The Chaocipher Clearing House
Progress Report #7
starting the Chaocipher Clearing House I have received numerous
responses from readers. One of these is Jeff Calof.
Jeff's permission I would like to upload some of the e-mail thread
we've been conducting.
analysis and written summarization of your work on
too, have enjoyed(!) the challenge of Byrne's ingenious scheme.
reading Kruh's Cryptologia Article, I noted that in Exhibit 5 - Message
#3 the ciphertext string BBNKF appeared twice. Once as a
complete, independent block, the other as as split block (TBBNK
FUCBP). Interestingly, this Message has an anomaly as
in the article - namely, while all other full blocks are 5 characters,
this one contains a 4 letter block (UHWA) between the 2 instances of
BBNKF. I can't determine if this was an error during the
of the article (i.e., a character got inadvertently dropped) or an
intended ciphering decision. If intended, then there are 29
characters between the two occurrences (From the 2nd B in BBNKF to the
first B of the next instance). If a 5th character was left
the noted block, then you'd have 30 characters between the BBNKF
It's unlikely that such a 5-character
string would occur entirely randomly. ...
up the good work - I wonder if Byrne Jr., Kruh and Deavours will ever
divulge what they know (Non-disclosure agreement notwithstanding)?
was referring to this
web site. Whoever scanned in the article
inadvertently dropped a letter:
13 March 2009|
off, thank you very much for your kind words. The best
you could give me is that the site is of value to you. I had
feeling that much more Chaocipher research was being done but there was
no focal point. From the responses I'm getting I believe this
true. I hope you will take part in this global
look forward to any other comments, research, etc. you may have.
be told, I had not noticed the 5-letter repetition -- thanks for
pointing it out. I'd like to compute the probability of such
occurrence. The other four exhibits do not show any causal
repetitions (Mellen points out a 5-letter repetition, XXACN, in Exhibit
1 but notes that the plaintexts are different, so the repetition is
non-causal). Could Deavours and Kruh have knowingly selected
plaintext so that an underlying plaintext repetition *was* duplicated
in the ciphertext? I hope to pursue this repetition in the
and look forward to any research you may do on it.
. . .
mention that there is a 4-letter block, UHWA, in message #3. You may
have lost a letter while transcribing or scanning the message
The article clearly shows:
... TTXJX UHWQA PTSNB ...
the distance between the repetitions is 31. The repetition is
definitely not expected and should be examined carefully. . .
agree with you that Byrne may have used gear-like sequences or cipher
alphabets whose periods are prime to each other. This may be
he meant when he wrote that the ancient Egyptians and Babylonians could
have been completely familiar with the principle.
Byrne, Deavours and Kruh divulging the mechanism, I asked Deavours and
Kruh this same question in a recent e-mail to them (they haven't
answered yet). In my opinion there is no commercial value in
Byrne's system given the power, security, and ease of public-key
systems today. In this light Byrne would do best to publicize
system. The cryptologic community will verify whether it has
Thank you once again for you kind
words and for taking the time to write them. I look forward
to hearing from you again.
uploading Progress Report #6 I received this e-mail from Jeff (20 March
article today... I especially took note of the Callimahos article and
excerpts. The "fractionate" reference supported something
always suspected was a missed clue from Byrne - but seeing this
supports my suspicion.
Page 265 of "Silent
Years", Byrne writes:
ancient Egyptians and Babylonians could have been completely familiar
with the principle, a fact which is readily deducible from a treatise
on mathematics written by Hero of Alexandria in the second century B.C"
believe this reference is to Hero, or Heron's, treatise
"Metrica". The highlight of this is the Babylonian method for
finding Square Roots (also known as the Heron Method).
Considering other facts Byrne tells us of Chaocipher, this offers some
possibilities for the method. Byrne writes:
266 - "If
every person on earth were to encipher the same message, say for
instance, this paragraph of which this sentence is a part, no two of
the resultant encipherments would be alike"
indicate a Cipher Key is at play somehow; if every
key were the non-repeating decimal Square Root fraction sequence of
some uniquely chosen non-pure Square number, this would meet Byrne's
What could each Encipherer use for their
Their birth date (MM/DD/YEAR) is nearly unique; their name
less-so but could be numerically represented. Or some other
agreed-upon # between Sender/Receiver.
however, is something that Byrne writes, and Kruh and Deavours seem to
substantiate - namely, is this something one would consider "Simple":
Page 264 - My method for splitting the word is so simple that it could
be performed by any normal 10-year-old school child
(2nd Page) - Byrne showed Deavours and Kruh how the Chaocipher worked.
They were quickly impressed with its simplicity, ease of operation and
For 1918, I wonder if reducing any number
non-repeating square-root value by hand would be considered "Simple" -
Keep up the great analysis... I'm
greatly enjoying your insight and progress.
my response to him on 21 March 2009:
thanks (again!) for your very kind words (I wasn't sure if you received
my reply on 13 March to your first e-mail, so I'm attaching it just in
case). It's great to hear from one's peers, especially on a
subject we're both highly interested in. I know my progress
reports are circling around the target, but I get a strong feeling that
they're homing in on it. My thoughts are becoming clearer and
more focused re Chaocipher the more I commit thoughts to
hope I can help others like you to see your ways clear to solving this
"fractionate" reference supported something I've always suspected was a
missed clue from Byrne - but seeing this supports my suspicion
glad to hear you've thought along the same lines. I'm
how two concentric disks can be used to fractionate a letter and
recombine it again. Any ideas? There is a
between Byrne and Callimahos: Byrne refers to splitting a word while
Callimahos refers to fractionating a letter. They might be
referring to the same thing ...
believe this reference is to Hero, or Heron's, treatise "Metrica". The
highlight of this is the Babylonian method for finding Square Roots
(also known as the Heron Method) >>
idea is a
valid one, as there is an infinite number of numbers whose square roots
are irrational. I believe there was also a "letter of
element in the cipher, so two people using the same seed number N would
diverge almost immediately based on the plaintext, fulfilling Byrne's
description of an infinite number of keys. Vis-a-vis
such a system would have to address the following:
* As you say, it would have to qualify as "simple".
* We know the system fit in a cigar box. Could Byrne have
a square root calculator in some form?
* It would
have to explain the "pt/ct identities > 9" phenomenon in Exhibit
1. Can you think of such a scheme?
reply to you last
week I thanked you for pointing out the highly significant repetition
in Exhibit 5, Message 3. It was your observation that
into investigating the repetition in the exhibits. (I pointed
that you may have dropped a letter accidentally when transcribing the
message.) I'd like to thank you again . . .
Exhibit 5 repetition, as I wrote, it certainly looks highly
significant. I'm wondering what one can do with it.
a distance of 31, so you have your prime number theory back again
Once again, Jeff, thank you so
much for following my
progress reports and for taking the time to write. It's a
feeling knowing others are enjoying them.
regards and looking forward to hearing from you,
You might find NSA's Declassification Initiative page of general
cryptologic interest: http://www.nsa.gov/public_info/declass/index.shtml
no obvious period is evident in the exhibits, I've been wondering
whether the machine returns to its starting settings at some point.
If it did, we would have two or more "in depth" messages from
Exhibit 1 itself. I decided to shift Exhibit 1 against
one place at a time, correlating the number of pt/ct matches.
This differs from a regular coincidence test because we have
the plaintext and ciphertext.
So, for example, we
encounter this portion of juxtapositioning with
a shift of 182:
would only count one coincidence here, i.e., the O/Y pt/ct pair.
Even though many plaintext letters coincide between the two
sequences, only a full pt+ct match is counted here.
1: ALLGOODQQUICKBROWNFOXESJUMPOVERLAZYDOGTOSAVETHEIRPARTYW ...
2: NFOXESJUMPOVERLAZYDOGTOSAVETHEIRPARTYWALLGOODQQUICKBROW ...
the resulting graph:
first time I saw this graph I was amazed by the tall lines in the
left-hand side of the graph. They were precisely 55 positions
apart -- was I on to something?! The mystery was solved: the
good, quick" phrase is exactly 55 letters long. Having 100
phrases greatly raises the probability of a non-causal pt+ct
coincidence. If we ignore these spikes, the graph looks
non-causal, with the number of coincidences slowly decreasing as the
number of overlapping letters decreases.
drive the point
home, I normalized the preceding graph by dividing the number of
coincidences by the number of overlapping letters:
rise at the end is to be expected: with relatively few overlapping
letters, the graph becomes much more sensitive to coincidences.
I cannot identify a point where the machine returns to its original
settings by examining coincidences.
with Cipher DisksFrom
descriptions by John F. Byrne and Henry E. Langen the
involves two concentric (?) cipher disks with mixed alphabet components
on the rims. After trying to mentally imagine what Byrne may
discovered I decided to make myself a cipher disk. I was
to find a suitable template for a 26-letter cipher disk so I wrote a
quick-and-dirty program to draw them for me. I've uploaded a PDF file containing a
template with three successively smaller disks and wrote some instructions.
make your own cipher disk:
That's all there is to it.
Here's a picture of the one I made myself:
- Print out the
- Cut out the two largest disks
the alphabet components on the disk rims
- Get a
piece of corrugated cardboard of, say, 6 inches by 6 inches.
a pin through the centers of the disks, connecting them to the
a physical cipher disk has helped me work on the question: how can one
create a sophisticated cipher from a cipher disk. I've learned a lot by
just fiddling around with the cipher disk.
upcoming progress report I'd like to share with you some of
schemes I've come up with to create sophisticated ciphers from a
standard cipher disk. I highly advise reading F. L. Bauer's 
chapter 3 ("Encryption Steps: Simple Substitution") and chapter 7
("Polyalphabetic Encryption: Families of Alphabets") to get a basic
mathematical basis for dealing with alphabets: shifted, rotated, power
alphabets, cyclic notation, iterated substitutions, mixed alphabets,
Thoughts About the Chaocipher MechanismTo
I've assumed the Chaocipher is a cipher disk with mixed alphabetic
components, with the disks advancing according to some quasi-random
order. In the background is the fact that Exhibit 1 displays
"pt/ct identities > 9" phenomenon -- any candidate mechanism has
explain how this could happen. I have been able to conceive
to produce a sophisticated cipher from a cipher disk (see below).
Nonetheless, I returned to Byrne's own description in Silent
Years to try and determine what he had in mind.
are quotes I believe are relevant to the question:
ancient Egyptians and Babylonians could have been completely familiar
with the principle, a fact that is readily deducible from a treatise on
mathematics written by Hero of Alexandria in the second century B.C"
[1, page 265]
first device, or machine, which I constructed solely for the purpose of
demonstrating a principle, was a little model, constructed in an empty
cigar box which, when full, had contained fifty small Havana cigars.
I made this model myself, and to sat that it was a crude
would be only to describe it accurately." [1, page 265]
then approached several machine makers asking for an estimate of the
cost of making my machine, and from not one of them could I get
anything approaching a firm bid, everyone of them was vague, and the
best I could get by way of an estimate was that it would not be less
than $5,000 and might run to $10,000 or more; ..." [1,
to the principle of the machine, it is undoubtedly a most ingenious and
effective device ..." [1, page 273, letter from Colonel
I read Colonel Hitt's letter, it was clear to me that he had not at all
fully comprehended the principle of my "machine", as he called it."
[1, page 273]
(F) "And let me add that devices far
more operable than my crude model could be mass-produced to sell at ten
dollars each." [1, 282]
(G) "... but he did not bring the
cipher machine 'explaining that it was too heavy and cumbersome.'"
[2, page 194].
Here are some thoughts:
Greg Mellen  has an enlightening
discussion on this same question in which he infers the
(A) hints that the principle is a mathematical one (rather than a
physical one) and could be inferred from Hero of Alexandria's
mathematical treatise. I checked out Michael Lahanas's site "Heron
for ideas of Heron's writings. The treatise on mathematics
refers to was probably "Metrica", a collection of three books for the
determination of areas and volume of objects. The first two
deal with areas and volumes. Book three deals with, among
things, his square root extraction formula (here's a summary
of his mathematical ideas).
invented gear-related machines (for example, his taximeter, odometer,
and Baroulkos (here
which could certainly have been the basis of a cigar-based machine.
Nonetheless, Byrne states clearly that the principle is
from a mathematical
treatise, not a mechanical treatise.
- See Jeff Calof's e-mail above
with his idea that Byrne may be referring to the square root extraction
(B) hints that the machine was a small, simple one, capable of fitting
into a small cigar box. On the other hand, quote (C) tell us
the machine makers quoted a relatively huge sum to produce it.
This would infer that the machine was not as simple as, say,
concentric disks on a spindle.
- It looks like we're
talking about some mechanical feature.
quote (D), Parker Hitt is impressed with the concept (which Byrne
believes he didn't 'get'). If it were a simple cipher disk, Hitt would
not have been so lavish in his praise.
quote (E) Byrne
puts the word "machine" in double quotes. As if to tell us
he did not consider his principle worthy of being called a "machine".
quote (F) Byrne suggests his device could be mass-produced for no more
than ten dollars. Does this imply that the mechanism is not a
very complicated one?j Having said that, quote (G) seems to
that the final device was way to large and expensive than Byrne thought
possible ideas to pursue are:
- He shows the diagram of the Baroulkos
by Heron but says "I can think of no way to use it in a
serious cryptographic system".
- He dismisses the use
of continued fractions and "Egyptian Fractions".
says that irrational and transcendental numbers offer other
possibilities (see Jeff
above), but would be surprised if Byrne knew how to derive the
functions, and how he could implement the function in a cigar box.
1938 Byrne built a second model for demonstrating to the Navy.
"We are not told if it was in a cigar box, but it was a
model on which I could do extended encipherments and decipherments, and
on which I could with some freedom put my principles into operation'".
"extended" Mellen inferred that Byrne's machine can be built in
different "sizes", possibly involving blocks of plaintext, the length
of the block being determined by the size of the machine.
some freedom" may imply that a small machine does not permit full
exercise of the cipher algorithm.
model" may imply that Byrne's initial device was non-functional, useful
for clarifying his concept but only a "paper model".
the sentence [1, page 277] "Working through the summer and
fall of 1937, I made my model and prepared on and by it, a
document I intended for submission to the Navy department
understands the phrase "on and by it" to mean that there is
interaction of some kind between the machine's enciphering operation
and the key or the plaintext, or both.
uses this, and
the phrase "readily operable machine" [1, page 267]", to explain that
Byrne could not apply for a patent years earlier. Mellen
that Byrne had no realizable embodiment of his principle, only a crude
- I'm not convinced that "on and by it"
special type of interaction. Byrne's narrative tends to be
precise but sometimes florid. The phrase might imply that he
able to fully encipher his text on it without too much manual
- Mellen write
[3, page 141] "I made
paper models of rotors machines which I thought I could (and hence
Byrne could) build in a cigar box. I ruled out complex
or gearing of any sort, as being incompatible with "bits of string and
odds and ends." I hope to expand at a later time on
uses of a standard cipher disk.
mathematical concept that could be used to produce a multiplicity of
alphabets or a quasi-random keying sequence, e.g., decimal expansion of
irrational or transcendental numbers, etc.
usage of a standard cipher disk
- A gearing system
(as per Hero). This brings to mind the
Wheatstone, Pletts, or Wadsworth devices  (which was not used by
Byrne in their classic form).
Wheatstone Cryptograph: Could it Help?In
the previous section we discussed the possibility that Chaocipher is
based on some internal gearing. This brings to mind the
Wheatstone, Pletts, or Wadsworth cipher devices. I intend on
working my way, in an orderly fashion, through William F. Friedman's
analysis of the Wheatstone device . Although this is not
Chaocipher mechanism, I hope to (a) widen my cryptanalytic skills, and
(b) hopefully get an insight into possible Chaocipher mechanisms.
referred above to a more sophisticated use of a standard cipher disk.
Although I will have to put it off to a later date, here is
output of the program that generated the two alphabets for my standard
(bselxtnzfh) (ajoqvryg) (cwpdi) (mu) (k)
(aksd) (b) (g)
(asotkbphuylqjxnrvdgwifm) (ez) (c)
(crkid) (lvxsm) (gzh) (e) (w)
(aiok) (hwln) (jtu)
(agehcoblkwzqixust) (drpvy) (fjnm)
(albztwriqgoupjkcx) (fsnyh) (em) (d) (v)
(kzvntlp) (eqw) (bf) (js) (u)
(dxlivkrwogmh) (betzjp) (afu) (cyq)
(bdmxctfinjugqzkevs) (arl) (how) (p) (y)
(aenkdqf) (puwxzs) (ij) (h) (m)
(cjgvu) (aozp) (dt) (is) (l)
(gnp) (jwy) (uz) (r)
(aqxhvwn) (cp) (eu) (f) (i)
(cuds) (ktqm) (o) (x)
can see the following:
an upcoming progress report I'll discuss how we can use the cycle
notations to demystify and simplify working with a cipher disk.
- two generated
tableau consisting of one alphabet as the stator and the other alphabet
shifting on position at a time, producing 26 enciphering alphabets
cycle notation for each of the 26 alphabets mentioned in the previous
References Byrne, John F.
1953. Silent Years. New York: Farrar, Straus
John Byrne, Cipher A. Deavours and Louis Kruh. Chaocipher
the computer age when its method is disclosed to Cryptologia
editors. Cryptologia, 14(3): 193-197.
Mellen, Greg. 1979. J. F. Byrne and the Chaocipher,
Work in Progress. Cryptologia, 3(3): 136-154.
 Kahn, David.
1967. The Codebreakers: The Story of Secret
Kruh. The Mystery of Colonel Decius Wadsworth's Cipher
Device. Cryptologia, 6(3): 238-247.
Bauer, Friedrich. L. 2000. Decrypted Secrets:
Maxims of Cryptology (2nd ed.). Berlin: Springer.
Friedman, William F. Several Machine Ciphers and Methods for
their Solution. Riverbank Publication Volume 2, No. 20.
1918. Reprinted by Aegean Park Press, 1979.
(c) 2009 Moshe Rubin
3 April 2009
Last Updated: 19 November 2009