HOME

TheInfoList



OR:

A book cipher is a
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
in which each word or letter in the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
of a message is replaced by some code that locates it in another text, the key. A simple version of such a cipher would use a specific book as the key, and would replace each word of the plaintext by a number that gives the position where that word occurs in that book. For example, if the chosen key is
H. G. Wells Herbert George Wells (21 September 1866 – 13 August 1946) was an English writer, prolific in many genres. He wrote more than fifty novels and dozens of short stories. His non-fiction output included works of social commentary, politics, hist ...
's novel ''
The War of the Worlds ''The War of the Worlds'' is a science fiction novel by English author H. G. Wells. It was written between 1895 and 1897, and serialised in '' Pearson's Magazine'' in the UK and ''Cosmopolitan'' magazine in the US in 1897. The full novel was ...
'', the plaintext "''all plans failed, coming back tomorrow''" could be encoded as "''335 219 881, 5600 853 9315''" — since the 335th word of the novel is "''all''", the 219th is "''plans''", etc. Instead of the position of the word, sender can also use for each word a triplet indicating page number, line number in the page and word number in the line, avoiding error-prone counting of words from the start of the book. With the Bible, triplet can be chapter number, verse number, word number. This method requires that the sender and receiver use exactly the same edition of the key book. This simple version fails if the message uses a word that does not appear in the text. A variant that avoids this problem works with individual letters rather than words. Namely each letter of the plaintext message would be replaced by a number that specifies where that letter occurs in the key book. For example, using the same ''War of the Worlds'' book as the key, the message "no ammo" could be encoded as "12 10 / 50 31 59 34" since the words with those positions in the novel are "''nineteenth''", "''of''", "''almost''", "''mortal''", "''might''", and "''own''". This method was used in the second Beale cipher. This variant is more properly called a
substitution cipher In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, t ...
, specifically a
homophonic Homophony and Homophonic are from the Greek language, Greek ὁμόφωνος (''homóphōnos''), literally 'same sounding,' from ὁμός (''homós''), "same" and φωνή (''phōnē''), "sound". It may refer to: *Homophones − words with the s ...
one. Both methods, as described, are quite laborious. Therefore, in practice, the key has usually been a
codebook A codebook is a type of document used for gathering and storing cryptography codes. Originally, codebooks were often literally , but today "codebook" is a byword for the complete record of a series of codes, regardless of physical format. Cr ...
created for the purpose: a simple dictionary-like listing of all the words that might be needed to form a message, each with the respective code number(s). This version is called a
code In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communicati ...
, and was extensively used from the 15th century up to
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
.


Choosing the key

The main strength of a book cipher is the key. The sender and receiver of encoded messages can agree to use any book or other publication available to both of them as the key to their cipher. Someone intercepting the message and attempting to decode it, unless they are a skilled cryptographer , must somehow identify the key from a huge number of possibilities available. In the context of
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
, a book cipher has a considerable advantage for a spy in enemy territory. A conventional codebook, if discovered by the local authorities, instantly incriminates the holder as a spy and gives the authorities the chance of deciphering the code and sending false messages impersonating the agent. On the other hand, a book, if chosen carefully to fit with the spy's cover story, would seem entirely innocuous. The drawback to a book cipher is that both parties have to possess an identical copy of the key. The book must not be of the sort that would look out of place in the possession of those using it, and it must be of a type likely to contain any words required. Thus, a spy wishing to send information about troop movements and numbers of armaments would be unlikely to find a cookbook or romance novel useful keys.


Using widely available publications


Dictionary

Another approach is to use a dictionary as the codebook. This guarantees that nearly all words will be found, and also makes it much easier to find a word when encoding. This approach was used by George Scovell for the
Duke of Wellington Duke is a male title either of a monarch ruling over a duchy, or of a member of royalty, or nobility. As rulers, dukes are ranked below emperors, kings, grand princes, grand dukes, and above sovereign princes. As royalty or nobility, they ar ...
's army in some campaigns of the
Peninsular War The Peninsular War (1808–1814) was fought in the Iberian Peninsula by Kingdom of Portugal, Portugal, Spain and the United Kingdom of Great Britain and Ireland, United Kingdom against the invading and occupying forces of the First French ...
. In Scovell's method, a codeword would consist of a number (indicating the page of the dictionary), a letter (indicating the column on the page), and finally a number indicating which entry of the column was meant. However, this approach also has a disadvantage: because entries are arranged in alphabetical order, so are the code numbers. This can give strong hints to the
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
unless the message is superenciphered. The wide distribution and availability of dictionaries also present a problem; it is likely that anyone trying to break such a code is also in possession of the dictionary which can be used to read the message.


Bible cipher

The
Bible The Bible is a collection of religious texts that are central to Christianity and Judaism, and esteemed in other Abrahamic religions such as Islam. The Bible is an anthology (a compilation of texts of a variety of forms) originally writt ...
is a widely available book that is almost always printed with chapter and verse markings making it easy to find a specific string of text within it, making it particularly useful for this purpose; the widespread availability of concordances can ease the encoding process as well.


Security

Essentially, the code version of a "book cipher" is just like any other code, but one in which the trouble of preparing and distributing the
codebook A codebook is a type of document used for gathering and storing cryptography codes. Originally, codebooks were often literally , but today "codebook" is a byword for the complete record of a series of codes, regardless of physical format. Cr ...
has been eliminated by using an existing text. However this means, as well as being attacked by all the usual means employed against other codes or ciphers, partial solutions may help the
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
to guess other codewords, or even to break the code completely by identifying the key text. This is, however, not the only way a book cipher may be broken. It is still susceptible to other methods of cryptanalysis, and as such is quite easily broken, even without sophisticated means, without the cryptanalyst having any idea to what book the cipher is keyed.


Examples

* A famous use of a book cipher is in the Beale ciphers, of which Document No. 2 uses (a variant printing of) the
United States Declaration of Independence The Declaration of Independence, formally The unanimous Declaration of the thirteen States of America in the original printing, is the founding document of the United States. On July 4, 1776, it was adopted unanimously by the Second Continen ...
as the key text. * In the
American Revolution The American Revolution (1765–1783) was a colonial rebellion and war of independence in which the Thirteen Colonies broke from British America, British rule to form the United States of America. The revolution culminated in the American ...
,
Benedict Arnold Benedict Arnold (#Brandt, Brandt (1994), p. 4June 14, 1801) was an American-born British military officer who served during the American Revolutionary War. He fought with distinction for the American Continental Army and rose to the rank of ...
used a book cipher, sometimes known as the Arnold Cipher, which used Sir
William Blackstone Sir William Blackstone (10 July 1723 – 14 February 1780) was an English jurist, Justice (title), justice, and Tory (British political party), Tory politician most noted for his ''Commentaries on the Laws of England'', which became the best-k ...
's ''
Commentaries on the Laws of England The ''Commentaries on the Laws of England'' (commonly, but informally known as ''Blackstone's Commentaries'') are an influential 18th-century treatise on the common law of England by Sir William Blackstone, originally published by the Clarend ...
'' as a key text. * Book ciphers have consistently been used throughout the Cicada 3301 mystery. * Eli Cohen, the Israeli spy who for several years infiltrated the Syrian government until discovered by the Syrian intelligence and executed, used for his communications with Israel a book cypher based on a French-language copy of
Alexandre Dumas Alexandre Dumas (born Alexandre Dumas Davy de la Pailleterie, 24 July 1802 – 5 December 1870), also known as Alexandre Dumas , was a French novelist and playwright. His works have been translated into many languages and he is one of the mos ...
's ''
The Three Musketeers ''The Three Musketeers'' () is a French historical adventure novel written and published in 1844 by French author Alexandre Dumas. It is the first of the author's three d'Artagnan Romances. As with some of his other works, he wrote it in col ...
''The Dumas book is mentioned in an intgerview with Cohen's brother on Israeli radio, May 19, 2025.


In fiction

* In ''
Colony A colony is a territory subject to a form of foreign rule, which rules the territory and its indigenous peoples separated from the foreign rulers, the colonizer, and their ''metropole'' (or "mother country"). This separated rule was often orga ...
'', a television series, the resistance movement uses a book cipher to communicate between members of the cells. * In the novel '' Monsieur Lecoq'', published in 1868, Monsieur Lecoq finds that a prisoner is communicating with his confederate using a double book cipher. Since the prisoner has only one book, ''The songs of Béranger'', the solution is easily discovered. * In '' The Valley of Fear'',
Sherlock Holmes Sherlock Holmes () is a Detective fiction, fictional detective created by British author Arthur Conan Doyle. Referring to himself as a "Private investigator, consulting detective" in his stories, Holmes is known for his proficiency with obser ...
decrypts a message enciphered with a book cipher by deducing which book had been used as a key text. * The name of Ken Follett's World War II thriller '' The Key to Rebecca'' refers to a German spy in
Cairo Cairo ( ; , ) is the Capital city, capital and largest city of Egypt and the Cairo Governorate, being home to more than 10 million people. It is also part of the List of urban agglomerations in Africa, largest urban agglomeration in Africa, L ...
using
Daphne du Maurier Dame Daphne du Maurier, Lady Browning, (; 13 May 1907 – 19 April 1989) was an English novelist, biographer and playwright. Her parents were actor-manager Gerald du Maurier, Sir Gerald du Maurier and his wife, actress Muriel Beaumont. Her gra ...
's novel ''
Rebecca Rebecca () appears in the Hebrew Bible as the wife of Isaac and the mother of Jacob and Esau. According to biblical tradition, Rebecca's father was Bethuel the Aramean from Paddan Aram, also called Aram-Naharaim. Rebecca's brother was Laban (Bi ...
'' as the basis of a code. * In '' A Presumption of Death'',
Lord Peter Wimsey Lord Peter Death Bredon Wimsey (later 17th Duke of Denver) is the fictional protagonist in a series of detective novels and short stories by Dorothy L. Sayers (and their continuation by Jill Paton Walsh). A amateur, dilettante who solves myst ...
, on assignment for British Intelligence in World War II Nazi-occupied Europe, uses a code based on the works of
John Donne John Donne ( ; 1571 or 1572 – 31 March 1631) was an English poet, scholar, soldier and secretary born into a recusant family, who later became a clergy, cleric in the Church of England. Under Royal Patronage, he was made Dean of St Paul's, D ...
. The Germans break the code, coming near to catching Wimsey and Bunter. Wimsey then improvises a new code, based on an unpublished text known only to himself and his wife. *
Graham Greene Henry Graham Greene (2 October 1904 – 3 April 1991) was an English writer and journalist regarded by many as one of the leading novelists of the 20th century. Combining literary acclaim with widespread popularity, Greene acquired a re ...
's protagonists often use book codes. In '' The Human Factor'', several books are used, and an edition of
Charles Lamb Charles Lamb (10 February 1775 – 27 December 1834) was an English essayist, poet, and antiquarian, best known for his '' Essays of Elia'' and for the children's book '' Tales from Shakespeare'', co-authored with his sister, Mary Lamb (1764� ...
's ''
Tales from Shakespeare ''Tales from Shakespeare'' is an English children's book written by the siblings Charles and Mary Lamb in 1807, intended "for the use of young persons" while retaining as much Shakespearean language as possible. Mary Lamb was responsible for ...
'' is used in ''
Our Man in Havana ''Our Man in Havana'' (1958) is a novel set in Cuba by the British author Graham Greene. Greene uses the novel to mock intelligence services, especially the British MI6, and their willingness to believe reports from their local informants. Th ...
''. * A book cipher plays an important role in the TV version of ''
Sharpe's Sword ''Sharpe's Sword'' is a historical novel in the Richard Sharpe series by Bernard Cornwell. It is the fourth in the series, being first published in 1983, though the fifteenth chronologically. Set in the summer of 1812 including the Battle of ...
''. The key text is Voltaire's ''
Candide ( , ) is a French satire written by Voltaire, a philosopher of the Age of Enlightenment, first published in 1759. The novella has been widely translated, with English versions titled ''Candide: or, All for the Best'' (1759); ''Candide: or, The ...
''. * In the 2004 film '' National Treasure'', a book cipher (called an "Ottendorf cipher") is discovered on the back of the U.S. Declaration of Independence, using the " Silence Dogood" letters as the key text. * The protagonists of the
Matthew Reilly Matthew John Reilly (born 2 July 1974) is an internationally bestselling Australian action thriller writer.
". Retrieved 10 ...
novel '' The Six Sacred Stones'' used a book cipher to send confidential messages to each other. The key text was the
Harry Potter ''Harry Potter'' is a series of seven Fantasy literature, fantasy novels written by British author J. K. Rowling. The novels chronicle the lives of a young Magician (fantasy), wizard, Harry Potter (character), Harry Potter, and his friends ...
books, but the messages were sent ''via'' a ''
The Lord of the Rings ''The Lord of the Rings'' is an Epic (genre), epic high fantasy novel written by English author and scholar J. R. R. Tolkien. Set in Middle-earth, the story began as a sequel to Tolkien's 1937 children's book ''The Hobbit'' but eventually d ...
'' forum to make the key text harder to identify. * In '' Lost: Mystery of the Island'', a series of four
jigsaw puzzle A jigsaw puzzle (with context, sometimes just jigsaw or just puzzle) is a tiling puzzle that requires the assembly of often irregularly shaped interlocking and mosaicked pieces. Typically each piece has a portion of a picture, which is comple ...
s released in 2007, a book cipher was used on each puzzle's box to hide spoilers and reveal information about the show to the fans. * "The Fisher King", a two-part episode of ''
Criminal Minds ''Criminal Minds'' is an American police procedural crime drama television series created by Jeff Davis that premiered on CBS on September 22, 2005. It follows a group of criminal profilers who work for the FBI as members of its Behavioral ...
'', features a book cipher brought to the Behavioral Analysis Unit by the UNSUB via Agent Hotchner's wife. The cypher was part of a larger puzzle to find a girl who had been missing for two years. The key text was ''
The Collector ''The Collector'' is a 1963 thriller novel by English author John Fowles, in his literary debut. Its plot follows a lonely young man who kidnaps a female art student in London and holds her captive in the cellar of his rural farmhouse. Divided ...
'' by
John Fowles John Robert Fowles (; 31 March 1926 – 5 November 2005) was an English novelist, critically positioned between modernism and postmodernism. His work was influenced by Jean-Paul Sartre and Albert Camus, among others. After leaving Oxford Uni ...
. * ''
Burn Notice ''Burn Notice'' is an American espionage television series created by Matt Nix, which originally aired on the USA Network for a total of seven seasons from June 28, 2007, to September 12, 2013. The show stars Jeffrey Donovan, Gabrielle Anwar, ...
'' (episodes "Where There's Smoke" and "Center of the Storm", 2010): Michael Westen steals a Bible from a safe deposit box that is the code book of Simon. This becomes part of the season plot to track an organization starting wars for profit as Michael tries to arrange an interview with Simon. *In the episode " The Blind Banker" of the BBC series '' Sherlock'',
Sherlock Holmes Sherlock Holmes () is a Detective fiction, fictional detective created by British author Arthur Conan Doyle. Referring to himself as a "Private investigator, consulting detective" in his stories, Holmes is known for his proficiency with obser ...
searches for a book that is the key to a cipher being used by Chinese Tong smugglers to communicate with their agents and with each other through graffiti messages. He eventually finds it: the
London A-Z London is the Capital city, capital and List of urban areas in the United Kingdom, largest city of both England and the United Kingdom, with a population of in . London metropolitan area, Its wider metropolitan area is the largest in Wester ...
. * In the film ''
Unknown Unknown or The Unknown may refer to: Film and television Film * The Unknown (1915 comedy film), ''The Unknown'' (1915 comedy film), Australian silent film * The Unknown (1915 drama film), ''The Unknown'' (1915 drama film), American silent drama ...
'' (2011), Prof. Bressler's passwords are obscured by a book cipher. * In ''
The Unit ''The Unit'' is an American action-drama television series created by David Mamet that aired on CBS from March 7, 2006, to May 10, 2009, with the total of four seasons and 69 episodes. The series focuses on a top-secret military unit modeled ...
'' episode "
Paradise Lost ''Paradise Lost'' is an Epic poetry, epic poem in blank verse by the English poet John Milton (1608–1674). The poem concerns the Bible, biblical story of the fall of man: the temptation of Adam and Eve by the fallen angel Satan and their ex ...
", Jonas Blane (a.k.a. Snake Doctor) uses a book code from the poem ''
Paradise Lost ''Paradise Lost'' is an Epic poetry, epic poem in blank verse by the English poet John Milton (1608–1674). The poem concerns the Bible, biblical story of the fall of man: the temptation of Adam and Eve by the fallen angel Satan and their ex ...
'' to communicate to his wife, Molly, that he has arrived safely in Panama. * In ''
The Good Soldier Švejk ''The Good Soldier Švejk'' () is an unfinished satirical dark comedy novel by Czech writer Jaroslav Hašek, published in 1921–1923, about a good-humored, simple-minded, middle-aged man who appears to be enthusiastic to serve Austria-Hungary i ...
'' by
Jaroslav Hašek Jaroslav Hašek (; 1883–1923) was a Czechs, Czech writer, Humorism, humorist, Satire, satirist, journalist, Bohemianism, bohemian, first anarchist and then communist, and commissar of the Red Army against the Czechoslovak Legion. He is best k ...
, the officers in Švejk's
battalion A battalion is a military unit, typically consisting of up to one thousand soldiers. A battalion is commanded by a lieutenant colonel and subdivided into several Company (military unit), companies, each typically commanded by a Major (rank), ...
attempt to use a book cipher. Their attempts are undone, however, when it is revealed that the novel in question is composed of two volumes, and Švejk has delivered the first volume to the officers, thinking that they intended to read the novel, rather than the second, which is used for the cipher. Furthermore, the key to the cipher is identical to an example given in a published military textbook. * In ''
An Instance of the Fingerpost ''An Instance of the Fingerpost'' is a 1997 historical mystery novel by Iain Pears. The main setting is Oxford in 1663, with the events initially revolving around the mysterious death of an academic. The novel depicts fictionalized versions o ...
'', a
historical mystery The historical mystery or historical whodunit is a subgenre of two literary genres, historical fiction and mystery fiction. These works are set in a time period considered historical from the author's perspective, and the central plot involves th ...
by
Iain Pears Iain George Pears (born 8 August 1955) is an English art historian, novelist and journalist. Personal life Pears was born on 8 August 1955 in Coventry, England. He was educated at Warwick School, an all-boys public school in Warwick. He st ...
, a book cipher conceals one character's family history and its relationship with the
English Civil War The English Civil War or Great Rebellion was a series of civil wars and political machinations between Cavaliers, Royalists and Roundhead, Parliamentarians in the Kingdom of England from 1642 to 1651. Part of the wider 1639 to 1653 Wars of th ...
. * In John Le Carre's '' A Perfect Spy'', the protagonist Magnus Pym uses a book cipher based on the German text Simplicissimus. * In the book '' Red Dragon'', Hannibal Lecter uses a book code to encrypt a message to the Tooth Fairy killer, with the message containing the home address of Will Graham, who is investigating the case, and the message, "Save yourself. Kill them all", with the intent of having Will and his family fall victim to the killer. In the 1986 film adaptation Manhunter, the book used is mentioned to be a list of statues in the state of
Maryland Maryland ( ) is a U.S. state, state in the Mid-Atlantic (United States), Mid-Atlantic region of the United States. It borders the states of Virginia to its south, West Virginia to its west, Pennsylvania to its north, and Delaware to its east ...
. In the 2002 adaptation Red Dragon, the book is changed to the French cooking encyclopedia Larousse Gastronomique to fit in with that movie's depiction of Lecter. * In ''The Darwin Code'' by J D Welch, Jess uses a Shakespearean speech to construct a book cipher to communicate with an enemy who may or may not be an ally. *In Bitterblue by Kristin Cashore, Bitterblue uses a book(?) code to unlock secrets of her father's reign as king. *In the TV series '' Deutschland 83'', protagonist Martin Rauch's
East German East Germany, officially known as the German Democratic Republic (GDR), was a country in Central Europe from its formation on 7 October 1949 until its reunification with West Germany (FRG) on 3 October 1990. Until 1989, it was generally vie ...
handlers use a book cipher to communicate with him while he is undercover in
West Germany West Germany was the common English name for the Federal Republic of Germany (FRG) from its formation on 23 May 1949 until German reunification, its reunification with East Germany on 3 October 1990. It is sometimes known as the Bonn Republi ...
. *In the series 2 finale of the BBC TV show '' Luther'', two brothers use a book cipher. Luther determines they must be using a book that is readily available in case the book is lost and/or so the users can always have it to hand. This leads him to discovering the book cipher is using Gideon's Bible.


See also

* Running key cipher *
Codebook A codebook is a type of document used for gathering and storing cryptography codes. Originally, codebooks were often literally , but today "codebook" is a byword for the complete record of a series of codes, regardless of physical format. Cr ...


References

{{Cryptography navbox , classical Classical ciphers
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...