Acme Commodity and Phrase Code

Last updated
Acme Commodity and Phrase Code
Acme Commodity and Phrase Code book cover.png
AuthorA. C. Meisenbach
CountryUnited States
SubjectCipher and telegraph codes
Publication date
1923
Pages902
OCLC 1050563
LC Class HE7676 .A2

Acme Commodity and Phrase Code is a codebook providing the general-purpose commercial telegraph code known as the Acme Code. It was published in 1923 by the Acme Code Company. The book provides a listing of condensed terms and codes used to shorten telegrams and save money. The book was extremely popular amongst businesses in the 1930s. [1] This code was one of the few telegram codes permitted by the Allied powers during the Second World War. [2]

Contents

Description

The Acme code consists of one hundred thousand five letter codes each intended to stand in for a phrase. It was designed to be tolerant of transposition errors; the author claims that "no transposition of any two adjoining letters will make another word in the book". However, as later discovered by J. Reeds, the code did not provide this level of error correction, containing at least eleven pairs of words differing only by the transposition of two letters. [3] Despite these errors, this code is a precursor to more modern error correction codes. [4]

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">Error detection and correction</span> Techniques that enable reliable delivery of digital data over unreliable communication channels

In information theory and coding theory with applications in computer science and telecommunication, error detection and correction (EDAC) or error control are techniques that enable reliable delivery of digital data over unreliable communication channels. Many communication channels are subject to channel noise, and thus errors may be introduced during transmission from the source to a receiver. Error detection techniques allow detecting such errors, while error correction enables reconstruction of the original data in many cases.

<span class="mw-page-title-main">ISBN</span> Unique numeric book identifier since 1970

The International Standard Book Number (ISBN) is a numeric commercial book identifier that is intended to be unique. Publishers purchase or receive ISBNs from an affiliate of the International ISBN Agency.

<span class="mw-page-title-main">Telegraphy</span> Long distance transmission of text

Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas pigeon post is not. Ancient signalling systems, although sometimes quite extensive and sophisticated as in China, were generally not capable of transmitting arbitrary text messages. Possible messages were fixed and predetermined, so such systems are thus not true telegraphs.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Universal Product Code</span> Barcode symbology used for tracking trade items in stores

The Universal Product Code is a barcode symbology that is widely used worldwide for tracking trade items in stores.

The poem code is a simple, and insecure, cryptographic method which was used during World War II by the British Special Operations Executive (SOE) to communicate with their agents in Nazi-occupied Europe.

<span class="mw-page-title-main">VIC cipher</span> Complex Soviet pencil and paper cipher

The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR".

A check digit is a form of redundancy check used for error detection on identification numbers, such as bank account numbers, which are used in an application where they will at least sometimes be input manually. It is analogous to a binary parity bit used to check for errors in computer-generated data. It consists of one or more digits computed by an algorithm from the other digits in the sequence input.

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

A telegraph code is one of the character encodings used to transmit information by telegraphy. Morse code is the best-known such code. Telegraphy usually refers to the electrical telegraph, but telegraph systems using the optical telegraph were in use before that. A code consists of a number of code points, each corresponding to a letter of the alphabet, a numeral, or some other character. In codes intended for machines rather than humans, code points for control characters, such as carriage return, are required to control the operation of the mechanism. Each code point is made up of a number of elements arranged in a unique way for that character. There are usually two types of element, but more element types were employed in some codes not intended for machines. For instance, American Morse code had about five elements, rather than the two of International Morse Code.

<span class="mw-page-title-main">Code (cryptography)</span> Method used to encrypt a message

In cryptology, a code is a method used to encrypt a message that operates at the level of meaning; that is, words or phrases are converted into something else. A code might transform "change" into "CVGDK" or "cocktail lounge". The U.S. National Security Agency defined a code as "A substitution cryptosystem in which the plaintext elements are primarily words, phrases, or sentences, and the code equivalents typically consist of letters or digits in otherwise meaningless combinations of identical length." A codebook is needed to encrypt, and decrypt the phrases or words.

Quantum error correction (QEC) is used in quantum computing to protect quantum information from errors due to decoherence and other quantum noise. Quantum error correction is theorised as essential to achieve fault tolerant quantum computing that can reduce the effects of noise on stored quantum information, faulty quantum gates, faulty quantum preparation, and faulty measurements. This would allow algorithms of greater circuit depth.

<span class="mw-page-title-main">Typographical error</span> Mistake made in typing printed material

A typographical error, also called a misprint, is a mistake made in the typing of printed or electronic material. Historically, this referred to mistakes in manual typesetting. Technically, the term includes errors due to mechanical failure or slips of the hand or finger, but excludes errors of ignorance, such as spelling errors, or changing and misuse of words such as "than" and "then". Before the arrival of printing, the copyist's mistake or scribal error was the equivalent for manuscripts. Most typos involve simple duplication, omission, transposition, or substitution of a small number of characters.

Spelling suggestion is a feature of many computer software applications used to suggest plausible replacements for words that are likely to have been misspelled.

In information theory and computer science, the Damerau–Levenshtein distance is a string metric for measuring the edit distance between two sequences. Informally, the Damerau–Levenshtein distance between two words is the minimum number of operations required to change one word into the other.

<span class="mw-page-title-main">Telegram style</span> Clipped language for writing telegrams

Telegram style, telegraph style, telegraphic style, or telegraphese is a clipped way of writing which abbreviates words and packs information into the smallest possible number of words or characters. It originated in the telegraph age when telecommunication consisted only of short messages transmitted by hand over the telegraph wire. The telegraph companies charged for their service by the number of words in a message, with a maximum of 15 characters per word for a plain-language telegram, and 10 per word for one written in code. The style developed to minimize costs but still convey the message clearly and unambiguously.

<span class="mw-page-title-main">Commercial code (communications)</span> List of codes and abbreviations used to save on cablegram costs

In telecommunication, a commercial code is a code once used to save on cablegram costs. Telegraph charged per word sent, so companies which sent large volumes of telegrams developed codes to save money on tolls. Elaborate commercial codes which encoded complete phrases into single words were developed and published as codebooks of thousands of phrases and sentences with corresponding codewords. Commercial codes were not generally intended to keep telegrams private, as codes were widely published; they were usually cost-saving measures only.

Australian railway telegraphic codes were devised to reduce the size of telegraphic messages, though some survived into the telephone era. They were used in telegrams between various parts of the railway system, such as offices, stations, locomotive depots and goods yards.

ARQ-M, short for Automatic Repeat reQuest, Multiplex, is a radio telegraphy protocol used to reliably forward telex messages over partially reliable radio links. It is a low-speed system designed to match the performance of landline telex systems and allow those messages to be forwarded over long distances using shortwave radios. The first ARQ-M link was built in the Netherlands, and began exchanging messages with a counterpart in New York in 1947.

References

  1. Newton, David E. (1997). Encyclopedia of Cryptology. Santa Barbara California: Instructional Horizons, Inc. p. 4.
  2. Kahn, David (1996). The Codebreakers. Simon and Schuster. p. 274. ISBN   978-0-684-83130-5.
  3. Bellovin, Steven M. (27 July 2011). "Compression, Correction, Confidentiality, and Comprehension: A Look at Telegraph Codes" (PDF). Retrieved 17 November 2018.
  4. Simmons, G.J. (May 1988). "A survey of information authentication". Proceedings of the IEEE . 76 (5): 603–620. doi:10.1109/5.4445.