Then A=11 or 41, J=10 or 40 and T=20 or 50 as we found. Using the above alphabet, the message may easily be read. Note that this cipher is made up of ten characters only, the Arabic numerals.

Case 9c—

Message

11562546762542294432194929401514232172112979703115
49242135117424147875764625244451432548453179742533
40554615127573227945162748151170423519441378252149
25147645531548342126721525407516112578454642217415
49521979297015242143292544493319701875314079254829
45514914117321171554

An examination of this message shows it to consist of forty-four different two-figure groups running from 11 to 79. Let us prepare a frequency table of these groups.

Group Frequency
11111111
121
131
141111
15111111111
1611
171
181
191111
20
211111111
221
231
241111
2511111111111
261
271
28
29111111
30
31111
321
3311
341
3511
36
37
38
39
401111
41
42111
4311
441111
4511111
461111
47
481111
49111111
50
5111
521
531
541
551
561
57
58
59
701111
71
7211
7311
74111
751111
76111
77
78111
7911111

We at once note the resemblance between the frequency tables for the groups 11 to 19 and 21 to 29; for the groups 30 to 36 and 50 to 56; and for the groups 40 to 49 and 70 to 79. Also the groups 11 to 19 and 21 to 29 have a frequency fitting well with the normal frequency table of the letters A to I; the groups 41 to 49 and 71 to 79 have a frequency fitting well with the normal frequency table of the letters K to S; and the groups 31 to 36 and 51 to 56 have a frequency fitting well with the normal frequency table of the letters U to Z. We have J and T unaccounted for, but note what occurred in Case 9-b and that 40 and 70 would correspond well with T if they followed respectively 49 and 79. We may now make up a cipher table as follows:

1234567890
1 or 2ABCDEFGHIJ
4 or 7KLMNOPQRST
3 or 5UVWXYZ

and this table will solve the cipher message.

In ciphers coming under case 9-b and 9-c, it is not uncommon to assign some of the unused numbers such as 85, 93, etc., to whole words in common use or to names of persons or places. In case such groups are found, the meaning must be guessed at from the context; but if many messages in the same cipher are available, the meaning of these groups will soon be obtained. The appearance of such odd groups of figures in a message does not interfere materially with the analysis, and it will be apparent at once on deciphering the message that they represent whole words instead of letters.