CODES IN USE.

CODES AND CIPHERS.

A code is a list or collection of arbitrary words or groups of letters to each of which some ordinary word, proper name, phrase, or sentence is assigned for meaning.

Ciphers embrace all means whereby writings may be transcribed into occult terms. All ciphers employ some distinct method for transcription, which method is termed a key. In practice the key is usually applied directly in enciphering and reversed in deciphering messages.

The codes of the Western Union and Postal Telegraph companies are examples of well-known codes suited to general commercial use. Besides these, many special codes have been formulated, so as to embody technical expressions especially adapted to use in particular lines of industry. The War Department Code is a military code adapted to the special needs of the military establishment in peace and war.

Codes are primarily intended for economy, but they may also be readily employed to secure secrecy. When used solely for economy, the coded message is said to be plain code; that is, the word or phrases of the message are coded by direct reference to their respective code equivalents. Thus plain code is readily translatable to anyone in possession of a code book.When secrecy is desired, some method of enciphering or key is employed in such a way that only persons in possession of it can in conjunction with the code book decipher it. In such case the message is said to be in cipher code.

In all codes each expression and its equivalent in plain language is assigned a number. These numbers usually commence at unity and increase consecutively to any desired figure. Messages may be enciphered by means of a key number or series of numbers. An additive number, say 55 additive, requires that in enciphering a message, the fifty-fifth word numerically greater than the proper code word shall be used; if 55 subtractive is used, the fifty-fifth word numerically smaller than the proper code word is to be used. By agreement a single key number can be used alternately additive and subtractive, that is, first additive, second subtractive, third additive, etc.

The key numbers are used over and over until the entire message is enciphered. The key number can sometimes be expressed by a single word, as, for instance, "Grant," each letter having a value of tens in accordance with its position in the alphabet; that is, G, the seventh letter equals 70; R equals 180; A equals 10; N equals 140; and T equals 200. Or by preconcerted arrangement letters may represent units or hundreds. Security from translation by persons not having the key number is greater when the key numbers are used alternately additive and subtractive. If a cipher key word is used, it should be one of an odd number ofletters, as, for instance, "Jones," the numbers corresponding to the positions of the letters in the alphabet. The first number should be additive, the second subtractive, etc. By this means the first letter of the key word is additive the first time it is used, subtractive the second, additive the third, and so on. In some instances the key number, when added to or subtracted from the code number, gives a resulting number exceeding the highest code number or less than unity. In cases of this kind it should be remembered in enciphering that unity follows the highest code number in addition, and that the highest code number follows unity in subtraction. In deciphering a message the process of enciphering is reversed.

As previously stated, the War Department Code is the technical military code and contains expressions numbered consecutively from 1 to 62,000. All the code words are composed of 6 letters, which are so arranged that the vowels and consonants invariably alternate. In the formation of code words the following 13 letters only are used, viz, A, B, D, E, F, G, I, K, M, N, S, U, and X. The body of the code book is arranged as follows:

(a) Army list, containing the name of every commissioned officer in the regular establishment.(b) Military organizations, giving all batteries, companies, troops, etc.(c) Military posts and stations, covering Alaska, Hawaii, Philippine Islands, Porto Rico, and the United States.(d) United States naval stations and vessels.(e) Geographical names.(f) Miscellaneous tables as follows:Numerals.Arrivals and departures.Dates.Indorsements.Letter acknowledgments.Requisitions.Telegram acknowledgments.Mails, shipments, and transports.Blanks for future additions as they may be needed.Ranks and grades of officers and men in the Army.Wireless stations of the Army and Navy.(g) Alphabetical list of code expressions arranged conveniently for use.

(a) Army list, containing the name of every commissioned officer in the regular establishment.

(b) Military organizations, giving all batteries, companies, troops, etc.

(c) Military posts and stations, covering Alaska, Hawaii, Philippine Islands, Porto Rico, and the United States.

(d) United States naval stations and vessels.

(e) Geographical names.

(f) Miscellaneous tables as follows:

Numerals.Arrivals and departures.Dates.Indorsements.Letter acknowledgments.Requisitions.Telegram acknowledgments.Mails, shipments, and transports.Blanks for future additions as they may be needed.Ranks and grades of officers and men in the Army.Wireless stations of the Army and Navy.

(g) Alphabetical list of code expressions arranged conveniently for use.

When it is desired to transmit some word or expression not to be found in the code and no suitable synonym can be discovered the word or expression should be sent in plain language or spelled out by the equivalents for letters and endings to be found on page 589.

Complete instructions for the use of the code either as a code or cipher are contained in the introductory pages of the book.

The use of cipher code in enciphering field messages will usually be practicable only between the several headquarters and other large stations supplied with code books. This method, too, is prohibitive for urgent messages when the time of enciphering and deciphering is an important factor connected with delivery.

Description and use.—Field ciphers include all systems and the apparatus connected therewith whichare ordinarily employed in enciphering and deciphering field messages. Field ciphers are intended for use when code books are not available, and hence the employment of cipher code is precluded. Some methods of field cipher employ simple forms of apparatus, while others require the use of no apparatus at all.

Forms of field cipher.—There are two general classes of field cipher. The first class employs the transposition or reversal of the letters or words of a message according to some preconcerted rule as a means of secrecy. The route cipher hereafter described is an example of this class. The method used in ciphers of the second class consists in the substitution of certain letters or symbols for each of the individual letters composing the words of the message. Both classes of cipher can be rendered more efficient by a judicious use of inversions and by the concealment of terminations.

Inversions.—By the inversions of the whole or certain parts of messages, according to some preconcerted arrangement, the complications of cipher can be greatly increased. If a message is to be inverted, either as a whole or by clauses, it should be inverted before the cipher letters are written over it. Messages may be further complicated by sending the letters of each word backward in various other prearranged combinations.

Concealment of terminations.—To evade the discovery of the key or keys employed, it is most important that the termination of the words of a message should be concealed. The best method to conceal the beginning, and at the same time the termination of words,is to divide them into arbitrary groups of four or five letters each. This procedure will add immeasurably to the strength of the cipher and should in no way confuse one in possession of the key. For instance, the words "sufficient time" would be divided "suff" "icie" "ntti" "me," and such blind letters as may be agreed upon to fill the last two spaces of the last group. All such artifices as this will surely delay a translator not in possession of the key.

The cipher disk.—The cipher disk is composed of two disks of cardboard, leather, or other material joined concentrically, the upper disk revolving upon the lower. The alphabet, reading from left to right, and such other signals, numerals, or combinations of letters, as may be desired, are printed around the circumference of the lower disk. On the upper disk are printed the alphabet and such other signals, numerals, or combinations of letters as are printed on the lower disk. On the lower disk they are printed from left to right, while on the upper disk they are printed from right to left. If it is desired to encipher a message, the key letter or the first letter of the key word or words is set opposite "A." Let us assume it to be "J." The cipher letters to be written are those opposite the text letter when the letter "a" on the upper disk is set opposite "J" on the lower disk. For example, "Send powder" would be written "rfwg uvngfs."

Having a cipher disk as above described, this mere transposition of letters would delay but a short timethe deciphering of a message by one not knowing the key letter, as it would be necessary only to place, in turn, opposite "a" each of the letters of the alphabet beginning with "b" and noting the letters opposite the enciphered letters. But this simple disk can be used with a cipher word, or preferably, cipher words known only to the correspondents, and it is entirely improbable that a message so enciphered could be deciphered in time to be of any value to the enemy. Using the key words "permanent body" to encipher the message "Reenforcements will reach you at daylight," we would proceed as follows: Write out the message to be enciphered and above it write the key word or key words, letter over letter, thus:

PERMANENTBODYPERMANENTBODYPERMANENTBReenforcementswillreachyouatdaylightyanzvznlppkqfxijbBpwanruqpeplomccwhmi

Now bring the "a" of the upper disk under the first letter of the key word on the lower disk, in this case "P." The first letter of the message to be enciphered is "R." "Y" is found to be the letter connected with "R" and it is put down as the first cipher letter. The letter "a" is then brought under "E," which is the second letter of the key word. "E" is to be enciphered and "a" is found to be the second cipher letter. Then bring "a" to "R" and the cipher letter will represent "e," the third text letter of the message. Proceed in this manner until the last letter of the cipher words is used, and, beginning again with the letter "P," so continue until all letters of the message have been enciphered. Divided into groups of four letters, it will be as follows: "yanz vznl ppkq fxij bpwa nruq pepl omcc whmi."

Fig. 19.—Cipher disk.

Fig. 19.—Cipher disk.

To decipher the message, reverse the proceedings above described; thus the letter "a" on the upper disk is brought under the first letter of the key word "P." Following these instructions, we find the first cipher letter of the message; "a" is then brought to the next letter of the key word. In this case "E" is, of course, the next letter of the text. "R" is the next letter in the key and "a" is brought over it. The cipher letter "n" gives us the next text letter, which is "e," and so on until the completion of the message. If the letters of the key word or phrase are exhausted, begin again with the first letter and so continue until the entire message is deciphered.

With a key word, or, preferably, a key phrase of three or four words, the deciphering of a message is extremely difficult.

In a military cipher message, it may be desired to transmit numerals, the spelling out of which would require considerable time. This can be done by an arrangement of the cipher disk so that the numerals of which will appear in the same order as and follow the letters of the alphabet. Thus on the lower disk 1 is placed opposite A; 2 opposite B; 3 opposite C; 4 opposite D; 5, 6, 7, 8, 9, and 0 opposite E, F, G, H, I, and J, respectively.

On the upper disk the above numerals also appear, beginning numeral 1 opposite A; 2 opposite B, etc., 0 being opposite J.

The arbitrary sign XX will be used to indicate "numerals follow" and "numerals end." Supposing then we wish to send the following message: "Send 6,000 cavalry at once," and that the key word was"Washington." Following the instructions heretofore given for enciphering, we would place the words as follows:

WASHINGTONWASHINGTONWASHISENDXX6000XXCAVALRYATONCEEWFELQBKFEZDQHNNYCQNDMFFE

In place of a disk means may be extemporized by taking two strips of paper, on one of which the alphabet, numerals, etc., are twice written in succession. On the other, with equal spacing, the alphabet, etc., are written once, but in reverse order. By sliding these strips in juxtaposition with each other they will replace the disk.

Cipher disks should never be allowed to fall into the hands of the enemy or of anyone unauthorized to have and use them; to insure this, special instructions should be issued for their care and keeping.

This cipher is a highly efficient one for the purpose of secrecy and at the same time requires no apparatus whatever attendant upon its use. The cipher is constructed as follows: Commit to memory the alphabet by numbers, viz, A, 1; B, 2; etc. Take any key word, phrase, or sentence desired; for example, "A discovery." Suppose the message to be enciphered is "Send me powder tonight." The enciphering of the message using the key given above will be as follows:

To encipher, first write out the key, letter by letter, placing the message letter by letter beneath it. Then reduce the letters of the key and the message to thenumeral alphabetical equivalents. Add the individual columns and subtract unity from each. From any result thus found, which exceeds the number of letters in the alphabet, the number 26 must be subtracted. The final totals reduced to letters by numerical alphabetical equivalents will then give the cipher.

ADISCOVERYADISCOVERsendmepowdertonight

which reduced to numerical equivalents according to alphabetical position of letters becomes:

1491931522518251491931522518195144135161523451820151497820

Now add the columns and subtract unity from each. If any result so found exceeds the number of letters in the alphabet 26 must be subtracted from it.

In the example given the numerical totals are as follows:

20923231620382041296222934172429133811111111111111111111982222151937194028521283316232812372626262626262619822221519111914252127162321211

which connected to letters gives:

SHVVOSKSNBEUBGOWBLK

the cipher required.

Translation of cipher is had by reversing the processes described.

This is a cipher in which the words or a message are retained unchanged, but are so disarranged bypreconcerted rules that the sense becomes unintelligible. The message as received seems to be a number of disconnected words and without meaning, but by arrangement in proper order in accordance with certain rules can be easily read. Messages enciphered in this manner may be translated by persons not in possession of the key, and therefore the information contained therein should only be of such a character as to be of little value to the enemy unless acted upon immediately. The usual method employed in arranging a message for this cipher is to write the words in vertical columns. The number of words in each column should always equal the number of columns, being made so, if necessary, by the addition of sufficient "blind" words. A preconcerted route is agreed upon, as up to the first column, down the third, up the second, etc. The message is then transmitted without reference to the columns, but is deciphered at the receiving station by column arrangement and perusal along the original route.

For example, to encipher the message "Move daylight. Enemy approaching from north. Prisoners say strength one hundred thousand. Meet him as planned," arrange as follows:

Movestrengthplannedsaydaylightoneasprisonersenemyhundredhimnorthapproachingthousandmeetfrom

Here the route is down the first column, up the fourth, down the second, and up the third.

General instructions.—In deciphering a message in which the same cipher letter or symbol is uniformly used to represent the same text letter, the following data will be of assistance.

The proportion of occurrence of letters of the alphabet in English words is as follows: For every 2 of the letter Q there are 4 of the letter X, 8 of K, 16 of B, 13 of C, 80 of I, N, O, and S; 85 of A, 90 of T, and 120 of letter E.

The compounds most frequently met with are NG EE LL MM TT DD and NN.

The order of frequency in which the letters of the alphabet occur as initial letters in words is as follows:

S, C, P, A, D, I, F, B, L, T.

If messages are enciphered by a mere transposition of the letters of the alphabet, the cipher disk can be used to quickly decipher the message, as the following example will show: Assuming that F is used to represent A, G to represent B, H to represent C, I to represent D, J to represent E, etc., in regular sequence, and that the message to be enciphered is: "We are short of rifle ammunition; send 30,000 rounds at once."

This would be enciphered if divided into groups of four letters as follows:

jbfobnyromraoxubfulsxmxrsnbscmjbsmhmyrlnfscorlscnfmrsdb.

Place "a" of the upper cipher disk under B of the lower disk and notice whether the cipher letters jbfo—the first group—are intelligible. They give "sawn," continue this for "saw," the first three letters, may be the text word. Now the next group is B N Y R and these give A O D K. We know that A does not represent B because the first 8 cipher letters give the meaningless letters "sawnaodk." Turn "a" to C and we have for the first group T B X O, which is without meaning. Turning "a" to D we get U C Y P, a meaningless jumble. Turn "a" to E and we get V D Z Q, which is meaningless. Now turn "a" under F and we find that JBFO mean "Wear," which, so far at least, gives us a part of a word, or the word "We" and part of another word. We continue to the next group B N Y R, which gives us "esho." We now have these letters "Wearesho," which at a glance we read "We are sho;" continuing to the next group O M R A the cipher disk gives us "rtof," and we read "We are short of" and know we have found the key letter, and the information hidden in the cipher is ours. Continue deciphering with "a" under F until the end of the message. Sometimes the key letter is changed after two, three, or four letters.

It is a matter of minutes only to run through the alphabet and learn the meaning of a message so enciphered.

FIELD GLASSES AND TELESCOPES.

drawing side view of curved lensesFig. 20.

Fig. 20.

When light falls on a transparent body, part is reflected and part is refracted. The angle which the ray makes with the normal, or perpendicular, to the surface at the point of contact is known as the angle of incidence, and the angles which the reflected and refracted rays make with the same normal are known respectively as the angle of reflection and refraction. The reflected ray makes the same angle with the normal as the incident ray, while the refracted ray, when passing from a rarer to a denser medium, is bent toward the normal, and vice versa; the denser the medium into which the ray passes the greater is the deviation. This law allows us at once to understand the action of a lens, which may be defined as a transparent medium that from the curvature of its surface causes the rays of light traversing it to either converge or diverge. The ordinary lenses have either spherical surfaces or a combination of spherical and plane surfaces. This combination will give rise to six classes (fig. 20): (a) Double convex; (b) plano convex; (c) double concave; (d) plano concave; (e) converging, and (f) diverging meniscus. Those lenses which are thicker at the center than at the edges are converging or concentrating lenses, and those which are thicker at the edges than the center are diverging.

The focus of a lens is the point where the refracted rays or their prolongation meet; if the rays themselves intersect after refraction the focus is real, and if their prolongations meet the focus is virtual. The line passing through the centers of curvature of the two surfaces of a lens is called the principal axis and contains a point known as the optical center, which has the property by virtue of which, if a ray passes through it, the ray will not be deviated. The optical center can always be found by drawing two radii parallel to each other, one from each center of the curvature of the surface until the radii intersect their respective surfaces, then draw a line joining these two points. The intersection of this last line with the principal axis will give the optical center.

Let AB be the section of a double convex lens and C and D (fig. 21) be the centers of curvature of the two surfaces. Draw the lines CD′ and DE from C and D parallel to each other, then join D′ and E by a straight line. The point O will be the optical center of the lens. Let us take a point R, on the principal axis as a source of light; the ray RD passes through the optical center and is not deviated. The ray RK on striking will be refracted in the direction KG toward the perpendicular to the surface KD in accordance with the law of refraction, as glass is denser than air. On emerging at G it is refracted away from the perpendicular to the surface CG, since it passes from adenser to a rarer medium, and will intersect the ray RD at the point R′. In a like way the ray RK′ will be found to intersect the ray RD at the same point, R′, which is the focus for all rays coming from R. The point R′ is said to be the image of the object R, and when the two points are considered together they are called conjugate foci. If the incident beam is composed of parallel homogeneous light, the rays will all be brought to a focus at a point on the principal axis, called the principal focus of the lens, and the distance of this point from the optical center is the principal focal length, which is always a fixed quantity for any given lens.

Fig. 21.

Fig. 21.

There is a fixed relation between the principal focal length of a double convex lens and the position of the image of the object which may be expressed as follows:1/i=1/f-1/o, in whichiandoare the distances of the image and object, respectively, from the optical center andfthe focal length, from which we see that for all positions of the object from an infinite distance away from the lens to double the principal focal distance,the image will be on the other side, between a distance equal to the principal focal length and double this length. These are the limits of the image and object in the ordinary cases. If we place this expression in the following form:i=of/(o-f), and suppose the object to remain the same distance from various lenses, it will be seen that the image will be closer to the lens which has the shorter focal length. The principal focal distance, or, briefly, the focal length of the lens, depends on the curvature of the surfaces, and the greater the curvature the shorter the focal length.

Fig. 22.

Fig. 22.

Let us now see how an image is formed by a convex lens, and suppose that CD is the section of a double convex lens (fig. 22), O the optical center, and AB an object at a greater distance from the optical center than double the focal length. Rays will pass out in all directions from the object and some will fall on the lens. A ray from A will pass through the optical center and will not be deviated; others will be incident at various points, for example, E and G, and if weapply the law of refraction we will find that AE and AG will intersect each other and AO at the point A′, provided we do not consider the figure of the lens, forming one point of the image A′ B′; similarly for rays from other points of the object, as, for example, B, we can construct the focus B′, and thus obtain the image A′ B′, which is inverted and smaller than the object AB. The relative size of the image and object will be directly as the conjugate foci, and these can be found at once from the equation of the lens.

If, however, we consider the form of the lens, we will find that all the rays emerging from one point on the object are not brought to the same focus, because the rays incident on the edges of the lens are refracted to a greater extent than those falling on the center, and will be brought to a focus at a shorter distance from the lens than those passing through the central part. This confusion or wandering of the foci from one point is called spherical aberration, or aberration of form, and is due solely to the geometrical form of the lens.

Fig. 23.

Fig. 23.

Fig. 24.

Fig. 24.

In what has been said about the visual image we have supposed that the light was monochromatic, or homogeneous. Let us see what will happen if the light is polychromatic, say, for example, sunlight, and let a beam of sunlight be intercepted on a screen after passing through a double convex lens. It will beobserved, as infigure 23, that the violet rays are brought to a focus nearest the lens, and the red farthest away, and circles of light will be seen on the screen; this wandering of the colored rays from a common focus is called chromatic aberration and depends on the dispersive properties of the material of which the lens is made. Here is a defect that can not be corrected by a stop, but as the refractive and dispersive properties of a substance do not vary together, it is possible to combine two substances, one with high refractive and low dispersive properties and the other with the reverse properties. If proper curves are given to them they will correct each other, thereby producing coincidence of the visible and chromatic foci. Such a combination gives an achromatic lens, which is usually composed of a double convex of crown glass cemented to a diverging meniscus of flint glass, as shown in section infigure 24. This combination is not absolutely achromatic, but sufficiently so for all general purposes.

The telescope is an optical instrument based on an object glass or reflector to form a real image of a real and distant object, and of an ocular to magnify and view the image. Telescopes are classified as refracting or reflecting according as the object glass is a lens or a reflector. The object glass must be essentially convex if the telescope is a refractor, and if a reflector, the object mirror must be concave; the ocular may be either concave or convex.

There are four types of refractive telescopes used for military purposes, viz:

Figure 26is a section of an astronomical telescope. The object glass (D) is a combination consisting of a double convex and a double concave lens cemented together with Canada balsam. The double concave lens is added to correct for chromatic aberration. The ocular (E) is a convex-concave lens.

Rays of light from some distant object are converged by the objective (D) and form an inverted image (ab) at thefocalplane (F). The eye lens (E) receives the divergent pencils fromaandband bend them so that they enter the eye as if coming apparently from the direction ofa′ b′where the apparent image is seen. From the eyepiece (E) the rays emerge in a cone of pencils of light smaller than the pupil of the eye, which enables a telescope of this type to have a large field of view. The image, however, is inverted and the astronomicaltelescope in its original form is therefore not suitable for military purposes. In a modified form it is much used, as will be shown in a later paragraph.

Figure 26

Figure 26

Figure 27is a section of a terrestrial telescope much used for military purposes. Glasses of this type are quite generally known as "spyglasses."

As in the case of the astronomical telescope, the first inverted imagebais formed at the focal plane (F), and the first eyeglass converges these pencils toL. Instead of placing the eye atL, as in the astronomical telescope, the pencils are allowed to cross and fall on a second eyeglass, by which the rays of each pencil are converged to a point in the second erect imagea′ b′, which image is viewed by means of the third and last eyeglass.

Figure 27

Figure 27

Terrestrial telescopes have a comparatively small field of view. The barrels of this telescope are necessarily long on account of the additional lenses.

Figure 28is a section of a Galilean telescope which differs from the astronomical telescope in having a double concave instead of a double convex, eyepiece or ocular.

In this telescope the rays from an object are converged by the object glass (O) and would normally focus at the focal plane (C) and there form the inverted imagebawere it not that the double concave eyeglass or ocular (D) is so located in the barrel of the telescope as to intercept the pencils before they are focused. This double concave eyeglass diverges these pencils and forms a magnified erect imagea′ b′apparently atE. Due to the diverging action of this concave eye lens, the cone of pencils entering the eye is larger than the pupil of the eye, and therefore but a small part of the field gathered by the object glass is utilized by the eye, which causes telescopes of this type to have a comparatively small field of view.


Back to IndexNext