Graphic Frequency Tables

Frequency of occurrence in 200 letters of text.

French

A161111111111111111
B211
C6111111
D101111111111
E39111111111111111111111111111111111111111
F211
G11
H11
I131111111111111
J11
K
L101111111111
M6111111
N161111111111111111
O1111111111111
P6111111
Q211
R15111111111111111
S131111111111111
T131111111111111
U12111111111111
V41111
W
X11
Y
Z

Italian

A2311111111111111111111111
B11
C9111111111
D6111111
E251111111111111111111111111
F211
G3111
H11
I2311111111111111111111111
L1411111111111111
M6111111
N131111111111111
O191111111111111111111
P6111111
Q
R131111111111111
S101111111111
T12111111111111
U6111111
V41111
X
Y
Z211

German

A101111111111
B41111
C6111111
D101111111111
E3211111111111111111111111111111111
F41111
G811111111
H811111111
I161111111111111111
J
K211
L6111111
M41111
N24111111111111111111111111
O6111111
P211
Q
R1411111111111111
S1111111111111
T12111111111111
U101111111111
V211
W3111
X
Y
Z3111

Portuguese

A281111111111111111111111111111
B11
C71111111
D811111111
E281111111111111111111111111111
F211
G211
H211
I12111111111111
J11
L6111111
M9111111111
N101111111111
O221111111111111111111111
P6111111
Q3111
R131111111111111
S18111111111111111111
T9111111111
U9111111111
V3111
X
Y
Z11


[1] Occurrence rare, usually in proper names. [↑]

Chapter III

Technique of Cipher Examination

In time of active operations it is important that captured or intercepted cipher messages reach the examining office with the least possible delay. The text of messages, captured at a distance from the examining office, should be sent to the office by telegraph or telephone, the original messages being forwarded to the office as soon thereafter as possible.

The preamble, “place from,” date, address and signature, give most important clues as to the language of the cipher, the cipher method probably used, and even the subject matter of the message. If the whole of a telegraphic or radio message is in cipher, it is highly probable that the preamble, “place from,” etc., are in an operators’ cipher and are distinct from the body of the message. As these operators’ ciphers are necessarily simple, an attempt should always be made to discover, by methods of analysis to be set forth later, the exact extent of the operator’s cipher and then to decipher the parts of the messages enciphered with it.

In military messages, we almost invariably find the language of the text to be that of the nation to which the military force belongs. The language of the text of the message of secret agents is, however, another matter and, in dealing with such messages, we should use all available evidence, both external and internal, before deciding finally on the language used. Whenever a frequency table can be prepared, such a table will give the best evidence for this purpose.

All work in enciphering and deciphering messages and in copying ciphers should be done with capital letters. There is much less chance of error when working with capitals and, with little practice, it is just about as fast. An additional safeguard is to use black ink or pencil for the plain text and colored ink or pencil for the cipher. A separate color may be used for the key when necessary.

The following blank form is suggested as convenient for keeping a record of a cipher under examination. It should accompany the cipher through the examining process and should be filled in as the facts are determined. This record, the original cipher and all notes of work done during the examination, should be filed together when the examination is completed, whether the cipher has been solved or not. It may be that other ciphers solved later will give clues to the solution of such unsolved ciphers.

The first column of this blank should be filled out from data furnished by the officer obtaining the cipher from the enemy. A general order, emphasizing the importance of promptly forwarding captured or intercepted ciphers to an examining office, could specify that a brief report embodying this data should be forwarded with each cipher.

The second column of the blank should be filled out progressively as the work proceeds. The office number should be a serial one, the first cipher examined being No. 1. The date and hour of receipt at examining office will be a check as to the time required to transmit it from place of capture. The spaces “From,” “At,” “To,” “At,” “Date,” are for the information concerning sender and addressee of the cipher and are to be obtained from the message. In case an operators’ cipher has been used, these parts of the message will have to be deciphered before the blanks can be filled in.

Intelligence Section, General Staff
1st FieldArmy

----------------------
Place,Date
Record ofCipher Examination

This cipher obtainedby
-----------
-----------
at----------------------
on----------------------
(date)(hour)

How being transmitted when obtained. (Underscore meansused and enter data on sending and receiving stations).

Sending StationReceiving Station
Radio
Telephone
Telegraph
Buzzer
Helio
Lantern
Flag
Cyclistfromto
Foot Messenger
from
,,
to
,,
Mtd. Messenger
from
,,
to
,,

How obtained. (Underscore means used). Captured beforedelivery to addressee. Captured after delivery to addressee.Intercepted, not received by addressee. Copied, but received byaddressee.

Remarks:

Office No. -----------

Received----------------------
(Date)(Hour)
From -----------
At -----------
To -----------
At -----------
Date -----------
Probable language of text -----------

ClassTransposition -----------
-----------
Substitution -----------
-----------
Case -----------
Remarks:

Solution completed-------------------
(date)(hour)
Language of text -----------
Key, (if determined) -----------
-----------
Type -----------FileNo. -----------
-----------
-----------
Examiner.

The probable language of the text is assumed from the preceding data and, if necessary, from internal evidence. Thus a cipher from a Mexican source and not containing K or W is probably in Spanish.

The class and case are determined by the rules laid down later. The space for remarks is to permit notation of any special features. When the solution is completed, the date and hour are noted, the language of text and key (if determined) are entered and a type number, to identify it with other ciphers prepared by the same method (but not necessarily the same key), is given to it. The file number is for convenience in filing and in preparation of a card index.

The process of examination in an office with one examiner, one stenographer and one clerk, might be as follows: On receipt of a captured cipher with accompanying report, the stenographer makes four copies of the cipher on the typewriter. The clerk and stenographer then check the work. The stenographer then proceeds to fill out the first column and first two lines of the second column of the record blank from the report of the capturing officer, keeping the original cipher and two copies with the record. He may also fill out the first seven lines of the second column, if this data is on the captured cipher in plain text. In the meantime the clerk is counting and setting down the whole number of letters of the cipher and the occurrence of AEIOU, LNRST, and JKQXZ, while the examining officer is looking over the cipher for possible recurring groups of letters and underlining them when found.

This work being completed, the examining officer is in a position, ordinarily, to decide on the class of the cipher and he may have found something in his examination which will lead him to the case under the class. The clerk in this preliminary count should keep track of the total occurrence of each of the fifteen check letters and not of the three groups given above. This takes a little longer but when done, the data for fifteen letters of the alphabet for a frequency table is completed, leaving only eleven other letters, and in Spanish, but nine, to be counted, in case it is necessary to prepare a frequency table.

If the examining officer decides the cipher to be of the transposition class, no further work with frequency tables is necessary. The clerk should proceed to count and set down the number of vowels in each line and column and the examining officer should look for any occurrence of the letter Q and try to connect it with U and another vowel. The stenographer may be set to work putting the cipher into rectangles of different dimensions. The clerk’s work gives data for possible rearrangement, for if the vowels are much out of proportion at any point, they must be connected with the proper proportion of consonants as a first step in rearrangement. Work with transposition ciphers must necessarily include much of the fit and try method. The details of this work are taken up later.

If a cipher seems to be a substitution cipher, the examining officer should look over the frequency of occurrence of each of the fifteen letters counted. If some letters (it is of no importance at present which ones) occur much more frequently than others and some occur rarely or not at all, we may safely decide on Case [4], [5] or [6] and let the clerk proceed to finish the frequency table for the message. On the other hand, if all the fifteen letters examined occur with somewhere near the same frequency—for example, the most common letter occurring not over three or four times as often as the least common letter—we may at once eliminate the first three cases and let the clerk proceed to examine the cipher for recurring pairs and groups, counting the intervening letters, so that the examining officer may decide whether [Case 7], or some more complicated case, should be chosen.

If something more complicated than [Case 7] has been used and other ciphers are on hand awaiting examination, the cipher should go into the unsolved file to be worked on when other work permits, unless the contents of the cipher are believed to be very important. Every opportunity should be taken to clean up the unsolved file and, whenever a message is solved, the methods should be tried, if applicable, to everything remaining in the file.

The first few days or weeks after the establishment of an examining office will be the most trying time. When solved ciphers begin to pile up, the methods of the enemy will be more and more apparent and it will often be possible to determine the method from knowledge of the name of the sender and receiver.

When a cipher has been solved, the solution should be prepared in triplicate and given the serial number of the cipher. Any parts which are not clear, through errors in enciphering or in transmission, should be underlined or otherwise made conspicuous, so that the head of the Intelligence Section may note them and, possibly, from other sources, supply the deficiency.

One of the copies of the cipher and report of examination, with a copy of the solution, should be turned over at once to the head of the Intelligence Section or to the Chief of Staff. The other copies of the solution should be filed with the original cipher, the report of examination, and all work done on the cipher.

Periodically, say once a week or even daily at the beginning of active operations, there should be an interchange between all examining offices of solved messages involving new methods used by the enemy. All the examining offices will thus be kept in touch. It may also be possible to assign certain hostile radio stations to each examining office to prevent duplication of work.

Chapter IV

Classes of Ciphers

There are, in general, two classes of ciphers. These are the transposition cipher and the substitution cipher.

Substitution ciphers may be made up of substituted letters, numerals, conventional signs or combinations of all three; and furthermore, for a single letter of the original text there may be substituted a single letter, numeral or sign or two or more of each, or a whole word or group of figures, combination of conventional signs, or combinations of all three of these elements. Thus substitution ciphers may vary from those of extreme simplicity to those whose complication defies any ordinary method of analysis and whose solution requires the possession of long messages and much time and study. Fortunately the more difficult substitution ciphers are rarely used for military purposes, on account of the time and care required for enciphering and deciphering.

Transposition ciphers are limited to the characters of the original text. These characters are rearranged singly, according to some predetermined method or key (monoliteral transposition), or whole words are similarly rearranged (route cipher).

There may also be a combination of transposition and substitution methods in enciphering a message but in this case it will fall into the substitution class on first determination and after solution as a substitution cipher it must be handled as a transposition cipher. Examples of this case will be given.

We may also find transposition or substitution methods applied to words taken from a code book, or to numbers which represent these words. Thus cipher methods blend into code work, for a code is, after all, only a specialized substitution cipher.

We can now lay down the rules for determining whether any given cipher belongs to the substitution class or to the transposition class.

Count the number of letters in the message, the number of vowels, AEIOU, the number of the consonants, LNRST, and the number of the consonants, JKQXZ.

If the text is English and the cipher is a transposition cipher, this proportion will hold; vowels AEIOU constitute 40% of the whole; consonants LNRST, 30% and consonants JKQXZ, 3%.

If the text be Spanish the proportions for a transposition cipher will be: vowels AEIOU 45%, consonants LNRST, 30%; consonants JKQXZ, 2%.

If these proportions do not hold within 5%, one way or the other, the cipher is certainly a substitution cipher. Note, however, that often the end of a message is filled with letters like K, X, Z to complete cipher words and it is best to neglect the last word or words in making a count. Also, if the cipher be a long one, this determination can safely be made by taking 100 or 200 consecutive letters of the message, either from the beginning or, if nulls at the beginning are suspected, from the interior of the message.

The distinction between the route cipher (transposition) and the substitution cipher where whole words are substituted for letters of the original text, must be made on the basis of the words actually used. It is better to consider such a message as a route cipher when the words used appear to have some consecutive meaning bearing on the situation at hand. A substitution cipher of this variety would only be used for transmission of a short message of great importance and secrecy, and then the chances are that certain words corresponding to A, E, N, O and T would appear with such frequency as to point at once to the fact that a substitution cipher was used. Watch the initial or terminal letters in such a cipher; they may spell the message.

In general, the determination of class by proportion of vowels, common consonants and rare consonants may be safely followed. We will now proceed to the examination of the more common varieties of each class of cipher.

Chapter V

Examination of Transposition Ciphers

After having decided that a cipher belongs to the transposition class, it remains to decide on the variety of cipher used. As, by definition, a transposition cipher consists wholly of characters of the original message, rearranged according to some law, we may, in general, say that such a cipher offers fewer difficulties in solution than a substitution cipher. A transposition cipher is like a picture puzzle; the parts are all there and the solution merely involves their correct arrangement.

Case 1.—Geometrical ciphers. This case includes all ciphers in which a certain number of the characters are chosen so that they will form a square or rectangle of predetermined dimensions; and then these characters are arranged according to a geometrical design.

Taking the message:

A B C D E F G H I J K L M N O P Q R S T U V W X

of twenty-four letters and assuming a rectangle of six letters horizontally, and four letters vertically, we may have:

(a) Simple Horizontal:

A B C D E FF E D C B AS T U V W XX W V U T S
G H I J K LL K J I H GM N O P Q RR Q P O N M
M N O P Q RR Q P O N MG H I J K LL K J I H G
S T U V W XX W V U T SA B C D E FF E D C B A

(b) Simple Vertical:

A E I M Q UD H L P T XU Q M I E AX T P L H D
B F J N R VC G K O S WV R N J F BW S O K G C
C G K O S WB F J N R VW S O K G CV R N J F B
D H L P T XA E I M Q UX T P L H DU Q M I E A

(c) Alternate Horizontal:

A B C D E FF E D C B AX W V U T SS T U V W X
L K J I H GG H I J K LM N O P Q RR Q P O N M
M N O P Q RR Q P O N ML K J I H GG H I J K L
X W V U T SS T U V W XA B C D E FF E D C B A

(d) Alternate Vertical:

A H I P Q XD E L M T UX Q P I H AU T M L E D
B G J O R WC F K N S VW R O J G BV S N K F C
C F K N S VB G J O R WV S N K F CW R O J G B
D E L M T UA H I P Q XU T M L E DX Q P I H A

(e) Simple Diagonal:

A B D G K OG K O S V XO K G D B AX V S O K G
C E H L P SD H L P T WS P L H E CW T P L H D
F I M Q T VB E I M Q UV T Q M I FU Q M I E B
J N R U W XA C F J N RX W U R N JR N J F C A
A C F J N RJ N R U W XR N J F C AX W U R N J
B E I M Q UF I M Q T VU Q M I E BV T Q M I F
D H L P T WC E H L P SW T P L H DS P L H E C
G K O S V XA B D G K OX V S O K GO K G D B A

(f) Alternate Diagonal:

A B F G N OG N O U V XO N G F B AX V U O N G
C E H M P UF H M P T WU P M H E CW T P M H F
D I L Q T VB E I L Q SV T Q L I DS Q L I E B
J K R S W XA C D J K RX W S R K JR K J D C A
A C D J K RJ K R S W XR K J D C AX W S R K J
B E I L Q SD I L Q T VS Q L I E BV T Q L I D
F H M P T WC E H M P UW T P M H FU P M H E C
G N O U V XA B F G N OX V U O N GO N G F B A

(g) Spiral, clockwise:

A B C D E FL M N O P AI J K L M ND E F G H I
P Q R S T GK V W X Q BH U V W X OC R S T U J
O X W V U HJ U T S R CG T S R Q PB Q X W V K
N M L K J II H G F E DF E D C B AA P O N M L

(h) Spiral, counter clockwise:

A P O N M LN M L K J II H G F E DF E D C B A
B Q X W V KO X W V U HJ U T S R CG T S R Q P
C R S T U JP Q R S T GK V W X Q BH U V W X O
D E F G H IA B C D E FL M N O P AI J K L M N

It is simply a matter of inspection to read a message in a cipher of this type, once the dimensions of the rectangles have been determined. We place the whole or a portion of the message in such rectangles and read horizontally, vertically and diagonally forward and backward. Parts of words will at once be apparent and the whole message is soon deciphered. Two examples will show the process.

Message

ILVGIOIAEITSRNMANHMNG

This message contains eight vowels or 38% out of twenty-one letters, and the letters LNRST occur 7 times or 33%, the letters XQJKZ not appearing. It is therefore a transposition cipher. Twenty-one letters immediately suggest seven columns of three letters each or three columns of seven letters each. Trying the former we have:

I L V G I O I
A E I T S R N
M A N H M N G

and reading down each column in succession ([Case 1-b]) reveals the message to be “I am leaving this morning.”

Message

M S I B RO R S E EV U E E MC O R E RE L I D ET O E P Q
E N R E RN S E R YE C O L LE R E U SP L U R CE L O A J
A E H U HP F A S ON N O A AE P I U AP P E A CU Q A R U
O P O E II R R M IA F D A AR Q U B OZ A E G ER S F S X

There are 120 letters in this message with 57 vowels or 47% vowels, and the letters LNRST occur 31 times or 26% of the whole.

Non-occurrence of K and W and vowel proportion leads us to the assumption that it is a transposition cipher of a Spanish text. The factors of 120 are 5 × 3 × 2 × 2 × 2. We may then have one rectangle of 4 × 30 or one of 5 × 24 or two of 5 × 12, or three of 5 × 8, or four of 5 × 6, or five of 3 × 8, or ten of 3 × 4, or twenty of 3 × 2. The message being in a rectangle of 4 × 30, we can inspect it as it stands and this is clearly not the arrangement if it be a geometrical transposition cipher at all. It is best however to try the largest possible rectangles first so we will put it in the form 5 × 24, thus:

MSIBRORSEEVUEEMCORERELID
ETOEPQENRERNSERYECOLLERE
USPLURCELOAJAEHUHPFASONN
OAAEPIUAPPEACUQARUOPOEII
RRMIAFDAARQUBOZAEGERSFSX

Here an inspection shows this to be Case [1-f], alternate diagonal, and the text to be “ME SITUO SOBRE PARRAL PORQUE ME PRESENCIA FUE REVELADA POR U”; here the sense breaks but note that U is the twelfth letter of the line and continue as if the rectangle were 5 × 12 and we have “NA PAREJA QU.” Now inspect the second rectangle of 5 × 12 in the same way and the sense continues “E SE ME ACERCO Y HUBO QUE RECHAZAR POR EL FUEGO ALLI ESRERO ORDENES FINISX”.

The practical way of examining a cipher of this type is to have several men prepare rectangles of different dimensions, using the letters of the cipher in the order received. The rectangles can be inspected very rapidly when once prepared. Note that the dimensions of any rectangle will rarely be such as to contain more than fifty letters, on account of the necessity of filling up a rectangle with nulls if the number of letters of the message is just a little greater than a multiple of the rectangle. Also large rectangles give, for all but the diagonal method, whole words in a line or column and these are easily noted.

The following ciphers come under Case 1:

Case 1-i.—The rail fence cipher, useful as an operators’ cipher but permits of no variation and is therefore read almost as easily as straight text when the method is known. The message:

HOSTILE CAVALRY HAS RETIRED

is written:

O T L C V L Y A R T R D
H S I E A A R H S E I E

and is sent:

OTLCV LYART RDHSI EAARH SEIEX

Case 1-j.

Message

S S O H ST P F O RI E E A E
T Q N E TF A I X EG L F D R
A U L R NO S R X LH A T R O

To solve this cipher, read down the columns in this order 8, 1, 15, 2, 14, 3, 13, 4, 12, etc. A variation is to arrange the cipher so the columns are read upwards. Another is to arrange the ciphers so the columns are read alternately upward and downward. The factors of the number of letters in this case give the shape of the rectangle as usual.

It will be seen that there are a great number of possible transposition ciphers that come under Case 1 but practically all of them are useless from a military standpoint because they do not depend on a key which can be readily and frequently changed. However such ciphers constantly crop up in cipher examination, being used for special communication between parties who consider the regular military ciphers too complicated. Thus some of these expedients have been used.

Reversed Writing.—(Special case of Case [1-a]).

LEAVING TONIGHT is enciphered THGINOT GNIVAEL or it may be reversed by words, thus GNIVAEL THGINOT or by groups of five letters, thus IVAEL NOTGN XTHGI.

Vertical Writing.—(Special case of Case [1-b]). Same message is enciphered,

LT
EO
AN
VIand is sent, LTEOA NVIIG NHGTX.
IG
NH
GT

Case 2.—This case includes all transposition ciphers in which lines and columns of the text are rearranged according to some key word or key number. There are many varieties of this case but their solution usually is arrived at through the methods suggested for Case 1, that is, arrangement into appropriate rectangles and examination of lines and columns for words or syllables. Rearrangement of columns or lines follows until the solution is completed.

Case 2-a.

Message

HIIGFTNGHINTCVNIEIOTCYIFYLHAEAESNBAEEEEN
RWGBNYDELROAESGRNEBOVNLDAICAOALCNDTIRGVA
CDOIESERECDVPEIAFIFLRINEHETT

There are 108 letters in this message and examination shows it to be a transposition cipher, English text. The number of letters, 108, immediately suggests a rectangle of 12 × 9 or 9 × 12 letters. Put into this form we have:

Vowels H I I G F T N G H I N T 3 C V N I E I O T C Y I F 5 Y L H A E A E S N B A E 6 E E E N R W G B N Y D E 4 L R O A E S G R N E B O 5 V N L D A I C A O A L C 5 N D T I R G V A C D O I 4 E S E R E C D V P E I A 6 F I F L R I N E H E T T 4 Vowels H I I G F T N G H 2 I N T C V N I E I 4 O T C Y I F Y L H 2 A E A E S N B A E 6 E E E N R W G B N 3 Y D E L R O A E S 4 G R N E B O V N L 2 D A I C A O A L C 5 N D T I R G V A C 2 D O I E S E R E C 5 D V P E I A F I F 4 L R I N E H E T T 3
Vowels
H I I G F T N G H I N T3
C V N I E I O T C Y I F5
Y L H A E A E S N B A E6
E E E N R W G B N Y D E4
L R O A E S G R N E B O5
V N L D A I C A O A L C5
N D T I R G V A C D O I4
E S E R E C D V P E I A6
F I F L R I N E H E T T4
Vowels
H I I G F T N G H2
I N T C V N I E I4
O T C Y I F Y L H2
A E A E S N B A E6
E E E N R W G B N3
Y D E L R O A E S4
G R N E B O V N L2
D A I C A O A L C5
N D T I R G V A C2
D O I E S E R E C5
D V P E I A F I F4
L R I N E H E T T3

The vowel count of the lines shows the first arrangement to be the more likely. We will now number the columns and try pairing off certain ones which in no line would give impossible combinations of letters.

123456789101112
HIIGFTNGHINT
CVNIEIOTCYIF
YLHAEAESNBAE
EEENRWGBNYDE
LROAESGRNEBO
VNLDAICAOALC
NDTIRGVACDOI
ESERECDVPEIA
FIFLRINEHETT

These combinations appear among others:

162452
HTIGFI
CIVIEV
YALAEL
EWENRE
LSRAER
VINDAN
NGDIRD
ECSRES
FIILRI

The word FIGHT stares at us from the first line; let us arrange the columns thus:

524163
FIGHTI
EVICIN
ELAYAH
RENEWE
ERALSO
ANDVIL
RDINGT
ESRECE
RILFIF

We have the words FIGHTI(NG), VICIN(ITY), RENEWE(D), ANDVIL(LA), RDINGT(O), RECE(IVED). With this to go on, we must choose column 11 as the next one and then in order, columns 8, 10, 7, 12, 9. But note that the order 11, 8, 10, 7, 12, 9, is the same as the order 5, 2, 4, 1, 6, 3. The message was written in twelve columns and the columns have been transposed in that order. We may, although it is entirely unnecessary, speculate on the key word used. It was probably

M E X I C O
4 2 6 3 1 5

meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.

Actually, this cipher was solved because the word VILLA was suspected and all the necessary letters were found in line six of the arrangement in twelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.

163118
HTING
CINIT
YAHAS
EWEDB
LSOBR
VILLA
NGTOA
ECEIV
FIFTE

The remainder of the solution followed the lines already laid down and, naturally, offered no difficulties, in view of the large number of connected syllables available.

Case 2-b.

Message

SLCOFWEETNEBRDOORVYMFFEDI
NMTECROIARPERHOESETSRFBHL
TENAHOPTAUSOMTLRTETTASCBH
NIODCRENENAAPRDLACYEECIIE
SGUFN

This is a transposition cipher, English text, and contains 105 letters. The factors of 105 are 5 × 3 × 7 so that we must investigate the following rectangles; 5 × 21, 15 × 7, three of 5 × 7, five of 3 × 7 and seven of 5 × 3.

21 × 5Vowels
SLCOFWEETNEBRDOORVYMF6
FEDINMTECROIARPERHOES9
ETSRFBHLTENAHOPTAUSOM7
TLRTETTASCBHNIODCRENE6
NAAPRDLACYEECIIESGUFN9
Vowels121210140133133311321
The vowel count of the columns of the rectangle 5 × 21 is verysatisfactory. Let us consider it as three blocks of 5 × 7 each,since we must do this ultimately, and make a vowel count of columns forthese blocks.

5 × 21Vowels
SLCOF1
WEETN2
EBRDO2
ORVYM1
FFEDI2
NMTEC1
ROIAR3
PERHO2
ESETS2
RFBHL0
TENAH2
OPTAU3
SOMTL1
RTETT1
ASCBH1
NIODC2
RENEN2
AAPRD2
LACYE2
ECIIE4
SGUFN1
Vowels79876

Column
12345
Vowels, 1st block22322
Vowels, 2d block23222
Vowels, 3d block34322

This is also excellent, so we will try three blocks 5 × 7 and see if rearrangement of horizontal lines will give results reading the columns vertically.

1S L C O FP E R H OA S C B H
2W E E T NE S E T SN I O D C
3E B R D OR F B H LR E N E N
4O R V Y MT E N A HA A P R D
5F F E D IO P T A UL A C Y E
6N M T E CS O M T LE C I I E
7R O I A RR T E T TS G U F N

Among other combinations are:

3E B R D OR F B H LR E N E N
2W E E T NE S E T SN I O D C
1S L C O FP E R H OA S C B H
5F F E D IO P T A UL A C Y E
7R O I A RR T E T TS G U F N

The addition of line 6 above line 3 and line 4 below line 7 will complete this cipher. The successive columns should be read downward.

Case 2-c. In this case, both lines and columns are rearranged by means of a key word or key words. The method of solution is the same as Case 2-a and 2-b except that the lines must be rearranged after the columns have been correctly arranged, or in some cases, vice versa. This cipher is not infrequently met with because it seems to offer safety by use of two key words and by the great but only apparent complexity of the method.

Message

WVGAEEGENLTFTOHTEIEFRBTSE
INENGONWRMGXIXNGOITNROMRO
ESPALHNEACUDNNHDERME

This is a transposition cipher, English text and the number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.

Vowels Vowels
W V G A E E G E N L4W V G A E E G3
T F T O H T E I E F3E N L T F T O2
R B T S E I N E N G3H T E I E F R3
O N W R M G X I X N2B T S E I N E3
G O I T N R O M R O4N G O N W R M1
E S P A L H N E A C4G X I X N G O2
U D N N H D E R M E3I T N R O M R2
O E S P A L H3
N E A C U D N3
N H D E R M E2

The first form looks the more likely from the vowel count. We proceed to number the columns and lines and try rearrangement of columns so as to obtain possible letter combinations from every line.

12345678910
1WVGAEEGENL
2TFTOHTEIEF
3RBTSEINENG
4ONWRMGXIXN
5GOITNROMRO
6ESPALHNEAC
7UDNNHDERME

Among other combinations we have these:

35142810697
1GEWAVELENG
2THTOFIFTEE
3TERSBEGINN
4WMORNINGXX
5INGTOMORRO
6PLEASECHAN
7NHUNDREDME

A very casual inspection of the lines shows that they should be rearranged in order 6, 1, 2, 7, 3, 5, 4, as follows:

35142810697
6PLEASECHAN
1GEWAVELENG
2THTOFIFTEE
7NHUNDREDME
3TERSBEGINN
5INGTOMORRO
4WMORNINGXX

Although of no particular importance, it may be stated that the column key in this case was GRAND and the line key was CENTRAL, both used as in enciphering [Case 2-a].

Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.

“To encipher the message ‘MOVE DAYLIGHT. ENEMY APPROACHING FROM NORTH. PRISONERS SAY STRENGTH ONE HUNDRED THOUSAND. MEET HIM AS PLANNED.’ arrange as follows:

MOVESTRENGTHPLANNEDSAY
DAYLIGHTONEASPRISONERS
ENEMYHUNDREDHIMNORTH
APPROACHINGTHOUSANDMEETFROM

Here the route is down the first column, up the fourth, down the second and up the third.”

This cipher was often complicated by the introduction of nulls for every fifth word. Thus the above message might be sent:

MOVE STRENGTH PLANNED SAY NEVER DAYLIGHT ONE AS PRISONERS LEAVING ENEMY HUNDRED HIM NORTH UNCHANGED APPROACHING THOUSAND MEET FROM COME.

The words in italics are nulls and not a part of the message and the receiver eliminates them before arranging his message in columns to get the sense of it.

As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.

A route cipher using the code words of the War Department code might have some advantages over the method of enciphering code messages as prescribed in that Code.