Share to: share facebook share twitter share wa share telegram print page

Book cipher

The King James Bible, a highly available publication suitable for the book cipher.

A book cipher is a cipher in which each word or letter in the plaintext of a message is replaced by some code that locates it in another text, the key.

A simple version of such a cipher would use a specific book as the key, and would replace each word of the plaintext by a number that gives the position where that word occurs in that book. For example, if the chosen key is H. G. Wells's novel The War of the Worlds, the plaintext "all plans failed, coming back tomorrow" could be encoded as "335 219 881, 5600 853 9315" — since the 335th word of the novel is "all", the 219th is "plans", etc. This method requires that the sender and receiver use the exact same edition of the key book.[1]

This simple version fails if the message uses a word that does not appear in the text. A variant that avoids this problem works with individual letters rather than words. Namely each letter of the plaintext message would be replaced by a number that specifies where that letter occurs in the key book. For example, using the same War of the Worlds book as the key, the message "no ammo" could be encoded as "12 10 / 50 31 59 34" since the words with those positions in the novel are "nineteenth", "of", "almost", "mortal", "might", and "own". This method was used in the second Beale cipher. This variant is more properly called a substitution cipher, specifically a homophonic one.

Both methods, as described, are quite laborious. Therefore, in practice, the key has usually been a codebook created for the purpose: a simple dictionary-like listing of all the words that might be needed to form a message, each with the respective code number(s). This version is called a code, and was extensively used from the 15th century up to World War II.

Choosing the key

The main strength of a book cipher is the key. The sender and receiver of encoded messages can agree to use any book or other publication available to both of them as the key to their cipher. Someone intercepting the message and attempting to decode it, unless they are a skilled cryptographer (see Security below), must somehow identify the key from a huge number of possibilities available. In the context of espionage, a book cipher has a considerable advantage for a spy in enemy territory. A conventional codebook, if discovered by the local authorities, instantly incriminates the holder as a spy and gives the authorities the chance of deciphering the code and sending false messages impersonating the agent. On the other hand, a book, if chosen carefully to fit with the spy's cover story, would seem entirely innocuous. The drawback to a book cipher is that both parties have to possess an identical copy of the key. The book must not be of the sort that would look out of place in the possession of those using it, and it must be of a type likely to contain any words required. Thus, a spy wishing to send information about troop movements and numbers of armaments would be unlikely to find a cookbook or romance novel useful keys.

Using widely available publications

Dictionary

Another approach is to use a dictionary as the codebook. This guarantees that nearly all words will be found, and also makes it much easier to find a word when encoding. This approach was used by George Scovell for the Duke of Wellington's army in some campaigns of the Peninsular War. In Scovell's method, a codeword would consist of a number (indicating the page of the dictionary), a letter (indicating the column on the page), and finally a number indicating which entry of the column was meant. However, this approach also has a disadvantage: because entries are arranged in alphabetical order, so are the code numbers. This can give strong hints to the cryptanalyst unless the message is superenciphered. The wide distribution and availability of dictionaries also present a problem; it is likely that anyone trying to break such a code is also in possession of the dictionary which can be used to read the message.

Bible cipher

The Bible is a widely available book that is almost always printed with chapter and verse markings making it easy to find a specific string of text within it, making it particularly useful for this purpose; the widespread availability of concordances can ease the encoding process as well.

Security

Essentially, the code version of a "book cipher" is just like any other code, but one in which the trouble of preparing and distributing the codebook has been eliminated by using an existing text. However this means, as well as being attacked by all the usual means employed against other codes or ciphers, partial solutions may help the cryptanalyst to guess other codewords, or even to break the code completely by identifying the key text. This is, however, not the only way a book cipher may be broken. It is still susceptible to other methods of cryptanalysis, and as such is quite easily broken, even without sophisticated means, without the cryptanalyst having any idea to what book the cipher is keyed.[2][page needed]

Examples

In fiction

  • In Colony, a television series, the resistance movement uses a book cipher to communicate between members of the cells.
  • In the novel Monsieur Lecoq, published in 1868, Monsieur Lecoq finds that a prisoner is communicating with his confederate using a double book cipher.[clarification needed] Since the prisoner has only one book, The songs of Béranger, the solution is easily discovered.
  • In The Valley of Fear, Sherlock Holmes decrypts a message enciphered with a book cipher by deducing which book had been used as a key text.
  • The name of Ken Follett's World War II thriller The Key to Rebecca refers to a German spy in Cairo using Daphne du Maurier's novel Rebecca as the basis of a code.
  • In A Presumption of Death, Lord Peter Wimsey, on assignment for British Intelligence in World War II Nazi-occupied Europe, uses a code based on the works of John Donne. The Germans break the code, coming near to catching Wimsey and Bunter. Wimsey then improvises a new code, based on an unpublished text known only to himself and his wife.
  • Graham Greene's protagonists often use book codes. In The Human Factor, several books are used, and an edition of Charles Lamb's Tales from Shakespeare is used in Our Man in Havana.
  • A book cipher plays an important role in the TV version of Sharpe's Sword. The key text is Voltaire's Candide.
  • In the 2004 film National Treasure, a book cipher (called an "Ottendorf cipher") is discovered on the back of the U.S. Declaration of Independence, using the "Silence Dogood" letters as the key text.
  • The protagonists of the Matthew Reilly novel The Six Sacred Stones used a book cipher to send confidential messages to each other. The key text was the Harry Potter books, but the messages were sent via a The Lord of the Rings forum to make the key text harder to identify.
  • In Lost: Mystery of the Island, a series of four jigsaw puzzles released in 2007, a book cipher was used on each puzzle's box to hide spoilers and reveal information about the show to the fans.
  • "The Fisher King", a two-part episode of Criminal Minds, features a book cipher brought to the Behavioral Analysis Unit by the UNSUB via Agent Hotchner's wife. The cypher was part of a larger puzzle to find a girl who had been missing for two years. The key text was The Collector by John Fowles.
  • Burn Notice (episodes "Where There's Smoke" and "Center of the Storm", 2010): Michael Westen steals a Bible from a safe deposit box that is the code book of Simon. This becomes part of the season plot to track an organization starting wars for profit as Michael tries to arrange an interview with Simon.
  • In the episode "The Blind Banker" of the BBC series Sherlock, Sherlock Holmes searches for a book that is the key to a cipher being used by Chinese Tong smugglers to communicate with their agents and with each other through graffiti messages. He eventually finds it: the London A-Z.
  • In the film Unknown (2011), Prof. Bressler's passwords are obscured by a book cipher.
  • In The Unit episode "Paradise Lost", Jonas Blane (a.k.a. Snake Doctor) uses a book code from the poem Paradise Lost to communicate to his wife, Molly, that he has arrived safely in Panama.
  • In The Good Soldier Švejk by Jaroslav Hašek, the officers in Švejk's battalion attempt to use a book cipher. Their attempts are undone, however, when it is revealed that the novel in question is composed of two volumes, and Švejk has delivered the first volume to the officers, thinking that they intended to read the novel, rather than the second, which is used for the cipher. Furthermore, the key to the cipher is identical to an example given in a published military textbook.
  • In An Instance of the Fingerpost, a historical mystery by Iain Pears, a book cipher conceals one character's family history and its relationship with the English Civil War.
  • In John Le Carre's A Perfect Spy, the protagonist Magnus Pym uses a book cipher based on the German text Simplicissimus.
  • In the book Red Dragon, Hannibal Lecter uses a book code to encrypt a message to the Tooth Fairy killer, with the message containing the home address of Will Graham, who is investigating the case, and the message, "Save yourself. Kill them all", with the intent of having Will and his family fall victim to the killer. In the 1986 film adaptation Manhunter, the book used is mentioned to be a list of statues in the state of Maryland. In the 2002 adaptation Red Dragon, the book is changed to the French cooking encyclopedia Larousse Gastronomique to fit in with that movie's depiction of Lecter.
  • In The Darwin Code by J D Welch, Jess uses a Shakespearean speech to construct a book cipher to communicate with an enemy who may or may not be an ally.
  • In Bitterblue by Kristin Cashore, Bitterblue uses a book(?) code to unlock secrets of her father's reign as king.
  • In the TV series Deutschland 83, protagonist Martin Rauch's East German handlers use a book cipher to communicate with him while he is undercover in West Germany.
  • In the series 2 finale of the BBC TV show Luther, two brothers use a book cipher. Luther determines they must be using a book that is readily available in case the book is lost and/or so the users can always have it to hand. This leads him to discovering the book cipher is using Gideon's Bible.

See also

References

  1. ^ Changda Wang; Shiguang Ju (2008). "Book Cipher with Infinite Key Space". 2008 International Symposium on Information Science and Engineering. p. 456. doi:10.1109/ISISE.2008.273. ISBN 978-0-7695-3494-7. S2CID 15768123.
  2. ^ Yardley, Herbert O. (1981) [1931]. The American Black Chamber. New York: Ballantine Books. ISBN 0-345-29867-5. Retrieved 2023-02-13.
  3. ^ Bell, Chris. "Cicada 3301 update: the baffling internet mystery is back". The Daily Telegraph. Archived from the original on 8 January 2014.

Read other articles:

Anggaran Pendapatan dan Belanja Negara Republik IndonesiaTahun Anggaran 2022‹ 20212023 ›Diajukan olehPresiden Joko WidodoDiajukan kepadaDewan Perwakilan Rakyat Republik Indonesia periode 2019-2024Disetujui DPR30 September 2021Disahkan Presiden27 Oktober 2021Undang-UndangNomor 6 Tahun 2021Total pendapatanRp1.846,1 triliunTotal belanjaRp2.714,2 triliunDefisitRp868 triliun% terhadap PDB4,85% Anggaran Pendapatan dan Belanja Negara Tahun Anggaran 2022 (disingkat APBN 2022) adalah rencan…

Planning and directing the design department This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources.Find sources: Design leadership – news · newspapers · books · scholar …

إليمرا هايتس   الإحداثيات 42°07′38″N 76°49′27″W / 42.1272°N 76.8242°W / 42.1272; -76.8242   [1] تقسيم إداري  البلد الولايات المتحدة[2]  التقسيم الأعلى مقاطعة تشيمونغ  خصائص جغرافية  المساحة 2.969214 كيلومتر مربع2.969216 كيلومتر مربع (1 أبريل 2010)  ارتفاع 268 متر  عدد ال…

Extinct language of Vanuatu SörsörianNative toVanuatuRegionMalakulaNative speakershandful (2013)[1]Language familyAustronesian Malayo-PolynesianOceanicSouthern OceanicNorth-Central VanuatuCentral VanuatuMalakulaMalakula InteriorSörsörianLanguage codesISO 639-3None (mis)Linguist List1l9GlottologNoneELPSörsörianSörsörian is classified as Critically Endangered by the UNESCO Atlas of the World's Languages in Danger Sörsörian is a possibly extinct language of Vanuatu, pres…

Basilika BadocBasilika Minor Santo Yohanes PembaptisBasílica Menor de San Juan Bautistacode: es is deprecated   (Spanyol)Basilika BadocBasilika BadocTampilkan peta LuzonBasilika BadocTampilkan peta Filipina17°55′41″N 120°28′30″E / 17.927983°N 120.475100°E / 17.927983; 120.475100Koordinat: 17°55′41″N 120°28′30″E / 17.927983°N 120.475100°E / 17.927983; 120.475100LokasiBadoc, Ilocos NorteNegaraFilipinaDenominasiGerej…

Artikel ini mendokumentasikan suatu wabah penyakit terkini. Informasi mengenai hal itu dapat berubah dengan cepat jika informasi lebih lanjut tersedia; laporan berita dan sumber-sumber primer lainnya mungkin tidak bisa diandalkan. Pembaruan terakhir untuk artikel ini mungkin tidak mencerminkan informasi terkini mengenai wabah penyakit ini untuk semua bidang. Artikel ini memerlukan pemutakhiran informasi. Harap perbarui artikel dengan menambahkan informasi terbaru yang tersedia. Pembaruan terakhi…

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Ti-Tree, Northern Territory – news · newspapers · books · scholar · JSTOR (September 2018) (Learn how and when to remove this template message) Town in the Northern Territory, AustraliaTi-TreeNorthern TerritoryTi-TreeCoordinates22°08′02″S 133°24′50″E…

Pour les articles homonymes, voir Roche (homonymie). Cet article est une ébauche concernant une commune de la Loire. Vous pouvez partager vos connaissances en l’améliorant (comment ?). Le bandeau {{ébauche}} peut être enlevé et l’article évalué comme étant au stade « Bon début » quand il comporte assez de renseignements encyclopédiques concernant la commune. Si vous avez un doute, l’atelier de lecture du projet Communes de France est à votre disposition pour vou…

Emigration of highly skilled or well-educated individuals Brain drain redirects here. For other uses, see Brain drain (disambiguation). Theoretical physicist Albert Einstein, who immigrated to the United States to escape Nazi persecution, is an example of human capital flight as a result of political change. Human capital flight is the emigration or immigration of individuals who have received advanced training at home. The net benefits of human capital flight for the receiving country are somet…

Il sonno in diverse specie viventi «Dio benedica chi ha inventato il sonno, mantello che avvolge i pensieri di tutti gli uomini, cibo che soddisfa ogni fame, peso che equilibra le bilance e accomuna il mandriano al re, lo stolto al saggio.» (Miguel de Cervantes) Il sonno (dal latino somnus)[1] è una necessità fisiologica, definito come stato di riposo contrapposto alla veglia. Varie definizioni indicano il sonno come una periodica sospensione dello stato di coscienza, durante la qual…

Swedish politician (born 1966) Hans EklindMember of the RiksdagIncumbentAssumed office 24 September 2018ConstituencyÖrebro County Personal detailsBorn1966 (age 57–58)Political partyChristian Democrats Hans Eklind (born 1966)[1] is a Swedish politician. Since September 2018,[update] he serves as Member of the Riksdag from the Christian Democrats representing the constituency of Örebro County.[2] He was also elected as Member of the Riksdag in Septembe…

Voce principale: Novara Calcio. Novara CalcioStagione 1981-1982Sport calcio Squadra Novara Allenatore Vittorino Calloni poi Ezio Galbiati Presidente Santino Tarantola (amministratore unico) Serie C23º posto nel girone A. Maggiori presenzeCampionato: Antonelli, Zanotti (33) Miglior marcatoreCampionato: Zanotti (15) 1980-1981 1982-1983 Si invita a seguire il modello di voce Questa voce raccoglie le informazioni riguardanti il Novara Calcio nelle competizioni ufficiali della stagione 1981-198…

Questa voce o sezione sull'argomento politici statunitensi non cita le fonti necessarie o quelle presenti sono insufficienti. Puoi migliorare questa voce aggiungendo citazioni da fonti attendibili secondo le linee guida sull'uso delle fonti. Segui i suggerimenti del progetto di riferimento. William McKinleyRitratto ufficiale, 1900 25º Presidente degli Stati Uniti d'AmericaDurata mandato4 marzo 1897 –14 settembre 1901 Vice presidenteGarret HobartTheodore Roosevelt Prede…

  「俄亥俄」重定向至此。关于其他用法,请见「俄亥俄 (消歧义)」。 俄亥俄州 美國联邦州State of Ohio 州旗州徽綽號:七葉果之州地图中高亮部分为俄亥俄州坐标:38°27'N-41°58'N, 80°32'W-84°49'W国家 美國加入聯邦1803年3月1日,在1953年8月7日追溯頒定(第17个加入联邦)首府哥倫布(及最大城市)政府 • 州长(英语:List of Governors of {{{Name}}}]]) • …

North African traditional flatbread MsemmenMsemmenTypeBreadPlace of originMaghrebMain ingredientsFlour, durum wheat semolina, dry yeast, melted butter, salt, sugar and waterVariationsMhadjeb  Media: Msemmen Msemmen (Arabic: مسمن msamman, musamman) or rghaif (رغايف), is a traditional flatbread originally from the Maghreb, commonly found in Algeria,[1] Morocco,[2] and Tunisia.[3] It is folded into square pancakes with multiple internal layers and cooked on…

Uniqueness of countable dense linear orders In order theory and model theory, branches of mathematics, Cantor's isomorphism theorem states that every two countable dense unbounded linear orders are order-isomorphic. For instance, Minkowski's question-mark function produces an isomorphism (a one-to-one order-preserving correspondence) between the numerical ordering of the rational numbers and the numerical ordering of the dyadic rationals. The theorem is named after Georg Cantor, who first publis…

Mumbai MetroInfoPemilikMMRDA (seluruh jalur kecuali Jalur 1 & 3), Mumbai Metro One (Jalur 1), Mumbai Metro Rail Corporation (Jalur 3)WilayahMumbai Metropolitan RegionJenisAngkutan cepatJumlah jalurBeroperasi 1 | Dalam pembangunan 8 | Disetujui 3 | Direncanakan 3Jumlah stasiun12Penumpang harian450,000 (Januari 2019)Penumpang tahunan126 juta (2018) [1]Pimpinan utamaSh. Abhay Ku. MishraKantor pusatMumbaiSitus webReliance Mumbai MetroMMRCLMMRDAOperasiDimulai8 Juni 2014OperatorMumbai Metr…

Patriotic song of the People's Republic of China Not to be confused with the Military Anthem of the Eighth Route Army. This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Military Anthem of the People's Liberation Army – news · newspapers · books · scholar · JSTOR (June 2019) (Learn how and when to remove this message) 中国人民…

1985 single by Giorgio Moroder and Philip OakeyGood-Bye Bad TimesSingle by Giorgio Moroder and Philip Oakeyfrom the album Philip Oakey & Giorgio Moroder Released10 June 1985[1]Recorded1985Length3:42LabelVirgin RecordsSongwriter(s)Oakey and MoroderProducer(s)Giorgio MoroderGiorgio Moroder singles chronology Shannon's Eyes (1985) Good-Bye Bad Times (1985) Be My Lover Now (1985) Philip Oakey singles chronology Together in Electric Dreams(1984) Good-Bye Bad Times(1985) Be My Love…

«River Plate» redirige aquí. Para clubes homónimos de otros países, véase River Plate (desambiguación). River Plate Datos generalesNombre Club Atlético River PlateApodo(s) El Millonario[1]​La Banda[2]​El Más Grande[3]​Fundación 25 de mayo de 1901 (123 años)[4]​Color(es)                Blanco, Rojo y Negro[5]​Propietario(s) 351 000 socios[6]​Presidente Jorge BritoEntrenador Martín Demi…

Kembali kehalaman sebelumnya