Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Encryption Security The Military

A 1941 Paper-and-Pencil Cipher 75

Schneier's blog links to a photo of a 68-year-old code being employed in wartime, with a plausible explanation of what is going on in it. (The photo is from the Life Magazine archive we discussed when it went live.) "What you see here is a photo that never should have been allowed to be taken, and one which provides an amazing, one-of-a-kind glimpse into the world of WWII espionage and counter-espionage. As far as I can tell, what is shown in this picture is an FBI agent in New York encrypting a message, passed from 'DUNN'... through Sebold, prior to transmitting that message to Germany via shortwave radio. ... [T]his appears to be real cryptology at work."
This discussion has been archived. No new comments can be posted.

A 1941 Paper-and-Pencil Cipher

Comments Filter:
  • Duh? (Score:5, Funny)

    by east coast ( 590680 ) on Saturday November 29, 2008 @05:03PM (#25928013)
    Why didn't he just use a computer for this? I swear, those people were so dense.
    • Re:Duh? (Score:5, Funny)

      by bobdotorg ( 598873 ) on Saturday November 29, 2008 @05:28PM (#25928151)

      Why didn't he just use a computer for this? I swear, those people were so dense.

      They weren't dense, Windows DE (Depression Edition) kept crashing that day with repeated PCODs (Punch Cards of Death).

      Though now that I think about it, I've come to the realization that every version of Windows is Windows DE.

      • Re: (Score:1, Funny)

        by Anonymous Coward

        They weren't dense, Windows DE (Depression Edition) kept crashing that day with repeated PCODs (Punch Cards of Death).

        And 60 years later, we realize that even in the future nothing works.

      • Re:Duh? (Score:4, Informative)

        by corsec67 ( 627446 ) on Saturday November 29, 2008 @06:14PM (#25928383) Homepage Journal

        Punch Cards of Death

        Would that be a IBM Doily [wikipedia.org]?

        • Re:Duh? (Score:5, Interesting)

          by Sanat ( 702 ) on Saturday November 29, 2008 @08:59PM (#25929293)

          Back in the day of card punches in order to certify that a card punch was working properly a whole box (qty 2000) cards were fed, punched and read with only one error permitted. This was CDC equipment on the CDC 3100 and 3200 models.

          If something was not quite adjusted properly usually a failure would occur much earlier in the cycle.

          Sending out a new operating system was done with punch cards. A simple bootstrap program was keyed into the core and executed which would input from the card reader and a whole box of cards needed to be read without error.

          The CDC card punch (can not remember the model number ... maybe 3114) also had a read station in it so that a read after write cycle could be employed. The error exit could be used to offset the card in the output deck about 1/4 of an inch so that the individual card could be easily located and re-punched.

          Reading a lace card was a real dicey test. Usually we alternated rows and columns.

          PCOD sounds about right.

          • by dpilot ( 134227 )

            > Reading a lace card was a real dicey test.

            I thought lace cards were what you stuck in the decks of other people in the computer lab, not your own. Kind of like "How many med students does it take to screw in a light bulb?"

            Caveat: I have done real work with punch cards, I even made a lace card for the fun of it, and to see how fragile it was. But I have never stuck such a card anywhere where it could be fed into a reader.

            • by Reziac ( 43301 ) *

              I still have a couple of lace cards Here Somewhere, from high school... dunno who made them, but they floated around our computer programming class.

              I remember when we got a paper tape reader... it was a big upgrade over loading our IBM1620's OS from punch cards!

            • I thought lace cards were what you stuck in the decks of other people in the computer lab, not your own. Kind of like "How many med students does it take to screw in a light bulb?"

              As I recall, the most entertainment with punchcards wasn't slipping lace cards into someone else's deck, but in taking blank cards, punching them as an 80-column 'DUP' field, and sticking them onto the program drums of the IBM 029 keypunch machines, then flipping the program mode switch to 'ON'. An unsuspecting user sitting down to punch out some cards for their FORTRAN program without noticing either the program card or the switch position would punch their first card normally, then as soon as it registere

    • Re:Duh? (Score:5, Informative)

      by Anonymous Coward on Saturday November 29, 2008 @06:13PM (#25928367)

      Actually, back then he probably was the "computer."

      It had a definition before we invented the machines.

    • Schneier's post (Score:5, Informative)

      by bobbozzo ( 622815 ) on Saturday November 29, 2008 @07:10PM (#25928707)

      Since tfa didn't link to Schneier's blog, here it is:
      http://www.schneier.com/blog/archives/2008/11/1941_pencil-and.html [schneier.com]

    • Re:Duh? (Score:4, Informative)

      by timeOday ( 582209 ) on Saturday November 29, 2008 @07:43PM (#25928883)

      Why didn't he just use a computer for this?

      Actually he was a computer - that's what they called people [wheels.org] who did mundane computations before machines took over their job.

      • by WED Fan ( 911325 ) <akahige@[ ]shmail.net ['tra' in gap]> on Saturday November 29, 2008 @07:52PM (#25928933) Homepage Journal

        Actually he was a computer - that's what they called people...

        I'm confused, I thought...

        Soylent Green == People

        Computers == People

        Soylent Green is edible.

        People are edible.

        Question: Will be Dell laptop work with a South Beach diet?

      • by z-j-y ( 1056250 )

        Actually he was a computer - that's what they called people who did mundane computations before machines took over their job.

        I doubt that his job was mundane or his title was "computer". Cryptanalysis is more than just some algorithms, you cannot crack the codes by using computers (meat or electronic) alone without human insight and intelligence(which we don't know how to program yet)

    • He didn't use a computer because the Americans were too thick to develop one. We had them in the UK more than a year before that photograph was taken!
  • Human computers (Score:5, Insightful)

    by El Lobo ( 994537 ) on Saturday November 29, 2008 @05:17PM (#25928095)
    More than 13 000 special trained persons worked with encryption/decryption related tasks in WWII (and that's allies only). Yes, there were no computers then the way we know them now, but 13 000 people working shifts day and night was a significant force as well.
  • Very cool; this is handy for beginning students and those keeping a history of cryptography, which boomed starting with WWII.

  • Double bluff (Score:5, Insightful)

    by adamwright ( 536224 ) on Saturday November 29, 2008 @05:32PM (#25928171) Homepage

    We may consider, however, that the people allowing the photograph to be taken may not have been *entirely* honest when setting up the contents and cryptographic "method" being demonstrated.

    • Re:Double bluff (Score:5, Informative)

      by devnullkac ( 223246 ) on Saturday November 29, 2008 @07:41PM (#25928871) Homepage

      There is another picture [google.com] with the same message apparently being approved by Hoover. It also shows most of the text so carefully covered up in the photo in TFA. Part of it is in shadow and perhaps someone more skilled than I with GIMP can tease it out (frankly, I think you'll need access to the photographic negative), but "... the following message to:" is what's visible. This lends credence to the "setup" theory, since that's hardly worth covering up for a photo op and even if it were, why be so careless as to reveal it in another photo (on J. Edgar Hoover's desk, no less).

    • Re: (Score:3, Interesting)

      by Z00L00K ( 682162 )

      It is possible that this was a partial setup, but in this case it was the question of a deception message that was about to be sent using encryption that was probably already blown at the time.

      And mind that the encryption wasn't US encryption, but German encryption so if the encryption was blown and the agent was already cold then it may have been a semi-arranged situation where it was real life data that already had cooled that was used.

      And the whole setup could have been intentional from the intelligence

      • by jdege ( 88942 )

        It is possible that this was a partial setup, but in this case it was the question of a deception message that was about to be sent using encryption that was probably already blown at the time.

        Yep.

        The worksheet shows the cryptanalysis of a simple transposition cipher using a technique that was included in Helen Gaines' "Elementary Cryptanalysis", published in 1939.

        Whether it was ever a secure cipher I can't say. But by the late 30's, it was appearing in the advanced puzzle magazines.

  • I don't see what the big deal is. You guys have never seen someone doing a word search puzzle before?
  • by Doc Ruby ( 173196 ) on Saturday November 29, 2008 @06:47PM (#25928585) Homepage Journal

    What is at work there is cryptography , not just "cryptology. It's actually the generation of encoded symbols, not just any practice connected to the study of hiding information.

    • Maybe the blogger was using "this" to mean his own post. He was using cryptology to figure out what was going on in the picture.
  • July 1940 != prewar (Score:2, Interesting)

    by Anonymous Coward

    Just because America was neutral doesn't mean the war hadn't started.

    • Re: (Score:3, Insightful)

      by IvyKing ( 732111 )
      Since the US did not declare war on Japan until December 8, 1941 (and Germany on December 11, 1941) July 1940 is legitimately pre-war as far as the US is concerned. BTW, the first US casualties from WW2 took place in China in 1937.
      • Re: (Score:3, Funny)

        by vux984 ( 928602 )

        Since the US did not declare war on Japan until December 8, 1941 (and Germany on December 11, 1941) July 1940 is legitimately pre-war as far as the US is concerned.

        er... By that logic since Switzerland did not declare war at all, July 1940 is legitimately 'prewar' for them too? Of course, so is November 2008... in fact as far was the Swiss are concerned there was no war?

        Are we still 'legitimately pre-World War II as far as the Swiss are concerned'?

        Any Swiss care to weigh in on this absurdity? ;)

        • by z-j-y ( 1056250 )

          To be fair, it's pretty hard to count all the wars in Europe.

        • by IvyKing ( 732111 )

          er... By that logic since Switzerland did not declare war at all, July 1940 is legitimately 'prewar' for them too?

          Since Switzerland didn't declare war, "pre-war" is a non-sequitor for them. The US was still pretty much on a peace-time economy in 1940 and full war time conditions didn't start until December 1941.

          I agree with the Chinese viewpoint that WW2 started in 1931 as there was pretty much continuous fighting taking place there until 1945 - the US had sent the "Flying Tigers" to help out the Chinese prior to the Pearl Harbor attack and a US gunboat was sunk by the Japanese in 1937. The Eurocentric view is that

          • Re: (Score:3, Informative)

            by vux984 ( 928602 )

            Since Switzerland didn't declare war, "pre-war" is a non-sequitor for them.

            Not at all. Just because a country wasn't in the war, that doesn't mean they don't acknowledge that it existed, that it started or that it ended. Switzerland can talk about what it was doing pre-WW2, post-WW2, and during WW2 without it being a non-sequitor.

            I agree with the Chinese viewpoint that WW2 started in 1931...

            The date the world has agreed a war started is pretty arbitrary in almost ANY war, but it serves as useful frame of r

    • by lysergic.acid ( 845423 ) on Saturday November 29, 2008 @08:18PM (#25929089) Homepage

      according to the comments FTA, the phrase "pre-war German espionage code" is referring to the age of the encryption algorithm being used, not when it was used in the photo:

      Thiago: It's not meant to be Americentric: Duquesne entered German service in February 1939, and I'm willing to bet that the cipher in question dates back earlier than that, based on what I know of wartime crypto history. As I recall, at the time (1939-1941) the high-level military and diplomatic traffic was encrypted with Enigma machines, and everything else used codes that dated back to the early 1930s, or before (and were fairly easily broken by, e.g., Bletchley Park.)

      Hence, "pre-war", as opposed to a later, military, war-time code.

  • The cipher (Score:3, Informative)

    by Anonymous Coward on Saturday November 29, 2008 @07:18PM (#25928747)
    from comments under the article (for those who don't read comments except on slashdot):
    It looks to be just a transposition cypher. The "key" is the arrangement of columns from 1-18. You write the message down with 18 columns across, then read down each column in the order given by the key, grouping in 5s. I suspect the caption is actually correct ... you wouldn't need such a complicated worksheet and all those typed strips for encryption, but they would make it easier to get the columns lined up when decrypting, so I imagine the cryptographer is decrypting the message to make sure it was encrypted correctly before sending it.
    • by jdege ( 88942 )

      I've posted it over there, I'll post it here.

      Read section 12-3 of FM 34-40-2:

      http://www.umich.edu/~umich/fm-34-40-2/ch12.pdf [umich.edu]

      This technique of solving incomplete columnar transposition ciphers had been described in the open literature prior to 1941.

      It was described in Helen Gaines' "Elementary Cryptanalysis", published in 1939. Many of the techniques in Gaines' book originated in M.E. Ohaver's column "Solving Cipher Secrets", in "Flynn's Weekly Detective Fiction" magazine, which ran from 1924 to 1928. I'd

      • by jdege ( 88942 )

        It's beyond the realm of possibility that any German intelligence agency would have been using single transposition in 1941.

        Or not!

        I was reading David Kahn's "The Reader of Gentlemen's Mail" - his biography of Herbert Yardley. In 1941, Yardley was working with the Canadian government, helping them set up a crypto bureau. Most of what they were cracking were messages to German spies working in South America - and yes, they really were using a simple transposition cipher, just like had been appearing in puzzle books for decades.

Your password is pitifully obvious.

Working...