position.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0/26 Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
1/27 A Z Y X W V U T S R Q P O N M L K J I H G F E D C B
2 B A Z Y X W V U T S R Q P O N M L K J I H G F E D C
3 C B A Z Y X W V U T S R Q P O N M L K J I H G F E D
4 D C B A Z Y X W V U T S R Q P O N M L K J I H G F E
5 E D C B A Z Y X W V U T S R Q P O N M L K J I H G F
6 F E D C B A Z Y X W V U T S R Q P O N M L K J I H G
7 G F E D C B A Z Y X W V U T S R Q P O N M L K J I H
8 H G F E D C B A Z Y X W V U T S R Q P O N M L K J I
9 I H G F E D C B A Z Y X W V U T S R Q P O N M L K J
10 J I H G F E D C B A Z Y X W V U T S R Q P O N M L K
11 K J I H G F E D C B A Z Y X W V U T S R Q P O N M L
12 L K J I H G F E D C B A Z Y X W V U T S R Q P O N M
13 M L K J I H G F E D C B A Z Y X W V U T S R Q P O N
14 N M L K J I H G F E D C B A Z Y X W V U T S R Q P O
15 O N M L K J I H G F E D C B A Z Y X W V U T S R Q P
16 P O N M L K J I H G F E D C B A Z Y X W V U T S R Q
17 Q P O N M L K J I H G F E D C B A Z Y X W V U T S R
18 R Q P O N M L K J I H G F E D C B A Z Y X W V U T S
19 S R Q P O N M L K J I H G F E D C B A Z Y X W V U T
20 T S R Q P O N M L K J I H G F E D C B A Z Y X W V U
21 U T S R Q P O N M L K J I H G F E D C B A Z Y X W V
22 V U T S R Q P O N M L K J I H G F E D C B A Z Y X W
23 W V U T S R Q P O N M L K J I H G F E D C B A Z Y X
24 X W V U T S R Q P O N M L K J I H G F E D C B A Z Y
25 Y X W V U T S R Q P O N M L K J I H G F E D C B A Z
HELPZNEEDEDZONZHILLZSSIXZONEZZEROZZERO
A - 62 J - 1 S - 51
B - 8 K - 2 T - 77
C - 26 L - 31 U - 22
D - 35 M - 21 V - 13
E - 109 ** N - 67 W - 13
F - 24 O - 63 X - 4
G - 14 P - 22 Y - 16
H - 28 Q - 3 Z - 162 **
I - 62 R - 64
5 26 12 19 0 27 6 5 0 21 8 4 0 5 13
N V S Y I N G L L V G D H A N
R E T U R N Z T O Z B A S E Z
0 6 6 0 0 0 6 0 6 0 0 6 6 0 6 0 6 6 0 6
U L O M R H Y A X M U R O N F G X R M G
F U R N I S H Z I N F O R M A T I O N Z
S E N D Z M O R E Z S U P P L I E S Z Z
H D M W I N T I D I H N K S O Z D P A I
0 8 0 0 8 0 8 0 8 8 0 8 0 8 0 8 8 8 0 8
0 8 8 8 0 0 8 0 8 0 8 0 0 8 8 0 8] 0 8 8 8 0 0 8 0 8 ...
Y V X L M G A L U V C G X A N P F V Q R
W A C V N L H H P I B A W B A X G B K A
W Y Z C H D R W G H C T A P G A M H J S
W A Q A A.
cipher: W A Q A A
assumed plain : Z Z Z Z Z
resulting key : 22 0 16 0 0
ciphertext : Y V X L M G A L U V C G X A N P F V Q R
if key = 0 : B E C O N T Z O F E X T C Z M K U E J I
if key = 16 : R U S E D W P E V U N K S P C A K U Z Y
B E C O N T Z O F E X T C Z M K U E J I
R U S E D W P E V U N K S P C A K U Z Y
yields
B E C O N T O F E X T C M K U E I
R U S E D W E V U N K S C A K U Y
B E C O N T O F E X T C M K U E I
R U S E D W E V U N K S C A K U Y
or
2 0 2 0 2 2 0 2 0 2 0 2 2 0 2]2 0 2 0
0 3 0 3 3 0 0 3 0 3 3 3 0 0 3 0 3 0 3]
2 3 2 3 5 2 0 5 0 5 3 5 2 0 5 2 3 2 3
Given:
Begins "TO"
Q P G D V W V I J O K H T B K S G L X M
A N V F W W Z C A E L P O A T B O U F W
K M H V A R X L N R W Z E A G
plain : T O Z
cipher: Q P G
recovered key : 10 4 6
Q P G D V W V I J O K H T B K S G L X M A N V F
-----------------------------------------------
0: J K T W E D E R Q L P S G Y P H T O C N Z M E U
4: N O X A I H I V U P T W K C T L X S G R D Q I Y
6: P Q Z C K J K X W R V Y M E V N Z U I T F S K A
10: T U D G O N O B A V Z C Q I Z R D Y M X J W O E
W W Z C A E L P O A T B O U F W K M H V A R X L
-----------------------------------------------
0: D D A X Z V O K L Z G Y L F U D P N S E Z I C O
4: H H E B D Z S O P D K C P J Y H T R W I D M G S
6: J J G D F B U Q R F M E R L A J V T Y K F O I U
10: N N K H J F Y U V J Q I V P E N Z X C O J S M Y
N R W Z E A G
-------------
0: M I D A V Z T
4: Q M H E Z D X
6: S O J G B F Z
10: W S N K F J D
Cipher: Q P G D V W V I J O K H T B K S G L X M
Plain: T O Z G E N E R A L Z S M I T H Z S I X
Key: 10 4 6 10 0 10 0 0 10 0 10 0 6 10 4 0 6 4 6 10
Cipher: A N V F W W Z C A E L P O A T B O U F
Plain: Z W O U N D E D Z F O U R Z K I L L E
Key: 0 10 10 0 10 0 4 6 0 10 0 10 6 0 4 10 0 6 10
Cipher: W K M H V A R X L N R W Z E A G
Plain: D Z T W O Z M I S S I N G Z Z Z
Key: 0 10 6 4 10 0 4 6 4 6 0 10 6 4 0 6
Key: 10 4 6 10 0 10 0 0 10 0 10 0 6 10 4 0 6 4 6 10
Wheel 1: 6 0 6 6 0 6 0 0 6 0 6 0 6 6 0 0 6 0 6 6
Wheel 2: 4 4 0 4 0 4 0 0 4 0 4 0 0 4 4 0 0 4 0 4
Key: 0 10 10 0 10 0 4 6 0 10 0 10 6 0 4 10 0 6 10
Wheel 1: 0 6 6 0 6 0 0 6 0 6 0 6 6 0 0 6 0 6 6
Wheel 2: 0 4 4 0 4 0 4 0 0 4 0 4 0 0 4 4 0 0 4
Key: 0 10 6 4 10 0 4 6 4 6 0 10 6 4 0 6
Wheel 1: 0 6 6 0 6 0 0 6 0 6 0 6 6 0 0 6
Wheel 2: 0 4 0 4 4 0 4 0 4 0 0 4 0 4 0 0
Wheel 1: 6 0 6 6 0 6 0 0 6 0 6 0 6 6 0 0 6 0 6
Wheel 2: 4 4 0 4 0 4 0 0 4 0 4 0 0 4 4 0 0 4 0 4 0
OVERLAP
U B I M G Z V M H Z H O A H M L A T H Z
T V B I H H A R Q A I M R S Z P M S C F
L H H B Z N N B Q B G T S Q V T B H G H
plain : m e s s a g e Z - z z z z
cipher : U B I M G Z V M T B H G H
key : 7 6 1 5 7 6 0 12 - 1 7 6 7
plain : s i x t e e n z
cipher : H Z H O A H M L
key : 0 8 5 8 5 12 0 11
|-1-|
1 5 7
Plain : m e s s a g e z s i x t e e n z
Cipher : U B I M G Z V M H Z H O A H M L A T
Key : 7 6 1 5 7 6 0 12 0 8 5 8 5 12 0 11
----------------------------------------
Wheel 17: ]
Wheel 19:
Wheel 21:
----------------------------------------
1 2 3 4 5 6 7 8 9 10 . . . . 15 . . 18
H Z T V B I H H A R Q A I M R S Z P M S C F L
---------------------------------------------
Wheel 17: ]
Wheel 19: ] ]
Wheel 21: ]
----------------------------------------------
. 20. . . . 25. . . . 30. . . . . 35. . . 40 .
Z Z Z
H H B Z N N B Q B G T S Q V T B H G H
7 6 7
-------------------------------------
Wheel 17: ]
Wheel 19:
Wheel 21: ] ]
-------------------------------------
. . .45 . . . .50 . . . . 55 . . . . 60
(4) Since wheel length 19 having five lugs and the wheel
length 21 has seven lugs, wheel length 17 must
contain one lug.
Plain : m e s s a g e z s i x t e e n z
Cipher : U B I M G Z V M H Z H O A H M L A T
Key : 7 6 1 5 7 6 0 12 0 8 5 8 5 12 0 11
----------------------------------------
Wheel 17: 0 1 1 0 0 1 0 1 0 1 0 1 0 1 0 0 ]
Wheel 19: 0 5 0 5 0 5 0 5 0 0 5 0 5 5 0 5
Wheel 21: 7 0 0 0 7 0 0 7 0 7 0 7 0 7 0 7
----------------------------------------
1 2 3 4 5 6 7 8 9 10 . . . . 15 . . 18
H Z T V B I H H A R Q A I M R S Z P M S C F L
---------------------------------------------
Wheel 17: ]
Wheel 19: ] ]
Wheel 21: ]
---------------------------------------------
. 20. . . . 25. . . . 30. . . . . 35. . . 40.
Z Z Z
H H B Z N N B Q B G T S Q V T B H G H
7 6 7
--------------------------------------
Wheel 17: ] 0 1 0
Wheel 19: ]0 5 0
Wheel 21: ] 7 0 7
--------------------------------------
. . .45 . . . .50 . . . . 55 . . . .60
Plain : m e s s a g e z s i x t e e n z (a)(r)
Cipher : U B I M G Z V M H Z H O A H M L A T
Key : 7 6 1 5 7 6 0 12 0 8 5 8 5 12 0 11
----------------------------------------
Wheel 17: 0 1 1 0 0 1 0 1 0 1 0 1 0 1 0 0 ]0
Wheel 19: 0 5 0 5 0 5 0 5 0 0 5 0 5 5 0 5
Wheel 21: 7 0 0 0 7 0 0 7 0 7 0 7 0 7 0 7
----------------------------------------
1 2 3 4 5 6 7 8 9 10 . . . . 15 . . 18
(t)(i)(L)L E R Y Z F I R E Z S T I L L Z ? E A S
H Z T V B I H H A R Q A I M R S Z P M S C F L
---------------------------------------------
Wheel 17: 1 1 0 0 1 0 1 0 1 0 1 0 1 0 0 -]0 1 1 0 0 1 0
Wheel 19: ]0 5 0 5 0 5 0 5 0 0 5 0 5 5 0 5 ? ? ?]0 5 0
Wheel 21: ]7 0 0 0 7 0 0 7 0 7 0 7 0 7 0 7 ? 7 0 7
---------------------------------------------
. 20. . . . 25. . . . 30. . . . . 35. . . 40.
E Z E A S T Z O F Z R I V E R Z Z Z
H H B Z N N B Q B G T S Q V T B H G H
7 6 7
--------------------------------------
Wheel 17: 1 0 1 0 1 0 1 0 0 1]0 1 1 0 0 1 0 1 0
Wheel 19: 5 0 5 0 5 0 0 5 0 5 5 0 5 0 5 -]0 5 0
Wheel 21: -]7 0 0 0 7 0 0 7 0 7 0 7 0 7 0 7 0 7
--------------------------------------
. . .45 . . . .50 . . . . 55 . . . .60
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
N G A P Y Z A T P X H C I R F S P
B K M F J R M H J O F C N J E V V
O Q D M W E T Q P V Q T B Q I M L
G O M J H D A U G V I A X V N H K
W H O B E S V B I Q I E N I X A T
C H H R D R L G V M X X J N M G U
A B D V I H B R D M B N D R M F A
W X V I Z V O C F I M L X S Q O P
Q U X D K W V W I R R R A C L O W
A R P X B A T Y B D T Z J F A T R
X V D Z K I M O N N X Y P U R Z W
G L R C S B R M L W I T J F R O K
A X D K Q A S D H X U T W B W J N
Q A Y A F B H Q P D P S F G S H Q
H A O I D N J F G Z D T Y U D A J
F A R L Z P W L H N I Q I H I O Q
J N F C M G Q L D J C E O O P Y Q
R U P R L V V Q K Y D H J N S E Q
F Y X D L E V K J M Q O E B C O J
G M I T Y I P H P N O F C P N V I
A K U J R H X U M M O P B G N Y Z
X A P M X V F W G I C G N J I V X
A M E M Q W Y F B R H D A V E J E
R V S Y V A L W X S J L P R W A A
O L L L H P Y L V Y I L U K O B Z
M K U Y D H H J I D D Z T A Z T G
K Q H A R H L Q F Y E Y V T M H P
I Y W O J Q U M D S X L S B W K N
K I U L W K J Y H S N M N H I C J
N L M F D F J U R D Q S P Z Y J E
U N W L U G S M I D X Y D Y J L I
P V X I T S K B V D C D N M Y B C
P U N X R Z Q V Z B K Y L A J C X
R A B X V X F V D M J U Y U U A O
U E Q O U A G J R T Q D S D E D A
M K N P V L B V D P M Y H T A Q H
B Z V Y N B M V K B Y N M J L R I
T W Y E M R C A Q A I R O J T M B
P D I V J Q U A G L S V V L U O J
M W R L M W J D U U K I N O A M C
H P T N S E L L J E O L F K I O B
I G K R T R B J U S H U F A Y B B
A S D V J B V Y Q D Q E C J C A F
E K T Z M A H E I D D S H P C X B
G V H L M L D E G T M E Z L I B N
V P D N D.
MONOALPHABETS
1 2
2 4
3 8
4 16
5 32
6 64
Our key test is the Chi test, or cross product sum test
defined by Solomon Kullback. [KULL] As a refresher,
I will use the first two distributions:
A B C D E F G H I J K L M
-------------------------
Frequency Distribution #1 6 2 1 1 2 4 2 2 4 2 3
Frequency Distribution #1 5 1 1 1 2 2 1 5 3 2
-------------------------
30 2 1 8 4 2 10 6
N O P Q R S T U V W X Y Z
-------------------------
2 2 3 2 3 1 2 1 2 2
2 1 2 2 1 1 3 4 3 2 1 1
-------------------------
4 2 6 4 3 6 4 6 4
where:
N1 x N2 = 46 x 46 = 2116
Sum of cross-products =
30+2+1+8+4+2+10+6+4+2+6+4+3+6+4+6+4 = 102
We conclude that:
Class A Class B
1 3
2 4
6 5
7 10
8 11
14 12
16 15
17
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Na Ga Ab Pb Yb Za Aa Ta P Xb Hb Cb I Ra Fb Sa Pa
Ba Ka Mb Fb Jb Ra Ma Ha J Ob Fb Cb N Ja Eb Va Va
Oa Qa Db Mb Wb Ea Ta Qa P Vb Qb Tb B Qa Ib Ma La
Ga Oa Mb Jb Hb Da Aa Ua G Vb Ib Ab X Va Nb Ha Ka
Wa Ha Ob Bb Eb Sa Va Ba I Qb Ib Eb N Ia Xb Aa Ta
Ca Ha Hb Rb Db Ra La Ga V Mb Xb Xb J Na Mb Ga Ua
Aa Ba Db Vb Ib Ha Ba Ra D Mb Bb Nb D Ra Mb Fa Aa
Wa Xa Vb Ib Zb Va Oa Ca F Ib Mb Lb X Sa Qb Oa Pa
Qa Ua Xb Db Kb Wa Va Wa I Rb Rb Rb A Ca Lb Oa Wa
Aa Ra Pb Xb Bb Aa Ta Ya B Db Tb Zb J Fa Ab Ta Ra
Xa Va Db Zb Kb Ia Ma Oa N Nb Xb Yb P Ua Rb Za Wa
Ga La Rb Cb Sb Ba Ra Ma L Wb Ib Tb J Fa Rb Oa Ka
Aa Xa Db Kb Qb Aa Sa Da H Xb Ub Tb W Ba Wb Ja Na
Qa Aa Yb Ab Fb Ba Ha Qa P Db Pb Sb F Ga Sb Ha Qa
Ha Aa Ob Ib Db Na Ja Fa G Zb Db Tb Y Ua Db Aa Ja
Fa Aa Rb Lb Zb Pa Wa La H Nb Ib Qb I Ha Ib Oa Qa
Ja Na Fb Cb Mb Ga Qa La D Jb Cb Eb O Oa Pb Ya Qa
Ra Ua Pb Rb Lb Va Va Qa K Yb Db Hb J Na Sb Ea Qa
Fa Ya Xb Db Lb Ea Va Ka J Mb Qb Ob E Ba Cb Oa Ja
Ga Ma Ib Tb Yb Ia Pa Ha P Nb Ob Fb C Pa Nb Va Ia
Aa Ka Ub Jb Rb Ha Xa Ua M Mb Ob Pb B Ga Nb Ya Za
Xa Aa Pb Mb Xb Va Fa Wa G Ib Cb Gb N Ja Ib Va Xa
Aa Ma Eb Mb Qb Wa Ya Fa B Rb Hb Db A Va Eb Ja Ea
Ra Va Sb Yb Vb Aa La Wa X Sb Jb Lb P Ra Wb Aa Aa
Oa La Lb Lb Hb Pa Ya La V Yb Ib Lb U Ka Ob Ba Za
Ma Ka Ub Yb Db Ha Ha Ja I Db Db Zb T Aa Zb Ta Ga
Ka Qa Hb Ab Rb Ha La Qa F Yb Eb Yb V Ta Mb Ha Pa
Ia Ya Wb Ob Jb Qa Ua Ma D Sb Xb Lb S Ba Wb Ka Na
Ka Ia Ub Lb Wb Ka Ja Ya H Sb Nb Mb N Ha Ib Ca Ja
Na La Mb Fb Db Fa Ja Ua R Db Qb Sb P Za Yb Ja Ea
Ua Na Wb Lb Ub Ga Sa Ma I Db Xb Yb D Ya Jb La Ia
Pa Va Xb Ib Tb Sa Ka Ba V Db Cb Db N Ma Yb Ba Ca
Pa Ua Nb Xb Rb Za Qa Va Z Bb Kb Yb L Aa Jb Ca Xa
Ra Aa Bb Xb Vb Xa Fa Va D Mb Jb Ub Y Ua Ub Aa Oa
Ua Ea Qb Ob Ub Aa Ga Ja R Tb Qb Db S Da Eb Da Aa
Ma Ka Nb Pb Vb La Ba Va D Pb Mb Yb H Ta Ab Qa Ha
Ba Za Vb Yb Nb Ba Ma Va K Bb Yb Nb M Ja Lb Ra Ia
Ta Wa Yb Eb Mb Ra Ca Aa Q Ab Ib Rb O Ja Tb Ma Ba
Pa Da Ib Vb Jb Qa Ua Aa G Lb Sb Vb V La Ub Oa Ja
Ma Wa Rb Lb Mb Wa Ja Da U Ub Kb Ib N Oa Ab Ma Ca
Ha Pa Tb Nb Sb Ea La La J Eb Ob Lb F Ka Ib Oa Ba
Ia Ga Kb Rb Tb Ra Ba Ja U Sb Hb Ub F Aa Yb Ba Ba
Aa Sa Db Vb Jb Ba Va Ya Q Db Qb Eb C Ja Cb Aa Fa
Ea Ka Tb Zb Mb Aa Ha Ea I Db Db Sb H Pa Cb Xa Ba
Ga Va Hb Lb Mb La Da Ea G Tb Mb Eb Z La Ib Ba Na
Va Pa Db Nb Db.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Na Ga Ab Pb Yb Za Aa Ta P Xb Hb Cb I Ra Fb Sa Pa Ba Ka
Mb Fb Jb Ra Ma Ha J Ob Fb Cb N Ja Eb Va Va Oa Qa Db Mb
Wb Ea Ta Qa P Vb Qb Tb B Qa Ib Ma La Ga Oa Mb Jb Hb Da
Aa Ua G Vb Ib Ab X Va Nb Ha Ka Wa Ha Ob Bb Eb Sa Va Ba
I Qb Ib Eb N Ia Xb Aa Ta Ca Ha Hb Rb Db Ra La Ga V Mb
Xb Xb J Na Mb Ga Ua Aa Ba Db Vb Ib Ha Ba Ra D Mb Bb Nb
D Ra Mb Fa Aa Wa Xa Vb Ib Zb Va Oa Ca F Ib Mb Lb X Sa
Qb Oa Pa Qa Ua Xb Db Kb Wa Va Wa I Rb Rb Rb A Ca Lb Oa
Wa Aa Ra Pb Xb Bb Aa Ta Ya B Db Tb Zb J Fa Ab Ta Ra Xa
Va Db Zb Kb Ia Ma Oa N Nb Xb Yb P Ua Rb Za Wa Ga La Rb
Cb Sb Ba Ra Ma L Wb Ib Tb J Fa Rb Oa Ka Aa Xa Db Kb Qb
Aa Sa Da H Xb Ub Tb W Ba Wb Ja Na Qa Aa Yb Ab Fb Ba Ha
Qa P Db Pb Sb F Ga Sb Ha Qa Ha Aa Ob Ib Db Na Ja Fa G
Zb Db Tb Y Ua Db Aa Ja Fa Aa Rb Lb Zb Pa Wa La H Nb Ib
Qb I Ha Ib Oa Qa Ja Na Fb Cb Mb Ga Qa La D Jb Cb Eb O
Oa Pb Ya Qa Ra Ua Pb Rb Lb Va Va Qa K Yb Db Hb J Na Sb
Ea Qa Fa Ya Xb Db Lb Ea Va Ka J Mb Qb Ob E Ba Cb Oa Ja
Ga Ma Ib Tb Yb Ia Pa Ha P Nb Ob Fb C Pa Nb Va Ia Aa Ka
Ub Jb Rb Ha Xa Ua M Mb Ob Pb B Ga Nb Ya Za Xa Aa Pb Mb
Xb Va Fa Wa G Ib Cb Gb N Ja Ib Va Xa Aa Ma Eb Mb Qb Wa
Ya Fa B Rb Hb Db A Va Eb Ja Ea Ra Va Sb Yb Vb Aa La Wa
X Sb Jb Lb P Ra Wb Aa Aa Oa La Lb Lb Hb Pa Ya La V Yb
Ib Lb U Ka Ob Ba Za Ma Ka Ub Yb Db Ha Ha Ja I Db Db Zb
T Aa Zb Ta Ga Ka Qa Hb Ab Rb Ha La Qa F Yb Eb Yb V Ta
Mb Ha Pa Ia Ya Wb Ob Jb Qa Ua Ma D Sb Xb Lb S Ba Wb Ka
Na Ka Ia Ub Lb Wb Ka Ja Ya H Sb Nb Mb N Ha Ib Ca Ja Na
Na La Mb Fb Db Fa Ja Ua R Db Qb Sb P Za Yb Ja Ea Na Wb
Lb Ub Ga Sa Ma I Db Xb Yb D Ya Jb La Ia Pa Va Xb Ib Tb
Sa Ka Ba V Db Cb Db N Ma Yb Ba Ca Pa Ua Nb Xb Rb Za Qa
Va Z Bb Kb Yb L Aa Jb Ca Xa Ra Aa Bb Xb Vb Xa Fa Va D
Mb Jb Ub Y Ua Ub Aa Oa Ua Ea Qb Ob Ub Aa Ga Ja R Tb Qb
Db S Da Eb Da Aa Ma Ka Nb Pb Vb La Ba Va D Pb Mb Yb H
Ta Ab Qa Ha Ba Za Vb Yb Nb Ba Ma Va K Bb Yb Nb M Ja Lb
Ra Ia Ta Wa Yb Eb Mb Ra Ca Aa Q Ab Ib Rb O Ja Tb Ma Ba
Pa Da Ib Vb Jb Qa Ua Aa G Lb Sb Vb V La Ub Oa Ja Ma Wa
Rb Lb Mb Wa Ja Da U Ub Kb Ib N Oa Ab Ma Ca Ha Pa Tb Nb
Sb Ea La La J Eb Ob Lb F Ka Ib Oa Ba Ia Ga Kb Rb Tb Ra
Ba Ja U Sb Hb Ub F Aa Yb Ba Ba Aa Sa Db Vb Jb Ba Va Ya
Q Db Qb Eb C Ja Cb Aa Fa Ea Ka Tb Zb Mb Aa Ha Ea I Db
Db Sb H Pa Cb Xa Ba Ga Va Hb Lb Mb La Da Ea G Tb Mb Eb
Z La Ib Ba Na Va Pa Db Nb Db.
Class C Class D
1 3
2 4
5 9
6
7
8
10
LUGS
A = 0 5 4 9 + 3 8 7 12
B = 1 6 5 10 + 4 9 8 13
C = 0 5 4 9 + 1 6 5 10
D = 3 8 7 12 + 4 9 8 13
No. 1
J Y B T M H J J I E A I W I Z U Q I Y Q
E W A R N S A U Y Q D U L J M V O H B L
H K R M I L W G Z W F C V F Q F O T G K
F O Y G R P M Z I Z M J W Z T W I B C L
F X X E S M V S S A H F X X P B J D H R
A J B Q P.
No. 2
O E J I F E J J G J R M S U E P T E G B
N R Q X Q R P A Y U G Y A F R Y J E M M
M U A F M X T I M Q P W P H W P K J X J
F L H F D J R X P T J E Z G S R C G W K.
No. 3
W L O L G D J J I E E N R W T K F S Q D
F W Q G X D V Z L X W X F N K E H F V F
L U L C I V Y P O M X A F R J Y R M V J
N F X E K T K K O C W B Y G N J U H F E
H D B E W M S O U W W P C D G S R D W L
A Z E A A.
No. 1 - J Y B T M H
No. 2 - O E J I F E
No. 3 - W L O L G D
Wheel Length
26 25 23 21 19 17
-- -- -- -- -- --
A = 1 A = 1 A = 1 A = 1 A = 1 A = 1
B = 2 B = 2 B = 2 B = 2 B = 2 B = 2
C = 3 C = 3 C = 3 C = 3 C = 3 C = 3
D = 4 D = 4 D = 4 D = 4 D = 4 D = 4
E = 5 E = 5 E = 5 E = 5 E = 5 E = 5
F = 6 F = 6 F = 6 F = 6 F = 6 F = 6
G = 7 G = 7 G = 7 G = 7 G = 7 G = 7
H = 8 H = 8 H = 8 H = 8 H = 8 H = 8
I = 9 I = 9 I = 9 I = 9 I = 9 I = 9
J = 10 J = 10 J = 10 J = 10 J = 10 J = 10
K = 11 K = 11 K = 11 K = 11 K = 11 K = 11
L = 12 L = 12 L = 12 L = 12 L = 12 L = 12
M = 13 M = 13 M = 13 M = 13 M = 13 M = 13
N = 14 N = 14 N = 14 N = 14 N = 14 N = 14
O = 15 O = 15 O = 15 O = 15 O = 15 O = 15
P = 16 P = 16 P = 16 P = 16 P = 16 P = 16
Q = 17 Q = 17 Q = 17 Q = 17 Q = 17 Q = 17
R = 18 R = 18 R = 18 R = 18 R = 18
S = 19 S = 19 S = 19 S = 19 S = 19
T = 20 T = 20 T = 20 T = 20
U = 21 U = 21 U = 21 U = 21
V = 22 V = 22 V = 22
W = 23 X = 23 X = 23
X = 24 Y = 24
Y = 25 Z = 25
Z = 26
No. 1 - J Y B T M H = 10 24 2 20 13 8
No. 2 - O E J I F E = 15 5 10 9 6 5
No. 3 - W L O L G D = 23 12 15 12 7 4
No. 1
10 x 89705175 = 897051750
24 x 56787276 = 1362894624
2 x 92587950 = 185175900
20 x 82090450 = 1641809000
13 x 42697200 = 555063600
8 x 41755350 = 334042800
----------
4976037674
No. 2
15 x 89705175 = 1345577625
5 x 56787276 = 283936380
10 x 92587950 = 925879500
9 x 82090450 = 738814050
6 x 42697200 = 256183200
5 x 41755350 = 208776750
----------
3759167505
No. 3
23 x 89705175 = 2063219025
12 x 56787276 = 681447312
15 x 92587950 = 1388819250
12 x 82090450 = 985085400
7 x 42697200 = 298880400
4 x 41755350 = 167021400
----------
5584472787
(3)
No. 1
4976037674
---------- = 49 + 7151024 No. 1 = 7151024
101405850
No. 2
3759167505
---------- = 37 + 7151055 No. 2 = 7151055
101405850
No. 3
5584472787
---------- = 55 + 7151037 No. 3 = 7151037
101405850
Pos: 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
Key: 13 13 15 1* 0* 1* 21 8 17 18 10 15 20 17 10 18
No.1: A I W I Z U Q I Y Q E W A R N S A U Y Q D
m e s s a g e z z e r o z s t o
No. 3: E N R W T K F S
m e s s a g e z
-------------------------------------------------------------------
45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68
4 17 11 13 5 22 24 4
U L J M V O H B L H K R M I L W G Z W F C V F Q
t z y e t z r e
No. 2: R M S U E P T E G B N R Q X
m e s s a g e z
Q D F W Q G X D V Z L X W X F N K E H F V F L U
s t o p z i n z
-----------------------------------------------------------------------
69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
F O T G K F O Y G R P M Z I Z M J W Z T W I B C
Q R P A Y U G Y A F R Y J E M M M U A F M X T I
L C I V Y P O M X A F R J Y R M V J N F X E K T
*In the generated key a 0 might also be a 26; and a 1 might be a 27.
----------------------------------------------------------------------
93 94 95 96 97 98 99 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16
L F X X E S M V S S A H F X X P B J D H R A J B
M Q P W P H W P K J X J F L H F D J R X P T J E
K K O C W B Y G N J U H F E H D B E W M S O U W
-----------------------------------------------------------------------
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Q P.
Z G S R C G W K.
W P C D G S R D W L A Z E A A.
-----------------------------------------------------------------------
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
13 13 15 1 0 1 21 8 - - - - 0 17 18 10 15 20 17 10 18 10 11 23 1
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
21 6 12 17 0 25 4 17 11 13 5 22 24 4 25 10 11 17 10 20 5 17 8 20 13
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
10 6 12 15 5 22 12 14 17 11 12 13 14 20 6 15 8 19 7 17 10 15 15 9 22
76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
12 15 7 18 9 21 5 22 12 10 19 6 16 12 10 19 10 8 21 15 11 22 6 6 22
We look for the wheel with the most lugs. We start with
wheel 17 and write it out in length 17.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
--------------------------------------------------
13 13 15 1 0 1 21 8 - - - - 0 17 18 10 15
20 17 10 18 10 11 23 1 21 6 12 17 0 25 4 17 11
13 5 22 24 4 25 10 11 17 10 20 5 17 8 20 13 10
6 12 15 5 22 12 14 17 11 12 13 14 20 6 15 8 19
7 17 10 15 15 9 22 12 15 7 18 9 21 5 22 12 10
19 9 16 12 10 19 10 8 21 15 11 22 6 6 22 10 23
5 9 21 9 0 0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
-------------------------------------------------------
13 13 15 1 0 1 21 8 - - - - 0 17 18 10 15 20 17
10 18 10 11 23 1 21 6 12 17 0 25 4 17 11 13 5 22 24
4 25 10 11 17 10 20 5 17 8 20 13 10 6 12 15 5 22 12
14 17 11 12 13 14 20 6 15 8 19 7 17 10 15 15 9 22 12
15 7 18 9 21 5 22 12 10 19 9 16 12 10 19 10 8 21 15
11 22 6 6 22 10 23 5 9 21 9 0 0
- + - - + - + - + - - - + +
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
-------------------------------------------------------
13 13 15 1 26 1 21 8 - - - - 0 17 18 10 15 20 17
10 18 10 11 23 1 21 6 12 17 0 25 4 17 11 13 5 22 24
4 25 10 11 17 10 20 5 17 8 20 13 10 6 12 15 5 22 12
14 17 11 12 13 14 20 6 15 8 19 7 17 10 15 15 9 22 12
15 7 18 9 21 5 22 12 10 19 9 16 12 10 19 10 8 21 15
11 22 6 6 22 10 23 5 9 21 9 26 0
In a similar fashion, we do the other 4 wheels. We find that
wheel 17 contains no more than 5 lugs; wheel 19 contains
7 lugs - 14 of 19 pins are identified; wheel 21 contains
5 lugs; wheel 23 contains eight lugs with 17 pins identified;
wheel 25 contains 1 lug; wheel 26 contain s up to 5 lugs.
The final efforts are derived from the same layout of the
recovered key:
Key: 13 13 15 1 26 1 21 8 - - - - 0 17 18 10 15 20 17
-------------------------------------------------------
17: 0 0 0 0 ]
19: 0 7 0 0 7 0 7 0 0 7 0 0 0 7 7]
21: 0 0 0 0 0
23: 8 0 0 8 0 0 8 0 8 0 0 8 8 0 8 0
25: 1 0 1 0 0
26: 0 0 0
--------------------------------------------------------
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
and so forth for the balance of the recovered key. Not the
non-effective pins in position 8.
ENCIPHERED INDICATORS
Table 21 -2
Wheel 26
Letter Shown: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Internal Pin: P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Wheel 25
Letter Shown: A B C D E F G H I J K L M N O P Q R S T U V X Y Z
Internal Pin: O P Q R S T U V W X Y Z A B C D E F G H I J K M N
Wheel 23
Letter Shown: A B C D E F G H I J K L M N O P Q R S T U V X
Internal Pin: N O P Q R S T U V X A B C D E F G H I J K L M
Wheel 21
Letter Shown: A B C D E F G H I J K L M N O P Q R S T U
Internal Pin: M N O P Q R S T U A B C D E F G H I J K L
Wheel 19
Letter Shown: A B C D E F G H I J K L M N O P Q R S
Internal Pin: L M N O P Q R S A B C D E F G H I J K
Wheel 17
Letter Shown: A B C D E F G H I J K L M N O P Q
Internal Pin: K L M N O P Q A B C D E F G H I J
No. 1
B G K T D W Z V N P M R E V W W W R M G
T U K R G K B U E C J J I P R P V T K P
U T T I U N F G N U A F Z W U J R G A W
F O M B J B X Q S F I W V D W B S C G V
S E G R K A J B Y M E Q H G L U H P Y B
W E W X Q V D W W H V Q V G U U W V V N
L O A U A D W N H Y Q V V T V J Y L S T
X I N V K F P K T K T M L G Z L D A B W.
No. 2
B G K T D W Z V N P M R E G F W T X K T
L O H I F J V O B F V V Q V K X D E E G
R I R N G W F H R L V N Q T Z V Y R U X
T N U U P G M A T B S L G X X P D L M W
C Y J J H O L B K Z O U R H H T B W X G
V U S M F W N Q R Z C V M L T H K U N E
D V Z W J W M K V Z L U X Q N S N M W U
R T H U H N C A H P A Q L H I X C U B W.
Note that the first two letters and the last two letters
are the same. The lengths of the messages are the same.
The conclusion: the internal plaintext of the messages
is the same; and the generated key of the CSP 1500 could
well be the same.
Lets find out. From the point where the two messages
differ the next 20 letters may be put "in depth" as
follows:
Pos. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Key:
No. 1: V W W W R M G T U K R G K B U E C J J I
No. 2: G F W T X K T L O H I F J V O B F V V Q
Pos. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Key: 0
No. 1: V W W W R M G T U K R G K B U E C J J I
e
No. 2: G F W T X K T L O H I F J V O B F V V Q
t
Pos. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Key: 0 10 10 7 8 1 8 13 8 21 19 7 10 21 8 15 16 9 21 2
No. 1: V W W W R M G T U K R G K B U E C J J I
e n n k q o b t n k b a z t n k n z l t
No. 2: G F W T X K T L O H I F J V O B F V V Q
t e n n k q o b t n k b a z t n k n z l
Pos. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Key: 0 16 7 7 5 20 16 16 25 21 5 3 8 0 25 15 16 20 8 21
No. 1: V W W W R M G T U K R G K B U E C J J I
e t k k n h j w e k n w x y e k n k y m
No. 2: G F W T X K T L O H I F J V O B F V V Q
t k k n h j w e k n w x y e k n k y m e
e t k k n h j w e k n w x y e k n k y m
f u l l o i k x f l o x y z f l o l z n
g v m m p j l y g m p y z a g m p m a o
h w n n q k m z h n q z a b h n q n b p
i x o o r l n a i o r a b c i o r o c q
j y p p s m o b j p s b c d j p s p d r
k z q q t n p c k q t c d e k q t q e s
l a r r u o q d l r u d e f l r u r f t
m b s s v p r e m s v e f g m s v s g u
n c t t w q s f n t w f g h n t w t h v
o d u u x r t g o u x g h i o u x u i w
p e v v y s u h p v y h i j p v y v j x
q f w w z t v i q w z i j k q w z w k y
r g x x a u w j r x a j k l r x a x l z
s h y y b v x k s y b k l m s y b y m a
t i z z c w y l t z c l m n t z c z n b
u j a a d x z m u a d m n o u a d a o c
v k b b e y a n v b e n o p v b e b p d
w l c c f z b o w c f o p q w c f c q e
x m d d g a c p x d g p q r x d g d r f
y n e e h b d q y e h q r s y e h e s g
z o f f i c e r z f i r s t z f i f t h ***
a p g g j d f s a g j s t u a g j g u i
b q h h k e g t b h k t u v b h k h v j
c r i i l f h u c i l u v w c i l i w k
d s j j m g i v d j m v w x d j m j x l
Pos. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Key: 21 11 2 2 0 15 11 11 20 16 0 24 3 21 20 10 11 15 3 16
No. 1: V W W W R M G T U K R G K B U E C J J I
z o f f i c e r z f i r s t z f i f t h
No. 2: G F W T X K T L O H I F J V O B F V V Q
o f f i c e r z f i r s t z f i f t h z
*****************************************************
September 9, 1996
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 17
SUMMARY
Given:
o r i s
LYQQFN IJQQB
et t lame or ea environmental la
4. XOAJRH DOHU XFNIRA MPS GRNC RBQTSPBIRBHNF FNG
ABCDEFBGABHIJ
en or ement
RBMPSDRIRBH
a b c d e f g h i j k l m n o p q r s t u v w x y z
1.
2.
3. F I P L A W S C J Q M Y V N B K X
4. N X D A R M J T C F I B P S U H O Q G
5.
Figure 17-1.
.
. E R S U O P .
. K C D A N B X .
. L F M I T H .
. W G J .
.
Figure 17-2
I
J
U
X
T
K
O
Y
H
C
P
V
.
D
L
Y V Q W G J K C D A N B X Y V (13 LETTER CYCLE)
I T H E R S U O P L F M I T H (13 LETTER CYCLE)
J K C D A N B X Y V
P L F M I T H .
Q W G J K C D A N B X
E R S U O P
C D A N B X Y V
M
G
S
B
I
Figure 17-3
I J U X T K O Y H C P V Z D L Q E A F W R N M G S B
i j u x t k o y h c p v z d l q e a f w r n m g s b
O Y H C P V Z D L Q E A F W R N M G S B I J U X T K O Y
H C . .
Figure 17-4
i j u x t k o y h c p v z d l q e a f w r n m g s b
---------------------------------------------------
1. H C P V Z D L Q E A F W R N M G S B I J U X T K O Y
2. F W R N M G S B I J U X T K O Y H C P V Z D L Q E A
3. J U X T K O Y H C P V Z D L Q E A F W R N M G S B I
4. T K O Y H C P V Z D L Q E A F W R N M G S B I J U X
5. R N M G S B I J U X T K O Y H C P V Z D L Q E A F W
Figure 17-5
Note: The setting might read up the column, rather than
down, or be derived from plain-text alphabets under a
single cipher-text alphabet, rather than cipher-text
alphabets under a single plain-text alphabet.
-12 k d g j t o v m l q w u p c r s x h z f e b y a n i
-11 o l s u k y z g q e r x v p n b t c d w a i h f m j
-10 y q b x o h d s e a n t z v m i k p l r f j c w g u
-9 h e i t y c l b a f m k d z g j o v q n w u p r s x
-8 c a j k h p q i f w g o l d s u y z e m r x v n b t
-7 p f u o c v e j w r s y q l b x h d a g n t z m i k
-6 v w x y p z a u r n b h e q i t c l f s m k d g j o
-5 z r t h v d f x n m i c a r j k p q w b g o l s u y
-4 d n k c z l w t m g j p f a u o v e r i s y q b x h
-3 l m o p d q r k g s u v w f x y z a n j b h e i t c
-2 q g y v l e n o s b x z r w t h d f m u i c a j k p
-1 e s h z q a m y b i t d n r k c l w g x j p f u o v
Ref A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 f i p l a w s c j u o q g m y v e n b k x z r t h d
2 w j v q f r b p u x y e s g h z a m i o t d n k c l
3 r u z e w n i v x t h a b s c d f g j y k l m o p q
4 n x d a r m j z t k c f i b p l w s u h o q g y v e
5 m t l f n g u d k o p w j i v q r b x c y e s h z a
6 g k q w m s x l o y v r u j z e n i t p h a b c d f
7 s o e r g b t q y h z n x u d a m j k v c f i p l w
8 b y a n s i k e h c d m t x l f g u o z p w j v q r
9 i h f m b j o a c p l g k t q w s x y d v r u z e n
10 j c w g i u y f p v q s o k e r b t h l z n x d a m
11 u p r s j x h w v z e b y o a n i k c q d m t l f g
12 x v n b u t c r z d a i h y f m j o p e l g k q w s
13 t z m i x k p n d l f j c h w g u y v a q s o e r b
1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
Figure 17-6
3 r u z e w n i v x t h a b s c d f g j y k l m o p q
Ref A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-3 l m o p d q r k g s u v w f x y z a n j b h e i t c
-6 v w x y p z a u r n b h e q i t c l f s m k d g j o
1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
Figure 17-7
z e n i t h a b
c d f g j k l m
o p q r s u v w
x y
KEY =ZENITH
Figure 17-8
E D P Y T J S N F Q Z C O X I G R A L V H K U B M W
Figure 17-9
4 1 3 5 2 7 6 8
---------------
Z E N I T H A B
C D F G J K L M
O P Q R S U V W
X Y
Figure 17-10
There are at least two ways to find the hat. The method
illustrated in Figure 17-11 uses the alphabetic sequence
of each letter position in the hat and defines the
limits for each position. In the first text line of
Figure 17-11 the letter A could be at positions 1 and 2,
but not at the other position. Only position 3 could
have a letter as low as B, positions 4, 5 and 7 could
have letters as low as C, depending on the letter in
position, positions 7 and 8 could have letters as
low as D, depending on the values above. Likewise at
the high end, only positions 7 and 8 could have a letter
as high as Z etc.
4 1 3 5 2 7 6 8
C A B C A D C D
D B C D B E D E
E C D E C F E F
F D E F D G F G
G E F G E H G H
H F G H F I H I
I G H I G J I J
J H I J H K J K
K I J K I L K L
L J K L J M L M
M K L M K N M N
N L M N L O N O
O M N O M P O P
P N O P N Q P Q
Q O P Q O R Q R
R P Q R P S R S
S Q R S Q T S T
T R S T R U T U
U S T U S V U V
V T U V T W V W
W U V W U X W X
X V W X V Y X Y
Y W X Y W Z Y Z
Figure 17-11
M A G N A V O X Hat = MAGNAVOX
4 1 3 5 2 7 6 8
Z E N I T H A B Key = ZENITH
C D F G J K L M
O P Q R S U V M Setting =SHARP
X Y
e d p y t j s n f q z c o x I g r a l v h k u b m w
---------------------------------------------------
1. S N F Q Z C O X I G R A L V H K U B M W E D P Y T J
2. H K U B M W E D P Y T J S N F Q Z C O X I G R A L V
3. A L V H K U B M W E D P Y T J S N F Q Z C O X I G R
4. R A L V H K U B M W E D P Y T J S N F Q Z C O X I G
5. P Y T J S N F Q Z C O X I G R A L V H K U B M W E D
Figure 17-12
29gps
/0930/2
Translation:
P H Y S I
C A L E X
M N T O B
D F G K Q
R U V W Z
Encipherment
L O G A R
I T H M B
C D E F K
N P Q S U
V W X Y Z
CO ME QU IC KL YW EN EX ED HE LP
Plain Cipher
OP TW
IC CN
EX QG
Plain Cipher
YW ZX
ED FE
QU SN
Plain Cipher
CO DL
ME HF
KL CR
LP ON
1. It is a substitution cipher.
Peculiarities
PLAYFAIR CRYPTANALYSIS
EU SM FV DO VC PB FC GX DZ SQ DY BA AQ OB
ZD AC OC ZD ZC UQ HA FK MH KC WD QC MH DZ
BF NT BP OF HA SI KE QA KA NH EC WN HT CX
SU HZ CS RF QS CX DB SF SI KE FP (106)
K Q H H B . A . Q C
D O P . B . A F P
E Q K Z O A F V . C . X S X
W Z Z . D . O Z Y Z B
K K . E . U C
S R O B . F . V C K P
. G . X
N M M . H . A A T Z
S S . IJ.
F . K . C E A E
. L .
S . M . H H
W . N . T H
D . O . B C F
F B . P . B
U A S . Q . C A S
. R . F
Q C . S . M Q I U F I
H N . T .
S E . U . Q
F . V . C
. W . D N
C C G . X .
D . Y .
H D D . Z . D D C
Cipher GX DZ SQ DY BA AQ OB ZD AC
Plain .. ER ON ED AY EN TE RE ..
1 2 3 4 5
er = DZ on = SQ ed = DY ay = BA en = AQ
------ ------- ------ ------- -------
E D R Z O S N Q E D Y Y A B E A N Q
D S D A A
R E D N O S Y B N E A
Z Z R Q Q N Q Q N
6
te = OB
-------
T O E B
O
E T O
B B E
Combine 2 and 5: O N S Q E A
Arranged in a 5 X 5 square:
. . S T O
D Y A B E
. . . . .
. . N . Q
R . . . Z
----------
. . S T O| C
D Y A B E|
. . . . .|
. . N P Q|
R . . . Z| U V W X
C U S T O
D Y A B E
F G H I K
L M N P Q
R V W X Z
SERIATED PLAYFAIR
C O M E Q U E N E E D H M E D I A T
I C K L Y W (X)E L P I M E L Y T O M
L O G A R Cipher:
I T H M B N L B C S P Q Q C D C M H C F T R H
C D E F K C D F G X Z G C G Q T B F G W H G B
N P Q S U
V W X Y Z
we take the ciphertext off horizontally by the same
route by which the plain text was written in for
encipherment:
S2
------- = Q & R
S2 - S1
A B C D E F G H I K L etc.
3 4 8 9 10 25 2
24 7 16 27 19 30
36 15 31 21 34
17 32
20 35
26
ed = IB
-I = UD, sn = TU, de = BI, ST = TY, to =FN, I- =ES
1 2 3 4 5
SN = TU DE = BI ST = TY TO = FN I- = ES
------- ------- ------ ------- -------
S T N U D B E I S T Y T F O N I E - S
T B T F E
N S T E D B Y O T F - I E
U U N I I E N N O S S -
6 7
-I = UD ED = IB
------- -------
- U I D E I D B
U I
I - U D E I
D D I B B D
check:
TO=FN+ + = yes
SN=TU+
ST=TY+ letters left: A C E G H K
I-=ES -=t IT =ES L M P Q R V
DE=BI+ W X Z
ED=IB+
-I=UD+
1 2
.....................
A B C D E . G R D L U
F G H I K . E Y F N V
L M N O P . O A H P W
Q R S T U . M B I Q X
V W X Y Z . T C K S Z
.....................
L I C N V . A B C D E
O T D P W . F G H I K
G H E Q X . L M N O P
A M F S Y . Q R S T U
R B K U Z . V W X Y Z
.....................
4 3
Plain CO ME QU IC KL YW EN EE DH EL PX
Cipher LE WI XA FN EX CU DX UV DP GX HZ
Plain XF WX PO DY DG GN AH
Cipher SU PP LI ES AN DA MM
1. It is a substitution cipher.
2. It has an even number of letters.
3. Frequency count of 25 letters without J.
4. Doubled letters may occur eliminating a Playfair.
5. Long repeats occur at irregular intervals. Even
sequences are most frequent.
6. Few reversals in comparison to Playfair.
Cell Frequencies
1 2
.....................
A B C D E . 5 5 8 8 4
F G H I K . 2 1 4 5 2
L M N O P . 4 4 4 8 5
Q R S T U . 2 2 8 8 5
V W X Y Z . 1 1 1 2 1
.....................
4 5 8 5 5 . A B C D E
2 2 4 8 2 . F G H I K
4 2 4 8 5 . L M N O P
4 2 5 8 8 . Q R S T U
1 1 1 1 1 . V W X Y Z
.....................
4 3
High
Letter E T A O N I R S H
Normal frequency 13 9 8 8 7 7 7 6 6
Medium Low
L D C U P F M W Y B G V K Q X Z
4 4 3 3 3 3 2 2 2 1 1 1 0 0 0 0
Square 2 cell = A
Square 4 cell = B
4 4 4 4 4 2 2 2 2 2 1 1 1 1 1
A=31 33 32 23 15 25 41 21 42 54 22 55 53 51 52
B=31 41 23 33 11 22 32 42 21 25 54 51 55 53 52
UL RQ GW FO WQ CF PF FG EA GX LH DI OP MM LA LT
OF YQ CD HU GA LA FO EW EA VT YP QS UF WF RI CF
YQ QD LN QI WP YF OY MY AX FO WQ CF PF WF RC HQ
BT GW AQ SY QI WP GB BW HR WB EO EX GT LV PX OO
FO BQ HQ UM QS HE LT TM YM PN QI WP LB LO QO DP
SY BP QI YL LI MP DI OD NM UT ZH GT YM LQ HP HQ
QE IE XO MI.
5 E L G L E .A. X Q 2
3 L W G .B. T W Q P 4
1 R .C. F D F F 4
4 O O Q C .D. I P I 3
3 I Q H .E. A W A O X 5
10 W P C Y C W U O P C .F. O G O O O 5
1 F .G. W X A W B T T 7
2 Z L .H. U Q R Q E P Q 7
9 M D L Q Q Q Q R D .I. E 1
0 .K. 0
2 Y U .L. H A T A N V T B O I Q 11
6 Y N Y T U M .M. M Y P I 4
2 P L .N. M 1
8 X Q L F E F F F O. P F Y D D 5
9 H M B D W W W Y O P. F F X N 4
11H L H B A H W Y Y W R .Q. S D I I S I O I E 9
1 H .R. Q I C 3
2 Q Q .S. Y Y 2
7 G U L G B V L .T. M 1
1 H .U. L M F T 4
1 L .V. T 1
4 B G E G .W. Q F P Q F P B P 8
4 P E A G .X. O 1
4 S S M O .Y. Q P Q F M L M 7
0 .Z. H 1
100 100
FO WQ CF PE -2 FO-4 CF-3
QI WP -3 QI-4 HQ-3
WP-3
1st letter
L Q W G H Y E F O B C M P U D R A S I N T V X Z K
Frequency square #2
119 8 7 7 7 5 5 5 4 4 4 4 4 3 3 2 2 1 1 1 1 1 1 0
Normal
88 8 8 8 5 5 5 5 5 4 4 4 4 4 2 2 2 2 2 1 1 1 1 1
Frequency square #4
11109 9 8 7 6 5 4 4 4 4 3 3 2 2 2 2 1 1 1 1 1 0 0
2nd letter
Q F I P O T M A D W X Y B E H L N S C G R U V K Z
Plain CO NS OL ID AT ED
Cipher LH DI OP MM LA LT
* * *
1 2
.....................
A B C D E . - - - L -
F G H I K . - - - M -
L M N O P . O - D - -
Q R S T U . - - - - -
V W X Y Z . - - - - -
.....................
- - - M T . A B C D E
- - - - - . F G H I K
- - H P - . L M N O P
A - I - - . Q R S T U
- - - - - . V W X Y Z
.....................
4 3
Square #2 Square #4
Cell 14 24 31 43 15 24 33 34 41 43
Norm 8 5 4 8 5 8 4 8 4 5
Cipher L M O D T M H P A I
Freq. 11 4 5 3 7 6 2 9 5 9
Cipher Plaintext
LI ct
MP io
MI ht
DP on
Cipher QI WP LB LO QO DP SY BP QI YL LI MP DI OD NM
Plain ON CT IO NS
This might imply 'directions' or 'instructions'.
N P Q R S T U
1 4 9 3 2 1 4
1 2
.....................
A B C D E . - - - L -
F G H I K . - - - M -
L M N O P . O - D P W
Q R S T U . - - - Q -
V W X Y Z . - - - - -
.....................
- - - M T . A B C D E
- - - - - . F G H I K
- - H P - . L M N O P
A - I - - . Q R S T U
- - - - - . V W X Y Z
.....................
4 3
So:
Cipher QI WP LB LO QO DP SY BP QI YL LI MP DI OD NM
Plain ST OP DI TI ON ST CT IO NS
Cipher QI WP LB LO QO DP SY BP QI YL LI MP DI OD NM
Plain ST OP DI TI ON ST CT IO NS
ad al in ru
1 2
.....................
A B C D E . S - - L -
F G H I K . - - B M -
L M N O P . O - D P W
Q R S T U . - - F Q Y
V W X Y Z . - - - - Z
.....................
B - - M T . A B C D E
- - - - - . F G H I K
Y - H P - . L M N O P
A L I Q - . Q R S T U
- - K R - . V W X Y Z
.....................
4 3
Cipher FO WQ CF PF FG EA GX LH DI OP MM LA LT
Plain th ou co ns ol id at ed
'F' in 13 nd
'G' in 23 sh
probable th ou sa nd sh ar es co ns ol id at ed
1 2
.....................
A B C D E . S E G L U
F G H I K . T X B M V
L M N O P . O H D P W
Q R S T U . C A F Q Y
V W X Y Z . K N I R Z
.....................
B D F M T . A B C D E
U S G O V . F G H I K
Y E H P W . L M N O P
A L I Q X . Q R S T U
N C K R Z . V W X Y Z
.....................
4 3
Observations
1 2 3 4 5
1 M A N Y O
2 T H E R S
3 B C D F G
4 I K L P Q
5 U V W X Z
C O M E Q U I C K L Y W E N E E D H E L P
Row 3 1 1 2 4 5 2 3 4 4 1 5 2 1 2 2 3 2 2 4 4
Col 2 5 1 3 5 1 1 2 2 3 4 3 3 3 3 3 3 2 3 3 4
Step 2: Horizontal Transposition and Take Off
Step 3:
Find the cipher letters in the square using the new row
X column coordinates.
Plain C O M E Q U I
Row 3 1 1 2 4 5 4
Col 2 5 1 3 5 1 1
Cipher B A Q K U G M
31 = B; 12 = A; 45 = Q; 42 = K; 51= U; 35 = G; 11 =M
Row Column
C O M E Q U I C O M E Q U I
3 1 1 2 4 5 4 2 5 1 3 5 1 1
B A Q K U G M
We see that cipher 'B"' has the same row 3 as 'C' row
and 'B' column (1) has the same number as O row (1).
This reasoning holds for the second and third cipher
letters 'A' and 'Q'. The fourth cipher letter 'K' has
the same row (40 as plain 'I' and the same column number
(2) as plain 'C', which are the last and first letters
of the group. The fifth, sixth and seventh cipher
letters are derived the same way, except that we deal
with columns. The fifth cipher letter 'U', is the result
of 'U' row (5) and 'M' column (1).
Cipher Fractionated Br Bc Ar Ac Qr Qc Kr
Kc Ur Uc Gr Gc Mr Mc
--------------------
Plaintext Row 3 1 1 2 4 5 4
Plaintext Column 2 5 1 3 5 1 1
Plaintext C O M E Q U I
AB .. D A .. CD
AB .. DE AB . CD
For:
1 2 3 4 5
1 M A N Y O
2 T H E R S
3 B C D F G
4 I K L P Q
5 U V W X Z
Cipher Hr hc Ar Ac Hr
Hc Cr Cc Ar Ac
--------------
Plain H E A T H
*
Cipher Tr Tc Qr Qc Sr
Sc Wr Wc Er Ec
--------------
Plain S O L V E
* *
Odd Even
1 3 5 7 2 4 6
Plain H O M E I S A A H O M E I S
2 1 1 2 4 2 1 1 2 1 1 2 4 2
2 5 1 3 1 5 2 2 2 5 1 3 1 5
------------- -------------
Cipher T A K A U B V A M R H S N O
Odd Even
1 3 5 7 2 4 6
Plain G O H O M E N T H E H O M E
3 1 2 1 1 2 1 2 2 2 2 1 1 2
5 5 2 5 1 3 4 1 2 3 2 5 1 3
------------- -------------
Cipher B T A O V U F H H M A E S N
Odd Even
Period 5 T A . U M . S N
7 T A . . U M . . S N
9 T A . . . U M . . . S N
11 T A . . . . U M . . . . S N
Odd Even
3 letter repeats A . . . D U . . X
4 A B . . D U . . X Y
5 A B . . D E U V . X Y
6 A B C . D E U V . X Y Z
. . . . . . .
. E S C L V . Top Square
. N I D O W . Row used as
. T A F P X . Column
. H M G Q Y . Indicators
. U B K R Z .
. . . . . . . . . . . . .
. E S C L V . E N T H U .
Left Square . N I D O W . S I A M B . Basic Square
Column used . T A F P X . C D F G K . Normal
as row . H M G Q Y . L O P Q R . row and column
indicator . U B K R Z . V W X Y Z .
. . . . . . . . . . . . .
SrXc ScXr
Sr Or Lr Vr Er
Sc Oc Lc Vc Ec
--- ---- -
S O L V E
- --- ----
CHI-SQUARE
Period Chi-Square
5 19.2
7 19.4
9 28.0
11 12.0
55 / 9 = 6 plus 1
75 / 9 = 8 plus 3
F R I E N | V F D Y A | A H I A L |
N I L O S | A E M W D | L T N I B |
L V Y E Q | N T T I X | H I V I R |
Q A T P T | X L P N P | R T D Z K |
K L V N D | T I C W D | Z Z K L O |
D E A S B | D N H Y L | O E P E A |
R F S I V | Z R K R S | E O N X E |
V H I L T | S E N T W | E N C I T |
O I V R P | L E Y F Q | Z H I N I |
P M P E N | Q T L K H | I P K H T |
T L B D T | Z O T K T | L F T L R |
T T P B O | T D S B T | R I W Y I |
H K V D Z | I I
Z P X T F | I Z .
K L Vr and K L Or
Dc E A Pc E A
---------- ---------
D . . . .
P . . . .
. V O . .
. . . . .
. . . . .
Locations E S P I O N A G E
1-4 x x x
2-3 x x
5-7 x x
6-4 x x
9-3 x x x ***
10-4 x x
10-9 x x
12-1 x x
12-9 x x
Z K L O | R F
E P E A | V H
---------------------
E S P I O N A G E
* * *
3 half-naturals!
I R | K L V N
Z K | D E A S
--------------------
E S P I O N A G E
. - - - - - .
. H - - L - .
. P E R O - .
. I Z S V - .
. K N G A - . - - - D -
. . . . . . . . . . . . .
. - - R L I . E - Z N - .
. - - - - N . O L V - - . A - - - -
. - - V Z G . S R G - - .
. - E S O K . K I - - - . - P H - -
. - - - - - . - - - - - .
- - - - - - D - - -
- - - P D
- - - - H
- - - - A
Y D Q C X .
. H T F L M .
. P E R O U . Master
. I Z S V B . Spy
. K N G A W .
. . . . . . . . . . . . .
. W T R L I . E T Z N D .
. B C H F N . O L V C A .
. U Y V Z G . S R G F Q .
. X E S O K . K I Y H P .
. M Q A P D . X W U B M .
C A L V O
B M W U X
N D T Z E
F Q R G S
H P I Y K
from:
C O U N T E R S P Y
A B - D - F G H I K
L M - - - Q - - - -
V W X - Z
F R I E N|V F D Y A|A H I A L
N I L O S|A E M W D|L T N I B
----------------------------------------------------
f o r n i n e y e a r s a d m i r a l w i l h i l m c
L V Y E Q|N T T I X|H I V I R
Q A T P T|X L P N P|R T D Z K
-----------------------------------------------------
a n a r i s d i r e c t e d t h e m i l i t a r y e s
K L V N D|T I C W D|Z Z K L O
D E A S B|D N H Y L|O E P E A
-----------------------------------------------------
p i o n a g e a n d t h e c o u n t e r e s p i o n a
R F S I V|Z R K R S|E O N X E
V H I L T|S E N T W|E N C I T
-----------------------------------------------------
g e f o r h i t l e r s t h i r d r e i c h n o w i t
O I V R P|L E Y F Q|Z H I N I
P M P E N|Q T L K H|I P K H T
-----------------------------------------------------
a p p e a r s t h a t t h e s s o f t g p o k e n l i
T L B D T|Z O T K T|L F T L R
T T P B O|T D S B T|R I W Y I
-----------------------------------------------------
t t l e m a n b e t r a y e d h i t l e r a t e v e r
H K V D Z|I I
Z P X T F|I Z
-----------------------
y o p p o r t u n i t y
1 2 3 4 5
1 B I F D A
2 L P H E T
3 C G K M N
4 O Q R S U
5 V W X Y Z
r=2
-----------------------------------------------------
Row 1 2 3 4 5
Col 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
B I F D A L P H E T C G K M N O Q R S U V W X Y Z
-----------------------------------------------------
P = 25
In the case of the Trifid, the block takes the same form
with an additional dimension.
r=3
-------------------------------------------------------
1 1 2 3
2 1 2 3 1 2 3 1 2 3
3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3
T R I F D A L P H B E C G J K M N O Q S U V W X Y Z #
-------------------------------------------------------
P = 27
2nd Comp
1 1 1 2 2 2 3 3 3
-----------------
1 T R I F D A L P H
1st Comp 2 B E C G J K M N O
3 Q S U V W X Y Z #
-----------------
1 2 3 1 2 3 1 2 3
3rd Comp
Comp
| T R I F D A L P H B E C G J K M N O Q S U V W X Y Z #
| -----------------------------------------------------
1|1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3
2|1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3
3|1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3
------------------------------------------------------
1 2 3 4 5 6 7 8 9 10
-------------------
C O U N T E R S P Y
A B D F G H I J K L
M Q V W X Z #
-------------------
Deciphering Table
C A M O B Q U D V N F W T G X E H Z R I # S J P K Y L
-----------------------------------------------------
|1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3|
|1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3|
|1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3|
------------------------------------------------------
Enciphering Table
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #
-----------------------------------------------------
|1 1 1 1 2 2 2 2 3 3 3 3 1 2 1 3 1 3 3 2 1 1 2 2 3 2 3|
|1 2 1 3 3 1 2 3 1 2 3 3 1 1 2 2 2 1 2 2 3 3 1 2 3 3 1|
|2 2 1 2 1 2 2 2 2 2 1 3 3 1 1 3 3 1 1 1 1 3 3 3 2 3 3|
------------------------------------------------------
Method of Encipherment
Plain C O M E Q U I C K L|Y I N E E D H E L P
-------------------|-------------------
1 1 1.2 1 1.3 1 3.3|3 3 2.2 2 1.2 2 3.3
1 2.1 3 2.3 1 1.3 3|3 1.1 3 3.3 3 3.3 2
1.1 3 1.3 1 2.1 1 3|2.2 1 1.1 2 2.1 3 3
---------------------------------------
Cipher C N # I D R K U I M|Y T X K V L J N B V
Decipherment
6 letters A D . . C . . B . .
5 letters A . . . C . . B . .
4 letters A . . . . . . B . .
Letter 12: S I # B # # T U P
Letter 41: S I M K # I R U X
* * * *
T1 H1 E1 F1 I1 R1 S1 T1 . .
T2 H2 E2 F2 I2 R2 S2 T2 . .
T3 H3 E3 F3 I3 R3 S3 T3 . .
H1 H2 H3 R1 R2 R3 N1 N2 . .
G2 G3 Q1 Q2 Q3 S1 S2 S3 . .
S3 X1 X2 X3 D1 D2 D3 I1 . .
. . K3 V1 V2 V3 R1 R2 R3 Q1
. . O1 O2 O3 T1 T2 T3 U1 U2
. . I2 I3 L1 L2 L3 R1 R2 R3
(a) T1 H1 K3 N2 Q1 Q2 F2 E2 O3 H2 V1 G3 O2
(b) T2 G2 O1 S3 U2 Q3 I2 T3 I1 R3 R2 R1 D2 S1 D3
N1 F1 V3
(c) H3 X1 I3 E1 V2 D1 L3
(d) E3 X2 L1
(e) F3 X3 L2
(f) S2 U1
Enciphering Table
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #
------------------------------------------------------
2 1 2 2 2 1 2 2 1 1
2 1 1 2 1 2 1 1 1 2 2 2
2 1 1 1 2 2 2 2 2
------------------------------------------------------
Enciphering Table
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #
------------------------------------------------------
3 3 2 1 2 2 2 1 2 2 1 3 1 3
2 1 1 2 1 2 1 1 1 2 3 2 2 3
2 1 3 3 1 3 1 2 2 2 2 2
------------------------------------------------------
Q H T V O R I S D
-----------------------------------------------------
|1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3|
|1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3|
|1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3|
------------------------------------------------------
? G F F G E E E G
N N U U
L = 123 E = 311
F = 212 U = 323
N = 213 X = 3?2
Deciphering Table
Q H T L V O F N R I S E D U
-----------------------------------------------------
|1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3|
|1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3|
|1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3|
------------------------------------------------------
? G G X G X
Enciphering Table
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #
------------------------------------------------------
3 3 2 1 2 1 2 2 1 2 2 1 3 1 3
2 1 1 2 1 2 2 1 1 1 2 3 2 2 3
2 1 2 1 3 3 1 3 3 1 2 2 2 2 3 2 2
------------------------------------------------------
Deciphering Table
Z Q H Y T L B V W O F N # R I K S J E X P G D U M C A
-----------------------------------------------------
|1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3|
|1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3 1 1 1 2 2 2 3 3 3|
|1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3|
------------------------------------------------------
? G G X G X
Enciphering Table
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #
------------------------------------------------------
3 1 3 3 3 2 3 1 2 2 2 1 3 2 2 3 1 2 2 1 3 1 1 3 1 1 2
3 3 3 2 1 1 2 1 2 3 3 2 3 1 1 1 1 2 3 2 2 3 3 1 2 1 2
3 1 2 2 1 2 1 3 3 3 1 3 1 3 1 3 2 2 2 2 3 2 3 2 1 1 1
------------------------------------------------------
Keyword Recovery
A C M U D G P X E J S K I R # N F O W V B L T Y H Q Z
we see:
V -- W -- X -- Z
F G B C H I
O P and L M and Q R
W X T U Z #
which yields:
V A N D Y K
B C F G H I
L M O P Q R
T U W X Z #
and finally;
6 1 5 2 7 4 3
V A N D Y K E
B C F G H I J
L M O P Q R S
T U W X Z #
2. Nihilist transposition.
3. Incomplete columnar
4. Myszkowski. Battlefield.
5. Amsco.
6. Tramp.
7. Cadenus.
8. Railfence.
UB XB MS SF SQ MS TH DE UB HM GL NL BW GB LW NQ NF UB FM
QH EM BW BI GT LD UQ IG WM CF TQ ET CT NF IP LS UQ FK UH
IZ UQ YF TN XP NS FF UV HV NF HI CE NQ UO UQ GK ET HT ND
PV BI BE ND BD YM DE LX UB GA CX ET XT DE PE NL BF PY IQ
NG QW IS NC CK XB TF GK ED LA EL LE RW MI EX SF MS UP XQ
NF EV FF BI KK NA MX.
17-4 Short Bifid. Clue - DIAMONDS is there somewhere and
the text talks about them being HIDDEN. Period = 7.
For some time now, Dr. Michael Anshel of CCNY and I have been
following the development of crypto from some early roots.
Here are short excerpts from our correspondence. Jump in if
you can help us:
==============================================================
===========================================================
In RE WALLIS:
In RE DIOPHANTINE EQUATIONS:
I did find some interesting references on this subject in my
library.
=========================================
DIOPHANTUS
FERMAT
WALLIS
BARROW
ROSSIGNOL
REFERENCES
============================================================
===============================================================
COPYRIGHT 1996
ALL RIGHTS RESERVED
LECTURE 16
TRANSPOSITION
SUMMARY
a) Simple Horizontal:
b) Simple Vertical:
c) Alternate Horizontal:
d) Alternate Vertical:
e) Simple Diagonal:
f) Alternate Diagonal:
h) Spiral, Counterclockwise:
1 2 3 4 5 6 7 8
1 A T R T R E M A
2 F U E D D B R O
3 O E N S U I W T
4 N U I S N T H E
5 H G D E G R D G
6 H E B N E E R R
7 T E I E V E T U
8 A R F I E S E N
A T F O U
R T E E N H
U N D R E D S
I G H T E D S U
B M A R I N E M P
A T F O U R
E T
E D S I G
E H
B M A R
N T
C M I
H E
P N
U D
E
N S
D U
B
The cryptograms resulting from figure (a) taken off
according to an alternate vertical route is:
NUMERICAL KEYS
A M E R I C A N
1 6 4 8 5 3 2 7
7 2 4 5 3 6 1 7 2 4 5 3 6 1 7 2 4 5
R E P O R T N O O N P O S I T I O N
Words Reversed:
E G D I R B D E Y O R T S E D T A N E V E L E M P
E G D I R B D E Y O R T S E D T A N E V E L E M P
Columnar by Bigraph:
or
B S B R
R T I D
I R G E
D O D E
G Y S T
E E R O
D D Y E
E D
Cipher Text:
B S R T I R D O G Y E E D D E , or
B I G D S R Y D R D E E T O E
Digraphs Reversed :
P E A E O E U D R A
R P R T G T N E W Y
Example:
T T O
A E N F A ( improbable)
O M T
T A O
H M N H ( good plain text)
E E
TABLE 16 - 1
Total Length of Cipher versus Various Peaks plus extra
Letters of Rails from 2-10
3 5 7 9 11 13 15 17 19 21 23 25 27 29
2 2 3 4 5 6 7 8 9 10 11 12 13 14 15
3 2 .. 3 .. 4 .. 5 .. 6 .. 7 .. 8
4 2 .. .. 3 .. .. 4 .. .. 5 .. ..
5 2 .. .. .. 3 .. .. .. 4 .. ..
6 2 .. .. .. .. 3 .. .. .. ..
7 2 .. .. .. .. .. 3 .. ..
8 2 .. .. .. .. .. .. 3
9 2 .. .. .. .. .. ..
10 2 .. .. .. .. ..
31 33 35 37 39 41 43 45 47 49 51 53 55
2 16 17 18 19 20 21 22 23 24 25 26 27 28
3 .. 9 .. 10 .. 11 .. 12 .. 13 .. 14 ..
4 6 .. .. 7 .. .. 8 .. .. 9 .. .. 10
5 .. 5 .. .. .. 6 .. .. .. 7 .. .. ..
6 4 .. .. .. .. 5 .. .. .. .. 6 .. ..
7 .. .. .. 4 .. .. .. .. .. 5 .. .. ..
8 .. .. .. .. .. .. 4 .. .. .. .. .. ..
9 .. 3 .. .. .. .. .. .. .. 4 .. .. ..
10 .. .. .. 3 .. .. .. .. .. .. .. .. 4
57 59 61 63 65 67 69 71 73 75 77 79 81
2 29 30 31 32 33 34 35 36 37 38 39 40 41
3 15 .. 16 .. 17 .. 18 .. 19 .. 20 .. 21
4 .. .. 11 .. .. 12 .. .. 13 .. .. 14 ..
5 8 .. .. .. 9 .. .. .. 10 .. .. .. 11
6 .. .. 7 .. .. .. .. 8 .. .. .. .. 9
7 .. .. 6 .. .. .. .. .. 7 .. .. .. ..
8 5 .. .. .. .. .. .. 6 .. .. .. .. ..
9 .. .. .. .. 5 .. .. .. .. .. .. .. 6
10 .. .. .. .. .. .. .. .. 5 .. .. .. ..
REDEFENCE
2 T L G E
4 H R Y D E H W
1 E A B R T T O M
3 E I S R
R R G N W
P -|- E A -|- E O -|- E U -|- D R -|- A
P T T E Y
HEDGES
R O E P E W R U Y
P T D E G R A T A E N
Cryptogram:
DIAMOND
1
2 3 4
5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23 24 25
26 27 28 29 30 31 32 33 34 35 36
37 38 39 40 41 42 43 44 45 46 47 48 49
50 51 52 53 54 55 56 57 58 59 60
61 62 63 64 65 66 67 68 69
70 71 72 73 74 75 76
77 78 79 80 81
82 83 84
85
Note the flow of the message and hints along the way.
The word separators, the clear text leads you into the
next word. The size of the words is known and might be
guessed.
J. E. Johnston.
Encipherment
810 4 5 1 7 9 3 6 2
S U M M E R T I M E
810 4 5 1 7 9 3 6 2
S U M M E R T I M E
---------------------
| N E E D S U P P L I |
| E S A T O N C E S T |
| O P R E Q U E S T R |
| E P L Y I M M E D I |
| A T E L Y|----------|
----------
Key length
*-------10--------*
810 4 5 1 7 9 3 6 2
S U M M E R T I M E
---------------------
Length of * | N E E D S U P P L I | *
long | | E S A T O N C E S T | | Length of short
column is | | O P R E Q U E S T R | | column = 4
5 | | E P L Y I M M E D I | *
* | A T E L Y|----------|
---------- * - - - *
* - - - * Number of short
Number of columns is 5
long columns
is 5
Note that the original plain text has not been changed
but merely rearranged or transposed by a numerical key.
Decipherment
_7_
13|96
91
--
5
Key length is 13
T T D T I T I I I H N N O B T E R N O O I G S R Y
S V I A A X N A F N A S M M R I E.
and,
A - A X F S X - N
B - T Y - S
C - Z -
D - T
E - R
F - N
G - S
H - N
I - T I I H G A E
J -
K -
L -
M - M R
N - N O O A A
O - B O I
P -
Q -
R - N Y I
S - R V M
T - T D I I E
U -
V - I
W -
T R A N S M HITS
-----------
R A N S M I 1
A N S M I T 2
N S M I T I 0
S M I T I N 0
M I T I N F 1
I T I N F O 2
T I N F O R 3
I N F O R M 6
N F O R M A 1
F O R M A T 0
O R M A T I 1
R M A T I O 1
M A T I O N 0
T R A N S M I T
-----------
I N F O R M A T
-----------
I O N
2 4
-----------------
| T R A N S M I T |
| I N F O R M A T |
| I O N |
| I O |
| H I |
| N G ------------
-----|
2 4
TTDTI TIIIH NNOBT ERNOO IGSRY SVIAA XNAFN
ASMMR IE.
2 4 7 3 5 8 6 1
-----------------
| T R A N S M I T |
| I N F O R M A T |
| I O N B Y R A D |
| I O A T S I X T |
| H I S E V E N I |
| N G ------------
-----|
Plain reads:
or in shorthand 64 = 4 - 7's
6 - 6's
Check: 4 x 7 =28 + 6 x 6 = 36 = 64
1 2 3 4 5 6 7 8 9 10
E F E O
I S E S L F S N N E
P S R C H T A U P L
E E T L E E O L T Y
I T J N D E I P A V
E O R T G E T V D L
U D O P R E S O A T
*-4-- * * ----6---*
long short
_______
E F E O|__________A
I S E S L F S N N E
P S R C H T A U P L
E E T L E E O L T Y
I T J N D E I P A V
E O R T G E T V D_L
U D O P R E S O A T
_______ V
E F E O|________O_A
I S E S L F S N N E
P S R C H T A U P L
E E T L E E O L T Y
I T J N D E I P_A V
E O R T G E T V D_L
U D O P R E S O A T
E
E I
_______ E T V
E F E O|____E_S_O_A
I S E S L F S N N E
P S R C H T_A U P L
E E T L E E O_L T Y
I T J N D E I P_A V
E O R T G E T V D_L
U D O P R E S O A T
E E
D E I
_______ G E T V
E F E O|__R_E_S_O_A
I S E S L F S N N E
P S R C H_T_A U P L
E E T L E E O_L T Y
I T J N D E I P_A V
E O R T G E T V D_L
U D O P R E S O A T
1 2 3 4 5 6 7 8 9 10
J L E E
O R N D E I
__U_D_O T G E T V
E F E O|P_R_E_S_O_A
I S E S L F S N N E
P S R C_H_T_A U P L
E E T_L E E O_L T Y
I T_J N D E I P_A V
E_O R T G E T V D_L
U D O P R E S O A T
A - H Q N - T I E I N F
B - I S E O - R W L E E
C - O P -
D - R Q - Q
E - E H E O B E C T E S E L O R R - U E N L
F - R S - R N
G - T - E M A T D
H - V B E U - A
I - E E N V - H N
J - W - V
K - X -
L - O O N Y -
M - T Z - T
Q U E E N HITS
---------
1 U E E N E 2
2 E E N E L 1
3 E N E L I 3
4 N E L I Z 1
5 E L I Z A 0
6 L I Z A B 0
7 I Z A B E 2
8 Z A B E T 5 KEY LENGTH =8
9 A B E T H 2
Q U E E N E L I
Z A B E T H
1 2 3 4 5 6 7 8
C M
E O T R
_B_O_W_A_N E
* B S R V Q I_L_R
I R E N Z E O L *
long | E U B T T E L N |
column 8 E A E E T S O I 7 short
= 8 | H H E_T_D_N E N | column = 7
V E_C M R E_O N
H_E O T N E E_F
* B O W A I L R R *
*---5---* *-3-*
long short
Step 3: Juxtapose the known plain text with the hat
diagram information and rearrange the columns.
5 2
M B
T S
A R
Q U E E N E L I
Z A B E T H
T H
T E
D E
R O
N
I
5 2 3 6 4 1 7 8
C
M B E R O B E R
T S O N W I L L
A R R I V E O N
Q U E E N E L I
Z A B E T H O N
T H E S E V E N
T E E N T H O F
D E C E M B E R
R O O E T R
N W L A
I
5 2 3 6 4 1 7 8
C
M B E*R O B E R
T S O N W I L L
A R R I V E O N
Q U E E N E L I
Z A B E T H O N
T H E S E V E N
T E E N T H O F
D E C E M B E R*
R O O E T R
N W L A
I
5 2 3 6 4 1 7 8
_______________
R O B E R T S O
N W I L L A R R
I V E O N Q U E
E N E L I Z A B
E T H O N T H E
S E V E N T E E
N T H O F_D_E_C
E_M_B_E_R
Column Matching:
KEY LENGTH = 6
1 2 3 4 5 6
G R E E M E
L P N Y C A
L I N W S L
E R B P E P
F D A E R O
P E R H T O
L B S I S E
U C E A V A
O N T O I F
T L H L I W
H G O I E T
E E T R H X
Anagraming
1
G
L
L
E
F
P
L
U
O
T
H
E
VW VW VW VW VW
12 13 14 15 16
GR 2 GE 2 GE 2 GM 0 GE 2
LP 0 LN 0 LY 3 LC 0 LA 2
LI 2 LN 0 LW 0 LS 1 LL 2
ER 2 EB 0 EP 1 EE 0 EP 1
FD 0 FA 1 FE 1 FR 1 FO 2
PE 2 PR 2 PH 1 PT 1 PO 2
LB 0 LS 1 LI 2 LS 1 LE 3
UC 1 UE 1 UA 1 UV 0 UA 1
ON 3 OT 2 OO 1 OI 1 OF 3
TL 0 TH 4 TL 0 TI 3 TW 1
HG 0 HO 2 HI 2 HE 4 HT 1
EE 0 ET 0 ER 2 EH 0 EX 3
--- --- --- --- ---
12 15 16 12 23
where: VW = validity weight for individual bigrams and
total column validity weight.
2 1 6
R G E
P L A
I L L
R E P
D F O
E P O
B L E
C U A
N O F
L T W
G H T
E E X
FIGURE 16-2
LETTER CONTACT WEIGHT CHART
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A 2 2 1 1 1 1 1 1 2 1 3 2 2 2 2 2 1 1 1
B 1 1 4 1 2 1 1 2 1
C 2 2 2 1 2 1 2 1 1 1
D 2 1 2 1 2 1 1 1 1 1 1
E 2 1 2 1 1 1 1 2 1 2 2 2 1 1 3
F 1 1 1 1 1 2 1 1 1
G 1 2 2 1 1 2 2 1
H 3 4 2 2 1
I 1 1 2 1 1 2 1 2 2 1 3 2 1 2 2 2 2
J 1 1 2 1
K 1 3 2 1 1 1 1
L 2 2 3 2 1 2 2 1 1 1 3
M 3 1 3 2 1 2 1 1
N 1 1 2 1 2 1 1 1 1 1 1 2 1 1 1 1
O 1 1 1 1 3 1 1 2 1 2 3 1 2 2 1 2 3 2 2 1
P 2 2 1 1 2 2 2 1 1
Q 5
R 1 1 2 1 1 1 1 1 1 1 1 1
S 2 2 2 2 1 1 1 1 2 2 1 1 3 2 1
T 2 2 4 3 3 1 1 2 2 1
U 1 1 1 1 1 1 1 1 2 1 2 2 2
V 2 4 2 2
W 2 2 3 2 1
X 1 1 1 1 1 1 1
Y 1 1 2
Z 3 2
Key-Length = unknown
Number of Mean
(7 x 8) Vowels Difference
1 2 3 4 5 6 7
U R F U O P S 3 0.2
R V Z M L E L 1 1.8
I A S A T Y E 5 2.2
R T S H C L R 0 2.8
T E I K W O E 4 1.2
P P T I V R T 1 1.8
E I L E A A O 6 3.2
G A F C W E M 2 0.8
--- ----
22 14.0 / 8 = 1.80
Number of Mean
(14 X 4) Vowels Difference
1 2 3 4 5 6 7 8 9 1011121314
U T R E F I U K O W P O S E 7 1.5
R P V P Z T M I L V E R L T 2 3.5
I E A I S L A E T A Y A E O 11 5.5
R G T A S F H C C W L E R M 2 3.5
--- ----
22 14.0
Expected Mean = 22/4 = 5.5
Validity Value= 14/4 = 3.50
Number of Mean
(8 X 7) Vowels Difference
1 2 3 4 5 6 7 8
U G I T K C Y L 3 .1
R R A L I W L E 3 .1
I V F F E V O R 3 .1
R A Z U C A R E 4 .9
T T S M O W A T 2 1.1
P E S A L P E O 4 .9
E P I H T E S M 3 .1
--- ---
22 3.3
-------
E A P O
P H E M 4 .9
--- ---
22 7.1
14 3.5
8 0.47
7 1.80
4 1.01
(8 X 7)
* * * * *
1 2 3 4 5 6 7 8
U G I T K C Y L
R R A L I W L E
I V F F E V O R
R A Z U C A R E
T T S M O W A T
P E S A L P E O
E P I H T E S M
becomes:
* * * * *
8 1 6 5 7 4 3 2
L U C K Y T I G
E R W I L L A R
R I V E O F F V
E R A C R U Z A
T T W O A M S T
O P P L E A S E
M E E T S H I P
Key = 81657432
TABLE 16-2
VALIDITY VALUES
TABLE 16-1
Table of Key Lengths and Column Lengths of Completely
Filled Matrices - Given The Message Length
15 3 X 5, 5 X 3
16 4 X 4, 8 X 2
17
18 3 X 6, 6 X 3, 9 X 2
19
20 4 X 5, 5 X 4 10 X 2
21 3 X 7, 7 X 3
22 11 X 2
23
24 3 X 8, 4 X 6, 6 X 4, 8 X 3, 12 X 2
25 5 X 5
26 13 X 2
27 3 X 9, 9 X 3
28 4 X 7, 7 X 4, 14 X 2
29
30 3 X 10, 5 X 6, 6 X 5, 10 X 3, 15 X 2
31
32 4 X 8, 8 X 4, 16 X 2
33 3 X 11, 11 X 3
34 17 X 2
35 5 X 7, 7 X 5
36 3 X 12, 4 X 9, 6 X 6, 9 X 4, 12 X 3, 18 X 2
37
38 19 X 2
39 3 X 13, 13 X 3
40 4 X 10, 5 X 8, 8 X 5, 10 X 4, 20 X 2
41
42 3 X 14, 6 X 7, 7 X 6, 14 X 3, 21 X 2
43
44 4 X 11, 11 X 4, 22 X 2
45 3 X 15, 5 X 9, 9 X 5, 15 X 3
46 23 X 2
47
48 3 X 16, 4 X 12, 6 X 8, 8 X 6, 12 X 4, 16 X 3, 24 X 2
49 7 X 7
50 5 X 10, 10 X 5, 25 X 2
51 3 X 17, 17 X 3
52 4 X 13, 13 X 4
53
54 3 X 18, 6 X 9, 9 X 6, 18 X 3
55 5 X 11, 11 X 5
56 4 X 14, 7 X 8, 8 X 7, 14 X 4
57 3 X 19, 19 X 3
58
59
60 3 X 20, 4 X 15, 5 X 12,, 6 X 10, 10 X 6,12 X 5,
15 X 4, 20 X 3
61
62
63 3 X 21, 7 X 9, 9 X 7, 21 X 3
64 4 X 16, 8 X 8, 16 X 4
65 5 X 13, 13 X 5
66 3 X 22, 6 X 11, 11 X 6, 22 X 3
67
68 4 X 17, 17 X 4
69 3 X 23, 23 X 3
70 5 X 14, 7 X 10, 10 X 7, 14 X 5
71
72 3 X 24, 4 X 18, 6 X 12, 8 X 9, 9 X 8,12 X 6, 18 X 4,
24 X 3
73
74
75 3 X 25, 5 X 15, 15 X 5, 25 X 3
76 4 X 19, 19 X 4
77 7 X 11, 11 X 7
78 3 X 26, 6 X 13, 13 X 6
79
80 4 X 20, 5 X 16, 8 X 10, 10 X 8, 16 X 5, 20 X 4
81 3 X 27, 9 X 9
82
83
84 3 X 28, 4 X 21, 6 X 14, 7 X 12, 12 X 7, 14 X 6,
21 X 4
85 5 X 17, 17 X 5
86
87 3 X 29
88 4 X 22, 8 X 11, 11 X 8, 22 X 4
89
90 3 X 30, 5 X 18, 6 X 15, 9 X 10, 10 X 9, 15 X 6,
18 X 5
91 7 X 13, 13 X 7
92 4 X 23, 23 X 4
93 3 X 31
94
95 5 X 19, 19 X 5
96 3 X 32, 4 X 24, 6 X 16, 8 X 12, 12 X 8, 16 X 6,
24 X 4
97
98 7 X 14, 14 X 7
99 3 X 33, 9 X 11, 11 X 9
100 4 X 25, 5 X 20, 10 X 10, 20 X 5, 25 X 4
101
102 3 X 34, 6 X 17, 17 X 6
103
104 4 X 26, 8 X 13, 13 X 8
105 3 X 35, 5 X 21, 7 X 15, 15 X 7, 21 X 5
106
107
108 3 X 36, 4 X 27, 6 X 18, 9 X 12, 12 X 9, 18 X 6
109
110 5 X 22, 10 X 11, 11 X 10, 22 X 5
111 3 X 37
112 4 X 28, 7 X 16, 8 X 14, 14 X 8, 16 X 7
113
114 3 X 38, 6 X 19, 19 X 6
115 5 X 23, 23 X 5
116 4 X 29
117 3 X 39, 9 X 13, 13 X 9
118
119 7 X 17, 17 X 7
120 3 X 40, 4 X 30, 5 X 24, 6 X 20, 8 X 15, 10 X 12,
15 X 8, 20 X 6 , 24 X 5
121 11 X 11
122
123 3 X 41
124 4 X 31
125 5 X 25, 25 X 5,
126 3 X 42, 6 X 21, 7 X 18, 9 X 14, 14 X 9, 18 X 7,
21 X 6
127
128 4 X 32, 8 X 16, 16 X 8
129 3 X 43
130 5 X 26, 10 X 13, 13 X 10
131
132 3 X 44, 4 X 33, 6 X 22, 11 X 12, 12 X 11, 22 X 6
133 7 X 19, 19 X 7
134
135 3 X 45, 5 X 27, 9 X 15, 15 X 9
136 4 X 34, 8 X 17, 17 X 8
137
138 3 X 46, 6 X 23, 23 X 6
139
140 4 X 35, 5 X 28, 7 X 20, 10 X 14, 14 X 10, 20 X 7
141 3 X 47
142
143 11 X 13, 13 X 11
144 3 X 48, 4 X 36, 6 X 24, 8 X 18, 9 X 16, 12 X 12,
16 X 9, 18 X 8, 24 X 6
145 5 X 29
146
147 3 X 49, 7 X 21, 21 X 7
148 4 X 37
149
150 3 X 50, 5 X 30, 6 X 25, 10 X 15, 15 X 10, 25 X 6
151
152 4 X 38, 8 X 19, 19 X 8
153 3 X 51, 9 X 17, 17 X 9
154 7 X 22, 11 X 14, 14 X 11, 22 X 7
155 5 X 31
156 3 X 52, 4 X 39, 6 X 26, 12 X 13, 13 X 12
157
158
159 3 X 53
160 4 X 40, 5 X 32, 8 X 20, 10 X 16, 16 X 10, 20 X 8
161 7 X 23, 23 X 7
162 3 X 54, 6 X 27, 9 X 18, 18 X 9
163
164 4 X 41
165 3 X 55, 5 X 33, 11 X 15, 15 X 11
166
167
168 3 X 56, 4 X 42, 6 X 28, 7 X 24, 8 X 21, 12 X 14,
14 X 12, 21 X 8, 24 X 7
169 13 X 13
170 5 X 34, 10 X 17, 17 X 10
171 3 X 57, 9 X 19, 19 X 9
172 4 X 43
173
174 3 X 58, 6 X 29
175 5 X 35, 7 X 25,25 X 7
176 4 X 44, 8 X 22, 11 X 16, 16 X 11, 22 X 8
177 3 X 59
178
179
180 3 X 60,4 X 45, 5 X 36, 6 X 30, 9 X 20, 10 X 18,
12 X 15, 15 X 12, 18 X 10, 20 X 9
181
182 7 X 26, 13 X 14, 14 X 13
183 3 X 61
184 4 X 46, 8 X 23, 23 X 8
185 5 X 37
186 3 X 62, 6 X 31
187 11 X 17, 17 X 11
188 4 X 47
189 3 X 63, 7 X 27, 9 X 21, 21 X 9
190 5 X 38, 10 X 19, 19 X 10
191
192 3 X 64, 4 X 48, 6 X 32, 8 X 24, 12 X 16, 16 X 12,
24 X 8
193
194
195 3 X 65, 5 X 39, 13 X 15, 15 X 13
196 4 X 49, 7 X 28, 14 X 14
197
198 3 X 66, 6 X 33, 9 X 22, 11 X 18, 18 X 11, 22 X 9
199
200 4 X 50, 5 X 40, 8 X 25, 10 X 20, 20 X 10, 25 X 8
201 3 X 67
202
203 7 X 29
204 3 X 68, 4 X 51, 6 X 34, 12 X 17, 17 X 12
205 5 X 41
206
207 3 X 69, 9 X 23, 23 X 9
208 4 X 52, 8 X 26, 13 X 16, 16 X 13
209 11 X 19, 19 X 11
210 3 X 70, 5 X 42, 6 X 35, 7 X 30, 10 X 21, 14 X 15,
15 X 14, 21 X 10
211
212 4 X 53
213 3 X 71
214
215 5 X 43
216 3 X 72, 4 X 54, 6 X 36, 8 X 27, 9 X 24, 12 X 18,
18 X 12, 24 X 9
217 7 X 31
218
219 3 X 73
220 4 X 55, 5 X 44, 10 X 22, 11 X 20, 20 X 11, 22 X 10
221 13 X 17, 17 X 13
222 3 X 74, 6 X 37
223
224 4 X 56, 7 X 32, 8 X 28, 14 X 16, 16 X 14
225 3 X 75, 5 X 45, 9 X 25, 15 X 15, 25 X 9
226
227
228 3 X 76, 4 X 57, 6 X 38, 12 X 19, 19 X 12
229
230 5 X 46, 10 X 23, 23 X 10
231 3 X 77, 7 X 33, 11 X 21, 21 X 11
232 4 X 58, 8 X 29
233
234 3 X 78, 6 X 39, 9 X 26, 13 X 18, 18 X 13
235 5 X 47
236 4 X 59
237 3 X 79
238 7 X 34, 14 X 17, 17 X 14
239
240 3 X 80, 4 X 60, 5 X 48, 6 X 40, 8 X 30, 10 X 24,
12 X 20, 15 X 16, 16 X 15, 20 X 12, 24 X 10
241
242 11 X 22, 22 X 11
243 3 X 81, 9 X 27
244 4 X 61
245 5 X 49, 7 X 35
246 3 X 82, 6 X 41
247 13 X 19, 19 X 13
248 4 X 62, 8 X 31
249 3 X 83
250 5 X 50, 10 X 25, 25 X 10
251
252 3 X 84, 4 X 63, 6 X 42, 7 X 36, 9 X 28, 12 X 21,
14 X 18, 18 X 14, 21 X 12
253 11 X 23, 23 X 11
254
255 3 X 85, 5 X 51, 15 X 17, 17 X 15
256 4 X 64, 8 X 32, 16 X 16
257
258 3 X 86, 6 X 43
259 7 X 37
260 4 X 65, 5 X 52, 10 X 26, 13 X 20, 20 X 13
261 3 X 87, 9 X 29
262
263
264 3 X 88, 4 X 66, 6 X 44, 8 X 33, 11 X 24, 12 X 22,
22 X 12, 24 X 11
265 5 X 53
266 7 X 38, 14 X 19, 19 X 14
267 3 X 89
268 4 X 67
269
270 3 X 90, 4 X 54, 6 X 45, 9 X 30, 10 X 27, 15 X 18,
18 X 15
271
272 4 X 68, 8 X 34, 16 X 17, 17 X 16
273 3 X 91, 7 X 39, 13 X 21, 21 X 13
274
275 5 X 55, 11 X 25, 25 X 11
276 3 X 92, 4 X 69, 6 X 46, 12 X 23, 23 X 12
277
278
279 3 X 93, 9 X 31
280 4 X 70, 5 X 56, 7 X 40, 8 X 35, 10 X 28, 14 X 20,
20 X 14
281
282 3 X 94, 6 X 47
283
284 4 X 71
285 3 X 95, 5 X 57, 15 X 19, 19 X 15
286 11 X 26, 13 X 22, 22 X 13
287 7 X 41
288 3 X 96, 4 X 72, 6 X 48, 8 X 36, 9 X 32, 12 X 24,
16 X 18, 18 X 16, 24 X 12
289 17 X 17
290 5 X 58, 10 X 29
291 3 X 97
292 4 X 73
293
294 3 X 98, 6 X 49, 7 X 42, 14 X 21, 21 X 14
295 5 X 59
296 4 X 74, 8 X 37
297 3 X 99, 9 X 33, 11 X 27
298
299 13 X 23, 23 X 13
300 3 X 100, 4 X 75, 5 X 60, 6 X 50, 10 X 30, 12 X 25
15 X 20, 20 X 15, 25 X 12
Given:
NEW YORK
652 1992
The Y is a gimme. Draw up the hat diagram based on key
length = 9.
1 2 3 4 5 6 7 8 9
T I C O I
T R O G I R H
R A T N O A P I S
C L I O A I S T P
R M N I F T N I F
K O F W R E E O S
A I L O D L Y T O
L D E P C L R W I
P F F I U P R U E
T N R E H R C O K
N V I C O I I I G
A T O G I R H D M
T R N O A P I S N
7 1
I
R
P
S R
N C
E R
N E W Y O R K
R A
R L
C P
I T
H N
I A
T
2 3 6 4 7 9 5 1 8
I
O I R C H
T I O P S G I
T R A N S P O R T
A T I O N F A C I
L I T I E S F R O
M N E W Y O R K T
O F L O R I D A W
I L L P R E C L U
D E P I C K U P O
F F R E I G H T I
N R I C H M O N D
V I R G I N I A S
T O P
O A T
R N
AMSCO
3 1 4 2 5 2 4 6 1 5 3
TH E WE A RI T HE W EA R IN
N GO F DE C GO F DE C OR A
OR A TI V EM T IV E M ED AL
E DA L SW A SW A SC O MM O
SC O MM O NI N IN E NG L AN
N EN G LA N DD U RI N GT H
DD U RI N GT E RE I GN O FH
H ER E IG N EN R YT H EE I
OF H EN R YT G HT H
H EE I GH T
HX 1-2-1-2-1-2
2-1-2-1-2-1
2-1-2-1-2 1-2-1-2-1-2
1-2-1-2-1 2-1-2-1-2-1
2-1-2-1-2 1-2-1-2-1-2
1-2-1-2-1 2-1-2-1-2-1
2-1-2-1-2 1-2-1-2-1-2
1-2-1-2-1 2-1-2-1-2-1
2-1-2-1-2 1-2-1
1-2-1-2-1
2-1-2-1-2
1-2-1-2-1
2 (B)
(A)
Solution:
-P RE C IO U S- PR E CI O US;
UN IN
T O
OL EN
I O
VE EN
D T
PR E CI O US
S D
OR PR
D T
EW TE
L R
LT IU
O RI E NT A LL
UX U RY T EN T
H UN G IN S IL
KI T SP O L ES
G OL D EN I TS
NA I LS O FS I
L VE R EN R IC
HE D WI T HP R
PR E CI O US S TO
NE S AN D AF L
O OR S PR I NK
LE D WI T HR O
S EW A TE R --
MYSZKOWSKI
Keying examples:
F I C T I O N P A P I L L A
2 3 1 6 3 5 4 4 1 4 2 3 3 1
A M O O S E I A M O O S E I
S S O C A L L S S O C A L L
E D A S T H E E D A S T H E
W O R D I S S W O R D I S S
A I D T O M E A I D T O M E
A N C R O P P A N C R O P P
E R O R T R I E R O R T R I
M M E R F R O M M E R F R O
M T H E A N I M T H E A N I
M A L S H A B M A L S H A B
I T O F F E E I T O F F E E
D I N G O N T D I N G O N T
R E E B R A N R E E B R A N
C H E S - - - C H E S - - -
(A) (B)
Cipher (A)
Cipher (B)
MISLD EOSIE NPRIM OTIAB TEITE NHOCO DTRRR ESFGB
SSEAL THISO MOPTR FRANH AFEON RAAOS OEAWR ADACE
OMEMH MLIOD NRECE (95)
O R I
N T E
N T O
C O M
I T I Trigraphs off these
F M A possibilities:
O U G
Z E N N T E (R)
A N D (I)NTO
E R M E D I C O M (M)
C A L I T I (ION)
P A R OUG (HT)
O N S (A or I) - ZEN
I N T PAR(T)
O R M
R O M
C S Y
CADENUS
Example:
EASY AESY
2134 1234
ASEV A SYST
EREL B RETO
IMIT C MTAT
ATIO D TLUS
NONT E OATL
HEUS F EEES
EFUL G FIYH
NESS H EASD
OFTH I FNMS
ECAD J CHBH
ENUS K NEUV
ISTH L SNPM
ATEV M TOFA
ERYM N RENU
ESSA O SEIE
GEMU P EIEL
STBE Q TARL
AMUL R MENT
TIPL S IEET
EOFT T OGEV
WENT U ESIT
YFIV VW FAIS
ELET X LTNG
TERS Y EEUV
LONG Z OWUL
Cipher:
Solution procedure:
AUTO-TRANSPOSITION
key:
Plain:
W H E N M E M*B E R S O F A*N O R G A N I*Z A T I O N G
Cipher:
E M W N M E H*A R B F S E O*O R N I A G N*I N G A Z O T
1 5 7 6 4 2 3 1 6 2 4 7 3 5 ...
Cipher
G E I H E T E G E I H N T E Y V S E
1 5 3 4 6 2 1 6 2 5 3 4
Plain
E I G H T E E N E I G H T Y S E V E
1 5 3 4 6 2 1 6 2 5 3 4 4 6 3 1 5 2
= A R B F S E O Cipher
GRILLE / TURNING GRILLE
Problem:
ARUDU CSCIM WETTR NNGOO TMIEL MJENH FOIEI L
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
A R U D U C S C I M W E T T R N N G O O T
L I E I O F H N E J M L E I M T O O G N N
22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
M I E L M J E N H F O I E I L
R T T E W M I C S C U D U R A
34 17 22 34 17 22 34 17 6 25 8 32 10 22 34 17 6 24
E N M E N M E N C L C O M M E R C E -->
U O R U O R U O F E N U J R U O F T <--
3 2 1 4 5
1 5 3 2 4
2 4 5 3 1
5 3 4 1 2
4 1 2 5 3
T H I S I S A N E X 2 3 1 4
A M P L E O F T H E 3 2 4 1 4 X 10
S W A G M A N T R A 4 1 3 2
N S P O S I T I O N 1 4 2 3
N W I L S A A T O A
T M P G I O T T E E
A H A O E S N I H X
S S P S M I F N R N
o ee ll o
ICTPN HUEAX YGELA DIDAN EUNMB ILANT RRICM EAMIG
P E R L P F H T A A E L I I A P U O I L E G R W
O E O E A N A P X D U A C G R O P A A O I D E I
G I R N I G T N Y I N N M L T O D S N D A S M S
T O L O A T L H G D M T E A A O I E S U A O B O
C A L W A A I U E A B R A M S A B S N H S O T U
V I D G N T C E L N I R M P R L R E Q C C R O S
One row of the key must be 2 1 5 4?? and the key row
above it must be ????51.
3 5 1 6 4 2
6 4 3 2 1 5
1 2 6 5 3 4
5 3 4 1 2 6 KEY
4 6 2 3 5 1
2 1 5 4 6 3
Encipherment:
The key = 0075 was used in a simple equation to obtain a
control key.
K=19999 +Key
---------- = Control Key
97
K=19999 +0075
----------- = 206.948536
97
K= 2069484536
K = 2 0 6 9 4 8 4 5 3 6 control key
K = 1 10 6 9 3 8 4 5 2 7 ranked control key
K = 1 106 9 3 8 4 5 2 7
C A R H N T F I O M (C O N F I R M T H A)
T L C I E W X I M O
L D A E E D A W B R
T I T R T A L E I O
Z N E S N A A T O X
E F I I M O E X W C
M E O T X N I C E E
R S G N A I R A W A
T Z Z A S Z A A U A
1 2 3 4 5 6 7 8 910 (RE-RANKED KEY)
Ciphertext:
J Z S S W B P D Z Z L F O M E K Q P D J H C K U M C
A B C O O X M Y S I I G B S G G Y V D S W A J O Q E
K U P W K N J K C C H W O Z Q Q B P Y N V J J O Q E
K U C D S L R W C F Q I A V M S R S I X Y T P O P G
D H U V N K V K C Y Y A L R Q O O Q D N Z C G L R E
K F H Q R N J B.
(K U) M C A B C O O X M Y S I I - 5
(U P) W K N J K C C H W O Z Q Q
S S W B P D Z Z - 7
Y Y A L R Q O O
C D S L R W C (F Q I) - 22
R E K F H Q R (N J B)
1234567891011121314151617181920212223242526 Interval
O Z 7
Y O C K S Z 5
H R C 22
H X 5
P R 7
-------------------------------------------
PY H OR C K S XZ (combined)
P K U 5
B J L (assumed)
NB FIJ L Q W 22
A N M W 5
D Q 7
E D Q 22
-------------------------------------------
PY(T)HA(G)OREN BCDFIJKLMQSU(V)WXZ (combined)
Similar to a Viggy:
1 PYTHAGORENBCDFIJKLMQSUVWXZ
2 YTHAGORENBCDFIJKLMQSUVWXZP
3 THAGORENBCDFIJKLMQSUVWXZPY
4 HAGORENBCDFIJKLMQSUVWXZPYT for additional sliding
. ..... sequences
.
.
.
Line 1
J Z S S W B P D Z Z L F O M E K Q P D J H C K U M C
Converted
J X M L Q G S G L K R T S G S Y H N S V N K S X S D
Plain
M Y P O S I T I O N L A T I T U D E T W E N T Y T H
Line 2
A B C O O X M Y S I I G B S G G Y V D S W A J O Q E
Converted
A N N H T Q D S D G A S X R L K C G S Y H N Q N U N
Plain
R E E D A S H T H I R T Y L O N G I T U D E S E V E
Plain
Q U A D R I C L B E F G H J K M N O P S T V W X Y Z
Cipher
P Y T H A G O R E N B C D F I J K L M Q S U V W X Z
A U V Z I S Z F B F Y E I R B I O W A O Y J L B L D
A T T W E N T Y T W O T W E N T Y F I V E O P E N E
D G K U I T T Z B D B E Q I O C J R F W X D Y H G M
D F I R E O N S T U R T E V A N T A N D D I C K I N
S P P I S W Y P F V S Y G G S H Q K L A L Z A Q F N
S O N F O R S I X M I N U T E S A T T H R E E T H O
U T C Q H D G Y L B Z P D V C S J N W G N T P T M S
U S A N D Y A R D S P E R I O D T W E N T Y T W O T
H J T W C K O C M X Z P Z R R U Y I W H H M E Z F L
H I R T Y F I V E O P E N E D F I R E O N R I C H M
O C F I S W L P D N W T Z H H T I R L Y I P N Q F N
O N D F O R F I V E M I N U T E S A T F O U R T H O
U T C Q H D G Y L B Z P D V C S J N W G N T P T M E
U S A N D Y A R D S P E R I O D T W E N T Y T W O F
O S V B W J B L V X Z P Z R R U Y I W H H P L P F T
O U R T Y S E V E N O P E N E D F I R E O N U P S H
R B P G X B U L V N W J P R H I H F Q X L N B L P S
U R A N D T W O E N E M Y D E S T R O Y E R S F O R
H J T W I J T T Q W E E Q F O I I Z P M B J Q P Y M
H I R T E E N M I N U T E S A T S I X T H O U S A N
D U Q W A T Z O W D C L Z Q M P U K.
D T O T W O T H O U S A N D Y A E T
LECTURE 16 PROBLEMS
2. Nihilist transposition.
3. Incomplete columnar
4. Myszkowski. Battlefield.
5. Amsco.
6. Tramp.
7. Cadenus.
IRHRC GRETR ESDEE OFOWN ETLNS EOTIG IMNEI
TSONH LTIID DVLTS NIADS LSRAM TSORU HSCNE
DNIHU EAGCD IGIRS WSLSH BITNI IHNNH DNICD
ACGEV NGOEL YBADY OALOS. (circles)
8. Railfence.
04 JANUARY 1996
Revision 0
COPYRIGHT 1997
ALL RIGHTS RESERVED
LECTURE 22
CIPHER MACHINES II
HEBERN'S "COMMERCIAL PORTABLE CODE" MACHINE AND
THE ELECTRONIC CIPHER MACHINE MARK II (ECM MARK II
or SIGABA)
SUMMARY
ACKNOWLEDGMENTS
By the WWI, the wired rotor was an idea whose time had
come. Without knowledge of each other, Damm and three
others conceived of using the wired rotor for crypto-
graphic machines. In 1917, Edward H. Hebern created his
famous Electronic Code machine under patent 1,510,441
awarded on September 30, 1924. This machine influenced
greatly the America cryptosecurity systems throughout
WWII. Hebern's rotors had the 26 contact A-Z sequence.
To Hebern must also go credit for the idea of wiring
rotors according to the "interval method". Up to Hebern,
designers randomly connected the contacts to each face
of the their rotors. Hebern chose his wiring to produce
as flat a polyalphabetic frequency distribution as
possible. The interval method of wiring rotors was used
in the ECM.
Given:
Input Contact:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Output Contact:
G A D B O C T K N U Z X I W H F Q Y J V P M E L S R
AG 06 BA 25 CD 01
DB 24 EO 10 FC 23
GT 13 HK 03 IN 03
JU 11 KZ 15 LX 12
MI 22 NW 09 OH 19
PF 16 QQ 00 RY 07
SL 17 TV 02 UP 21
VM 17 WE 08 XL 14
YS 20 ZR 18
During WWII, the Germans used the Kryha machine and the
US cryptographic teams successfully analyzed intercepted
diplomatic traffic. When proposed to be used in the US
Army, Friedman, Rowlett, Kullback, and Sinkov, solved an
untypically long test message of 1,135 letters to demon-
strate the weakness of the machines ciphers. Statistical
analysis was used extensively in the solution. ( See
Lecture 15.)
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
---------------------------------------------------
F T Q J V A X M W D N S H L R U C O K B P E I G Z Y
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
---------------------------------------------------
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
S E N D M O R E A M M U N I T I O N
E <- D E Y V L H X J J V L R O T H V A C B
I <- H X C W G N G M M M S D S S O Y D J I
Q <- P G N I P D I P W B O H D S K C G J I
U <- Q N D H I U M O Z O R Y T V N L F P O
A <- Z K Z S U Y W A G O V Y P M R Y R F E
S E N D
D -> E E
E -> F Y
F -> G V
G -> H L
M O R E
H -> I H
I -> J X
J -> K J
K -> L J
L -> M V
M -> N L
N -> O R
O -> P O
P -> Q T
Q -> R H
R -> S V
S -> T A
T -> U C
U -> V B
XFSDOXIZYHSMDNJNJILAFINJLS
RZYTKIKQLVQFKKVLEJFDHIKIKR
AJPYLBTENHWCDESCLHXWTRIBJP
LWYUOEBLNSHRHHTPTJAETDOZQG
LMLJSIGLNNWAJHBLEOEMTVAEVD
XGGCZYWZNSLXYAHLLODDTDXCNJ
CKFLPIEZGZWCOGRHTEOXTDDGSN
LLQBLUAPQNQXPENHPSRXTDDGUS
XOMCJNWZSQFXIHVXPQLWYIEANL
DOWSSNPPTEEWJHZYRWZXITPUSZ
XUYISIGFVBCFIUBNJOVBSRAIGG
XXXLPHZLNSQXUKELTJAGKOYUSC
ROWHPYZDYUCAUBPPZARKFZDHSS
YXHIUDTYVZWFKQVJHZOMTVDHSS
GLTEZDKSOQFXEUEDTIAQVRTDZP
LLSEPHNDAQEXWMQSTEABFXKAIS
XHLPVPLPWHNDJUODMJOQHOOCGM
GLTQIHOLVNBMHORLRWRCFYPHQJ
CKGMZHZALMAWJBXXEQDATDMZNS
CRFGWHJSBKQHOARGBOULWVAJTX
UUEZPQKSBQEXMRPLWYGAURAASN
SXGGBBTBPNYMDXHHMIVDRRWAVZ
RHXDRNHZEHSXIKOAZUAGTLRGQK
LEADOZTBLHRWSIRPIZAGCXASGM
XFLDUHTSENIXUIRWUEOQTLMHTF
ZXEZUPAZXVCIOUTYRHKDTDOVWJ
SGMGBLTUPRWXONBDKNEUEYAEZJ
SEOYOPUZSLEPMTHDROSQFONJLW
OKYRDZTIVKAIPJRGYEATRTKITY
ZDSJUDTBZXFFRHTWTODDFIOATZ
MQPEAYGCGHPTIJUDKWDMBTUWVU
XKTIUIWZWVMXMPQPZPOXHLUNQL
QHZLPIJQNVRZPJHPZPOXHLUZVX
LWTJUBQQWSQWUYOPZPOXHLUZVX
YSPYOTNZTSBIPJHOZFKMWOOBZC
ZXQCXXNDWYNPOPXZBWBAQTXNFC
XHPCUDTGUGTRONUVNOFKJSXBNW
XFSBRLZUETHREEVWVYOVJRUCJF
XXPYOWGTGGLMBIHTEZLATYDGJJ
SKYISCTUVFNIMETYVYGXHJAINS
SKYISCTLNSQXIETPKWKYFXXMVA
GLTTOBNDGPNAPUUBZOZSFCMGGN
POQGLNNPYSWFNUNAWDMWHIAEIS
OQTBRLZDVKWCDUHPZSRZYOOGUS
DJTDUDTGYZVXDHTLUWFTFHRDBS
YJTRKILLVTTDEIHLUWZEFQBAFZ
UXMCBQTMLUTIOBPNHZALWVNGQC
ODYPIVIPZFEVJOKYRTRIFIIDIS
XUGVHXWZEHGXPKOARGRCYNAUSS
RXDCWHGQBFYAWKTNGNRETOXZVX
TXGCBAZABQTDCQVJASRJJJMUSZ
LEQBLEILLSRIYTHZXINYTTUGQL
MTSOXHAPYUQAWPXTZOVDJPIANA
RXQYRPJSFUACSOH
Each column therefore was enciphered by the same rotor
position, implying monoalphabeticity.
Letter frequencies:
A 56 E 50 I 57 M 33 Q 47 U 58 Y 48
B 42 F 37 J 45 N 54 R 52 V 41 Z 68
C 33 G 52 K 36 O 62 S 66 W 52
D 60 H 63 L 67 P 61 T 81 X 72
Letters = 1393
Phi Values:
Observed = 77058
Random = 74653
Non-Random = 132621
Figure 22-1
Col A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 1 0 3 2 0 0 3 0 0 0 0 7 2 0 3 1 1 5 5 1 2 0 012 3 3
2 0 0 0 2 3 3 2 4 0 3 6 5 1 0 4 0 2 1 1 1 3 0 210 0 1
3 1 0 0 1 2 2 5 1 0 0 0 3 3 0 1 5 5 0 5 8 0 0 2 2 7 1
4 0 4 7 5 3 0 5 1 5 2 0 3 1 0 1 2 1 2 1 2 1 1 0 0 5 2
5 1 4 0 1 0 0 0 1 2 1 2 4 0 0 7 6 0 4 5 0 8 1 2 2 0 3
6 1 4 2 5 2 0 0 8 7 0 0 3 0 4 0 4 2 0 0 1 1 1 1 3 3 2
7 3 1 0 0 1 0 4 1 3 3 3 2 0 5 1 1 1 0 014 1 0 4 0 0 6
8 2 3 1 5 1 1 3 0 1 0 0 7 1 0 0 6 4 0 5 0 3 0 0 0 110
9 1 4 0 0 4 1 3 0 0 0 0 5 0 7 1 2 1 0 2 3 1 7 4 1 5 2
10 0 1 0 0 1 3 2 7 0 0 3 1 1 5 0 1 5 1 8 2 4 4 0 1 1 3
11 3 2 3 0 5 3 1 2 1 0 0 2 1 4 0 1 7 3 2 4 0 1 7 0 2 0
12 5 0 4 3 0 5 0 1 6 0 0 0 4 0 0 2 0 3 0 1 0 1 414 0 1
13 0 1 1 5 3 0 0 2 5 5 2 0 4 1 7 6 0 1 2 0 4 0 3 0 2 0
14 2 3 0 0 5 0 1 6 4 4 5 0 1 3 3 3 2 1 0 2 7 0 0 1 1 0
15 0 3 0 0 2 0 010 0 1 1 0 0 2 4 3 2 6 1 7 3 5 0 3 0 1
16 3 1 1 5 0 0 2 3 0 2 0 8 0 4 1 8 0 0 1 2 0 1 3 2 4 2
17 1 2 0 0 4 0 1 2 1 2 3 2 2 1 0 2 0 6 0 6 3 2 2 1 1 9
18 1 0 0 1 4 1 1 2 4 4 0 0 0 2 9 3 2 0 3 1 1 0 7 0 3 4
19 8 1 0 4 2 3 2 0 0 0 3 3 1 1 8 0 0 8 1 0 1 3 0 1 0 3
20 5 2 2 6 3 0 3 0 1 1 2 2 4 0 0 0 4 0 1 2 1 1 3 7 2 1
21 0 1 1 0 111 0 7 1 4 1 0 0 0 0 0 1 3 113 1 1 3 0 3 0
22 0 0 1 6 0 0 0 1 6 2 0 5 0 1 6 1 1 5 1 6 0 4 0 3 3 1
23 9 1 0 5 1 0 0 0 3 0 3 0 4 3 6 2 0 2 0 1 6 0 1 5 1 0
24 7 3 3 3 3 0 8 4 4 3 0 0 1 2 0 0 0 0 1 0 4 1 1 0 0 5
25 0 1 0 0 0 2 4 0 3 3 1 2 0 6 0 0 6 0 8 4 2 7 1 0 0 3
26 2 0 4 1 0 2 2 0 0 5 1 3 2 3 0 2 0 112 0 1 0 2 4 1 5
Figure 22-2
Col A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 1
2 1
3 7
4 0
5 2
6 1
7 1
8 0
9 2
10 1
11 7
12 2
13 7
14 3
15 0
16 8
17 3
18 4
19 0
20 0
21 0
22 0
23 1
24 3
25 0
26 0
A 1 E 1 I 0 M 0 Q 7 U 1 Y 7
B 0 F 0 J 4 N 3 R 1 V 1 Z 1
C 0 G 0 K 3 O 7 S 2 W 2
D 3 H 0 L 8 P 2 T 0 X 0
Letters = 54
Phi Values:
Observed = 218
Random = 110
Non-Random = 195
E(Xr) = 190
E(Xp) = 337
27 vs 9
A 128 N 131
B 173 O 169
C 100 P 130
D 128 Q 136
E 365 R 183
F 137 S 195
G 134 T 152
H 200 U 190
I 110 V 114
J 81 W 103
K 141 X 99
L 86 Y 154
M 48 Z 53
E(Xr) = 140
E(Xp) = 248
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
26- 2 1 3 5 011 3 0 4 2 0 0 1 1 0 1 5 0 514 1 1 0 2 0 3
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
9 0 0 5 4 0 5 1 0 4 1 0 0 0 0 0 2 3 0 314 2 3 1 3 0 5
======================================================
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
27: 2 1 8 9 016 4 0 8 3 0 0 1 1 0 3 8 0 828 3 4 1 5 0 8
old A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
27- 2 1 8 9 016 4 0 8 3 0 0 1 1 0 3 8 0 828 3 4 1 5 0 8
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
7 3 0 3 3 3 5 0 0 8 3 0 0 1 2 4 1 7 1 510 3 4 0 5 2 3
======================================================
new A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
27: 5 11112 321 4 016 6 0 0 2 3 4 415 11338 6 8 110 211
Figure 22-3
1 2 3 4 5 6 7 8 9 10 15 20 26
Col A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 V A W T R O M I M H F D A Q Z V S Q N L T J G E C Z
2 Z V S Q N L H L G E C Z P Y U R P M K S I F D B Y U
3 U R P M K G K F D B Y O X T Q O L J R H E C A X T Y
4 Q O L J F J E C A X N W S P N K I Q G D B Z W S X T
5 N K I E I D B Z W M V R O M J H P F C A Y V R W S P
6 J H D H C A Y V L U Q N L I G O E B Z X U Q V R O M
7 G C G B Z X U K T P M K H F N D A Y W T P U Q N L I
8 B F A Y W T J S O L J G E M C Z X V S O T P M K H F
9 E Z X V S I R N K I F D L B Y W U R N S O L J G E A
10 Y W U R H Q M J H E C K A X V T Q M R N K I F D Z D
11 V T Q G P L I G D B J Z W U S P L Q M J H E C Y C X
12 S P F O K H F C A I Y V T R O K P L I G D B X B W U
13 O E N J G E B Z H X U S Q N J O K H F C A W A V T R
14 D M I F D A Y G W T R P M I N J G E B Z V Z U S Q N
15 L H E C Z X F V S Q O L H M I F D A Y U Y T R P M C
16 G D B Y W E U R P N K G L H E C Z X T X S Q O L B K
17 C A X V D T Q O M J F K G D B Y W S W R P N K A J F
18 Z W U C S P N L I E J F C A X V R V Q O M J Z I E B
19 V T B R O M K H D I E B Z W U Q U P N L I Y H D A Y
20 S A Q N L J G C H D A Y V T P T O M K H X G C Z X U
21 Z P M K I F B G C Z X U S O S N L J G W F B Y W T R
22 O L J H E A F B Y W T R N R M K I F V E A X V S Q Y
23 K I G D Z E A X V S Q M Q L J H E U D Z W U R P X N
24 H F C Y Z D W U R P L P K I G D T C Y V T Q O W M J
25 E B X C Y V T Q O K O J H F C S N X U S P N V L I G
26 A W B X U S P N J N I G E B R A W T R O M U K H F D
Figure 22-4
1 A 0
2 B 1
3 C 2
4 D 3
5 E 4
6 F 5
7 G 6
8 H 7
9 I 8
10 J 9
11 K 10
12 L 11
13 M 12
14 N 13
15 O 14
16 P 15
17 Q 16
18 R 17
19 S 18
20 T 19
21 U 20
22 V 21
23 W 22
24 X 23
25 Y 24
26 Z 25
letter frequencies:
A 31 E 28 I 109 M 17 Q 154 U 58 Y 22
B 14 F 121 J 42 N 18 R 11 V 94 Z 71
C 45 G 27 K 1 O 31 S 93 W 0
D 93 H 0 L 1 P 39 T 195 X 71
Letters = 1393
Phi Values:
Observed = 136660
Random = 74653
Non-Random = 132621
CT X F S D O X I Z Y H S M D N J N J I L A F I N J L S
MT Q Z T X T D X T S F Y F X S C T J I V I F S P D N T
P T H E R E A R E N O B O R N D E C I S I O N M A K E
CT S E O Y O P U Z S L E P M T H D R O S Q F O N J L W
MT X V M Z T Q Z T X M T U I N T I Q F X S F Q P D N I
P R S W H E T H E R W E L I K E I T O R N O T M A K I
CT R Z Y T K I K Q L V Q F K K V L E J F D H I K I K R
MT S E D J Z F I J T I V D A D X Q F O Y T I S E Z G P
P N G A C H O I C E I S A P A R T O F B E I N G H U M
NAVY SYSTEMS
ARMY SYSTEMS
The Army used the ECM (SIGABA) and the five rotor wired
wheel M-134-A (SIGMYK), which was driven by a one-time
Baudot tape to control its rotor movements. The two-tape
Vernam system was also used, being later replaced by the
M-228 (SIGCUM), a five rotor teletype machine. The
Hagelin C-38 (1938) (M-209) was used for tactical
communications along with a variety of hand systems. The
strip system was used extensively for all levels of
communications. [DEVO]
http://www.maritime.org
Channel 105
Channel 108
Channel 135
Channel 143
Channel 144
Channel 171
Channel 110
1- B
2- C
3- DE
4- FGH
5- IJK
6- LMNO
7- PQRST
8- UVWXYZ
9- A
0- UV
1- B
2- C
3- DE
4- FGH
5- IJK
6- LMNO
7- ST
8- WXYZ
9- A
In the CSP-889, the only way that fewer than four rotors
will move is when the one live output goes either to the
same group, or to two groups connected by the index
rotors to one cipher rotor's movement mechanism.
1 : 0,9
2 : 7,8
3 : 5,6
4 : 3,4
5 : 1,2
On August 17, 1944 USS Pampanito was ready for sea. She
had rendezvoused three weeks earlier with the submarine
tender USS Proteus (AS-19) at Midway Island for repairs
and supplies. During the standard refit period, which
followed each war patrol, Pampanito was modified and
repaired by the tender. Improvements included the
installation of a radio key in the SJ radar circuit, a
surface search device (so that the radar could also be
used for communications), and the placement of charging
equipment in the forward torpedo room which allowed the
firing of Mark 18 electric torpedoes from the six
forward tubes, an ability she already had in the after
room. The brushes were replaced in all four of the 1600-
horsepower electric main propulsion motors, and gaskets
were replaced on the conning tower hatch, the main air
induction valve, and the newly converted Fuel Ballast
Tank #4A. Then final preparations were made for getting
underway. Pampanito took on provisions, fuel, ammun-
ition, and torpedoes.
--------------------------------------------------------
--------------------------------------------------------
Registered Cryptodocument
ASAM 1/1
CRYPTO-OPERATING INSTRUCTIONS
FOR ASAM 1
1
--------------------------------------------------------
ASAM 1/1
DEPARTMENT
OF THE
ARMY
Washington
25, D. C.
1 October
1949
OFFICIAL:
EDWARD F. WITSELL
Major General
The Adjutant General
--------------------------------------------------------
RECORD OF CHANGES
--------------------------------------------------------
(BLANK)
4
--------------------------------------------------------
TABLE OF CONTENTS
Paragraphs Pages
Section I. General
1-4 5-8
II. Description
5-8 7-8
III. Keying Instructions
9-15 9-12
IV. Operating Procedure
16-18 13-14
V. Special Instructions
19-20 15-16
VI. Aids for Deciphering
Garbled Messages 21-23 17-23
24-29 24-27
Introduction 1
Distribution 2
Accounting and Disposal 3
Effective Date 4
1. Introduction.
--------------------------------------------------------
--------------------------------------------------------
SECTION II
DESCRIPTION
--------------------------------------------------------
7. Rotors.
--------------------------------------------------------
SECTION III
KEYING INSTRUCTIONS
Paragraph
Key List 9
Rotor Arrangement 10
Alignment of Index Rotors 11
26-30 Check 12
System Indicator 13
Message Indicator 14
Message Rotor Alignment 15
1 | 0R 4 6 2R 7 | 1 8 5 9 3R | 10 23 31 49 5 | R N H V C
2 | 2 3R 9R 1 5 | 6 4R 8 7 0 | 14 25 33 46 59| S E M N O
1 | 12 28 31 44 53 | P W V M T | 17 25 36 43 58 | M C S D T
2 | 15 20 32 48 56 | E H E W B | 10 27 34 42 56 | R S T H H
--------------------------------------------------------
10
--------------------------------------------------------
11
--------------------------------------------------------
12
--------------------------------------------------------
SECTION IV
OPERATING PROCEDURE
13
--------------------------------------------------------
plain text will be printed on the tape in normal word
lengths except where variable spacing was employed in
encipherment. Note that X will always be printed in
the place of Z, e.g:, ZERO will decipher as XERO,
ZONE as XONE. In the event the deciphered text is
garbled either from the beginning or after some plain
text has been printed, attempt to determine the cause
of the trouble by employing the procedure described
in section VI.
14
--------------------------------------------------------
SECTION V
SPECIAL INSTRUCTIONS
Paragraph
Hand Operation 19
Tandem Operation 20
(2) Raise the hand-lever pawl and slip the ring from
under the pawl. Release the pawl to engage the
hand-lever pinion.
(3) Connect the main power lead to any source of 24-volt
d.c. If the voltage falls below 18, the magnet
action will be unreliable; if more than 26 volts are
used, injury to the magnets may result.
(4) After striking any key or the space bar, depress the
hand lever fully and allow it to return completely
to the top of its travel.
15
--------------------------------------------------------
16
--------------------------------------------------------
SECTION VI
AIDS FOR DECIPHERING GARBLED MESSAGES
Paragraph
Introductory Information 21
When No Plain Text Appears 22
When Some Plain Text Appears 23
b. Wrong system.
CORRECTION PROCEDURE.
CORRECTION PROCEDURE.
17
--------------------------------------------------------
CORRECTION PROCEDURE.
Examples:
LEFLU aligned LEFUL
LKMNS aligned MKLNS
ALIFE aligned FAILE
CORRECTION PROCEDURE.
CORRECTION PROCEDURE.
(2) Use the index rotor alignment for the date preceding
and the date following the date appearing in the
message.
18
--------------------------------------------------------
h. Incorrect alignment of stepping control and alphabet
rotors.
CORRECTION PROCEDURE.
CORRECTION PROCEDURE
CORRECTION PROCEDURE.
CORRECTION PROCEDURE.
19
--------------------------------------------------------
CORRECTION PROCEDURE.
CORRECTION PROCEDURE.
(2) If plain text does not result, retard the 1st rotor
one position and advance the 2d rotor one position;
decipher the next two groups.
(3) If plain text still does not appear, follow the same
procedure for the 3d, 4th, and 5th rotors.
CORRECTION PROCEDURE.
20
--------------------------------------------------------
CORRECTION PROCEDURE.
--------------------------------------------------------
CORRECTION PROCEDURE.
CORRECTION PROCEDURE.
22
--------------------------------------------------------
CORRECTION PROCEDURE.
23
--------------------------------------------------------
SECTION VII
OPERATION IN AN EMERGENCY
Paragraph
General 24
Notification of Compromise 25
Emergency Key Phrase 26
Use of the Emergency Key Phrase 27
Emergency Message 28
Normal Traffic 29
24
--------------------------------------------------------
24
--------------------------------------------------------
FOUR EIGHT FIVE ZERO ONE CHECK MIKE KING LOVE OBOE
CHARLIE CONF THREE SEVEN FIVE FOUR ONE CHECK NAN GEORGE
TARE VICTOR ZEBRA RESTR FOUR EIGHT TWO ZERO SEVEN CHECK
DOG GEORGE OBOE WILLIAM YOKE PD SIXTEENTH MIDDLE TWOREV
NINE SEVEN FOUR ONE REAR THREE FIVE SIXREV EIGHT ZERO
SEC FOUR TWO EIGHT SEVEN ONE CHECK CHARLIE BAKER FOX
WILLIAM VICTOR CONF EIGHT TWO SIX FIVE THREE CHECK TARE
UNCLE OBOE PETER KING RESTR ZERO NINE TWO EIGHT SIX
CHECK QUEEN ZEBRA FOX UNCLE NAN PD SENTEENTH MIDDLE
ONEREV SEVEN NINE FOURREV TWO REAR EIGHT THREE SIXREV
FIVE ZERO SEC SEVEN FIVE TWO ONE SIX CHECK GEORGE VICTOR
BAKER JIG QUEEN CONF ONE FIVE ZERO EIGHT TWO CHECK TARE
SUGAR UNCLE OBOE DOG RESTR FIVE TWO NINE THREE SEVEN
CHECK OBOE FOX CHARLIE KING PETER PD EIGHTEENTH MIDDLE
FOUR SEVENREV TWO FIVE ZERO REAR THREE NINE SIX EIGHT
ONE SEC TWO THREE EIGHT ZERO FOUR CHECK HOW YOKE FOX
CHARLIE JIG CONF FIVE NINE TWO ONE ZERO CHECK GEORGE
WILLIAM PETER OBOE ITEM RESTR SEVEN ONE FIVE EIGHT NINE
CHECK DOG ITEM KING ROGER BAKER PD NINETEENTH MIDDLE SIX
TWOREV EIGHTREV ONE FOURREV REAR FIVE ZERO SEVEN THREE
NINE SEC NINE FOUR SEVEN ZERO ONE CHECK JIG HOW DOG FOX
ITEM CONF SEVEN ZERO FIVE THREE EIGHT CHECK LOVE GEORGE
MIKE PETER EASY RESTR NINE THREE SIX ONE FIVE CHECK MIKE
LOVE HOW GEORGE LOVE
EXAMPLE: KINSL RLMCR DOG TARE JIG XRAY LOVE MRWTX .....
GDLJC
1 2 3 4
24
--------------------------------------------------------
Navy Department
Office of Chief of Naval Operations
Washington, D.C.
MEMORANDUM
COMMUNICATION IMPROVEMENT ITEM
DRAFTING:
ENCRYPTION:
CALLS:
TRANSMISSION:
Approximate Size:
In operation: 15" x 19.25" x 12" or 2.1 cubic feet
In carrying case: 17.125" x 23" x 15.5" or 3.5 cubic
feet
Packed for long term: 19.5" x 27.5" x 18" or 5.6 cubic
feet
Approximate Weight:
In operation: 93.5 lbs.
In carrying case: 133.5 lbs.
Packed for long term: 195 lbs.
Cost:
By 1943, 10, 060 ECM Mark II's were purchased at an
estimated cost of $2,040 a piece. This does not include
the cost of spare parts; additional code wheel sets,
code wheel wiring that was done by the military;
modifications and upgrades, precursor machine
development, etc.
ADDITIONAL REFERENCES
20 March 1997
Revision 0
COPYRIGHT 1997
ALL RIGHTS RESERVED
LECTURE 24
SPECIAL TOPICS
COURSE NOTES
SUMMARY
UBCHI
5 3 7 8 9 2 6 1 4 10
Keyword: h e r r s c h a f t
5 3 7 8 9 2 6 1 4 10
h e r r s c h a f t
-------------------
F I R S T A R M Y X
P L A N F I V E A C
T I V A T E D X C R
O S S M A R N E A T
S E T H O U R
1 2 3 4 5 6 7
Ciphertext: MEXE AIERU ILISE YACA FPTOS RVDNR RAVST
8 9 10
SNAMH TFTAO XCRT.
5 3 7 8 9 2 6 1 4 10
h e r r s c h a f t
-------------------
M E X E A I E R U I
L I S E Y A C A F P
T O S R V D N R R A
V S T S N A M H T F
T A O X C R T(Z)
1 2 3 4 5 6 7 8 9
RARHZ IADAR EIOSA UFRTM LTVTE CNMTX SSTOE ERSXA YVNCI
10
PAF.
This is Step 1.
Messages In Depth
1 1 1 1 1 1 1 1 1 1 2
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
Message 1: T L R N T A H I I O D F Y N P T R I E A
Message 2: P E U L N R B Q T L C R L E W E X B O I
Message 3: T H N N I N U A T O T E E I S S X I O E
Message 4: T E N G I R A E E O R E E I L I X E E A
Message 5: O I E O L T I L W U V U R T O E O C R P
Message 6: T A F H E R N A D O S I I I T E H Y F W
2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
Message 1: O E E B T Y E I P O S V I V A E X R F T
Message 2: T E A Y A X J T N P W E I R W D X S E E
Message 3: V P O T H X G G I D O S R N E P X T I P
Message 4: V T D R E X P G R D S S R U E S X E I H
Message 5: R C R O A P E S U I I A W E N N X R O R
Message 6: G S W P I X C G R D E R U E G V X K I P
4 4 4 4 4 4 4 4 4 5 5 5 5 5 5 5 5 5 5 6
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
Message 1: I S R T W M B U F F O D R E E A E U S H
Message 2: S V E E O T O Y U A E A C P O R X W I E
Message 3: T S P N S N B N N N R I W T G U S S D T
Message 4: T G P E S U L T R N O I P T I T S V D E
Message 5: V I I U R T E S E N S H R Y Y R T N Y L
Message 6: D E P O S Y E I L N O H S T S C T E R Y
6 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 7 7 7 8
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
Message 1: E T E S R C C I R R T R Y E S N I S F S
Message 2: E O S E T Y W X N U R I N D T E L S R E
Message 3: E R R C T G S I O O R A F O O M K L O S
Message 4: E P H C S G T I N T L W O A A M N L T S
Message 5: S L A R E A P A L T A Y O N Y S M E U I
Message 6: H E Y C U O T E E A N E V E O M T R W M
1
8 8 8 8 8 8 8 8 8 9 9 9 9 9 9 9 9 9 9 0
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
Message 1: L S R F I A I O O C T Q O G D R U P E O
Message 2: C A S O A C M W S Y T R E S O E E T P L
Message 3: E O G L O O R R O D M O A M O A S N I R
Message 4: Y C C V O O R S O E A N E M N A S N Q S
Message 5: N P D W P S N T L A H E A O O D Q E C S
Message 6: E E R U O A C C N D R M E M L E H T A O
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
0 0 0 0 0 0 0 0 0 1 1 1 1 1 1
1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
Message 1: E O A O I N A N R S R L S T U
Message 2: U P R O G E W K E E N E N S E
Message 3: T S A T R A O I A I L N W F F
Message 4: M E A E R U O R U E S N L F O
Message 5: I E I E E Y F O T N C T A R E
Message 6: L R A Y I D O T T S W N R T A
17 26 37 57 68
- - - - -
R Y X E I
X X X X X
X X X S I
X X X S I
O P X T A
H X X T E
17 26 37
- - -
R Y X
X X X
X X X
X X X
O P X
H X X
92 48 57 17 26 37
- - - - - -
Q U E R Y X
R Y X X X X
O N S X X X
N T S X X X
E S T O P X
(S) M I T H X X
7 7 7 2 6 2 6 6 6 5 5 4 5 3 4 4 1 3 1 3
9 6 2 5 3 2 0 9 6 1 7 2 4 9 8 5 9 6 0 3
Message 1: M E S S A G E S I X O N E S T O P O U R
Message 2: W E A R E R U N N I N G I N T O H E A V
Message 3: T O C O M M A N D I N G O F F I C E R T
Message 4: O P E R A T I O N S O R D E R S I X T E
0 1 1 3 0 8 0 8 2 2 6 7 7 7 7 5 5 4 6 5
7 6 3 0 4 4 1 1 7 4 2 8 4 5 1 9 6 1 8 3
Message 1: A D V A N C E H A S B E E N S L O W E D
Message 2: Y M I N E F I E L D S S T O P W E U R G
Message 3: H I R D B A T T A L I O N S T O P H A V
Message 4: E N I S B E I N G S E N T Y O U B Y C O
6 5 3 3 0 4 2 4 1 0 0 8 1 3 1 2 8 7 7 2
5 0 8 5 9 7 1 4 8 6 3 3 5 2 2 9 0 7 3 6
Message 1: B Y H E A V Y M O R T A R F I R E S T O
Message 2: E N T L Y N E E D E N G I N E E R P E R
Message 3: E R E P R E S E N T A T I V E Y O U R U
Message 4: U R I E R S T O P A D V I S E B Y R A D
6 2 6 7 6 5 5 4 5 4 4 4 2 3 1 3 0 1 1 3
4 3 1 0 7 2 8 3 5 0 9 6 0 7 1 4 8 7 4 1
Message 1: P W E N E E D C O U N T E R F I R E S T
Message 2: S O N N E L T O R E M O V E M I N E S S
Message 3: N I T H E R E T O M O R R O W F O R M E
Message 4: I O W H E N Y O U H A V E R E C E I V E
0 8 0 8 2
5 5 2 2 8
Message 1: O P X X X
Message 2: T O P X X
Message 3: E T I N G
Message 4: D I T X X
79 76 72 25 63 22 60 69 66 51 57 42 54 39 48 45 19 36 10
33 07 16 13 30 04 84 01 81 27 24 62 78 74 75 71 59 56 41
68 53 65 50 38 35 09 47 21 44 18 06 03 83 15 32 12 29 80
77 73 26 64 23 61 70 67 52 58 43 55 40 49 46 20 37 11 34
08 17 14 31 05 85 02 82 28
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19
79 76 72 25 63 22 60 69 66 51 57 42 54 39 48 45 19 36 10
20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
33 07 16 13 30 04 84 01 81 27 24 62 78 74 75 71 59 56 41
39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
68 53 65 50 38 35 09 47 21 44 18 06 03 83 15 32 12 29 80
58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76
77 73 26 64 23 61 70 67 52 58 43 55 40 49 46 20 37 11 34
77 78 79 80 81 82 83 84 85
08 17 14 31 05 85 02 82 28
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19
27 83 51 25 81 50 21 77 45 19 75 55 23 79 53 22 78 49 17
20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
73 47 06 62 30 04 60 29 85 56 24 80 54 20 76 44 18 74 43
39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
14 70 38 12 68 48 16 72 46 15 71 42 10 66 40 13 69 37 11
58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76
67 36 07 63 31 05 61 41 09 65 39 08 64 35 03 59 33 34 02
77 78 79 80 81 82 83 84 85
58 32 01 57 28 84 52 26 82
+56 -32 -26 +56 -31 -29 +56 -32 -26 +56 -20 -32 +56 -26
-31 +56 -29 -32 +56 -26 -41 +56 -32 -26 +56 -31 +56 -29
-32 +56 -26 -34 +56 -32 -26 +56 -31 -29 +56 -32 -26 +56
-20 -32 +56 -26 -31 +56 -29 -32 +56 -26 -27 +56 -32 -26
+56 -31 -29 +56 -32 -26 +56 -20 -32 +56 -26 -31 +56 -29
-32 +56 -26 +01 -32 +56 -26 -31 +56 -29 +56 -32 -26 +56
27 83 51 25 81 50 21 77 45 19 75 55 23 79 53 22 78 49 17
20 76 44 18 74 43 14 70 38 12 68 48 16 72 46 15 71 42 10
-------------------------------------------------------
07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07
20 76 44 18 74 43 14 70 38 12 68 48 16 72 46 15 71 42 10
13 69 37 11 67 36 07 63 31 05 61 41 09 65 39 08 64 35 03
-------------------------------------------------------
07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07
Setting up R-1:
-------------------
01 02 03 04 05 06 07
08 09 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 32 33 34 35
36 37 38 39 40 41 42
43 44 45 46 47 48 49
50 51 52 53 54 55 56
57 58 59 60 61 62 63
64 65 66 67 68 69 70
71 72 73 74 75 76 77
78 79 80 81 82 83 84
85
27 83 51 25 81 50 21 77 45 19 75
1
6 13 20 27 34 41 48 55
62 69 76 83 02 09 16 23
30 37 44 51
25
81
50
21
85 = 3 - 10's
5 - 11's
04 02 06 03 07 01 05 K-1 =7
-------------------
01 02 03 04 05 06 07
08 09 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 32 33 34 35
36 37 38 39 40 41 42
43 44 45 46 47 48 49
50 51 52 53 54 55 56
57 58 59 60 61 62 63
64 65 66 67 68 69 70
71 72 73 74 75 76 77
78 79 80 81 82 83 84
85
3 6 4 1 8 7 5 2
----------------------
6 13 20 27 34 41 48 55
62 69 76 83 02 09 16 23
30 37 44 51 58 65 72 79
04 11 18 25 32 39 46 53
60 67 74 81 01 08 15 22
29 36 43 50 57 64 71 78
85 07 14 21 28 35 42 49
56 63 70 77 84 03 10 17
24 31 38 45 52 59 66 73
80 05 12 19 26 33 40 47
54 61 68 75 82
K-1 = 9
Analysis:
D-1 T-2 H-3 I-4 S-5 E-6 R-7 T-8 R-9 S-10
O-11 U-12 E-13 S-14 T-15 R-16 R-17 T-18 E-19 R-20
N-21 M-22 N-23 C-24 T-25 O-26 D-27 A-28 N-29 O-30
T-31 O-32 C-33 F-34 O-35 A-36 R-37 T-38 P-39 N-40
O-41 E-42 X-43 O-44 S-45 V-46 W-47 M-48 U-49 W-50
O-51 D-52 P-53 O-54 D-55 E-56 C-57 N-58 E-59 Q-60
A-61 P-62 T-63 I-64 T-65 A-66 M-67 I-68 I-69 F-70
C-71 A-72 E-73 N-74 A-75 S-76 W-77 M-78 C-79 C-80
A-81 I-82 L-83 A-84 O-85 O-86 I-87 M-88 O-89 T-90
D-91 A-92 J-93 L-94 G-95 N-96 R-97 F-98 O-99 Z-100
S-01 P-02 U-03 O-04 O-05 R-06 T-07 T-08 E-09 O-110
E-11 B-12 R-13 R-14 O-15 I-16 N-17 N-18 E- 119
(119)
A 28 36 61 66 72 75 81 84 92
B 112
C 24 33 57 71 79 80
D 01 27 52 55 91
E 06 13 19 42 56 59 73 109 111 119
F 34 70 98
G 95
H 03
I 04 64 68 69 82 87 116
J 93
K
L 83 94
M 22 48 67 78 88
N 21 23 29 40 58 74 96 117 118
O 11 26 30 32 35 41 44 51 54 85 86 89 99 104 105 110 115
P 39 53 62 102
Q 60
R 07 09 16 17 20 37 97 106 113 114
S 05 10 14 45 76 101
T 02 08 15 18 25 31 38 63 65 90 107 108
U 12 49 103
V 46
W 47 50 77
X 43
Y
Z 100
1 2 3 4 5 6 7 8 9
-----------------
R O A D J U N C T
I O N Q U E B E C
F O X T R O T T W
O F I V E E I G H
T Z E R O
P P
O N
D O
E E
C X
N O
E S
D Q T V R
A W
P M
T U
I W
T O
A D
M P
K-2 = 8
1] 119 = 7 - 15's
1 - 14
K-2 = 9
2] 119 = 2 - 14's
7 - 13's
H= 03
1 2 3 4 5 6 7 8
T O S Q A T
D R T V A S D O
T R O W P W A R
H T C M T M J T
I E F U I C L T
S R O W T C G E
E N A O A A N O
R M R D M I R E
T N T P I L F B
R C P O I A O R
S T N D F O Z R
O O O E C O S O
U D E C A I P I
E A X N E M U N
S N O E N O O N
T O S Q A T O E
8 3 6 1 5 7 4 2
O T A D Q T V R
R O S T A D W T
T C W H P A M E
T F M I T J U R
E O C S I L W N
O A C E T G O M
E R A R A N D N
B T I T M R P C
R P L R I F O T
R N A S I O D O
O O O O F Z E D
I E O U C S C A
N X I E A P N N
N O M S E U E O
E S O T N O Q
1 2 3 4 5 6 7 8 9
-----------------
- O U R F O R W A
R D C O M M A N D
P O S T I S N O W
L O C A T E D A T
R O A D J U N C T
I O N Q U E B E C
F O X T R O T T W
0 F I V E E I G H
T Z E R O S T O P
R E A R C O M M A
N D P O S T R E M
A I N S I N P R E
S E N T L O C A T
I O N - - - - - -
Wayne's Contribution To Cryptography - Solution that
Requires No Known Plaintext Crib.
3 2 1 5 4 K-1 = 5
--------------
1 2 3 4 5
6 7 8 9 10
11 12 13 14 15
16 17 18 19 20
R-1 21 22 23 24 25
26 27 28 29 30
31 32 33 34 35 13 X 5 matrix
36 37 38 39 40
41 42 43 44 45
46 47 48 49 50
51 52 53 54 55
56 57 58 59 60
61 62 63 - -
63 = 3 @ 13 long
2 @ 12 short
and
3 2 4 1 K-2 =4
-----------
03 08 13 18
23 28 33 38
43 48 53 58
63 02 07 12
17 22 27 32
37 42 47 52 16 X 4 matrix
57 62 01 06
R-2 11 16 21 26
31 36 41 46 63 = 3 @ 16 long
51 56 61 05 1 @ 15 short
10 15 20 25
30 35 40 45
50 55 60 04
09 14 19 24
29 34 39 44
49 54 59 -
Ciphertext:
18 38 58 12 32 52 06 26 46 05 25 45 04 24 44
08 28 48 02 22 42 62 16 36 56 15 35 55 14 34
54 03 23 43 63 17 37 57 11 31 51 10 30 50 09
29 49 13 33 53 07 27 47 01 21 41 61 20 40 60
19 39 59 (63)
18 07 11 05 04 03 17 06 15 14 13 02 16 10 09 08 12 01 20 19
-----------------------------------------------------------
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
61 62 63
Ciphertext:
18 38 58 12 32 52 06 26 46 05 25 45 04 24 44
08 28 48 02 22 42 62 16 36 56 15 35 55 14 34
54 03 23 43 63 17 37 57 11 31 51 10 30 50 09
29 49 13 33 53 07 27 47 01 21 41 61 20 40 60
19 39 59 (63)
matrix = 4 X 20
63 = 3 long @ 4
17 short @ 3
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17
18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34
35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
52 53 54 55 56 57 58 59 60 61 62 63
Ciphertext:
18 38 58 12 32 52 06 26 46 05 25 45 04 24 44
08 28 48 02 22 42 62 16 36 56 15 35 55 14 34
54 03 23 43 63 17 37 57 11 31 51 10 30 50 09
29 49 13 33 53 07 27 47 01 21 41 61 20 40 60
19 39 59 (63)
K-1: 3-2-1-5-4
K-2: 3-2-4-1
Equivalent Single
Transposition Key:
18 03 13 08 3
07 17 02 12 2
11 06 16 01 1 K-1
05 15 10 20 5
04 14 09 19 4
3 2 4 1
K-2
(mod 5)
18 03 13 08 3 3 3 3
07 17 02 12 2 2 2 2
11 06 16 01 1 1 1 1
05 15 10 20 5 5 5 5
04 14 09 19 4 4 4 4
18 - 03 = +15
03 - 13 = -10
13 - 08 = +05
08 - 18 = -10
4 1 3 2
2 4 1 3
3 2 4 1
1 3 2 4
1 3 2 4
Example:
Plain: L O N D O N C A L L I N G M
Key Text: T O B E O R N O T T O B E T
Shift: 20 15 2 5 15 18 14 15 20 20 15 2 5 20
Cipher: F D P I D F Q P F F X P L G
Plain: O S C O W W I T H U R G E N T
Key Text: H A T I S T H E Q U E S T I O
Shift: 8 1 20 9 19 20 8 5 17 21 5 19 20 9 15
Cipher: W T W X P Q Q Y Y P W Z Y W I
Plain: M E S S A G E
Key Text: N W H E T H E
Shift: 14 23 8 5 20 8 5
Cipher: A B A X U O J
HEADLINE PUZZLE
ARISTOCRATS
1. Naughty Words. K2
2. Be Flexible. K1
3. Crackerjack. K?
SIMPLE VARIANTS
3. Value System.
Solve.
PATRISTOCRATS
2. Orderly Words.
3. Oratory.
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: FORTITERINRESUAVITERINMODO
2. Handsome salary.
Ciphertext:
11 10 02 08 21 23 30 04 06 09 01 07 12 16 21 23 30 21 24
10 02 03 05 21
1. Business advice.
aigle
conversation
printemps
dehors
entendre
tuyau
parler
premier
ouvert
pied
voyager
ferme
vite
casuel
vert
oreille
acheter
apporter
chien
secret
quelque
savant
sale
profond
liste
violon
citron
BACONIAN
A - AAAAA N - ABBAA
B - AAAAB O - ABBAB
C - AAABA P - ABBBA
D - AAABB Q - ABBBB
E - AABAA R - BAAAA
F - AABAB S - BAAAB
G - AABBA T - BAABA
H - AABBB U/V - BAABB
I/J - ABAAA W - BABAA
K - ABAAB X - BABAB
L - ABABA Y - BABBA
M - ABABB Z - BABBB
1. Carpenters Rule.
1 2 1 1 1 1 1 1 4 2 2 1 1 2 5
1 5 1 3 2 5 3 3 1 5 1 6 1 6 1 2 1 2 1 3 2 2 1 1
ADFGX CIPHERS
E B O N Y
a d f g x S P A C E B R O W N
--------- --------- ---------
a |A F L Q V C |A B C D E W B |A B C D E
d |B G M R W O |F G H I K H L |F G H I K
f |C H N S X M |L M N O P I A |L M N O P
g |D I O T Y E |Q R S T U T C |Q R S T U
x |E K P U Z T |V W X Y Z E K |V W X Y Z
1. Cashless. [WALLET]
EO EE PN PO EE NY PM PN SO EE PM EM DE EN PO NN DM
SM DY PN PM DN NN NY DM PO SO DM EM EM DY PO PN NO
NY SO DY PE DY EO EE SM DY DE EE PM PE DN PE DY DE
NO PO DN DM PE DE PN.
EE IE TO TS EH GS TE GE ES IH TE GR GR TO IO EE IE
TO TH TO TR TS TE TE IE EH TS ES TO EE GH IS TO TS
TR TO IH TE RH ES TO EH IR GH EE ES ES EE TS GH EO
TO ES.
aa ff gf gg fd xa dg ff aa df xa ad gf dg gg fd gd
fg fa gd xf fd xa dg gd fg gg fd xa fa fd xa fa xd
xa dg da gf aa dg ga.
COLUMNAR TRANSPOSITIONS
1. Political Logic?
WSCCC SRTTE TIWTR EACFK HHTHH YDROT OPAAU USGOR
CEILO RYORW MONIN IOELE ELSMT NHTOC OOIOE ITDNH
NIHILIST TRANSPOSITIONS
2. Open 10 to 5.
Key = COVER.
RIDDLER'S Headliner:
Key -- MEGAZORD
Setting -- MORPH
Hat -- RANGERS
5 1 4 3 2 6 7
R A N G E R S
M E G A Z O R
D B C F H I J
K L N P Q S T
U V W X Y Z
E B L Y Z H Q Y A F P X G C N W M D K U O I S R J T
M M D K U O I S R J T E B L Y Z H Q Y A F P X G C N W
O O I S R J T E B L Y Z H Q Y A F P X G C N W M D K U
R R J T E B L Y Z H Q Y A F P X G C N W M D K U O I S
P P X G C N W M D K U O I S R J T E B L Y Z H Q Y A F
H H Q Y A F P X G C N W M D K U O I S R J T E B L Y Z
Aristocrats
Simple Variants
Patristocrats
Use the French Phrase " L' essentiel est invisible pour
les yeux."
L E S S E N T I E L E S T I N V I S I
33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15
B L E P O U R L E S Y E U X
14 13 12 11 10 09 08 07 06 05 04 03 02 01
POUR TES YEUX L'EST EST L'OUEST" = For your eyes the
East is the West.
Nulls
Baconian
ADFGX
Columnar Transpositions
Nihilist Transpositions
ON A PERSONAL NOTE
LANAKI
20 March 1997
30 JANUARY 1997
Revision 0
COPYRIGHT 1997
ALL RIGHTS RESERVED
LECTURE 23
COURSE NOTES
SUMMARY
RESOURCES
INTRODUCTION
BACKGROUND THEORY
1. INVERTIBLE TRANSFORMATIONS
Ek ; K n K
where K is the keyspace, which is of finite length, with
elements K1,K2...Kn. If M is the message space and C is
the cryptogram or ciphertext space, then the system must
have the following properties:
o enciphering algorithm
Ek: M -> C
_1
o there is an inverse algorithm Ek = Dk called the
decryption algorithm
Figure 21-1
Noisy Channel
noise
|
|
M ----------+------------> M'
sender receiver
K
Pm(C) = d P(K)
K,Ek(M) = C
Ek(M) = C
Pm(C) = P(C)
n
d p(Xi) = 1
i=1
n
H(x) = - d p(Xi) log2 p(Xi)
i=1
1
H(x) = - d p(X) log2 [-----]
X p(X)
r = H(X)/k
R = log2K
rl = limit Hn(M)/n
n ->l
l = infinity
Equivocation, defined as the conditional entropy of
message M given that ciphertext C has occurred, is:
_ _
| 1 |
Hc(M) = d P(C) d Pc (M) log2 | ---- |
C M |_ Pc(M) _|
_ _
| 1 |
Hc(K) = d P(C) d Pc (K) log2 | ---- |
C K |_ Pc(K) _|
It is given by:
H(K)
N w ------
D
8. MIXING TRANSFORMATIONS
Figure 23-1
Involution Example
A B C D E F
S1 B C D F G H
P1 H F G C D B
S2 I G H E F D
P2 G I E H D F
9. ITERATED CRYPTOSYSTEMS
|
|
|
ZDDDDDDDDDDDDDDDDDDDDDDDD?
3 Initial Permutation, IP3
@DDDDDDDDDDDDDDDDDDDDDDDDY
Standard |
Data |
Encryption |
Algorithm ZDDDDDDDDDDDDDDDDDD?
3 Product 3
DEA 3 Transformation 3
@DDDDDDDDDDDDDDDDDDY
|
|
|
ZDDDDDDDDDDDDDDDDDDD?
3 Inverse Initial 3
3 Permutation 3
3 IP -1 3
@DDDDDDDDDDDDDDDDDDDY
|
|
|
The three major steps for DEA are shown in Figure 23-2.
The IP and IP-1, are simple bit transpositions; the
product transformation is fairly complex. Product
transformations are successive applications of
substitution and transposition ciphers. Large blocks of
data are transformed as a unit, providing the advantage
of increasing the number of substitution and reordering
patterns. This is also called block ciphering.
Figure 23-3
One Iteration of DEA
ZDDDDDDDDDDDDDDDD? ZDDDDDDDDDDDDDDDD?
3 Li-1 3 3 Ri-1 3
@DDDDDDDDDDDDDDDDY @DDDDDDDDDDDDDDDDY
1,2,3 ..3 32 1,2,3 ...3 32
3 3
3 3
ZDD? ZDD? 3
3 q3<-------3 f3<-------- o
@DBY @DDY 3
3 ZDDDDDDDDDDDDDDDDDDDDY
3- 3---------------------o
ZDDDDDDDDDDDDDDDD? ZDDDDDDDDDADDDDDDDDDDD?
3 3 3 3
3 Li = Ri-1 3 3 Ri=Li-1(q)f(Ri-1,K1)3
@DDDDDDDDDDDDDDDDY @DDDDDDDDDDDDDDDDDDDDDY
1,2,3 ..3 32 1,2,3 ... 3 32
3 3
~ ~
12. COMPONENTS OF THE DATA ENCRYPTION ALGORITHM
Lets dissect the algorithm:
1 through 7
9 through 15
17 through 23
25 through 31
33 through 39
49 through 55
57 through 63
Figure 23-4
Key Schedule Calculations
[64-bit Key]
|
|
(permuted choice 1)
ZDDDDDDDDDDDDDDDDDDDDDDDDDDDD?
ZDDDDADDDD? ZDDDDADDDD?
3 C0 3 3 D0 3
@DDDDDDDDDY @DDDDDDDDDY
| |
[circular left [circular left
shift 1 place] shift 1 place]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C1 3 3 D1 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K1
| |
[circular left [circular left
shift 1 place] shift 1 place]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C2 3 3 D2 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K2
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C3 3 3 D3 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K3
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C4 3 3 D4 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K4
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C5 3 3 D5 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K5
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C6 3 3 D6 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K6
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C7 3 3 D7 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K7
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C8 3 3 D8 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K8
| |
| |
[circular left [circular left
shift 1 place ] shift 1 place ]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C9 3 3 D9 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2)
| | @DD>K9
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C10 3 3 D10 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2 )
| | @DD>K10
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C11 3 3 D11 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2 )
| | @DD>K11
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C12 3 3 D12 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2 )
| | @DD>K12
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C13 3 3 D13 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2 )
| | @DD>K13
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C14 3 3 D14 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2 )
| | @DD>K14
| |
| |
[circular left [circular left
shift 2 places] shift 2 places]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C15 3 3 D15 3
@DDDDDDDDDY @DDDDDDDDDY
| | | |
| -------------------------|-------->(permuted
| | choice 2 )
| | @DD>K15
| |
| |
[circular left [circular left
shift 1 place ] shift 1 place ]
| |
ZDDDDDDDDD? ZDDDDDDDDD?
3 C16 3 3 D16 3
@DDDDDDDDDY @DDDDDDDDDY
| |
---------------------------------->(permuted
choice 2 )
@DD>K16
Figure 23-5
Permuted Choice 1
to calculate C0 & D0
| |
| leftmost rightmost |
| bits bits |
(permuted choice 1)
| |
57 49 41 33 25 17 9 63 55 47 39 31 23 15
1 58 50 42 34 26 18 7 62 54 46 38 30 22
10 2 59 51 43 35 27 14 6 61 53 45 37 29
19 11 3 60 52 44 36 21 13 5 28 20 12 4
| |
| |
[ CO (28 bits) ] [ D0 (28 bits) ]
1 2 3 27 28 1 2 3 27 28
Figure 23-6
( Compression Permutation )
Permuted Choice 2
calculation of subkey Ki
| |
|----------o-----------|
|
|
14 17 11 24 1 5
3 28 15 6 21 10
23 19 12 4 26 8
16 7 27 20 13 2
41 52 31 37 47 55
30 40 51 45 33 48
44 49 39 56 34 53
46 42 50 36 29 32
|
|
[ Ki ]
1 2 3 48
<-48 bits->
q 0 0
---------
0 | 0 1
1 | 1 0
so for example: 1 0 0 1 0 1 1 0
q 1 1 0 1 0 0 1 1
---------------
= 0 1 0 0 0 1 0 1
15. CIPHER FUNCTION
Figure 23-7
Cipher Function
<-32 bits->
[ A ]
|
|
+
+
<-48 bits-> <-48 bits->
[ result ] [ Kn ]
3 3
3 3
@DDDDDDDDDDD q DDDDDDDDDDDY
|
|
ZDDDDDDD?
3 Si 3
3 S Box 3
@DDDDDDDY
|
<-32 bits-> <-32 bits->
[ A ] [ result ]
|
|
|
|
( f(A, Kn )
<- 32 bits ->
The selection function E, in Figure 23-8, yields a 48-
bit result wherein the bits of the result are
respectively 32,1,2,...1,.etc of the symbolic argument
A which may represent Ri or Li depending on the
function.
Figure 23-8
E Operation
(Expansion Permutation)
[ A ]
|
|
32 1 2 3 4 5
4 5 6 7 8 9
8 9 10 11 12 13
12 13 14 15 16 17
16 17 18 19 20 21
20 21 22 23 24 25
24 25 26 27 28 29
28 29 30 31 32 1
|
|
[ E result ]
<- 48 bits ->
16. S BOXES
S1(B1)S2(B2)S3(B3)S4(B4)S5(B5)S6(B6)S7(B7)S8(B8)
For example:
Input to S1
1 0 1 1 0 0
---
=2
-------
= 6
Table 23-1
S BOX MATRICES
S1
14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7
0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8
4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0
15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
S2
15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10
3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5
0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15
13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9
S3
10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8
13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1
13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7
1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12
S4
7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15
13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9
10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4
3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14
S5
2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9
14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6
4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14
11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3
S6
12 1 10 15 9 2 6 8 0 13 3 4 14 7 5 11
10 15 4 2 7 12 9 5 6 1 13 14 0 11 3 8
9 14 15 5 2 8 12 3 7 0 4 10 1 13 11 6
4 3 2 12 9 5 15 10 11 14 1 7 6 0 8 13
S7
4 11 2 14 15 0 8 13 3 12 9 7 5 10 6 1
13 0 11 7 4 9 1 10 14 3 5 12 2 15 8 6
1 4 11 13 12 3 7 14 10 15 6 8 0 5 9 2
6 11 13 8 1 4 10 7 9 5 0 15 14 2 3 12
S8
13 2 8 4 6 15 11 1 10 9 3 14 5 0 12 7
1 15 13 8 10 3 7 4 12 5 6 11 0 14 9 2
7 11 4 1 9 12 14 2 0 6 10 13 15 3 5 8
2 1 14 7 4 10 8 13 15 12 9 0 3 5 6 11
Figure 23-9
P Operation
Permutation Operation P of the Cipher Function
|
|
16 7 20 21
29 12 28 17
1 15 23 26
5 18 31 10
2 8 24 14
32 27 3 9
19 13 30 6
22 11 4 25
|
|
Figure 23-10
Preoutput Block
18. IP
Figure 23-11
IP
|
|
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8 IP
57 49 41 33 25 17 9 1 matrix
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7
|
|
| |
Figure 23-12
IP-1
|
|
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
38 6 46 14 54 22 62 30
37 5 45 13 53 21 61 29 IP-1
36 4 44 12 52 20 60 28 matrix
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25
|
|
Ln <-- Rn-1
Rn <-- Ln-1 (q) f(Rn-1, Kn)
(where: alt 241 = (q) is the symbol for XOR w/o the
circle around it as published elsewhere. XOR denotes a
bit-by-bit modulo-2 addition.)
Rn-1 <-- Ln
Ln-1 <-- Rn (q) f(Ln,Kn)
Table 23-2a
Commercial DES Chips
Table 23-2b
DES Speeds
http://www.rsa.com/rsalabs/97challenge/
Quote:
But assume you just get a campus with 150 Ultra Sparc
stations, where each can to 156250 keys per second. Any
student can then crack that 40 bit key in 23812 seconds
(on average), or otherwise said *in one night*. I can't
help but repeat: 40 bit keys are *worse* than no
encryption at all, as they give you a false feeling of
security. "
20 MARCH 1997
Revision 3
COPYRIGHT 1997
ALL RIGHTS RESERVED
-----------
Notes:
----------
[Blum] Blum, H., 1993, Gangland: How the FBI Broke the
Mob, Simon & Schuster, New York 1993.
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and
Sons, NY, 1982.
[KEY0] S-TUCK, " 5X5 Key Squares and How to Solve Them"
AS44, The Cryptogram, American Cryptogram
Association, 1944.
[WINJ] Winton, J., " Ultra at Sea: How Breaking the Nazi
Code Affected Allied Naval Strategy During WWII,"
New York, William Morror, 1988.
Digital Privacy
http://www-leland.stanford.edu/~phillin /red_paper.gif
http://www-pcd.stanford.edu/gifs/button.key.gif
http://www.ecst.csuchico.edu/~rodmur/docs/USConstitution
.html http://draco.centerline.com:8080/~franl/privacy/
http://www.house.gov/Constitution/Constitution.html
http://draco.centerline.com:8080/~franl/clipper/about-
clipper.html
Electronic Frontier Foundation
Electronic Frontier Foundation http://www-
leland.stanford.edu/~phillin/
http://rescomp.stanford.edu/~p weston/ptw.html
http://www.eff.org/
White House
http://www.whitehouse.gov/White_House/EOP/OVP/html
/GORE_Home.html
PGP
Phillip R. Zimmerman:
[email protected]
http://draco.centerline.com:8080/~franl/pgp/pgp-2.6.2-
doc1.html
http://draco.centerline.com:8080/~franl/pgp/
RIPEN
http://www.cs.indiana.edu/ripem/dir.html
Fourth Amendment
http://www.io.com/sjgames"
Free Speech
http://mirrors.yahoo.com/eff/speech.html
Cryptographic Algorithms
http://www.cs.hut.fi/ssh/crypto/algorithms.html
http://www.io.com/~ritter/
K-Theory
http://www.math.uiuc.edu/K-theory/
DES
ftp://ftp.uu.net/pub/security/des"
Complexity Theory & Cryptography
http://dimacs.rutgers.edu/SpecialYears/1990_1991/index
.html
Random Numbers
http://www.cs.berkeley.edu/~daw/netscape-
randomness.html
http://www.clark.net/pub/cme/html/ranno.html
http://www.cis.ohio-state.edu/htbin/rfc/rfc1750.html
http://www.ddj.com/ddj/1994/1994.11/index.htm
Netscape Hole
http://www.ddj.com/ddj/1996/1996 01/wagner.htm
U. of Cambridge
http://www.cl.cam.ac.uk:80/users/rja14/
Elliptical Curves
http://www.ama.caltech.edu/resources.html
ftp://ftp.mcs.com/mcsnet.users/eh.crypto
ftp://csua.berekely.edu/pub/cypherpunks/ciphers
ftp://ftp.datashopper.dk/pub/users/pethern/file/curve_e
ncrypt_22.sea.hqx
ftp://ftp.dsi.unimi.it/pub/security/crypt/code/curve_en
crypt_22.sea.hqx
http://vesta.physics.ucla.edu/~smolin/
http://eve.physics.ox.ac.uk/QCresearch/cryptoanalysis/q
c.html
http://eve.physics.ox.ac.uk/QChome.html
USS Pampanino
http://www.maritime.org/ecm2.shmtl
ftp://sable.ox.ac.uk/pub/math/cunningham/README
Primes
ftp://sable.ox.ac.uk/pub/math/primes">tables
University/Country Ref's
ftp://sable.ox.ac.uk/pub/math/primesrsa129/
ftp://furmint.nectar.cs.cmu.edu/security
http://weber.u.washington.edu/~phantom/cpunk/index.html
ftp://ftp.funet.fi/pub/crypt/cypherpunks
ftp://ftp.psy.uq.oz.au/pub/Crypto
ftp.psy.uq.oz.au/pub/Crypto
ftp://ftp.wimsey.bc.ca/pub/crypto
http://clipper.uvic.ca/crypt
ftp://pgp.rasip.fer.hr
ftp://ftp.datashopper.dk/pub/users/pethern
ftp://ftp.funet.fi/pub/crypt
ftp://garbo.uwasa.fi/pc/security
http://www.cs.hut.fi/ssh/crypto
http://www.cnam.fr/Network/Crypto
ftp://ftp.darmstadt.gmd.de/pub/crypto
ftp://ftp.informatik.uni-hildesheim.de/pub/security/
ftp://ftp.uni-stuttgart.de/pub/doc/security/crypto/
http://www.thur.de/ulf/krypto/index.html
ftp://ftp.informatik.uni-hamburg.de/pub/pgp
ftp://ftp.informatik.uni-hamburg.de/pub/crypt
http://www.cert.dfn.de/eng
ftp://ftp.kfki.hu/pub/packages/security
ftp://ftp.dsi.unimi.it/pub/security/crypt
ftp://utopia.hacktic.nl/pub/replay/pub/disk/
ftp://ftp.unit.no/pub/unix/security
ftp://ftp.kiae.su/unix/crypto
ftp://ftp.sunet.se/pub/security/tools/crypt
ftp://ftp.ox.ac.uk/pub/crypto
ftp://FTP.CSN.ORG/mpj/README
http://www.eff.org/pub/ Net_info/Tools/Crypto/
ftp://ftp.eff.org/pub/Net_info/Tools/Crypto/
RIPEM
ftp://ripem.msu.edu/pub/
ftp://ftp.infonexus.com/pub/
http://ftpsearch.unit.no/ftpsearch/
Bibliographies
http://mnementh.cs.adfa.oz.au/htbin/bib_lpb
http://glimpse.cs.arizona.edu/bib/
http://glimpse.cs.arizon a.edu/cgi-bin/biblio?
query1=cryptography&query2 =&query3=&case=on&error
s=0&maxfiles=200&maxlines=5000
http://liinwww.ira.uka.de/bibliograph y/index.html"
ftp://ftp.doc.ic.ac.uk/computing/bibliographies/Karlsru
he/index.html
http://liinwww.ira.uka.de/bibliography/Theory/crypto.se
curity.html
"ftp://ftp.doc.ic.ac.uk/computing/bibliographies
/Karlsruhe/Theory/computational.number.theory.html
http://theory.lcs.mit.edu/~rivest/homepage.html
http://theory.lcs.mit.edu/~rivest/crypto.bib
http://theory.lcs.mit.edu/~rivest/algorithms2.bib
Crypto Reports
http://www.cs.waikato.ac.nz/~sirvine
http://bibd.unl.edu/~stinson/acbib.html
http://bibd.unl.edu/~stinson/ssbib.html
http://triode.apana.org.au:8080/~cskinner/cybanim.html
http://www.isse.gmu.edu/~csis/bibliography/ref_essays.ht
ml
http://www.cs.purdue.edu/coast/archive/data/category_in
dex.html
ftp://coast.cs.purdue.edu/pub/doc/cryptography/
http://www.cs.purdue.edu/coast/archive/data/categ12.html
http://ww w.zblmath.fiz-karlsruhe.de/cgi-bin/LNCS-500-
1000" http://www.zblmath.fiz-karlsruhe.de/cgi-
bin/LNCS-500-1000??
au=&ti=&co=&so=&bi=cryptography&M=40
http://avalon.ira.uka.de/eiss/EISS-Reports/index.html
http://avalon.ira.uka.de/eiss/indexe.html
http://www.ens.fr/~grecc/papers.html
http://www.ens.fr/~grecc/index_en.html
http://www.ul b.ac.be/di/scsi/defscsi.html
http://www.isse.gmu.edu/~csis/jcs.html
http://www.tis.com/Home/DataSecurityLetter.html
http://www.byte.com/
http://www.quad ralay.com/www/Crypt/General/crypto-
journals.html
http://www.itd.nrl.navy.mil/ITD/5540/iee e/cipher/
http://www.computer.org
ftp://ftp.cl.cam.ac.uk/users/rja14/
http://www.rsa.com/rsalabs/cryptobytes
http://www2.indigo-net.com/Indigo/Indigo.html
http://www.privacy.org/alert/
gopher://ns1.infor.com/
gopher://ns1.infor.com/77/.bin/s_kw?cryptography
http://www.aegeanpress.com/books/
http://www.wiley.com/
http://www.openmarket.com/info/cryptography/applied_cry
ptography.html
http://www.crcpress.com/PRODS/8521.HTM
http://www.crcpress.com/
http://bibd.unl.edu/~stinson/ssbib.html
http://bibd.unl.edu/~stinson/acbib.html
http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-
source.html
http://www-mitpress.mit.edu/
http://www.springer-ny.com/
http://julmara.ce.chalmers.se/Security/
http://theory.l cs.mit.edu/~dmjones/hbp/
http://www.cs.indiana.edu/cstr/search
http://www.kreonet.re.kr/AC96/AC96.html
http://www.cl.cam.ac.uk/users/rja14/ihws.html
http://www.informatik.uni-
hildesheim.de/~sirene/conf/Programme/96051216.Eurocrypt9
6
http://www.cl.cam.ac.uk/users/rja14/cp.html
http://www.cl.cam.ac.uk/users/rja14/fse.html
http://www.rsa.com/rsa/conf96/brochure.htm
http://www.cl.cam.ac.uk/users/rja14 /ini.html
ftp://ftp.cl.cam.ac.uk:/users/rja14/queensland.ps.Z
http://www.isse.gmu.edu/~csis/acsac/acsac96-cfp.html
http://www.cci.de/its/cfp-ifip96.html
http://www.itd.nrl.navy.mil/ITD/5540/acm/new-
paradigms.html
http://newark.rutgers.edu/~atluri/atma.html
http://www.isse.gmu.edu/~csis/acsac/acsac95.html
http://csrc.ncsl.nist.gov/ events/
Advanced Surveillance Technologies
http://www.privacy.org/pi/conference/
http://www.cs.pdx.edu/SP96
Intellectual Property Protection in the Global
Information Infrastructure
http://www.nla.gov.au/gii/oecdconf.html
http://www.privacy.org/pi/conference/
FBI Ban
http://www.epic.org/crypto/ban/fbi_dox/
Laws
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm
http://www.epic.org/cr ypto/legislation/s1587.html
http://www.vtw.org/
http://www.epic.org/crypto/legislation/s1587_analysis.ht
ml http://www.law.miami.edu/~froomkin/personal-u se.txt"
ftp://ftp.cygnus.com/pub/export/itar.in.full
http://www.pls.com:8001/his/usc.html
http://www.epic.org/crypto/
http://www.eff.org/pub/Privacy/ITAR_export/
http://www.qualcomm.com/people/pkarn/export/index.html
http://ssdc.ucsd.edu/gpo/"
http://www.io.org/~samwise/crypto/Introduction.html
http://www.us.net/~steptoe/
http://world.std.com/~franl/crypto.html
Government
http://ana.arc.nasa.gov/usps/
http://www.cse.dnd.ca/
http://www.itd.nrl.navy.mil/ITD/">NRL-ITD
http://infosec.nosc.mil/infosec.html">Navy INFOSEC
http://hightop.nrl.navy.mil/rainbow.html
http://www.users.interport.net/~sagal/ajax.html
http://www.fbi.gov/
DECA program: (Development of Espionage, Counterin
telligence & Counterterrorism Awareness) deals with
economic, industrial, and technological intelligence
gathering
"http://www.fbi.gov/deca.htm
ON-LINE COURSES
-----------------
Volume II presents Lectures 11 - 20 (of a total of
twenty five) from Mr. Nichols' extremely successful
course in Classical Cryptography taught in 1995 and 1996
to 461 students via the Internet and regular mail.
BOOK REVIEWS
-----------------
For orders or Information Contact: Aegean Park Press,
P.O. Box 2837, Laguna Hills, Ca. 92654. Telephone: 1-
800-736-3587; Fax: 1-714-586-8269. Group discounts
available. WWW Web site: http://www.halcyon.com/books/