Appendix Cryptograms

Similar documents
Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Note: This document should only be used as a reference and should not replace assignment guidelines.

FOR OFFICIAL USE ONLY

Most people familiar with codes and cryptography have at least heard of the German

PA Substitution Cipher

An Introduction to Cryptography

Sherlock Holmes and the adventures of the dancing men

Institute of Southern Punjab, Multan

The Web Cryptology Game CODEBREAKERS.EU edition 2015

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Ciphers that Substitute Symbols

Excerpts From: Gloria K. Reid. Thinking and Writing About Art History. Part II: Researching and Writing Essays in Art History THE TOPIC

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

The Paper Enigma Machine

Exploring the Enigma [The MATH Connection]

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Multiple Intelligences Survey

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Multiple Intelligences Survey. ã 1999 Walter McKenzie, Surfaquarium Consulting. Part I

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Independent Reading Project

Sukkur IBA Testing Service

Multiple Intelligences Survey! 1999 Walter McKenzie, The One and Only Surfaquarium

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

CS408 Cryptography & Internet Security

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

UCUES 2014 Student Response Summary Reports: Time Allocation

452 AMERICAN ANTHROPOLOGIST [N. S., 21, 1919

How to Write a Paper for a Forensic Damages Journal

PROPORTIONS AND THE COMPOSER'

Multiple Intelligences Inventory

Examining The Dorabella Cipher with Three Lesser-Known Cryptanalysis Methods

Substitution cipher. Contents

GCSE Dance. Unit Choreography Report on the Examination June G13. Version: 1

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

2018 TEST CASE: LEGAL ONLINE OFFERS OF FILM EXECUTIVE SUMMARY

Extras. Use the newspaper for reading activities. Reading. Joe Walker Elementary School Mr. Tommy J. Bedillion, Principal

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Understanding Concision

Write-Around the Room! 2 National Sweepstakes 7 Magazine Research 11 Striking It Rich! 14 My Gradebook 18 Net Wise 22 Surf the Net 27 Explore with

A reprint from American Scientist

How I Broke the Confederate Code (137 Years Too Late)

Summer Reading for Freshman Courses--2014

Commonly Misused Words

Research Writing Workshop

To the Instructor Acknowledgments What Is the Least You Should Know? p. 1 Spelling and Word Choice p. 3 Your Own List of Misspelled Words p.

Fairness and honesty to identify materials and information not your own; to avoid plagiarism (even unintentional)

APA Style Guidelines

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

Why Should I Choose the Paper Category?

Dual Handed Keyboard Maltron Keyboards Australia Maltron, Error, Errors, Dvorak

Journey To The Centre of The Earth

Glossary of Research Terms

Author Guidelines Foreign Language Annals

Incoming 9 th Grade Pre-IB English

Add note: A note instructing the classifier to append digits found elsewhere in the DDC to a given base number. See also Base number.

Of Mice and Men Obituary & Eulogy

Cryptanalysis of LILI-128

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

INTRODUCTION. English Is Stupid

Broadcast News Writing

2

Library Assignment #2: Periodical Literature

Language & Literature Comparative Commentary

LANGLEY SCHOOL. Your Little Literacy Book

Encyclopedia Brown and the Case of the Slippery Salamander S A L A M A N D E R Activity 1. Puzzle Me 2.

Force & Motion 4-5: ArithMachines

Jake and Lily. Jerry Spinelli. A Novel Study by Nat Reed

FORWARD. Publisher, James Schoepflin, Department of Music, Washington State University, Pullman, Washington

LOGIC EXERCISE #4: HINT: The Thesis Statement. The Thesis Statement. How can you. connect nine dots in. three straight rows of three

Internal assessment details SL and HL

How this guide will help you in writing for your course

FORMAT CONTROL AND STYLE GUIDE CHECKLIST. possible, all earlier papers should be formatted using these instructions as well.

Let s Chat. Unit In this unit you will learn how to carry out a conversation in English by using a conversation structure.

NAA ENHANCING THE QUALITY OF MARKING PROJECT: THE EFFECT OF SAMPLE SIZE ON INCREASED PRECISION IN DETECTING ERRANT MARKING

Writing Styles Simplified Version MLA STYLE

BBC Television Services Review

On Translating Ulysses into French

Jokes and the Linguistic Mind. Debra Aarons. New York, New York: Routledge Pp. xi +272.

AP Studio Art 2006 Scoring Guidelines

Grade Two Homework. February - Week 1

What Is an APA-Style Essay?

University of West Florida, Psychology Department APA Formatting Guide Expectations for Thesis, TeRP, & Internship Portfolio

Santa Clara University Department of Electrical Engineering

English Usage/Grammar/ Punctuation Review

EXAMINATION SPECIFICATIONS SA-1( ) UKG

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

LEARN ANCIENT GREEK (GREEK AND LATIN LANGUAGE) BY PETER JONES DOWNLOAD EBOOK : LEARN ANCIENT GREEK (GREEK AND LATIN LANGUAGE) BY PETER JONES PDF

HFCC Learning Lab Speed Reading C1.11 RAPID AND EFFICEIENT READING

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

CSc 466/566. Computer Security. 4 : Cryptography Introduction

Marquette Law School Poll, July 15-18, 2013

2nd Grade Reading, Writing, & Integrated Social Studies Pacing Guide for

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Running head: APA Formal Research Paper 1. Include a running header (a short title of your paper) only on the title page

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

5-6 VIBE ACTIVITIES. Have you ever looked. Issue 207. Easy Read David Unaipon page 9. A man of many talents. Issue 207 Page 1 Y E A R.

Transcription:

Fall 2006 Chris Christensen MAT/CSC 483 Appendix Cryptograms Here is a more detailed discussion of the history and techniques for solution of aristocrats and patristocrats (the generic term for them is cryptograms). Codebreaking appears to be such a popular sport because it is literally fancy-free. If cryptography [codemaking] is a form of abstract algebra, then inventing a new cipher system is nothing more than building abstract castles in the air with material and design of one's own choosing. To make the system work is little more than to avoid self-contradiction, yet when the answer comes out right it always satisfies the inventor. Codemaking is much more popular than codebreaking because it is easier and more esthetic; it flings together shining theories however it pleases, whereas cryptanalysis forces the mind to concentrate upon the data, upon the coarse rubble of reality. But cryptanalysis is much more rewarding. For it subdues these hard and unyielding facts; it represents a victory of the mind over something, whereas codemaking represents a triumph over nothing. This mental mastery is the keen pleasure-pang of solution; it is what men of the intellectual caliber of Babbage and Wheatstone see in cryptanalysis, Consequently it is not surprising to learn that those addicted to this mental enjoyment have banded together to assure themselves of it. The American Cryptogram Association was founded in 1932 by members of the National Puzzlers League who wanted to concentrate more on cryptology, taking as their motto "The cryptogram is the aristocrat of puzzles." David Kahn, The Codebreakers by David Kahn, p. 768 f. Here is information from the American Cryptogram Association website http://www.cryptogram.org/ The American Cryptogram Association is dedicated to promoting the hobby and art of cryptanalysis -- that is, learning to break ciphers. 1

Membership benefits include six issues of The Cryptogram each year, each of which has about 100 challenge ciphers of varying difficulty: typically 25 simple substitution with word divisions (called "Aristocrats"), 14 simple substitution without word divisions (called "Patristocrats"), 14 cryptograms (simple substitution and others) in languages other than English (called "Xenocrypts"), 26 English cryptograms of types other than simple substitution ("Cipher Exchange"), 16 Cryptarithms, and 5 or so difficult ciphers ("Analyst Corner"). The Cryptogram includes articles of general and specific interest to hobby cryptanalysts, a column devoted to computer users, another devoted to children, and general news about the ACA. New members also receive one copy of The ACA and YOU, a 64- page manual that describes the procedures and ciphers used by the American Cryptogram Association. One of the founders of the ACA was Helen Fouché Gaines. The material that follows is adapted from her book Cryptanalysis: A Study of Ciphers and their Solutions. Her book (which is still available) is a standard for the study of classical ciphers. From Gaines : Simple Substitution Simple substitution is ordinarily defined as a cipher in which each letter of the alphabet has one fixed substitute, and each cryptogram-symbol represents one fixed original. When this cipher is used for puzzle purposes, as we find it in our newspapers and popular magazines, the substitutes (which are invariably letters of the alphabet) may be chosen at random, and the cryptograms must follow certain arbitrary rulings which are designed to make them "fair": Word-divisions and punctuation must follow religiously those of the original text; a certain minimum of length must be provided; no letter may act as its own substitute [This is very important information; the German enigma machine had a similar property that the British codebreakers at Bletchley Park were able to exploit.]; foreign words are not permissible; and so on. Aside from the observance of such rules, however, no holds are barred; the constructor of such a cryptogram, totally unconcerned with the meaning of the plaintext (except that it must have one), sometimes gives his chief attention to distorting the normal language characteristics in an effort to baffle the analyst 2

[Gaines follows with tips for solving aristocrats (cryptograms for which word length and punctuation is given) and other simple substitution cryptograms. Below, is a summary of the tips that she gives in Chapter IX. The words are mostly hers, but the sentences have been rearranged (a lot) and edited (somewhat).] Entry No matter how resistant the cryptogram, all that is really needed is an entry, the identification of one word, or of three or four letters. The experienced solver knows well that persistence will find this entry, and trusts largely to instinct and perseverance; the beginner, however, may feel at a loss for a "system," and, if so, may perhaps, be able to find suggestions for one in [what follows. Short words often provide an entry. The only two one-letter words in English are a and I. The most common two-letter words are: an, at, as, he, be, in, is, it, on, or, to, of, do, go, no, so, my. The most frequent word in English is the.] Do a frequency count First of all, in any substitution problem, there should be a counting of the letters of the cryptogram in order to find out their frequencies. [Frequency tables might disagree as to which letter is, say "the third most frequent," but] the same nine letters E T A O N I R S H, will constitute the highfrequency group of letters. These particular letters will make up about 70% of any English text, and it is almost impossible to prepare one, no matter how short, without using them in about that proportion, though in the shorter texts, L and D will sometimes creep up into the high-frequency class, taking the place of H. Aristocrats are arbitrarily confined to lengths which run between 75 and 100 letters. Even without manipulation, a text of this length will not always show E as a frequent letter, and may, for some reason, show Z or X with a fairly high frequency. "Class distinctions" among the letters are always, to some extent, dependable. High-frequency letters, moderate-frequency letters, and lowfrequency letters, all tend to be very exclusive. They will exchange frequencies with letters of their own class, but all three classes are disinclined to welcome outsiders. The vowels, also have their fraternity; if 3

the frequency of E is lowered, some other vowel, even U and Y, will insist upon making up the difference, rather than yield this privilege to a consonant. The high-frequency group includes the nine letters E T A O N I R S H. Even in this exclusive club, there are cliques not ironclad, but clearly noticeable: Class I. The letters T O S appear frequently both as initial letters and final letters in their own words, with terminal O confined largely to short words. All three of these are freely doubled. Class II. The letters A I H appear frequently as initial letters, but far less frequently as finals, especially A I. Not one of these is readily doubled. Class III. The letters E N R appear frequently as final letters, but far less frequently as initials. The letter E is very freely doubled; the other two not so often. When one of these letters changes its class, the least likely exchange is one occurring between classes II and III. The following lists of frequent initial and final letters are taken from Abraham Sinkov s Elementary Cryptanalysis: A Mathematical Approach. Frequencies of initial letters t, a, s, o, i, c, w, p, b, f, h, m, r, d, e, n, l, g, u, y, v, j, k, q, x, z Frequencies of final letters e, s, d, n, t, r, y, o, f, l, a, g, h, m, w, k, c, p, i, x, u, b, v, j, z, q We return to Gaines. 4

Other points In words of three and five letters, the central one is nearly always a vowel, taking it for granted that the words the and and will never present any difficult cryptogram. In the longer words, the favorite positions of the vowels are the two positions which follow the initial letter and the two positions which precede the final letter. The favorite position of I, in fact, is well-known as the third-to-last. About half the words used in any written text are of the type called negative, or empty; that is, the pronouns and auxiliary verbs, and particularly the various kinds of connectives without which no sentence can be put together. If your cryptogram is an "aristocrat," you will probably find that most of the prepositions begin with A. Every sentence contains a verb, and these are more or less limited in their possible terminations. Any letter used only two or three times, and always followed by the same letter, is good material for Q. Contact letters [A more sophisticated analysis involves determining contact between letters. When dealing with a patristocrat (word length is not given), a list is made showing every letter with the two which have flanked it right and left each time it was used. When word length is known, contacts between letters from different words are not listed.] 1. The vowels A E I O are normally found in the highfrequency section of the frequency count; the vowel U in the section of moderate frequencies, and the vowel Y in the lowfrequency section. 2. Letters contacting low-frequency letters are usually vowels. 3. Letters showing a wide variety in their contact-letters are usually vowels. 4. In repeated digrams, one letter is usually a vowel. 5. In reversed digrams, one letter is usually a vowel. 5

6. Doubled consonants are usually flanked by vowels, and vice versa. 7. It is unusual to find more than five consonants in succession. 8. Vowels do not often contact one another. If the letter of highest frequency can be assumed as E, any other highfrequency letter which never touches E at all is practically sure to be another vowel, and one which contacts it very often cannot be a vowel. Establishing the vowels The most frequent vowel is E. The one which never touches it is most likely to be O. Both of these are very freely doubled, and for that reason are often confused with each other, but seldom with any other vowel. They rarely touch each other. The vowel which follows E and almost never precedes it, is A. The vowel which reverses with it is I. The same observations will apply to the vowel O; but a distinction occurs when the vowel U can be found; this vowel precedes E and follows O. The only vowel-vowel digrams of any real frequency are OU, EA, IO. Three vowels found in succession may represent IOU, EOU, UOU, EAU. Identifying the consonants Those letters remaining in the high-frequency section of the frequency count will usually include T N R S H. Of these, the most easily recognized is H, which precedes all vowels and seldom follows one; it may be identified often as part of the repeated sequences TH, HE, HA. 6

Next to H, the most recognizable of the consonants, aside from frequency, is probably R, which reverses freely and indiscriminately with all vowels, and has a strong affinity for other high-frequency letters. The consonant T can usually be identified by its frequency, by its tendency to precede vowels rather than follow them, and by its almost inevitable combination with H on more than one occasion. If is also notably difficult to distinguish from the vowels. The letter N has characteristics which are to some extent the opposite of those mentioned for H; it prefers to follow vowels and precede consonants, and, to a lesser extent, the same is true of S, according to some charts. However, N, S, and T are all readily reversible with vowels, and are sometimes hard to tell apart. The only frequent reversals of two consonants are ST-TS and RT-TR. The doubles TT and SS are among the most frequent in the language. 7