30/08/2025
Can a Vigenere Cipher be Broken without Key Repetition?
I uploaded a new article about this: "Solving Running Key Ciphers (Manually/Digitally)".
28/08/2025
A Florentine Polyalphabetic Cipher from the 1480s
This induced me to collect specimens of polyalphabetic ciphers known to me as a new article, "Polyalphabetic Ciphers before 1600".
18/08/2025
Japanese Cipher Disks during the Meiji Period
While some of these have already been mentioned in some of my articles, I sorted those with new materials I came across recently, including (1) telegrams in relation to the assassination attempt on the Tsarevich (1891) (Wikipedia) and (2) photos of actual cipher disks used in post offices.
17/08/2025
Real Messages Encrypted by Japanese RED Machine
The messages are:
(1) Ambassador in Berlin ("Mushakoji" [Wikipedia]) to Foreign Minister in Tokyo (Arita [Wikipedia]), 4 January 1937 (ciphertext, raw decryption, English translation).
(2) From Tokyo to ambassador in Berlin, 8 January 1937 (ciphertext, raw decryption) with decryption in romaji and English translation (somehow dated "9 January 1937").
Bouchaudy learned of this document from George Lasry in June 2025, who quickly found the key to the two messages. Then, Bouchaudy succeeded in reproducing the decryption by the RED simulator he developed.
He reports the results on his website, in which I contributed in parsing the raw decryption of the first message into words in Japanese.
For people interested in ciphertext encrypted by RED, Bouchaudy "created" 9 problems in the form of historical correspondence among US codebreakers. He tells us they (not authentic RED messages) are based on the wiring of the examples given in Alan G. Konheim (2007), Computer Security and Cryptography (which deals with RED and PURPLE in Chapter 7).
Deavours and Kruth (1985), Machine Cryptography and Modern Cryptanalysis has a paragraph in RED (p.213), but Bouchaudy tells us it is different from RED because it "has no Period".
11/08/2025
"Cipher Disk" before Alberti
I uploaded a short article about this: "Giovanni Fontana's "Cipher Disk" (ca. 1430) in an Encrypted Booklet". (This was delayed several weeks because of troubles of my PC....)
14/07/2025
An Original French Naval Code (1778)
It was for D'Agoût, governor of Saint Domingue (1777-1780). It is a two-part code consisting of a table for encoding in alphabetical order and a separate table for decoding in numerical order. The substitution table assigns three figures for the vowels and one figure to the other letters and the ampersand.
The nomenclature includes entries for syllables and common words. As was typical with French ciphers, some variants are covered by one entry: "action, s" (for "action", "actions"), "it, e" (for "it", "ite"), "puis, que" (for "puis", "puisque").
It should be noted that the codes are made on printed templates. The template for encoding has syllables and words printed in alphabetical order, with a section "NOMS de Lieux" in which place names are not printed and are filled when preparing a code for a specific application. The decoding table has printed numbers 1-850.
Pierrot et al. (2025) reports their reconstruction of a similar code used in 1782 between Guillaume de Bellecombe, governor of Saint Domingue a few years after D'Agoût (1782-1883), and the Secretary of State for the Navy. The number ranges up to 857. There might have been a necessity for additional entries 851-857 beyond the template range 1-850.
Contemporary French diplomatic codes I know had 1200 entries (Barbé-Marbois (1782), Luzerne (1781), Napoleonic age), larger than these naval codes. On the other hand, the code used in one undecoded message between Admiral D'Estaing and Gerard, French minister in Philadelphia, (1779) ("Unsolved Historical Ciphers") has a highest number 597.
13/07/2025
Tuple Ciphers (Enciphering a letter with two letters)
06/07/2025
Dutch Codebreaking Activities during WWI
04/07/2025
Verification of Decryption of Beale Cipher No.2
I uploaded a new article ("Errors in Beale Cipher No.2") about this.
(It's a pure coincidence that it's the Independence Day today.)
07/05/2025
A Cipher of Eleanor of Navarre (1476)
06/05/2025
Imperial Ambassadors in the 1520s (Juan Manuel, Alonso Sanchez)
29/04/2025
Lope de Soria's Cipher Letters (1523)
(The two recent additions to DECODE, R9531, R9530, are the cipher letters from which I reconstructed the keys in "Spanish Ciphers before Accession of King Ferdinand: 1470-1479" (Academia.edu).)
28/03/2025
Oral Cipher in Yoshiwara Pleasure Quarters in Edo
Women in the Yoshiwara pleasure quarters in Edo in the late eighteenth century used a cipher, called the Fukagawa Speak, in their conversation. I learned this from a contemporary novel depicted in a scene in a historical drama I watched on TV the other day. The scheme is simple enough: meaningless syllables "ka", "ke", "ki", "ko", "ku" are inserted in the message. But when used in conversation, the resulting sound would have been unintelligible to untrained ears.
Similar schemes, typically known as the tanuki cipher, have also been used in riddles for kids. (Tanuki means a raccoon dog, but may also be interpreted as "drop ta".)
And, of course, it's not limited to Japan. Even John Wilkins' Mercury (1641) mentions an example of a similar scheme: Ou
A Japanese translation of a mystery novel in English uses the Fukagawa Speak to render secret conversation in "King Tut English" among kids: A-bub-shush-o-lul-u-tut-e-lul-ylum.
I described these in a new article in Japanese, 深川言葉 ― 大河ドラマ「べらぼう」に出てきた遊里の暗号.
22/03/2025
Substitution Cipher for Hangul Text in a Book for Kids
(There is also a Chinese version of the book. It would be interesting to see how the cipher was adapted into Chinese. The Taiwan version skips the relevant volume (vol.11), so we need to look for Hong Kong or Mainland Chinese version.)
12/03/2025
D'Estrades' Ciphers with Mazarin and Others
(15 Mary 2025: I uploaded the key for the remaining Italian cipher reconstructed by George Lasry and Norbert Biermann. My parsing should be corrected in various ways: `41(LA) ¨33(R) ¨36(MA) ′56(TA) ¨41(NA) ′61(VA) `42(LE).)
28/02/2025
Chinese Telegraphic Codebook for Phrases (1948)
I got a copy of a Chinese telegraphic codebook (1948) including not only single characters but also phrases. It is Cheng yu Dian ma (成語電碼) already described in 「電碼――中国の文字コード」 (an abridged English version), but I now added three photos.
26/02/2025
A Cipher in Italian used between Cardinal Gualterio and the French Foreign Minister Torcy (1718)
21/02/2025
Yardley's Diplomatic Novel, Red Sun of Nippon (1934)
14/02/2025
Substitution Cipher in Hangul
Japanese text can be written with some fifty kana, which can be enciphered with substitution ciphers. (Historical examples can be seen e.g., at 明治日本の暗号いろいろ). The Chinese language employs thousands of characters, so any practical encryption in Chinese is based on numerical code of those Chinese characters.
What about Korean? I have long wondered whether substitution cipher is possible in Korean script (Hangul). This is because Hangul text is not simply a series of Hangul letters. Instead, two or three Hangul letters (consonant+vowel or consonant+vowel+consonant) are combined to form a syllabic block, which is the unit of writing (morphemic block). Moreover, placement of letters within a block differs depending on the vowel. The vowels for A, E, I (which have a vertical axis) are written to the right of the initial consonant, but the vowels for O and U (which have a horizontal axis) are written under the initial consonant. So, simply substituting one Hungul letter for another may result in a letter sequence that cannot be formed into morphemic blocks.
Now, I learned possible simple solutions to my question. There may be two ways for substitution ciphers to work in Hangul.
(i) Substitution is applied in separate groups for consonants and vowels. This way, the "consonant-vowel" grouping is preserved in substitution. This is the approach that AI (Copilot) on my new PC gave to my question. Actually, AI at first gave an example of a Caesar cipher of consonants alone. When I asked about vowels, AI gave a separate substitution table for vowels. I do not know whether this simple scheme really works for actual Hangul text. (For example, I hear not every consonant can be the third element in a block; there are letters that are not simple vowels or consonants.) To my repeated requests to give actual examples, AI simply ignored "in Hangul" and gave websites for the Caesar cipher in Japanese!
(ii) Substitution is applied to morphemic blocks rather than to letters. Unicode registers 11,172 Hangul morphemic blocks (399 consisting of two leters + 10,773 consisting of three letters). If we think this whole set as a single alphabet, substitution cipher can be used. (An attempt to use the Vigenere cipher in Hangul (pdf in Indonesian?) seems to use this approach.)
Googling now finds applications to use cipher in Hangul, but I still cannot find actual examples of substitution ciphers in Hangul. Considering that Hangul was not used in official documents until 1894 and that I have seen use of numerical codes for telegraphy (posted here), substitution in Hangul may not have been common historically.