Of the keys which follow, (a) and (b) were derived from English words, one of which has been used in the present chapter. The remaining four are derived from proper names, respectively (c) German, (d) Italian, (e) Spanish, and (f) French.
|
(a) 1-9-2-4-11-3-7-8-6-10-5. (c) 2-5-11-3-9-13-6-12-8-1-4-7-10. (e) 2-11-3-6-7-9-1-5-8-4-10. |
(b) 2-7-8-3-4-1-6-5-9-10. (d) 9-1-10-6-5-2-8-7-4-3. (f) 5-1-4-6-2-3-9-8-7. |
36. By TITOGI.
(a) U O Y M E E T E N A W H T I M C I C T I J I U S O G N H Y F.
(b) Y T M I L L E M L E W U A A J T W O N F O R T A H L H T G I.
(c) R O P U L E A E E B A H F T K O D T S C I L T T M R Y T I H.
(d) U M H T S E U O K S I H W T R A N C I O W A O H T Y O S S Y.
(e) E C E R L T A D A R M R E A O G P O Y M E E A A T N I B S A.
(f) R E U O T K N A E H E H H L Y W D E L E E E E O M N W S L L.
(g) I H L P U H T T G I Y T T A S N E R T E O R Y T A H N J D S.
(h) E S E F K A C A P E E O L S A M E J N S T E O M S L E O T I.
(i) T E N E W O H S K I I N S G T M O O H T A A T H U E U T O B.
(j) H T P R A H L E R E E R E T A T L E E H S T T T E H B N B S.
37. By EFSEE.
(a) I U E G N M O W H X T A N O I P D I L S F P I A R -
(b) F N E E T X I E T O N O T S M G R T R Y V G P A C -
(c) S F U F N I C E Q E S C U N R I L T M Y I O I P T -
(d) B T E E S N B I H I E T L N X O E S N R E I E G T.
38. By SIR ORM. (This has a keyword!)
T A S H L E C P W E T C I H A O T N R A O O H L W D O Y I L E O H R L
E V A T E A O M N L E V N W I W I E I H S M H E T H N W O I O L S V I
I F S S O W A S O T F I L E H N M G O F I E R A L O C G N N.
39. By DAMONOMAD. (And he calls this a "Nihilist" !)
A H H S E S T I H D I S O M E A T H I O O H D I O U T T I K M I E S O
F G S N E R W U G T S G Y I S L A T I T T A A N H O G E N Y L A W E A
L E R T M I W T O E D.
40. By FRA-GRANT. (A military message sent by General Calamity to Major Catastrophe).
T E H A N E M G S L L I W S N E T T A C K Y E I A A E B P S O U R P E
M O C E E T U N R I S T E R S A F O E T O R T D A E R T E F D I N C A
S E R E T T U O P W A R U R E F F O Y A E E D F O R D R C R.
No. 40 can be decrypted by the multiple-anagramming of its units. Afterward,
if you are unable to reconstruct the system, No. 41 will tell you all.
41. By PICCOLA. (Single block - completed unit - with columns transposed. The
key to this transposition may amuse you, provided you can
reconstruct it in letters!)
A O U U P D M C A N I O G T R S A A Y N K N C A B M N A O A T L E C H
Q S D O R E E W W D N C K E E S T S H N I E T E U H K N I F D I T Y F
U X G I V L T A I P H R C S N R R E H S B M E E A R M T A I U T E W O
P I R S M H O O E V R W F N X S D A H I E T S S U F C N N E E S N F S
E O O L T U A E A O F T V L T E E O E C.
42. By TITOGI and PICCOLA. (General information - nothing more).
(a) I H S E W D O X H D H T S E O E H R N E C T O O A G A R S A
N O E A O S O H U W R T C A U R E N T T O M S O C N Y N P G S H A P P
N F S N E R T E H E P M A W S M E G I A E A P O R Y D T A A S S A F M
I H S R C H E C W N E I T A T R X E I S O A C F A T I C E N I R T E U
Y H T E R T S R S E L S T E G P A H R W. (b) S R H J I A X E C A
N E Y P K A N D A T S D L I L A S L N T G E A D Y E B L Y T S C C I D
T C S G A M C E E N W A T I E A E N H L A B D Y A G H C H E G I H O I
L P O N P A S E D N T T W E S Y E F I M L A R E R H N E D I O T E L R
O S I T D S S R I S N I R R F S S P E C T R E I F B G O M R X S E N A
H A R N L. (c) A E G Y B A T Y N S R I D T O O S D N E Y E E E O
G N I U U T W S N L H E I I S C G H H W D R R U W E A H E T K C T W V
O E H H I.
43. By TITOGI. (Keerful, Si! All is not gold that glitters).
C T I H N A I E S O R M F Y E E C T H U W I S L A E D K R L B E R N M
J I T S D A N D O O H T V A T H T E R Y G A U N O T S A P E M O E S U
R I L T E D I E O N E N R C A F I N P O L H O E A G R B X S.
44. By ALII KIONA. (Nou hooda thawt it uvvim?)
E N W N O T N S E N Y U H O I K H N O E W A O T I U S S A L B W S F R
M I E I D I H R W N T F N D S E E O T U E Y B N O T W E W Z E E D I B
A E R Y I P L R N P Z R S M U T A S O I S U S D T D T R N H N O A S A F E Z.
CHAPTER VIII
Substitution Types
Substitution cipher presupposes the selection of a set of symbols which can represent the letters or words of messages. As to what these symbols may be, there is practically no limit; we meet substitution in our every-day life: the dots and dashes of the Morse alphabet, the pot-hooks of shorthand, the combinations of Braille, and so on; and we hear of its use in the sign-language of Indians and Gipsies, or in the drum-language of the African jungle. These, of course, are not cipher, yet in each case the plain language has been replaced with symbols. Considering the use of symbols for cipher purposes, there are doubtless many among us who played, as children, with the alphabet of the “Masonic” cipher, based upon a design like the one used for ticktacktoe. Lord Bacon’s alphabet has already been mentioned. The use of printers’ symbols, and similar characters, can be seen in the works of Edgar Allan Poe. Charles I of England is said to have used a cipher alphabet in which letters were represented by a series of dots, placed in certain positions with reference to the line of writing. An endless number of queer symbols is met with in fiction, such as the use of the little dancing men by Sir Arthur Conan Doyle. Cipher alphabets of the nature mentioned do not produce ciphers in any way different from those produced by substitution with letters and numbers; as a matter of fact, the decryptor who must deal with a cryptogram made up of arbitrary signs usually begins the work by making a substitution of his own, replacing each unfamiliar symbol with some one letter (or number). We will confine our discussion, then, to those characters which are transmissible by Morse.