Code Crackers Booklet
Code Crackers Booklet
Feistel Cipher
Who uses secret messages?
Spies and the military use secret messages everyday to protect
their messages from others. The science of scrambling and un-
scrambling secret messages is called "cryptology." Can you guess
what a scientist who does scrambling and unscrambling is called?
A "cryptologist!"
M A N C H
E S T R B
D F G I/J K
L O P Q U
V W X Y Z
TH IS SE CR ET ME SX SA GE IS EN CR YP TE DX
Now we encrypt each two-letter group. Find the T and H in the
square and locate the letters at opposite corners of the rectangle
they form:
[M O R S E−c o d e ]
. . N . H
. . T . B
. . . . .
. . . . .
. . . . .
Replace TH with those letters, starting with the letter on the same
row as the first letter of the pair: TH becomes BN. Continue this
process with each pair of letters:
TH IS SE CR ET ME SX SA GE IS EN CR YP TE DX
BN FR
Notice that S and E are in the same row. In this case we take
. . . . .
E S T . .
. . . . .
. . . . .
. . . . .
the letter immediately to the right of each letter of the pair, so that
SE becomes TS.
TH IS SE CR ET ME SX SA GE IS EN CR YP TE DX
BN FR TS
Now we see that C and R are in the same column. Use the letter
-AULWEHQL QERDWID . . . C .
. . . R .
. . . . .
TAEXW ORHTGWIT; FHAGWZ KAGV AG, TVW AT GVW OR-
. . . . .
GVWI RU GVW DIGT DHZ GVW RIAPAH RU ODIBWXT. immediately below each of these letters, so that CR becomes RI.
This is the last special case, and the encryption proceeds without
further incident.
-PRJD
TH IS SE CR ET ME SX SA GE IS EN CR YP TE DX
BN FR TS RI SR ED TW FS DT FR TM RI XQ RS GV
9. NI NY ZFGG IVRI ZRT NY YW IFTTNCGF, WT ZF YVWLGM
To decrypt the message, simply reverse the process: If the two
letters are in different rows and columns, take the letters in the op-
QFI IWW JWOM WJ NI. posite corners of their rectangle. If they are in the same row, take
the letters to the left. If they are in the same column, take the let-
ters above each of them.
-TWCFTI F. GFF
10. MUX LHPK JW E VHTJM HY GHNX MUX BIBHG JW MUX The Double Playfair Cipher
The Double Playfair is an extension of the Playfair to use two sep-
XQX. MUX LJZX GHTUM QJI YUHPX JP HM, MUX LJZX HM arate keys and to encipher each pair of letters twice. The German
police made the mistake in late 1941 of switching from the rather
strong Double Transposition cipher to the more accessible Double
FHGG OJPMZEOM. Playfair, and for over a year Bletchley Park was able to use these
decrypts to gain intelligence in areas not covered by Enigma or
other broken systems.
-JGHRXZ FXPKXGG UJGLXY, SZ.
Like the Playfair, the Double Playfair cipher uses 5x5 squares. In
this case two keywords are chosen, and each square is filled in
the same way as the Playfair. For keywords HAMBURG and
NEWYORK written in rows and a spiral, respectively, we have the
squares:
H A M B U N L I/J H G 4. N ISEZCMXNOTXC TZ N HNE GTOK OGS WCMPCIORA JSSL
R G C D E E M X V F
RCJZ GKS, KSGCXCM, KNZ ECXCM RCNMECL KSG OS
F I/J K L N W P Z U D
O P Q S T Y Q S T C
GNRF PSMGNML.
V W X Y Z O R K A B
Given the message "MY HOVERCRAFT IS FULL OF EELS," we -PMNEFRTE LCRNES MSSZCXCRO
begin by choosing a period or number of letters (say, seven), then
breaking the message into groups of seven letters, with the se-
cond below the first, the fourth below the third, and so on. If the 5. K LQNS NYU K JBSEQV. K MQQ NYU K SQXQXWQS. K UB
last group is incomplete, break it into equal pieces. If it has an odd
number of letters, add an X to fill it out.
NYU K GYUQSMVNYU.
MYHOVER FULLO
CRAFTIS FEELS
-RBYJGRKGM
We encipher each vertical pair. Find the first letter of each pair in
the first square and the second letter in the second square. The
next step is to find the letters at the opposite corners of the rectan- 6. U MIAIW WIZUZC CIOFCXCUNM, GISXVZI U DXAI LNVMJ
gle formed by the plaintext pair, starting with the ciphertext letter in
the second square. For the first pair MC, the result of this step is
GQ: CDXC CDUMHZ CDXC XWI GXJ LNW OI JN MNC CIOFC OI.
. . M . . . . . . G
-HINWHI GIWMXWJ ZDXP
. . . . . . . . . .
. . . . . . . . . .
7. OKU JLUO HEWBC SEH XUALG OKU JEDWOUH DW OKU
. . Q . . . . . . C
. G . . . . M . . .
. . . . . . . . . .
1. IPIAL CFM O CIIZ OJ OM JYCI TFL CL JWDIAOYA.
. P . . . . Q . . .
MYHOVER FULLO
2. RO AWBO W YZNDNGWH QKZE JEJCOD RANYA NJ JKSOZ-
CRAFTIS FEELS
M
NLZ CL WGE NG CAO RLZHT; WGT NCJ OIINYNOGYE NJ
P
LGHE DWZZOT PE CAO TNIINYKHCE LI INGTNGV CROHBO The next plaintext pair, YR, is on the same row. In this case we
take the letters to the left of each plaintext letter, again taking the
first letter from the second key square and the second letter from
DOG OBOZE TWE RAL TLG'C FGLR WGECANGV WGT the first key square, giving OX. The OX is then run through the
same process, resulting in SR.
CRAFTIS FEELS
-DWZF CRWNG
MS
3. KVRCFNK FZ GUR WTBE NWLTGCE GUKG XRTG DCWV
PR
HKCHKCFZV GW QRNKQRTNR XFGUWLG NFPFBFIKGFWT There are no other special cases, and the result is:
MYHOVER FULLO
FT HRGXRRT.
CRAFTIS FEELS
MSHMNAB MWBCS
-WZNKC XFBQR
PRRXWKW YEIWP
have used MAHATUNDILA and CULLATINDILA as her double
For transmission the ciphertext is written in groups of five:
transposition keys, but these do not result in a correct decryption.
MPSRH RMXNW AKBWM YWEBI CWSP Please try the usual variations—keys in wrong order, columns in-
terchanged, one key left off, and so on—and let me know as soon
To decipher this, run each step backwards, paying close attention as possible if you find the solution. If we cannot read it within a
to the order of each pair. fortnight, we must ask for a retransmission, which, of course, will
increase her risk substantially. No undecipherables!
The Double Transposition Cipher
Received message:
This was one of the most secure ciphers used in the WWII. It was
used by both the Allies and the Axis. Its main weakness was that
TADTN TPLIE RCENI SIITD ONMUN MTNSO LDMMB ENROH
if the attacker intercepted two or more messages of the same
length using the same key, they could be compared by a process SETLV EACES BCSNT OVDAR YSIST ENNES SFAOE SFNAT
known as "multiple anagramming," finding solutions to both. This
weakness was unimportant if only one message was sent using UWHSO FLSGR TLUDG ETONI CRGLD ELIIR AETTP DHUDD
each key. It had another problem: Using it correctly requires care, IOPHW FISOT ISOIV EDSSN TWOAO RESSA RSHEU NATNS
leading to difficulties in decryption if an error is made at a sensi-
tive point. In the United States, information about cryptanalysis of GOSRP RDIFN ESEEO ADUPT IRRSE PPRHM EMHVU NOIRO
the cipher remained classified until a few years ago.
DSEFR MCIIE
Double Transposition consists of two applications of columnar
transposition to a message. The two applications may use the Jim Gillogly designs and implements cryptographic software. He recently made
same key for each of the two steps, or they may use different headlines for solving a cipher on a sculpture at CIA Headquarters in Langley,
keys. Columnar transposition works like this: First pick a keyword, Virginia, and he also designed an attack on the Enigma cipher that can be exe-
such as DESCRIBE, then write the message under it in rows: cuted without knowing any plaintext. (Wartime cracks required some knowledge
of the text of one of the messages in the day's key.) Gillogly earned a Ph.D. in
D E S C R I B E
computer science from Carnegie-Mellon University, is a recent past president of
--------------- the American Cryptogram Association, and has sung in Carnegie Hall with his
chamber music group.
Y O U R M O T H
E R W A S A H A
M S T E R A N D
Y O U R F A T H
E R S M E L T O
F E L D E R B E
R R I E S
Cipher #2
Now number the letters in the keyword in alphabetical order.
To: Col. Tiltman, Bletchley Park 3 4 8 2 7 6 1 5
F E L D E R B E
Received message:
R R I E S
TYINP KPQOT YENSO IYOBO YRAKK SLSPP ZCDOA YSLPO
MXMNP PNXPT YCITT YQYBO ZRBIG MPLSE ZKCTX RCRQG
LEIKC RDMPP RTBNX WYWQG MDAYT GFVMF XEYSL LQNII
GIWRQ IGFEV NGDNN IOBDT MDPTT YXNKB UXEMW PPKPW
ST
Cipher #3
Ladies:
T H N T T B R A E
To: Col. Tiltman, Bletchley Park