Chapter VExamination of Transposition CiphersAfter having decided that a cipher belongs to the transposition class, it remains to decide on the variety of cipher used. As, by definition, a transposition cipher consists wholly of characters of the original message, rearranged according to some law, we may, in general, say that such a cipher offers fewer difficulties in solution than a substitution cipher. A transposition cipher is like a picture puzzle; the parts are all there and the solution merely involves their correct arrangement.Case 1.—Geometrical ciphers. This case includes all ciphers in which a certain number of the characters are chosen so that they will form a square or rectangle of predetermined dimensions; and then these characters are arranged according to a geometrical design.Taking the message:A B C D E F G H I J K L M N O P Q R S T U V W Xof twenty-four letters and assuming a rectangle of six letters horizontally, and four letters vertically, we may have:(a)Simple Horizontal:A B C D E FF E D C B AS T U V W XX W V U T SG H I J K LL K J I H GM N O P Q RR Q P O N MM N O P Q RR Q P O N MG H I J K LL K J I H GS T U V W XX W V U T SA B C D E FF E D C B A(b)Simple Vertical:A E I M Q UD H L P T XU Q M I E AX T P L H DB F J N R VC G K O S WV R N J F BW S O K G CC G K O S WB F J N R VW S O K G CV R N J F BD H L P T XA E I M Q UX T P L H DU Q M I E A(c)Alternate Horizontal:A B C D E FF E D C B AX W V U T SS T U V W XL K J I H GG H I J K LM N O P Q RR Q P O N MM N O P Q RR Q P O N ML K J I H GG H I J K LX W V U T SS T U V W XA B C D E FF E D C B A(d)Alternate Vertical:A H I P Q XD E L M T UX Q P I H AU T M L E DB G J O R WC F K N S VW R O J G BV S N K F CC F K N S VB G J O R WV S N K F CW R O J G BD E L M T UA H I P Q XU T M L E DX Q P I H A(e)Simple Diagonal:A B D G K OG K O S V XO K G D B AX V S O K GC E H L P SD H L P T WS P L H E CW T P L H DF I M Q T VB E I M Q UV T Q M I FU Q M I E BJ N R U W XA C F J N RX W U R N JR N J F C AA C F J N RJ N R U W XR N J F C AX W U R N JB E I M Q UF I M Q T VU Q M I E BV T Q M I FD H L P T WC E H L P SW T P L H DS P L H E CG K O S V XA B D G K OX V S O K GO K G D B A(f)Alternate Diagonal:A B F G N OG N O U V XO N G F B AX V U O N GC E H M P UF H M P T WU P M H E CW T P M H FD I L Q T VB E I L Q SV T Q L I DS Q L I E BJ K R S W XA C D J K RX W S R K JR K J D C AA C D J K RJ K R S W XR K J D C AX W S R K JB E I L Q SD I L Q T VS Q L I E BV T Q L I DF H M P T WC E H M P UW T P M H FU P M H E CG N O U V XA B F G N OX V U O N GO N G F B A(g)Spiral, clockwise:A B C D E FL M N O P AI J K L M ND E F G H IP Q R S T GK V W X Q BH U V W X OC R S T U JO X W V U HJ U T S R CG T S R Q PB Q X W V KN M L K J II H G F E DF E D C B AA P O N M L(h)Spiral, counter clockwise:A P O N M LN M L K J II H G F E DF E D C B AB Q X W V KO X W V U HJ U T S R CG T S R Q PC R S T U JP Q R S T GK V W X Q BH U V W X OD E F G H IA B C D E FL M N O P AI J K L M NIt is simply a matter of inspection to read a message in a cipher of this type, once the dimensions of the rectangles have been determined. We place the whole or a portion of the message in such rectangles and read horizontally, vertically and diagonally forward and backward. Parts of words will at once be apparent and the whole message is soon deciphered. Two examples will show the process.MessageILVGIOIAEITSRNMANHMNGThis message contains eight vowels or 38% out of twenty-one letters, and the lettersLNRSToccur 7 times or 33%, the lettersXQJKZnot appearing. It is therefore a transposition cipher. Twenty-one letters immediately suggest seven columns of three letters each or three columns of seven letters each. Trying the former we have:I L V G I O IA E I T S R NM A N H M N Gand reading down each column in succession (Case 1-b) reveals the message to be “I am leaving this morning.”MessageM S I B RO R S E EV U E E MC O R E RE L I D ET O E P QE N R E RN S E R YE C O L LE R E U SP L U R CE L O A JA E H U HP F A S ON N O A AE P I U AP P E A CU Q A R UO P O E II R R M IA F D A AR Q U B OZ A E G ER S F S XThere are 120 letters in this message with 57 vowels or 47% vowels, and the lettersLNRSToccur 31 times or 26% of the whole.Non-occurrence ofKandWand vowel proportion leads us to the assumption that it is a transposition cipher of a Spanish text. The factors of 120 are 5 × 3 × 2 × 2 × 2. We may then have one rectangle of 4 × 30 or one of 5 × 24 or two of 5 × 12, or three of 5 × 8, or four of 5 × 6,orfive of 3 × 8, or ten of 3 × 4, or twenty of 3 × 2. The message being in a rectangle of 4 × 30, we can inspect it as it stands and this is clearly not the arrangement if it be a geometrical transposition cipher at all. It is best however to try the largest possible rectangles first so we will put it in the form 5 × 24, thus:MSIBRORSEEVUEEMCORERELIDETOEPQENRERNSERYECOLLEREUSPLURCELOAJAEHUHPFASONNOAAEPIUAPPEACUQARUOPOEIIRRMIAFDAARQUBOZAEGERSFSXHere an inspection shows this to be Case1-f, alternate diagonal, and the text to be “ME SITUO SOBRE PARRAL PORQUE ME PRESENCIA FUE REVELADA POR U”; here the sense breaks but note thatUis the twelfth letter of the line and continue as if the rectangle were 5 × 12 and we have “NA PAREJA QU.” Now inspect the second rectangle of 5 × 12 in the same way and the sense continues “E SE ME ACERCO Y HUBO QUE RECHAZAR POR EL FUEGO ALLI ESRERO ORDENES FINISX”.The practical way of examining a cipher of this type is to have several men prepare rectangles of different dimensions, using the letters of the cipher in the order received. The rectangles can be inspected very rapidly when once prepared. Note that the dimensions of any rectangle will rarely be such as to contain more than fifty letters, on account of the necessity of filling up a rectangle with nulls if the number of letters of the message is just a little greater than a multiple of the rectangle. Also large rectangles give, for all but the diagonal method, whole words in a line or column and these are easily noted.The following ciphers come under Case 1:Case1-i.—The rail fence cipher, useful as an operators’ cipher but permits of no variation and is therefore read almost as easily as straight text when the method is known. The message:HOSTILE CAVALRY HAS RETIREDis written:O T L C V L Y A R T R DH S I E A A R H S E I Eand is sent:OTLCV LYART RDHSI EAARH SEIEXCase1-j.MessageS S O H ST P F O RI E E A ET Q N E TF A I X EG L F D RA U L R NO S R X LH A T R OTo solve this cipher, read down the columns in this order 8, 1, 15, 2, 14, 3, 13, 4, 12, etc. A variation is to arrange the cipher so the columns are read upwards. Another is to arrange the ciphers so the columns are read alternately upward and downward. The factors of the number of letters in this case give the shape of the rectangle as usual.It will be seen that there are a great number of possible transposition ciphers that come under Case 1 but practically all of them are useless from a military standpoint because they do not depend on a key which can be readily and frequently changed. However such ciphers constantly crop up in cipher examination, being used for special communication between parties who consider the regular military ciphers too complicated. Thus some of these expedients have been used.Reversed Writing.—(Special case of Case1-a).LEAVING TONIGHTis encipheredTHGINOT GNIVAELor it may be reversed by words, thusGNIVAEL THGINOTor by groups of five letters, thusIVAEL NOTGN XTHGI.Vertical Writing.—(Special case of Case1-b). Same message is enciphered,LTEOANVIand is sent,LTEOA NVIIG NHGTX.IGNHGTCase2.—This case includes all transposition ciphers in which lines and columns of the text are rearranged according to some key word or key number. There are many varieties of this case but their solution usually is arrived at through the methods suggested for Case 1, that is, arrangement into appropriate rectangles and examination of lines and columns for words or syllables. Rearrangement of columns or lines follows until the solution is completed.Case2-a.MessageHIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThere are 108 letters in this message and examination shows it to be a transposition cipher, English text. The number of letters, 108, immediately suggests a rectangle of 12 × 9 or 9 × 12 letters. Put into this form we have:VowelsH I I G F T N G H I N T3C V N I E I O T C Y I F5Y L H A E A E S N B A E6E E E N R W G B N Y D E4L R O A E S G R N E B O5V N L D A I C A O A L C5N D T I R G V A C D O I4E S E R E C D V P E I A6F I F L R I N E H E T T4VowelsH I I G F T N G H2I N T C V N I E I4O T C Y I F Y L H2A E A E S N B A E6E E E N R W G B N3Y D E L R O A E S4G R N E B O V N L2D A I C A O A L C5N D T I R G V A C2D O I E S E R E C5D V P E I A F I F4L R I N E H E T T3The vowel count of the lines shows the first arrangement to be the more likely. We will now number the columns and try pairing off certain ones which in no line would give impossible combinations of letters.123456789101112HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThese combinations appear among others:162452HTIGFICIVIEVYALAELEWENRELSRAERVINDANNGDIRDECSRESFIILRIThe wordFIGHTstares at us from the first line; let us arrange the columns thus:524163FIGHTIEVICINELAYAHRENEWEERALSOANDVILRDINGTESRECERILFIFWe have the wordsFIGHTI(NG),VICIN(ITY),RENEWE(D),ANDVIL(LA),RDINGT(O),RECE(IVED). With this to go on, we must choose column 11 as the next one and then in order, columns 8, 10, 7, 12, 9. But note that the order 11, 8, 10, 7, 12, 9, is the same as the order 5, 2, 4, 1, 6, 3. The message was written in twelve columns and the columns have been transposed in that order. We may, although it is entirely unnecessary, speculate on the key word used. It was probablyM E X I C O4 2 6 3 1 5meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.Actually, this cipher was solved because the wordVILLAwas suspected and all the necessary letters were found in line six of the arrangement intwelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.163118HTINGCINITYAHASEWEDBLSOBRVILLANGTOAECEIVFIFTEThe remainder of the solution followed the lines already laid down and, naturally, offered no difficulties, in view of the large number of connected syllables available.Case2-b.MessageSLCOFWEETNEBRDOORVYMFFEDINMTECROIARPERHOESETSRFBHLTENAHOPTAUSOMTLRTETTASCBHNIODCRENENAAPRDLACYEECIIESGUFNThis is a transposition cipher, English text, and contains 105 letters. The factors of 105 are 5 × 3 × 7 so that we must investigate the following rectangles; 5 × 21, 15 × 7, three of 5 × 7, five of 3 × 7 and seven of 5 × 3.21 × 5VowelsSLCOFWEETNEBRDOORVYMF6FEDINMTECROIARPERHOES9ETSRFBHLTENAHOPTAUSOM7TLRTETTASCBHNIODCRENE6NAAPRDLACYEECIIESGUFN9Vowels121210140133133311321The vowel count of the columns of the rectangle 5 × 21 is very satisfactory. Let us consider it as three blocks of 5 × 7 each, since we must do this ultimately, and make a vowel count of columns for these blocks.5 × 21VowelsSLCOF1WEETN2EBRDO2ORVYM1FFEDI2NMTEC1ROIAR3PERHO2ESETS2RFBHL0TENAH2OPTAU3SOMTL1RTETT1ASCBH1NIODC2RENEN2AAPRD2LACYE2ECIIE4SGUFN1Vowels79876Column12345Vowels, 1st block22322Vowels, 2d block23222Vowels, 3d block34322This is also excellent, so we will try three blocks 5 × 7 and see if rearrangement ofhorizontal lineswill give results reading the columns vertically.1S L C O FP E R H OA S C B H2W E E T NE S E T SN I O D C3E B R D OR F B H LR E N E N4O R V Y MT E N A HA A P R D5F F E D IO P T A UL A C Y E6N M T E CS O M T LE C I I E7R O I A RR T E T TS G U F NAmong other combinations are:3E B R D OR F B H LR E N E N2W E E T NE S E T SN I O D C1S L C O FP E R H OA S C B H5F F E D IO P T A UL A C Y E7R O I A RR T E T TS G U F NThe addition of line 6 above line 3 and line 4 below line 7 will complete this cipher. The successive columns should be read downward.Case2-c. In this case, both lines and columns are rearranged by means of a key word or key words. The method of solution is the same as Case 2-a and 2-b except that the lines must be rearranged after the columns have been correctly arranged, or in some cases, vice versa. This cipher is not infrequently met with because it seems to offer safety by use of two key words and by the great but only apparent complexity of the method.MessageWVGAEEGENLTFTOHTEIEFRBTSEINENGONWRMGXIXNGOITNROMROESPALHNEACUDNNHDERMEThis is a transposition cipher, English text andthe number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.VowelsVowelsW V G A E E G E N L4W V G A E E G3T F T O H T E I E F3E N L T F T O2R B T S E I N E N G3H T E I E F R3O N W R M G X I X N2B T S E I N E3G O I T N R O M R O4N G O N W R M1E S P A L H N E A C4G X I X N G O2U D N N H D E R M E3I T N R O M R2O E S P A L H3N E A C U D N3N H D E R M E2The first form looks the more likely from the vowel count. We proceed to number the columns and lines and try rearrangement of columns so as to obtain possible letter combinations from every line.123456789101WVGAEEGENL2TFTOHTEIEF3RBTSEINENG4ONWRMGXIXN5GOITNROMRO6ESPALHNEAC7UDNNHDERMEAmong other combinations we have these:351428106971GEWAVELENG2THTOFIFTEE3TERSBEGINN4WMORNINGXX5INGTOMORRO6PLEASECHAN7NHUNDREDMEA very casual inspection of the lines shows that they should be rearranged in order 6, 1, 2, 7, 3, 5, 4, as follows:351428106976PLEASECHAN1GEWAVELENG2THTOFIFTEE7NHUNDREDME3TERSBEGINN5INGTOMORRO4WMORNINGXXAlthough of no particular importance, it may be stated that the column key in this case wasGRANDand the line key wasCENTRAL, both used as in encipheringCase 2-a.Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.“To encipher the message ‘MOVE DAYLIGHT. ENEMY APPROACHING FROM NORTH. PRISONERS SAY STRENGTH ONE HUNDRED THOUSAND. MEET HIM AS PLANNED.’ arrange as follows:MOVESTRENGTHPLANNEDSAYDAYLIGHTONEASPRISONERSENEMYHUNDREDHIMNORTHAPPROACHINGTHOUSANDMEETFROMHere the route is down the first column, up the fourth, down the second and up the third.”This cipher was often complicated by the introduction of nulls for every fifth word. Thus the above message might be sent:MOVE STRENGTH PLANNED SAYNEVERDAYLIGHT ONE AS PRISONERSLEAVINGENEMY HUNDRED HIM NORTHUNCHANGEDAPPROACHING THOUSAND MEET FROMCOME.The words in italics are nulls and not a part ofthe message and the receiver eliminates them before arranging his message in columns to get the sense of it.As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.A route cipher using the code words of the War Department code might have some advantages over the method of enciphering code messages as prescribed in that Code.General Remarks on Transposition CiphersIt is the consensus of opinion of experts that the transposition cipher is not the best one for military purposes. It does not fulfill the first, second, and third ofKerckhoffs’requirements as to indecipherability, safety when apparatus and method fall into the hands of the enemy, and dependability on a readily changeable key word.However, transposition ciphers are often encountered. They are favorites with those who find the substitution ciphers too difficult and too tedious to handle and who believe that their transposition methods are either absolutely indecipherable or sufficiently so for the purpose of concealing the text of a message for the time being. They seem to be particularly popular with secret agents and spies, presumably because special apparatus is rarely necessary in enciphering and deciphering.Although the number of transposition methods is legion, they can practically all be considered under one of the three cases already discussed. It is surprising how often transposition ciphers preparedby complicated rules, will, on analysis, be seen to be very simple.To be successful in solving transposition ciphers, one should constantly practice reading backward and up and down columns, so that the common combinations of letters are as quickly identified when seen thus as when encountered in straight text. Combinations likeEHT,LLIW,ROF,DNA, etc., should be appreciated immediately as common words written backward.A study of the table of frequency of digraphs or pairs is also excellent practice and such a table should be at hand when a transposition cipher is under consideration. It assists greatly if Case 2 be encountered and is of considerable use in solving Case 1.The solution of route ciphers is necessarily one of try and fit, with the knowledge that such ciphers usually are read up and down columns. It is not believed that route ciphers will often be met with at the present day.
Chapter VExamination of Transposition CiphersAfter having decided that a cipher belongs to the transposition class, it remains to decide on the variety of cipher used. As, by definition, a transposition cipher consists wholly of characters of the original message, rearranged according to some law, we may, in general, say that such a cipher offers fewer difficulties in solution than a substitution cipher. A transposition cipher is like a picture puzzle; the parts are all there and the solution merely involves their correct arrangement.Case 1.—Geometrical ciphers. This case includes all ciphers in which a certain number of the characters are chosen so that they will form a square or rectangle of predetermined dimensions; and then these characters are arranged according to a geometrical design.Taking the message:A B C D E F G H I J K L M N O P Q R S T U V W Xof twenty-four letters and assuming a rectangle of six letters horizontally, and four letters vertically, we may have:(a)Simple Horizontal:A B C D E FF E D C B AS T U V W XX W V U T SG H I J K LL K J I H GM N O P Q RR Q P O N MM N O P Q RR Q P O N MG H I J K LL K J I H GS T U V W XX W V U T SA B C D E FF E D C B A(b)Simple Vertical:A E I M Q UD H L P T XU Q M I E AX T P L H DB F J N R VC G K O S WV R N J F BW S O K G CC G K O S WB F J N R VW S O K G CV R N J F BD H L P T XA E I M Q UX T P L H DU Q M I E A(c)Alternate Horizontal:A B C D E FF E D C B AX W V U T SS T U V W XL K J I H GG H I J K LM N O P Q RR Q P O N MM N O P Q RR Q P O N ML K J I H GG H I J K LX W V U T SS T U V W XA B C D E FF E D C B A(d)Alternate Vertical:A H I P Q XD E L M T UX Q P I H AU T M L E DB G J O R WC F K N S VW R O J G BV S N K F CC F K N S VB G J O R WV S N K F CW R O J G BD E L M T UA H I P Q XU T M L E DX Q P I H A(e)Simple Diagonal:A B D G K OG K O S V XO K G D B AX V S O K GC E H L P SD H L P T WS P L H E CW T P L H DF I M Q T VB E I M Q UV T Q M I FU Q M I E BJ N R U W XA C F J N RX W U R N JR N J F C AA C F J N RJ N R U W XR N J F C AX W U R N JB E I M Q UF I M Q T VU Q M I E BV T Q M I FD H L P T WC E H L P SW T P L H DS P L H E CG K O S V XA B D G K OX V S O K GO K G D B A(f)Alternate Diagonal:A B F G N OG N O U V XO N G F B AX V U O N GC E H M P UF H M P T WU P M H E CW T P M H FD I L Q T VB E I L Q SV T Q L I DS Q L I E BJ K R S W XA C D J K RX W S R K JR K J D C AA C D J K RJ K R S W XR K J D C AX W S R K JB E I L Q SD I L Q T VS Q L I E BV T Q L I DF H M P T WC E H M P UW T P M H FU P M H E CG N O U V XA B F G N OX V U O N GO N G F B A(g)Spiral, clockwise:A B C D E FL M N O P AI J K L M ND E F G H IP Q R S T GK V W X Q BH U V W X OC R S T U JO X W V U HJ U T S R CG T S R Q PB Q X W V KN M L K J II H G F E DF E D C B AA P O N M L(h)Spiral, counter clockwise:A P O N M LN M L K J II H G F E DF E D C B AB Q X W V KO X W V U HJ U T S R CG T S R Q PC R S T U JP Q R S T GK V W X Q BH U V W X OD E F G H IA B C D E FL M N O P AI J K L M NIt is simply a matter of inspection to read a message in a cipher of this type, once the dimensions of the rectangles have been determined. We place the whole or a portion of the message in such rectangles and read horizontally, vertically and diagonally forward and backward. Parts of words will at once be apparent and the whole message is soon deciphered. Two examples will show the process.MessageILVGIOIAEITSRNMANHMNGThis message contains eight vowels or 38% out of twenty-one letters, and the lettersLNRSToccur 7 times or 33%, the lettersXQJKZnot appearing. It is therefore a transposition cipher. Twenty-one letters immediately suggest seven columns of three letters each or three columns of seven letters each. Trying the former we have:I L V G I O IA E I T S R NM A N H M N Gand reading down each column in succession (Case 1-b) reveals the message to be “I am leaving this morning.”MessageM S I B RO R S E EV U E E MC O R E RE L I D ET O E P QE N R E RN S E R YE C O L LE R E U SP L U R CE L O A JA E H U HP F A S ON N O A AE P I U AP P E A CU Q A R UO P O E II R R M IA F D A AR Q U B OZ A E G ER S F S XThere are 120 letters in this message with 57 vowels or 47% vowels, and the lettersLNRSToccur 31 times or 26% of the whole.Non-occurrence ofKandWand vowel proportion leads us to the assumption that it is a transposition cipher of a Spanish text. The factors of 120 are 5 × 3 × 2 × 2 × 2. We may then have one rectangle of 4 × 30 or one of 5 × 24 or two of 5 × 12, or three of 5 × 8, or four of 5 × 6,orfive of 3 × 8, or ten of 3 × 4, or twenty of 3 × 2. The message being in a rectangle of 4 × 30, we can inspect it as it stands and this is clearly not the arrangement if it be a geometrical transposition cipher at all. It is best however to try the largest possible rectangles first so we will put it in the form 5 × 24, thus:MSIBRORSEEVUEEMCORERELIDETOEPQENRERNSERYECOLLEREUSPLURCELOAJAEHUHPFASONNOAAEPIUAPPEACUQARUOPOEIIRRMIAFDAARQUBOZAEGERSFSXHere an inspection shows this to be Case1-f, alternate diagonal, and the text to be “ME SITUO SOBRE PARRAL PORQUE ME PRESENCIA FUE REVELADA POR U”; here the sense breaks but note thatUis the twelfth letter of the line and continue as if the rectangle were 5 × 12 and we have “NA PAREJA QU.” Now inspect the second rectangle of 5 × 12 in the same way and the sense continues “E SE ME ACERCO Y HUBO QUE RECHAZAR POR EL FUEGO ALLI ESRERO ORDENES FINISX”.The practical way of examining a cipher of this type is to have several men prepare rectangles of different dimensions, using the letters of the cipher in the order received. The rectangles can be inspected very rapidly when once prepared. Note that the dimensions of any rectangle will rarely be such as to contain more than fifty letters, on account of the necessity of filling up a rectangle with nulls if the number of letters of the message is just a little greater than a multiple of the rectangle. Also large rectangles give, for all but the diagonal method, whole words in a line or column and these are easily noted.The following ciphers come under Case 1:Case1-i.—The rail fence cipher, useful as an operators’ cipher but permits of no variation and is therefore read almost as easily as straight text when the method is known. The message:HOSTILE CAVALRY HAS RETIREDis written:O T L C V L Y A R T R DH S I E A A R H S E I Eand is sent:OTLCV LYART RDHSI EAARH SEIEXCase1-j.MessageS S O H ST P F O RI E E A ET Q N E TF A I X EG L F D RA U L R NO S R X LH A T R OTo solve this cipher, read down the columns in this order 8, 1, 15, 2, 14, 3, 13, 4, 12, etc. A variation is to arrange the cipher so the columns are read upwards. Another is to arrange the ciphers so the columns are read alternately upward and downward. The factors of the number of letters in this case give the shape of the rectangle as usual.It will be seen that there are a great number of possible transposition ciphers that come under Case 1 but practically all of them are useless from a military standpoint because they do not depend on a key which can be readily and frequently changed. However such ciphers constantly crop up in cipher examination, being used for special communication between parties who consider the regular military ciphers too complicated. Thus some of these expedients have been used.Reversed Writing.—(Special case of Case1-a).LEAVING TONIGHTis encipheredTHGINOT GNIVAELor it may be reversed by words, thusGNIVAEL THGINOTor by groups of five letters, thusIVAEL NOTGN XTHGI.Vertical Writing.—(Special case of Case1-b). Same message is enciphered,LTEOANVIand is sent,LTEOA NVIIG NHGTX.IGNHGTCase2.—This case includes all transposition ciphers in which lines and columns of the text are rearranged according to some key word or key number. There are many varieties of this case but their solution usually is arrived at through the methods suggested for Case 1, that is, arrangement into appropriate rectangles and examination of lines and columns for words or syllables. Rearrangement of columns or lines follows until the solution is completed.Case2-a.MessageHIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThere are 108 letters in this message and examination shows it to be a transposition cipher, English text. The number of letters, 108, immediately suggests a rectangle of 12 × 9 or 9 × 12 letters. Put into this form we have:VowelsH I I G F T N G H I N T3C V N I E I O T C Y I F5Y L H A E A E S N B A E6E E E N R W G B N Y D E4L R O A E S G R N E B O5V N L D A I C A O A L C5N D T I R G V A C D O I4E S E R E C D V P E I A6F I F L R I N E H E T T4VowelsH I I G F T N G H2I N T C V N I E I4O T C Y I F Y L H2A E A E S N B A E6E E E N R W G B N3Y D E L R O A E S4G R N E B O V N L2D A I C A O A L C5N D T I R G V A C2D O I E S E R E C5D V P E I A F I F4L R I N E H E T T3The vowel count of the lines shows the first arrangement to be the more likely. We will now number the columns and try pairing off certain ones which in no line would give impossible combinations of letters.123456789101112HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThese combinations appear among others:162452HTIGFICIVIEVYALAELEWENRELSRAERVINDANNGDIRDECSRESFIILRIThe wordFIGHTstares at us from the first line; let us arrange the columns thus:524163FIGHTIEVICINELAYAHRENEWEERALSOANDVILRDINGTESRECERILFIFWe have the wordsFIGHTI(NG),VICIN(ITY),RENEWE(D),ANDVIL(LA),RDINGT(O),RECE(IVED). With this to go on, we must choose column 11 as the next one and then in order, columns 8, 10, 7, 12, 9. But note that the order 11, 8, 10, 7, 12, 9, is the same as the order 5, 2, 4, 1, 6, 3. The message was written in twelve columns and the columns have been transposed in that order. We may, although it is entirely unnecessary, speculate on the key word used. It was probablyM E X I C O4 2 6 3 1 5meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.Actually, this cipher was solved because the wordVILLAwas suspected and all the necessary letters were found in line six of the arrangement intwelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.163118HTINGCINITYAHASEWEDBLSOBRVILLANGTOAECEIVFIFTEThe remainder of the solution followed the lines already laid down and, naturally, offered no difficulties, in view of the large number of connected syllables available.Case2-b.MessageSLCOFWEETNEBRDOORVYMFFEDINMTECROIARPERHOESETSRFBHLTENAHOPTAUSOMTLRTETTASCBHNIODCRENENAAPRDLACYEECIIESGUFNThis is a transposition cipher, English text, and contains 105 letters. The factors of 105 are 5 × 3 × 7 so that we must investigate the following rectangles; 5 × 21, 15 × 7, three of 5 × 7, five of 3 × 7 and seven of 5 × 3.21 × 5VowelsSLCOFWEETNEBRDOORVYMF6FEDINMTECROIARPERHOES9ETSRFBHLTENAHOPTAUSOM7TLRTETTASCBHNIODCRENE6NAAPRDLACYEECIIESGUFN9Vowels121210140133133311321The vowel count of the columns of the rectangle 5 × 21 is very satisfactory. Let us consider it as three blocks of 5 × 7 each, since we must do this ultimately, and make a vowel count of columns for these blocks.5 × 21VowelsSLCOF1WEETN2EBRDO2ORVYM1FFEDI2NMTEC1ROIAR3PERHO2ESETS2RFBHL0TENAH2OPTAU3SOMTL1RTETT1ASCBH1NIODC2RENEN2AAPRD2LACYE2ECIIE4SGUFN1Vowels79876Column12345Vowels, 1st block22322Vowels, 2d block23222Vowels, 3d block34322This is also excellent, so we will try three blocks 5 × 7 and see if rearrangement ofhorizontal lineswill give results reading the columns vertically.1S L C O FP E R H OA S C B H2W E E T NE S E T SN I O D C3E B R D OR F B H LR E N E N4O R V Y MT E N A HA A P R D5F F E D IO P T A UL A C Y E6N M T E CS O M T LE C I I E7R O I A RR T E T TS G U F NAmong other combinations are:3E B R D OR F B H LR E N E N2W E E T NE S E T SN I O D C1S L C O FP E R H OA S C B H5F F E D IO P T A UL A C Y E7R O I A RR T E T TS G U F NThe addition of line 6 above line 3 and line 4 below line 7 will complete this cipher. The successive columns should be read downward.Case2-c. In this case, both lines and columns are rearranged by means of a key word or key words. The method of solution is the same as Case 2-a and 2-b except that the lines must be rearranged after the columns have been correctly arranged, or in some cases, vice versa. This cipher is not infrequently met with because it seems to offer safety by use of two key words and by the great but only apparent complexity of the method.MessageWVGAEEGENLTFTOHTEIEFRBTSEINENGONWRMGXIXNGOITNROMROESPALHNEACUDNNHDERMEThis is a transposition cipher, English text andthe number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.VowelsVowelsW V G A E E G E N L4W V G A E E G3T F T O H T E I E F3E N L T F T O2R B T S E I N E N G3H T E I E F R3O N W R M G X I X N2B T S E I N E3G O I T N R O M R O4N G O N W R M1E S P A L H N E A C4G X I X N G O2U D N N H D E R M E3I T N R O M R2O E S P A L H3N E A C U D N3N H D E R M E2The first form looks the more likely from the vowel count. We proceed to number the columns and lines and try rearrangement of columns so as to obtain possible letter combinations from every line.123456789101WVGAEEGENL2TFTOHTEIEF3RBTSEINENG4ONWRMGXIXN5GOITNROMRO6ESPALHNEAC7UDNNHDERMEAmong other combinations we have these:351428106971GEWAVELENG2THTOFIFTEE3TERSBEGINN4WMORNINGXX5INGTOMORRO6PLEASECHAN7NHUNDREDMEA very casual inspection of the lines shows that they should be rearranged in order 6, 1, 2, 7, 3, 5, 4, as follows:351428106976PLEASECHAN1GEWAVELENG2THTOFIFTEE7NHUNDREDME3TERSBEGINN5INGTOMORRO4WMORNINGXXAlthough of no particular importance, it may be stated that the column key in this case wasGRANDand the line key wasCENTRAL, both used as in encipheringCase 2-a.Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.“To encipher the message ‘MOVE DAYLIGHT. ENEMY APPROACHING FROM NORTH. PRISONERS SAY STRENGTH ONE HUNDRED THOUSAND. MEET HIM AS PLANNED.’ arrange as follows:MOVESTRENGTHPLANNEDSAYDAYLIGHTONEASPRISONERSENEMYHUNDREDHIMNORTHAPPROACHINGTHOUSANDMEETFROMHere the route is down the first column, up the fourth, down the second and up the third.”This cipher was often complicated by the introduction of nulls for every fifth word. Thus the above message might be sent:MOVE STRENGTH PLANNED SAYNEVERDAYLIGHT ONE AS PRISONERSLEAVINGENEMY HUNDRED HIM NORTHUNCHANGEDAPPROACHING THOUSAND MEET FROMCOME.The words in italics are nulls and not a part ofthe message and the receiver eliminates them before arranging his message in columns to get the sense of it.As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.A route cipher using the code words of the War Department code might have some advantages over the method of enciphering code messages as prescribed in that Code.General Remarks on Transposition CiphersIt is the consensus of opinion of experts that the transposition cipher is not the best one for military purposes. It does not fulfill the first, second, and third ofKerckhoffs’requirements as to indecipherability, safety when apparatus and method fall into the hands of the enemy, and dependability on a readily changeable key word.However, transposition ciphers are often encountered. They are favorites with those who find the substitution ciphers too difficult and too tedious to handle and who believe that their transposition methods are either absolutely indecipherable or sufficiently so for the purpose of concealing the text of a message for the time being. They seem to be particularly popular with secret agents and spies, presumably because special apparatus is rarely necessary in enciphering and deciphering.Although the number of transposition methods is legion, they can practically all be considered under one of the three cases already discussed. It is surprising how often transposition ciphers preparedby complicated rules, will, on analysis, be seen to be very simple.To be successful in solving transposition ciphers, one should constantly practice reading backward and up and down columns, so that the common combinations of letters are as quickly identified when seen thus as when encountered in straight text. Combinations likeEHT,LLIW,ROF,DNA, etc., should be appreciated immediately as common words written backward.A study of the table of frequency of digraphs or pairs is also excellent practice and such a table should be at hand when a transposition cipher is under consideration. It assists greatly if Case 2 be encountered and is of considerable use in solving Case 1.The solution of route ciphers is necessarily one of try and fit, with the knowledge that such ciphers usually are read up and down columns. It is not believed that route ciphers will often be met with at the present day.
Chapter VExamination of Transposition Ciphers
After having decided that a cipher belongs to the transposition class, it remains to decide on the variety of cipher used. As, by definition, a transposition cipher consists wholly of characters of the original message, rearranged according to some law, we may, in general, say that such a cipher offers fewer difficulties in solution than a substitution cipher. A transposition cipher is like a picture puzzle; the parts are all there and the solution merely involves their correct arrangement.Case 1.—Geometrical ciphers. This case includes all ciphers in which a certain number of the characters are chosen so that they will form a square or rectangle of predetermined dimensions; and then these characters are arranged according to a geometrical design.Taking the message:A B C D E F G H I J K L M N O P Q R S T U V W Xof twenty-four letters and assuming a rectangle of six letters horizontally, and four letters vertically, we may have:(a)Simple Horizontal:A B C D E FF E D C B AS T U V W XX W V U T SG H I J K LL K J I H GM N O P Q RR Q P O N MM N O P Q RR Q P O N MG H I J K LL K J I H GS T U V W XX W V U T SA B C D E FF E D C B A(b)Simple Vertical:A E I M Q UD H L P T XU Q M I E AX T P L H DB F J N R VC G K O S WV R N J F BW S O K G CC G K O S WB F J N R VW S O K G CV R N J F BD H L P T XA E I M Q UX T P L H DU Q M I E A(c)Alternate Horizontal:A B C D E FF E D C B AX W V U T SS T U V W XL K J I H GG H I J K LM N O P Q RR Q P O N MM N O P Q RR Q P O N ML K J I H GG H I J K LX W V U T SS T U V W XA B C D E FF E D C B A(d)Alternate Vertical:A H I P Q XD E L M T UX Q P I H AU T M L E DB G J O R WC F K N S VW R O J G BV S N K F CC F K N S VB G J O R WV S N K F CW R O J G BD E L M T UA H I P Q XU T M L E DX Q P I H A(e)Simple Diagonal:A B D G K OG K O S V XO K G D B AX V S O K GC E H L P SD H L P T WS P L H E CW T P L H DF I M Q T VB E I M Q UV T Q M I FU Q M I E BJ N R U W XA C F J N RX W U R N JR N J F C AA C F J N RJ N R U W XR N J F C AX W U R N JB E I M Q UF I M Q T VU Q M I E BV T Q M I FD H L P T WC E H L P SW T P L H DS P L H E CG K O S V XA B D G K OX V S O K GO K G D B A(f)Alternate Diagonal:A B F G N OG N O U V XO N G F B AX V U O N GC E H M P UF H M P T WU P M H E CW T P M H FD I L Q T VB E I L Q SV T Q L I DS Q L I E BJ K R S W XA C D J K RX W S R K JR K J D C AA C D J K RJ K R S W XR K J D C AX W S R K JB E I L Q SD I L Q T VS Q L I E BV T Q L I DF H M P T WC E H M P UW T P M H FU P M H E CG N O U V XA B F G N OX V U O N GO N G F B A(g)Spiral, clockwise:A B C D E FL M N O P AI J K L M ND E F G H IP Q R S T GK V W X Q BH U V W X OC R S T U JO X W V U HJ U T S R CG T S R Q PB Q X W V KN M L K J II H G F E DF E D C B AA P O N M L(h)Spiral, counter clockwise:A P O N M LN M L K J II H G F E DF E D C B AB Q X W V KO X W V U HJ U T S R CG T S R Q PC R S T U JP Q R S T GK V W X Q BH U V W X OD E F G H IA B C D E FL M N O P AI J K L M NIt is simply a matter of inspection to read a message in a cipher of this type, once the dimensions of the rectangles have been determined. We place the whole or a portion of the message in such rectangles and read horizontally, vertically and diagonally forward and backward. Parts of words will at once be apparent and the whole message is soon deciphered. Two examples will show the process.MessageILVGIOIAEITSRNMANHMNGThis message contains eight vowels or 38% out of twenty-one letters, and the lettersLNRSToccur 7 times or 33%, the lettersXQJKZnot appearing. It is therefore a transposition cipher. Twenty-one letters immediately suggest seven columns of three letters each or three columns of seven letters each. Trying the former we have:I L V G I O IA E I T S R NM A N H M N Gand reading down each column in succession (Case 1-b) reveals the message to be “I am leaving this morning.”MessageM S I B RO R S E EV U E E MC O R E RE L I D ET O E P QE N R E RN S E R YE C O L LE R E U SP L U R CE L O A JA E H U HP F A S ON N O A AE P I U AP P E A CU Q A R UO P O E II R R M IA F D A AR Q U B OZ A E G ER S F S XThere are 120 letters in this message with 57 vowels or 47% vowels, and the lettersLNRSToccur 31 times or 26% of the whole.Non-occurrence ofKandWand vowel proportion leads us to the assumption that it is a transposition cipher of a Spanish text. The factors of 120 are 5 × 3 × 2 × 2 × 2. We may then have one rectangle of 4 × 30 or one of 5 × 24 or two of 5 × 12, or three of 5 × 8, or four of 5 × 6,orfive of 3 × 8, or ten of 3 × 4, or twenty of 3 × 2. The message being in a rectangle of 4 × 30, we can inspect it as it stands and this is clearly not the arrangement if it be a geometrical transposition cipher at all. It is best however to try the largest possible rectangles first so we will put it in the form 5 × 24, thus:MSIBRORSEEVUEEMCORERELIDETOEPQENRERNSERYECOLLEREUSPLURCELOAJAEHUHPFASONNOAAEPIUAPPEACUQARUOPOEIIRRMIAFDAARQUBOZAEGERSFSXHere an inspection shows this to be Case1-f, alternate diagonal, and the text to be “ME SITUO SOBRE PARRAL PORQUE ME PRESENCIA FUE REVELADA POR U”; here the sense breaks but note thatUis the twelfth letter of the line and continue as if the rectangle were 5 × 12 and we have “NA PAREJA QU.” Now inspect the second rectangle of 5 × 12 in the same way and the sense continues “E SE ME ACERCO Y HUBO QUE RECHAZAR POR EL FUEGO ALLI ESRERO ORDENES FINISX”.The practical way of examining a cipher of this type is to have several men prepare rectangles of different dimensions, using the letters of the cipher in the order received. The rectangles can be inspected very rapidly when once prepared. Note that the dimensions of any rectangle will rarely be such as to contain more than fifty letters, on account of the necessity of filling up a rectangle with nulls if the number of letters of the message is just a little greater than a multiple of the rectangle. Also large rectangles give, for all but the diagonal method, whole words in a line or column and these are easily noted.The following ciphers come under Case 1:Case1-i.—The rail fence cipher, useful as an operators’ cipher but permits of no variation and is therefore read almost as easily as straight text when the method is known. The message:HOSTILE CAVALRY HAS RETIREDis written:O T L C V L Y A R T R DH S I E A A R H S E I Eand is sent:OTLCV LYART RDHSI EAARH SEIEXCase1-j.MessageS S O H ST P F O RI E E A ET Q N E TF A I X EG L F D RA U L R NO S R X LH A T R OTo solve this cipher, read down the columns in this order 8, 1, 15, 2, 14, 3, 13, 4, 12, etc. A variation is to arrange the cipher so the columns are read upwards. Another is to arrange the ciphers so the columns are read alternately upward and downward. The factors of the number of letters in this case give the shape of the rectangle as usual.It will be seen that there are a great number of possible transposition ciphers that come under Case 1 but practically all of them are useless from a military standpoint because they do not depend on a key which can be readily and frequently changed. However such ciphers constantly crop up in cipher examination, being used for special communication between parties who consider the regular military ciphers too complicated. Thus some of these expedients have been used.Reversed Writing.—(Special case of Case1-a).LEAVING TONIGHTis encipheredTHGINOT GNIVAELor it may be reversed by words, thusGNIVAEL THGINOTor by groups of five letters, thusIVAEL NOTGN XTHGI.Vertical Writing.—(Special case of Case1-b). Same message is enciphered,LTEOANVIand is sent,LTEOA NVIIG NHGTX.IGNHGTCase2.—This case includes all transposition ciphers in which lines and columns of the text are rearranged according to some key word or key number. There are many varieties of this case but their solution usually is arrived at through the methods suggested for Case 1, that is, arrangement into appropriate rectangles and examination of lines and columns for words or syllables. Rearrangement of columns or lines follows until the solution is completed.Case2-a.MessageHIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThere are 108 letters in this message and examination shows it to be a transposition cipher, English text. The number of letters, 108, immediately suggests a rectangle of 12 × 9 or 9 × 12 letters. Put into this form we have:VowelsH I I G F T N G H I N T3C V N I E I O T C Y I F5Y L H A E A E S N B A E6E E E N R W G B N Y D E4L R O A E S G R N E B O5V N L D A I C A O A L C5N D T I R G V A C D O I4E S E R E C D V P E I A6F I F L R I N E H E T T4VowelsH I I G F T N G H2I N T C V N I E I4O T C Y I F Y L H2A E A E S N B A E6E E E N R W G B N3Y D E L R O A E S4G R N E B O V N L2D A I C A O A L C5N D T I R G V A C2D O I E S E R E C5D V P E I A F I F4L R I N E H E T T3The vowel count of the lines shows the first arrangement to be the more likely. We will now number the columns and try pairing off certain ones which in no line would give impossible combinations of letters.123456789101112HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThese combinations appear among others:162452HTIGFICIVIEVYALAELEWENRELSRAERVINDANNGDIRDECSRESFIILRIThe wordFIGHTstares at us from the first line; let us arrange the columns thus:524163FIGHTIEVICINELAYAHRENEWEERALSOANDVILRDINGTESRECERILFIFWe have the wordsFIGHTI(NG),VICIN(ITY),RENEWE(D),ANDVIL(LA),RDINGT(O),RECE(IVED). With this to go on, we must choose column 11 as the next one and then in order, columns 8, 10, 7, 12, 9. But note that the order 11, 8, 10, 7, 12, 9, is the same as the order 5, 2, 4, 1, 6, 3. The message was written in twelve columns and the columns have been transposed in that order. We may, although it is entirely unnecessary, speculate on the key word used. It was probablyM E X I C O4 2 6 3 1 5meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.Actually, this cipher was solved because the wordVILLAwas suspected and all the necessary letters were found in line six of the arrangement intwelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.163118HTINGCINITYAHASEWEDBLSOBRVILLANGTOAECEIVFIFTEThe remainder of the solution followed the lines already laid down and, naturally, offered no difficulties, in view of the large number of connected syllables available.Case2-b.MessageSLCOFWEETNEBRDOORVYMFFEDINMTECROIARPERHOESETSRFBHLTENAHOPTAUSOMTLRTETTASCBHNIODCRENENAAPRDLACYEECIIESGUFNThis is a transposition cipher, English text, and contains 105 letters. The factors of 105 are 5 × 3 × 7 so that we must investigate the following rectangles; 5 × 21, 15 × 7, three of 5 × 7, five of 3 × 7 and seven of 5 × 3.21 × 5VowelsSLCOFWEETNEBRDOORVYMF6FEDINMTECROIARPERHOES9ETSRFBHLTENAHOPTAUSOM7TLRTETTASCBHNIODCRENE6NAAPRDLACYEECIIESGUFN9Vowels121210140133133311321The vowel count of the columns of the rectangle 5 × 21 is very satisfactory. Let us consider it as three blocks of 5 × 7 each, since we must do this ultimately, and make a vowel count of columns for these blocks.5 × 21VowelsSLCOF1WEETN2EBRDO2ORVYM1FFEDI2NMTEC1ROIAR3PERHO2ESETS2RFBHL0TENAH2OPTAU3SOMTL1RTETT1ASCBH1NIODC2RENEN2AAPRD2LACYE2ECIIE4SGUFN1Vowels79876Column12345Vowels, 1st block22322Vowels, 2d block23222Vowels, 3d block34322This is also excellent, so we will try three blocks 5 × 7 and see if rearrangement ofhorizontal lineswill give results reading the columns vertically.1S L C O FP E R H OA S C B H2W E E T NE S E T SN I O D C3E B R D OR F B H LR E N E N4O R V Y MT E N A HA A P R D5F F E D IO P T A UL A C Y E6N M T E CS O M T LE C I I E7R O I A RR T E T TS G U F NAmong other combinations are:3E B R D OR F B H LR E N E N2W E E T NE S E T SN I O D C1S L C O FP E R H OA S C B H5F F E D IO P T A UL A C Y E7R O I A RR T E T TS G U F NThe addition of line 6 above line 3 and line 4 below line 7 will complete this cipher. The successive columns should be read downward.Case2-c. In this case, both lines and columns are rearranged by means of a key word or key words. The method of solution is the same as Case 2-a and 2-b except that the lines must be rearranged after the columns have been correctly arranged, or in some cases, vice versa. This cipher is not infrequently met with because it seems to offer safety by use of two key words and by the great but only apparent complexity of the method.MessageWVGAEEGENLTFTOHTEIEFRBTSEINENGONWRMGXIXNGOITNROMROESPALHNEACUDNNHDERMEThis is a transposition cipher, English text andthe number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.VowelsVowelsW V G A E E G E N L4W V G A E E G3T F T O H T E I E F3E N L T F T O2R B T S E I N E N G3H T E I E F R3O N W R M G X I X N2B T S E I N E3G O I T N R O M R O4N G O N W R M1E S P A L H N E A C4G X I X N G O2U D N N H D E R M E3I T N R O M R2O E S P A L H3N E A C U D N3N H D E R M E2The first form looks the more likely from the vowel count. We proceed to number the columns and lines and try rearrangement of columns so as to obtain possible letter combinations from every line.123456789101WVGAEEGENL2TFTOHTEIEF3RBTSEINENG4ONWRMGXIXN5GOITNROMRO6ESPALHNEAC7UDNNHDERMEAmong other combinations we have these:351428106971GEWAVELENG2THTOFIFTEE3TERSBEGINN4WMORNINGXX5INGTOMORRO6PLEASECHAN7NHUNDREDMEA very casual inspection of the lines shows that they should be rearranged in order 6, 1, 2, 7, 3, 5, 4, as follows:351428106976PLEASECHAN1GEWAVELENG2THTOFIFTEE7NHUNDREDME3TERSBEGINN5INGTOMORRO4WMORNINGXXAlthough of no particular importance, it may be stated that the column key in this case wasGRANDand the line key wasCENTRAL, both used as in encipheringCase 2-a.Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.“To encipher the message ‘MOVE DAYLIGHT. ENEMY APPROACHING FROM NORTH. PRISONERS SAY STRENGTH ONE HUNDRED THOUSAND. MEET HIM AS PLANNED.’ arrange as follows:MOVESTRENGTHPLANNEDSAYDAYLIGHTONEASPRISONERSENEMYHUNDREDHIMNORTHAPPROACHINGTHOUSANDMEETFROMHere the route is down the first column, up the fourth, down the second and up the third.”This cipher was often complicated by the introduction of nulls for every fifth word. Thus the above message might be sent:MOVE STRENGTH PLANNED SAYNEVERDAYLIGHT ONE AS PRISONERSLEAVINGENEMY HUNDRED HIM NORTHUNCHANGEDAPPROACHING THOUSAND MEET FROMCOME.The words in italics are nulls and not a part ofthe message and the receiver eliminates them before arranging his message in columns to get the sense of it.As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.A route cipher using the code words of the War Department code might have some advantages over the method of enciphering code messages as prescribed in that Code.General Remarks on Transposition CiphersIt is the consensus of opinion of experts that the transposition cipher is not the best one for military purposes. It does not fulfill the first, second, and third ofKerckhoffs’requirements as to indecipherability, safety when apparatus and method fall into the hands of the enemy, and dependability on a readily changeable key word.However, transposition ciphers are often encountered. They are favorites with those who find the substitution ciphers too difficult and too tedious to handle and who believe that their transposition methods are either absolutely indecipherable or sufficiently so for the purpose of concealing the text of a message for the time being. They seem to be particularly popular with secret agents and spies, presumably because special apparatus is rarely necessary in enciphering and deciphering.Although the number of transposition methods is legion, they can practically all be considered under one of the three cases already discussed. It is surprising how often transposition ciphers preparedby complicated rules, will, on analysis, be seen to be very simple.To be successful in solving transposition ciphers, one should constantly practice reading backward and up and down columns, so that the common combinations of letters are as quickly identified when seen thus as when encountered in straight text. Combinations likeEHT,LLIW,ROF,DNA, etc., should be appreciated immediately as common words written backward.A study of the table of frequency of digraphs or pairs is also excellent practice and such a table should be at hand when a transposition cipher is under consideration. It assists greatly if Case 2 be encountered and is of considerable use in solving Case 1.The solution of route ciphers is necessarily one of try and fit, with the knowledge that such ciphers usually are read up and down columns. It is not believed that route ciphers will often be met with at the present day.
After having decided that a cipher belongs to the transposition class, it remains to decide on the variety of cipher used. As, by definition, a transposition cipher consists wholly of characters of the original message, rearranged according to some law, we may, in general, say that such a cipher offers fewer difficulties in solution than a substitution cipher. A transposition cipher is like a picture puzzle; the parts are all there and the solution merely involves their correct arrangement.
Case 1.—Geometrical ciphers. This case includes all ciphers in which a certain number of the characters are chosen so that they will form a square or rectangle of predetermined dimensions; and then these characters are arranged according to a geometrical design.Taking the message:A B C D E F G H I J K L M N O P Q R S T U V W Xof twenty-four letters and assuming a rectangle of six letters horizontally, and four letters vertically, we may have:(a)Simple Horizontal:A B C D E FF E D C B AS T U V W XX W V U T SG H I J K LL K J I H GM N O P Q RR Q P O N MM N O P Q RR Q P O N MG H I J K LL K J I H GS T U V W XX W V U T SA B C D E FF E D C B A(b)Simple Vertical:A E I M Q UD H L P T XU Q M I E AX T P L H DB F J N R VC G K O S WV R N J F BW S O K G CC G K O S WB F J N R VW S O K G CV R N J F BD H L P T XA E I M Q UX T P L H DU Q M I E A(c)Alternate Horizontal:A B C D E FF E D C B AX W V U T SS T U V W XL K J I H GG H I J K LM N O P Q RR Q P O N MM N O P Q RR Q P O N ML K J I H GG H I J K LX W V U T SS T U V W XA B C D E FF E D C B A(d)Alternate Vertical:A H I P Q XD E L M T UX Q P I H AU T M L E DB G J O R WC F K N S VW R O J G BV S N K F CC F K N S VB G J O R WV S N K F CW R O J G BD E L M T UA H I P Q XU T M L E DX Q P I H A(e)Simple Diagonal:A B D G K OG K O S V XO K G D B AX V S O K GC E H L P SD H L P T WS P L H E CW T P L H DF I M Q T VB E I M Q UV T Q M I FU Q M I E BJ N R U W XA C F J N RX W U R N JR N J F C AA C F J N RJ N R U W XR N J F C AX W U R N JB E I M Q UF I M Q T VU Q M I E BV T Q M I FD H L P T WC E H L P SW T P L H DS P L H E CG K O S V XA B D G K OX V S O K GO K G D B A(f)Alternate Diagonal:A B F G N OG N O U V XO N G F B AX V U O N GC E H M P UF H M P T WU P M H E CW T P M H FD I L Q T VB E I L Q SV T Q L I DS Q L I E BJ K R S W XA C D J K RX W S R K JR K J D C AA C D J K RJ K R S W XR K J D C AX W S R K JB E I L Q SD I L Q T VS Q L I E BV T Q L I DF H M P T WC E H M P UW T P M H FU P M H E CG N O U V XA B F G N OX V U O N GO N G F B A(g)Spiral, clockwise:A B C D E FL M N O P AI J K L M ND E F G H IP Q R S T GK V W X Q BH U V W X OC R S T U JO X W V U HJ U T S R CG T S R Q PB Q X W V KN M L K J II H G F E DF E D C B AA P O N M L(h)Spiral, counter clockwise:A P O N M LN M L K J II H G F E DF E D C B AB Q X W V KO X W V U HJ U T S R CG T S R Q PC R S T U JP Q R S T GK V W X Q BH U V W X OD E F G H IA B C D E FL M N O P AI J K L M NIt is simply a matter of inspection to read a message in a cipher of this type, once the dimensions of the rectangles have been determined. We place the whole or a portion of the message in such rectangles and read horizontally, vertically and diagonally forward and backward. Parts of words will at once be apparent and the whole message is soon deciphered. Two examples will show the process.
Case 1.—Geometrical ciphers. This case includes all ciphers in which a certain number of the characters are chosen so that they will form a square or rectangle of predetermined dimensions; and then these characters are arranged according to a geometrical design.Taking the message:A B C D E F G H I J K L M N O P Q R S T U V W Xof twenty-four letters and assuming a rectangle of six letters horizontally, and four letters vertically, we may have:(a)Simple Horizontal:A B C D E FF E D C B AS T U V W XX W V U T SG H I J K LL K J I H GM N O P Q RR Q P O N MM N O P Q RR Q P O N MG H I J K LL K J I H GS T U V W XX W V U T SA B C D E FF E D C B A(b)Simple Vertical:A E I M Q UD H L P T XU Q M I E AX T P L H DB F J N R VC G K O S WV R N J F BW S O K G CC G K O S WB F J N R VW S O K G CV R N J F BD H L P T XA E I M Q UX T P L H DU Q M I E A(c)Alternate Horizontal:A B C D E FF E D C B AX W V U T SS T U V W XL K J I H GG H I J K LM N O P Q RR Q P O N MM N O P Q RR Q P O N ML K J I H GG H I J K LX W V U T SS T U V W XA B C D E FF E D C B A(d)Alternate Vertical:A H I P Q XD E L M T UX Q P I H AU T M L E DB G J O R WC F K N S VW R O J G BV S N K F CC F K N S VB G J O R WV S N K F CW R O J G BD E L M T UA H I P Q XU T M L E DX Q P I H A(e)Simple Diagonal:A B D G K OG K O S V XO K G D B AX V S O K GC E H L P SD H L P T WS P L H E CW T P L H DF I M Q T VB E I M Q UV T Q M I FU Q M I E BJ N R U W XA C F J N RX W U R N JR N J F C AA C F J N RJ N R U W XR N J F C AX W U R N JB E I M Q UF I M Q T VU Q M I E BV T Q M I FD H L P T WC E H L P SW T P L H DS P L H E CG K O S V XA B D G K OX V S O K GO K G D B A(f)Alternate Diagonal:A B F G N OG N O U V XO N G F B AX V U O N GC E H M P UF H M P T WU P M H E CW T P M H FD I L Q T VB E I L Q SV T Q L I DS Q L I E BJ K R S W XA C D J K RX W S R K JR K J D C AA C D J K RJ K R S W XR K J D C AX W S R K JB E I L Q SD I L Q T VS Q L I E BV T Q L I DF H M P T WC E H M P UW T P M H FU P M H E CG N O U V XA B F G N OX V U O N GO N G F B A(g)Spiral, clockwise:A B C D E FL M N O P AI J K L M ND E F G H IP Q R S T GK V W X Q BH U V W X OC R S T U JO X W V U HJ U T S R CG T S R Q PB Q X W V KN M L K J II H G F E DF E D C B AA P O N M L(h)Spiral, counter clockwise:A P O N M LN M L K J II H G F E DF E D C B AB Q X W V KO X W V U HJ U T S R CG T S R Q PC R S T U JP Q R S T GK V W X Q BH U V W X OD E F G H IA B C D E FL M N O P AI J K L M NIt is simply a matter of inspection to read a message in a cipher of this type, once the dimensions of the rectangles have been determined. We place the whole or a portion of the message in such rectangles and read horizontally, vertically and diagonally forward and backward. Parts of words will at once be apparent and the whole message is soon deciphered. Two examples will show the process.
Case 1.—Geometrical ciphers. This case includes all ciphers in which a certain number of the characters are chosen so that they will form a square or rectangle of predetermined dimensions; and then these characters are arranged according to a geometrical design.
Taking the message:
A B C D E F G H I J K L M N O P Q R S T U V W X
of twenty-four letters and assuming a rectangle of six letters horizontally, and four letters vertically, we may have:
(a)Simple Horizontal:
A B C D E FF E D C B AS T U V W XX W V U T SG H I J K LL K J I H GM N O P Q RR Q P O N MM N O P Q RR Q P O N MG H I J K LL K J I H GS T U V W XX W V U T SA B C D E FF E D C B A
(b)Simple Vertical:
A E I M Q UD H L P T XU Q M I E AX T P L H DB F J N R VC G K O S WV R N J F BW S O K G CC G K O S WB F J N R VW S O K G CV R N J F BD H L P T XA E I M Q UX T P L H DU Q M I E A
(c)Alternate Horizontal:
A B C D E FF E D C B AX W V U T SS T U V W XL K J I H GG H I J K LM N O P Q RR Q P O N MM N O P Q RR Q P O N ML K J I H GG H I J K LX W V U T SS T U V W XA B C D E FF E D C B A
(d)Alternate Vertical:
A H I P Q XD E L M T UX Q P I H AU T M L E DB G J O R WC F K N S VW R O J G BV S N K F CC F K N S VB G J O R WV S N K F CW R O J G BD E L M T UA H I P Q XU T M L E DX Q P I H A
(e)Simple Diagonal:
A B D G K OG K O S V XO K G D B AX V S O K GC E H L P SD H L P T WS P L H E CW T P L H DF I M Q T VB E I M Q UV T Q M I FU Q M I E BJ N R U W XA C F J N RX W U R N JR N J F C A
A C F J N RJ N R U W XR N J F C AX W U R N JB E I M Q UF I M Q T VU Q M I E BV T Q M I FD H L P T WC E H L P SW T P L H DS P L H E CG K O S V XA B D G K OX V S O K GO K G D B A
(f)Alternate Diagonal:
A B F G N OG N O U V XO N G F B AX V U O N GC E H M P UF H M P T WU P M H E CW T P M H FD I L Q T VB E I L Q SV T Q L I DS Q L I E BJ K R S W XA C D J K RX W S R K JR K J D C A
A C D J K RJ K R S W XR K J D C AX W S R K JB E I L Q SD I L Q T VS Q L I E BV T Q L I DF H M P T WC E H M P UW T P M H FU P M H E CG N O U V XA B F G N OX V U O N GO N G F B A
(g)Spiral, clockwise:
A B C D E FL M N O P AI J K L M ND E F G H IP Q R S T GK V W X Q BH U V W X OC R S T U JO X W V U HJ U T S R CG T S R Q PB Q X W V KN M L K J II H G F E DF E D C B AA P O N M L
(h)Spiral, counter clockwise:
A P O N M LN M L K J II H G F E DF E D C B AB Q X W V KO X W V U HJ U T S R CG T S R Q PC R S T U JP Q R S T GK V W X Q BH U V W X OD E F G H IA B C D E FL M N O P AI J K L M N
It is simply a matter of inspection to read a message in a cipher of this type, once the dimensions of the rectangles have been determined. We place the whole or a portion of the message in such rectangles and read horizontally, vertically and diagonally forward and backward. Parts of words will at once be apparent and the whole message is soon deciphered. Two examples will show the process.
MessageILVGIOIAEITSRNMANHMNGThis message contains eight vowels or 38% out of twenty-one letters, and the lettersLNRSToccur 7 times or 33%, the lettersXQJKZnot appearing. It is therefore a transposition cipher. Twenty-one letters immediately suggest seven columns of three letters each or three columns of seven letters each. Trying the former we have:I L V G I O IA E I T S R NM A N H M N Gand reading down each column in succession (Case 1-b) reveals the message to be “I am leaving this morning.”
MessageILVGIOIAEITSRNMANHMNGThis message contains eight vowels or 38% out of twenty-one letters, and the lettersLNRSToccur 7 times or 33%, the lettersXQJKZnot appearing. It is therefore a transposition cipher. Twenty-one letters immediately suggest seven columns of three letters each or three columns of seven letters each. Trying the former we have:I L V G I O IA E I T S R NM A N H M N Gand reading down each column in succession (Case 1-b) reveals the message to be “I am leaving this morning.”
Message
ILVGIOIAEITSRNMANHMNG
This message contains eight vowels or 38% out of twenty-one letters, and the lettersLNRSToccur 7 times or 33%, the lettersXQJKZnot appearing. It is therefore a transposition cipher. Twenty-one letters immediately suggest seven columns of three letters each or three columns of seven letters each. Trying the former we have:
I L V G I O IA E I T S R NM A N H M N G
and reading down each column in succession (Case 1-b) reveals the message to be “I am leaving this morning.”
MessageM S I B RO R S E EV U E E MC O R E RE L I D ET O E P QE N R E RN S E R YE C O L LE R E U SP L U R CE L O A JA E H U HP F A S ON N O A AE P I U AP P E A CU Q A R UO P O E II R R M IA F D A AR Q U B OZ A E G ER S F S XThere are 120 letters in this message with 57 vowels or 47% vowels, and the lettersLNRSToccur 31 times or 26% of the whole.Non-occurrence ofKandWand vowel proportion leads us to the assumption that it is a transposition cipher of a Spanish text. The factors of 120 are 5 × 3 × 2 × 2 × 2. We may then have one rectangle of 4 × 30 or one of 5 × 24 or two of 5 × 12, or three of 5 × 8, or four of 5 × 6,orfive of 3 × 8, or ten of 3 × 4, or twenty of 3 × 2. The message being in a rectangle of 4 × 30, we can inspect it as it stands and this is clearly not the arrangement if it be a geometrical transposition cipher at all. It is best however to try the largest possible rectangles first so we will put it in the form 5 × 24, thus:MSIBRORSEEVUEEMCORERELIDETOEPQENRERNSERYECOLLEREUSPLURCELOAJAEHUHPFASONNOAAEPIUAPPEACUQARUOPOEIIRRMIAFDAARQUBOZAEGERSFSXHere an inspection shows this to be Case1-f, alternate diagonal, and the text to be “ME SITUO SOBRE PARRAL PORQUE ME PRESENCIA FUE REVELADA POR U”; here the sense breaks but note thatUis the twelfth letter of the line and continue as if the rectangle were 5 × 12 and we have “NA PAREJA QU.” Now inspect the second rectangle of 5 × 12 in the same way and the sense continues “E SE ME ACERCO Y HUBO QUE RECHAZAR POR EL FUEGO ALLI ESRERO ORDENES FINISX”.The practical way of examining a cipher of this type is to have several men prepare rectangles of different dimensions, using the letters of the cipher in the order received. The rectangles can be inspected very rapidly when once prepared. Note that the dimensions of any rectangle will rarely be such as to contain more than fifty letters, on account of the necessity of filling up a rectangle with nulls if the number of letters of the message is just a little greater than a multiple of the rectangle. Also large rectangles give, for all but the diagonal method, whole words in a line or column and these are easily noted.The following ciphers come under Case 1:
MessageM S I B RO R S E EV U E E MC O R E RE L I D ET O E P QE N R E RN S E R YE C O L LE R E U SP L U R CE L O A JA E H U HP F A S ON N O A AE P I U AP P E A CU Q A R UO P O E II R R M IA F D A AR Q U B OZ A E G ER S F S XThere are 120 letters in this message with 57 vowels or 47% vowels, and the lettersLNRSToccur 31 times or 26% of the whole.Non-occurrence ofKandWand vowel proportion leads us to the assumption that it is a transposition cipher of a Spanish text. The factors of 120 are 5 × 3 × 2 × 2 × 2. We may then have one rectangle of 4 × 30 or one of 5 × 24 or two of 5 × 12, or three of 5 × 8, or four of 5 × 6,orfive of 3 × 8, or ten of 3 × 4, or twenty of 3 × 2. The message being in a rectangle of 4 × 30, we can inspect it as it stands and this is clearly not the arrangement if it be a geometrical transposition cipher at all. It is best however to try the largest possible rectangles first so we will put it in the form 5 × 24, thus:MSIBRORSEEVUEEMCORERELIDETOEPQENRERNSERYECOLLEREUSPLURCELOAJAEHUHPFASONNOAAEPIUAPPEACUQARUOPOEIIRRMIAFDAARQUBOZAEGERSFSXHere an inspection shows this to be Case1-f, alternate diagonal, and the text to be “ME SITUO SOBRE PARRAL PORQUE ME PRESENCIA FUE REVELADA POR U”; here the sense breaks but note thatUis the twelfth letter of the line and continue as if the rectangle were 5 × 12 and we have “NA PAREJA QU.” Now inspect the second rectangle of 5 × 12 in the same way and the sense continues “E SE ME ACERCO Y HUBO QUE RECHAZAR POR EL FUEGO ALLI ESRERO ORDENES FINISX”.The practical way of examining a cipher of this type is to have several men prepare rectangles of different dimensions, using the letters of the cipher in the order received. The rectangles can be inspected very rapidly when once prepared. Note that the dimensions of any rectangle will rarely be such as to contain more than fifty letters, on account of the necessity of filling up a rectangle with nulls if the number of letters of the message is just a little greater than a multiple of the rectangle. Also large rectangles give, for all but the diagonal method, whole words in a line or column and these are easily noted.The following ciphers come under Case 1:
Message
M S I B RO R S E EV U E E MC O R E RE L I D ET O E P QE N R E RN S E R YE C O L LE R E U SP L U R CE L O A JA E H U HP F A S ON N O A AE P I U AP P E A CU Q A R UO P O E II R R M IA F D A AR Q U B OZ A E G ER S F S X
There are 120 letters in this message with 57 vowels or 47% vowels, and the lettersLNRSToccur 31 times or 26% of the whole.
Non-occurrence ofKandWand vowel proportion leads us to the assumption that it is a transposition cipher of a Spanish text. The factors of 120 are 5 × 3 × 2 × 2 × 2. We may then have one rectangle of 4 × 30 or one of 5 × 24 or two of 5 × 12, or three of 5 × 8, or four of 5 × 6,orfive of 3 × 8, or ten of 3 × 4, or twenty of 3 × 2. The message being in a rectangle of 4 × 30, we can inspect it as it stands and this is clearly not the arrangement if it be a geometrical transposition cipher at all. It is best however to try the largest possible rectangles first so we will put it in the form 5 × 24, thus:
MSIBRORSEEVUEEMCORERELIDETOEPQENRERNSERYECOLLEREUSPLURCELOAJAEHUHPFASONNOAAEPIUAPPEACUQARUOPOEIIRRMIAFDAARQUBOZAEGERSFSX
Here an inspection shows this to be Case1-f, alternate diagonal, and the text to be “ME SITUO SOBRE PARRAL PORQUE ME PRESENCIA FUE REVELADA POR U”; here the sense breaks but note thatUis the twelfth letter of the line and continue as if the rectangle were 5 × 12 and we have “NA PAREJA QU.” Now inspect the second rectangle of 5 × 12 in the same way and the sense continues “E SE ME ACERCO Y HUBO QUE RECHAZAR POR EL FUEGO ALLI ESRERO ORDENES FINISX”.
The practical way of examining a cipher of this type is to have several men prepare rectangles of different dimensions, using the letters of the cipher in the order received. The rectangles can be inspected very rapidly when once prepared. Note that the dimensions of any rectangle will rarely be such as to contain more than fifty letters, on account of the necessity of filling up a rectangle with nulls if the number of letters of the message is just a little greater than a multiple of the rectangle. Also large rectangles give, for all but the diagonal method, whole words in a line or column and these are easily noted.
The following ciphers come under Case 1:
Case1-i.—The rail fence cipher, useful as an operators’ cipher but permits of no variation and is therefore read almost as easily as straight text when the method is known. The message:HOSTILE CAVALRY HAS RETIREDis written:O T L C V L Y A R T R DH S I E A A R H S E I Eand is sent:OTLCV LYART RDHSI EAARH SEIEX
Case1-i.—The rail fence cipher, useful as an operators’ cipher but permits of no variation and is therefore read almost as easily as straight text when the method is known. The message:HOSTILE CAVALRY HAS RETIREDis written:O T L C V L Y A R T R DH S I E A A R H S E I Eand is sent:OTLCV LYART RDHSI EAARH SEIEX
Case1-i.—The rail fence cipher, useful as an operators’ cipher but permits of no variation and is therefore read almost as easily as straight text when the method is known. The message:
HOSTILE CAVALRY HAS RETIRED
is written:
O T L C V L Y A R T R DH S I E A A R H S E I E
and is sent:
OTLCV LYART RDHSI EAARH SEIEX
Case1-j.MessageS S O H ST P F O RI E E A ET Q N E TF A I X EG L F D RA U L R NO S R X LH A T R OTo solve this cipher, read down the columns in this order 8, 1, 15, 2, 14, 3, 13, 4, 12, etc. A variation is to arrange the cipher so the columns are read upwards. Another is to arrange the ciphers so the columns are read alternately upward and downward. The factors of the number of letters in this case give the shape of the rectangle as usual.It will be seen that there are a great number of possible transposition ciphers that come under Case 1 but practically all of them are useless from a military standpoint because they do not depend on a key which can be readily and frequently changed. However such ciphers constantly crop up in cipher examination, being used for special communication between parties who consider the regular military ciphers too complicated. Thus some of these expedients have been used.
Case1-j.MessageS S O H ST P F O RI E E A ET Q N E TF A I X EG L F D RA U L R NO S R X LH A T R OTo solve this cipher, read down the columns in this order 8, 1, 15, 2, 14, 3, 13, 4, 12, etc. A variation is to arrange the cipher so the columns are read upwards. Another is to arrange the ciphers so the columns are read alternately upward and downward. The factors of the number of letters in this case give the shape of the rectangle as usual.It will be seen that there are a great number of possible transposition ciphers that come under Case 1 but practically all of them are useless from a military standpoint because they do not depend on a key which can be readily and frequently changed. However such ciphers constantly crop up in cipher examination, being used for special communication between parties who consider the regular military ciphers too complicated. Thus some of these expedients have been used.
Case1-j.
Message
S S O H ST P F O RI E E A ET Q N E TF A I X EG L F D RA U L R NO S R X LH A T R O
To solve this cipher, read down the columns in this order 8, 1, 15, 2, 14, 3, 13, 4, 12, etc. A variation is to arrange the cipher so the columns are read upwards. Another is to arrange the ciphers so the columns are read alternately upward and downward. The factors of the number of letters in this case give the shape of the rectangle as usual.
It will be seen that there are a great number of possible transposition ciphers that come under Case 1 but practically all of them are useless from a military standpoint because they do not depend on a key which can be readily and frequently changed. However such ciphers constantly crop up in cipher examination, being used for special communication between parties who consider the regular military ciphers too complicated. Thus some of these expedients have been used.
Reversed Writing.—(Special case of Case1-a).LEAVING TONIGHTis encipheredTHGINOT GNIVAELor it may be reversed by words, thusGNIVAEL THGINOTor by groups of five letters, thusIVAEL NOTGN XTHGI.
Reversed Writing.—(Special case of Case1-a).LEAVING TONIGHTis encipheredTHGINOT GNIVAELor it may be reversed by words, thusGNIVAEL THGINOTor by groups of five letters, thusIVAEL NOTGN XTHGI.
Reversed Writing.—(Special case of Case1-a).
LEAVING TONIGHTis encipheredTHGINOT GNIVAELor it may be reversed by words, thusGNIVAEL THGINOTor by groups of five letters, thusIVAEL NOTGN XTHGI.
Vertical Writing.—(Special case of Case1-b). Same message is enciphered,LTEOANVIand is sent,LTEOA NVIIG NHGTX.IGNHGT
Vertical Writing.—(Special case of Case1-b). Same message is enciphered,LTEOANVIand is sent,LTEOA NVIIG NHGTX.IGNHGT
Vertical Writing.—(Special case of Case1-b). Same message is enciphered,
LTEOANVIand is sent,LTEOA NVIIG NHGTX.IGNHGT
Case2.—This case includes all transposition ciphers in which lines and columns of the text are rearranged according to some key word or key number. There are many varieties of this case but their solution usually is arrived at through the methods suggested for Case 1, that is, arrangement into appropriate rectangles and examination of lines and columns for words or syllables. Rearrangement of columns or lines follows until the solution is completed.
Case2.—This case includes all transposition ciphers in which lines and columns of the text are rearranged according to some key word or key number. There are many varieties of this case but their solution usually is arrived at through the methods suggested for Case 1, that is, arrangement into appropriate rectangles and examination of lines and columns for words or syllables. Rearrangement of columns or lines follows until the solution is completed.
Case2.—This case includes all transposition ciphers in which lines and columns of the text are rearranged according to some key word or key number. There are many varieties of this case but their solution usually is arrived at through the methods suggested for Case 1, that is, arrangement into appropriate rectangles and examination of lines and columns for words or syllables. Rearrangement of columns or lines follows until the solution is completed.
Case2-a.MessageHIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThere are 108 letters in this message and examination shows it to be a transposition cipher, English text. The number of letters, 108, immediately suggests a rectangle of 12 × 9 or 9 × 12 letters. Put into this form we have:VowelsH I I G F T N G H I N T3C V N I E I O T C Y I F5Y L H A E A E S N B A E6E E E N R W G B N Y D E4L R O A E S G R N E B O5V N L D A I C A O A L C5N D T I R G V A C D O I4E S E R E C D V P E I A6F I F L R I N E H E T T4VowelsH I I G F T N G H2I N T C V N I E I4O T C Y I F Y L H2A E A E S N B A E6E E E N R W G B N3Y D E L R O A E S4G R N E B O V N L2D A I C A O A L C5N D T I R G V A C2D O I E S E R E C5D V P E I A F I F4L R I N E H E T T3The vowel count of the lines shows the first arrangement to be the more likely. We will now number the columns and try pairing off certain ones which in no line would give impossible combinations of letters.123456789101112HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThese combinations appear among others:162452HTIGFICIVIEVYALAELEWENRELSRAERVINDANNGDIRDECSRESFIILRIThe wordFIGHTstares at us from the first line; let us arrange the columns thus:524163FIGHTIEVICINELAYAHRENEWEERALSOANDVILRDINGTESRECERILFIFWe have the wordsFIGHTI(NG),VICIN(ITY),RENEWE(D),ANDVIL(LA),RDINGT(O),RECE(IVED). With this to go on, we must choose column 11 as the next one and then in order, columns 8, 10, 7, 12, 9. But note that the order 11, 8, 10, 7, 12, 9, is the same as the order 5, 2, 4, 1, 6, 3. The message was written in twelve columns and the columns have been transposed in that order. We may, although it is entirely unnecessary, speculate on the key word used. It was probablyM E X I C O4 2 6 3 1 5meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.Actually, this cipher was solved because the wordVILLAwas suspected and all the necessary letters were found in line six of the arrangement intwelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.163118HTINGCINITYAHASEWEDBLSOBRVILLANGTOAECEIVFIFTEThe remainder of the solution followed the lines already laid down and, naturally, offered no difficulties, in view of the large number of connected syllables available.
Case2-a.MessageHIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThere are 108 letters in this message and examination shows it to be a transposition cipher, English text. The number of letters, 108, immediately suggests a rectangle of 12 × 9 or 9 × 12 letters. Put into this form we have:VowelsH I I G F T N G H I N T3C V N I E I O T C Y I F5Y L H A E A E S N B A E6E E E N R W G B N Y D E4L R O A E S G R N E B O5V N L D A I C A O A L C5N D T I R G V A C D O I4E S E R E C D V P E I A6F I F L R I N E H E T T4VowelsH I I G F T N G H2I N T C V N I E I4O T C Y I F Y L H2A E A E S N B A E6E E E N R W G B N3Y D E L R O A E S4G R N E B O V N L2D A I C A O A L C5N D T I R G V A C2D O I E S E R E C5D V P E I A F I F4L R I N E H E T T3The vowel count of the lines shows the first arrangement to be the more likely. We will now number the columns and try pairing off certain ones which in no line would give impossible combinations of letters.123456789101112HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETTThese combinations appear among others:162452HTIGFICIVIEVYALAELEWENRELSRAERVINDANNGDIRDECSRESFIILRIThe wordFIGHTstares at us from the first line; let us arrange the columns thus:524163FIGHTIEVICINELAYAHRENEWEERALSOANDVILRDINGTESRECERILFIFWe have the wordsFIGHTI(NG),VICIN(ITY),RENEWE(D),ANDVIL(LA),RDINGT(O),RECE(IVED). With this to go on, we must choose column 11 as the next one and then in order, columns 8, 10, 7, 12, 9. But note that the order 11, 8, 10, 7, 12, 9, is the same as the order 5, 2, 4, 1, 6, 3. The message was written in twelve columns and the columns have been transposed in that order. We may, although it is entirely unnecessary, speculate on the key word used. It was probablyM E X I C O4 2 6 3 1 5meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.Actually, this cipher was solved because the wordVILLAwas suspected and all the necessary letters were found in line six of the arrangement intwelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.163118HTINGCINITYAHASEWEDBLSOBRVILLANGTOAECEIVFIFTEThe remainder of the solution followed the lines already laid down and, naturally, offered no difficulties, in view of the large number of connected syllables available.
Case2-a.
Message
HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETT
There are 108 letters in this message and examination shows it to be a transposition cipher, English text. The number of letters, 108, immediately suggests a rectangle of 12 × 9 or 9 × 12 letters. Put into this form we have:
VowelsH I I G F T N G H I N T3C V N I E I O T C Y I F5Y L H A E A E S N B A E6E E E N R W G B N Y D E4L R O A E S G R N E B O5V N L D A I C A O A L C5N D T I R G V A C D O I4E S E R E C D V P E I A6F I F L R I N E H E T T4VowelsH I I G F T N G H2I N T C V N I E I4O T C Y I F Y L H2A E A E S N B A E6E E E N R W G B N3Y D E L R O A E S4G R N E B O V N L2D A I C A O A L C5N D T I R G V A C2D O I E S E R E C5D V P E I A F I F4L R I N E H E T T3
VowelsH I I G F T N G H I N T3C V N I E I O T C Y I F5Y L H A E A E S N B A E6E E E N R W G B N Y D E4L R O A E S G R N E B O5V N L D A I C A O A L C5N D T I R G V A C D O I4E S E R E C D V P E I A6F I F L R I N E H E T T4
VowelsH I I G F T N G H2I N T C V N I E I4O T C Y I F Y L H2A E A E S N B A E6E E E N R W G B N3Y D E L R O A E S4G R N E B O V N L2D A I C A O A L C5N D T I R G V A C2D O I E S E R E C5D V P E I A F I F4L R I N E H E T T3
The vowel count of the lines shows the first arrangement to be the more likely. We will now number the columns and try pairing off certain ones which in no line would give impossible combinations of letters.
123456789101112HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEENRWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVACDOIESERECDVPEIAFIFLRINEHETT
These combinations appear among others:
162452HTIGFICIVIEVYALAELEWENRELSRAERVINDANNGDIRDECSRESFIILRI
The wordFIGHTstares at us from the first line; let us arrange the columns thus:
524163FIGHTIEVICINELAYAHRENEWEERALSOANDVILRDINGTESRECERILFIF
We have the wordsFIGHTI(NG),VICIN(ITY),RENEWE(D),ANDVIL(LA),RDINGT(O),RECE(IVED). With this to go on, we must choose column 11 as the next one and then in order, columns 8, 10, 7, 12, 9. But note that the order 11, 8, 10, 7, 12, 9, is the same as the order 5, 2, 4, 1, 6, 3. The message was written in twelve columns and the columns have been transposed in that order. We may, although it is entirely unnecessary, speculate on the key word used. It was probably
M E X I C O4 2 6 3 1 5
meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.
Actually, this cipher was solved because the wordVILLAwas suspected and all the necessary letters were found in line six of the arrangement intwelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.
163118HTINGCINITYAHASEWEDBLSOBRVILLANGTOAECEIVFIFTE
The remainder of the solution followed the lines already laid down and, naturally, offered no difficulties, in view of the large number of connected syllables available.
Case2-b.MessageSLCOFWEETNEBRDOORVYMFFEDINMTECROIARPERHOESETSRFBHLTENAHOPTAUSOMTLRTETTASCBHNIODCRENENAAPRDLACYEECIIESGUFNThis is a transposition cipher, English text, and contains 105 letters. The factors of 105 are 5 × 3 × 7 so that we must investigate the following rectangles; 5 × 21, 15 × 7, three of 5 × 7, five of 3 × 7 and seven of 5 × 3.21 × 5VowelsSLCOFWEETNEBRDOORVYMF6FEDINMTECROIARPERHOES9ETSRFBHLTENAHOPTAUSOM7TLRTETTASCBHNIODCRENE6NAAPRDLACYEECIIESGUFN9Vowels121210140133133311321The vowel count of the columns of the rectangle 5 × 21 is very satisfactory. Let us consider it as three blocks of 5 × 7 each, since we must do this ultimately, and make a vowel count of columns for these blocks.5 × 21VowelsSLCOF1WEETN2EBRDO2ORVYM1FFEDI2NMTEC1ROIAR3PERHO2ESETS2RFBHL0TENAH2OPTAU3SOMTL1RTETT1ASCBH1NIODC2RENEN2AAPRD2LACYE2ECIIE4SGUFN1Vowels79876Column12345Vowels, 1st block22322Vowels, 2d block23222Vowels, 3d block34322This is also excellent, so we will try three blocks 5 × 7 and see if rearrangement ofhorizontal lineswill give results reading the columns vertically.1S L C O FP E R H OA S C B H2W E E T NE S E T SN I O D C3E B R D OR F B H LR E N E N4O R V Y MT E N A HA A P R D5F F E D IO P T A UL A C Y E6N M T E CS O M T LE C I I E7R O I A RR T E T TS G U F NAmong other combinations are:3E B R D OR F B H LR E N E N2W E E T NE S E T SN I O D C1S L C O FP E R H OA S C B H5F F E D IO P T A UL A C Y E7R O I A RR T E T TS G U F NThe addition of line 6 above line 3 and line 4 below line 7 will complete this cipher. The successive columns should be read downward.
Case2-b.MessageSLCOFWEETNEBRDOORVYMFFEDINMTECROIARPERHOESETSRFBHLTENAHOPTAUSOMTLRTETTASCBHNIODCRENENAAPRDLACYEECIIESGUFNThis is a transposition cipher, English text, and contains 105 letters. The factors of 105 are 5 × 3 × 7 so that we must investigate the following rectangles; 5 × 21, 15 × 7, three of 5 × 7, five of 3 × 7 and seven of 5 × 3.21 × 5VowelsSLCOFWEETNEBRDOORVYMF6FEDINMTECROIARPERHOES9ETSRFBHLTENAHOPTAUSOM7TLRTETTASCBHNIODCRENE6NAAPRDLACYEECIIESGUFN9Vowels121210140133133311321The vowel count of the columns of the rectangle 5 × 21 is very satisfactory. Let us consider it as three blocks of 5 × 7 each, since we must do this ultimately, and make a vowel count of columns for these blocks.5 × 21VowelsSLCOF1WEETN2EBRDO2ORVYM1FFEDI2NMTEC1ROIAR3PERHO2ESETS2RFBHL0TENAH2OPTAU3SOMTL1RTETT1ASCBH1NIODC2RENEN2AAPRD2LACYE2ECIIE4SGUFN1Vowels79876Column12345Vowels, 1st block22322Vowels, 2d block23222Vowels, 3d block34322This is also excellent, so we will try three blocks 5 × 7 and see if rearrangement ofhorizontal lineswill give results reading the columns vertically.1S L C O FP E R H OA S C B H2W E E T NE S E T SN I O D C3E B R D OR F B H LR E N E N4O R V Y MT E N A HA A P R D5F F E D IO P T A UL A C Y E6N M T E CS O M T LE C I I E7R O I A RR T E T TS G U F NAmong other combinations are:3E B R D OR F B H LR E N E N2W E E T NE S E T SN I O D C1S L C O FP E R H OA S C B H5F F E D IO P T A UL A C Y E7R O I A RR T E T TS G U F NThe addition of line 6 above line 3 and line 4 below line 7 will complete this cipher. The successive columns should be read downward.
Case2-b.
Message
SLCOFWEETNEBRDOORVYMFFEDINMTECROIARPERHOESETSRFBHLTENAHOPTAUSOMTLRTETTASCBHNIODCRENENAAPRDLACYEECIIESGUFN
This is a transposition cipher, English text, and contains 105 letters. The factors of 105 are 5 × 3 × 7 so that we must investigate the following rectangles; 5 × 21, 15 × 7, three of 5 × 7, five of 3 × 7 and seven of 5 × 3.
21 × 5VowelsSLCOFWEETNEBRDOORVYMF6FEDINMTECROIARPERHOES9ETSRFBHLTENAHOPTAUSOM7TLRTETTASCBHNIODCRENE6NAAPRDLACYEECIIESGUFN9Vowels121210140133133311321The vowel count of the columns of the rectangle 5 × 21 is very satisfactory. Let us consider it as three blocks of 5 × 7 each, since we must do this ultimately, and make a vowel count of columns for these blocks.5 × 21VowelsSLCOF1WEETN2EBRDO2ORVYM1FFEDI2NMTEC1ROIAR3PERHO2ESETS2RFBHL0TENAH2OPTAU3SOMTL1RTETT1ASCBH1NIODC2RENEN2AAPRD2LACYE2ECIIE4SGUFN1Vowels79876
21 × 5VowelsSLCOFWEETNEBRDOORVYMF6FEDINMTECROIARPERHOES9ETSRFBHLTENAHOPTAUSOM7TLRTETTASCBHNIODCRENE6NAAPRDLACYEECIIESGUFN9Vowels121210140133133311321
5 × 21VowelsSLCOF1WEETN2EBRDO2ORVYM1FFEDI2NMTEC1ROIAR3PERHO2ESETS2RFBHL0TENAH2OPTAU3SOMTL1RTETT1ASCBH1NIODC2RENEN2AAPRD2LACYE2ECIIE4SGUFN1Vowels79876
Column12345Vowels, 1st block22322Vowels, 2d block23222Vowels, 3d block34322
This is also excellent, so we will try three blocks 5 × 7 and see if rearrangement ofhorizontal lineswill give results reading the columns vertically.
1S L C O FP E R H OA S C B H2W E E T NE S E T SN I O D C3E B R D OR F B H LR E N E N4O R V Y MT E N A HA A P R D5F F E D IO P T A UL A C Y E6N M T E CS O M T LE C I I E7R O I A RR T E T TS G U F N
Among other combinations are:
3E B R D OR F B H LR E N E N2W E E T NE S E T SN I O D C1S L C O FP E R H OA S C B H5F F E D IO P T A UL A C Y E7R O I A RR T E T TS G U F N
The addition of line 6 above line 3 and line 4 below line 7 will complete this cipher. The successive columns should be read downward.
Case2-c. In this case, both lines and columns are rearranged by means of a key word or key words. The method of solution is the same as Case 2-a and 2-b except that the lines must be rearranged after the columns have been correctly arranged, or in some cases, vice versa. This cipher is not infrequently met with because it seems to offer safety by use of two key words and by the great but only apparent complexity of the method.MessageWVGAEEGENLTFTOHTEIEFRBTSEINENGONWRMGXIXNGOITNROMROESPALHNEACUDNNHDERMEThis is a transposition cipher, English text andthe number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.VowelsVowelsW V G A E E G E N L4W V G A E E G3T F T O H T E I E F3E N L T F T O2R B T S E I N E N G3H T E I E F R3O N W R M G X I X N2B T S E I N E3G O I T N R O M R O4N G O N W R M1E S P A L H N E A C4G X I X N G O2U D N N H D E R M E3I T N R O M R2O E S P A L H3N E A C U D N3N H D E R M E2The first form looks the more likely from the vowel count. We proceed to number the columns and lines and try rearrangement of columns so as to obtain possible letter combinations from every line.123456789101WVGAEEGENL2TFTOHTEIEF3RBTSEINENG4ONWRMGXIXN5GOITNROMRO6ESPALHNEAC7UDNNHDERMEAmong other combinations we have these:351428106971GEWAVELENG2THTOFIFTEE3TERSBEGINN4WMORNINGXX5INGTOMORRO6PLEASECHAN7NHUNDREDMEA very casual inspection of the lines shows that they should be rearranged in order 6, 1, 2, 7, 3, 5, 4, as follows:351428106976PLEASECHAN1GEWAVELENG2THTOFIFTEE7NHUNDREDME3TERSBEGINN5INGTOMORRO4WMORNINGXXAlthough of no particular importance, it may be stated that the column key in this case wasGRANDand the line key wasCENTRAL, both used as in encipheringCase 2-a.
Case2-c. In this case, both lines and columns are rearranged by means of a key word or key words. The method of solution is the same as Case 2-a and 2-b except that the lines must be rearranged after the columns have been correctly arranged, or in some cases, vice versa. This cipher is not infrequently met with because it seems to offer safety by use of two key words and by the great but only apparent complexity of the method.MessageWVGAEEGENLTFTOHTEIEFRBTSEINENGONWRMGXIXNGOITNROMROESPALHNEACUDNNHDERMEThis is a transposition cipher, English text andthe number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.VowelsVowelsW V G A E E G E N L4W V G A E E G3T F T O H T E I E F3E N L T F T O2R B T S E I N E N G3H T E I E F R3O N W R M G X I X N2B T S E I N E3G O I T N R O M R O4N G O N W R M1E S P A L H N E A C4G X I X N G O2U D N N H D E R M E3I T N R O M R2O E S P A L H3N E A C U D N3N H D E R M E2The first form looks the more likely from the vowel count. We proceed to number the columns and lines and try rearrangement of columns so as to obtain possible letter combinations from every line.123456789101WVGAEEGENL2TFTOHTEIEF3RBTSEINENG4ONWRMGXIXN5GOITNROMRO6ESPALHNEAC7UDNNHDERMEAmong other combinations we have these:351428106971GEWAVELENG2THTOFIFTEE3TERSBEGINN4WMORNINGXX5INGTOMORRO6PLEASECHAN7NHUNDREDMEA very casual inspection of the lines shows that they should be rearranged in order 6, 1, 2, 7, 3, 5, 4, as follows:351428106976PLEASECHAN1GEWAVELENG2THTOFIFTEE7NHUNDREDME3TERSBEGINN5INGTOMORRO4WMORNINGXXAlthough of no particular importance, it may be stated that the column key in this case wasGRANDand the line key wasCENTRAL, both used as in encipheringCase 2-a.
Case2-c. In this case, both lines and columns are rearranged by means of a key word or key words. The method of solution is the same as Case 2-a and 2-b except that the lines must be rearranged after the columns have been correctly arranged, or in some cases, vice versa. This cipher is not infrequently met with because it seems to offer safety by use of two key words and by the great but only apparent complexity of the method.
Message
WVGAEEGENLTFTOHTEIEFRBTSEINENGONWRMGXIXNGOITNROMROESPALHNEACUDNNHDERME
This is a transposition cipher, English text andthe number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.
VowelsVowelsW V G A E E G E N L4W V G A E E G3T F T O H T E I E F3E N L T F T O2R B T S E I N E N G3H T E I E F R3O N W R M G X I X N2B T S E I N E3G O I T N R O M R O4N G O N W R M1E S P A L H N E A C4G X I X N G O2U D N N H D E R M E3I T N R O M R2O E S P A L H3N E A C U D N3N H D E R M E2
The first form looks the more likely from the vowel count. We proceed to number the columns and lines and try rearrangement of columns so as to obtain possible letter combinations from every line.
123456789101WVGAEEGENL2TFTOHTEIEF3RBTSEINENG4ONWRMGXIXN5GOITNROMRO6ESPALHNEAC7UDNNHDERME
Among other combinations we have these:
351428106971GEWAVELENG2THTOFIFTEE3TERSBEGINN4WMORNINGXX5INGTOMORRO6PLEASECHAN7NHUNDREDME
A very casual inspection of the lines shows that they should be rearranged in order 6, 1, 2, 7, 3, 5, 4, as follows:
351428106976PLEASECHAN1GEWAVELENG2THTOFIFTEE7NHUNDREDME3TERSBEGINN5INGTOMORRO4WMORNINGXX
Although of no particular importance, it may be stated that the column key in this case wasGRANDand the line key wasCENTRAL, both used as in encipheringCase 2-a.
Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.“To encipher the message ‘MOVE DAYLIGHT. ENEMY APPROACHING FROM NORTH. PRISONERS SAY STRENGTH ONE HUNDRED THOUSAND. MEET HIM AS PLANNED.’ arrange as follows:MOVESTRENGTHPLANNEDSAYDAYLIGHTONEASPRISONERSENEMYHUNDREDHIMNORTHAPPROACHINGTHOUSANDMEETFROMHere the route is down the first column, up the fourth, down the second and up the third.”This cipher was often complicated by the introduction of nulls for every fifth word. Thus the above message might be sent:MOVE STRENGTH PLANNED SAYNEVERDAYLIGHT ONE AS PRISONERSLEAVINGENEMY HUNDRED HIM NORTHUNCHANGEDAPPROACHING THOUSAND MEET FROMCOME.The words in italics are nulls and not a part ofthe message and the receiver eliminates them before arranging his message in columns to get the sense of it.As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.A route cipher using the code words of the War Department code might have some advantages over the method of enciphering code messages as prescribed in that Code.
Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.“To encipher the message ‘MOVE DAYLIGHT. ENEMY APPROACHING FROM NORTH. PRISONERS SAY STRENGTH ONE HUNDRED THOUSAND. MEET HIM AS PLANNED.’ arrange as follows:MOVESTRENGTHPLANNEDSAYDAYLIGHTONEASPRISONERSENEMYHUNDREDHIMNORTHAPPROACHINGTHOUSANDMEETFROMHere the route is down the first column, up the fourth, down the second and up the third.”This cipher was often complicated by the introduction of nulls for every fifth word. Thus the above message might be sent:MOVE STRENGTH PLANNED SAYNEVERDAYLIGHT ONE AS PRISONERSLEAVINGENEMY HUNDRED HIM NORTHUNCHANGEDAPPROACHING THOUSAND MEET FROMCOME.The words in italics are nulls and not a part ofthe message and the receiver eliminates them before arranging his message in columns to get the sense of it.As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.A route cipher using the code words of the War Department code might have some advantages over the method of enciphering code messages as prescribed in that Code.
Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.
“To encipher the message ‘MOVE DAYLIGHT. ENEMY APPROACHING FROM NORTH. PRISONERS SAY STRENGTH ONE HUNDRED THOUSAND. MEET HIM AS PLANNED.’ arrange as follows:
MOVESTRENGTHPLANNEDSAYDAYLIGHTONEASPRISONERSENEMYHUNDREDHIMNORTHAPPROACHINGTHOUSANDMEETFROM
Here the route is down the first column, up the fourth, down the second and up the third.”
This cipher was often complicated by the introduction of nulls for every fifth word. Thus the above message might be sent:
MOVE STRENGTH PLANNED SAYNEVERDAYLIGHT ONE AS PRISONERSLEAVINGENEMY HUNDRED HIM NORTHUNCHANGEDAPPROACHING THOUSAND MEET FROMCOME.
MOVE STRENGTH PLANNED SAYNEVERDAYLIGHT ONE AS PRISONERSLEAVINGENEMY HUNDRED HIM NORTHUNCHANGEDAPPROACHING THOUSAND MEET FROMCOME.
The words in italics are nulls and not a part ofthe message and the receiver eliminates them before arranging his message in columns to get the sense of it.
As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.
A route cipher using the code words of the War Department code might have some advantages over the method of enciphering code messages as prescribed in that Code.
General Remarks on Transposition CiphersIt is the consensus of opinion of experts that the transposition cipher is not the best one for military purposes. It does not fulfill the first, second, and third ofKerckhoffs’requirements as to indecipherability, safety when apparatus and method fall into the hands of the enemy, and dependability on a readily changeable key word.However, transposition ciphers are often encountered. They are favorites with those who find the substitution ciphers too difficult and too tedious to handle and who believe that their transposition methods are either absolutely indecipherable or sufficiently so for the purpose of concealing the text of a message for the time being. They seem to be particularly popular with secret agents and spies, presumably because special apparatus is rarely necessary in enciphering and deciphering.Although the number of transposition methods is legion, they can practically all be considered under one of the three cases already discussed. It is surprising how often transposition ciphers preparedby complicated rules, will, on analysis, be seen to be very simple.To be successful in solving transposition ciphers, one should constantly practice reading backward and up and down columns, so that the common combinations of letters are as quickly identified when seen thus as when encountered in straight text. Combinations likeEHT,LLIW,ROF,DNA, etc., should be appreciated immediately as common words written backward.A study of the table of frequency of digraphs or pairs is also excellent practice and such a table should be at hand when a transposition cipher is under consideration. It assists greatly if Case 2 be encountered and is of considerable use in solving Case 1.The solution of route ciphers is necessarily one of try and fit, with the knowledge that such ciphers usually are read up and down columns. It is not believed that route ciphers will often be met with at the present day.
General Remarks on Transposition Ciphers
It is the consensus of opinion of experts that the transposition cipher is not the best one for military purposes. It does not fulfill the first, second, and third ofKerckhoffs’requirements as to indecipherability, safety when apparatus and method fall into the hands of the enemy, and dependability on a readily changeable key word.However, transposition ciphers are often encountered. They are favorites with those who find the substitution ciphers too difficult and too tedious to handle and who believe that their transposition methods are either absolutely indecipherable or sufficiently so for the purpose of concealing the text of a message for the time being. They seem to be particularly popular with secret agents and spies, presumably because special apparatus is rarely necessary in enciphering and deciphering.Although the number of transposition methods is legion, they can practically all be considered under one of the three cases already discussed. It is surprising how often transposition ciphers preparedby complicated rules, will, on analysis, be seen to be very simple.To be successful in solving transposition ciphers, one should constantly practice reading backward and up and down columns, so that the common combinations of letters are as quickly identified when seen thus as when encountered in straight text. Combinations likeEHT,LLIW,ROF,DNA, etc., should be appreciated immediately as common words written backward.A study of the table of frequency of digraphs or pairs is also excellent practice and such a table should be at hand when a transposition cipher is under consideration. It assists greatly if Case 2 be encountered and is of considerable use in solving Case 1.The solution of route ciphers is necessarily one of try and fit, with the knowledge that such ciphers usually are read up and down columns. It is not believed that route ciphers will often be met with at the present day.
It is the consensus of opinion of experts that the transposition cipher is not the best one for military purposes. It does not fulfill the first, second, and third ofKerckhoffs’requirements as to indecipherability, safety when apparatus and method fall into the hands of the enemy, and dependability on a readily changeable key word.
However, transposition ciphers are often encountered. They are favorites with those who find the substitution ciphers too difficult and too tedious to handle and who believe that their transposition methods are either absolutely indecipherable or sufficiently so for the purpose of concealing the text of a message for the time being. They seem to be particularly popular with secret agents and spies, presumably because special apparatus is rarely necessary in enciphering and deciphering.
Although the number of transposition methods is legion, they can practically all be considered under one of the three cases already discussed. It is surprising how often transposition ciphers preparedby complicated rules, will, on analysis, be seen to be very simple.
To be successful in solving transposition ciphers, one should constantly practice reading backward and up and down columns, so that the common combinations of letters are as quickly identified when seen thus as when encountered in straight text. Combinations likeEHT,LLIW,ROF,DNA, etc., should be appreciated immediately as common words written backward.
A study of the table of frequency of digraphs or pairs is also excellent practice and such a table should be at hand when a transposition cipher is under consideration. It assists greatly if Case 2 be encountered and is of considerable use in solving Case 1.
The solution of route ciphers is necessarily one of try and fit, with the knowledge that such ciphers usually are read up and down columns. It is not believed that route ciphers will often be met with at the present day.