HOME

TheInfoList



OR:

A book cipher, or Ottendorf cipher, is a
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
in which the key is some aspect of a book or other piece of text. Books, being common and widely available in modern times, are more convenient for this use than objects made specifically for cryptographic purposes. It is typically essential that both correspondents not only have the same book, but the same
edition Edition may refer to: * Edition (book), a bibliographical term for a substantially similar set of copies * Edition (printmaking), a publishing term for a set print run * Edition (textual criticism), a particular version of a text * Edition Recor ...
. Traditionally, book ciphers work by replacing words in the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
of a message with the location of words from the book being used. In this mode, book ciphers are more properly called
code In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication ...
s. This can have problems; if a word appears in the plaintext but not in the book, it cannot be encoded. An alternative approach which gets around this problem is to replace individual letters rather than words. One such method, used in the second Beale cipher, replaces the first letter of a word in the book with that word's position. In this case, the book cipher is properly a homophonic substitution cipher. However, if used often, this technique has the side effect of creating a larger ciphertext (typically 4 to 6 digits being required to encipher each letter or syllable) and increases the time and effort required to decode the message.


Choosing the key

The main strength of a book cipher is the key. The sender and receiver of encoded messages can agree to use any book or other publication available to both of them as the key to their cipher. Someone intercepting the message and attempting to decode it, unless they are a skilled cryptographer (see Security below), must somehow identify the key from a huge number of possibilities available. In the context of
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
, a book cipher has a considerable advantage for a spy in enemy territory. A conventional codebook, if discovered by the local authorities, instantly incriminates the holder as a spy and gives the authorities the chance of deciphering the code and sending false messages impersonating the agent. On the other hand, a book, if chosen carefully to fit with the spy's cover story, would seem entirely innocuous. The drawback to a book cipher is that both parties have to possess an identical copy of the key. The book must not be of the sort that would look out of place in the possession of those using it, and it must be of a type likely to contain any words required. Thus, a spy wishing to send information about troop movements and numbers of armaments would be unlikely to find a cookbook or romance novel useful keys.


Using widely available publications


Dictionary

Another approach is to use a dictionary as the codebook. This guarantees that nearly all words will be found, and also makes it much easier to find a word when encoding. This approach was used by
George Scovell General Sir George Scovell, (21 March 1774 – 17 January 1861) was a member of the quartermaster's staff of the British Army in Iberia during the Peninsular War. Military career Scovell's parents were George Scovell of Cirencester and the da ...
for the
Duke of Wellington Arthur Wellesley, 1st Duke of Wellington, (1 May 1769 – 14 September 1852) was an Anglo-Irish soldier and Tory statesman who was one of the leading military and political figures of 19th-century Britain, serving twice as prime minister of ...
's army in some campaigns of the
Peninsular War The Peninsular War (1807–1814) was the military conflict fought in the Iberian Peninsula by Spain, Portugal, and the United Kingdom against the invading and occupying forces of the First French Empire during the Napoleonic Wars. In Spain ...
. In Scovell's method, a codeword would consist of a number (indicating the page of the dictionary), a letter (indicating the column on the page), and finally a number indicating which entry of the column was meant. However, this approach also has a disadvantage: because entries are arranged in alphabetical order, so are the code numbers. This can give strong hints to the
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
unless the message is superenciphered. The wide distribution and availability of dictionaries also present a problem; it is likely that anyone trying to break such a code is also in possession of the dictionary which can be used to read the message.


Bible cipher

The
Bible The Bible (from Koine Greek , , 'the books') is a collection of religious texts or scriptures that are held to be sacred in Christianity, Judaism, Samaritanism, and many other religions. The Bible is an anthologya compilation of texts of a ...
is a widely available book that is almost always printed with chapter and verse markings making it easy to find a specific string of text within it, making it particularly useful for this purpose; the widespread availability of concordances can ease the encoding process as well.


Security

Essentially, the code version of a "book cipher" is just like any other code, but one in which the trouble of preparing and distributing the
codebook A codebook is a type of document used for gathering and storing cryptography codes. Originally codebooks were often literally , but today codebook is a byword for the complete record of a series of codes, regardless of physical format. Cryptog ...
has been eliminated by using an existing text. However this means, as well as being attacked by all the usual means employed against other codes or ciphers, partial solutions may help the
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
to guess other codewords, or even to break the code completely by identifying the key text. This is, however, not the only way a book cipher may be broken. It is still susceptible to other methods of cryptanalysis, and as such is quite easily broken, even without sophisticated means, without the cryptanalyst having any idea to what book the cipher is keyed.Yardley, Herbert O. ''The American Black Chamber'' (Annapolis: Naval Institute Press, 2004; reprints original edition). If used carefully, the cipher version is probably much stronger, because it acts as a homophonic cipher with an extremely large number of equivalents. However, this is at the cost of a very large ciphertext expansion.


Examples

* A famous use of a book cipher is in the
Beale ciphers The Beale ciphers are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated to be worth over US$43 million Comprising three ciphertexts, the first (unsolved) text de ...
, of which document no. 2 uses (a variant printing of) the
United States Declaration of Independence The United States Declaration of Independence, formally The unanimous Declaration of the thirteen States of America, is the pronouncement and founding document adopted by the Second Continental Congress meeting at Pennsylvania State House ...
as the key text. * In the
American Revolution The American Revolution was an ideological and political revolution that occurred in British America between 1765 and 1791. The Americans in the Thirteen Colonies formed independent states that defeated the British in the American Revolut ...
,
Benedict Arnold Benedict Arnold ( Brandt (1994), p. 4June 14, 1801) was an American military officer who served during the Revolutionary War. He fought with distinction for the American Continental Army and rose to the rank of major general before defect ...
used a book cipher, sometimes known as the Arnold Cipher, which used Sir
William Blackstone Sir William Blackstone (10 July 1723 – 14 February 1780) was an English jurist, judge and Tory politician of the eighteenth century. He is most noted for writing the ''Commentaries on the Laws of England''. Born into a middle-class family i ...
's ''
Commentaries on the Laws of England The ''Commentaries on the Laws of England'' are an influential 18th-century treatise on the common law of England by Sir William Blackstone, originally published by the Clarendon Press at Oxford, 1765–1770. The work is divided into four volume ...
'' as a key text. * Book ciphers have consistently been used throughout the
Cicada 3301 Cicada 3301 is a nickname given to three sets of puzzles posted under the name "3301" online between 2012 and 2014. The first puzzle started on January 4, 2012, on 4chan and ran for nearly a month. A second round began one year later on January 4, ...
mystery.


In fiction

* In ''
Colony In modern parlance, a colony is a territory subject to a form of foreign rule. Though dominated by the foreign colonizers, colonies remain separate from the administration of the original country of the colonizers, the ''metropole, metropolit ...
'', a television series, the resistance movement uses a book cipher to communicate between members of the cells. * In the novel ''
Monsieur Lecoq Monsieur Lecoq is the creation of Émile Gaboriau, a 19th-century French writer and journalist. Monsieur Lecoq is a fictional detective employed by the French Sûreté. The character is one of the pioneers of the genre and a major influence on She ...
'', published in 1868,
Monsieur Lecoq Monsieur Lecoq is the creation of Émile Gaboriau, a 19th-century French writer and journalist. Monsieur Lecoq is a fictional detective employed by the French Sûreté. The character is one of the pioneers of the genre and a major influence on She ...
finds that a prisoner is communicating with his confederate using a double book cipher. Since the prisoner has only one book, ''The songs of Béranger'', the solution is easily discovered. * In ''
The Valley of Fear ''The Valley of Fear'' is the fourth and final Sherlock Holmes novel by British writer Arthur Conan Doyle. It is loosely based on the Molly Maguires and Pinkerton agent James McParland. The story was first published in the ''Strand Magazine ...
'',
Sherlock Holmes Sherlock Holmes () is a fictional detective created by British author Arthur Conan Doyle. Referring to himself as a " consulting detective" in the stories, Holmes is known for his proficiency with observation, deduction, forensic science and ...
decrypts a message enciphered with a book cipher by deducing which book had been used as a key text. * The name of
Ken Follett Kenneth Martin Follett, (born 5 June 1949) is a British author of thrillers and historical novels who has sold more than 160 million copies of his works. Many of his books have achieved high ranking on best seller lists. For example, in the ...
's World War II thriller ''
The Key to Rebecca ''The Key to Rebecca'' is a novel by the British author Ken Follett. Published in 1980 by Pan Books (), it was a best-seller that achieved popularity in the United Kingdom and worldwide. The code mentioned in the title is an intended throwback f ...
'' refers to a German spy in
Cairo Cairo ( ; ar, القاهرة, al-Qāhirah, ) is the capital of Egypt and its largest city, home to 10 million people. It is also part of the largest urban agglomeration in Africa, the Arab world and the Middle East: The Greater Cairo metro ...
using
Daphne du Maurier Dame Daphne du Maurier, Lady Browning, (; 13 May 1907 – 19 April 1989) was an English novelist, biographer and playwright. Her parents were actor-manager Sir Gerald du Maurier and his wife, actress Muriel Beaumont. Her grandfather was Geor ...
's novel ''
Rebecca Rebecca, ; Syriac: , ) from the Hebrew (lit., 'connection'), from Semitic root , 'to tie, couple or join', 'to secure', or 'to snare') () appears in the Hebrew Bible as the wife of Isaac and the mother of Jacob and Esau. According to biblical ...
'' as the basis of a code. * In ''
A Presumption of Death ''A Presumption of Death'' is a 2002 Lord Peter Wimsey– Harriet Vane mystery novel by Jill Paton Walsh, based loosely on ''The Wimsey Papers'' by Dorothy L. Sayers. The novel is Walsh's first original Lord Peter Wimsey novel, following ''T ...
'',
Lord Peter Wimsey Lord Peter Death Bredon Wimsey (later 17th Duke of Denver) is the fictional protagonist in a series of detective novels and short stories by Dorothy L. Sayers (and their continuation by Jill Paton Walsh). A dilettante who solves mysteries for ...
, on assignment for British Intelligence in World War II Nazi-occupied Europe, uses a code based on the works of
John Donne John Donne ( ; 22 January 1572 – 31 March 1631) was an English poet, scholar, soldier and secretary born into a recusant family, who later became a clergy, cleric in the Church of England. Under royal patronage, he was made Dean of St Paul's ...
. The Germans break the code, coming near to catching Wimsey and Bunter. Wimsey then improvises a new code, based on an unpublished text known only to himself and his wife. *
Graham Greene Henry Graham Greene (2 October 1904 – 3 April 1991) was an English writer and journalist regarded by many as one of the leading English novelists of the 20th century. Combining literary acclaim with widespread popularity, Greene acquir ...
's protagonists often use book codes. In '' The Human Factor'', several books are used, and an edition of
Charles Lamb Charles Lamb (10 February 1775 – 27 December 1834) was an English essayist, poet, and antiquarian, best known for his ''Essays of Elia'' and for the children's book ''Tales from Shakespeare'', co-authored with his sister, Mary Lamb (1764–18 ...
's ''
Tales from Shakespeare ''Tales from Shakespeare'' is an English children's book written by the siblings Charles and Mary Lamb in 1807, intended "for the use of young persons" while retaining as much Shakespearean language as possible. Mary Lamb was responsible for r ...
'' is used in ''
Our Man in Havana ''Our Man in Havana'' (1958) is a novel set in Cuba by the British author Graham Greene. He makes fun of intelligence services, especially the British MI6, and their willingness to believe reports from their local informants. The book predates ...
''. * A book cipher plays an important role in the TV version of ''
Sharpe's Sword ''Sharpe's Sword'' is a historical novel in the Richard Sharpe series by Bernard Cornwell. It is the fourth in the series, being first published in 1983, though the fourteenth chronologically. Set in the summer of 1812 including the Battle of ...
''. The key text is Voltaire's ''
Candide ( , ) is a French satire written by Voltaire, a philosopher of the Age of Enlightenment, first published in 1759. The novella has been widely translated, with English versions titled ''Candide: or, All for the Best'' (1759); ''Candide: or, The ...
''. * In the 2004 film ''
National Treasure The idea of national treasure, like national epics and national anthems, is part of the language of romantic nationalism, which arose in the late 18th century and 19th centuries. Nationalism is an ideology that supports the nation as the fundame ...
'', an "Ottendorf cipher" is discovered on the back of the
U.S. Declaration of Independence The United States Declaration of Independence, formally The unanimous Declaration of the thirteen States of America, is the pronouncement and founding document adopted by the Second Continental Congress meeting at Pennsylvania State House (l ...
, using the " Silence Dogood" letters as the key text. * The protagonists of the
Matthew Reilly Matthew John Reilly (born 2 July 1974) is an internationally bestselling Australian action thriller writer.
". Retrieved 10 ...
novel ''
The Six Sacred Stones ''The Six Sacred Stones'' is a novel by Australian thriller author Matthew Reilly. It is a sequel to ''Seven Ancient Wonders'' (released as ''Seven Deadly Wonders'' in the United States) and '' The Five Greatest Warriors'' is its sequel. The ...
'' used a book cipher to send confidential messages to each other. The key text was the
Harry Potter ''Harry Potter'' is a series of seven fantasy literature, fantasy novels written by British author J. K. Rowling. The novels chronicle the lives of a young Magician (fantasy), wizard, Harry Potter (character), Harry Potter, and his friends ...
books, but the messages were sent ''via'' a ''
The Lord of the Rings ''The Lord of the Rings'' is an epic high-fantasy novel by English author and scholar J. R. R. Tolkien. Set in Middle-earth, intended to be Earth at some time in the distant past, the story began as a sequel to Tolkien's 1937 children's boo ...
'' forum to make the key text harder to identify. * In ''
Lost Lost may refer to getting lost, or to: Geography *Lost, Aberdeenshire, a hamlet in Scotland * Lake Okeechobee Scenic Trail, or LOST, a hiking and cycling trail in Florida, US History *Abbreviation of lost work, any work which is known to have bee ...
: Mystery of the Island'', a series of four
jigsaw puzzle A jigsaw puzzle is a tiling puzzle that requires the assembly of often irregularly shaped interlocking and mosaiced pieces, each of which typically has a portion of a picture. When assembled, the puzzle pieces produce a complete picture. In th ...
s released in 2007, Ottendorf cipher was used on each puzzle's box to hide spoilers and reveal information about the show to the fans. * "The Fisher King", a two-part episode of ''
Criminal Minds ''Criminal Minds'' is an American police procedural crime drama television series created and produced by Jeff Davis (writer), Jeff Davis. The series premiered on CBS on September 22, 2005, and originally concluded on February 19, 2020; it was r ...
'', features an Ottendorf cipher brought to the
Behavioral Analysis Unit The Behavioral Analysis Unit (BAU) is a department of the Federal Bureau of Investigation's National Center for the Analysis of Violent Crime (NCAVC) that uses behavioral analysts to assist in criminal investigations. The mission of the NCAVC a ...
by the UNSUB via Agent Hotchner's wife. The cypher was part of a larger puzzle to find a girl who had been missing for two years. The key text was ''
The Collector ''The Collector'' is a 1963 thriller novel by English author John Fowles, in his literary debut. Its plot follows a lonely, psychotic young man who kidnaps a female art student in London and holds her captive in the cellar of his rural farmhous ...
'' by
John Fowles John Robert Fowles (; 31 March 1926 – 5 November 2005) was an English novelist of international renown, critically positioned between modernism and postmodernism. His work was influenced by Jean-Paul Sartre and Albert Camus, among others. Aft ...
. * ''
Burn Notice ''Burn Notice'' is an American espionage television series created by Matt Nix, which originally aired on the USA Network for a total of seven seasons from June 28, 2007, to September 12, 2013. The show stars Jeffrey Donovan, Gabrielle Anwar, ...
'' (episodes "Where There's Smoke" and "Center of the Storm", 2010): Michael Westen steals a Bible from a safe deposit box that is the code book of Simon. This becomes part of the season plot to track an organization starting wars for profit as Michael tries to arrange an interview with Simon. *In the episode "
The Blind Banker "The Blind Banker" is the second episode of the television series '' Sherlock,'' first broadcast on BBC One and BBC HD on 1 August 2010. It was written by Stephen Thompson and directed by Euros Lyn. ''Sherlock'' is a loose adaptation of Arthur C ...
" of the BBC series '' Sherlock'',
Sherlock Holmes Sherlock Holmes () is a fictional detective created by British author Arthur Conan Doyle. Referring to himself as a " consulting detective" in the stories, Holmes is known for his proficiency with observation, deduction, forensic science and ...
searches for a book that is the key to a cipher being used by Chinese Tong smugglers to communicate with their agents and with each other through graffiti messages. He eventually finds it: the London A-Z. * In the film ''
Unknown Unknown or The Unknown may refer to: Film * The Unknown (1915 comedy film), ''The Unknown'' (1915 comedy film), a silent boxing film * The Unknown (1915 drama film), ''The Unknown'' (1915 drama film) * The Unknown (1927 film), ''The Unknown'' (1 ...
'' (2011), Prof. Bressler's passwords are obscured by an Ottendorf cipher. * In ''
The Unit ''The Unit'' is an American action-drama television series created by David Mamet that aired on CBS from March 7, 2006, to May 10, 2009 with the total of four seasons and 69 episodes. The series focuses on a top-secret military unit modeled aft ...
'' episode "
Paradise Lost ''Paradise Lost'' is an epic poem in blank verse by the 17th-century English poet John Milton (1608–1674). The first version, published in 1667, consists of ten books with over ten thousand lines of verse (poetry), verse. A second edition fo ...
", Jonas Blane (aka Snake Doctor) uses a book code from the poem ''
Paradise Lost ''Paradise Lost'' is an epic poem in blank verse by the 17th-century English poet John Milton (1608–1674). The first version, published in 1667, consists of ten books with over ten thousand lines of verse (poetry), verse. A second edition fo ...
'' to communicate to his wife, Molly, that he has arrived safely in Panama. * In "
The Good Soldier Švejk ''The Good Soldier Švejk'' () is an unfinished satirical dark comedy novel by Czech writer Jaroslav Hašek, published in 1921–1923, about a good-humored, simple-minded, middle-aged man who pretends to be enthusiastic to serve Austria-Hungary i ...
" by
Jaroslav Hašek Jaroslav Hašek (; 1883–1923) was a Czech writer, humorist, satirist, journalist, bohemian and anarchist. He is best known for his novel '' The Fate of the Good Soldier Švejk during the World War'', an unfinished collection of farcical incide ...
, the officers in Švejk's
battalion A battalion is a military unit, typically consisting of 300 to 1,200 soldiers commanded by a lieutenant colonel, and subdivided into a number of companies (usually each commanded by a major or a captain). In some countries, battalions are ...
attempt to use a book cipher. Their attempts are undone, however, when it is revealed that the novel in question is composed of two volumes, and Švejk has delivered the first volume to the officers, thinking that they intended to read the novel, rather than the second, which is used for the cipher. Furthermore, the key to the cipher is identical to an example given in a published military textbook. * In ''
An Instance of the Fingerpost ''An Instance of the Fingerpost'' is a 1997 historical mystery novel by Iain Pears. Synopsis A murder in 17th-century Oxford is related from the contradictory points of view of four of the characters, all of them unreliable narrators. The set ...
'', a
historical mystery The historical mystery or historical whodunit is a subgenre of two literary genres, historical fiction and mystery fiction. These works are set in a time period considered historical from the author's perspective, and the central plot involves t ...
by
Iain Pears Iain George Pears (born 8 August 1955) is an English art historian, novelist and journalist. Personal life Pears was born on 8 August 1955 in Coventry, England. He was educated at Warwick School, an all-boys public school in Warwick. He studied ...
, a book cipher conceals one character's family history and its relationship with the
English Civil War The English Civil War (1642–1651) was a series of civil wars and political machinations between Parliamentarians (" Roundheads") and Royalists led by Charles I ("Cavaliers"), mainly over the manner of England's governance and issues of re ...
. * In John Le Carre's
A Perfect Spy ''A Perfect Spy'' (1986) is a novel by British author John le Carré about the mental and moral dissolution of a high-level intelligence-officer. Major aspects of the novel are lifted from the real life of the author, including the relationsh ...
, the protagonist Magnus Pym uses a book cipher based on the German text Simplicissimus. * In the movie '' Manhunter'',
Hannibal Lecter Dr. Hannibal Lecter is a Character (arts), fictional character created by the novelist Thomas Harris. Lecter is a serial killer who Human cannibalism, eats his victims. Before his capture, he was a respected Forensic psychiatry, forensic psychi ...
, who is in prison, communicates in a
personal ad A personal advertisement, sometimes called a contact ad, is a form of classified advertising in which a person seeks to find another person for friendship, romance, marriage, or sexual activity. In British English, it is commonly known as an adve ...
in a newspaper using a book code the police know is not what he says it is (he mentions verses in the Bible, but some of the chapter numbers are not valid.) The police later discover which book Lecter was actually using, and he has given the man the home address of an FBI profiler, Will Graham, and warned the man to kill Graham. *In The Darwin Code by J D Welch, Jess uses a Shakespearean speech to construct a book cipher to communicate with an enemy who may or may not be an ally. *In Bitterblue by Kristin Cashore, Bitterblue uses a book(?) code to unlock secrets of her father's reign as king. *In the TV series ''
Deutschland 83 ''Deutschland 83'' is a 2015 German television series starring Jonas Nay as a 24-year-old native of East Germany who, in 1983, is sent to West Germany as an undercover spy for the HVA, the foreign intelligence agency of the Stasi. It is a co-pr ...
'', protagonist Martin Rauch's
East German East Germany, officially the German Democratic Republic (GDR; german: Deutsche Demokratische Republik, , DDR, ), was a country that existed from its creation on 7 October 1949 until its dissolution on 3 October 1990. In these years the state ...
handlers use a book cipher to communicate with him while he is undercover in
West Germany West Germany is the colloquial term used to indicate the Federal Republic of Germany (FRG; german: Bundesrepublik Deutschland , BRD) between its formation on 23 May 1949 and the German reunification through the accession of East Germany on 3 O ...
. *In the Series 2 finale of the BBC TV show
Luther Luther may refer to: People * Martin Luther (1483–1546), German monk credited with initiating the Protestant Reformation * Martin Luther King Jr. (1929-1968), American minister and leader in the American civil rights movement * Luther (give ...
, 2 brothers use a Book Cipher. Luther determines they must be using a book that is readily available in case the book is lost and/or so the users can always have it to hand. This leads him to discovering the Book Cipher is using Gideon's Bible.


See also

*
Running key cipher In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream. Usually, the book to be used would be agreed ahead of time, while ...
*
Codebook A codebook is a type of document used for gathering and storing cryptography codes. Originally codebooks were often literally , but today codebook is a byword for the complete record of a series of codes, regardless of physical format. Cryptog ...


References

{{Cryptography navbox , classical . Classical ciphers