Manual for the Solution of Military Ciphers
MANUAL FOR THE SOLUTION OF MILITARY CIPHERS
BY PARKER HITT Captain of Infantry, U. S. A.
PRESS OF THE ARMY SERVICE SCHOOLS Fort Leavenworth, Kansas 1916
MANUAL FOR THE SOLUTION OF MILITARY CIPHERS
BY PARKER HITT Captain of Infantry, United States Army
The history of war teems with occasions where the interception of dispatches and orders written in plain language has resulted in defeat and disaster for the force whose intentions thus became known at once to the enemy. For this reason, prudent generals have used cipher and code messages from time immemorial. The necessity for exact expression of ideas practically excludes the use of codes for military work although it is possible that a special tactical code might be useful for preparation of tactical orders.
It is necessary therefore to fall back on ciphers for general military work if secrecy of communication is to be fairly well assured. It may as well be stated here that no practicable military cipher is mathematically indecipherable if intercepted; the most that can be expected is to delay for a longer or shorter time the deciphering of the message by the interceptor.
The capture of messengers is no longer the only means available to the enemy for gaining information as to the plans of a commander. All radio messages sent out can be copied at hostile stations within radio range. If the enemy can get a fine wire within one hundred feet of a buzzer line or within thirty feet of a telegraph line, the message can be copied by induction. Messages passing over commercial telegraph lines, and even over military lines, can be copied by spies in the offices. On telegraph lines of a permanent nature it is possible to install high speed automatic sending and receiving machines and thus prevent surreptitious copying of messages, but nothing but a secure cipher will serve with other means of communication.
It is not alone the body of the message which should be in cipher. It is equally important that, during transmission, the preamble, place from, date, address and signature be enciphered; but this should be done by the sending operator and these parts must, of course, be deciphered by the receiving operator before delivery. A special operators’ cipher should be used for this purpose but it is difficult to prescribe one that would be simple enough for the average operator, fast and yet reasonably safe. Some form of rotary cipher machine would seem to be best suited for this special purpose.
Parker Hitt
---
Introduction
Data for Solution of Ciphers in English
Data for the Solution of Ciphers in Spanish
Order of Frequency
Graphic Frequency Tables
General Remarks on Transposition Ciphers
General Remarks
Frequency Table
Chapter VII
Frequency Table for the Message
Frequency Tables
Frequency Tables
Special Solution for Case 7
Chapter VIII
Two-character Substitution Ciphers
Combined Transposition and Substitution Methods
Methods of Enciphering Numerals
Telegraph Alphabets
Colophon
Availability
Encoding
Revision History
External References
Corrections