J U T H G F F H J T E U O N G
W Z L I Z A G O P I
I L L G Z W C Y P Q N D Z N I
C S W E I L Y S U A
L Y R M E G K B U P U Z C O S
B C P I M S M R D W
Y W O Y R I O S G Z W H F H L
O U M J T D L X M H
Y O U U C J N H S S Z S F O A
Y D M A B V Z Z Q W
O Q K C J N T T R I V O S A W
V C G H X B U F P J
V N Y P F S V H P E T K D P K
P Q K L F F C M M P
V C H N X X X T W L A K X C H
R R B B W C N M H S
Q L T K V T L Y H L O J C M Y
Z R R G Q W G S V C
K D J U Z D S E J P J Z C G C
A S Q E B J W Z W Y
B Z V B N J N U Q Y E C Z N S
B I A S L Y A B V W
G C Q U Q Y K D J X T V I M J
R G F S U X Q N W G
I H M R W J B A W X I M I N L
L G E Q H Q U G B X
The underlying principle cryptographic - revolving, exchangeable alphabet wheels - was invented by Leo Battista Alberti during the fifteenth century. It has been reinvented by different people over the time: Thomas Jefferson, Major Bazeries (~1901), Colonel Parker Hitt (1914), and may be others. The US-Navy used the device as CSP-488. Have a close look at wheel number seventeen, it will reveal the origin of the device!
Please note that this cipher is not secure. Do not use it to protect vital or valuable information!
We assign numbers starting with one at the first letter of the alphabet
found in the key phrase - in this case an A:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
We continue with the second letter of the alphabet present in the key
phrase - since there are no B's in our example, this it the letter
C:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This procedure is repeated until we've got all 25 numbers:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
We find the order in which the alphabet discs must be put on the shaft as: 3, 10, 12, ... 19.
Now the alphabet disks are rotated so that the first 25 letters of the message to be enciphered are found in a row. Then the discs are fixed so that unintended rotations are avoided.
Finally, a line is chosen at random. It's letters form the enciphered text. It is not needed to remember the position of the chosen line relative to the plain text.
The rest of the message is processed the same way.
For example, you may try to decipher the following message using the key as given above:
XQLDI INKUG WORDJ ZMMVG LBLVZ
NONSI YQGVU XDONZ CJMWF BSKEV
AMYBS MXXXX
For off-line use, you may download WheelCipher.zip. You need a system capable of using long filenames, e.g. more than 8+3 characters.
I DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL I BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Military Cryptanalytics, Part II, Volume 1 by Lambros D. Callimahos and William F. Friedman, Aegean Park Press (C-44), 1985.
The Codebreakers, David Khan, Scribner, 1967, 1996.
Decrypted Secrets : Methods and Maxims of Cryptology by Friedrich L. Bauer, Springer Verlag
National Maritime Museum Association: http://www.maritime.org/csp488.htm (includes pictures of the device)
Khan's book is the book on the history of cryptography. Bauer's book is pretty good as well: It's much shorter, but more mathemathical and technical. Nevertheless it should be readable to almost everyone. I strongly recommend both! (Provided that you're interested in crypto, offcourse!)
If you are interested in classical cryptography, you might want to have a look my CipherClerk's Applet at members.magnet.at/wilhelm.m.plotz. This applet / application implements some historic cipher schemes and cipher machines.