TRANSPOSITION cipher No. 90, reprinted below, can readily be solved by the methods for this system given in recent articles. But here we shall describe another method which depends upon knowing or guessing a word of the message longer than the key.
SLOOT NVEYP GNTES NDRPM ICOOR TNMEA HLAEY AHEST ELAMH YTEHY ECGEY BETML RGHOA GKVRR TPEDH UEAWE FMTEA TSSAL GBIAI NREEN
For example, if it is known or assumed that the above communication contains the word CRYPTOGRAM, the first step would be to tabulate the letters of this word together with the letters next following them as they occur in the cipher.
Sequences of this sort for C, R, Y, and P, are given in the accompanying table. The number after each pair of letters represents the interval between those letters in the word CRYPTOGRAM. Letters not occurring in this word—B* and E*—are marked with asterisks.
CO = 5 RP = 2 YP = 1 PG = 3 CG = 6 RT = 3 YA = 6 PM = 6 RR = 6 YT = 2 PE* RT = 3 YE* RE* YB*
If CRYPTOGRAM actually occurs in the message and is longer than the key word, in encipherment one or more of its last letters will have fallen in the same columns and directly beneath a corresponding number of its first letters. And the interval between these pairs of letters will equal the key.
The table shows intervals of six for CG, RR, YA, and PM. Accordingly, the cipher may now be transcribed in six columns of approximately the same length, when it will be easy to select the four columns containing the above sequences, and to rearrange all six columns so as to develop the word CRYPTOGRAM. This will also bring out the entire message, as well as the numerical key 145326—derived from CIPHER—thus:
1 4 5 3 2 6 S E V E R A L C R Y P T O G R A M S O F T H I S etc.
Message: Several cryptograms of this type can be solved together by multiple anagramming when they are of the same length and key.
As an exercise of the kind suggested in this message three cryptograms of the above type and of the same length and key are offered herewith in Cipher No. 100. The method of combining these three cryptograms for solution by the "multiple anagram "route will be described next week.
In the meantime, if you are not familiar with this method, you might try to solve any one of the three by some of the methods already given. The re-solution of any one of them must, of course, lead to the decipherment of the other two, since all three are in the same key.
Just as a suggestion, these messages are of a military nature. Hence, you might expect to encounter some military terms. We hesitate to mention any particular words or phrases since this would place the solution right in your hands. So just use your own judgment.
Look through the cryptograms, and then try to figure out what common military terms you can spell with the letters they contain. After you hit upon the right word or words the rest should be easy whatever method you follow. Do your best now, fans. And let us know what you do with them.
If you tried Cipher No. 91 (C. E. R.) to the tune of Aloha Oe, as our correspondent suggested, you probably did not know that you were singing the first stanza of that perennial favorite, "Mary's Little Lamb." But that's exactly what you did! And here's the alphabet that turned the , trick:
A he, le J li S o, to, ko B ku K nu T lu, la C me L ho U te D a, ka M ae, au V ha E po, lo, mo N pa, ka, u W ta F na O hu, oi X wu G ti P hi Y ma H pe, ke Q wi Z wo I no, e R i, ki
Ciphers of this kind can sometimes be solved by guessing one or more words of the message, or by otherwise determining which symbols stand for the same letters, thereby reducing them to simple ciphers. But this example is probably too short to solve thus. Also it is somewhat further complicated by using symbols of one and two units in the same alphabet.
Q. What is a chronogram? A. An inscription conveying a date. Thus the Roman numerals in "LorD haVe MerCIe Vpon Vs" express the year MDCLXVI (1666).
The chronogram is a device of the later Romans. In a good specimen every numerical letter should be counted. The above example appeared instead of the date at the bottom of the title page of a pamphlet issued in 1666, when a day of national humiliation was appointed in expectation of an engagement between the English and Dutch navies.
Cipher No. 96 (Perry Philips) conveyed the following message, fully descriptive of the method of encipherment: "If you would decipher this message, count back two places in the alphabet for each letter, and read each group backwards." The "R-2B" following the cryptogram was the key, "R" indicating the reversal of each group, and "2B" the backward count.
Just a few words, now, about this week's ciphers. No. 98 is proof conclusive that cryptography interests the fair sex as well as the "unfair." Miss Rose's contribution is a straight letter substitution, using a methodized alphabet. How many words will you decipher before you discover the plan of the alphabet?
No. 99 is somewhat more difficult, the cryptogram being continuously written and thus obviating the clews afforded by normal word divisions. Mr. Edwards is expressing himself, and enthusiastically, too, on a certain commodity known practically the world over! What is he saying?
CIPHER No. 98 (Miss Ramona Rose, Encanto, California).
GB ERIRNY GUR FZNYYRFG CNEG BS N FRPERG VF GB UBYQ GUR ERFG AB YBATRE VA LBHE CBJRE.
CIPHER No. 99 (J. C. Edwards, Montreal, Quebec, Canada).
9 6 2 56 4 24 2 56 8 6 90 6 2 56 45 79 9 6 34 2 6 5 35 3 0 35 5 34 79 56 56 24 2 24 35 3 6 9 6 24 35 45 0 4 0 80 2 56 6 78 46 9 34 2 24 3 6 7 2 57 2 34 34 0 34 57 0 79 24 90 6 0 7 2 35
CIPHER No. 100
(a) ESYED HILGR NAOSE PVTER MATYD NAMII W (b) NEMOE EMAIC UIUAS FNTDR MNSOE TNSLI O (c) HEORS EKHPR VSSSE IAOAN UIWAT DETXN N
Send in your answers, fans! Also your new ciphers. Keep the pot boiling! But don't forget to include explanations with all ciphers submitted for publication.
The answers to Ciphers Nos. 97, 98, 99, and 100 will appear next week.