THE CODEBREAKERS

Home > Other > THE CODEBREAKERS > Page 168
THE CODEBREAKERS Page 168

by DAVID KAHN


  Black, F. F, 321

  Black, H., 884-85

  Blackstone’s Commentaries, 177

  Blair, W., 788-89

  Blake, G. A., 702, 703

  Blegen, C., 921, 928, 933

  Blencowe, W., 169

  Bletchley Park, 976

  Blonder-Tongue Laboratories, 833

  BLUE, 489

  Bohlen, L. von, 530

  Boki, G. I., 640

  “Book of Ballymote,” 88, 89

  Bookmaking, 817-21

  Booth, J. W., 220, 863

  Bozart, J., 669

  Bracewell, R. N., 946

  Brahmi, 901, 915

  Bratton, R. S., 27

  Braune Blatter, 447, 448

  Britain, Battle of, 976

  British Broadcasting Corporation, 541-45

  British Security Coordination, 486

  British Tabulating Machine Company, 976

  Brooke-Hunt, G. L., 310, 354

  Brotherhood, F. M., 1, 2, 11

  Brousse, C., 487, 488

  BROWN, 493, 579

  Brown, F. H., 809

  Brown, R. T., 806

  Browne, Sir Thomas, 866

  Brunon, R., 860

  Bruxella, A. de, 91

  Bryant, H. L., 2, 3, 4, 50

  Bucher, L. M., 971

  Buck, F. J., 405

  Bulge, Battle of the, 509

  Bullitt, W. C., 493

  Bupo, 661

  Bureau du Chiffre

  Army, 305-06

  Foreign Ministry, 255-56, 259

  Burke, J. P., 718

  Burnett, E. C, 859

  Burns, W. J., 816

  Burr, A., 186

  Busch, H., 506

  Bush, V., 559

  Business, 823-27

  Byblos inscriptions, 896

  Byrne, J. F, 767-68

  C-1, 493

  C-36, 426

  C-48, 433

  C-52, 433

  Cabinet Noir, 162, 188

  “Cablegram Code Book, Melancholy Notes on,” 851

  Cablegrams. See commercial codes

  Cables, German transatlantic, cutting of, 266

  Caesar alphabet, 84, 619

  Caesar, J., 83

  Caesar substitution, 83, 136, 619, 631, 775

  Callières, F de, 173, 174

  Campillo, M. G. del, 860

  Canada, 486

  Canaris, W., 453, 542

  Canine, R. J., 390, 702

  Caporetto, Battle of, 319

  Carbonari, 772, 787

  Card playing, 821-22

  Cardano, G., 143-45

  Cardano grille, 144, 519, 521

  Carmona, J. G., 251

  Carnetde chiffre, 314

  Carnet réduit, 314

  Carnia, 319

  Carr,D., 13, 51

  Carter, M. S., 702, 703

  Cartier, F, 262, 277, 299, 300, 303-06 passim, 315, 319, 348, 376, 621

  Casanova, J., 153

  Casement, Sir Roger, 281

  Cave, R., 49

  Cavendish-Bentinck, V. F W., 486

  CD-55, 433

  Censorship, U.S., 513-26

  Central Intelligence Agency, 674, 681, 688, 699, 729

  Ceylon, 685

  CG-210, 806

  Chadwick, J., 932-33

  Chaff, 721, 722, 723

  Chamber analysis, 348, 479

  Chambers, R. W., 798

  Chambers, W., 638

  Champollion, J.-F, 907-11

  Chandler, A. B., 216, 218

  Chaocipher, 767, 768

  Chappe, C, 836-37

  Chase, P. E., 203-04

  Chaucer, G., 90, 354, 873

  Checkerboard, 83, 86, 203, 546, 620, 650, 651

  Checkoway, A., 527

  Chesapeake, 971

  Chess, A. P., 818-19

  Chétardie, Marquis de la, 617

  Chi test, 380-82, 388

  Chiffres Secrets Dévoilés, Les, 250

  Chiffrierabteilung, 456-57

  Chiffriermaschinen Aktiengesellschaft, 421

  CHI-HE, 569, 587

  Childs, J. R., 327, 333, 337-39, 355

  China, 73-74

  Chorrin, 151

  Christie, A., 799

  Christoph, Prince of Hesse, 448

  Church, B., 175

  Churchill, W. L. S., 268, 502-03, 556, 721, 972

  C.I.A. See Central Intelligence Agency

  Ciano, G., 445, 471-72, 498

  Cicero, operation, 451-52

  Cifax, 828, 831-33

  Cifra general, 115

  Cifra particular, 115

  Cifrario rosso, 316, 319

  Cifrario servizio, 316

  Cifrario tascabile, 317, 319

  Cipher

  definition, xv

  first modern Western political ciphers, 106

  first Western military ciphers, 82

  oldest surviving key, 86

  oldest Western keys, 107

  telegraph fosters, 191

  unbreakable, 398-400 see also code; field cipher

  Cipher alphabet. See alphabet

  Cipher device

  Byrne, 767-68

  cipher reel, 220

  Hawley, 215 see also cipher disk; cipher machine; grille; multiplex system; skytale

  Cipher disk, 239

  Alberti, 127-29

  Befehlstafel, 315

  Burr, 186

  Confederate, 217

  Danish Communist, 635

  Mexican Army, 322

  most popular invention, 764

  Porter, 139

  U.S. Army, 324, 326, 584 see also cipher device; cipher machine

  Cipher machine

  de Viaris, 240

  Friedman, 385, 391

  Gretag, 826

  Hitt, 388

  Kryha, 825

  mathematical models of, 708

  Mi-544, 826

  Ottica Meccanica Italiana, 826

  Pletts, 372-74

  presently popular, 731

  RSHA, 450

  Safford, 388

  Siemens and Halske, 459, 482

  State Department, 712

  typewriter caps, 321, 415

  U-boat, 506

  U.S. Army, 575

  Vinay and Gaussin, 240

  Wanderer Werke, 459 see also Damm; Enigma; Geheimschrijf machine; Hagelin; Hebern; Hill; M-134-C; M-228; M-325; ORANGE; PURPLE; RED; SIGABA; SIGTOT; Vernam; Wheatstone

  Cipher Machines Corporation, 421

  Cipher Secretary, papal, 112

  Cipher telegrams, New York Tribune publication of, 221

  Cipher wheel, Owen’s, 879

  Ciphertext, definition, xv

  Ciphony, 551-60

  Civil War, 214-21

  Clarence, J., 685

  Clark, E. G., 885

  Clark, H. L., 21

  Clarke, A. C., 958

  Clarke, C. W., 604-05

  Clarke, R., 268

  Clausen, H., 674

  Clausen, M. G. R, 650, 651, 654, 655, 656

  Clausen-Thue, W., 838

  Cleartext, definition, xvi

  Clinton, Sir Henry, 180, 182-84

  Clopfruna, 88

  Cocconi, G., 943, 946, 948, 952

  Code

  book, 177

  commercial. See commercial code

  definition, xiv

  dictionary, 177, 181, 183, 186, 216-17, 222-23

  enciphered. See enciphered code

  field, 314-16, 326-33

  first printed, 192

  hybrid, 289, 816

  nomenclators engender today’s, 190

  oldest existing, 76

  origin of Western, 106

  solution of, 242, 286-87, 289, 335

  trench, 314-16, 324 see also cipher; commercial code; enciphered code; open code

  Code Compilation Section, 326-33, 611, 678

  Code Compiling Company, 359

  Codebreaking, definition, xv

  Codegroups, definition, xiv

  Codem
aking, interest in, 768-70

  Codenames, 501-03, 751 see also under individual codenames

  Codenumbers

  compared to codewords, 251

  condensers for, 841-42

  definition, xiv

  Codetext, definition, xv

  Codewords

  compared to codenumbers, 251

  construction of, 847-48

  definition, xiv

  in commercial codes, 838-44, 847-49

  Colfax, S., 222, 783

  Coincidence, theory of, 376-80

  Cold War, 969

  Collins, S. W., 524

  Colophons, 75, 76, 888

  COLORADO, 332

  Colossus codebreaking device, 979

  Columnar transposition, 155, 195

  double, 301, 302, 539

  interrupted, 312-13, 669

  irregular, 303, 634

  regular, 303

  single, 302, 529

  solution of, 16, 302-03, 440, 539

  Combat Intelligence Unit, 7, 8, 10, 13, 39, 562-70, 573

  COMLOGNET, 673

  Commercial code, definition, xv, 189-90, 836-53

  Communications intelligence, 718

  definition, xvi

  Communications Intelligence Summary, 40

  Communications security, definition, xvi

  “Communication Theory of Secrecy Systems,” 744

  Compton, A., 547

  Computers and tabulators, 440, 443-44, 458, 562, 563-64, 566, 568, 576, 582, 585, 595, 707-08, 725-26, 732, 917, 975, 976, 983-84

  COMSEC, 709-18

  D.E.S. development, 979-81

  Condenser, commercial code, 841-42

  Confederate States of America, 216-21, 324

  Congress, U.S., 981-82

  Consolidated Exporters Corporation, 802, 803, 810-13

  Contact chart, 100-01

  Convoy HX155, 978

  COPEK, 25, 31, 47, 564, 570

  Coptic, 86, 904, 908, 910

  Coral Sea, Battle of, 565

  Corbiere, A., 170

  Corderman, W. P., 388, 517, 575

  Corner reflector, 722

  Cornwallis, Lord, 182-84

  Cory, Mr., 38

  COSMOS, satellites, 720

  Council of Ten, 109

  Countermeasures

  definition, 722 see also electronic countermeasures

  Craig, M, 11

  Cramer, G., 770-71

  Criminals, 802-13, 815-22

  Crisis Center, 711

  Cryptanalysis,

  as a physical science, 737-38

  becomes a major element of intelligence, 348

  becomes most important element of intelligence, 612-13

  becomes specialized, 348-49

  coining of term, 384

  contrasted with cryptography, 298, 737-39, 768-69

  definition, xv

  first, 80

  general and special methods, 140, 738-39

  independently invented in West, 108

  linguistic basis of, 744-48

  linked to statistics, 384

  machines for. See robot cryptanalysts; computers and tabulators

  mathematization of, 612

  outgrows chamber analysis, 348

  relation to cryptography, 753

  science of, invented by Arabs, 93, 96-98

  science or art, 754-55

  scientific method in, 738

  time element in, 754 see also cryptanalytics; enigmatology

  Cryptanalytic bureaus of smaller countries, 730

  Cryptanalytics, 754

  Cryptanalyze, definition, xv

  Crypto Aktiengesellschaft, 432, 433

  Cryptoeidography, 827-36

  definition, 828

  Cryptogram, definition, xv

  Cryptogram, The, 769

  Cryptograph, Inc., 424

  Cryptographia, 155

  Cryptographie militaire, La, 230-39, 794

  Cryptography

  as mathematics, 410, 737, 739

  as noise in a communications channel, 751-52

  binary digital alphabet, 983

  contrasted with cryptanalysis, 298, 737-39, 768-69

  defective and effective, 752

  definition, xiii

  first recorded instance of, 71

  hierarchy of systems, 14, 192, 587

  in Middle Ages, 89

  Internet, 983

  machines for. See cipher machines

  mechanization of, 575, 612

  practical principles, 233-36, 753-54

  public interest in, 980-83

  public key, 982-83

  relation to cryptanalysis, 753

  spontaneous cultural generation of, 84

  time element in, 753 see also cryptoeidography; cryptophony; steganography

  Cryptologia, 155

  Cryptology

  administrative organization, 305, 611-12

  as a black art, 91-93, 783, 792

  biological roots of, 757

  definition, xvi

  effect of permanent embassies, 108

  effect of radio, 298-90

  effect of telegraph, 189-92, 298-99

  effect of World War I, 348-50

  effect of World War II, 611-13

  first appears as cryptography plus cryptanalysis, 93

  future of, 731-33

  in ancient or primitive civilizations, 72-73

  in theory of games, 752

  linked to mathematics, 383-84, 408-10

  logic of, 738-39

  morality of, 758

  psychological bases of, 755-57

  recorded history opens, 71

  sociology of, 752-53, 757

  terminology, xiii-xvi, 384

  U.S. takes world lead in, 385

  West takes lead over East in, 127

  Cryptomeneses, 155

  Cryptomenytices et Crypto graphiae, 154

  Cryptomenytices Patefacta, 155

  Cryptophony, definition, 551

  Cryptotyper, 424

  CSP-642, 582 see also multiplex system

  Cuba, 251, 972

  missile crisis, 713, 715

  CULPER JR., 179

  CULPER SR., 179

  Cuneiform

  cryptography, 75-76

  decipherment of, 912-14

  signs, 898, 912

  Currie, L., 638

  CW, 319

  Cylinder, Bazeries, 247-49 see also multiplex system

  CYNTHIA, 486, 487, 488

  Cypher SA, 279-80

  Cypher W, 279

  Cypriote, 920, 921, 925, 930

  Czechoslovakia, 540-41, 975

  D-1, 493

  Dachnaks, 637

  Daddario, E. Q., 939

  Dahlerus, B., 435

  Dalgarno, G., 870

  Damm, A. G., 422-25, 478, 612, 825

  Dancing Men cipher, 795-98

  Daniel, 79-80

  Darwin, C., 942

  Data Encryption Standard, 979-81, 983

  Dato, L., 126

  Davidian alphabet, 93

  Davidson, J. C. F., 279

  Dawes, C. G., 492

  D-Day, 542-45

  Deceptions and dummy traffic, 40, 508-09, 714-15

  Dechiffrierdienst, 318

  Decipher, definition, xv

  Decode, definition, xv

  Decoys, 722, 724

  Decypherers, British, 169-74, 187

  Decyphering Branch, 171-74, 187-88, 704

  Dee, J., 866

  De-fa tana, 85

  Defense Communications System, 672

  De Furtivis Literarum Notis, 138

  De Grey, N., 282, 285, 287, 294, 485

  De la cryptographie, 242

  Delafield, J. W., 540

  Delastelle, F. M., 240, 242-44

  Delaunay, L., 836

  Demotic, 905

  Delcon Corporation, 827

  Denniston, A. G., 274

  De-Scrambler, 552

  Despacho Universal, 115

  De Sub
tilitate, 143

  Deubner, L., 438, 629, 631, 633

  Deubner, O., 438

  Deutschen Reichspost, 555

  Devers, J. L., 511

  Devos, J. P., 860

  Devoy, J., 281

  De Vries, Marquis, 737, 753

  DEW Line, 720

  Dewey, George, 254

  Dewey, Godfrey, 743

  Dewey, T.E., 364, 604-08

  Dhorme, E., 896-99

  Diaries, 777-79

  Dickinson, V., 520

  Difference method, 440-43

  Diffie, W., 982

  Digital shorthand, 850

  Digraph, definition, xiv

  Digraphic substitution, 198-202, 404, 450

  first, 139

  Direction-finding, xvi, 7-8, 270, 334, 503-04, 708

  Disk, cipher. See cipher disk

  Distant Early Warning Line, 720

  Division of Cryptography, 712

  DNA, 942-43

  Dogger Bank, Battle of, 271

  Doheny, E. C., 815-17

  Dolphins, 963

  Dönitz, K., 465

  Donnelly, I., 874, 885

  Double-key cipher, 151

  Double transposition. See columnar transposition, double

  Doud, H. S., 9

  Douglas, L. C., 799

  Draemel, M. F., 415, 491, 566

  Drake, F. D., 938, 947, 949-51, 959-61

  Dreyfus, A., 254-62, 469

  Driscoll, A. M., 417, 418

  Drugs, smuggling of, 817

  Dubthach, 89

  Dulles, A. W., 390, 498-99, 674

  Dulles, J. F., 729

  Dumbell cipher, 180

  Dunlap, J. E., 696-97

  Dunning, M. J., 49

  Durbodha, 74

  D’Urfe, Madame, 153

  Dusenbury, C. C., 28

  Dvorak-Dealey keyboard, 741

  Dyer, T. H., 48, 562-64, 593, 595

  E-7, 827

  Eastern Island script, 916

  E.C.C.M. See electronic counter-counter-measures

  Eckhardt, H. von, 289, 294, 354

  Eckert, T. T., 215, 863

  E.C.M. See electronic countermeasures

  Edgers, D., 29, 50

  Edie, L. C, 945

  Edward, Prince of Wales, 776

  Egypt, 970

  Eisenhower, D., 325

  Electric Code Machine, 416

  Electric Coding Machine, 25

  Electro-Crypto Model B 1, 424

  Electronic counter-countermeasures, xvi, 721, 723

  Electronic countermeasures, xvi, 721

  active, 722-23

  passive, 722

  Electronic fingerprinting, 539

  Electronic intelligence, xvi, 720-21

  outline of, xvi

  Electronic reconnaissance, xvi, 719-20

  Electronic security, xvi, 721

  outline of, xvi

  Electronic warfare, 719-24

  Elements of Cryptanalysis, 384

  Elgar, Sir Edward, 800

  Eliopoulos, E., 817

  Emanuel, T., 13

  Emergency Code List, 329

  Emission security, xvi, 721, 723

  Encicode, definition, xv

  Encipher, definition, xv

  Enciphered code, 129, 251-52, 402, 644

  Austrian, 278, 319

  criminal, 222-23

  definition, xv

  first, 129-30

  French, 312, 402

  German, 268-69, 271-2, 273, 315-16

  Italian, 256-59, 469

 

‹ Prev