Beruflich Dokumente
Kultur Dokumente
CIPHER, LETTER,
TELEGRAPH CODE
t.ARRA.BKE,
-^^^^^ fe^.
,
>^;-.j!,'..y'
'h
^i
:|.^ro^>:
'^'<^
'^^iiS
2010
witii
funding from
Duke
University Libraries
littp://www.arcliive.org/details/ciphersecretlettOOIarr
LARRABEE'S CIPHER
AXD
By
CHARLES
S.
LARRABEE,
2.3
MURRAY AND
iJT
WARREN STREET.
1884.
PREFACE
My
attention
was
first
employed
upon some
I
Government
in 1863.
very soon discovered the imperfect character of the then existing systems, and set myself
to devise a better.
to
work
many
unsatisfactory experiments,
I hit
upon
me from
the
"Key-word Lock."
Other occupations
compelled
me
and not
which
Pending arrangements
publication,
learned, that
After
Mr.
G.
my
own.
my right
to the
main
his.
was unquestionably
1 claim to
"Key-word System."
CHARLES
New
YouK.Jantcary
1st, 1871.
S.
LAKRABEE.
S.
LARKABEE,
Washington.
INTRODUCTION
This Secret Code
it
may
It is so perfect
that
no message written by
In most of the Cipher sj'stems a mere changing of the order of the alphabet, or certain
signs
for
and in consequence
of the
same
letter
being always
represented by the same cipher, an expert could easily read any message.
constant change ot cipher for every letter makes the message perfectly secret.
By
its
may
write the
unintelligible
It is very simple,
I lY
ST
RUCT
and
that
Fix upon a key-word which cominuuicate to your correspondent any word may be adopted, care must be taken it is judicious to select one that can be remembered by both parties
; ;
it in
spelled alike
by both,
else the
and
To Convert a Message into Cipher. A key-word having been arranged between receiver, first write down plainly and distinctly the message to be sent then
;
yourself
lorite
the
key-word over
(he message,
repeating
first letter
it
as often as
Find
of the kej'- word and the first letter of the message and find The letter underneath is the first same position in Table I. cipher. Repeat this jirocess with all the letters, taking the second letter of kej-word and the second letter of the message, the third letter of key-word and the third letter of the message, and so on to the conclusion.
the ciphers thus:
Take the
exactly
the
write
down
then
particular key-word
as often
as necessary
till each cipher hc^ a letter of the key-word over it : take the first letter of the key-word and the first cipher, and find the fame letters in exactly the same position Table II. the letter which is under them is the first letter of the message. Repeat this process with all the others, taking second letter of key-word and second cij^her, and finding second letter of message, and so on till the ciphers are all translated.
'
EXAMPLES
I.
"Jove."
Key-word
Message
to be sent
MOVE FORWARD
VCQ
II.
I
Cipher to be sent
MA
FY
MW
TJ VL
Key-word, "Hope."
Key-word
Message
Cipher to be sent
II.
'.
Decatur.
'
Message reads
'
IV.
Key- word,
' '
LoclL
'
Keyword
Ciphers received
Message reads
A B C D E F <}
II
IJ
1 2 3 4 5 6 7 8 9
the above letters for such other letter from as shall indicate the number of letters following, which are to be read -as figures. Thu
as
When writing your message down first on paper, substitute A H G A for 1871. But prefix such letters by the letter Q, and
figures,
A
:
to I
QAF
Q B IJ QCBC D
90
234
J.J
QE AE
15500
directed, proceed to convert the lohole of
it
into ciphers
(The
letter
it is
is
tlie letter
U, and therefore
Examples
A
Original Messas^e
To be written thns
Key-word. Message
Ciphere
H A N O V R H A N O V E R II A N O
YEZ WOUU
II.
R E :M
T QD CG E
J
DO
J.
AR S
GRXY S C S AEG
Key-word
Ciphers received
HEROHEROHE
first
Message reads
V R C M X fl S S Q N Only Q I) C E J J
or,
'Only
2,500."
TABLE
Letter of
I.
Key-word
Letter of Message
Lelter of
Key- word
TABLE
Letter of
I.-Continued.
Key-word
Letter of Ke'^'-word
TABLE
Letter of
II,
Kev-word
Letter of
Key-word
. .
Cipher
. . . .
,
TABLE
Letter of Ko}--\\or(l
II.- Continued.
Cipher
Letter of Message
.
.
P Q R S T U V
WX
Letter of Key-word
Cipher
Letter of Messa<;e
.
Letter of Ke^'-wonl
Cipher
Letter of Message.
I^etter of
.
Key-word
Cipher
Letter of Message Letter of
('iplier
Key- word
'
Letter of Message
Letter of Key-word
Cipher
Letter of Message.
.
Letter of
Key-word
COO
*S.S
t
tc
o a *
./
^
*
>, >>
ji i*
a
u5
.=
*^'H.^'*^ e g'5""^
? ?
ii
=.^
be
.--;
O 3
'^^
=^^5
5"*
s -
lll-f
oH^-n
1 1
l-H^
go's
X'
Ms
V-r; 5.:^ S
J)
Si
?3
K o - :j~
Sx C <
3,
^;g =
<^Z
^^ S
f^ =
f~i
as
t;>>-2
5 S
^-f
>-'
!::^
5-:?
..
33
^ c
;=
Do
;^
c;^
[^
<+-''^
w^^ o
I
ij
<^
Qc*
=
o c *- t. o r^ S B-.2 a
o
.
/. .:;
s,
"I
>-Sm
h^
f>K:i
^ci
"
>
|g
0-3 O O O C
t->fc;
I
Sw* i
s
-if
a'c^
cS
: til
=-
S i
"
?,
.'^-
$J^^
-^
a ? o
2^-?
-^
.
5.-=.
!:
:
^ 5 ^ ^
s=-^ sc
Ci
t^
C^
C
tc
^2
^"
S.'
.^"^
c S
cs
';=
ii
I
I.
0)
^"g s = s
5 C c 0!
r- SS fO
o:^
CO CO
CO
.
.S
S'
s^^
2.11^
I - J
3 S
tf
tc
s
CS
= S
3
t-
S'^ 9 S o
C
'^.o
2 J /2 ^ w S ^ "S "
X
'
"8
;3
'^
"^
-^e.s
cisi-^ri^^-t;:
^ 3
-?
^
o * a o o o
sc^ c
tJ
O
1.
:i
s
-<
g 1
S?
^
-5
2-^ O g to "^
tir:;
cS t
./.
;-5 = .3-
_I
S r =r3 3 iJ 3 5 S
a c; P s s =i 3 3 cS O - ~ 3
IIjI fill
o 1 rH o g
<1
e c*=
0.
o Cj
5 i 3 I ^ p i: ^-^ ~
5 0^
ZJ
o "
5
r^ ?5 -^
-'^
"=
-J
W c
t-
-^
O X -.
""
Q H
o F F F F
-t-H
Zv"^'
i^P
.v!^.\5^
'^1^1'
.?^^:
^^i^^:
b?: