Manual of Cryptography: from the second Italian edition
By Luigi Sacco
()
About this ebook
Related to Manual of Cryptography
Related ebooks
The Story of Codebreaking Rating: 0 out of 5 stars0 ratingsSecret and Urgent - The Story of Codes and Ciphers Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Modern encryption and virtual security Rating: 0 out of 5 stars0 ratingsLearn Blockchain by Building One: A Concise Path to Understanding Cryptocurrencies Rating: 0 out of 5 stars0 ratingsPractical Video Game Bots: Automating Game Processes using C++, Python, and AutoIt Rating: 0 out of 5 stars0 ratingsSyngress Force Emerging Threat Analysis: From Mischief to Malicious Rating: 0 out of 5 stars0 ratingsPro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms Rating: 0 out of 5 stars0 ratingsEnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide Rating: 5 out of 5 stars5/5Secret Key Cryptography: Ciphers, from simple to unbreakable Rating: 0 out of 5 stars0 ratingsLinux+ Study Guide: Exam: XK0-001 Rating: 5 out of 5 stars5/5Cryptocurrency: Understanding Bitcoin, Bitcoin Cash, Ethereum, Ripple & Altcoins Rating: 0 out of 5 stars0 ratingsXBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts Rating: 4 out of 5 stars4/5Hacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5UNIX and Linux Forensic Analysis DVD Toolkit Rating: 0 out of 5 stars0 ratingsKali Linux, Ethical Hacking And Pen Testing For Beginners Rating: 0 out of 5 stars0 ratingsNetworking and Online Games: Understanding and Engineering Multiplayer Internet Games Rating: 5 out of 5 stars5/5The Cryptos Files: ICE Rating: 0 out of 5 stars0 ratingsCryptanalysis: A Study of Ciphers and Their Solution Rating: 4 out of 5 stars4/5Code Wars: How 'Ultra' and 'Magic' Led to Allied Victory Rating: 0 out of 5 stars0 ratingsDark Star Rating: 5 out of 5 stars5/5Who Broke the Wartime Codes? Rating: 0 out of 5 stars0 ratingsProfessional Cryptologists Rating: 0 out of 5 stars0 ratingsDeceiving Hitler: Double-Cross and Deception in World War II Rating: 4 out of 5 stars4/5X, Y and Z: The Real Story of How Enigma Was Broken Rating: 5 out of 5 stars5/5Indiscreet Letters From Peking Rating: 0 out of 5 stars0 ratingsSpy and Counterspy: Secret Agents and Double Agents from the Second World War to the Cold War Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5
Reviews for Manual of Cryptography
0 ratings0 reviews
Book preview
Manual of Cryptography - Luigi Sacco
MANUAL OF CRYPTOGRAPHY
INTRODUCTION
1. General Remarks
The need for corresponding by secret methods is as old as the race. Traces of secret writing are encountered in the study of all civilizations, even the most ancient, showing that in every age the corresponding science, cryptography, has had its devotees more or less genial. During the renaissance, the art of encipherment received a notable impulse from favorable political conditions, particularly in Italy and due to the work of the Italians Gerolamo Cardano and G. B. Della Porta, founders of modern cryptography, living in the second half of the 16th century (¹): but it was not until the century just past that studies of a truly scientific and general character began appearing on the subject. A notable flowering of cryptographic works took place in the closing years of that century, followed by a period of almost complete silence. The great war stimulated a notable revival, manifested in special literature and in the appearance of numerous cipher machines: a revival which is justified by the ever-increasing use of radio-telegraphic communication with its fundamental defect - easy interception - offering a vast field for the application of cryptography, particularly for military and political purposes.
Cryptography, in proposing the secrecy of communications which are to pass through unfriendly hands, has in view the safeguarding of the surprise element, a capital factor in every contest. To expose the secret of a message may foil a surprise: it may mean the failure of an enterprise. Hence the battle between cryptography and decryptment, the episodes of which, for the most part unknown, are not always bloodless. Many such episodes took place in the last great war, not all revealed to the public; those which are known, however, suffice to show the perils and injuries overhanging individuals, as well as governments and military commands, who attach too little weight to the weapon, or art, of cryptography. Many sources of very interesting information along this line have been listed in the bibliography at the beginning of this volume.
Here, we are going to concern ourselves with secret writing, that is, with the phase of secret language which is unfolded in written documents, leaving aside the spoken secret language even in its very modern form, secret telephony, or crypto-telephony, by means of which it is proposed that telephone conversations, by wire or radio, shall be rendered incomprehensible during transit.
As a matter of fact, the cryptological processes involved in this very recent branch of secret language are based on artifices pre-eminently technical, and of a nature totally different from those appertaining to secret writing which are to be examined here.
2. Different Kinds of Secret Writing
Secret writing may be classified in four separate categories:
The first three categories are used mainly for purposes of military espionage, or in clandestine correspondence of a politico-revolutionary character.
Sympathetic inks consist in colorless solutions of metallic salts (particularly of silver), or sometimes in organic substances such as the well-known lemon-juice, with which the secret text is hidden; the writing then remains invisible until revealed by some suitable process, such as the application of iodine vapor, which imparts color to the writing. This matter belongs to a special branch of chemistry, and will not further be dealt with.
Conventional writing and dissimulated writing aim at the transmission of a secret message by concealing it, in one of the two ways mentioned, in a plaintext which is apparently innocuous, and of such a nature as to arouse no suspicion on the part of those interested (censorship, police, etc.)
Enciphered writing, proper, comprises texts having quite frankly the appearance of secret and meaningless language, and is used for private, commercial, political and military purposes, especially in connection with telegraphic or radio transmissions.
We are going to begin with the type last mentioned, leaving for Part IV our discussion of other types of secret writing.
PART ONE
ENCIPHERED WRITING
CHAPTER I
GENERAL SURVEY
3. Fundamental Definitions.
a) To ENCIPHER means to translate plain language into enciphered language.
b) A CRYPTOGRAM is the text obtained after the encipherment; it is also referred to as enciphered text, as distinguished from plaintext.
c) CIPHER is the entirety of the documents or of the rules necessary to encipherment. Often, the word is applied only to the principal document, distinguished as the cipher;
to this may be added special rules, characterised by conventional words or numbers called keys, or by special encipherment tables.
d) To DECIPHER means to translate enciphered language into plain language, making use of the cipher legitimately in one's possession.
e) DECRYPTMENT is the process equivalent to decipherment, but performed by a person not the intended recipient of the cryptogram and without legitimate possession of the cipher.
4. Fundamental Elements and Operations of Encipherment
Elements of plaintext, to which encipherment rules may be applied, are: single letters, syllables, groups of two or more consecutive letters, words and phrases, or, finally, even fractions or parts of letters.
From the cryptographic standpoint, encipherment operations fall into two classes fundamentally different:
a) Transposition, in which the plaintext elements become transposed, that is disarranged in such a way as to make immediate reconstruction of the plaintext impossible for any person not in possession of the rule which governs the transposition.
b) Substitution, in which elements of plaintext are replaced with other elements, according to suitable lists or rules.
Both operations, of course, can be applied several times in succession, either separately or jointly. Normally, however, transposition is applied only to single letters, or to fractions of letters.
5. Literal Systems and Codes.
In the discussion of encipherment systems, these are generally grouped under two major classifications:
a) Literal systems, in which the elements undergoing change are letters, fractions of letters, or groups of letters of a given length, to which is applied the operation of transposition, or of substitution, or of both.
b) Code systems, applied to syllables, words and phrases of the plaintext by means of a simple substitution, which may or may not be followed by a second encipherment (called superencipherment) applied to the enciphered elements just obtained; this superencipherment, in its own turn may be either substitution or transposition.
This division will be adopted in the study which we are about to begin.
CHAPTER II
PRINCIPAL SYSTEMS OF LITERAL ENCIPHERMENT
6. The Make-up of Cipher Groups.
In the literal encipherment systems, single letters are altered to produce cryptograms made up of letters or figure without apparent meaning. If the cryptogram is to be transmitted by letter, it is immaterial whether or not the enciphered text consists of letters rather than of numbers or of some other symbol; but if, as is usually the case, the cryptogram is to be sent by wire or radio, matters are different. In this case it becomes necessary that cipher groups, in so far as is possible, be homogeneous, so as to avoid errors in transmission; and that that the cryptograms consist of groups containing a number, possibly constant, of letters only, or of figures only, all other symbols being, as a rule, excluded, as is also the intermingling of letters with figures. Normally, cipher groups will have a maximum of five letters or figures, this being the maximum permitted by telegraphic tariffs so that each group may be charged for as a single word. In order to eliminate uncertainties, literal cryptograms are always transcribed in printed capital letters.
7. Encipherment of Numbers and Punctuation Marks.
At this point the problem arises of obtaining homogeneous cipher groups from normal plaintexts which are heterogeneous, that is, consisting of words, numbers, and punctuation marks. For this purpose, a special convention is necessary, which could, as an example, be the following:
Remembering the fact that in Italian the letters K, W, X, Y are never used except in an occasional proper name, it is agreed that whenever a plaintext includes numbers or punctuation marks, this text, prior to encipherment, is to be prepared in the following way:
a) The letter K is placed before and after the numbers, and these, in turn, are replaced by the beginning letters of the alphabet which occupy the corresponding serial positions, that is: 1 equals A; 2 equals B; 3 equals C;......; 9 equals I and 0 equals J.
b) The period and the comma are replaced, respectively, by X and Y.
c) Whenever the letters K, X, Y, are to be used with their true significance instead of the conventional one shown above, the letter W is placed before them.
By such a plan, numbers and punctuation marks can be enciphered like any other plaintext letters and will provide cipher groups homogeneous with those derived from the other letters.
Example: Having to encipher giunti alle 13, 14, sul Krn,
we first transform the text to read giunti alle kacydjk sul wkrn,
and thus provide a text composed entirely of letters.
It is possible, of course, to establish other conventions which will permit the restoration of the original numbers and punctuation marks by the person who must afterwards decipher.
8. Numerical and Literal Keys
In a very large number of cryptographic systems, secrecy is entrusted to a special convention which is individuated by means of a key, usually an easily-remembered word or phrase, which directly governs the operation of encipherment, or which serves for operations necessary to the encipherment. Often such keys must first be transformed into numerical keys of a specific length.
The simplest method for converting a mnemonic key into a numerical key consists in numbering the successive letters of the key according to their order of succession in the normal alphabet.
For instance, take the key-word Montevideo
:
5 7 6 9 2 10 4 1 3 9
M O N T E V I D E O
The number 1 is placed above the letter D, which is the first letter of the normal alphabet to be found in the key; the number 2 is placed above the first E, the number 3 above the second E, and so on.
The resulting numerical key is 5, 7, 6, 9, 2, 10, 4, 1, 3, 8.
By the same procedure, it is possible to derive from the same keyword numerical keys of various lengths, as 6 or 15:
6-digit key:
2 4 3 5 1 6
M O N T E V
15-digit key:
6 10 8 13 2 15 5 1 3 11 7 12 9 14 4
M O N T E V I D E O M O N T E
CHAPTER III
LITERAL TRANSPOSITION SYSTEMS
9. General Remarks.
Methods are very numerous indeed for enciphering by transposition that is, by alteration of the natural sequence of letters in a text, but many of these are extremely simple and others much too complicated, so that the number of systems practical for use is limited to three or four, or specifically to: simple transposition, key transposition, grille transposition, and double transposition.
We will show one example of each of these.
10. Simple Transposition
With the aid of quadrille paper, the letters of the plaintext are written successively into the cells of a given rectangle and are then taken off in an order different from that in which they were written.
Example: The number of cells per line is to be nine; a 45-letter text will result in five lines, and the letters of the block thus formed can be taken off in various ways, as: by columns from right to left, by columns from left to right, by reversed columns, by alternate columns, by diagonals from left or right and from top or bottom, and so on, thus producing various different cryptograms of which two examples are shown:
1 2 3 4 5 6 7 8 9
R I N F O R Z I G
I U N G E R A N N
O S T A N O T T E
Q U O T A K B J K
G E N T I L O N I
RIOQG – IUSUE – NNTON – FGATT – OENAI – RROKL – ZATBO – INTJN - GNEKI
RIIOU – NQSNF – GUTGO – EOAER – NTNRZ – TAOAI – IKTNG – LBTNO - JENKI
In case the rectangle does not come out complete, the empty cells resulting on the last line are to be filled with meaningless incoherent letters. The person receiving the cryptogram must, of course, be informed of the method, in order to decipher. Knowing this, as well as the fixed number of letters per line and the number of letters in the cryptogram, he need merely ascertain how many lines are to be used, thus fixing the dimensions of the rectangle in which the cryptogram must be contained; all that then remains is to fill the rectangle, using the agreed method, and read the text, which must come out normally arranged.
11. Key Transposition
With the plaintext written into a rectangle whose width, expressed in letters, is equal to the number of letters in the key, the cryptogram is taken off by columns following the order indicated in the numerical key, which, for that purpose, will be written out at the top of the rectangle. That is, we begin by taking off the column indicated by the number 1 of the key, and continue by taking off the 2nd, the 3rd, etc. When the rectangle does not come out complete, it can either be completed with incoherent letters or to be left incomplete. In the latter case, the difficulties of the correspondent who deciphers it are slightly increased, since he must deduce from the number of letters the number of cells to be left vacant in order to decipher.
Example of completed rectangle:
D:\LIBRARY\Sacco\Sacco Images\2020_07_05\8_0002.tifCryptogram to be transmitted:
CEIOU ENCBD SNNQT IUCUN IOOOK HMOSA DIOIO SIROY EZRTX
To decipher, taking into account the fact that the key has 9 letters and the text 45, all that is needed is a rectangle of nine columns, each with five cells (45), to be filled with the enciphered text, taking successively column 1, 2, 3... of the key; at the end od the operation the plaintext appears, written in normal order.
Example of incomplete rectangle:
D:\LIBRARY\Sacco\Sacco Images\2020_07_05\8_0003.tifCryptogram to be transmitted:
EAAPO AFOLR ABTEE IOUSI IMEBI TCFTG ARITR RT
To decipher, the recipient, finding that the text has 37 letters, and knowing that the key has 7, prepares a rectangle with five complete lines plus a final one having only two cells (2 equals remainder from division of 37 by 7); he then writes the key across the top and begins filling the rectangle as follows:
D:\LIBRARY\Sacco\Sacco Images\2020_07_05\9_0002.tifand continues until it is completed; the text comes out in normal order.
12. Grille Transposition
Grilles for effecting transpositions have been devised in great numbers. We will describe the two principle types, that is, the rotating grille and the indefinite grille. Both of these consist of a card, or a sheet of thin metal, marked off into squares, and pierced irregularly with holes; cryptograms are prepared by writing the letters of the plaintext into the successive openings of the grille.
13. Rotating Grilles
The square rotating grille is the oldest known (Cardano, 16th century); in this, one-fourth of the available cells (excluding the central, when there is one) are cut out, and the arrangement of these openings is such that if the grille be placed over a corresponding square of paper and rotated in a succession of 90 degree angles, the successive turns of the grille will in the end expose the total number of cells on the lower square. Thus, if the apertures exposed during the successive rotations be filled with plain-text letters, it is found at the end of the operation that on the square beneath are grille all the cells have been filled in, but in an apparently incoherent manner. Afterward, the taking-off can be accomplished by any one of the conventional routes, that is, by normal lines, by direct or reversed columns, by diagonals, or even with a numerical key of the kind shown under No. 11.
Example of the square grille:
Text to be enciphered: Missione compiuta riento subito Cap. Rota.
Successive positions of the grille:
D:\LIBRARY\Sacco\Sacco Images\page 11_0001.tifSuccessive inscription of the square:
D:\LIBRARY\Sacco\Sacco Images\page 11_0002.tifCryptogram to be sent (taken off by lines, from the left):
T M E I O S N C O A S M P T I P R R I O O O N U T
S T A A E U R B C I I
To form grilles which will satisfy the essential condition of exposing, in four successive positions, the entire number of cells on the square beneath, one may proceed very simply by first calculating arbitrarily the position of one aperture, then cancelling with a mark the three cells which can be occupied by that aperture in the three remaining positions; this done, another aperture may be selected arbitrarily from among the un-cancelled cells, and its three corresponding cells cancelled; this may continue until a number of apertures has been selected which is equal to one-fourth of the cells of the grille. Mathematical rules, too, have been formulated for the purpose, of which it is hardly worth to speak, inasmuch as the system does not present a sufficient guaranty of secrecy.
D:\LIBRARY\Sacco\Sacco Images\page 12.tifWith grilles, too, it can be agreed either to fill with nulls any cells which remain in excess of the number required by the text to be transmitted, or to leave the grille incomplete. In the latter case, however, it is necessary, before beginning the encipherment, to count the letters of the text and cancel the cells which are to remain vacant on the last lines, covering these, say, with black or red chalk, so that when they become exposed during the rotations of the grille, they will not be used.
Should the length of the text exceed the capacity of one grille, it can be agreed to use the same grille a second or a third time, or to reverse it by turns, then leaving the last grille incomplete.
Example of the incomplete grille. Having to transmit the text: Urgone munizioni mitragliatrici: since the text has 29 letters while the grille has 36 cells, the last seven cells are to be cancelled. The rest are then filled in the usual way.
D:\LIBRARY\Sacco\Sacco Images\page 13.tifCryptogram to be sent (taken off by column from the left):
M M I R Z N A I C A L R U N I U T T I G I G N O O I R O I
Other rotating grilles can be obtained with other regular figures (triangles, pentagons, hexagons, etc.). One ingenious type was originated by Collon, called cubic from its appearance of perspective, which is enclosed in three positions of the grille. This can also be obtained of double a capacity by dividing the cells transversely in two.
The subjoined figure gives an example of the single cubic grille.
D:\LIBRARY\Sacco\Sacco Images\page 13c.tifTo decipher the cryptograms resulting from rotating grilles the figures resulting from the figures resulting from the agreed method must first be filled, using the enciphered text, after which the plaintext is read from these by placing the grilles above them in its various prescribed positions.
To avoid any ambiguity, it is necessary to point out by means of special indicators the various positions which a grille may assume (for the square grille, 4 direct, 4 reserved), so that the citing of one of these indicators at the beginning of a cryptogram can show which of these positions has been assumed as the first.
14. Indefinite Grilles (Sacco)
These are rectangular grilles with the height fixed and the length arbitrary. Each column carries a fixed number of apertures, which are disposed at random.
The writing in of the plaintext is done by columns and the taking off by lines, the resulting cryptogram being written in groups the length of which equals the number of apertures per column. In deciphering, it suffices to know the number of groups, since this number equals the number of columns engaged, into which the cryptogram must be written in order to read the plaintext from the columns.
Example of grille with three apertures per column:
D:\LIBRARY\Sacco\Sacco Images\page 14.tifExample of encipherment. - Text to be enciphered:
Ripiegare subito sulla posizione di partenza.
D:\LIBRARY\Sacco\Sacco Images\page 15.tifCryptogram to be sent: taken off by lines from the left, top:
I Z I L I I S T R O N R A S S I R E P N O A I P
E T U U D E E B P A Z G L O A
There are thirteen groups, indicating the engagement of thirteen columns. To decipher, it is sufficient to write the cryptogram in lines, beginning at the top, left, through the aperture of the grille, stopping at the thirteenth column, since there are thirteen groups, and then to read the plaintext by columns, beginning at the left.
Indefinite grilles may take 4 positions (two right-side up and two reversed), and these can be distinguished by four designations, the mention of which in the cryptogram will indicate the one used.
15. Double Transposition with Key.
This consists in applying twice in succession the single transposition shown under No. 11, the enciphered text obtained from the first encipherment being treated as a plaintext which now receives a second encipherment with the same key, or, if desired, with a different key.
Example: The text considered under No. 11, keyword Venezia, is to be enciphered: the cryptogram already enciphered there is taken and enciphered again with the same key:
Mnemonic Key V E N E Z I A
Numerical Key 6 2 5 3 7 4 1
Text from 1st encipherment
E A A P O A F
O L R A B T E
E I O U S I I
M E B I T C F
T G A R I T R
R T
Cryptogram to be transmitted:
F E I F R A L I E G T P A U I R A T I C T A R O B
A E O E M T R O B S T I
For decipherment, of course, the incomplete rectangle must be prepared twice, taking into consideration the number of letters in the cryptogram and the number of letters in the key.
Transposition systems, generally speaking, are not advisable alone, because, as we shall see, they do not afford sufficient of secrecy. They are, however, process quite useful in conjunction with other systems, and in necessary operations, or those of superencipherment.
CHAPTER IV
LITERAL SUBSTITUTION SYSTEMS
16. General Remarks
In literal substitution systems, each letter of plaintext becomes replaced with a conventional symbol, which may be another letter or any other symbol whatever. But for telegraphic correspondence, only those systems are used which result in homogeneous groups, of letters or of numbers. We shall often make use of the expressions plaintext letter and substitute, or cipher letter, in order to distinguish between the unenciphered letter and the corresponding symbol which represents it in cipher.
Literal substitution systems can be distinguished as appertaining to two general classes: monoalphabetic and polyalphabetic.
In monoalphabetical systems, two alphabetic lists are prepared, one called the plaintext alphabet, or deciphering list, which contains the 26 letters of the alphabet arranged in normal order (and sometimes the ten digits and a few punctuation marks); and a second list, called the cipher alphabet, or enciphering list, adjacent to the first and comprising the symbols which are to correspond to the systems of the plaintext alphabet. Sometimes the system is completed with another pair of lists to be used for deciphering, in which it is the cipher alphabet that is rearranged in alphabetic order and the plaintext alphabet in the order consequent upon this.
In polyalphabetical systems, instead of the single cipher alphabet, there are several, each used in turn according to suitable conventions or keys.
Leaving aside those systems, extremely numerous, in which the cipher alphabet is composed of more or less cabalistic signs and which are useful, if at all, only in epistolary correspondence, we may confine our observations to those in which the cipher alphabet comprises letters only or numbers only.
Concerning those of numbers only, it may be noted at once that, with only 10 digits and at least 21 letters, it is impossible that each letter be represented by a single digit, so that texts enciphered in this way must have a length greater that of the plaintext, a fact which, generally speaking, renders them less desirable.
This was the type of the portable military cipher (²*) formerly used in our own army, of which mention will be made in the material that follows.
We have noted elsewhere that any occasional numbers and punctuation marks which must be enciphered can be replaced, prior to encipherment, by the use of suitable conventions of the kind pointed out under No. 7, so as to make the enciphered text consists entirely of letters; this is very advisable for the avoidance of errors in transmission by telegraph or radio.
17. Rules for forming Cipher Alphabets.
Since literal systems, as a rule, must be used without recourse to handy books or instructions, the problem is at once presented of forming cipher alphabets with the assistance of rules which are simple and easily remembered. Let us, then examine some of these rules:
a) The shifted alphabet. Example:
Plaintext alphabet A B C D E F G H I J K L M N O P Q R S T...
Cipher alphabet K L M N O P Q R S T U V W X Y Z A B C D...
With this list, the plaintext letter A is to be replaced, in the cryptogram, by the letter K: B by L, etc. This kind of cipher alphabet may be identified by some single letter, for instance the one which corresponds to A of the plaintext. In the given example, the K-alphabet is being used.
b) The reversed and shifted alphabet. Example:
Plaintext alphabet ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher alphabet PONMLKJIHGFEDCBAZYXWVUTSRQ
Here, A is to be enciphered with P, B with O, etc. This second method is characterized by a reciprocal correspondence between letters of the two alphabets: that is, if A is enciphered with P, then P will be enciphered with A, etc. In this case, too, the cipher alphabet is effectively identified by naming the letter which corresponds to A of the plaintext alphabet, in the given example, P.
c) The use of a numerical key, that is, one derived from a mnemonic key, applied in the manner shown under No. 11 for transposition with a key.
Example:
Mnemonic key J U G O S L A V I A
Numerical Key 5 9 3 7 8 6 1 10 4 2
Normal alphabet A B C D E F G H I