HOME

TheInfoList



OR:

The poem code is a simple, and insecure, cryptographic method which was used during World War II by the British
Special Operations Executive The Special Operations Executive (SOE) was a secret British World War II organisation. It was officially formed on 22 July 1940 under Minister of Economic Warfare Hugh Dalton, from the amalgamation of three existing secret organisations. Its pu ...
(SOE) to communicate with their agents in Nazi-occupied Europe. The method works by the sender and receiver pre-arranging a
poem Poetry (derived from the Greek ''poiesis'', "making"), also called verse, is a form of literature that uses aesthetic and often rhythmic qualities of language − such as phonaesthetics, sound symbolism, and metre − to evoke meanings in ...
to use. The sender chooses a set number of words at random from the poem and gives each letter in the chosen words a number. The numbers are then used as a
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (map ...
for a
transposition cipher In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units of plaintext (typically characters or ...
to conceal the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
of the message. The cipher used was often double transposition. To indicate to the receiver which words had been chosen, an indicator group of letters is sent at the start of the message.


Description

To encrypt a message, the agent would select words from the poem as the key. Every poem code message commenced with an indicator group of five letters, whose position in the alphabet indicated which five words of an agent's poem would be used to encrypt the message. For instance, suppose the poem is the first stanza of
Jabberwocky "Jabberwocky" is a nonsense poem written by Lewis Carroll about the killing of a creature named "the Jabberwock". It was included in his 1871 novel ''Through the Looking-Glass'', the sequel to ''Alice's Adventures in Wonderland'' (1865). The bo ...
: ''’Twas brillig, and the slithy toves'' ''     Did gyre and gimble in the wabe:'' ''All mimsy were the borogoves,'' ''     And the mome raths outgrabe.'' We could select the five words THE WABE TOVES TWAS MOME, which are at positions 4, 13, 6, 1, and 21 in the poem, and describe them with the corresponding indicator group DMFAU. The five words are written sequentially, and their letters numbered to create a transposition key to encrypt a message. Numbering proceeds by first numbering the A's in the five words starting with 1, then continuing with the B's, then the C's, and so on; any absent letters are simply skipped. In our example of THE WABE TOVES TWAS MOME, the two A's are numbered 1, 2; the B is numbered 3; there are no C's or D's; the four E's are numbered 4, 5, 6, 7; there are no G's; the H is numbered 8; and so on through the alphabet. This results in a transposition key of 15 8 4, 19 1 3 5, 16 11 18 6 13, 17 20 2 14, 9 12 10 7. This defines a permutation which is used for encryption. First, the plaintext message is written in the rows of a grid that has as many columns as the transposition key is long. Then the columns are read out in the order given by the transposition key. For example, the plaintext "THE OPERATION TO DEMOLISH THE BUNKER IS TOMORROW AT ELEVEN RENDEZVOUS AT SIX AT FARMER JACQUES" would be written on grid paper, along with the transposition key numbers, like this:
15 8  4  19 1  3  5  16 11 18 6  13 17 20 2  14 9  12 10 7 
T  H  E  O  P  E  R  A  T  I  O  N  T  O  D  E  M  O  L  I
S  H  T  H  E  B  U  N  K  E  R  I  S  T  O  M  O  R  R  O
W  A  T  E  L  E  V  E  N  R  E  N  D  E  Z  V  O  U  S  A
T  S  I  X  A  T  F  A  R  M  E  R  J  A  C  Q  U  E  S  X
The columns would then be read out in the order specified by the transposition key numbers:
PELA DOZC EBET ETTI RUVF OREE IOAX HHAS MOOU LRSS TKNR ORUE NINR EMVQ TSWT ANEA TSDJ IERM OHEX OTEA
The indicator group (DMFAU) would then be prepended, resulting in this ciphertext:
DMFAU PELAD OZCEB ETETT IRUVF OREEI OAXHH ASMOO ULRSS TKNRO RUENI NREMV QTSWT ANEAT SDJIE RMOHE XOTEA
In most uses of code poems, this process of selecting an indicator group and transposing the text would be repeated once ( double transposition) to further scramble the letters. As an additional security measure, the agent would add prearranged errors into the text as security checks. For example, there might be an intentional error in every 18th letter to ensure that, if the agent was captured or the poem was found, the enemy might transmit without the security checks.


Analysis

The code's advantage is to provide relatively strong security while not requiring any codebook. However, the encryption process is error-prone when done by hand, and for security reasons, messages should be at least 200 words long. The security check was usually not effective: if a code was used after being intercepted and decoded by the enemy, any security checks were revealed. Further, the security check could often be tortured out from the agent. There are a number of other weaknesses * Because the poem is re-used, if one message is broken by any means (including threat, torture, or even
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
), past and future messages will be readable. * If the agent used the same poem code words to send a number of similar messages, these words could be discovered easily by enemy cryptographers. If the words could be identified as coming from a famous poem or quotation, then all of the future traffic submitted in that poem code could be read. The German cryptologic units were successful in decoding many of the poems by searching through collections of poems. * Since the poems used must be memorable for ease of use by an
agent Agent may refer to: Espionage, investigation, and law *, spies or intelligence officers * Law of agency, laws involving a person authorized to act on behalf of another ** Agent of record, a person with a contractual agreement with an insuranc ...
, there is a temptation to use well-known poems or poems from well-known poets, further weakening the encryption (e.g., SOE agents often used verses by
Shakespeare William Shakespeare ( 26 April 1564 – 23 April 1616) was an English playwright, poet and actor. He is widely regarded as the greatest writer in the English language and the world's pre-eminent dramatist. He is often called England's nation ...
,
Racine Jean-Baptiste Racine ( , ) (; 22 December 163921 April 1699) was a French dramatist, one of the three great playwrights of 17th-century France, along with Molière and Corneille as well as an important literary figure in the Western traditio ...
,
Tennyson Alfred Tennyson, 1st Baron Tennyson (6 August 1809 – 6 October 1892) was an English poet. He was the Poet Laureate during much of Queen Victoria's reign. In 1829, Tennyson was awarded the Chancellor's Gold Medal at Cambridge for one of his ...
,
Molière Jean-Baptiste Poquelin (, ; 15 January 1622 (baptised) – 17 February 1673), known by his stage name Molière (, , ), was a French playwright, actor, and poet, widely regarded as one of the greatest writers in the French language and world ...
,
Keats John Keats (31 October 1795 – 23 February 1821) was an English poet of the second generation of Romantic poets, with Lord Byron and Percy Bysshe Shelley. His poems had been in publication for less than four years when he died of tuberculos ...
, etc.).


Development

When
Leo Marks Leopold Samuel Marks, (24 September 1920 – 15 January 2001) was an English writer, screenwriter, and cryptographer. During the Second World War he headed the codes office supporting resistance agents in occupied Europe for the secret Special ...
was appointed codes officer of the
Special Operations Executive The Special Operations Executive (SOE) was a secret British World War II organisation. It was officially formed on 22 July 1940 under Minister of Economic Warfare Hugh Dalton, from the amalgamation of three existing secret organisations. Its pu ...
(SOE) in London during
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
, he very quickly recognized the weakness of the technique, and the consequent damage to agents and to their organizations on the Continent, and began to press for changes. Eventually, the SOE began using original compositions (thus not in any published collection of poems from any poet) to give added protection (see ''
The Life That I Have ''The Life That I Have'' (sometimes referred to as ''Yours'') is a short poem written by Leo Marks and used as a poem code in the Second World War. In the war, famous poems were used to encrypt messages. This was, however, found to be insecure b ...
'', an example). Frequently, the poems were humorous or overtly sexual to make them memorable ("Is de Gaulle's prick//Twelve inches thick//Can it rise//To the size//Of a proud flag-pole//And does the sun shine//From his arse-hole?"). Another improvement was to use a new poem for each message, where the poem was written on fabric rather than memorized. Gradually the SOE replaced the poem code with more secure methods. Worked-out Keys (WOKs) was the first major improvement – an invention of Marks. WOKs are pre-arranged transposition keys given to the agents and which made the poem unnecessary. Each message would be encrypted on one key, which was written on special silk. The key was disposed of, by tearing a piece off the silk, when the message was sent. A project of Marks, named by him "Operation Gift-Horse", was a deception scheme aimed to disguise the more secure WOK code traffic as poem code traffic, so that German cryptographers would think "Gift-Horsed" messages were easier to break than they actually were. This was done by adding false duplicate indicator groups to WOK-keys, to give the appearance that an agent had repeated the use of certain words of their code poem. The aim of Gift Horse was to waste the enemy's time, and was deployed prior to
D-Day The Normandy landings were the landing operations and associated airborne operations on Tuesday, 6 June 1944 of the Allied invasion of Normandy in Operation Overlord during World War II. Codenamed Operation Neptune and often referred to as D ...
, when code traffic increased dramatically. The poem code was ultimately replaced with the
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ran ...
, specifically the letter one-time pad (LOP). In LOP, the agent was provided with a string of letters and a substitution square. The plaintext was written under the string on the pad. The pairs of letters in each column (such as P,L) indicated a unique letter on the square (Q). The pad was never reused while the substitution square could be reused without loss of security. This enabled rapid and secure encoding of messages.


Bibliography

* ''
Between Silk and Cyanide ''Between Silk and Cyanide: A Codemaker's War 1941–1945'' is a memoir of public interest by former Special Operations Executive (SOE) cryptographer Leo Marks, describing his work including memorable events, actions and omissions of his colleague ...
'' by
Leo Marks Leopold Samuel Marks, (24 September 1920 – 15 January 2001) was an English writer, screenwriter, and cryptographer. During the Second World War he headed the codes office supporting resistance agents in occupied Europe for the secret Special ...
,
HarperCollins HarperCollins Publishers LLC is one of the Big Five English-language publishing companies, alongside Penguin Random House, Simon & Schuster, Hachette, and Macmillan. The company is headquartered in New York City and is a subsidiary of News Cor ...
(1998) ; Marks was the Head of Codes at SOE and this book is an account of his struggle to introduce better encryption for use by field agents; it contains more than 20 previously unpublished code poems by Marks, as well as descriptions of how they were used and by whom.


See also

*
Book cipher A book cipher, or Ottendorf cipher, is a cipher in which the key is some aspect of a book or other piece of text. Books, being common and widely available in modern times, are more convenient for this use than objects made specifically for crypto ...
* ''
The Life That I Have ''The Life That I Have'' (sometimes referred to as ''Yours'') is a short poem written by Leo Marks and used as a poem code in the Second World War. In the war, famous poems were used to encrypt messages. This was, however, found to be insecure b ...
'' (also known as ''Yours'', arguably the most famous code poem) {{Cryptography navbox, classical Classical ciphers History of cryptography Special Operations Executive
Cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...