THE CODEBREAKERS

Home > Other > THE CODEBREAKERS > Page 167
THE CODEBREAKERS Page 167

by DAVID KAHN


  Jefferson’s 1785 nomenclator: The Library of Congress, Jefferson Papers, 5th series, XI, f. 35.

  Solution of letter to John Quincy Adams: Add. Ms. 32303, f. 20.

  Chapter 6

  M-94: U.S. Army, Signal Communications (field manual).

  Wheatstone cipher device: Kerckhoffs, 62.

  Wheatstone description of Play fair cipher: Add. Ms. 37205, f. 80.

  Babbage uses mathematics: Add. Ms. 37205, f. 249.

  Chapter 7

  Confederate cipher telegram: NA, RG 109, War Department Collection of Confederate Records, Telegrams, 4161.

  Confederate agents’ message: Plum, 41 (slightly different copy in Bates, 73).

  Electoral telegram: Photolithic Copies of Dispatches, To Accompany the Presidential Election Investigation, in Edward L. Parris Papers, Rutherford B. Hayes Library, Fremont, Ohio.

  Nast cartoon: Harper’s Weekly (November 2, 1878), 869.

  Chapter 8

  De Viaris cipher device: Léauté, 279.

  Bazeries cylinder: Bazeries, 252.

  Long to Dewey: NA, RG 45, Naval Records Collection of the Office of Naval Records Library, Area 10 File, 1798-1910, February 26, 1898; translation in “Ciphers Sent,” October 27, 1888, to May 31, 1898, at 524.

  Baravelli code: Dizionario per corrispondenze in cifra (1895), 75.

  Panizzardi telegram: France, Archives Nationales, BB1975, dossier 1.

  Chapter 9

  Zimmermann telegram: DSDF 862.20212/82A.

  de Grey’s transcription: DSDF 862.20212/81½.

  Kirby cartoon: The [New York] World (March 3, 1917), 8:4-8.

  Chapter 11

  Hudson Code and Emergency Code List: Collection of Secret Codes of U.S. Army, University of Pennsylvania Library, Rare Book Room.

  G.2 A.6 solutions: Childs Cipher Papers, I, §11.

  Chapter 12

  Hindu book cipher: Tunney, opposite p. 90.

  Chapter 13

  Hagelin machine: Eyraud, 195.

  Chapter 14

  “Brown Sheet”: Wi VI/149, Records of Headquarters, O.K.W., Bundesarchiv, Koblenz.

  R.S.H.A. encipherment table: T-175:477:7334402.

  Luftwaffe code: T-321, Roll 75, frame unknown.

  Syko card: Morgan, 59.

  Chapter 15

  Cartoons: Great Britain, Admiralty, Merchant Ships Signal Book, III, 27, 28.

  “Dear Cordell” note: DSDF 740.0011 Pacific War/856.

  Pers-Z solution: Microcopy T-120, Frame F1/568.

  Churchill message: Franklin D. Roosevelt Library, Hyde Park, New York.

  Chapter 16

  San Antonio River drawing: Colonel Shaw. The drawing, produced by the San Antonio postal censorship station, uses short blades of grass along riverbank for dots and long blades for dashes to spell out, in Morse code, Compliments of CPSA MA to our chief Col Harold R. Shaw on his visit to San Antonio May 11th 1945.

  Invasion open code: Germany, Militärgeschichtliches Forschungsamt, Kriegestage-buch des Armeeoberkommandos 15/Ic vom 5.6.1944.

  Scrambler diagrams: Brown-Boveri Review (December, 1941), 399, 402.

  Churchill transcript: T-175:122:2647449.

  Chapter 17

  Tokumu Han organization and Japanese Navy intelligence: United States Strategic Bombing Survey (Pacific), Japanese Military and Naval Intelligence Division, Japanese Intelligence (April, 1946), 30.

  Japanese Navy code: supplied by Ikuhiko Hata from Japan, Defense Ministry Archives.

  Evans’ decipherment: Supplied by Evans.

  Chapter 18

  Russian monalphabetic key: Add. Ms. 32292, f. 4.

  Solution of nomenclator: Add. Ms. 32288, f. 102.

  Russian military message: T-314, Roll 212, frame unknown.

  Erickson cipher worksheets: Sweden, Nedre Justitie Revisionen, Case 13-1941 of Radhusrattan, photographed by Dr. Käärik.

  One-time pad: Japanese police.

  “Trigonometric” cipher: Supplied by Isaac Don Levine.

  Chapter 21

  Balzac’s fake cryptogram: in first edition, 207-210; “new” 1840 edition, Charpentier, 265; 1847 edition, Charpentier, 299; English 1901 edition, Dana Estes & Co., 266.

  Dancing Men: The Strand Magazine, XXVI (December, 1903), 604.

  Pepys: Magdalene College Library, Cambridge.

  Chapter 22

  Bootlegging code chart: NA, RG 26.

  Fiber optic scramble: provided by R. J. Meltzner, Bausch & Lomb, Inc., Rochester, New York.

  Chapter 23

  Bergenroth: Great Britain, Public Record Office, P.R.O. 31/11/11.

  Voynich manuscript: kindly supplied by Hans Kraus.

  Chapter 24

  Donnelly calculations: Minnesota Historical Society.

  Bacon’s biliteral: Of the Advancement of Learning, trans. Gilbert Wats (Oxford: Leon Lichfield for the University, 1640), 268.

  Chapter 25

  Pseudo-hieroglyphic tablet: Syria (1929), 6.

  Grid: Ventris and Chadwick, “Evidence,” 86.

  Tripod tablet: Archeology (Spring, 1954), 18.

  Chapter 26

  Lincos: Freudenthal, 93.

  Dot-and-dash picture: Warren Weilbacher, Newsday (April 20, 1962).

  Photographic Inserts

  Rembrandt painting: London, The National Gallery, Accession No. 6350.

  Alberti medal: copyright, British Museum; George Francis Hill, A Corpus of Italian Medals of the Renaissance Before Cellini (London: British Museum, 1930), No. 161, says the medal, by Matteo de’ Pasti, dates from 1446-1450 while Alberti was in his middle forties in Rimini.

  Porta: frontispiece from his Magiae Naturalis libri XX (Naples, 1589).

  Cardano: frontispiece from his De Rerum Varietate (1557).

  Vigenère: engraving by Thomas de Leu, Bibliothèque Nationale, Paris.

  Trithemius: sculpture in Neumünster church in Wurzburg by Tilman Riemen-schneider, one of Germany’s greatest Renaissance sculptors.

  Viète: Galérie Française, ou Collection des Portraits… (Didot, 1821), I, plate 24.

  Marnix: engraving by Jacob de Gheyn, 1599; The Metropolitan Museum of Art, New York, Dick Fund, 1917.

  Rossignol. anonymous engraving from Charles Perrault, Les Hommes Illustres Qui Ont Paru en France Pendant ce Siècle (Paris, 1696), opposite p. 57.

  Willes: portrait by Thomas Hudson in Wells Palace, Wells, England.

  Wallis: engraving by W. Faithorne, New York Public Library, Prints Division.

  Gerry, engraving by J. B. Longacre from a drawing by Vanderlyn, New York Public Library, Manuscript Division, Emmet 2134.

  M-94: author’s collection.

  Jefferson: United States Bureau of Engraving and Printing.

  Wheatstone, Playfair, Babbage: all The Illustrated London News (November 6, 1875), 461; (December 6, 1873), 528; (November 4, 1871), 424, respectively.

  Cipher disk: NA, RG 92.

  Holden: Harper’s Weekly, XXXVIII (1894), 1144.

  Kerckhoffs: Eugen Drezen, Historio de la Mondo Lingvo (Leipzig, 1931), 102.

  Bazeries: photo supplied by Mme. Jean Yon, his daughter.

  de Grey: wearing uniform of Royal Naval Volunteer Reserve, 1914 or 1915; photo supplied by his son.

  Hay: wearing uniform of Gordon Highlanders, 1915; photo supplied by his widow.

  Hitchings: during World War I; photo supplied by his widow.

  Hitt: NA, photo 111-SC–23349.

  Sacco: photo supplied by Sacco.

  Painvin: photo supplied by Painvin.

  Friedman: U.S. Army Photograph, P-2229 (this photograph is dated October, 1933, but Friedman’s clothes are identical with two photographs dated 1928; I therefore think that one or the other is in error and have struck the average for my date of 1930).

  Childs and Yardley: NA, photo 111-SC–51371.

  Yardley: Wide World Photos.

  Powell: publicity still from “Rendezvous,” supplied by Metro-Goldwyn-Mayer.

  Sinkov, Rowlett, Kullback: U
.S. Army Photographs p-3599, P-4303, P-3946, respectively.

  Friedmans: Cambridge University Press.

  Vernam: picture taken for graduation with Class of 1914 of Worcester Polytechnic Institute, supplied by his daughter.

  Mauborgne: NA, photo 111-SC-101413.

  Hebern: photo (mid-1920s) supplied by his widow.

  Hebern cipher machine: photo supplied by Mrs. Ellie Hebern.

  Hagelin: Wide World Photos.

  Paschke: photo supplied by Paschke.

  Kunze and Gylden: author’s photographs.

  Kramer-Safford, Rochefort: both Wide World Photos.

  Dyer: photo supplied by Dyer.

  Shaw: photo supplied by Shaw.

  Koenig: Bell Telephone Laboratories photo, July, 1964.

  Japanese cruiser: NA, 80-G-414422.

  Spectrograms of speech: Bell Telephone Laboratories photos.

  Traffic analysts: U.S. Army Photograph SC 223683.

  U-505: NA, photo 80-G-49172.

  Combat cryptography: U.S. Army Photograph SC 370625, showing message center of the 3rd Division, U.S. Infantry, Hyopchong, Korea, October 1, 1951.

  NSA headquarters: U.S. Army Photograph SC 574898.

  Kroger one-time pads: both Wide World Photos.

  Abel pad: Federal Bureau of Investigation.

  Electronic countermeasures: Sperry Gyroscope Company, Lake Success, New York.

  Johnson and Rowlett: United Press International photo.

  hot line: U.S. Army photograph SC 605685.

  Hagelin hand machine: author’s collection.

  O.M.I. machine: Ottico Meccanica Italiana, Rome.

  Holmes: drawing from the first publication of Arthur Conan Doyle, “The Adventure of the Dancing Men,” The Strand Magazine, XXVI (December, 1903), at 604.

  Shannon: Bell Telephone Laboratories.

  Radio scrambler: photo of Model 106 from Delcon, Inc., Palo Alto, California.

  Bentley: photo at about age 60, supplied by his son.

  scrambled television: Zenith Radio Corporation, Chicago, Illinois.

  Bacon: engraving by W. Hollar, New York Public Library, Prints Division.

  Ignatius Donnelly: Minnesota Historical Society.

  Voynich manuscript: Hans Kraus.

  Radio telescope: National Science Foundation.

  INDEX

  THE INDEX covers only the cryptological aspects of this book. Thus, although there is a passage describing Japan’s war strategy, the index does not cite it because cryptology played no essential role in it. On the other hand, there is a reference to the Battle of Midway because cryptology was crucial to it. Subjects that are discussed in relation to cryptology are listed under their names; thus, music in cryptology is listed under “music” and not under “cryptology, music in.” The major subject headings, such as “cryptography,” deal only with that subject when it is considered as a whole in its various aspects. In general, they are cross-referenced to entries of coordinate value.

  There are few chronological references because the book’s structure is largely chronological, but there are geographical and national entries.

  To cite every occurrence, or even just major occurrences, of a common general system, such as polyalphabetic substitution, would make an entry so long as to be useless. But rarer systems, as polygraphic substitution, or specific named systems, as PA-K2, are listed in all essential occurrences. In such headings the term “code” or “cipher” is omitted.

  0075 code, 282-97 passim

  13040 code, 289, 290

  A-1 (U.S. Navy), 387

  A-1 (U.S. State Department), 491-92

  A-3, 554, 555, 557

  Abbasi, A., 666-67

  ABC, 304-05, 306, 307

  ABC Code, 516,838,845

  ABCD, 307

  Abel, R., 664, 665, 668

  Abhorchdienst, 313-14

  Abwehr, 453-55, 531, 533, 534, 535, 537

  Academy of Lynxes, 138, 773

  Accademia Secretorum Naturae, 138

  Accidental repetitions, 208, 213

  Acme Code, 516, 845, 846, 847, 851

  Adams, J. Q., 187

  Additive, 252, 440, 444

  Adleman, L., 982

  ADFGVX, 339, 340, 344-45, 388

  ADFGX, 338, 340-43

  Advertisements, personal, in newspapers, 775

  A.E.F. See American Expeditionary Force

  Aeneas the Tactician, 82, 83

  Aerial telegraph, 836-37

  African nations, 730

  A.F.S.A. See Armed Forces Security Agency

  Afu, 532

  AGERs, 969-70

  Agony columns, 775

  AGTRs, 969-70

  AIRCOM, 672

  AIRCOMNET, 673

  AIROPNET, 673

  AK, 319

  Äkerblad, J. D., 906

  Akkadian, 898, 912, 913, 914, 925

  Aktiebolaget Cryptograph, 424

  Aktiebolaget Cryptoteknik, 432

  ALACHI, 338

  Albam, 78, 79

  Albert, A. A., 410, 677, 737, 739

  Alberti,L. B., 125-30, 903

  Algebraic cryptography 405-08 see also mathematics

  Al-Khalil, 97

  Allison, H., 388

  Alphabet

  cipher, 103, 107

  definition, xiii

  normal profile, 210-11

  primary, reconstruction from secondary alphabets, 374

  symmetry of position, 237-38

  Alphabetical Typewriter (cipher machine), 18, 19

  Amadi, A., 109-10

  Amateurs, 767-70 see also inventors

  AMCOMNET, 673

  Amè,C., 470, 613

  American Black Chamber. See Black Chamber

  American Black Chamber, The, 361-64, 367-68, 984

  American Council on Education, 981

  American Cryptogram Association, 769

  American Expeditionary Force, 326-39

  American Indian languages, 549-50

  American Revolution, 174-85

  American Telephone and Telegraph Company, 394-403, 554, 555, 558, 768, 825

  American Trench Code, 327

  Amjadi, M., 666

  Amtorg Trading Corporation, 635

  AN-103, 582

  Anagramming, 103

  multiple, 226, 303, 309

  Anderson, W. S., 3, 613

  André, J., 176

  Andreyev, N. D., 953

  Anglo-French code book, 264

  Ango Kenku Han, 495

  Annapolis, 672

  Antoinette, M., 775

  Arabs, 93-99

  Arensberg,W.C., 880, 882

  Argenti, G. B., 112-14, 130, 148-49, 151

  Argenti, M., 112-14, 130, 151

  Argot, 822, 823

  Arisue, S., 584

  Armed Forces Security Agency, 675

  Armenia, 85

  Army Security Agency, 13, 576, 577, 678-79, 681, 699

  Arnold, B., 176-77, 178, 252, 859

  Artha-śāstra, 74, 75

  A.S.A. See Army Security Agency

  ASSCOMS, 386

  Assyria, 75-76, 912

  Astraglossa, 956-58

  Atbah, definition, 79

  Atbash, 92

  definition, 77-78, 79

  Atlantic, Battle of, 468, 978

  Atlantis, 465-66

  Atlantis: The Antedeluvian World, 874

  Atlas computer, 726

  Atomic bomb project, 545-49

  A. T. & T See American Telephone and Telegraph Company

  Atterbury, F, 170-71

  Augustus Caesar, 84

  Augustus II, 154

  Aulus Gellius, 780

  Australia, 486

  Austria

  black chamber, 163-65

  cryptanalytic organization in World War I, 316-18

  cryptographic systems, 278, 319

  Austria-Hungary

  Dechiffrierdienst, 316-18, 320

  Kriegschiffriergruppe, 318

  pre-World War I,
263-64

  World War I systems, 319

  Authenticators, 571

  Autokeys, 143, 144, 147, 206, 754

  “Automatic cryptography,” 397

  Ave Maria cipher, 135

  Ayer, A.J., 890

  Azarov, A. and M., 637-38

  B-1,491-92

  B-21, 425

  B-211, 426, 691

  B-69, 827

  Babbage, C, 204-07, 240, 765, 776, 860

  Babington, A., 122-23

  Babou, P., 111

  Babylonia, 75-76, 912

  Bacon, Sir Francis, 349, 866

  Bacon, R., 90, 865, 866, 868

  Baker, L. C, 863

  Balzac, H.de, 781

  BAMS, 466,467, 582

  Band-splitters, 554

  Banks, 826

  Banner, 971

  Baravelli code, 256, 257, 839

  Barber, R.T., 600

  Barne, J., 770

  Barne, W.,770

  Barnes, H. R., 326, 327, 332

  Bates, D. H., 216, 218

  Baudot code, 395, 482

  Baudot, J. M. E., 395

  Bauer, H., 898-900

  Bausch & Lomb, 829

  Bazeries cylinder, 247

  solution of, 247-49 see also multiplex system

  Bazeries, E., 240, 244-50, 839, 860

  Bazna, E., 451

  B-Dienst. See Beobachtung-Dienst

  Beale, T. J., 771

  Beattie, A. J., 934

  Beatty, Sir David, 271

  Beaufort cipher, 202-03, 242, 324

  Beaufort, F., 202

  Bedicheck, R., 944

  Befehlstafel, 315

  Behistun, 912

  Belaso, G. B., 137, 143, 144, 146

  Belin, E., 830

  Bell Telephone Laboratories, 558-60, 744

  Bemer, R. W., 85

  Bennett, E. L., Jr., 928

  Bensinger, C, 845

  Bentley, E. L., 799, 843-44

  Bentley’s Complete Phrase Code, 516, 843

  Beobachtung-Dienst, 465-68, 484

  Bergenroth, G. A., 854-57

  Bernstorff, J. H. A., von, 282-97 passim

  “Berthas,” 540

  Berthold, H. A., 333, 335

  Bestuzhev-Ryumin, A., 617

  Beurling, A., 482, 541, 644, 645

  Biaudet, H., 860

  Bible, 76-80, 896, 900

  Bibo, Major, 452, 499

  Bicknell, G. W., 51

  Bien Bien Phu, 686

  Bifid, 243

  Bigram, definition, xiv

  Bingen, H. von, 89

  Bipartite substitution, 243

  Bird, J. M., 868

  Bischoff, B., 859

  Bissell, C. L., 604, 605, 608

  Biuro Szyfrów, 973

  BLACK, 472-74

  Black chambers, 162, 163-65, 171-72, 187-88, 617, 618

  American, 5, 31, 355-60, 361-64, 367, 368, 758

 

‹ Prev