US666520A - Cipher-code system. - Google Patents
Cipher-code system. Download PDFInfo
- Publication number
- US666520A US666520A US2206100A US1900022061A US666520A US 666520 A US666520 A US 666520A US 2206100 A US2206100 A US 2206100A US 1900022061 A US1900022061 A US 1900022061A US 666520 A US666520 A US 666520A
- Authority
- US
- United States
- Prior art keywords
- words
- cipher
- message
- key
- column
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
Definitions
- the object of the invention is to provide a new and improved cipher-code system arranged to permit the sending of long messages with the use of comparatively few words or numerals not liable to be deciphered by unauthorized persons, thus maintaining the desiredsecrecy and at the same time permitting the receiver to readily decipher the message.
- Figure l is a face View of a page of theindeX-book.
- Fig. 2 is a face view of the cryptograph message as made up by the sender.
- Fig. 3 is a like view of the'same cryptograph message as deciphered by the receiver, and
- Fig. 4 is a plan view of the key and the numerical value thereof.
- the cipher-code system consists,essentially, of leaves preferably arranged in the form of a book, which I prefer to call an indexbook, and each page A contains one or more columns B of subject words or sentences, a column C of cipher words or symbols arranged alongside the column B and having singlesyllable words for one, two, or more of the subject-words in the column B.
- a third column D contains cipher-numerals, one for each cipher-word, as will be readily understood by reference to Fig. l.
- the key E consisting of a number of words or a sentence B', selected from the column B in the index-book, so that the words in the key have a numerical Value
- the key consists of the sentence A new light on a dark matter, the numerical value for the several words corresponding to the numerals in the column D opposite the words in the column B.
- the message is made up of cipher-words corresponding to the subject words or sentences of the message, the several cipher-words being joined together in groups of three or four according to the number of letters they contain, as it is Well known that telegraph companies allow only words of twelve letters or less, and hence the combination syllable-words should contain but twelve letters or less.
- the receiver of the message thus formed separates the syllables and then refers to the index-book to find -the corresponding cipher-words and their meaning in the opposite subject words or sentences in the column B. For instance, if a grain and provision broker desires to advise.
- bols corresponding to those numbers represent the cipher or secret message to be sent, which we nd on consulting the vocabulary to be as follows: Whapodi iklidus. Boyccuov abbaswyn. Taxikreskym stevtrip audiwitswop. Peas- Weer. Snolsmut foomruid otlebyvveag.
- the above bears no resemblance to the former message, and it is also evident thatr as often as the key is changed a totallydifferent message will be the result. It is also palpable that the key can be changed ad injmtum. Let us now follow the message toits recipient and note the method by which it is deciphered.
- the recipient separates the symbols, and if the symbol commences with a consonant it also ends with one, or if it commences with a vowel it ends with one, and as all symbols consist of not less than three nor more than four letters the task is easy, for if the first letter is a vowel and the third a consonant then the recipient knows that there are four letters in the symbol, or if the 'rst and third letters are vowels or are both consonants then the symbol contains only three letters.
- the recipient finds the numerals D3 representing the cipher words or symbols, and these are written down in rotation, as shown in Fig. 3.
- the recipient writes down beneath the numbers D representing the cipher words or symbols of the key E, or rather the numerals representing the same-that is, 1, 5772, 5040, e., (the second row above,) representing A new light on a dark matter.
- the message received is the sum of the original message added to the key, it is plain that if the key E is subtracted from the message the remainder D2 will be the original. This the recipient proceeds to do, and should the key-numeral be larger than the message-numeral he adds 10,000 to the latter, as he knows that 10,000 is the highest limit of the series and that figures above that number are dis- 9717 139 9186 6554 Wheat advanced two points.
- a cipher-code system having an indeX- page with a column containing subject words or sentences, a column containing cipher-numerals for the subject Words or sentences, and a key for the message and arranged for use in connection with the numerical value of the message, to change the numerical value thereof, as set forth.
- a cipher-code system having an indexpage with a column containing subject words or sentences, a column containing cipher-numerals for the subject words or sentences, and a key for the message, and composed of a plurality of subject words or sentences selected from the subject word or sentence co1- umn, and having numerical value according to the numerals in said numeral-column of the index-page, as set forth.
- a cipher code comprising anindeX-page having a column containing subject words or sentences, a second column containing single-syllable cipher-words, and a third column containing eipher-,numerals for the subject words or sentences, and a key for the IOO IIO
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
Description
No. 666,520. Patented lan. 22, |90I. C. P. HALL.
CIPHER CODE SYSTEM.
(Application Bled June 29, LQQO.) (llo Model.) 2 Sheets-8heat 2.
Tai
d11.1111 11111110 1.10.1 1101 1011 1:1111 .11.10 10J/1 ,.111 y-.1111 '1 0111 .1.111 1101 111.1 1101 10.11 .1.1 1111 111.1 1 1010 .1111 7 .1111 1010 .1011 1 1010 l jup/110 1 1 1.110 .101i 11.111.111 1101 .100.1 .1.51 .1100
17a/fifi 69197.90 7.9' X769 X03/9 .3.363. 770 600.3 70.9,J/.94'f7 TTQV? 31,1110 .ff 1 1.110 1011 11.11 1.111 1101 100.1 1.1 1 .1100 f 1110 1 1010 1511 1 .1111 1010 1.111 1 1 010 y1/.111.1 1 011131111131 1 11.1 .1.1 01 .1 0.11 .110 1111 ATTORNEYS ma naam: mtas co.. wuruuwo.. wAsmNumn, n c.
UNTTED STATES PATENT Fries.
CHARLES P. HALL, OF NEW YORK, N. Y., ASSIGNOR TO CHARLES P. HALL AND FRANK HART, OF SAME PLACE, AND EMMA C. MORRISON, OF
TROY, NEW YORK.
CIPHER-CODE SYSTEM.
SPECIFICATION formingpart of Letters Patent No. 666,520, dated January 22, 1901.
Application filed June 29, 1900. Serial No. 22,061. (No model.)
To all whom it may concern,.-
Beit known that I, CHARLES P. HALL, a citizen of the United States, and a resident of the cit-y of New York, borough of Manhattan, in the county and State of New York, have invented a new and Improved Cipher-Code System, of which the following is a full, clear, and exact description.
The object of the invention is to provide a new and improved cipher-code system arranged to permit the sending of long messages with the use of comparatively few words or numerals not liable to be deciphered by unauthorized persons, thus maintaining the desiredsecrecy and at the same time permitting the receiver to readily decipher the message.
The invention consists of novel features and combinations of the same, as will be fully described hereinafter, and then pointed out in the claims.
The invention is illustrated in the accompanying drawings, forming a part of this specification, in which similar characters of reference indicate the various features of the invention.
Figure l is a face View of a page of theindeX-book. Fig. 2 is a face view of the cryptograph message as made up by the sender. Fig. 3 is a like view of the'same cryptograph message as deciphered by the receiver, and Fig. 4 is a plan view of the key and the numerical value thereof.
The cipher-code system consists,essentially, of leaves preferably arranged in the form of a book, which I prefer to call an indexbook, and each page A contains one or more columns B of subject words or sentences, a column C of cipher words or symbols arranged alongside the column B and having singlesyllable words for one, two, or more of the subject-words in the column B. A third column D contains cipher-numerals, one for each cipher-word, as will be readily understood by reference to Fig. l. In addition to the index-page keys are used, one of which is represented in Fig. 4, the key E consisting of a number of words or a sentence B', selected from the column B in the index-book, so that the words in the key have a numerical Value,
indicated by the corresponding numerals in the column D. For instance, as shown in Fig. 4, the key consists of the sentence A new light on a dark matter, the numerical value for the several words corresponding to the numerals in the column D opposite the words in the column B.
If it is the intention of the user to simply avoid exorbitant telegraph-tolls, the message is made up of cipher-words corresponding to the subject words or sentences of the message, the several cipher-words being joined together in groups of three or four according to the number of letters they contain, as it is Well known that telegraph companies allow only words of twelve letters or less, and hence the combination syllable-words should contain but twelve letters or less. The receiver of the message thus formed separates the syllables and then refers to the index-book to find -the corresponding cipher-words and their meaning in the opposite subject words or sentences in the column B. For instance, if a grain and provision broker desires to advise.
out-of-town customers of the state of the market he would wire the following sentences: Wheat advanced two points; corn a drugno change; oats off a point; flour in demand for export at seven-fifty; pork heavy; fair demand for mess beef by government. (Thirty words.) Turning to the index-book it Will be found that wheat is represented by whan, advanced by aibi, two by tyod, (C 77 plOZ LL @0F11 7 (5 Cuavp, C al 77 by alba, C drug (Gdyef), C( no i nid, change by chag, oats by obli, C( O i Odra ($377 C alban, CG C( pIOZ, 5 77 6 foab, C( 77 b7 C( ikra demand by deub, for by fool, export by enbe, at by ans0,7 seven by siav, fifty by liok, pork by pear, heavy by heum, fair by fam, demand by deub, for by fool, mess by mez, beef by bis-3d, by by bynt, government by goal. Writing these syllables in groups they are found to make the following words: Whanaibi tyodploz. Cuapaba dyefnidchag. Obliodra abaploz foabikradeub foolenbeanso chag siavok. Poarheum Farndeubfool mezbied byntgoal. (Thirteen words.) As will be observed, owing to the shortness of the sentences, many of the words in the cipher-message contain only seven or eight letters, this being rendered necessary by the exigencies of punctuation. As the above message, however, would from the context punctuate itself it might be written in ten words, as follows: Whanaibityod plozcuapaba dyefnid- Oblivodraaba plozfoabikra deubfoolenbe ansosiavfiok. Poarheumfam deubfoolmez biedbyntgoal. (Ten words.) The more im portantapplication of the system, however, is its employment as a cryptogram. Taking the same message as an example, and turning to the vocabulary, we set down, instead of the syllables, the numerals corresponding to each word. Thus we find that 9717 represen ts wheat g 139, advanced 9186, two,77 dac. These we set down in rotation in rows or lines D2, as shown in Fig. 2, leaving two blank spaces between each row or line D2 of figures for the numerals D, representing the key, and one for the numerals D3, representing the sum of both. Now we will suppose that the key agreed upon between the broker and one of his customers is the sentence, A new light on a dark matter, (see Fig. 4,) and turning to the vocabulary we find that A is represented by 1; new by 5772; light by 5040, dro. These numerals are set down in pencil at D underneath those representing the original message and the two are added together, (see Fig. 2,) setting their sum down on the third line D3, but disregarding the highest figure, should it be 10,000. As there are but seven words in the key it is necessary to repeat the same as Aoften as required. The sums of the two numbers are found to be 9718, 5911, 4226, 2503,
' dac., and therefore the cipher words or sym- Cuardap skitnifread.
bols corresponding to those numbers represent the cipher or secret message to be sent, which we nd on consulting the vocabulary to be as follows: Whapodi iklidus. Boyccuov abbaswyn. Taxikreskym stevtrip audiwitswop. Peas- Weer. Snolsmut foomruid otlebyvveag. As will be seen, the above bears no resemblance to the former message, and it is also evident thatr as often as the key is changed a totallydifferent message will be the result. It is also palpable that the key can be changed ad injmtum. Let us now follow the message toits recipient and note the method by which it is deciphered. First, the recipient separates the symbols, and if the symbol commences with a consonant it also ends with one, or if it commences with a vowel it ends with one, and as all symbols consist of not less than three nor more than four letters the task is easy, for if the first letter is a vowel and the third a consonant then the recipient knows that there are four letters in the symbol, or if the 'rst and third letters are vowels or are both consonants then the symbol contains only three letters. Secondly,the recipient finds the numerals D3 representing the cipher words or symbols, and these are written down in rotation, as shown in Fig. 3. Thirdly, the recipient writes down beneath the numbers D representing the cipher words or symbols of the key E, or rather the numerals representing the same-that is, 1, 5772, 5040, e., (the second row above,) representing A new light on a dark matter. Fourthly, as the message received is the sum of the original message added to the key, it is plain that if the key E is subtracted from the message the remainder D2 will be the original. This the recipient proceeds to do, and should the key-numeral be larger than the message-numeral he adds 10,000 to the latter, as he knows that 10,000 is the highest limit of the series and that figures above that number are dis- 9717 139 9186 6554 Wheat advanced two points.
1803 1 2547 5795 1313 Corn a drug-no change.
5872 5919 1 6554 Oats off a point.
3324 4231 2143 3368 3054 536 7774 3234 Flour in demand for export at seven-titty.
6596 3903 Pork heavy.
3122 2143 3268 5394 739 1097 3675 Fair demand for mess beef by Government.
Having thus fully describedk my invention, Iclaim as new and desire to secure by Letters Patent- 1. A cipher-code system having an indeX- page with a column containing subject words or sentences, a column containing cipher-numerals for the subject Words or sentences, and a key for the message and arranged for use in connection with the numerical value of the message, to change the numerical value thereof, as set forth.
2. A cipher-code system having an indexpage with a column containing subject words or sentences, a column containing cipher-numerals for the subject words or sentences, and a key for the message, and composed of a plurality of subject words or sentences selected from the subject word or sentence co1- umn, and having numerical value according to the numerals in said numeral-column of the index-page, as set forth.
3. A cipher code, comprising anindeX-page having a column containing subject words or sentences, a second column containing single-syllable cipher-words, and a third column containing eipher-,numerals for the subject words or sentences, and a key for the IOO IIO
message, and composed of a plurality of subname to this specification in the presence of ject Words or sentences selected from said two subscribing Witnesses.
column of subject Words or sentences and having a numerical value represented by cor- CHARLES P' HALL' 5 responding numeralsiu said numeral-column, Witnesses:
as set forth. E. H. SIGNOR,
In testimony whereof I have signed myl GEO. H. MORRISON.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US2206100A US666520A (en) | 1900-06-29 | 1900-06-29 | Cipher-code system. |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US2206100A US666520A (en) | 1900-06-29 | 1900-06-29 | Cipher-code system. |
Publications (1)
Publication Number | Publication Date |
---|---|
US666520A true US666520A (en) | 1901-01-22 |
Family
ID=2735076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US2206100A Expired - Lifetime US666520A (en) | 1900-06-29 | 1900-06-29 | Cipher-code system. |
Country Status (1)
Country | Link |
---|---|
US (1) | US666520A (en) |
-
1900
- 1900-06-29 US US2206100A patent/US666520A/en not_active Expired - Lifetime
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Daniels et al. | The world's writing systems | |
Lubar | " Do not fold, spindle or mutilate": a cultural history of the punch card | |
US666520A (en) | Cipher-code system. | |
Kopal et al. | Deciphering three diplomatic letters sent by Maximilian II in 1575 | |
Williams et al. | Leon Battista Alberti, De componendis cifris | |
US1136876A (en) | Cipher-code device. | |
US48681A (en) | Mkebagskf | |
Strasser | The rise of cryptology in the European Renaissance | |
US724786A (en) | Cipher-code system. | |
US879667A (en) | Cipher system. | |
Dunin et al. | French encrypted newspaper advertisements in the 19th century | |
US842106A (en) | Code or cipher system. | |
Flaut et al. | Cryptographic systems used in the Romanian countries between the 15th–19th centuries | |
Poupard | Mundane Cryptography: Toward a Cultural History of Cryptography | |
US916606A (en) | Cipher-code system. | |
Pae et al. | The Emergence of Written Language: From Numeracy to Literacy | |
Harris | Anglo-Saxon Ciphers | |
US986400A (en) | Telegraphic-code concentrator. | |
Papakitsos | A Software Application of Ancient Syllabaries to Cryptography | |
US1084981A (en) | Indexed book. | |
US597587A (en) | James nicolson | |
US703391A (en) | Telegraphic code. | |
Powell | Building Paper Embassies: A Prehistory of The Compleat Ambassador | |
US467872A (en) | Ezra nathaniel hill | |
Zeydel | On the Two Minor Poems in the Hrotsvitha Codex |