Great Cipher

Last updated

The Great Cipher (French: Grand chiffre) was a nomenclator cipher developed by the Rossignols, several generations of whom served the French monarchs as cryptographers. The Great Cipher was so named because of its excellence and because it was reputed to be unbreakable.

Contents

Modified forms were in use by the French Peninsular army until the summer of 1811. [1] After it fell out of current use, many documents in the French archives were unreadable until it was decoded.

Historical background

Antoine Rossignol's cryptographic skills became known in 1626, when an encrypted letter was taken from a messenger leaving the city of Réalmont, controlled by the Huguenots and surrounded by the French army. The letter stated that the Huguenots would not be able to hold on to the city for much longer, and by the end of the day, Rossignol had successfully deciphered it. The French returned the letter with the deciphered message and forced the Huguenots to surrender. He and his son, Bonaventure Rossignol, were soon appointed to prominent roles in the court.

Together, the two devised a cipher so strong that it baffled cryptanalysts for centuries. Commandant Étienne Bazeries managed to break the cipher around 1893 over a period of three years by realising that each number stood for a French syllable, rather than single letters, unlike traditional ciphers. He guessed that a particular sequence of repeated numbers, 124-22-125-46-345, stood for les ennemis ("the enemies") and from that information was able to unravel the entire cipher.

The Man in the Iron Mask

In one of the encrypted letters between Louis XIV and his marshal Nicolas de Catinat appeared a possible solution to the mystery of the Man in the Iron Mask. [2] The letter concerned a general named Vivien de Bulonde who was to attack the Italian town of Cuneo but instead fled, fearing the arrival of the Austrians, and consequently put in serious danger the success of the entire French campaign in Piedmont. The letter said:

His Majesty knows better than any other person the consequences of this act, and he is also aware of how deeply our failure to take the place will prejudice our cause, a failure which must be repaired during the winter. His Majesty desires that you immediately arrest General Bulonde and cause him to be conducted to the fortress of Pignerole, where he will be locked in a cell under guard at night, and permitted to walk the battlement during the day with a 330 309.

The "330" and "309" codegroups appeared only once in the correspondence, so it is impossible to confirm what they stand for. Bazeries verified General Bulonde was disgraced and removed from command, so he reasoned 330 and 309 stood for masque and a full stop. [3] However, none of the cipher variants used in the Iron Mask period included masque, an unlikely word to include in the cipher's small repertory. [4]

Technical nature

One of many nomenclators used to encode the Great Cipher. Great Cipher.png
One of many nomenclators used to encode the Great Cipher.

The basis of the code cracked by Bazeries was a set of 587 numbers that stood for syllables. [5] There were other variations, and Louis XIV's overseas ministers were sent different code sheets that encrypted not only syllables but also letters and words. [6] [7] To counter frequency analysis, some number sets were "nulls", meant to be ignored by the intended recipient. Others were traps, including a codegroup that meant to ignore the previous codegroup. [8]

As a nomenclator cipher, the Great Cipher replaced the names of key generals such as Auguste de Marmont, references to les ennemis and other sensitive terms with homophonic substitutions. [9] Code sheets included alternative digits to modify the gender or letter case [10] and so the rules of French composition held true to encryptions as well. Since e is the most commonly used letter in French, the Cipher typically allocated the most code numbers to writing that vowel. In one nomenclature, 131 out of the 711 code numbers stood for e. [11]

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Caesar cipher</span> Simple and widely known encryption technique

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">Tabula recta</span> Fundamental tool in cryptography

In cryptography, the tabula recta is a square table of alphabets, each row of which is made by shifting the previous one to the left. The term was invented by the German author and monk Johannes Trithemius in 1508, and used in his Trithemius cipher.

<span class="mw-page-title-main">Étienne Bazeries</span>

Étienne Bazeries was a French military cryptanalyst active between 1890 and the First World War. He is best known for developing the "Bazeries Cylinder", an improved version of Thomas Jefferson's cipher cylinder. It was later refined into the US Army M-94 cipher device. Historian David Kahn describes him as "the great pragmatist of cryptology. His theoretical contributions are negligible, but he was one of the greatest natural cryptanalysts the science has seen."

<span class="mw-page-title-main">Books on cryptography</span>

Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages — see Kerckhoffs' principle.

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

<span class="mw-page-title-main">Codebook</span> Book for ciphers

A codebook is a type of document used for gathering and storing cryptography codes. Originally codebooks were often literally books, but today codebook is a byword for the complete record of a series of codes, regardless of physical format.

<span class="mw-page-title-main">Code (cryptography)</span> Method used to encrypt a message

In cryptology, a code is a method used to encrypt a message that operates at the level of meaning; that is, words or phrases are converted into something else. A code might transform "change" into "CVGDK" or "cocktail lounge". The U.S. National Security Agency defined a code as "A substitution cryptosystem in which the plaintext elements are primarily words, phrases, or sentences, and the code equivalents typically consist of letters or digits in otherwise meaningless combinations of identical length." A codebook is needed to encrypt, and decrypt the phrases or words.

<span class="mw-page-title-main">Jefferson disk</span> Cipher system invented by Thomas Jefferson

The Jefferson disk, also called the Bazeries cylinder or wheel cypher as named by Thomas Jefferson, is a cipher system using a set of wheels or disks, each with the 26 letters of the alphabet arranged around their edge. The order of the letters is different for each disk and is usually ordered randomly. Each disk is marked with a unique number and a hole in the center of the disks allows them to be stacked on an axle. The disks are removable and can be mounted on the axle in any order desired. The order of the disks is the cipher key, and both sender and receiver must arrange the disks in the same predefined order. Jefferson's device had 36 disks.

<span class="mw-page-title-main">Pigpen cipher</span> Type of substitution cipher

The pigpen cipher is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

The Rossignols, a family of French cryptographers and cryptanalysts, included Antoine Rossignol (1600–1682), Bonaventure Rossignol and Antoine-Bonaventure Rossignol. The family name means "nightingale" in French. As early as 1406, the word rossignol has served as the French term for "skeleton key" or for any tool which opens that which is locked.

In the history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet. The earliest known description is due to the polymath Girolamo Cardano in 1550. His proposal was for a rectangular stencil allowing single letters, syllables, or words to be written, then later read, through its various apertures. The written fragments of the plaintext could be further disguised by filling the gaps between the fragments with anodyne words or letters. This variant is also an example of steganography, as are many of the grille ciphers.

With the rise of easily-intercepted wireless telegraphy, codes and ciphers were used extensively in World War I. The decoding by British Naval intelligence of the Zimmermann telegram helped bring the United States into the war.

Giovanni Soro was an Italian professional code-cracker. He was the Renaissance's first outstanding cryptanalyst and the Western world's first great cryptanalyst. Soro is known as the father of modern cryptography.

The cipher system that the Uesugi are said to have used is a simple substitution usually known as a Polybius square or "checkerboard." The i-ro-ha alphabet contains forty-eight letters, so a seven-by-seven square is used, with one of the cells left blank. The rows and columns are labeled with a number or a letter. In the table below, the numbers start in the top left, as does the i-ro-ha alphabet. In practice these could start in any corner.

ʻAfīf al-Dīn ʻAlī ibn ʻAdlān al-Mawsilī, born in Mosul, was an Arab cryptologist, linguist and poet who is known for his early contributions to cryptanalysis, to which he dedicated at least two books. He was also involved in literature and poetry, and taught on the Arabic language at the Al-Salihiyya Mosque of Cairo.

References

  1. Urban 2004, p. 104
  2. Kahn, 2005, p. 45
  3. Kahn 2005, p. 45
  4. Kahn 2005, p. 46
  5. Singh
  6. Urban 2004, p. 104
  7. Urban, Mark (2001-08-25). "Wellington's lucky break | Education". The Guardian. London. Retrieved 2009-10-10.
  8. "[2.0] Refining The Art". Vectorsite.net. Retrieved 2009-10-10.
  9. Kahn 2005, p. 47
  10. Urban 2003, p. 111
  11. Urban 2004, p. 117

Sources