US666520A - Cipher-code system. - Google Patents

Cipher-code system. Download PDF

Info

Publication number
US666520A
US666520A US2206100A US1900022061A US666520A US 666520 A US666520 A US 666520A US 2206100 A US2206100 A US 2206100A US 1900022061 A US1900022061 A US 1900022061A US 666520 A US666520 A US 666520A
Authority
US
United States
Prior art keywords
words
cipher
message
key
column
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US2206100A
Inventor
Charles P Hall
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EMMA C MORRISON
Original Assignee
EMMA C MORRISON
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EMMA C MORRISON filed Critical EMMA C MORRISON
Priority to US2206100A priority Critical patent/US666520A/en
Application granted granted Critical
Publication of US666520A publication Critical patent/US666520A/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes

Definitions

  • the object of the invention is to provide a new and improved cipher-code system arranged to permit the sending of long messages with the use of comparatively few words or numerals not liable to be deciphered by unauthorized persons, thus maintaining the desiredsecrecy and at the same time permitting the receiver to readily decipher the message.
  • Figure l is a face View of a page of theindeX-book.
  • Fig. 2 is a face view of the cryptograph message as made up by the sender.
  • Fig. 3 is a like view of the'same cryptograph message as deciphered by the receiver, and
  • Fig. 4 is a plan view of the key and the numerical value thereof.
  • the cipher-code system consists,essentially, of leaves preferably arranged in the form of a book, which I prefer to call an indexbook, and each page A contains one or more columns B of subject words or sentences, a column C of cipher words or symbols arranged alongside the column B and having singlesyllable words for one, two, or more of the subject-words in the column B.
  • a third column D contains cipher-numerals, one for each cipher-word, as will be readily understood by reference to Fig. l.
  • the key E consisting of a number of words or a sentence B', selected from the column B in the index-book, so that the words in the key have a numerical Value
  • the key consists of the sentence A new light on a dark matter, the numerical value for the several words corresponding to the numerals in the column D opposite the words in the column B.
  • the message is made up of cipher-words corresponding to the subject words or sentences of the message, the several cipher-words being joined together in groups of three or four according to the number of letters they contain, as it is Well known that telegraph companies allow only words of twelve letters or less, and hence the combination syllable-words should contain but twelve letters or less.
  • the receiver of the message thus formed separates the syllables and then refers to the index-book to find -the corresponding cipher-words and their meaning in the opposite subject words or sentences in the column B. For instance, if a grain and provision broker desires to advise.
  • bols corresponding to those numbers represent the cipher or secret message to be sent, which we nd on consulting the vocabulary to be as follows: Whapodi iklidus. Boyccuov abbaswyn. Taxikreskym stevtrip audiwitswop. Peas- Weer. Snolsmut foomruid otlebyvveag.
  • the above bears no resemblance to the former message, and it is also evident thatr as often as the key is changed a totallydifferent message will be the result. It is also palpable that the key can be changed ad injmtum. Let us now follow the message toits recipient and note the method by which it is deciphered.
  • the recipient separates the symbols, and if the symbol commences with a consonant it also ends with one, or if it commences with a vowel it ends with one, and as all symbols consist of not less than three nor more than four letters the task is easy, for if the first letter is a vowel and the third a consonant then the recipient knows that there are four letters in the symbol, or if the 'rst and third letters are vowels or are both consonants then the symbol contains only three letters.
  • the recipient finds the numerals D3 representing the cipher words or symbols, and these are written down in rotation, as shown in Fig. 3.
  • the recipient writes down beneath the numbers D representing the cipher words or symbols of the key E, or rather the numerals representing the same-that is, 1, 5772, 5040, e., (the second row above,) representing A new light on a dark matter.
  • the message received is the sum of the original message added to the key, it is plain that if the key E is subtracted from the message the remainder D2 will be the original. This the recipient proceeds to do, and should the key-numeral be larger than the message-numeral he adds 10,000 to the latter, as he knows that 10,000 is the highest limit of the series and that figures above that number are dis- 9717 139 9186 6554 Wheat advanced two points.
  • a cipher-code system having an indeX- page with a column containing subject words or sentences, a column containing cipher-numerals for the subject Words or sentences, and a key for the message and arranged for use in connection with the numerical value of the message, to change the numerical value thereof, as set forth.
  • a cipher-code system having an indexpage with a column containing subject words or sentences, a column containing cipher-numerals for the subject words or sentences, and a key for the message, and composed of a plurality of subject words or sentences selected from the subject word or sentence co1- umn, and having numerical value according to the numerals in said numeral-column of the index-page, as set forth.
  • a cipher code comprising anindeX-page having a column containing subject words or sentences, a second column containing single-syllable cipher-words, and a third column containing eipher-,numerals for the subject words or sentences, and a key for the IOO IIO

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)

Description

No. 666,520. Patented lan. 22, |90I. C. P. HALL.
CIPHER CODE SYSTEM.
(Application Bled June 29, LQQO.) (llo Model.) 2 Sheets-8heat 2.
Tai
d11.1111 11111110 1.10.1 1101 1011 1:1111 .11.10 10J/1 ,.111 y-.1111 '1 0111 .1.111 1101 111.1 1101 10.11 .1.1 1111 111.1 1 1010 .1111 7 .1111 1010 .1011 1 1010 l jup/110 1 1 1.110 .101i 11.111.111 1101 .100.1 .1.51 .1100
17a/fifi 69197.90 7.9' X769 X03/9 .3.363. 770 600.3 70.9,J/.94'f7 TTQV? 31,1110 .ff 1 1.110 1011 11.11 1.111 1101 100.1 1.1 1 .1100 f 1110 1 1010 1511 1 .1111 1010 1.111 1 1 010 y1/.111.1 1 011131111131 1 11.1 .1.1 01 .1 0.11 .110 1111 ATTORNEYS ma naam: mtas co.. wuruuwo.. wAsmNumn, n c.
UNTTED STATES PATENT Fries.
CHARLES P. HALL, OF NEW YORK, N. Y., ASSIGNOR TO CHARLES P. HALL AND FRANK HART, OF SAME PLACE, AND EMMA C. MORRISON, OF
TROY, NEW YORK.
CIPHER-CODE SYSTEM.
SPECIFICATION formingpart of Letters Patent No. 666,520, dated January 22, 1901.
Application filed June 29, 1900. Serial No. 22,061. (No model.)
To all whom it may concern,.-
Beit known that I, CHARLES P. HALL, a citizen of the United States, and a resident of the cit-y of New York, borough of Manhattan, in the county and State of New York, have invented a new and Improved Cipher-Code System, of which the following is a full, clear, and exact description.
The object of the invention is to provide a new and improved cipher-code system arranged to permit the sending of long messages with the use of comparatively few words or numerals not liable to be deciphered by unauthorized persons, thus maintaining the desiredsecrecy and at the same time permitting the receiver to readily decipher the message.
The invention consists of novel features and combinations of the same, as will be fully described hereinafter, and then pointed out in the claims.
The invention is illustrated in the accompanying drawings, forming a part of this specification, in which similar characters of reference indicate the various features of the invention.
Figure l is a face View of a page of theindeX-book. Fig. 2 is a face view of the cryptograph message as made up by the sender. Fig. 3 is a like view of the'same cryptograph message as deciphered by the receiver, and Fig. 4 is a plan view of the key and the numerical value thereof.
The cipher-code system consists,essentially, of leaves preferably arranged in the form of a book, which I prefer to call an indexbook, and each page A contains one or more columns B of subject words or sentences, a column C of cipher words or symbols arranged alongside the column B and having singlesyllable words for one, two, or more of the subject-words in the column B. A third column D contains cipher-numerals, one for each cipher-word, as will be readily understood by reference to Fig. l. In addition to the index-page keys are used, one of which is represented in Fig. 4, the key E consisting of a number of words or a sentence B', selected from the column B in the index-book, so that the words in the key have a numerical Value,
indicated by the corresponding numerals in the column D. For instance, as shown in Fig. 4, the key consists of the sentence A new light on a dark matter, the numerical value for the several words corresponding to the numerals in the column D opposite the words in the column B.
If it is the intention of the user to simply avoid exorbitant telegraph-tolls, the message is made up of cipher-words corresponding to the subject words or sentences of the message, the several cipher-words being joined together in groups of three or four according to the number of letters they contain, as it is Well known that telegraph companies allow only words of twelve letters or less, and hence the combination syllable-words should contain but twelve letters or less. The receiver of the message thus formed separates the syllables and then refers to the index-book to find -the corresponding cipher-words and their meaning in the opposite subject words or sentences in the column B. For instance, if a grain and provision broker desires to advise.
out-of-town customers of the state of the market he would wire the following sentences: Wheat advanced two points; corn a drugno change; oats off a point; flour in demand for export at seven-fifty; pork heavy; fair demand for mess beef by government. (Thirty words.) Turning to the index-book it Will be found that wheat is represented by whan, advanced by aibi, two by tyod, (C 77 plOZ LL @0F11 7 (5 Cuavp, C al 77 by alba, C drug (Gdyef), C( no i nid, change by chag, oats by obli, C( O i Odra ($377 C alban, CG C( pIOZ, 5 77 6 foab, C( 77 b7 C( ikra demand by deub, for by fool, export by enbe, at by ans0,7 seven by siav, fifty by liok, pork by pear, heavy by heum, fair by fam, demand by deub, for by fool, mess by mez, beef by bis-3d, by by bynt, government by goal. Writing these syllables in groups they are found to make the following words: Whanaibi tyodploz. Cuapaba dyefnidchag. Obliodra abaploz foabikradeub foolenbeanso chag siavok. Poarheum Farndeubfool mezbied byntgoal. (Thirteen words.) As will be observed, owing to the shortness of the sentences, many of the words in the cipher-message contain only seven or eight letters, this being rendered necessary by the exigencies of punctuation. As the above message, however, would from the context punctuate itself it might be written in ten words, as follows: Whanaibityod plozcuapaba dyefnid- Oblivodraaba plozfoabikra deubfoolenbe ansosiavfiok. Poarheumfam deubfoolmez biedbyntgoal. (Ten words.) The more im portantapplication of the system, however, is its employment as a cryptogram. Taking the same message as an example, and turning to the vocabulary, we set down, instead of the syllables, the numerals corresponding to each word. Thus we find that 9717 represen ts wheat g 139, advanced 9186, two,77 dac. These we set down in rotation in rows or lines D2, as shown in Fig. 2, leaving two blank spaces between each row or line D2 of figures for the numerals D, representing the key, and one for the numerals D3, representing the sum of both. Now we will suppose that the key agreed upon between the broker and one of his customers is the sentence, A new light on a dark matter, (see Fig. 4,) and turning to the vocabulary we find that A is represented by 1; new by 5772; light by 5040, dro. These numerals are set down in pencil at D underneath those representing the original message and the two are added together, (see Fig. 2,) setting their sum down on the third line D3, but disregarding the highest figure, should it be 10,000. As there are but seven words in the key it is necessary to repeat the same as Aoften as required. The sums of the two numbers are found to be 9718, 5911, 4226, 2503,
' dac., and therefore the cipher words or sym- Cuardap skitnifread.
bols corresponding to those numbers represent the cipher or secret message to be sent, which we nd on consulting the vocabulary to be as follows: Whapodi iklidus. Boyccuov abbaswyn. Taxikreskym stevtrip audiwitswop. Peas- Weer. Snolsmut foomruid otlebyvveag. As will be seen, the above bears no resemblance to the former message, and it is also evident thatr as often as the key is changed a totallydifferent message will be the result. It is also palpable that the key can be changed ad injmtum. Let us now follow the message toits recipient and note the method by which it is deciphered. First, the recipient separates the symbols, and if the symbol commences with a consonant it also ends with one, or if it commences with a vowel it ends with one, and as all symbols consist of not less than three nor more than four letters the task is easy, for if the first letter is a vowel and the third a consonant then the recipient knows that there are four letters in the symbol, or if the 'rst and third letters are vowels or are both consonants then the symbol contains only three letters. Secondly,the recipient finds the numerals D3 representing the cipher words or symbols, and these are written down in rotation, as shown in Fig. 3. Thirdly, the recipient writes down beneath the numbers D representing the cipher words or symbols of the key E, or rather the numerals representing the same-that is, 1, 5772, 5040, e., (the second row above,) representing A new light on a dark matter. Fourthly, as the message received is the sum of the original message added to the key, it is plain that if the key E is subtracted from the message the remainder D2 will be the original. This the recipient proceeds to do, and should the key-numeral be larger than the message-numeral he adds 10,000 to the latter, as he knows that 10,000 is the highest limit of the series and that figures above that number are dis- 9717 139 9186 6554 Wheat advanced two points.
1803 1 2547 5795 1313 Corn a drug-no change.
5872 5919 1 6554 Oats off a point.
3324 4231 2143 3368 3054 536 7774 3234 Flour in demand for export at seven-titty.
6596 3903 Pork heavy.
3122 2143 3268 5394 739 1097 3675 Fair demand for mess beef by Government.
Having thus fully describedk my invention, Iclaim as new and desire to secure by Letters Patent- 1. A cipher-code system having an indeX- page with a column containing subject words or sentences, a column containing cipher-numerals for the subject Words or sentences, and a key for the message and arranged for use in connection with the numerical value of the message, to change the numerical value thereof, as set forth.
2. A cipher-code system having an indexpage with a column containing subject words or sentences, a column containing cipher-numerals for the subject words or sentences, and a key for the message, and composed of a plurality of subject words or sentences selected from the subject word or sentence co1- umn, and having numerical value according to the numerals in said numeral-column of the index-page, as set forth.
3. A cipher code, comprising anindeX-page having a column containing subject words or sentences, a second column containing single-syllable cipher-words, and a third column containing eipher-,numerals for the subject words or sentences, and a key for the IOO IIO
message, and composed of a plurality of subname to this specification in the presence of ject Words or sentences selected from said two subscribing Witnesses.
column of subject Words or sentences and having a numerical value represented by cor- CHARLES P' HALL' 5 responding numeralsiu said numeral-column, Witnesses:
as set forth. E. H. SIGNOR,
In testimony whereof I have signed myl GEO. H. MORRISON.
US2206100A 1900-06-29 1900-06-29 Cipher-code system. Expired - Lifetime US666520A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US2206100A US666520A (en) 1900-06-29 1900-06-29 Cipher-code system.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US2206100A US666520A (en) 1900-06-29 1900-06-29 Cipher-code system.

Publications (1)

Publication Number Publication Date
US666520A true US666520A (en) 1901-01-22

Family

ID=2735076

Family Applications (1)

Application Number Title Priority Date Filing Date
US2206100A Expired - Lifetime US666520A (en) 1900-06-29 1900-06-29 Cipher-code system.

Country Status (1)

Country Link
US (1) US666520A (en)

Similar Documents

Publication Publication Date Title
Daniels et al. The world's writing systems
Lubar " Do not fold, spindle or mutilate": a cultural history of the punch card
US666520A (en) Cipher-code system.
Kopal et al. Deciphering three diplomatic letters sent by Maximilian II in 1575
Williams et al. Leon Battista Alberti, De componendis cifris
US1136876A (en) Cipher-code device.
US48681A (en) Mkebagskf
Strasser The rise of cryptology in the European Renaissance
US724786A (en) Cipher-code system.
US879667A (en) Cipher system.
Dunin et al. French encrypted newspaper advertisements in the 19th century
US842106A (en) Code or cipher system.
Flaut et al. Cryptographic systems used in the Romanian countries between the 15th–19th centuries
Poupard Mundane Cryptography: Toward a Cultural History of Cryptography
US916606A (en) Cipher-code system.
Pae et al. The Emergence of Written Language: From Numeracy to Literacy
Harris Anglo-Saxon Ciphers
US986400A (en) Telegraphic-code concentrator.
Papakitsos A Software Application of Ancient Syllabaries to Cryptography
US1084981A (en) Indexed book.
US597587A (en) James nicolson
US703391A (en) Telegraphic code.
Powell Building Paper Embassies: A Prehistory of The Compleat Ambassador
US467872A (en) Ezra nathaniel hill
Zeydel On the Two Minor Poems in the Hrotsvitha Codex