some pertinent points on the solution of … · transposition ciphers and anagrams, skill at ana...

8
SOLVING CIPHER SECRETS Edited by M. E . Ohaver SOME PERTINENT POINTS O N T H E SOLUTION OF ANAGRAMS AND TRANSPOSITION CIPHERS-ALSO ANOTHER FREE SUBSCRIPTION DEED being instances of it in the word, and NAME NO ONE MAN an example in the sentence. The anagram is a very ancient form of amusement, its invention being somewhat; doubtfully attributed to the Jews. But ana- grams were also well known to the ancient Greeks and Romans. And during the Mid- dle Ages they became popular throughout Europe, and especially in France, where, during the reign of Louis XIII, a certain Thomas Billon held the curious office of anagramatist to the king. An interesting anagram of this period, to cite one from many, and incidentally to illustrate this kind of device, is A JUST MASTER, made upon JAMES STUART by the courtiers of James 1. Anagrams were put to a practical use by medieval and early modern savants, who seem to have employed them as a means of concealing scientific discoveries during their periods of verification. Thus it was in the anagram, " JJaec immatura a me jam frus- tra leguntur—oy," made upon " Cynthice ftguras cemulatur Mater Amorum," that Galileo hid his discovery that Venus had phases like the moon. The procedure of anagramming is very simple. Letters that spell a word are se- lected from the text being anagrammed. Other words capable of being used with the first are similarly formed from any remain- ing letters. I n the pure anagram this proc^ N' view of the certain sim- ilarity that exists between transposition ciphers and anagrams, skill at ana- gramming is a necessary qualification of the cryp- tographer. In the transposition cipher, the letters are transposed in a predetermined order, form- ing an unintelligible sequence of letters in the transposed series, or cryptogram. In the anagram, however, the letters are trans- posed in any manner whatsoever that will result in an intelligible sequence of letters in the transposed series, or anagram. In solving either the anagram or the transposition cipher, therefore, the problem is to discover the original text by rearrang- ing the letters. It is, of course, obvious in this connec- tion, that methods of solution peculiar to transposition ciphers cannot be used to ef- fect a solution of the anagram. But it is equally clear that anagramming may afford a method of solving the transposition cipher; and a consideration of this will form the substance of this article. The word anagram comes from the Greek ana, backward, and graphein, to write. And it was fonnerly applied only to words or sentences that read exactly the same both forward or backward. The term palin- drome, however, came to be used for this yariety of anagram, LEVEL, NOON, and

Upload: buicong

Post on 07-Apr-2019

238 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

S O L V I N G C I P H E R S E C R E T S Edited by M. E . Ohaver

S O M E P E R T I N E N T P O I N T S O N T H E S O L U T I O N O F A N A G R A M S A N D

T R A N S P O S I T I O N C I P H E R S - A L S O A N O T H E R F R E E S U B S C R I P T I O N

DEED being instances of it in the word, and NAME NO ONE MAN an example in the sentence.

The anagram is a very ancient form of amusement, its invention being somewhat; doubtfully attributed to the Jews. But ana­grams were also well known to the ancient Greeks and Romans. And during the Mid­dle Ages they became popular throughout Europe, and especially in France, where, during the reign of Louis X I I I , a certain Thomas Billon held the curious office of anagramatist to the king.

An interesting anagram of this period, to cite one from many, and incidentally to illustrate this kind of device, is A JUST MASTER, made upon JAMES STUART by the courtiers of James 1.

Anagrams were put to a practical use by medieval and early modern savants, who seem to have employed them as a means of concealing scientific discoveries during their periods of verification. Thus it was in the anagram, " JJaec immatura a me jam frus-tra leguntur—oy," made upon " Cynthice ftguras cemulatur Mater Amorum," that Galileo hid his discovery that Venus had phases like the moon.

The procedure of anagramming is very simple. Letters that spell a word are se­lected from the text being anagrammed. Other words capable of being used with the first are similarly formed from any remain­ing letters. I n the pure anagram this proc^

N' view of the certain sim­ilarity that exists between transposition ciphers and anagrams, skill at ana­gramming is a necessary qualification of the cryp­

tographer. I n the transposition cipher, the letters are

transposed in a predetermined order, form­ing an unintelligible sequence of letters in the transposed series, or cryptogram. I n the anagram, however, the letters are trans­posed in any manner whatsoever that will result in an intelligible sequence of letters in the transposed series, or anagram.

I n solving either the anagram or the transposition cipher, therefore, the problem is to discover the original text by rearrang­ing the letters.

It is, of course, obvious in this connec­tion, that methods of solution peculiar to transposition ciphers cannot be used to ef­fect a solution of the anagram. But it is equally clear that anagramming may afford a method of solving the transposition cipher; and a consideration of this will form the substance of this article.

The word anagram comes from the Greek ana, backward, and graphein, to write. And it was fonnerly applied only to words or sentences that read exactly the same both forward or backward. The term palin­drome, however, came to be used for this yariety of anagram, LEVEL, NOON, and

Page 2: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

634 F L Y N N ' S W E E K L Y

ess is continued until every letter of the original text has been used up in the for­mation of the anagram. I n the impure anagram there is a remainder of unused letters.

I n making or solving an anagram, a con­venient method is to write each letter upon a slip of paper, as this permits of the rapid formation and breaking up of letter combin­ations.

The cryptographer can also call into play his tables of digraphs, trigraphs, and so on, as these suggest probable sequences of let­ters that can be developed into longer se­quences, or used en bloc with other com­binations.

Often it is possible to form more than one anagram from the same letters. Take the word RAPIERS, for example, which can be anagrammed into PARRIES, ASPIRER, PRAISER, and REPAIRS.

More than a single solution to some ana­grams and transposition cryptograms thus looms as a possibility. I n the case of ci­phers, this contingency is rendered even more probable by the fact that many cryp­tograms necessarily contain null letters, which are unknown to the decipherer, and which, of course, should not be used in anagramming.

Consequently, in solving a transposition cipher by anagramming, every advantage should be taken of any information that might suggest the nature of the message, or afford a clew as to the identity of any of its words. For not only will this simplify the problem in any case, but it will also tend to insure the correct decipherment when more than one legitimate interpretation is possible.

Ordinarily anagramming can be used to advantage with almost any transposition cryptogram, either in its entirety, or with some of its letters in the discovery of one or more words. But to better demonstrate the possibilities of anagramming as a cryp­tographic method, it should preferably be illustrated with a cipher that cannot be readily solved in any other way.

Such a cipher is the following, in which the order of transposition is determined by a numerical key obtained from a key word, phrase, or sentence, of any length; the key

— HONOR AND COUNTRY— ha.vmg been used in this instance.

Message: A M M U N I T I O N W I L L B E S H I P P E D T O N I G H T . W A T C H O U T F O R S P E C I A L S E R V I C E S Q U A D .

HONORANDCOUNTRY 4 8 S 9 " ' ( > 3 3 ro 14 7 ij 12 ij A M M U N I T I O N W I L L B E S H I P P E D T O N I G H T W A T C H O U T F O R S P E C

I A L S E R V I C E S Q U A D

1 2 3 4 5 6 7 8 g JO iz 12 13 14 IS l O I A M T I M U N N L L W B P T D E H E I S I O P H G N T O F T W T U S A C O H E P R C R C I I L V Q A S E . E A U S D

Cryptogram: l O I A M T I M U N N L L W B P T D E H E I S I O P H G N T O F T W T U S A C O H E P R C R C I I L V Q A S E E A U S D .

I n transforming the literal key of this cipher into a numerical key, as shown above, its letters are numbered serially in alphabetical order, repeated letters being taken from left to right.

Thus, there being an A in the present key, it is assigned the number i. B is not used, and consequently C and D, which oc­cur once each, are numbered 2 and j re­spectively. Similarly H, next in alphabeti­cal order, is numbered 4. N, occurring three times, is next after H alphabetically, and is therefore numbered 5, 6, 7, from left to right. The remaining letters are treated in the same manner; the whole of the nu­merical key being shown in the accompany­ing illustration.

This key contains fifteen numbers. Ac­cordingly the message is written beneath it in lines of fifteen letters each, forming fif­teen columns, each headed by a key num­ber. Should there not be enough letters in a given message to completely fill the last line, nonsignificant or null letters must be supplied, so that it vrill equal each of the other lines in length.

The letters in each row are now trans­posed in the order indicated by the numeri­cal key. When a message forms more than one such row of letters, as in this instance, this can be more rapidly done by transpos­ing the columns, than by a separate manipu­lation for each line.

Finally, to complete the process, the let-

Page 3: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

S O L V I N G C I P H E R S E C R E T S 635 ters are transcribed in this transposed order, grouped as desired, but usually by fives as herewith.

A cryptogram enciphered in this system actually consists of one or more cycles of transposed letters, the length of the cycle being entirely dependent upon the length of the key.

Such a cipher can be deciphered with the

(6 v o w e l s = 4 o % )

from normal the proportions of these letters in cycles other than that actually used.

The following figure illustrates this by showing how nine consonants from the first two real rj-letter cycles of the present cryp­togram would accumulate in this way in the second ro-letter cycle, when the crypto­gram is divided into cycles of this supposed length.

(S v o w e l s = 3 3 % )

l O I A M T I M U N N L L W B P T D E H E I S

6 v o w e l s = 6 o % )

key, of course, by a mere reversal of the process just described. But to decipher a cryptogram in any system of this kind by the method here proposed, it is first required to find the length of the transposition cycle, and then the order of transposition in the cycle.

In ciphers of this kind the number of letters in a cryptogram is always a multiple of the length of the transposition cycle. And, in illustrating the method, the crypto­gram already given can be used as a repre­sentative example of such transposition ciphers.

The present cryptogram consists of 6o letters. Hence it might have been enci­phered in / cycle of 6o letters; in 2 cycles of JO letters each; in j cycles of 20 letters; in 4 cycles of 7 5 ; and so on.

When several cycles are thus possible by factoring, some of them can ordinarily be eliminated by testing for the usual propor­tions of 4 0 % for the vowels A E I O U , 3 0 % for the consonants L N R S T , and 2 % for the consonants J K Q X Z .

For all letters in any cycle of the length actually used form a consecutive series in the original text, and cannot therefore vary much from the above averages. On the other hand, if the cryptogram is divided into cycles of any other length, the letters of such cycles do not form consecutive series in the text, and will often vary considerably from these normal proportions.

This is because the rather uniform inter­mixture of vowels and consonants in ordi­nary English is often so disarranged by transposition that the vowels or consonants collect in bunches, thus sometimes altering

( i v o w e l = : i o % )

The following tabulation shows the vowel counts for the different cycles possible in case of the present cryptogram. Tests for the consonant groups may also be made, but those for vowels are usually sufficient. Counts can be made, of course, either di­rectly from the cryptogram, or by writing the latter in lines of the various lengths and counting the vowels per line.

Length of cycle

60 30 20 I S 12 to 6

Number Vowels of cycles per cycle

1 23 2 J1-12 3 7-8-8 4 6-S-S-7 5 6-4-3-4-6 6 6-1-4-4-3-3

10 4-2-0-4-1-2-3-1-2-4 et cetera.

These figures' show that the d-letter cycle is ithpossible, for the third cycle of six let­ters contains no vowels whatever, and five other cycles contain but one or two vowels.

The /o-letter cycle can also be rejected, for the second cycle of ten letters contains but one vowel. And in the 72-letter cycle, the third cycle contains but three vowels, or only twenty-five per cent of the number of letters in the cycle.

Vowel tests for cycles of 75, 2 0 , and jo letters—and, of course, 60 letters—are all normal. However, a little thought will show that the use of any given cycle must result in normal tests also in all cycles which are multiples of it in length.

The normal test here for the 30-letter cycle thus probably results from the use of a 75-letter cycle, which should accordingly be tried first as more probable than one of JO or 60, or even of 20 letters.

Page 4: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

636 F L Y N N ' S W E E K L Y

Accordingly the cryptogram is now tran­scribed in lines of fifteen letters each, where­upon, by numbering the columns so formed from J up to 75 in regular order, the same arrangement as was reached above in enci­phering will be restored.

I n some cases these tests will indicate a cycle of the same length as the cryptogram itself. I n this event the cipher must be solved by straight anagramming, as briefly outlined above. I n general, the difficulty of solving such a cipher increases with the length of the message.

I n the present instance, however, the cryptogram has been found to comprise several cycles, each of which, to our pur­pose, constitutes an anagram whose letters have been arbitrarily transposed. Since an identical order of transposition very prob-

13—3 L I G D P T U I

S2 2

10

3

67

13—4 L A G E P W U I

13—8 30

2

3

60

M S

A A

4 7

30 6

47

ably exists in all of these cycles, this will now permit their solution simultaneously by a method that might well be called mul­tiple anagramming.

This method is most easily applied by transcribing the columns of letters just ob­tained upon as many slips of paper, of which there would here be fifteen, each bearing four letters, and a key number at the top.

These slips may now be anagrammed, or tried in various combinations, to secure probable sequences of letters in all lines. I t is sometimes practical to try for some cer­tain word whose presence is suspected in the message. Or any frequently used digraph, such as TH, HE, ER, IN, et cetera, may be taken as the nucleus about which to build up the solution. A complete table of digraphs, with frequencies per ten thousand, was printed in F L Y N N ' S W E E K L Y for Janu­ary 23, 1926.

The present cryptogram, however, con­tains Q. And a peculiarity of this letter in the English language is that it is always followed by U, and then by another vowel, A, E, I , or O. Of course this Q might be a null; and in this connection it is important

that allowance always be made for improb­able sequences that might be caused by null letters, these being most commonly used at the beginnings or ends of messages, but possible anywhere.

I n this case the combination of slips 7-13, forming QU in line four, also gives good sequences—IL, IG, and SP—in the first three lines.

There are now six different slips having a vowel in the last line to be tried after the 7-13 combination, all of which form more or less probable sequences throughout. Of several such sequencesj/that which is mathe­matically the most probable can be deter­mined at any stage of the decipherment by comparing the total frequencies of the di­graphs formed by each pair of slips, as in the subjoined tabulation.

13 70 L N o G O 22 P O 33 U E 8

63

13—II L N o G P 3 P H 4 U E 8

I S

13 72 L L 42 G H 2S P E 31 U A 6

104

The numbers following each digraph are taken from the table of digraphs just mentioned. The total 104 for slips 13-12 is far in excess of any of the others, and therefore this combination, giving the series 7-13-12, is the most probable.

I L L in the first line of this combination is probably WILL, since there is a W in the first line of slip 14. And the combination 14-7-13-12, so formed, gives SQUA in line four, probably SQUAD, as slip 75 has D in line four, thus expanding series to 14-7-13-12-15-

Next, WILLB in line one looks like WILL BE, and -SPEC in line three sug­gests SPECIAL. But there is no E in the first line of any slip, nor an 7 in the third. However, these letters are found in the sec­ond ahd fourth lines respectively of slip 4. And this seems to indicate that SQUAD ends the message, slip 75 being the last of the series, and slip 4 the first.

I n further developing the word SPE­CIAL, both slips 8 and 12 have an A in the fourth line, and form very probable com­binations throughout with what has already been worked out. B y the digraph test, how­ever, 4-8 wins out over 4-12 by a heavy

Page 5: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

S O L V I N G C I P H E R S E C R E T S 637 margin. The frequency for lA is here omitted, since it would only equally increase both totals.

4-8 4—T2

A M A L 63 E S " S E H 28 W A s s W E 31

I A s s

I A

202 13T

Adding slip 5, to complete SPECIAL, the message and numerical key are now de­veloped to the point shown in the following illustration:

8 4 8 5 14 7 1 3 1 2 1 5

A M M W I L L B B 8 E N I G H T W A T R S P £ C I A I s Q U A D Q U A

The key thus far discovered is 4-8-5 . . . 14-7-13-12-15. B y a continuation of the process, which is here unnecessary, the whole of this key can be found.

This method should demonstrate that a transposition cipher is of maximum value when the transposition cycle is as long as the cryptogram itself, and when it is pos­sible to prevent the accumulation of crypto­grams of the same length and in the same key.

I t can be used to solve any transposition

O C V E I W R R E E E E F Y E H A D S L V A U R L Q P T P S

N E I D E U D Y S O E A Y W D O C E F Y S H .

cipher using a fixed transposition cycle, such as the cipher here used, the Fleissner grille, or the Nihilist transposition method. Or by its means more than one cryptogram of the same length and key can be solved at one operation.

Further, having solved a cipher by this method, a consideration of the numerical key so obtained will often aid in identifying the system when this is unknown, or in the discovery of additional facts about it. Thus, here it would be possible to recover the literal key by an analysis of this series of numbers, although how to do this is some­what beyond the scope of this article.

To try the skill of the decipherer at the present method, two ciphers of the key phrase type are here offered for solution.

These ciphers, which purport to be inter­cepted messages written by members of a band of counterfeiters, are, as a matter of fact, purely fictitious.

But, for our purpose, they might just as well be genuine messages written by des­perate criminals.

Any police department, with the transla­tions of these ciphers, would probably make short work of capturing this band of coun­terfeiters.

What if their arrest depended upon your. deciphering these messages?

Would you be there at the round-up?

. C I P H E R No. I . A N A Q Y U R R R A

C I P H E R No. 2.

E S D W R E E E T

E R T S A S A A R R

E E B S N D N U L F

D F Y I D E N A A E

E R T I O Y L D R O

A N O T H E R F R E E S U B S C R I P T I O N T O F L Y N N ' S W E E K L Y I n cipher No. 3, submitted' by Charles

P. Winsor, Boston, Massachusetts, the fans again have an opportunity to win a year's subscription to this magazine.

The first correct solution submitted will be awarded the subscription, postmarks de­termining the priority of entry. I n case of more than one solution submitted on the same date, the one accompanied by the clearest explanation of the cipher system will be winner.

All solutions to receive consideration must be mailed within one month from the date

of this issue. A complete explanation of the cipher will be printed in an early issue of F L Y N N ' S W E E K L Y .

C I P H E R No. 3 (Charles P . Winsor) . G E N E R A L

171143 153040 338032 S4I210 236236 41334s 4I826S 686582 563251 387425

J . E . B . 14904s 387262 157641 251040 545404 220383 203410 035058 532117 418504

S T U A R T : 228420 041543 069261 122266 140555 555433 558629 54515s 410546

636257 R . E .

146531 487688 603680 582030 034139 559636 236490 622266 143531 569533 151487 425137 487247 236387 639549 11604s 143418 399047 223648 L E E , General.

Page 6: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

638 F L Y N N ' S W E E K L \

Mrs. Charles J . Mundy, Thibodaux, Louisiana, is the propounder of the next problem, which presents an interesting study of the simple substitution cipher. I f you solve it, see what you can hnd out about the structure of the alphabet.

C I P H E R No. 4 (Mrs . Charles J . M u n d y ) . PAOQ O Q U I G X A E V J O P A U X U P V O Y P O I M E G J A D I A L P O R O B E Q P A E D O V Q P A U R D Y D P A E U R X A U N E P P A E R U P P E V A U R D N E O ZSQO C X R G V E K E V Q E T

Mr. Bellamy, of Boston, the author of No. 5, says his cipher " looks like a REBUS." (Note the third from last group). But really it is a transposition cipher that can be solved by the method given in this article. After you solve this, try to identify the cipher system. C I P H E R No. s (Arthur B e l l a m y ) .

A E G T S R A T I E O S S L A C V I R I M P O N H A O A R F R N D D I T I E R S D I E N A C R G L R R T S A O Y I N A O N F E E T B P I T O E L H S I L D L U E T W T H I R E B U S E N F O T O I N I N

About No. 6 there is an unmistakable ring of challenge. Read this correspond­ent's letter, and let us know if you agree with him:

D E A R S I R : I am sending you a cipher which I think

is a " sockdolager," i f there ever was one, the objection to it being that one has to be too dog-gone careful in writing a message or he w i l l make mistakes that w i l l throw the whole thing out of gear.

So sure am I that this cipher is almost i m ­possible to solve that I am writing the solu­tion right h e r e — " E A S Y I F Y O U K N O W H O W , B U T A L M O S T I M P O S S I B L E I F Y O U D O N ' T ' '—and you can print both the cipher and the sentence itself, i f you wish, as a defy to anybody interested in such.

W. E . M C C R A C K E N . San Antonio, Texas.

C I P H E R No. 6 ( W . E . McCracken) . 25,23,19.7—11,24—20,17,7—174.2,9— 12,8,9—631—s, 12,2,3,3,2—16,5,4,2 6, 5,27,17,20,11,20—5,24—20,17,7— 10,12,26,7.

Whether your school days are present day realities, or only memories of the past, you will enjoy the ensuing letter, and the cipher that came with it.

D E A R S I R : Y o u w i l l probably remember in your own

school days as in the days of Huckleberry • F i n n and T o m Sawyer, one of the chief amusements after school was the organizing and operating of a " Secret Society" with the usual caves, dens, and so forth.

I know we used to have one, and the fol­lowing is a sample of the "secret w r i t i n g " which we invented.

I am inclosing it , not so much for the pur­pose of puzzling any one, as to show the i n ­genuity of the schoolboy's mind at the age of about twelve or thirteen.

A , S. B i N N I E . Waterton Lakes Park, Alberta, Canada.

C I P H E R No. 7 (A . S. B i n n i e ) .

T H E S C H O O L B O Y ' S M E S S A G E

21 33 21 73 42 32 34 63 12 73 32 73 22 23 62 32 61 23

2 53 2 61 22 62 62 41 23 63 21 73 20 13 73 62 23 51 32 73 22 14 19 S3 32 13 10 44 61 61 13 31 61 21 S I ,63 79 63 18 51 S3 21 72 17 22 73 98 51 23 23 73 20 72 32 22 34 61 32 34 72 42 21 33 32 32 13 13 13 61 23 73 80 53 62 82 12 88 13 22 61 21 73 62 73 30 71 73 13 76 53 54 3 23 23 23 85 63 23 12

9 72 89 71 S3 23 23 71 23 73 6 i 33 — 78 71 13 40 26 22 6 i 62 22 — — 73 — 61 73 21 32 22

— — 13 63 61

T r y your skill at these ciphers, fans, and send in your solutions. Or submit a cipher of your own devising, if you wish, to puzzle your fellow decipherers.

. The solutions to all the ciphers in this issue, excepting No. 3, will be published in the next Solving Cipher Secrets.

SOLUTION T O MAY 22 C I P H E R S How many of you correctly deduced from

the given data the identity of the key vol­ume used with the No. i book cipher in the May 22 issue of F L Y N N ' S W E E K L Y ?

They who reasoned this out after the manner of Sherlock Holmes must have

reached the conclusion that, since the key volume was necessarily a book in the pos­session of every reader of the magazine, it could hardly be anything else than the May 22 issue of F L Y N N ' S W E E K L Y itself!

I n fact, the first number of each group of

Page 7: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

S O L V I N G C I P H E R S E C R E T S 639 two in this cipher referred to a paragraph of the May 22 Solving Cipher Secrets; and the second, to a word in that paragraph.

Thus, the first pair of numbers, 41-26, indicates the 26th word—WARN—of the 41st paragraph of that article. The entire message, similarly deciphered, follows:

W A R N L U S I T A N I A P A S S E N G E R S 4 1 — 26; 4 3 — 1 0 ; 4 2 — 2 ;

T H R O U G H T H E P R E S S A G A I N S T 4 2 — 7; 4 0 — 2 1 ; 4 2 — 1 2 ; 41—28; T H E A T L A N T I C V O Y A G E . 4 3 — 19; 41—35; 41—32.

Did you get it? T o decipher No. 2 (Jos. J . Morello) it

was only necessary to read the first letter after each numeral. All other letters, and all of the figures, were nonsignificants.

Here is a small sample of this crypto­gram, with the significants italicized:

B C O i i a r U V W z H H P Q W N 2 9 7 R S 6 2 3 S 9 2—etc.

The whole of it, similarly treated, reads: " T H I S C I P H E R I S T H E R E S U L T O F M Y I M P R I S O N M E N T . " This cipher, as you may remember, was quickly improvised under stress of emergency, and, although simple in structure, it proved adequate for its intended purpose.

The simple numerical a lphabet—A=i; B — 2 ; C = 3 . . . Z—26—formed the basis of cipher No. 3 (A. Krieger). Nor­mal word divisions were observed, the num­ber for any letter being modified according to its location in the word; / being added to the number representing the first letter of a word, 2 to that for the second, 3 to the third, and so on.

Mr. Krieger's message is: " U N L O A D A T M I D N I G H T A T F O O T O F P O R T E R S T R E E T . W A T C H O U T F O R T H E COAST G U A R D . " The first two words, deciphered herewith, are sufficient to explain the principle of this cipher.

Cipher: 32—16—15—19—6—10 3—22 K e y : 1 2 3 4 5 6 1 3

Subtracting: 21 14 12 1 5 . 1 4 1 20 Message: U N L O ' A D A T

The key to No. 4 ( M . Walker), a Grnns-feld cipher, is 31416, familiar to every

public schoolboy under the guise of pi— 3.1416.

C i p h e r : B F G B R O N I D N L F J B T . . . K e y : 3 1 4 1 6 3 1 4 1 6 3 1 4 1 6 . . . Message: Y E C A L L M E C H l E F A N . . . !

Mr. Walker's message: " Ye call me chief, and ye do well to call him chief, who for ten long years has met on the arena every shape of man or beast."

And now for No. 5 ( J . G. Meerdink), the Nihilist transposition cipher, which was en­ciphered in a 6 X 6 square with 4-2-6-1-3-5, as a key.

4 2 6 1 3 s 4 O R N O R W 2 O D L N C O 6 E A y S F L I L I A W L L 3 T E M I S O 5 T G T I H A

The grouping in this cryptogram was ar­bitrary, having no relation to the words of the message: " W I L L L A N D C O O L I E S T O - M O R R O W N I G H T S A F E L Y . "

Cipher No. 6 (Dr . G. A. Ferrell) is of the autokey variety, a type that has not yet been discussed in the department.

A message is enciphered in such a system by means of itself as a key. An auxiliary key, sometimes employed at the beginnings of such ciphers, here consists of doubling the first number.

To illustrate the present system with the first words of Dr. Ferrell's message, each let­ter, at ( a ) , is first replaced by its equivalent in the simple numerical alphabet—A=i . . . Z = 2 6—as shown at (b).

Each number thus obtained—with the ex­ception of the first, which is keyed with itself—is placed under the number next fol­lowing it, as at ( c ) . The final cipher is now formed at (d) by adding the numbers in lines (b) and ( c ) .

( a ) T H E R E I S . . . ( b ) 20 8 5 18 5 9 19 . • . (c) 20 20 8 5 18 5 9 . • •

(d) 40 28 13 23 23 14 2 8 —

I n deciphering, divide the first number by two, obtaining the numerical equivalent of the first letter. Subtract this number from the second number of the cryptogram to get the second letter of the message;!

Page 8: SOME PERTINENT POINTS ON THE SOLUTION OF … · transposition ciphers and anagrams, skill at ana gramming is a necessary qualification of the cryp tographer. In the transposition

640 F L Y N N ' S W E E K L Y

and so on. Here is the complete translation of Dr. Ferrell's message:

There is no royal road to knowledge; neither is there a short cut to ayptography. T o master this noble science takes patience, thought, and perseverance. F L Y N N ' S W E E K L Y is doing a wonderful work keeping this flame burning.

An explanation of No. 3 ( J . R . Midford), the free subscription cipher in F L Y N N ' S W E E K L Y for April 24, will complete the Jot for this time.

( a ) C C J J T C C E G C . . . ;(b) 3 X 3 10+10 2 0 + 3 3 X 5 7 X 3 • > . i(c) 9 20 23 I S 21 . , . ( d ) I T W O U . . .

I n deciphering this cryptogram each of the letters at (a) is replaced at (b) by its numerical equivalent in the popular A = i . . . Z = 2 6 alphabet. The num­bers in line (c) represent either the products of two numbers—or the sums of two, three, and sometimes four numbers—in line ( b ) . Substituting at (d) the alphabetical equiva­lents for the numbers at (c) will now give the message:

I t would please me immensely to be able to exchange some of m y ciphers wi th you. I am always ready and willing to exchange w i t h a real fan like yourself. Can I hope to hear from you soon? F r o m one fan to another.

The fact that either multiplication or ad­dition can be used at (b) sometimes makes more than one interpretation possible at ( d ) . For example, CC could be either F (3+3)> or / ( 3 X 3 ) . To further complicate the cipher, sometimes a letter is represented by itself; and again the numerical values of three or even four letters are added to­gether to form the substitute. Thus, in the present cryptogram, T is variously repre­sented by T itself, DE ( 4 X 5 ) , ED ( 5 X 4 ) , // (10+10), NF ( 14+6) , and JED (10+6+4). And many other substitutes for this letter are possible.

The following correct solutions to the March 20 ciphers have been received. Solv­ers with equal numbers of solutions are listed in the order submitted.

D r . G . A . Ferrel l , Bessemer, Alabama (1-2-4-5-6).

Charles P. Winsor, Boston, Massachusetts (1-2-4-S-6).

Arthur Bellamy, Boston, Massachusetts (1-2-4-S).

J . Raymond Hamilton, New Y o r k , N . Y . ( 1 -2) .

Charles C. Fulton, Omaha, Nebraska ( 1 - 2 ) . A . P . Schmutz, Philadelphia, Pennsylvania

(1 -2) .

A list of solvers of the April 24 ciphers, including Mr. Midford's prize cipher, will be printed in next Solving Cipher Secrets.

BOOKS ON CRYPTOGRAPHY A number of our correspondents have

taken exception to the following paragraph printed in this department for April 24, 1926.

A canvass of publishers reveals the startling fact that there is not a single work on cryp­tography in print in the English language. A n y new books on the subject or new edi­tions of older works, w i l l be announced here when published.

These correspondents submit titles of the following two books: " Manual for the Solu­tion of Military Ciphers," by Lieutenant Parker Hitt; and " Cryptography," by Andre Langie, translated from the French by J . C. H . Macbeth.

However, it appears that neither of these two books is at present available. The pub­lishers of the " Manual " say that their edi­tion of this work is entirely exhausted, and that it will not be reprinted.

And the publishers of " Cryptography " have informed us that this book is at pres­ent out of print, and that they did not know exactly when a new edition would be ready.

Both of these books are excellent. We hope to announce the new edition of Lan-gie-Macbeth soon in these columns; or our readers, if they prefer, can write directly to the publishers, F . P. Dutton & Co., 68 li Fifth Avenue, New York, N . Y . , for infor­mation.

''Solving Cipher Secrets" will appear again soon 10 ¥ W.