by DAVID KAHN
distinguished from substitution, 139
first, 89
general solution of, 226
solution of formula, 302-03
Tratado de Criptografia, 251
Traveling wave tube, 722
Treasure, hidden, 771-72
Trench codes, 314-16, 324
Trepper, L., 657-58
Trifid cipher, 243
Trigraphic substitution, 404
Trithemius, J., 130-37, 413, 860
Troy, 917-18, 936
Truesdell, K., 321
TSU. See J series
Tsukikawa, S., 42
TU-16 Badgers, 720
Tupelov TU-95, 970
Türkheim, L. G. di, 404
Turing, A., 975-76
Turning grilles, 308-09
Tut Latin, 822
Two-letter differential, 840-41, 847
Typewriter keyboards, 740-41
TYPEX, 510
Tyro, T, 89
Tyronian notes, 89
U-2 aircraft, 693, 720
U-110, 977
U-158, 504
U-505, 506
U-boats, 273, 466, 504-07
UBCHI, 301, 304
Ugaritic literature, 900
ULTRA, 601
Ultra Secret, The, 979
Unbreakable cipher, 398-400
Unicity distance, 750
Unicity point, 750
United States
Air Force Security Service, 680-81
Army, 1, 12, 398, 427, 574-75, 577
Central Bureau, 577, 578
Central Intelligence Agency, 681, 684
colonial cryptology, 174-86
Data Encryption Standard, 979-81, 983
National Defense Research Committee, 558-60
Navy, 5, 12, 252, 386-88, 408, 415-19 passim, 503-04, 680, 969, 971
Philippines, Navy cryptanalytic unit, 10, 25, 47, 563, 564
poor pre-World War II cryptography, 488-89
2nd Signal Service Battalion, 576-77
Signal Companies (Radio Intelligence), 507, 578-79
Signal school, 321, 324, 325
Signal Security Service, 575, 611, 678
solution of American messages, 187, 460, 496-98, 556-57, 671
State Department, 488-501
superiority of current American cryp-tology, 730
takes world lead, 385 see also Army Security Agency; black chambers, American; censorship; Code Compilation Section; Combat Intelligence Unit; Federal Bureau of Investigation; Friedman; FRUPAC; G.2 A.6; Hitt; M-94; M-134; M-138; M-209; National Security Agency; Office of Strategic Services; OP-20-G; Radio Intelligence Division; Rochefort; Safford; SIGABA; Signal Intelligence Service; Signal Security Agency; SIGTOT; Stager; War Department Telegraph Code; word transposition
Univacs, 726
Universal Pocket Code, 490
Universal Trade Code, 359, 846
Universal Turing machine, 976
Uruk, 76
Valerianus, P., 903
Valério, L. P. E., 240, 242
Vanek, V., 540
Variant Beaufort, 203, 242
Vassilyev, A. T., 619
Vatican. See papal cryptology
Vātsyāyana, 74
Venice, 109-10, 114, 858
Ventris, M. G. F., 922-37 passim
Verkuyl, J. A., 691
Vernam, G. S., 394, 403, 612 system, 395-403, 492, 501, 612, 825, 830, 984
Verne, J., 793-94
Vetterlein, Engineer, 555
Viaris, Marquis G. H. L. de, 240-42, 249, 839
Vichy France, 478, 487
Video scramblers, 708
Viète, F., 116-17
Vigenère, B. de, 145-48
tableau and cipher, 148, 149, 194, 202-03, 217, 220, 238, 242, 317, 621
Villena, G. L., 859
Villon, F., 823
Vinay, E., 240, 397
Virolleaud, C., 898-99
Voge, R. G., 594
Voice Security Branch, 712
Volapük, 231-32
Voltaire, 174
Volunteer Evaluation Office, 454
Voris, A. C., 321
Voyatzis, J. D., 817
Voynich, E., 871
Voynich manuscript, 863-72, 873, 953
Voynich, W., 866, 871
Vries, M. de, 737, 753
Wace, A. J. B., 921
Wadsworth, D., 195-96
Wallis, J., 166-69
Walsingham, Sir Francis, 119
Wanderer Werke, 459
War Department Telegraph Code, 321, 326
Warfare, modern, development of, 190
Weather-forecast codes, Japanese, 45, 579
Webster, T. B. L., 936
Wehrmachtnachrichtenverbindungen, 455
Welker, G. W., 11
Wendland, V., 458
Wenger, J. N., 704, 845
Wenwood, G., 174
Wenzel, J., 658
Wesemann, 466
West, S. 175
Western Union Code, 847
Western Union Telegraph Company, 214, 840
Westrex Company, 827
Wheatstone, C., 196-98, 404, 776, 860
Wheatstone cryptograph, 197, 372, 376
White House Communications Agency, 716
Whitelaw’s Telegraph Cyphers, 843
Whitney, Eli, 195
Wigg, G., 729
Wilkins, J., 155, 870
Wilkinson, J., 186
Willes, E., and family, 170-71, 174, 187, 188, 704
Willoughby, C. A., 674
Wills, J., 838
Willson, R., 387, 418
Wilwerth, T. C., 845
WINDOW, 721
Winds code, 32, 38, 4-46, 66-67
Winterbotham, F. W., 979
Wirephoto, 830
Wiretapping, 314, 448, 549, 717
Witzke, L., 354
“Wizard War,” 721
W.N.V. See Wehrmachtnachrichten-verbindungen
Woellner, Lieutenant, 335
Woermann, E., 445
Woodcock, A. W. W., 810, 813
Woodhull, S., 177
Woodward, F. C., 48, 562
Word transpositions, 214-15, 220, 224-72
World War I, 266-350
cryptologic preparations for, 262-65
cryptological evolution in, 298-99, 348-50
effect of cryptology on, 612
World War II, 435-613
cryptological evolution in, 611-13
effect of cryptology on, 612
World Wide Web, 983
Wren, Sir Christopher, 773
Wright, E. V., 740
Wright, W. A., 48, 562, 564, 570, 595
“Wurlitzer Organ,” 525
Xenophon, 82
Yamamoto, I., 6, 562, 568, 572
assassination, 595-601
Yamanashi, 583
Yamato, 594
Yardley, H. O.
American Black Chamber, The, 360-64, 367-68, 984
characteristics, 351, 369
chief of American Black Chamber, 5, 355-60
chief OF MI-8, 324, 352-55
contribution to cryptology, 369
criticizes American cryptography, 363, 403, 492
early life, 351
fiction and films, 368
in China, 368-69, 579
interest in cryptology, 351-52
“Japanese Diplomatic Secrets,” 364
later life, 369
law aimed at, 364-67, 687
reaction to The American Black Chamber, 31, 361-64
solves Japanese codes, 356-59
Universal Trade Code, 359, 846
Voynich manuscript, 867
Yardley symptom, 352
Yezidis, 84
Yin-chên, 74
Yin-t’ang, 74
Yoshikawa, T., 13, 42, 47, 52
Young, T., 906-07
YU, 358
Yugoslavia, 460, 470
Zacharias, E. M., 5, 387
Zapp, Prof., 525-26
&nb
sp; Zavarzine, P., 618-19
Zenith Radio Corporation, 833
Zievert, K., 618
Zimmermann telegram, 282-97, 388, 483, 485, 699
Zipf, G. K., 746
Zoëga, G., 905
Zybine, 618-19
Zygalski, H., 973
Rembrandt depicts the most famous cryptogram in the world—the handwriting on the wall—in his “Belshazzar’s Feast.” A celestial hand emerges from smoke to inscribe Mene mene tekel upharsin vertically in glowing Hebrew letters upon the palace wall as a startled Belshazzar turns and stares.
The father of Western cryptology, Leo Battista Alberti
Giovanni Battista Porta, the Italian scientist, in 1589
Girolamo Cardano, the Italian writer, aged 49
Blaise de Vigenère, in the last year of his life
Abbot Johannes Trithemius, author of the first printed book on cryptology
François Viète, French cryptanalyst
Philippe van Marnix, solver of Spanish ciphers
Antoine Rossignol, the father of French cryptology
Bishop Edward Willes, head of England’s decyphering branch
John Wallis, the father of English cryptology
Elbridge Gerry, who solved a Tory spy cryptogram
Above, Thomas Jefferson, the father of American cryptography; left, cryptographer assembles Cipher Device M-94, U.S. Army version of Jefferson’s cypher
Three Victorian amateur cryptologists: from left, Sir Charles Wheatstone, inventor of two important cipher systems; Lyon Play fair, First Baron Playfair, who gave his name to one of Wheatstone’s ciphers; and Charles Babbage, who solved many difficult ciphers
Left, Confederate brass cipher disk; right, Edward S. Holden, one of the cryptanalysts of the electoral scandal telegrams of 1876
Above, Etienne Bazeries, the great French cryptanalyst, in the 1920s; left, Auguste Kerckhoffs, apostle of modern cryptography
Three World War I British cryptologists: from left, Nigel de Grey, a solver of the Zimmermann telegram; Malcolm Hay of Seaton, head of the War Office cryptanalytic bureau; O. T. Hitchings, worth “four divisions” to the B.E.F.
Luigi Sacco, Italian cryptologist, in 1942
Colonel Parker Hitt, mentor of America’s World War 1 cryptology, in France in 1918
Lieutenant Georges Painvin, who was to become the greatest cryptanalyst of World War I, engages in his first attempts at solution in a room at the Chateau de Montgobert, November, 1914
William Frederick Friedman, about 1930
J. Rives Childs and Herbert O. Yardley on duty in the Hotel Crillon at the Paris Peace Conference, 1919
Herbert O. Yardley, head of the American Black Chamber, in 1931
William Powell, at left, plays a codebreaker in the movie Rendezvous, based on one of Herbert O. Yardley’s books
The second generation of American cryptologists: from left, Abraham Sinkhov, Frank B. Rowlett, Solomon Kullback, all in 1941 or 1942
William F. and Elizebeth S. Friedman in 1958, with part of their collection of cipher machines
Left, Gilbert S. Vernam, who invented the first on-line cipher machine, about 1914; right, Major Joseph O. Mauborgne, who welded several pre-existing elements into the unbreakable cipher, in World War I.
Edward H. Hebern, inventor of the rotor
Early Hebern Electric Code Typewriter, using only one rotor
Left, inventor Boris Hagelin examines the cipher machine that made him rich; upper right, Lester S. Hill, inventor of algebraic cryptography; lower right, Arvid G. Damm, unsuccessful cipher machine inventor
Left, cryptographic rotor from one of Hebern’s machines showing wiring; right, Hagelin’s M-209, used by U.S. Army in World War II, showing mechanism
Left, Adolf Paschke, and, center, Werner Kunze, head cryptanalysts of Pers z of the German Foreign Office; right, Yves Gyldén, mentor of Swedish cryptology, all in 1962
Left, Captain Alwin D. Kramer, who delivered MAGIC intercepts before Pearl Harbor; center, Captain Laurance F. Safford, founder of U.S. Navy cryptologic organization; right, Captain Joseph J. Rochefort, head of the Navy cryptanalytic unit that read pre-Midway messages, all in 1946
Left, Captain Thomas H. Dyer, chief cryptanalyst of Rochefort’s unit, about 1946; center, Colonel Harold R. Shaw, head of Technical Operations Division, Office of Censorship, about 1944; right, Walter Koenig, Jr., Bell Telephone Laboratories expert in breaking scramblers in 1964
The fruits of cryptanalysis: a Japanese cruiser after Midway
Spectrograms used in solving scrambled speech: above, spectrogram of “We shall win or we shall die”; below, spectrogram of a time-division scramble
Traffic analysts of the U.S. 7th Army work in a van in France in 1944
Old Glory waves triumphantly from U-505, just captured, codebooks and all, by a Navy boarding party, as its captors secure a towline
Combat cryptography: an American soldier, rifle slung on back, enciphers with an M-209 during the Korean War
National Security Agency headquarters
Soviet spies Helen and Peter Kroger hid their one-time pads in this table cigarette lighter in their suburban cottage in 1951
Left, close-up of Kroger one-time pads in scroll form and radio call schedule; above, Soviet spy Rudolf Abel’s wrapped-up one-time pad, which he hid in the hollowed-out wood blocks
Electronic countermeasures: radar scope jammed by noise from three locations and filled with blips produced by false-target generator
Frank Byron Rowlett, Special Assistant to the Director of the National Security Agency, receiving the National Security Medal from President Johnson. Rowlett was cited as a “leading force for more than three decades in the nation’s cryptologic efforts.”
American end of the Moscow-Washington “hot line,” with black one-time tape cipher machines standing between the teleprinters
Above, O.M.I. rotor cipher machine; left, Hagelin hand cipher machine
The original Sherlock Holmes coolly appraises a message in the Dancing Men cipher
Claude E. Shannon, who explained cryptanalysis
Radio scrambler sold by Delcon
E. L . Bentley, compiler of commercial codes
Scrambled television. Above, the clear image; below, the picture encoded by the Zenith Radio Corporation for its subscription-television operation in Hartford, Connecticut. Light tones appear dark, and darks, light, and portions of the picture appear cut in bands and shifted. This is how the picture would appear on a television set not equipped with the subscription-TV decoder.
Francis Bacon, enigmatologists’ victim
Ignatius Donnelly, the first enigmatologist
A page of the still unsolved Voynich manuscript
The 85-foot radio telescope at Green Bank, West Virginia, tilts to listen for messages from other worlds