06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.13. EXERCISES 215<br />

Several codewords were in use: VENUS for colonel, WAYLAND for captured,<br />

ODOR for Vicksburg, NEPTUNE for Richmond, ADAM for President, NELLY for<br />

4:30pm. The message was also enciphered as a complete rectangle.<br />

With these hints (that the South didn’t have), can you decrypt the message<br />

16. Break the double transposition UELOB DARES RNIOI STOBE LIYVA APSRN<br />

TALWY ALE Hint: the word double appears in it.<br />

17. [Hassard] One <strong>of</strong> the favorite enciphering techniques during the controversy<br />

following the presidential election <strong>of</strong> 1876 was transposition ciphers<br />

on words with the important tell-tale words (people’s names, state names,<br />

etc.) being replaced by (<strong>of</strong>ten) proper nouns, usually geographical names.<br />

(In the messages below, however, the names <strong>of</strong> the states in question –<br />

Florida, Louisiana and Oregon – are un-encrypted.) Then the entire message<br />

was transposed, using words as units.<br />

Fortunately for the decrypters, there were a very large number <strong>of</strong> dispatches.<br />

A very common word was Warsaw, and a lucky guess confirmed<br />

this stood for telegram. The short ciphertext<br />

Warsaw they read all unchanged last are idiots cant situation<br />

is then fairly easily seen to read<br />

Cant read last telegram. Situation unchanged. They are all idiots.<br />

This provides the key (47296381015), meaning, take the 4th work <strong>of</strong> the<br />

plaintext, put it first in the cipher, followed by the 7th word or the plaintext,<br />

then the 2nd word, and so on.<br />

This ordering helped decrypt most messages <strong>of</strong> ten words, but not others.<br />

However, it was noticed that the telegrams always came in word lengths<br />

that were multiples <strong>of</strong> five. Perhaps each length had its own key If so,<br />

multiple anagramming on a selection <strong>of</strong> ciphers <strong>of</strong> the same length should<br />

lead to their decryption.<br />

In Figure 10.5 are five messages, written in column form, with their words<br />

numbered. Dispatch 1 has adjourned until to-morrow. The only possible<br />

noun is London, so 29, 27, 19, 28 must be part <strong>of</strong> the key. Using<br />

this order in Dispatch 2 gives us out if a. Looking at the words in Dispatch<br />

2, intend to count us out if a seems reasonable. So now the<br />

key must contain 25, 5, 10, 29, 27, 19, 28.<br />

This is an example <strong>of</strong> multiple anagramming – using a reasonable<br />

ordering <strong>of</strong> one text to help understand the ordering <strong>of</strong> another, and visa<br />

versa. Use multiple anagramming to decrypt this message.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!