HOME

TheInfoList



OR:

A null cipher, also known as concealment cipher, is an ancient form of
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
where the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
, which can be used to hide ciphertext. This is one of 3 categories of cipher used in
classical cryptography In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. ...
along with
Substitution ciphers In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, tri ...
and Transposition ciphers.


Classical cryptography

In
classical cryptography In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. ...
, a ''null'' is intended to confuse the
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
. In the most common form of a null cipher, the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is included within the
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext ...
and one needs to discard certain characters in order to decrypt the message (such as first letter, last letter, third letter of every second word, etc.) Most characters in such a cryptogram are nulls, only some are significant, and some others can be used as pointers to the significant ones. Here is an example null cipher message, sent by a German during
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, the United States, and the Ottoman Empire, with fightin ...
: Taking the first letter of every word reveals the hidden message "Pershing sails from N.Y. June I". Here is a more complicated example from England's Civil War which aided Royalist Sir John Trevanian in his escape from a Puritan castle in
Colchester Colchester ( ) is a city in Essex, in the East of England. It had a population of 122,000 in 2011. The demonym is Colcestrian. Colchester occupies the site of Camulodunum, the first major city in Roman Britain and its first capital. Colches ...
:
WORTHIE SIR JOHN, HOPE, THAT IS YE BESTE COMFORT OF YE AFFLICTED, CANNOT MUCH, I FEAR ME, HELP YOU NOW. THAT I WOULD SAY TO YOU, IS THIS ONLY: IF EVER I MAY BE ABLE TO REQUITE THAT I DO OWE YOU, STAND NOT UPON ASKING ME. TIS NOT MUCH THAT I CAN DO; BUT WHAT I CAN DO, BEE YE VERY SURE I WILL. I KNOW THAT, IF DETHE COMES, IF ORDINARY MEN FEAR IT, IT FRIGHTS NOT YOU, ACCOUNTING IT FOR A HIGH HONOUR, TO HAVE SUCH A REWARDE OF YOUR LOYALTY. PRAY YET YOU MAY BE SPARED THIS SOE BITTER, CUP. I FEAR NOT THAT YOU WILL GRUDGE ANY SUFFERINGS; ONLY IF BIE SUBMISSIONS YOU CAN TURN THEM AWAY, TIS THE PART OF A WISE MAN. TELL ME, AN IF YOU CAN, TO DO FOR YOU ANYTHINGE THAT YOU WOLDE HAVE DONE. THE GENERAL GOES BACK ON WEDNESDAY. RESTINGE YOUR SERVANT TO COMMAND.
The third letter after each punctuation reveals "Panel at East side of Chapel slides". A similar technique is to hide entire words, such as in this seemingly innocent message written by a prison inmate but deciphered by the FBI: Taking only every fifth word, one can reconstruct the hidden text which recommends a "hit" on someone: Other options include positioning of the significant letters next to or at certain intervals from punctuation marks or particular characters. Historically, users of concealment ciphers often used
substitution Substitution may refer to: Arts and media *Chord substitution, in music, swapping one chord for a related one within a chord progression * Substitution (poetry), a variation in poetic scansion * "Substitution" (song), a 2009 song by Silversun Pi ...
and
transposition cipher In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units of plaintext (typically characters or ...
s on the data prior to concealment. For example,
Cardinal Richelieu Armand Jean du Plessis, Duke of Richelieu (; 9 September 1585 – 4 December 1642), known as Cardinal Richelieu, was a French clergyman and statesman. He was also known as ''l'Éminence rouge'', or "the Red Eminence", a term derived from the ...
is said to have used a
grille Grill or grille may refer to: Food * Barbecue grill, a device or surface used for cooking food, usually fuelled by gas or charcoal, or the part of a cooker that performs this function * Flattop grill, a cooking device often used in restaurants, ...
to write secret messages, after which the blank spaces were filled out with extraneous matter to create the impression of a continuous text.


Dot null cipher

A dot or pinprick null cipher is a common classical encryption method in which dot or pinprick is placed above or below certain letters in a piece of writing. An early reference to this was when
Aeneas Tacticus Aeneas Tacticus ( grc-gre, Αἰνείας ὁ Τακτικός; fl. 4th century BC) was one of the earliest Greek writers on the art of war and is credited as the first author to provide a complete guide to securing military communications. Po ...
wrote about it in his book ''On the Defense of Fortifications.'' The Germans upgraded this to a dot of
invisible ink Invisible ink, also known as security ink or sympathetic ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means, such as heat or ultraviolet light. Invisible ...
during
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, the United States, and the Ottoman Empire, with fightin ...
and
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
. In England pinpricks in newspapers were once a popular way to send letters with little or no cost. If you place dots far apart, it could be used well. Make sure to keep the dots small and to use something that makes sense - no advanced computer coding books between package deliverers unless both have clearly indicated that they do it or are very interested in it. You also both need to know which page, chapter, article, or section is used, and if you plan to use this as a system you should find several places. Another option is to have an indicator, such as the date in a newspaper, which shows which page the message is on. This version is less secure.


Acrostics

The acrostic puzzle is an extended form of null cipher, but not an Anacrostic (in which you use a set of lettered clues with numbered blanks representing the letters of the answer to figure out the second part, a long series of numbered blanks and spaces representing a message into which the answers for the clues fit).
Acrostics An acrostic is a poetry, poem or other word composition in which the ''first'' letter (or syllable, or word) of each new line (or paragraph, or other recurring feature in the text) spells out a word, message or the alphabet. The term comes from ...
in poems and other written works that are not referenced to are a type of Null cipher. This method is often used to secretly insult a famous or important individual. For example,
Rolfe Humphries George Rolfe Humphries (November 20, 1894 in Philadelphia, Pennsylvania – April 22, 1969 in Redwood City, California) was a poet, translator, and teacher. Life An alumnus of Towanda High School, Humphries graduated cum laude from Amherst Co ...
received a lifelong ban from contributing to
Poetry Magazine ''Poetry'' (founded as ''Poetry: A Magazine of Verse'') has been published in Chicago since 1912. It is one of the leading monthly poetry journals in the English-speaking world. Founded by Harriet Monroe, it is now published by the Poetry Foundat ...
after he wrote and tried to publish "a poem containing a concealed scurrilous phrase aimed at a well-known person", namely
Nicholas Murray Butler Nicholas Murray Butler () was an American philosopher, diplomat, and educator. Butler was president of Columbia University, president of the Carnegie Endowment for International Peace, a recipient of the Nobel Peace Prize, and the deceased Ja ...
. This is the poem:
Niobe's daughters yearn to the womb again, Ionians bright and fair, to the chill stone; Chaos in cry,
Actaeon Actaeon (; grc, Ἀκταίων ''Aktaion''), in Greek mythology, son of the priestly herdsman Aristaeus and Autonoe in Boeotia, was a famous Theban hero. Like Achilles in a later generation, he was trained by the centaur Chiron. He fell to ...
's angry pack, Hounds of Molossus, shaggy wolves driven Over
Ampsanctus Ampsanctus, or Amsanctus (modern: Sorgente Mefita) was a small lake in the territory of the Hirpini, south of Aeclanum, close to the Via Appia (southern Italy). There are now two small pools which exhale carbonic acid gas and hydrogen sulfide. C ...
' vale and
Pentheus In Greek mythology, Pentheus (; grc, Πενθεύς, Pentheús) was a king of Thebes. His father was Echion, the wisest of the Spartoi. His mother was Agave, the daughter of Cadmus, the founder of Thebes, and the goddess Harmonia. His sister was ...
' glade, Laelaps and Ladon, Dromas,
Canace In Greek mythology, Canace (; Ancient Greek: Κανάκη means "‘barking") was a Thessalian princess as daughter of King Aeolus of Aeolia and Enarete, daughter of Deimachus. She was sometimes referrred as Aeolis. Family Canace was the sister ...
, As these in fury harry brake and hill So the great dogs of evil bay the world. Memory, Mother of
Muses In ancient Greek religion and mythology, the Muses ( grc, Μοῦσαι, Moûsai, el, Μούσες, Múses) are the inspirational goddesses of literature, science, and the arts. They were considered the source of the knowledge embodied in the p ...
, be resigned Until King
Saturn Saturn is the sixth planet from the Sun and the second-largest in the Solar System, after Jupiter. It is a gas giant with an average radius of about nine and a half times that of Earth. It has only one-eighth the average density of Earth; h ...
comes to rule again! Remember now no more the golden day Remember now no more the fading gold, Astraea fled,
Proserpina Proserpina ( , ) or Proserpine ( ) is an ancient Roman goddess whose iconography, functions and myths are virtually identical to those of Greek Persephone. Proserpina replaced or was combined with the ancient Roman fertility goddess Libera, whos ...
in
hell In religion and folklore, hell is a location in the afterlife in which evil souls are subjected to punitive suffering, most often through torture, as eternal punishment after death. Religions with a linear divine history often depict hell ...
; You searchers of the earth be reconciled! Because, through all the blight of human woe, Under Robigo's rust, and
Clotho Clotho (; el, Κλωθώ) is a mythological figure. She is the youngest of the Three Fates or Moirai who spins the thread of human life; the other two draw out (Lachesis) and cut (Atropos) in ancient Greek mythology. Her Roman equivalent is ...
's shears, The mind of man still keeps its argosies, Lacedaemonian Helen wakes her tower, Echo replies, and lamentation loud Reverberates from
Thrace Thrace (; el, Θράκη, Thráki; bg, Тракия, Trakiya; tr, Trakya) or Thrake is a geographical and historical region in Southeast Europe, now split among Bulgaria, Greece, and Turkey, which is bounded by the Balkan Mountains to t ...
to
Delos The island of Delos (; el, Δήλος ; Attic: , Doric: ), near Mykonos, near the centre of the Cyclades archipelago, is one of the most important mythological, historical, and archaeological sites in Greece. The excavations in the island are ...
Isle; Itylus grieves, for whom the
nightingale The common nightingale, rufous nightingale or simply nightingale (''Luscinia megarhynchos''), is a small passerine bird best known for its powerful and beautiful song. It was formerly classed as a member of the thrush family Turdidae, but is no ...
Sweetly as ever tunes her Daulian strain. And over
Tenedos Tenedos (, ''Tenedhos'', ), or Bozcaada in Turkish language, Turkish, is an island of Turkey in the northeastern part of the Aegean Sea. Administratively, the island constitutes the Bozcaada, Çanakkale, Bozcaada district of Çanakkale Provinc ...
the flagship burns. How shall men loiter when the great moon shines Opaque upon the sail, and
Argive Argos (; el, Άργος ; grc, label=Ancient and Katharevousa, Ἄργος ) is a city in Argolis, Peloponnese, Greece and is one of the oldest continuously inhabited cities in the world, and the oldest in Europe. It is the largest city in Arg ...
seas Rear like blue dolphins their cerulean curves? Samos is fallen,
Lesbos Lesbos or Lesvos ( el, Λέσβος, Lésvos ) is a Greek island located in the northeastern Aegean Sea. It has an area of with approximately of coastline, making it the third largest island in Greece. It is separated from Anatolia, Asia Minor ...
streams with fire, Etna in rage,
Canopus Canopus is the brightest star in the southern constellation of Carina (constellation), Carina and the list of brightest stars, second-brightest star in the night sky. It is also Bayer designation, designated α Carinae, which is Lat ...
cold in hate, Summon the Orphic bard to stranger dreams. And so for us who raise
Athene Athena or Athene, often given the epithet Pallas, is an ancient Greek goddess associated with wisdom, warfare, and handicraft who was later syncretized with the Roman goddess Minerva. Athena was regarded as the patron and protectress of va ...
's torch. Sufficient to her message in this hour: Sons of Columbia, awake, arise!


Definition of a null

Put simply, a null cipher is any cipher which involves a number of ''nulls,'' or decoy letters. As well as the methods shown above, a null cipher could be plaintext words with nulls placed in designated areas or even a plaintext message broken up in different positions with a null at the end of each word. However, a message with only a couple nulls (for example, one at the beginning and one at the end) is ''not'' a null cipher.


Usage

In general, it is difficult and time-consuming to produce covert texts that seem natural and would not raise suspicion, but if you are unable to use an advanced encryption method and have plenty of time, it might be a good option. If no key or actual encryption is involved, the security of the message relies entirely on the
secrecy Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controvers ...
of the concealment method. Null ciphers in modern times are used by prison inmates in an attempt to have their messages pass inspection. Null ciphers are one of three major cipher types in classical cryptography, but it is less well known as the others. It is often marked as a subcategory of transposition ciphers, but that is not true, as transposition ciphers are scrambled messages.


See also

*
Transposition cipher In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units of plaintext (typically characters or ...
*
Substitution ciphers In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, tri ...
*
Acrostic An acrostic is a poem or other word composition in which the ''first'' letter (or syllable, or word) of each new line (or paragraph, or other recurring feature in the text) spells out a word, message or the alphabet. The term comes from the Fre ...
* Nulls *
Cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
*
Code In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication ...
*
Classical Cryptography In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. ...
*
Cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
*
Steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...


References

{{Cryptography classical Classical ciphers Steganography