Book Read Free

THE CODEBREAKERS

Page 172

by DAVID KAHN

distinguished from substitution, 139

  first, 89

  general solution of, 226

  solution of formula, 302-03

  Tratado de Criptografia, 251

  Traveling wave tube, 722

  Treasure, hidden, 771-72

  Trench codes, 314-16, 324

  Trepper, L., 657-58

  Trifid cipher, 243

  Trigraphic substitution, 404

  Trithemius, J., 130-37, 413, 860

  Troy, 917-18, 936

  Truesdell, K., 321

  TSU. See J series

  Tsukikawa, S., 42

  TU-16 Badgers, 720

  Tupelov TU-95, 970

  Türkheim, L. G. di, 404

  Turing, A., 975-76

  Turning grilles, 308-09

  Tut Latin, 822

  Two-letter differential, 840-41, 847

  Typewriter keyboards, 740-41

  TYPEX, 510

  Tyro, T, 89

  Tyronian notes, 89

  U-2 aircraft, 693, 720

  U-110, 977

  U-158, 504

  U-505, 506

  U-boats, 273, 466, 504-07

  UBCHI, 301, 304

  Ugaritic literature, 900

  ULTRA, 601

  Ultra Secret, The, 979

  Unbreakable cipher, 398-400

  Unicity distance, 750

  Unicity point, 750

  United States

  Air Force Security Service, 680-81

  Army, 1, 12, 398, 427, 574-75, 577

  Central Bureau, 577, 578

  Central Intelligence Agency, 681, 684

  colonial cryptology, 174-86

  Data Encryption Standard, 979-81, 983

  National Defense Research Committee, 558-60

  Navy, 5, 12, 252, 386-88, 408, 415-19 passim, 503-04, 680, 969, 971

  Philippines, Navy cryptanalytic unit, 10, 25, 47, 563, 564

  poor pre-World War II cryptography, 488-89

  2nd Signal Service Battalion, 576-77

  Signal Companies (Radio Intelligence), 507, 578-79

  Signal school, 321, 324, 325

  Signal Security Service, 575, 611, 678

  solution of American messages, 187, 460, 496-98, 556-57, 671

  State Department, 488-501

  superiority of current American cryp-tology, 730

  takes world lead, 385 see also Army Security Agency; black chambers, American; censorship; Code Compilation Section; Combat Intelligence Unit; Federal Bureau of Investigation; Friedman; FRUPAC; G.2 A.6; Hitt; M-94; M-134; M-138; M-209; National Security Agency; Office of Strategic Services; OP-20-G; Radio Intelligence Division; Rochefort; Safford; SIGABA; Signal Intelligence Service; Signal Security Agency; SIGTOT; Stager; War Department Telegraph Code; word transposition

  Univacs, 726

  Universal Pocket Code, 490

  Universal Trade Code, 359, 846

  Universal Turing machine, 976

  Uruk, 76

  Valerianus, P., 903

  Valério, L. P. E., 240, 242

  Vanek, V., 540

  Variant Beaufort, 203, 242

  Vassilyev, A. T., 619

  Vatican. See papal cryptology

  Vātsyāyana, 74

  Venice, 109-10, 114, 858

  Ventris, M. G. F., 922-37 passim

  Verkuyl, J. A., 691

  Vernam, G. S., 394, 403, 612 system, 395-403, 492, 501, 612, 825, 830, 984

  Verne, J., 793-94

  Vetterlein, Engineer, 555

  Viaris, Marquis G. H. L. de, 240-42, 249, 839

  Vichy France, 478, 487

  Video scramblers, 708

  Viète, F., 116-17

  Vigenère, B. de, 145-48

  tableau and cipher, 148, 149, 194, 202-03, 217, 220, 238, 242, 317, 621

  Villena, G. L., 859

  Villon, F., 823

  Vinay, E., 240, 397

  Virolleaud, C., 898-99

  Voge, R. G., 594

  Voice Security Branch, 712

  Volapük, 231-32

  Voltaire, 174

  Volunteer Evaluation Office, 454

  Voris, A. C., 321

  Voyatzis, J. D., 817

  Voynich, E., 871

  Voynich manuscript, 863-72, 873, 953

  Voynich, W., 866, 871

  Vries, M. de, 737, 753

  Wace, A. J. B., 921

  Wadsworth, D., 195-96

  Wallis, J., 166-69

  Walsingham, Sir Francis, 119

  Wanderer Werke, 459

  War Department Telegraph Code, 321, 326

  Warfare, modern, development of, 190

  Weather-forecast codes, Japanese, 45, 579

  Webster, T. B. L., 936

  Wehrmachtnachrichtenverbindungen, 455

  Welker, G. W., 11

  Wendland, V., 458

  Wenger, J. N., 704, 845

  Wenwood, G., 174

  Wenzel, J., 658

  Wesemann, 466

  West, S. 175

  Western Union Code, 847

  Western Union Telegraph Company, 214, 840

  Westrex Company, 827

  Wheatstone, C., 196-98, 404, 776, 860

  Wheatstone cryptograph, 197, 372, 376

  White House Communications Agency, 716

  Whitelaw’s Telegraph Cyphers, 843

  Whitney, Eli, 195

  Wigg, G., 729

  Wilkins, J., 155, 870

  Wilkinson, J., 186

  Willes, E., and family, 170-71, 174, 187, 188, 704

  Willoughby, C. A., 674

  Wills, J., 838

  Willson, R., 387, 418

  Wilwerth, T. C., 845

  WINDOW, 721

  Winds code, 32, 38, 4-46, 66-67

  Winterbotham, F. W., 979

  Wirephoto, 830

  Wiretapping, 314, 448, 549, 717

  Witzke, L., 354

  “Wizard War,” 721

  W.N.V. See Wehrmachtnachrichten-verbindungen

  Woellner, Lieutenant, 335

  Woermann, E., 445

  Woodcock, A. W. W., 810, 813

  Woodhull, S., 177

  Woodward, F. C., 48, 562

  Word transpositions, 214-15, 220, 224-72

  World War I, 266-350

  cryptologic preparations for, 262-65

  cryptological evolution in, 298-99, 348-50

  effect of cryptology on, 612

  World War II, 435-613

  cryptological evolution in, 611-13

  effect of cryptology on, 612

  World Wide Web, 983

  Wren, Sir Christopher, 773

  Wright, E. V., 740

  Wright, W. A., 48, 562, 564, 570, 595

  “Wurlitzer Organ,” 525

  Xenophon, 82

  Yamamoto, I., 6, 562, 568, 572

  assassination, 595-601

  Yamanashi, 583

  Yamato, 594

  Yardley, H. O.

  American Black Chamber, The, 360-64, 367-68, 984

  characteristics, 351, 369

  chief of American Black Chamber, 5, 355-60

  chief OF MI-8, 324, 352-55

  contribution to cryptology, 369

  criticizes American cryptography, 363, 403, 492

  early life, 351

  fiction and films, 368

  in China, 368-69, 579

  interest in cryptology, 351-52

  “Japanese Diplomatic Secrets,” 364

  later life, 369

  law aimed at, 364-67, 687

  reaction to The American Black Chamber, 31, 361-64

  solves Japanese codes, 356-59

  Universal Trade Code, 359, 846

  Voynich manuscript, 867

  Yardley symptom, 352

  Yezidis, 84

  Yin-chên, 74

  Yin-t’ang, 74

  Yoshikawa, T., 13, 42, 47, 52

  Young, T., 906-07

  YU, 358

  Yugoslavia, 460, 470

  Zacharias, E. M., 5, 387

  Zapp, Prof., 525-26

&nb
sp; Zavarzine, P., 618-19

  Zenith Radio Corporation, 833

  Zievert, K., 618

  Zimmermann telegram, 282-97, 388, 483, 485, 699

  Zipf, G. K., 746

  Zoëga, G., 905

  Zybine, 618-19

  Zygalski, H., 973

  Rembrandt depicts the most famous cryptogram in the world—the handwriting on the wall—in his “Belshazzar’s Feast.” A celestial hand emerges from smoke to inscribe Mene mene tekel upharsin vertically in glowing Hebrew letters upon the palace wall as a startled Belshazzar turns and stares.

  The father of Western cryptology, Leo Battista Alberti

  Giovanni Battista Porta, the Italian scientist, in 1589

  Girolamo Cardano, the Italian writer, aged 49

  Blaise de Vigenère, in the last year of his life

  Abbot Johannes Trithemius, author of the first printed book on cryptology

  François Viète, French cryptanalyst

  Philippe van Marnix, solver of Spanish ciphers

  Antoine Rossignol, the father of French cryptology

  Bishop Edward Willes, head of England’s decyphering branch

  John Wallis, the father of English cryptology

  Elbridge Gerry, who solved a Tory spy cryptogram

  Above, Thomas Jefferson, the father of American cryptography; left, cryptographer assembles Cipher Device M-94, U.S. Army version of Jefferson’s cypher

  Three Victorian amateur cryptologists: from left, Sir Charles Wheatstone, inventor of two important cipher systems; Lyon Play fair, First Baron Playfair, who gave his name to one of Wheatstone’s ciphers; and Charles Babbage, who solved many difficult ciphers

  Left, Confederate brass cipher disk; right, Edward S. Holden, one of the cryptanalysts of the electoral scandal telegrams of 1876

  Above, Etienne Bazeries, the great French cryptanalyst, in the 1920s; left, Auguste Kerckhoffs, apostle of modern cryptography

  Three World War I British cryptologists: from left, Nigel de Grey, a solver of the Zimmermann telegram; Malcolm Hay of Seaton, head of the War Office cryptanalytic bureau; O. T. Hitchings, worth “four divisions” to the B.E.F.

  Luigi Sacco, Italian cryptologist, in 1942

  Colonel Parker Hitt, mentor of America’s World War 1 cryptology, in France in 1918

  Lieutenant Georges Painvin, who was to become the greatest cryptanalyst of World War I, engages in his first attempts at solution in a room at the Chateau de Montgobert, November, 1914

  William Frederick Friedman, about 1930

  J. Rives Childs and Herbert O. Yardley on duty in the Hotel Crillon at the Paris Peace Conference, 1919

  Herbert O. Yardley, head of the American Black Chamber, in 1931

  William Powell, at left, plays a codebreaker in the movie Rendezvous, based on one of Herbert O. Yardley’s books

  The second generation of American cryptologists: from left, Abraham Sinkhov, Frank B. Rowlett, Solomon Kullback, all in 1941 or 1942

  William F. and Elizebeth S. Friedman in 1958, with part of their collection of cipher machines

  Left, Gilbert S. Vernam, who invented the first on-line cipher machine, about 1914; right, Major Joseph O. Mauborgne, who welded several pre-existing elements into the unbreakable cipher, in World War I.

  Edward H. Hebern, inventor of the rotor

  Early Hebern Electric Code Typewriter, using only one rotor

  Left, inventor Boris Hagelin examines the cipher machine that made him rich; upper right, Lester S. Hill, inventor of algebraic cryptography; lower right, Arvid G. Damm, unsuccessful cipher machine inventor

  Left, cryptographic rotor from one of Hebern’s machines showing wiring; right, Hagelin’s M-209, used by U.S. Army in World War II, showing mechanism

  Left, Adolf Paschke, and, center, Werner Kunze, head cryptanalysts of Pers z of the German Foreign Office; right, Yves Gyldén, mentor of Swedish cryptology, all in 1962

  Left, Captain Alwin D. Kramer, who delivered MAGIC intercepts before Pearl Harbor; center, Captain Laurance F. Safford, founder of U.S. Navy cryptologic organization; right, Captain Joseph J. Rochefort, head of the Navy cryptanalytic unit that read pre-Midway messages, all in 1946

  Left, Captain Thomas H. Dyer, chief cryptanalyst of Rochefort’s unit, about 1946; center, Colonel Harold R. Shaw, head of Technical Operations Division, Office of Censorship, about 1944; right, Walter Koenig, Jr., Bell Telephone Laboratories expert in breaking scramblers in 1964

  The fruits of cryptanalysis: a Japanese cruiser after Midway

  Spectrograms used in solving scrambled speech: above, spectrogram of “We shall win or we shall die”; below, spectrogram of a time-division scramble

  Traffic analysts of the U.S. 7th Army work in a van in France in 1944

  Old Glory waves triumphantly from U-505, just captured, codebooks and all, by a Navy boarding party, as its captors secure a towline

  Combat cryptography: an American soldier, rifle slung on back, enciphers with an M-209 during the Korean War

  National Security Agency headquarters

  Soviet spies Helen and Peter Kroger hid their one-time pads in this table cigarette lighter in their suburban cottage in 1951

  Left, close-up of Kroger one-time pads in scroll form and radio call schedule; above, Soviet spy Rudolf Abel’s wrapped-up one-time pad, which he hid in the hollowed-out wood blocks

  Electronic countermeasures: radar scope jammed by noise from three locations and filled with blips produced by false-target generator

  Frank Byron Rowlett, Special Assistant to the Director of the National Security Agency, receiving the National Security Medal from President Johnson. Rowlett was cited as a “leading force for more than three decades in the nation’s cryptologic efforts.”

  American end of the Moscow-Washington “hot line,” with black one-time tape cipher machines standing between the teleprinters

  Above, O.M.I. rotor cipher machine; left, Hagelin hand cipher machine

  The original Sherlock Holmes coolly appraises a message in the Dancing Men cipher

  Claude E. Shannon, who explained cryptanalysis

  Radio scrambler sold by Delcon

  E. L . Bentley, compiler of commercial codes

  Scrambled television. Above, the clear image; below, the picture encoded by the Zenith Radio Corporation for its subscription-television operation in Hartford, Connecticut. Light tones appear dark, and darks, light, and portions of the picture appear cut in bands and shifted. This is how the picture would appear on a television set not equipped with the subscription-TV decoder.

  Francis Bacon, enigmatologists’ victim

  Ignatius Donnelly, the first enigmatologist

  A page of the still unsolved Voynich manuscript

  The 85-foot radio telescope at Green Bank, West Virginia, tilts to listen for messages from other worlds

 

 

 


‹ Prev