Lesson 3: Substitutions With Variants Part II: Multiliteral Substitution

                 CLASSICAL CRYPTOGRAPHY COURSE
                           BY LANAKI
                       November 13, 1995
                           Revision 1

                           LECTURE 3
               SUBSTITUTION WITH VARIANTS PART II
                   MULTILITERAL SUBSTITUTION


SUMMARY

In Lecture 3, we continue our look into substitution ciphers,
and move into the multiliteral substitution case, we field more
tools for cryptanalysis, look at some fascinating historical
variations, we review "the unbreakable cipher" and solve
homework problems.


MULTILITERAL SUBSTITUTION WITH SINGLE-EQUIVALENT CIPHER
ALPHABETS

Monoalphabetic substitution methods are classified as
uniliteral and multiliteral systems.   Uniliteral systems
maintain a strict one-to-one correspondence between the length
of the units of the plain and those of the cipher text.  Each
letter of plain text is replaced by a single character in the
cipher text.  In multiliteral monoalphabetic substitution
systems, this correspondence is no longer one plain to one
cipher but may be one plain to two cipher, where each letter of
the plain text is replaced by two characters in the cipher
text; or one plain to three cipher, where a three-character
combination in the cipher text represents a single letter of
the plain text.  We refer to these systems as uniliteral,
biliteral, and triliteral, respectively.   Ciphers in which one
plain text letter is represented by cipher characters of two or
more elements are classed as multiliteral.   [FR1], [FR2],
[FR5]

BILITERAL CIPHERS

Friedman gives some interesting examples of biliteral
monoalphabetic substitution.  [FR1]    Many cipher systems
start with a geometric shape.  Using the square in Figure 3-1,

                      W   H   I   T   E
                   .......................
                  W . A   B   C   D   E
                    .
                  H . F   G   H  IJ   K
                    .
                  I . L   M   N   O   P
                    .
                  T . Q   R   S   T   U
                    .
                  E . V   W   X   Y   Z
                       Figure 3-1

We derive the following cipher alphabet:


  Plain :  a  b  c  d  e  f  g  h  i  j  k  l  m
  Cipher: WW WH WI WT WE HW HH HI HT HT HE IW IH

  Plain :  n  o  p  q  r  s  t  u  v  w  x  y  z
  Cipher: II IT IE TW TH TI TT TE EW EH EI ET EE

The alphabet derived from the cipher square or matrix is
referenced by row and column coordinates, respectively.

The key to this system is that when a message is enciphered by
this biliteral alphabet, the cryptogram is still monoalphabetic
in character.  A frequency distribution based upon pairs of
letters will have all the characteristics of a simple
uniliteral distribution for a monoalphabetic substitution
cipher.

Numbers can be used as effectively as letters in the biliteral
cipher.  The simplest form is A=01, B=02, C=03,...Z=26.  So,
the plain text letters have as their equivalents two-digit
numbers indicating their position in the normal alphabet.

Other dinome (two digit) cipher matrices are previewed:

            1  2  3  4  5  6  7  8  9  0
         .................................    Figure 3-2
      1  .  A  B  C  D  E  F  G  H  I  J
      2  .  K  L  M  N  O  P  Q  R  S  T
      3  .  U  V  W  X  Y  Z  .  ,  :  ;

Note that frequently-used punctuation marks can be enciphered
in the above matrix.

Another four examples are:

          Figure 3-3                     Figure 3-4

       5  6  7  8  9  0          1  2  3  4  5  6  7  8  9
     ....................      ............................
  1  . A  B  C  D  E  F      1 . A  B  C  D  E  F  G  H  I
  2  . G  H IJ  K  L  M      2 . J  K  L  M  N  O  P  Q  R
  3  . N  O  P  Q  R  S      3 . S  T  U  V  W  X  Y  Z  *
  4  . T UV  W  X  Y  Z

          Figure 3-5                     Figure 3-6

     M  U  N  I  C  H            A  B  C  D  E  F  G  H  I
    ....................       .............................
  B .A  7  E  5  R  M        A . A  D  G  J  M  P  S  V  Y
  E .G  1  N  Y  B  2        B . B  E  H  K  N  Q  T  W  Z
  R .C  3  D  4  F  6        C . C  F  I  L  O  R  U  X  1
  L .H  8  I  9  J  0        D . 2  3  4  5  6  7  8  9  0
  I .K  L  O  P  Q  S
  N .T  U  V  W  X  Z


It is possible to generate false or pseudo-code or artificial
code language by using an enciphering matrix with vowels as row
indicators and consonants as column indicators.



                    Figure 3-7

                   B  C  D  F  G
                   ..............
               A . A  B  C  D  E
               E . F  G  H IJ  K
               I . L  M  N  O  P
               O . Q  R  S  T  U
               U . V  W  X  Y  Z


Enciphering the word RAIDS  would be OCABE  FAFOD. [FR5]

Another subterfuge used to camouflage the biliteral cipher
matrix is to append a third character to the row or column
indicator.  This third character may be produced through the
use of cipher matrix shown in Figure 3-8 (wherein A=611,
B=612, etc.) or the third character can be the "sum checking"
digit which is the non-carrying sum (modulo 10) of the
preceding two digits such as trinomes 257, 831, and 662.  It
may also involve self summing groups such as 254, 830, 669 all
which sum to the constant 1, or finally the third digit can be
random, inserted solely for the pleasure of the cryptanalyst.


                        Figure 3-8

                        1  2  3  4  5
                     ..................
                 61  .  A  B  C  D  E
                 72  .  F  G  H IJ  K
                 83  .  L  M  N  O  P
                 94  .  Q  R  S  T  U
                 05  .  V  W  X  Y  Z

                A=611 ,  B=612    X=053



All the above matrices are bipartite.  They can be divided into
two separate parts that can be clearly and cleanly defined by
row and column indicators.  This is the primary weakness of
this type of cipher.           [FR1]

Sinkov presents a good description of the modulo arithmetic
required to solve biliteral cipher challenges.  [SINK]  A more
involved look at the statistics involved can be found in
[CULL].




BILITERAL BUT NOT BIPARTITE

Consider the following cipher matrix:




                         Figure 3-9

                        1  2  3  4  5
                     ..................
                 09  .  H  Y  D  R  A
                 15  .  U  L  IJ C  B
                 21  .  E  F  G  K  M
                 27  .  N  O  P  Q  S
                 33  .  T  V  W  X  Z


We can produce a biliteral cipher alphabet in which the
equivalent for any letter in the matrix is the sum of the two
coordinates which indicate its cell in the matrix:

Plain      A   B   C   D   E   F   G   H   I   J   K   L   M
Cipher    14  20  19  12  22  23  24  10  18  18  25  17  26

Plain      N   O   P   Q   R   S   T   U   V   W   X   Y   Z
Cipher    28  29  30  31  13  32  34  16  35  36  37  11  38

          A = 9+5 =14,  E = 21 + 1 =22

The cipher units are biliteral but they are not bipartite.
Cipher text equivalent of plain text letter "A" is 14 and
digits 1 and 4 have no meaning per se.  Plain text letters
whose cipher equivalents begin with 1 may be found in two
different rows of the matrix and those of whose equivalents end
in 4 appear in three different columns.  [FR1]

Another possibility lends itself to certain multiliteral
ciphers in the use of a word spacer or word separator.  The
word space might be represented by a value in the matrix;
i.e., the separator is enciphered as a value (dinome 39 in
Figure 3-4).  The word space might be an unenciphered element.

Lets break from the theory and look at four interesting
multiliteral historical ciphers before discussing the general
cryptanalytic attack on the multiliteral cipher.

TRITHEMIAN

The abbot Trithemius, born Johann von Heydenberg (1462-1516)
invented one of the first multiliteral ciphers.  It was
fashioned similar to the Baconian Cipher and was a means for
disguising secret text.  His work "Steganographia" published in
1499 describes several systems of 'covered writing.'  [TRIT]
[WATS], [FR1]   The science of steganography is named after
him.  Several Internet discussion groups currently discuss the
use of steganography to hide messages in graphics files. (.GIF
files)


His alphabet, modified to include 26 letters of present-day
English, is shown in Figure 3-10, below;  it consists of all
the permutations of three things taken three at a time or
3 ** 3 = 27 in all.



                   Figure 3-10


A - 111    G - 131     M - 221     S - 311    Y - 331
B - 112    H - 132     N - 222     T - 312    Z - 332
C - 113    I - 133     O - 223     U - 313    * - 333
D - 121    J - 211     P - 231     V - 321
E - 122    K - 212     Q - 232     W - 322
F - 123    L - 213     R - 233     X - 323


The cipher text does not have to be restricted to digits; any
groupings of three things taken three at a time will do.


BACON

Sir Francis Bacon (1561-1626) invented a cipher in which the
cipher equivalents are five-letter groups and the resulting
cipher is monoalphabetic in character.  Bacon uses a 24 letter
cipher with I and J, U and W used interchangeably.


       A =  aaaaa      I/J  = abaaa       R  = baaaa
       B =  aaaab       K   = abaab       S  = baaab
       C =  aaaba       L   = ababa       T  = baaba
       D =  aaabb       M   = ababb      U/V = baabb
       E =  aabaa       N   = abbaa       W  = babaa
       F =  aabab       O   = abbab       X  = babab
       G =  aabba       P   = abbba       Y  = babba
       H =  aabbb       Q   = abbbb       Z  = babbb

Bacon described the steganographic effect of message enfolding
in an innocent external message.   Suppose we let capitals be
the "a" element and lower-case letters represent the "b"
elements.   The message "All is well with me today" can be made
to convey the message "Help."   Thus,



    A  L  l  i  s    W E l L   W    I t H  m E   T o d a Y
    a  a  b  b  b    a a b a   a    a b a  b a   a b b b a

          H              E              l            P

Bacon describes many several variations on the theme.  [FR1],
[DEAU]    Note the regularity of construction of Bacon's
biliteral alphabet, a feature which permits its reconstruction
from memory.

HAYES CIPHERS

Probably the most corrupt political election occurred on
November 7, 1876 with the election of President Rutherford B.
Hayes (Republican).  He defeated Samuel Jones Tilden
(Democrat).  Tilden had won the popular vote by 700,000 votes
but because of frauds surrounding the electoral college, he was
deprived of the high office of President.  Actual both
candidates were involved with bribery, election tampering,
voter fraud, conspiracy and a host of other goodies.  Tilden
ran on a law and order ticket that credited him with convicting
Boss Tweed and the Tweed Ring in New York City, which
controlled the city through Tammany Hall.  For two years into
Hayes Presidency, the scandals persisted.

With the help of New York Tribune, Republicans finished the
Tilden 'honesty' horse.  They published the Tilden Ciphers and
keys.  There were about 400 of them representing substitution
and transposition forms.  We will revisit the transposition
forms at a later juncture.  They represented secret and illegal
operations by Tilden's men in Florida, Louisiana, South
Carolina and Oregon.   The decipherments were done by
investigators of the Tribune.  Here are two examples and their
solution.  [TILD] , [FR1] , [TRIB]


GEO. F. RANEY, Tallahassee.

P P Y Y E M N S N Y Y Y P I M A S H N S Y Y S S I T E P A A E
N S H N S P E N N S S H N S M M P I Y Y S N P P Y E A A P I E
I S S Y E S H A I N S S S P E E I Y Y S H N Y N S S S Y E P I
A A N Y I T N S S H Y Y S P Y Y P I N S Y Y S S I T E M E I P
I M M E I S S E I Y Y E I S S I T E I E P Y Y P E E I A A S S
I M A A Y E S P N S Y Y I A N S S S E I S S M M P P N S P I N
S S N P I N S I M I M Y Y I T E M Y Y S S P E Y Y M M N S Y Y S
S I T S P Y Y P E E P P P M A A A Y Y P I I T

L' Engle goes up tomorrow.                     Daniel

Examination of the message discloses a bipartite alphabet
cipher with only ten different letters used.  Dividing the
messages by twos, assigning arbitrary letters for pairs of
letters and performing a triliteral frequency distribution will
yield a solution.

    PP  YY  EM  NS  NY  YY  PI  MA  SH  NS  YY  SS  etc

    A   B   C   D   E   B   F   G   H   D   B   I   etc


Message reads:

Have Marble and Coyle telegraph for influential men from
Delaware and Virginia.  Indications of weakening here.  Press
advantage and watch board.



Here is another Tilden cipher using numerical substitutes:

S. PASCO AND E. M. L'ENGLE

84  55  84  25  93  34  82  31  31  75  93  82  77  33  55  42

93  20  93  66  77  66  33  84  66  31  31  93  20  82  33  66

52  48  44  55  42  82  48  89  42  93  31  82  66  75  31  93

                                             DANIEL


There were several messages of this type.  They  disclosed that
only 26 different numbers were used.

Message reads:

Cocke will be ignored, Eagan called in.  Authority reliable.

The Tribute experts gave the following alphabets:


AA = O   EN = Y   IT = D   NS = E   PP = H   SS = N
AI = U   EP = C   MA = B   NY = M   SH = L   YE = F
EI = I   IA = K   MM = G   PE = T   SN = P   YI = X
EM = V   IM = S   NN = J   PI = R   SP = W   YY = A
-------------------------------------------------------
20 = D   33 = N   44 = H   62 = X   77 = G   89 = Y
25 = K   34 = W   48 = T   66 = A   82 = I   93 = E
27 = S   39 = P   52 = U   68 = F   84 = C   96 = M
31 = L   42 = R   55 = O   75 = B   87 = V   99 = J


William F. Friedman correlated these alphabets with the results
being amusing:



              H  I  S  P  A  Y  M  E  N  T
              1  2  3  4  5  6  7  8  9  0
            -------------------------------
      H 1 .                                .
      I 2 .               K     S        D .
      S 3 .   L     N  W              P    .
      P 4 .      R     H           T       .
      A 5 .      U        O                .
      Y 6 .      X           A     F       .
      M 7 .               B     G          .
      E 8 .      I     C        V     Y    .
      N 9 .         E        M        J    .
      T 0 .                                .
            ------------------------------

The blank squares may have contained proper names and money
designations.  Key = HISPAYMENT for bribary seems to be
appropriate.   [HIS1], [TRIB], [TILD], [FR1]

BLUE AND GREY

One of the most fascinating stories of the American Civil War
(1861-65) is about communications using flag telegraphy or also
known as the wigwag signal system.

Wigwag is a system of positioning a flag (or flags) at various
angles that indicate the corresponding twenty-six letters of
the alphabet.  It was created in the mid-1800s by three men
working at separate locations: Navy Captain Phillip Colomb and,
Army Captain Francis Bolton, in England, and Surgeon-inventor
Albert J. Meyer in America.   [WRIX]    Meyer observed the
railroad electromagnetic telegraph, developed by Alexander
Bain, and invented a touch method of communication for the deaf
and later the wigwag system.  He developed companion methods
with torches and disks.   The name "wigwag" derived from the
flag movements.

Three main color combinations were used in flags measuring two,
four and six feet square. The white banners had red square
centers while the black or red flags had white centers.  Myers
method required three motions (elements) to be used for each
letter.  The first position always initiated a message
sequence.  Motion one went from head to toe and back on right
side.  Motion 2 went from head to toe and back on left side.
Motion three went from head to toe and back in front of the
man.   Each motion made quickly.  Chart 3-1 indicates the
multiliteral alphabet and directional orders required to convey
a message.


                         Chart 3-1


 A  - 112       H  -  312        O  - 223       V  -  222
 B  - 121       I  -  213        P  - 313       W  -  311
 C  - 211       J  -  232        Q  - 131       X  -  321
 D  - 212       K  -  323        R  - 331       Y  -  111
 E  - 221       L  -  231        S  - 332       Z  -  113
 F  - 122       M  -  132        T  - 133
 G  - 123       N  -  322        U  - 233

Myers Signal Directions

3 - End of a word
33 - End of a sentence
333 - End of message
22.22.22.3 - Signal of assent. Message understood
22.22.22.333 - Cease signaling
121.121.121.3 - Repeat
212121.3 - Error
211.211.211.3 - Move a little to the right
221.221.221.3 - Move a little to the left





As the Civil War wore on, Myer increased the wigwag motions to
four.  This enabled more specialized words and abbreviations to
be used.  In 1864, Myer invented a similar daytime system with
disks.

For night signals, Myer applied his system with torches on the
signal poles and lanterns.  A foot torch was used as a
reference point.  Thus the direction of the flying wave could
better be seen.   Compare this to the semaphore system used by
ships at sea when radio silence is a must.

Myer continuously improved his invention through 1859 and
presented his findings gratis to the Union Army (which gave him
a luke warm yawn for his trouble).  Alexander Porter, his chief
assistant joined the Confederate Army and used the wigwag
system in actual combat.  Porter was able to warn Colonel
Nathan Evans at Manassas Junction - Stone Bridge that the Union
Army had reached Sudley Ford and was about to surprise General
Beauregard's best Division.  Porter sent from his observation
tower, the following message to Colonel Evans at the Stone
Bridge defenses: "Look out for your left, you are turned."

Colonel Evans turned his cannons and musket fire toward the
Federal troops before they could initiate their attack.  Porter
was credited later (and decorated) for his vigilance led to
changes in the tactics of the entire struggle around Manassas
Junction.  The application of the new signal system had
directly influenced the shocking Union defeat that eventful
July day.

Myers signaling system was catapulted into use at the Battle of
Gettysburg.  General Lee had invaded northern soil in June
1863.  His Potomac crossing was relayed by flag system to the
War Department.  General Joseph Hooker resigned under fire on
June 28.   General George Meade (of NSA grounds fame) took over
command of the Army of the Potomac.  His headquarters were at
Taneytown, MD.   Startling news came via signalmen on July 1.
A skirmish on the Maryland border indicated that General Buford
was facing a major force not in Maryland but in Pennsylvania.
Lee was himself in command at Gettysburg.  Signalmen of each
army unit sent out calls for help.  Reinforcements from dozens
of units several miles away were committed to the fray.  By
July 1, 73,000 gray and 88,000 blue met in one of history's
most decisive battles.  Rarely, if at all, do textbooks even
hint that the secret message system of flags affected these
history changing events.  Yet the crucial sightings by Union
observers  directly tipped the scales against Lee's best
tactics.  The most famous incident was when Captain Castle on
Cemetery Ridge, refused to submit to Confederate artillery
barrage as General George Pickett charged the "thin blue line",
used a wooden pole and a bedsheet to make a makeshift flag to
alert Union forces under General Meade who ordered counter-
measures.  Pickett's charge was stopped short of breaching the
Union lines.  General Lee's gamble failed.  Previously
disregarded flagmen enabled George Meade to enter the shrine of
heros.   [BLUE], [ANNA], [MYER], [NIBL], [TRAD], [WRIX], [KAHN]


FURTHER NOTES ON CRYPTANALYSIS OF MULTILITERAL CIPHERS

LIMITED CHARACTERS

Multiliteral ciphers are often recognized by the fact that the
cryptographic text is usually composed of but a very limited
number of different characters.  They are handled in the same
way as are uniliteral monoalphabetic substitution ciphers.  So
long as the same character or number is used to represent the
same plain text letter, and so long as a given letter of
plain text is always represented by the same character or
combination of characters, then the substitution is strictly
monoalphabetic and can be handled by methods in my Lectures 1
and 2.

BILITERAL CIPHERS

In the case of biliteral ciphers where the row and column
indicators are not identical, the direction of reading the
cipher pairs is chosen at will for each succeeding cipher pair,
and analysis of contacts of the letters comprising the cipher
pairs will disclose that there are two distinct families of
letters, and the cipher pair will never consist of two letters
of the same family.  We reduce by further substitution to
uniliteral terms and solve by known methods.

WORD SEPARATORS

If a multiliteral cipher  includes a provision for the
encipherment of a word separator, the cipher equivalent of this
word separator may be readily identified because it will have
the highest frequency of any cipher unit.


Friedman presents data on word separators:

For English, the average word length is 5.2 letters.  The word
separator will be close to 16% frequency.  [FR1]  The letters
of the alphabet take on new percentage frequencies as follows:

A - 6.2         J - 0.16         S -  5.1
B - 0.84        K - 0.25         T -  7.7
C - 2.6         L - 3.0          U -  2.2
D - 3.5         M - 2.1          V -  1.3
E - 11.0        N - 6.6          W -  1.3
F - 2.3         O - 6.3          X -  0.41
G - 1.3         P - 2.3          Y -  1.6
H - 2.9         Q - 0.25         Z -  0.08
I - 6.2         R - 6.4

On the other hand, if the word separator is a single character,
this character may be identified by its positional appearance
spaced 'wordlength-wise' in the cipher text and by the fact
that it never contacts itself.

It is advisable to reduce multiliteral cipher text to
uniliteral equivalents, especially if a triliteral frequency
distribution is made.  If not more than 36 combinations are
present in the cryptogram, the extra values over 26 may be
represented by digits for the purpose of reduction.  For more
than 36 groups, cipher text can be attacked in multiliteral
groupings.

ANAGRAMING

One of the first steps to solving a multiliteral cipher with a
cipher matrix, is to anagram the letters comprising the row and
column indicators in an attempt to disclose the key words used.
When the anagraming process does disclose any key word(s), a
skeleton reconstruction matrix which is the duplicate of the
original enciphering matrix is made to show the order of the
row and column indicators.  Partial recovery of plain text may
be possible at this point in the analysis.  Looking at the
frequency analysis (and location of the crests and troughs) may
tell us something about the enciphering alphabet as normal or
keyed.

NUMERICAL CIPHERS

Cipher alphabets whose cipher components consist of numbers are
practicable for telegraph or radio transmission.  They may take
forms corresponding to those employing letters.


Standard numerical cipher alphabets are those in which the
cipher component is a normal sequence of numbers.


Plain  -  A   B   C   D   E   F   G   H   I   J   K   L   M
Cipher - 11  12  13  14  15  16  17  18  19  20  21  22  23


Plain  -  N   O   P   Q   R   S   T   U   V   W   X   Y   Z
Cipher - 24  25  26  27  28  29  30  31  32  33  34  35  36


We could easily have started the cipher alphabet with A= 01,
B=02,..., Z=26 with the same results.

Mixed numerical cipher alphabets are those that have been keyed
by a key word turned into numerical cipher equivalents or have
a random combination of two or more digits for each letter of
plain text.


Plain  -  A   B   C   D   E   F   G   H   I - J   K   L   M
Cipher - 76  88  01  67  04  80  66  99  96  96  02  69  90


Plain  -  N   O   P   Q   R   S   T   U   V   W   X   Y   Z
Cipher - 77  05  87  60  39  79  03  78  68  98  86  70  97


The computer whizzes are now thinking that the example has
all numbers less than 100. Therefore, a brute force attack
on all combinations of two letter-equivalents of the above
ciphertext numerical values taken two at a time in combination
with the digram frequency data could be a good approach to the
cipher matrix construction problem.  The ASOLVER computer
program at the CDB does this kind analysis and adds threshold
limitations on the search.

Figure 3-3 and 3-4 could be arranged for simple numerical
equivalents like this:


          Figure 3-3a                     Figure 3-4a

       1  2  3  4  5             1  2  3  4  5  6  7  8  9
     ................          ............................
  1  . A  B  C  D  E         1 . A  B  C  D  E  F  G  H  I
  2  . F  G  H IJ  K         2 . J  K  L  M  N  O  P  Q  R
  3  . L  M  N  O  P         3 . S  T  U  V  W  X  Y  Z  *
  4  . Q  R  S  T  U
  5  . V  W  X  Y  Z

where: A = 11, R=42  Z=55

Numerical cipher values lend themselves to treatment by various
mathematical processes to further complicate the cipher system
in which they are used.  These processes, mainly addition or
subtraction, may be applied to each cipher equivalent
individually, or to the complete numerical cipher message by
considering it as one number.  [OP20]

Reference [NIC4]  on Russian Cryptography describes the VIC
Cipher and the one-time pad.  Both involve mathematical
treatment to numerical based ciphers.  The Hill cipher is
another good example of the use of mathematical transformation
processes on ciphers and is presented in David Kahn's book.
[KAHN]

In modern cryptographic systems, the DES family of ciphers use
simple S-Boxes [substitution boxes] that are reorganized by
ordered non-linear mathematical rules applied several times
over (know as rounds).   [NIC4], [OP20], [RHEE], [HILL], [IBM1]


ONE-TIME PAD

The question of 'unbreakable' mathematical ciphers might be
poised at this juncture.   Lets look at the famous one-time pad
and see what it offers.   [NIC4]

The one-time pad is truly an unbreakable cipher system.  There
are many descriptions of this cipher.  One of the better
descriptions is by Bruce Schneier.  [SCHN]   It consists of a
nonrepetitive truly random key of letters or characters that is
used just once.  The key is written on special sheets of paper
and glued together in a pad.  The sender uses each key letter
on the pad to encrypt exactly one plain text letter or
character.  The receiver has an identical pad and uses the key
on the pad, in turn, to decrypt each letter of the ciphertext.
[SHAN]

Each key is used exactly once and for only one message.
The sender encrypts the message and destroys the pad's page.
The receiver does the same thing after decrypting the message.
New message - new page and new key letters/numbers - each time.

The one-time pad is unbreakable both in theory and in practice.
Interception of ciphertext does not help the cryptographer
break this cipher.  No matter how much ciphertext the analyst
has available, or how much time he had to work on it, he could
never solve it.  [KAHN]

The reason is that no pattern can be constructed for the key.
The perfect randomness of the one time system nullifies any
efforts to reconstruct the key or plain text via horizontal or
lengthwise analysis, via cohesion, via re-assembly (such as
Kasiski or Kerckhoff's columns) via repeats or via internal
framework erection.  [KAHN]  [KAH1], [WRIX], [NIC4], [SCHN]

Brute force (trial and error) might bring out the true
plaintext but it would also yield every other text of the same
length, and there is no way to tell which is the right one.
The worst of it is that the possible solutions increase as the
message lengthens.

Supposing the key were stolen, would this help to predict
future keys?  No, because a random key has no underling system
to exploit.  If it did, it would not be random.  [KAHN]

A random key sequence XOR 'ed with a nonrandom plain text
message produces a completely random ciphertext message and no
amount of computing will change that. [SCHN]   The  one-time
pad can be extended to encryption of binary data.  Instead of
letters, we use bits.  [SCHN]


FRESH KEY DRAWBACK

The one-time pad has a drawback - the quantities of fresh key
required.  For military messages in the field (a fluid
situation) a practical limit is reached.  It is impossible to
produce and distribute sufficient fresh key to the units.
During WWII, the US Army's  European theater HQ's transmitted,
even before the Normandy invasion, 2 million five (5) letter
code groups a day!  It would have therefore, consumed 10
million letters of key every 24 hours -the equivalent of a
shelf of 20 average books.  [KAH1] , [FRAA]


RANDOMNESS

The real issue for the one-time pad, is that the keys must be
truly random.  Attacks against the one-time pad must be against
the method used to generate the key itself. [SCHN] Pseudo-
random number generators don't count; often they have nonrandom
properties.  Reference [SCHN], Chapter 15, discusses in detail
random sequence generators and stream cipher.  I take exception
to his remarks regarding keyboard latency measurement.
People's typing patterns are anything but random (especially us
two finger types). [SCHN]  [MART]



ONE-TIME PAD SIMPLE EXAMPLE W/O SUPERENCIPHERMENT OR XOR

Begin with a cipher (A=1, B=2 ...)

PT:   T  A   X  A   T  I  O  N    I  S    T  H  E  F  T
CE:  20  1  24  1  20  9 15 14    9 19   20  8  5  6  20


>From a table of truly random numbers:

    10480  15011  01536  02011  81647  91646  69719  22368
    45673  25595  85393  30995  89198  27982  24130  48360
    22527  97265  76393  64809  15179  42167  ....

Add the cipher equivalent to the random key:

      T         A       X       A       T        I
      20        1      24       1       20       9
   10480    15011   01536   02011    81647   91646
   -----    -----   -----   -----    -----   -----  ...
   10500    15012   01560   02012    81667   91655




Transmit new cipher text:

   10500  15012  01560  02012  81667  91655  69734  .....


Receiver subtract key out of message and decodes equivalents.

Many variations exist.  Note  in the cipher text  T1 .ne. T2
.ne. T(i) and A1 .ne.  A2 .ne. A(i),  etc.


                                                 [MARO]


ONE-TIME PAD HISTORICAL CONSIDERATIONS

The one-time pad  originated from the work of Gilbert Vernam in
1917.  Vernam worked for ATT.  He got his idea from the French
telegrapher Emile Baudot.  Baudot code replaced letters with
electrical impulses, called units.  Every character was given 5
units that either signified a pulse of electrical current
("marks") or its absence ("spaces") during a given time period.
[ 32 combinations in all].  In 1917, paper tape was used and
the marks and spaces were read by metallic fingers.  Vernam
essentially automated the process and devised a cipher on it.

In modern computer terms, key bits were added modulo 2 to
plaintext bits on a bit by bit basis.  If X = x1, x2, x3..
denotes the plain text, and  K = k1, k2, k3 .. the keystream,
Vernam's cipher produces a cipher text bit stream  Y = Ek(X) =
y1, y2, y3.   [VERN]


CONCURRENT DEVELOPMENTS

Other countries conducted similar research.  Between 1918-1920,
other one-time pad methods were developed.  The German Foreign
Office employed the one-time pad in 1920.  The Russians first
stole and then improved the German system.  It was fully
deployed in 1925 for diplomatic use!  OSS and SOE operatives in
WWII had special grid one-time pad's.  By 1944, OSS technicians
had developed pages made of film that were read with a hand
magnifying glass.  By 1960, Russian pads were the size of a
postage stamp or scrolls the size of a large eraser.  The
Russians were first to conceal the one-time pad in microfilm.
One-time pads were made of cellulose nitrate for rapid
destruction.  [RHEE] ,[VERN], [TERR], [KAHN]

RUSSIAN IMPLEMENTATION OF THE ONE-TIME PAD

So why classify the one-time pad with Russian Ciphers?  Because
they have been serious about using it since 1925!  Before 1917,
Russian diplomatic and military systems could be expressed by
the old axiom:


            Cryptography + Loose Discipline = Chaos


After her loss of trade information to the British in 1920, and
defeats of her Army in WWI because of poor cipher handling, she
woke up.   By 1916, Russia's intercept service at Nicolaieff
was in full service against the Germans.  From 1920 through
today, Russia has targeted stealing other countries codes with
"great vigor" as Kennedy once said.  Code stealing was done
through the COMINT efforts of the former KGB and GRU.  The
Spets-Odel (Special Department) was a primary agency involved
with Ciphers and Cryptanalysis.  Section 6 grew 400% over a 10
year period prior to WWII.

The Soviet Union has employed the one-time pad to protect ALL
her diplomatic missions from 1930 on.   Consequently her
crucial Foreign Office messages were not read by foes,
neutrals, nor allies.  The GRU and the Soviet Spy rings -
"LUCY", "RED ORCHESTRA, and "Sorge's Net"  all used the one-
time pad.  They also used a straddling checkerboard variant
(not unbreakable).

The one-time pad is used in the old fashioned form in the
Soviet Mission - diplomatic , secret police, military,
commercial, political (Communist Party) - all have their own
keys.  All cables coming into a legation look alike: simple
groups of five digits.  Letters that are photographed,
codenames are applied and then enciphered in one-time pad
system.  [COVT], [BLK], [BARR]

Agents in the field use the one-time pad.  Radio links to
Moscow, are encrypted via one-time pads.  The main Soviet spy
cipher today still employs the one-time pads.

The most dramatic spy stories (Klaus Fuchs, Iger Gouzenko,
Vladimir Petrov, Colonel  Zabotin, Rudolf Abel, Gregory
Liolios, Eleftherious Voutsas, the Krogers, Guiseppe Martelli,
Ali Abbasi, Reino Hayhanen, Aldridge Ames ...) all have used
the one-time pads.

Such is cryptology in the Soviet Union -  complex, enigmatic,
focused, state-of-the-art, applying the one-time pad principles
to other ciphers.  Do you remember when the diplomatic ciphers
in use at the American embassy in Moscow were solved?  Russia
has a profound understanding of cryptography and cryptanalysis.
[VOGE], [SUVO], [KAHN]

The U.S. history was different.  Some would argue that the U.S.
became serious and superplayers in 1953.  Some would argue
1943.  But not many will argue 1925 (we still had SIGTOT then).
[SISI]

LECTURE 4

In Lecture 4, we will complete our look into English
substitution ciphers, by describing multiliteral substitution
with difficult variants.  The Homophonic and GrandPre Ciphers
will be covered.  A synoptic diagram of the substitution
ciphers presented in Lectures 1-4 will be presented.

LECTURE 5 - 6

We will cover recognition and solution of XENOCRYPTS (language
substitution ciphers) in detail.


SOLUTION TO HOMEWORK PROBLEMS FROM LECTURE 2

BOZOL gets the kudo for best solution on the homework.  Both
problems were unkeyed.


Pd-1.                                            Daniel

H Z K L X   A L H X P   N C I N Z   X F L I X   G N W Q X

P N Z K T   L N K X O   L X N I Z   X G I N X   P N E Z K

X W Q X P   Z X L H X   P N C I N   Z X S N Q   N T X W Q

X P N W V   S N I K L   K H B L X   N W Q L X   H F Z I L

N X A Z K   S B W E N   I.


Problem 1 breaks down as follows:


High frequency (top 7%), count = 8 : XNLZI
Medium frequency letters:          : KPWHQS
Lo frequency  (less than 3)        : ABCEFGTOV
Zero (0) frequency                 : DJMRUY
By "N" Gram Count

 6 gram         Count        CT Frequency

HXPNCI            2      5 19 6 17 2 8
LHXPNC            2      10 5 19 6 17 2
NCINZX            2      17 2 8 17 9 19
PNCINZ            2      6 17 2 8 17 9
XPNCIN            2      19 6 17 2 8 17

5  grams

CINZX             2      2 8 17 9 19
HXPNC             2      5 19 6 17 2
LHXPN             2      10 5 19 6 17
NCINZ             2      17 2 8 17 9
PNCIN             2      6 17 2 8 17
WQXPN             2      6 5 19 6 17
XPNCI             2      19 6 17 2 8
XWQXP (THATS)?    2      19 6 5 19 6

4 grams

CINX              2      2 8 17 9
HXPN              2      5 19 6 17
INZX              2      8 17 9 19
LHXP              2      10 5 19 6
NCIN              2      17 2 8 17
PNCI              2      6 17 2 8
QXPN              2      5 19 6 17
WQXP              2      6 5 19 6
YPNC              2      19 6 17 2
XWQX  (THAT)?     2      19 6 5 19

3 grams

CIN               2      2 8 17
HXP               2      5 19 6
INZ               2      8 17 9
LHX               2      10 5 19
LXN               2      10 19 17
NCI               2      17 2 8
NWQ               2      17 6 5
NZX               2      17 9 19
PNC               2      6 17 2
QXP               3      5 19 6
WQX               3      6 5 19
XPN               5      19 6 17
XWQ               2      19 6 5





2 grams          Count   CT  Frequency

CI                2      2 8
HX                2      5 19
IN                3      8 17
KL                2      7 10
KX                2      7 19
LH                2      10 5
LN                2      10 17
LX                4      10 19
NC                2      17 2
NI                2      17 8
NW                3      17 6
NX                2      17 19
NZ                3      17 9
PN                5      6 17
QX                3      5 19
SN                2      3 17
WQ                4      6 5
XA                2      19 2
XG                2      19 2
XN                2      19 17
XP                6      19 6
XW                2      19 6
ZK                4      9 7
ZX                4      9 19



     Frequency  * Variety   =    Contacts
A        2           3      6      XLZ
B        2           4      8      HLSW
C        2           2      4      NI
D        0           0      0
E        2           3      6      NZW
F        2           4      8      XLHZ
G        2           3      6      XNI
H        5           6      30     ZLXKBF
I        8           7      56     CNLXZGK
J        0           0      0
K        7           8      56     ZLTNXIHS
L        10          11     110    KXAHFITNOBQ
M        0           0      0
N        17          13     221    PCIZGWLKXESQT
O        1           2      2      XL
P        6           3      18     XNZ
Q        5           4      20     WXNL
R        0           0      0
S        3           5      15     XNVKB
T        2           4      8      KLNX
U        0           0      0
V        1           2      2      WS
W        6           6      36     NQXVBE
X        19          15     285    LAHPZFIGQKONWST
Y        0           0      0
Z        9           9      81     HKNXIEPFA




>From above data we try X= t and N=e, P=h.  Then E=y, L=i,
W=o, S = D.

Message reads: Sanity is the great virtue of the ancient
literature; the want of that is the great defect of the modern,
in spite of its variety and power.      Matthew Arnold


Pd-2.   Join the army.                             Daniel

F L B B A   O I A F Q   E A O M Z   U I L O N   R Z O Q A

O P I L O   M O L S F   P F L I P   F L B B A   O E R I C

A O Q E F   O P Q B L   O W A V H   Z O W E A   P X Z Q Q

G A P Z I   V V A Z Q   E G A Q E   F H T E L   G L S A P

L R O W L   R I Q O U   F I E F P   E A Z O Q   Z I V I L

Q T F Q E   E F P G F   M P L I G   U B L G G   L T H A.


Problem 2 breaks down as follows:


High frequency (top 7%), count = 10 : LOAFQEI
Medium frequency letters:           : PZGBRVHMTUW
Lo frequency  (less than 3)         : SCNX
Zero (0) frequency                  : DJKY

By "N" Gram Count

 6 gram         Count        CT Frequency

FLBBAO            2          12 15 6 6 14 15

5  grams

FLBBA             2          12 15 6  6 14
LBBAO             2          15 6 6 14 15

4 grams

BBAO              2           6 6 14 15
FLBB              2           12 15 6 6
LBBA              2           12 6 6 14

3 grams

BAO               2           6 14 15
BBA               2           6 6 14
EFP               2           11 12 10
FLB               2           12 15 6
FQE               2           12 12 11
ILO               2           11 15 15
LBB               2           15 6 6
PFL               2           10 12 15
QEF               2           12 11 12
ZIV               2           8 11 4
ZOQ               2           8 15 12

2 grams          Count   CT. Frequency

AO                5       14 15
AP                3       14 10
AZ                2       14 8
BA                2       6 14
BB                2       6 6
BL                2       6 15
EA                3       11 14
EF                4       11 12
FL                3       12 15
FP                3       12 10
FQ                2       12 12
GA                2       7 14
GL                2       7 15
IL                3       11 15
IV                2       11 4
LB                2       15 6
LG                2       15 7
LI                2       15 11
LO                3       15 15
LR                2       15 4
LS                2       15 2
OM                2       15 3
OP                2       15 10
OQ                3       15 12
OW                3       15 3
PF                2       10 12
PL                2       10 15
QE                5       12 11
RI                2       4 11
ZI                2       8 11
ZO                3       8 15
ZQ                2       8 12


     Frequency  * Variety   =       Contacts
A        14         14      196       BOIFEQCWVPGZSH
B        6           5       30       LBAQU
C        1           2       2        IA
D        0           0       0
E        11         12      132       QAORFWGTLIPE
F        12         13      156       LAQSPEOHUITGM
G        7           9       63       QAELPFIUG
H        3           5       15       VZFTA
I        11         13      143       OAULPRCZVQFEG
J        0           0       0
K        0           0       0
L        15         12      180       FBIOSEGPRWQT
M        3           4       12       OZFP
N        1           2        2       OR



O        15         13      195       AIMLNZQPEFWRU
P        10         11      110       OIFQAXZLEGM
Q        12         12      144       FEOAPBZQGILT
R        4           6       24       NZEILO
S        2           3        6       LFA
T        3           5       15       HEQFL
U        3           6       18       ZIOFGB
V        4           4       16       AHIV
W        3           4       12       OAEL
X        1           2        2       PZ
Y        0           0        0
Z        8          10       80       MUROHQXPIA


BOZOL tried the crib word World from "Join the Army ..see the
world"  The crib failed but did show him some possibilities.
LANAKI's caveat - Forget the tip, it is usually a red hering.


Try the A=e, Q=t, e=h, O=r, and I=n.  Look for words offer,
battles, death, country.

Message reads: "I offer neither pay nor quarters nor
provisions.  I offer hunger, thirst, forced marches, battles
and death.  Let him who loves our country in his heart and not
with his lips only, follow me."     Made famous by Girabaldi.


HOMEWORK  LECTURE 3

Solve the following cipher problems.


Mv-1.  From Martin Gardner.



    8 5 1 8 5 1 9 1 1 9 9 1 3
    1 6 1 2 5 1 1 2 1 6 8 1 2 5
    2 0 9 3 3 1 5 4 5 2 0 8 1
    2 0 9 2 2 5 1 4 5 2 2 5
    1 8 1 9 5 5 1 4 2 5 6 1 5
    1 8 5 1 3 1 2 5 2 5 2 5 1 5
    2 1 3 1 1 4 2 1 1 9 5 9 2 0
    9 1 4 2 5 1 5 2 1 1 8 3 1 5
    1 2 2 1 1 3 1 4

    1 3 1 1 8 2 0 9 1 4 7 1 1 8 4 1 4 5 1 8
    8 5 1 4 4 5 1 8 1 9 1 5 1 4 2 2 9 1 2 1 2 5
    1 4 1 5 1 8 2 0 8 3 1 1 8 1 5 1 2 9 1 4 1




Solve and reconstruct the cryptographic systems used.


Mv-2.



0 6 0 2 1   0 0 5 0 1   0 1 0 5 1   5 2 2 0 2   0 6 0 8 2
3 2 5 1 0   0 8 0 4 0   2 2 1 0 9   0 8 0 4 0   8 2 2 1 1
0 8 0 4 1   7 1 5 1 3   1 4 2 2 2   1 0 2 2 4   0 2 0 1 2
2 0 2 0 2   0 1 0 8 1   9 0 6 1 5   1 7 0 8 0   1 1 1 2 2
1 4 0 2 0   1 1 9 0 6   0 5 1 0 0   2 0 2 1 1   2 2 1 4 0
6 2 3 1 9   0 5 1 5 0   1 2 2 1 3   0 2 0 5 0   6 1 3 0 2
0 5 0 1 1   0 0 5 2 3   0 6 2 1 0   2 2 2 1 4   0 6 0 2 0
2 2 2 1 4   0 6 0 2 0   2 2 6 0 2   0 6 0 5 2   1 1 9 0 2
0 2 1 1 2   2 0 3 0 2   1 7 2 4 0   2 1 9 0 2   0 6 1 5 0
5 1 1 0 6   0 2 1 9 0   5 0 6 2 2   0 1 0 5 0   5 0 1 1 9
0 5 2 1 1   5 2 2 1 5   0 5 0 1 2   2 0 5 1 8   0 5 0 6 0
6 0 5 0 3


Mv-3.


5 3 2 4 1    5 4 5 3 2    2 4 4 3 2    5 1 2 4 3    2 4 2 3 1
5 4 4 4 5    4 5 3 2 5    1 4 3 4 4    1 4 1 5 2    1 4 1 1 5
4 3 4 5 3    5 2 1 2 3    3 5 1 2 5    1 1 4 2 1    5 3 3 3 4
5 3 2 4 4    2 3 1 5 4    5 4 5 2 4    4 3 2 4 1    4 4 4 3 2
1 2 5 3 2    4 4 3 4 4    2 4 1 5 4    4 4 5 2 4    4 3 3 5 2
1 5 3 3 3    1 3 1 4 4    4 1 5 4 5    4 4 5 1 4    3 2 5 1 5
2 3 2 4 1    5 5 2 2 4    4 3 1 5 3    1 3 3 1 3    3 1 4 5 5
3 2 4 1 3    4 5 2 1 2    5 3 3 5 2    2 4 3 4 1    3 1 2 4 5
4 4 5 2 3    3 4 4 3 3    2 2 3 3 3    5 3 3 4 5    2 1 3 5 2
4 4 4 4 4    4 5 3 2 1    5 1 3 1 5    5 2 2 4 4    3 1 5 3 1
2 4 5 1 1    3 1 4 2 4    4 4 3 3 4    3 1 5 2 2    3 5 2 4 2
5 3 5 2 1    3 3 1 3 3    1 2 3 1 2    1 3 1 4 3    3 4 5 3 3
1 2 1 3 4    4 4 1 2 4    4 3 3 3 1    2 1 4 3 2    2 4 3 3 3
1 3 2 4 5    1 2 2 5 3    5 1 2 5 3    2 3 3 5 1    2 5 1 1 4
4 4 1 5 4    5 4 1 4 3    2 4 4 4 2    4 1 3 4 5    1 5 2 2 1
2 5 1 4 5    1 2 1 3 2    4 4 5 3 2    1 2 5 1 4    4 1 5 1 3
1 4 2 5 2    4 2 4 4 5



















REFERENCES / RESOURCES


[ACA]  ACA and You, "Handbook For Members of the American
       Cryptogram Association," ACA publications, 1995.

[ACA1] Anonymous, "The ACA and You - Handbook For Secure
       Communications", American Cryptogram Association,
       1994.

[ANNA] Anonomous., "The History of the International Code.",
       Proceedings of the United States Naval Institute, 1934.

[B201] Barker, Wayne G., "Cryptanalysis of The Simple
       Substitution Cipher with Word Divisions," Course #201,
       Aegean Park Press, Laguna Hills, CA. 1982.

[BALL] Ball, W. W. R., Mathematical Recreations and Essays,
       London, 1928.

[BAR1] Barker, Wayne G., "Course No 201, Cryptanalysis of The
       Simple Substitution Cipher with Word Divisions," Aegean
       Park Press, Laguna Hills, CA. 1975.

[BARK] Barker, Wayne G., "Cryptanalysis of The Simple
       Substitution Cipher with Word Divisions," Aegean Park
       Press, Laguna Hills, CA. 1973.

[BARR] Barron, John, '"KGB: The Secret Work Of Soviet Agents,"
       Bantom Books, New York, 1981.

[BAUD] Baudouin, Captain Roger, "Elements de Cryptographie,"
       Paris, 1939.

[BLK]  Blackstock, Paul W.  and Frank L Schaf, Jr.,
       "Intelligence, Espionage, Counterespionage and Covert
       Operations,"  Gale Research Co., Detroit, MI., 1978.

[BLUE] Bearden, Bill, "The Bluejacket's Manual, 20th ed.,
       Annapolis: U.S. Naval Institute, 1978.

[BOSW] Bosworth, Bruce, "Codes, Ciphers and Computers: An
       Introduction to Information Security," Hayden Books,
       Rochelle Park, NJ, 1990.

[BP82] Beker, H., and Piper, F., " Cipher Systems, The
       Protection of Communications", John Wiley and Sons,
       NY, 1982.

[BRIT] Anonymous, "British Army Manual of Cryptography", HMF,
       1914.

[BRYA] Bryan, William G., "Practical Cryptanalysis - Periodic
       Ciphers -Miscellaneous", Vol 5, American Cryptogram
       Association, 1967.



[CAR1] Carlisle, Sheila. Pattern Words: Three to Eight Letters
       in Length, Aegean Park Press, Laguna Hills, CA 92654,
       1986.

[CAR2] Carlisle, Sheila. Pattern Words: Nine Letters in Length,
       Aegean Park Press, Laguna Hills, CA 92654, 1986.

[CCF]  Foster, C. C., "Cryptanalysis for Microcomputers",
       Hayden Books, Rochelle Park, NJ, 1990.

[COUR] Courville, Joseph B.,  "Manual For Cryptanalysis Of
       The Columnar Double Transposition Cipher, by Courville
       Assoc., South Gate, CA, 1986.

[COVT] Anonymous, "Covert Intelligence Techniques Of the Soviet
       Union, Aegean Park Press, Laguna Hills, Ca. 1980.

[CULL] Cullen, Charles G., "Matrices and Linear
       Transformations," 2nd Ed., Dover Advanced Mathematics
       Books, NY, 1972.

[DAGA] D'agapeyeff, Alexander, "Codes and Ciphers," Oxford
       University Press, London, 1974.

[DAN]  Daniel, Robert E., "Elementary Cryptanalysis:
       Cryptography For Fun," Cryptiquotes, Seattle, WA., 1979.

[DAVI] Da Vinci, "Solving Russian Cryptograms", The
       Cryptogram, September-October, Vol XLII, No 5. 1976.

[DEAU] Bacon, Sir Francis, "De Augmentis Scientiarum," tr. by
       Gilbert Watts, (1640) or tr. by Ellis, Spedding, and
       Heath (1857,1870).

[DOW]  Dow, Don. L., "Crypto-Mania, Version 3.0", Box 1111,
       Nashua, NH. 03061-1111, (603) 880-6472, Cost $15 for
       registered version and available as shareware under
       CRYPTM.zip on CIS or zipnet.

[ELCY] Gaines, Helen Fouche, Cryptanalysis, Dover, New York,
       1956.

[ENIG] Tyner, Clarence E. Jr., and Randall K. Nichols,
       "ENIGMA95 - A Simulation of Enhanced Enigma Cipher
       Machine on A Standard Personal Computer," for
       publication, November, 1995.

[EPST] Epstein, Sam and Beryl, "The First Book of Codes and
       Ciphers," Ambassador Books, Toronto, Canada, 1956.

[FREB] Friedman, William F., "Cryptology," The Encyclopedia
       Britannica, all editions since 1929.  A classic article
       by the greatest cryptanalyst.

[FR1]  Friedman, William F. and Callimahos, Lambros D.,
       Military Cryptanalytics Part I - Volume 1, Aegean Park
       Press, Laguna Hills, CA, 1985.

[FR2]  Friedman, William F. and Callimahos, Lambros D.,
       Military Cryptanalytics Part I - Volume 2, Aegean Park
       Press, Laguna Hills, CA, 1985.

[FR3]  Friedman, William F. and Callimahos, Lambros D.,
       Military Cryptanalytics Part III, Aegean Park Press,
       Laguna Hills, CA, 1995.

[FR4]  Friedman, William F. and Callimahos, Lambros D.,
       Military Cryptanalytics Part IV,  Aegean Park Press,
       Laguna Hills, CA, 1995.

[FR5]  Friedman, William F. Military Cryptanalysis - Part I,
       Aegean Park Press, Laguna Hills, CA, 1980.

[FR6]  Friedman, William F. Military Cryptanalysis - Part II,
       Aegean Park Press, Laguna Hills, CA, 1980.

[FRE]  Friedman, William F. , "Elements of Cryptanalysis,"
       Aegean Park Press, Laguna Hills, CA, 1976.

[FREA] Friedman, William F. , "Advanced Military Cryptography,"
       Aegean Park Press, Laguna Hills, CA, 1976.

[FRAA] Friedman, William F. , "American Army Field Codes in The
       American Expeditionary Forces During the First World
       War, USA 1939.

[FR22] Friedman, William F., The Index of Coincidence and Its
       Applications In Cryptography, Publication 22, The
       Riverbank Publications,  Aegean Park Press, Laguna
       Hills, CA, 1979.

[FRS]  Friedman, William F. and Elizabeth S., "The
       Shakespearean Ciphers Examined,"  Cambridge University
       Press, London, 1957.

[GIVI] Givierge, General Marcel, " Course In Cryptography,"
       Aegean Park Press, Laguna Hills, CA, 1978.  Also, M.
       Givierge, "Cours de Cryptographie," Berger-Levrault,
       Paris, 1925.

[GODD] Goddard, Eldridge and Thelma, "Cryptodyct," Marion,
       Iowa, 1976

[GORD] Gordon, Cyrus H., " Forgotten Scripts:  Their Ongoing
       Discovery and Decipherment,"  Basic Books, New York,
       1982.

[HA]   Hahn, Karl, " Frequency of Letters", English Letter
       Usage Statistics using as a sample, "A Tale of Two
       Cities" by Charles Dickens, Usenet SCI.Crypt, 4 Aug
       1994.

[HEMP] Hempfner, Philip and Tania, "Pattern Word List For
       Divided and Undivided Cryptograms," unpublished
       manuscript, 1984.

[HILL] Hill, Lester, S., "Cryptography in an Algebraic
       Alphabet", The American Mathematical Monthly, June-July
       1929.

[HIS1] Barker, Wayne G., "History of Codes and Ciphers in the
       U.S. Prior to World War I," Aegean Park Press, Laguna
       Hills, CA, 1978.

[HITT] Hitt, Parker, Col. " Manual for the Solution of Military
       Ciphers,"  Aegean Park Press, Laguna Hills, CA, 1976.

[IBM1] IBM Research Reports, Vol 7., No 4, IBM Research,
       Yorktown Heights, N.Y., 1971.

[INDE] PHOENIX, Index to the Cryptogram: 1932-1993, ACA, 1994.

[KAHN] Kahn, David, "The Codebreakers", Macmillian Publishing
       Co. , 1967.

[KAH1] Kahn, David, "Kahn On Codes - Secrets of the New
       Cryptology," MacMillan Co., New York, 1983.

[KOBL] Koblitz, Neal, " A Course in Number Theory and
       Cryptography, 2nd Ed, Springer-Verlag, New York, 1994.

[KULL] Kullback, Solomon, Statistical Methods in Cryptanalysis,
       Agean Park Press, Laguna Hills, Ca. 1976

[LAFF] Laffin, John, "Codes and Ciphers: Secret Writing Through
       The Ages," Abelard-Schuman, London, 1973.

[LANG] Langie, Andre, "Cryptography," translated from French
       by J.C.H. Macbeth, Constable and Co., London, 1922.

[LEWY] Lewy, Guenter, "America In Vietnam", Oxford University
       Press, New York, 1978.

[LYNC] Lynch, Frederick D., "Pattern Word List, Vol 1.,"
       Aegean Park Press, Laguna Hills, CA, 1977.

[LYSI] Lysing, Henry, aka John Leonard Nanovic, "Secret
       Writing," David Kemp Co., NY 1936.

[MANS] Mansfield, Louis C. S., "The Solution of Codes and
       Ciphers", Alexander Maclehose & Co., London, 1936.

[MARO] Marotta, Michael, E.  "The Code Book - All About
       Unbreakable Codes and How To Use Them," Loompanics
       Unlimited, 1979.  [This is terrible book.  Badly
       written, without proper authority, unprofessional, and
       prejudicial too boot.  And, it has one of the better
       illustrations of the Soviet one-time pad with example,
       with three errors in cipher text, that I have corrected
       for the author.]

[MART] Martin, James,  "Security, Accuracy and Privacy in
       Computer Systems," Prentice Hall, Englewood Cliffs,
       N.J., 1973.

[MILL] Millikin, Donald, " Elementary Cryptography ", NYU
       Bookstore, NY, 1943.

[MYER] Myer, Albert, "Manual of Signals," Washington, D.C.,
       USGPO, 1879.

[MM]   Meyer, C. H., and Matyas, S. M., " CRYPTOGRAPHY - A New
       Dimension in Computer Data Security, " Wiley
       Interscience, New York, 1982.

[NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for
       the Navy with Brief Description of the Ardois Hight
       System," In Proceedings of the United States Naval
       Institute, Annapolis: U. S. Naval Institute, 1891.

[NIC1] Nichols, Randall K., "Xeno Data on 10 Different
       Languages," ACA-L, August 18, 1995.

[NIC2] Nichols, Randall K., "Chinese Cryptography Parts 1-3,"
       ACA-L, August 24, 1995.

[NIC3] Nichols, Randall K., "German Reduction Ciphers Parts
       1-4," ACA-L, September 15, 1995.

[NIC4] Nichols, Randall K., "Russian Cryptography Parts 1-3,"
       ACA-L, September 05, 1995.

[NIC5] Nichols, Randall K., "A Tribute to William F. Friedman",
       NCSA FORUM, August 20, 1995.

[NIC6] Nichols, Randall K., "Wallis and Rossignol,"  NCSA
       FORUM, September 25, 1995.

[NIC7] Nichols, Randall K., "Arabic Contributions to
       Cryptography,", in The Cryptogram, ND95, ACA, 1995.

[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse
       Code System," The Cryptogram, SO95, ACA publications,
       1995.

[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10,
       1995.

[OP20] "Course in Cryptanalysis," OP-20-G', Navy Department,
       Office of Chief of Naval Operations, Washington, 1941.

[PIER] Pierce, Clayton C., "Cryptoprivacy", 325 Carol Drive,
       Ventura, Ca. 93003.

[RAJ1] "Pattern and Non Pattern Words of 2 to 6 Letters," G &
       C. Merriam Co., Norman, OK. 1977.

[RAJ2] "Pattern and Non Pattern Words of 7 to 8 Letters," G &
       C.  Merriam Co., Norman, OK. 1980.

[RAJ3] "Pattern and Non Pattern Words of 9 to 10 Letters," G &
       C.  Merriam Co., Norman, OK. 1981.
[RAJ4] "Non Pattern Words of 3 to 14 Letters," RAJA Books,
       Norman, OK. 1982.

[RAJ5] "Pattern and Non Pattern Words of 10 Letters," G & C.
       Merriam Co., Norman, OK. 1982.

[RHEE] Rhee, Man Young, "Cryptography and Secure Comm-
       unications,"  McGraw Hill Co, 1994

[ROBO] NYPHO, The Cryptogram, Dec 1940, Feb, 1941.

[SACC] Sacco, Generale Luigi, " Manuale di Crittografia",
       3rd ed., Rome, 1947.

[SCHN] Schneier, Bruce, "Applied Cryptography: Protocols,
       Algorithms, and Source Code C," John Wiley and Sons,
       1994.

[SCHW] Schwab, Charles, "The Equalizer," Charles Schwab, San
       Francisco, 1994.

[SHAN] Shannon, C. E., "The Communication Theory of Secrecy
       Systems," Bell System Technical Journal, Vol 28 (October
       1949).

[SIG1] "International Code Of Signals For Visual, Sound, and
       Radio Communications,"  Defense Mapping Agency,
       Hydrographic/Topohraphic Center, United States Ed.
       Revised 1981

[SIG2] "International Code Of Signals For Visual, Sound, and
       Radio Communications,"  U. S. Naval Oceanographic
       Office, United States Ed., Pub. 102,  1969.

[SINK] Sinkov, Abraham, "Elementary Cryptanalysis", The
       Mathematical Association of America, NYU, 1966.

[SISI] Pierce, C.C., "Cryptoprivacy," Author/Publisher, Ventura
       Ca., 1995. (XOR Logic and SIGTOT teleprinters)

[SMIT] Smith, Laurence D., "Cryptography, the Science of Secret
       Writing," Dover, NY, 1943.

[SOLZ] Solzhenitsyn, Aleksandr I. , "The Gulag Archipelago I-
       III, " Harper and Row, New York, N.Y., 1975.

[STIN] Stinson, D. R., "Cryptography, Theory and Practice,"
       CRC Press, London, 1995.

[SUVO] Suvorov, Viktor "Inside Soviet Military Intelligence,"
       Berkley Press, New York, 1985.

[TERR] Terrett, D., "The Signal Corps: The Emergency (to
       December 1941); G. R. Thompson, et. al, The Test(
       December 1941 -  July 1943); D. Harris and G. Thompson,
       The Outcome;(Mid 1943 to 1945), Department of the Army,
       Office of the Chief of Military History, USGPO,
       Washington,1956 -1966.

[TILD] Glover, D. Beaird, Secret Ciphers of The 1876
       Presidential Election, Aegean Park Press, Laguna Hills,
       Ca. 1991.

[TRAD] U. S. Army Military History Institute, "Traditions of
       The Signal Corps., Washington, D.C., USGPO, 1959.

[TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher
       Dispatches, New York, 1879.

[TRIT] Trithemius:Paul Chacornac, "Grandeur et Adversite de
       Jean Tritheme ,Paris: Editions Traditionelles, 1963.

[TUCK] Harris, Frances A., "Solving Simple Substitution
       Ciphers," ACA, 1959.

[TUCM] Tuckerman, B., "A Study of The Vigenere-Vernam Single
       and Multiple Loop Enciphering Systems," IBM Report
       RC2879, Thomas J. Watson Research Center, Yorktown
       Heights, N.Y.  1970.

[VERN] Vernam, A. S.,  "Cipher Printing Telegraph Systems For
       Secret Wire and Radio Telegraphic Communications," J.
       of the IEEE, Vol 45, 109-115 (1926).

[VOGE] Vogel, Donald S., "Inside a KGB Cipher," Cryptologia,
       Vol XIV, Number 1, January 1990.

[WAL1] Wallace, Robert W. Pattern Words: Ten Letters and Eleven
       Letters in Length, Aegean Park Press, Laguna Hills, CA
       92654, 1993.

[WAL2] Wallace, Robert W. Pattern Words: Twelve Letters and
       Greater in Length, Aegean Park Press, Laguna Hills, CA
       92654, 1993.

[WATS] Watson, R. W. Seton-, ed, "The Abbot Trithemius," in
       Tudor Studies, Longmans and Green, London, 1924.

[WEL]  Welsh, Dominic, "Codes and Cryptography," Oxford Science
       Publications, New York, 1993.

[WOLE] Wolfe, Ramond W., "Secret Writing," McGraw Hill Books,
       NY, 1970.

[WOLF] Wolfe, Jack M., " A First Course in Cryptanalysis,"
       Brooklin College Press, NY, 1943.

[WRIX] Wrixon, Fred B. "Codes, Ciphers and Secret Languages,"
       Crown Publishers, New York, 1990.

[YARD] Yardley, Herbert, O., "The American Black Chamber,"
       Bobbs-Merrill, NY, 1931.

[ZIM]  Zim, Herbert S., "Codes and Secret Writing." William
       Morrow Co., New York, 1948.

Back to index