Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security

U.S. Army Guide to Code Breaking 249

sebFlyte writes "From the introduction of this document, the U.S. Army's field manual guide to Cryptanalysis: 'This manual presents the basic principles and techniques of cryptanalysts and their relation to cryptography. Cryptanalytics is the art and science of solving unknown codes and ciphers.'"
This discussion has been archived. No new comments can be posted.

U.S. Army Guide to Code Breaking

Comments Filter:
  • by rootofevil ( 188401 ) on Monday January 31, 2005 @03:05PM (#11530795) Homepage Journal
    they found the cryptonomicon
    • by c0p0n ( 770852 )
      the title of the book is encrypted anyways. Don't expect that the military intelligence will be able to break _that_

      Wait... Military intelligence?!?
  • by grub ( 11606 ) <slashdot@grub.net> on Monday January 31, 2005 @03:05PM (#11530796) Homepage Journal

    ...you know what they say about "military intelligence".

    Private : Sir! I found this, it may be a clue. Should I consult the field manual to cryptopgraphy?
    Sergeant : "Gur jrncbaf bs znff qrfgehpgvba ner va Fnqqnz'f Onfrzrag"? [crumpling paper] These are obviously the scribblings of a madman, Private. Get back to your patrol!
  • by Deekin_Scalesinger ( 755062 ) * on Monday January 31, 2005 @03:06PM (#11530803)
    A sneak peek at chapter 7:

    Solution of polygraphic substitution systems polyalphabetic substitution systems

    and that's just the title. Pack a lunch for this one...
    • Re:Light reading (Score:4, Informative)

      by ackthpt ( 218170 ) * on Monday January 31, 2005 @03:35PM (#11531098) Homepage Journal
      A sneak peek at chapter 7: Solution of polygraphic substitution systems polyalphabetic substitution systems and that's just the title. Pack a lunch for this one...

      A good read along with this would probably be Between Silk And Cyanide: A Codemakers War, which gets into, among other things, creation of more secure codes during WW II. An excellent read (I currenly have The White Rabbit on order (story of Yeo-Thomas' activities in France, capture, interrogation and imprisonment))

    • Re:Light reading (Score:2, Informative)

      by th3space ( 531154 )
      My literary forays into the field have been limited, but perhaps one of my favorite reads to date has been Simon Singh's 'The Code Book' (which has [slashdot.org] been [slashdot.org] mentioned [slashdot.org] before [slashdot.org]).

      It's not terribly detailed by way of 'how to', but the history of cryptography/cryptanalysis it offers is fantastic. It's also pretty well known for the contest in the back of it, wherein Mr. Singh offers a reward for the solution to all 10 of the codes (I believe a Swedish team eventually won the prize, shortly after the deadline had p
  • by AtariAmarok ( 451306 ) on Monday January 31, 2005 @03:06PM (#11530805)
    Let's set them loose on Bill Gate's Doodle [slashdot.org]. It's worth an $800,000 Pentagon contract, init?
  • Page 2 reads... (Score:4, Interesting)

    by merlin_jim ( 302773 ) <{James.McCracken} {at} {stratapult.com}> on Monday January 31, 2005 @03:08PM (#11530816)
    Step 1. Build a quantum factoring computer

    ok that was in jest. But seriously, how much good is a field manual going to do you when its possible for handheld computers to encrypt data to such a strong degree that it's theoretically impossible to decrypt with any likelihood of success that's indistinguishable from zero in the lifetime of the universe?

    I mean even if the guys at the NSA use different theories from the rest of us, I can only imagine that the methods they use still require vast amounts of hardware...
    • Re:Page 2 reads... (Score:5, Insightful)

      by nickfrommaryland ( 793020 ) on Monday January 31, 2005 @03:16PM (#11530897) Homepage
      This document is also 15 years old. Let's think about computing power available 15 years ago. Yes, there were computers more than powerful enough to do handle brute force decryption, not to mention more sophisiticated means. In terms of portability, however, there was nothing. Computing power has become so inexpensive and widespread now that more advanced forms of cryptography have (natrually) replaced the older, hand driven cyphers of old. Let's also think about the types of encryption that were being used back then. The mathematics that it takes to drive many of these algorithms was simply not practical in 1990. This document is serves more as a historical artifact now rather than a practial guide to decrypting like the government.
      • Enigma was smaller than a suitcase, was in common use 50 years before this manual was written, and it couldn't be broken using the methods in the manual.

        You can bet key military communications were well encrypted at this point, including those coming from the front lines.
      • Re:Page 2 reads... (Score:4, Interesting)

        by lost_n_confused ( 655941 ) on Monday January 31, 2005 @05:09PM (#11532306)
        This manual brings back old memories. Everybody who laughs at this FM seem to know very little about the history of the military and the NSA. I joined the Army in 1975 and was a member of ASA which was the Army Security Agency. I was a traffic analyst MOS (98C) and had add on modifiers for Korean language, Chinese Mandarin language , and T9 which was a code breaking. I went to school to break hand generated codes vs the guys who went to school for machine generated codes i.e. computer generated codes. I worked directly with NSA on a daily basis in the performance of my job. We where the arms, legs, and ears for the NSA in foreign countries. In the 70's I would say we were the bulk of the data collection for the NSA. Ask anyone if they remember the elephant cage in Thailand or a similar structure in Germany. It was a large antenna field that was in a circle that was nicknamed the elephant cage. It was amazing what the military did with them 30 years ago. Also this is an unclassified manual and no where near what the military actually taught just an introductory source of information. Most /. probably aren't aware that the military taught people how to break codes that were written in a foreign language that you didn't know. The military is very good at training no matter what people think of the intelligence level of the members of the military. Not everyone in the world has access to computers in the field and I am willing to bet there are still a lot of hand generated codes used by different militaries in the world. This manual may or may not be of historical value but there were a lot of morse code traffic through the 70's and early 80's using these type of codes. A morse code operator could send traffic around the world with very little wattage. There use to be automated "radio stations" that sent out nothing but endless streams of what appeared to be random numbers and letters for hours at a time. Ever wonder if someone sent a 3 hour stream of traffic and the only portion of any intelligence value was at 2 hours 5 mins 30 seconds for 12 seconds. I wonder how long it would take for a computer to decode the message? Better yet do the same thing except the 12 seconds of intelligence is a book code where it tells you what words in a specified book are the correct ones. How long would it take to brute force that? All an operative needs is a shortwave radio and one of these simple codes to receive information. Don't tell the Dept of Homeland Security that their computers won't help catch an operative that receives instructions by this low tech means. Just because something is low tech doesn't mean it isn't still of a value.
      • Re:Page 2 reads... (Score:5, Interesting)

        by Dun Malg ( 230075 ) on Monday January 31, 2005 @05:18PM (#11532426) Homepage
        This document is also 15 years old. Let's think about computing power available 15 years ago. Yes, there were computers more than powerful enough to do handle brute force decryption, not to mention more sophisiticated means. In terms of portability, however, there was nothing. Computing power has become so inexpensive and widespread now that more advanced forms of cryptography have (natrually) replaced the older, hand driven cyphers of old. Let's also think about the types of encryption that were being used back then. The mathematics that it takes to drive many of these algorithms was simply not practical in 1990. This document is serves more as a historical artifact now rather than a practial guide to decrypting like the government.

        I can attest that your assertion is exactly right. I was a Signal Intelligence Analyst in the US Army from '87 to '91, and most of what we saw was pretty crude. Remember, the Army doesn't generally intercept diplomatic comm's encrypted with sophisticated devices locked in embassy basements. It's probably more sophisticated now, but back then we mostly got stuff encoded by drafted soldiers and sent via morse code! I was trained in basic cryptanalysis, but most of what we saw was (Soviet) Red Army code table stuff. Morse transmissions would come in as a bunch of 3-digit numbers. The first two digits correspond to the X and Y axes of a 10x10 grid. Each square in the grid would contain 3 to 9 numbered code "snippets", and the 3rd digit of the 3-digit number refers to which. These snippets could be anything-- "weather report", "infantry", "battalion", "heading", a single number, a single letter, etc-- that might make up part of a message. Codes like this are tough to break when used properly, but of course they weren't. Some red army private would send "225 171", and the guy on the other end would say "huh? say again?" because he was holding his code table upsode down or something. They'd go back and forth five or six times before the first guy would just lose his shit and say "GIVE ME A BALLISTIC WEATHER REPORT, YOU STUPID TARD!" and then we'd know that "225 171" meant "REQUEST" and "BWX(ballistic weather report)".

        But at about the time of the fall of the Soviet Union, all that started to change. The russkies were gone, and most of the "warsaw pact interoperability" tendency for all their client states disappeared with 'em. A prime example of a military with excellent COMSEC was the Iraqi army, and they did it very simply as well. Instead of using radio, they ran wire and used field telephones for nearly EVERYTHING. When we were deployed for DESERT SHIELD we found the airwaves almost dead. The days of morse code and ciphers are pretty much gone.

        • Re:Page 2 reads... (Score:3, Insightful)

          by lelitsch ( 31136 )
          The other thing I loved about the Soviet Army was that they were so inflexible and tightly regulated. I don't know if they still do this, but for months one of the units that we were listening to requested the same information at the same time, and in the same order.

          If you ask for the BWX every morning in your third transmission, your COMSEC is shot to hell no matter how often to change the cods.
      • The very point I would have made...this stuff was declassified, [if it was ever classified] long ago. Its main significance in being published is only to tell us that the arms race between cryptographers and cryptanalysts has escallated so far beyond what is in the manual as to render it harmless.
    • For things like this:
      http://elonka.com/kryptos/

      Elonka gave an interesting talk about cryptography at Defcon this past year. Nowadays, to me anyway, it seems as though cryptography-by-hand is more of an intellectual challenge; rather than something you would ACTUALLY attempt on something like a 4096 bit PGP encrypted o-mi-god problem.
    • Re:Page 2 reads... (Score:5, Insightful)

      by m50d ( 797211 ) on Monday January 31, 2005 @03:19PM (#11530929) Homepage Journal
      Because few people bother to use them properly. The Confederacy had access to ciphers (Vigere) which were practically unbreakable at the time, but they didn't use them, and so it was well worth the North having codebreakers as they got some pretty useful intel from them. Similarly, although J. Terrorist could use PGP and be safe, he could just as easily be using Vigere or something weaker, so codebreaking certainly has its place.
    • Re:Page 2 reads... (Score:3, Insightful)

      by diggum ( 769740 )
      But seriously, what happens when, out in the field, your equipment is broken. or stolen. or there weren't enough to go around. or you're captured and held as a POW, and the escape plan is encrypted and scratched into a tree behind a chunk of bark? bet you'll wish you read that manual then.
    • by mveloso ( 325617 )
      What you do instead is keylog. Don't break the message, tap the recipient of the message and read it when they decrypt it.

      Depending on the situation, you could also throw lots of bogus messages (ie: undecryptable) messages into the mix, leading the users to believe the system buggy (and thus ditch it).

      That's more social engineering than crypto, but the point is to break the message. If they stop using the channel, then you hopefully have moved them to a weaker channel.

      One-dimensional thinking is good, bu
    • The table of contents doesn't mention linear or differential cryptanalysis of a substitutation permutation network, and even if it did nobody is going to decrypt DES or AES on paper.

      But in a place like Iraq, where power is unreliable and an endless supply of batteries for handhelds is not available, the enemy will have to rely on non-electronic cipher equipment.

      Of course the problem in Iraq is that they don't use the English alphabet or language. The frequency analysis we depend on for the shift cipher or
      • Of course the problem in Iraq is that they don't use the English alphabet or language. The frequency analysis we depend on for the shift cipher or Vigenere cipher doesn't work for Arabic.

        The techniques still work. You just have to use a different set of language statistics. You don't even have to understand the language, although it helps. There are precomputed lists of letter frequencies, initial and final letters, digraphs, trigraphs, etc. for all common languages.

    • "Theoretically impossible to decrypt...in the lifetime of the universe" you say?

      That only applies if you're taking a brute force approach to cracking it - something that should be the absolute last resort.

      Far more often, the code is broken by exploiting some mathematical weakness in the algorithm (or bug in the software implementation). If that's your aim, then it obviously pays to have a thorough understanding of the field, the various cyphers that have been devised, and how they've been broken in the pa
    • ok that was in jest. But seriously, how much good is a field manual going to do you when its possible for handheld computers to encrypt data to such a strong degree that it's theoretically impossible to decrypt with any likelihood of success that's indistinguishable from zero in the lifetime of the universe?

      Because voice messages and on-the-fly manual encryption still exist. I've only been out of the U.S. Army for a few years, but we all learned (in my field, anyway) manual coding techniques, because you
  • If it moves, shoot it.

    If it doesn't move, pick it up.

    If you can't pick it up, paint it.
  • by 0racle ( 667029 ) on Monday January 31, 2005 @03:11PM (#11530844)
    You should take a look at tracking down The Codebreakers [amazon.com] which is a fasinating read.
  • Utility? (Score:4, Interesting)

    by Captoo ( 103399 ) on Monday January 31, 2005 @03:13PM (#11530862)
    It's an interesting book from an academic standpoint. I'm not sure how practical it is, though. It's all about cryptanalysis the old fashioned way (i.e. before computers). Still, I suppose it is good to acknowledge that the enemy may surprise us by taking a low-tech approach.
    • Re:Utility? (Score:5, Informative)

      by CodeMonkey4Hire ( 773870 ) on Monday January 31, 2005 @03:21PM (#11530963)
      You're right. This isn't new. From the top of TFA:
      FIELD MANUAL
      NO 34-40-2 HEADQUARTERS
      DEPARTMENT OF THE ARMY
      Washington, DC, 13 September 1990

      The original for this came from <a href=http://www.atsc-army.org/cgi-win/$atdl.exe/fm /34-40-2/default.htm>here</a> on Tue Dec 17 01:21:11 EST 1996.
      This thing is 14 years old and has been public for over 8 years (at least) and somebody thinks that it is worth putting on slashdot. Thanks.
      (P.S. - note that the link they used for "here" doesn't even work. /.ed maybe?)
      • Re:Utility? (Score:3, Informative)

        by lelitsch ( 31136 )
        On the other hand, the people we are likely to fight in the near future are probably using fairly low tech methods.

        Back when I was doing SigInt for a living in the late 80s, we used all kinds of stuff like burst transmission, line of sight radio relays, and encryption computers. At the same time, the Russians and Czech units we were listening to were using fairly basic cyphers up to batallion and even brigade level. The one I remember most were fairly simple extensions of Polybios squares that encrypted pa
      • (P.S. - note that the link they used for "here" doesn't even work. /.ed maybe?)

        www.atsc-army.org/...

        I'm thinking that it's more likely that the Army doesn't use ".org". ".mil" works well, but ".org" isn't going to get you diddly.

    • I'm not sure how practical it is, though. It's all about cryptanalysis the old fashioned way (i.e. before computers). Still, I suppose it is good to acknowledge that the enemy may surprise us by taking a low-tech approach.

      You mean if they surprise us by doing exactly the same thing we would have to do if the computers weren't available, right? You would be surprised how practical low-tech methods can be.
    • "It's all about cryptanalysis the old fashioned way (i.e. before computers)."

      Last time I checked computers where available 15 years ago.
      I seem to remember that the British used computers for cryptanalysis all they way back in WWII.
      I would bet the most nations used computers for cryptanalysis for many decades. Many of the methods in the book could be converted into a program and uses to verify that new encryption systems can not be solved using these old methods.

      • 15 years ago, computers weren't widely available at the battalion level. Furthermore, power supplies were unreliable--you can't run a generator tactically, and you never have enough batteries--so hand encryption made sense.

        Next thing you know, you'll tell me you can't use a slide rule!
    • Still, I suppose it is good to acknowledge that the enemy may surprise us by taking a low-tech approach

      It would actually suprise you that some guy living in a cave in Afghanistan or a bombed out house in Fallujah would not have access to a computer? You're kidding right?
  • This has been on the /. front page for days, for those of us using the Boing Boing [boingboing.net] slashbox.
  • by GillBates0 ( 664202 ) on Monday January 31, 2005 @03:15PM (#11530881) Homepage Journal
    Q1. Decrypt following phrase using basic cryptanalysts principles:

    "B22 z1vs cb64 S c4m1o7 3 vt!!!"

    • by abb3w ( 696381 ) on Monday January 31, 2005 @03:51PM (#11531262) Journal
      "B22 z1vs cb64 S c4m1o7 3 vt!!!"

      Case sensitive +1 shift on 1337 translation of Engrish text, punctuation/spacing excluded.

      0) Cypertext: "B22 z1vs cb64 S c4m107 3 vt!!!"
      1) Intermediate 1337: "A11 y0ur ba53 R b3l0ng 2 us!!!" --NB, "A11" not "All" as previous translators have given.
      2) Engrish Plaintext: "All your base are belong to us!!!"

      55 47 55 2e 20 55 4e 41 51 2e

      • because, to be consistant, it would have to be a +1 rating
      • 0) 55 47 55 2e 20 55 4e 41 51 2e
        1) UGU. UNAQ.
        2) HTH. HAND.
        3) Hope That Helps. Have A Nice Day.

        01010110 01000111 01101000 01101100 01001001 01000111 00110101 01101100 01100101 01001000 01010001 01100111 01100011 00110010 01101000 01110110 01100100 01010111 01111000 01101011 01001001 01000111 01001010 01101100 01001001 01000111 01101000 01101000 01100011 01101101 01010010 01101100 01100011 01101001 00110100 01001011
  • by wowbagger ( 69688 ) on Monday January 31, 2005 @03:18PM (#11530916) Homepage Journal
    Things a soldier needs to know about encryption and code breaking:
    1. How to use his encryption equipment in a secure fashion (e.g. not using old codes or keys)
    2. How to keep his encryption equipment from falling into enemy hands.
    3. How to recognise enemy encryption equipment, ranging from simple notepads with Civil-War style encryption cyphers to flash disks with encryption codes.
    4. How not to screw up any enemy encryption gear before the real cryptographers show up.
    5. How to recognize encrypted messages on the battlefield (e.g. code talkers on the radio, code scrawled on a building)


    Above and beyond that is gravy - if some soldier who's MOS is not codebreaking wants to try when he isn't doing his MOS, great.
    • Above and beyond that is gravy - if some soldier who's MOS is not codebreaking wants to try when he isn't doing his MOS, great.


      MOS - Military Occupational Specialty--formal job classification, usually expressed as a number or number/letter combination--e.g., 11B Infantryman.
  • by Laerien ( 92580 ) * on Monday January 31, 2005 @03:19PM (#11530928) Homepage
    This field manual (no. 34.40.2) seems to have a Distribution Restriction placed on it as of March 5, 1990. The index page of the manual features a prominent warning about its restricted nature and a banner at the bottom of the page reads, "For Official Use Only".

    Is this document classified or are these just standard warnings with no teeth? Is our dissemination of this 15-yr-old document criminal?
  • don't worry (Score:2, Funny)

    by kc0re ( 739168 )
    speaking from experiance of a military individual.. Army Cryptographers don't even read this manual ;)
  • ASVAB (Score:2, Funny)

    by SadButTrue ( 848439 )
    so people that find the ASVAB challenging are supposed to read and understand this? I sure hope there are some civilians in the mix somewhere.
    • You'll never even get a job dealing with this unless your GT score (computed from the ASVAB) is pretty high.
  • DISTRIBUTION: Active Army, USAR, and ARNG: To be distributed in accordance with DA Form 12-11E, requirements for FM 34-40-2, Basic Cryptanalysts, (Qty rqr block no. 4607) and FM 34-3, Intelligence Analysis (Qty rqr block no, 1119).

    I'm not sure if an army manual can be distributed openly like this. What exactly does DA Form 12-11E say about distribution of such manuals, can someone from the Army who knows the details explain the legal aspect?

    • Generally something like this manual would have a classification of FOUO (For Official Use Only). When I took the crypto correspondence course, all of the courseware was FOUO. So, about the only person(s) that could get in trouble would be those who gave it to be posted (or more accurately the last one in the DOD chain before it hit a civilian's hand). It is quite possible this was gained via a FOIA request (Freedom Of Information Act).
  • Modern Battlefield (Score:5, Interesting)

    by john_anderson_ii ( 786633 ) on Monday January 31, 2005 @03:41PM (#11531143)
    I'm now a "former" Marine, but in January of '03 I found myself shipped to Kuwait, and eventually wound up in Iraq. I had it a bit lucky. I worked as an "Intel Analyst" for the 6th Engineers.

    In the COC (Combat Operations Center, center of confusion, or simply Circle of Cocksuckers), we had many little toys, ranging from Toshiba toughbooks to proxima projectors, etc. We used microwave relay to keep in touch with group and make sure our batallion commander was seeing the same operational picture that 1st FSSG was seeing.

    That was all done via an electronically encrypted network. Which is fine and dandy when you have:
    • Electricity
    • Computers
    • A network

    For forward units and combat units in the field the only thing they have that comes close is the field radio. While the encryption on these things is very advanced, the radio's are bullet, shock and explosion proof. Yes, the guy carrying your map, and perhaps a list of checkpoints might not be around forever. That is why field and forward units still have to employ non-electronic means of deciet and encryption. Even if it's as simple as one guy having the map, and the other guy having a clear piece of plastic with lines drawn on it.

    If U.S. Marines and soldiers are still using "old fasioned" techniqies such as this, one could surmise that our enemies are doing the same.

    Therefore, that old manual may have some relevance.
    • by Gregoyle ( 122532 ) on Monday January 31, 2005 @04:25PM (#11531619)
      Spot on. I agree with everything the parent said.

      I was in a unit which replicated Marxist/Viet Cong style guerrillas, and we were able to use methods like this to great effect. Since we were replicating low-tech guerrillas, most of our radios were Vietnam-era, with controls like Fisher Price's My First Radio (PRC-77 for those interested). However, we were able to confound our opponents (the regular Army) on a regular basis using very simple codes, while at the same time penetrating their networks almost as regularly.

      We had a pre-defined encryption scheme that radio operators were required to memorize. Mostly it was just simple word substitution, along with a simple way of encoding numbers. The key was that we all new each other and used knowledge common to all that the enemy had no way of knowing. We would avoid giving out locations more detailed than "300m South of that place we had lunch last week".

      The reason these methods worked was twofold. First, the information was only useful for a limited amount of time. So even if you figured out that "Beaker plus one, minus 5, Donkeypunch plus 3 plus 1 Boomhauer minus 6 plus 2" was really grid VQ 606 419, it wouldn't do you much good because we weren't there anymore. Second, the people who were actually capable of figuring this stuff out were way in the rear, and the overhead of getting the information to the grunts (or crunchies as we always called them) on the ground was so much that it basically never happened.
      • (PRC-77 for those interested)

        Ah yes. The good old PRC. In FA school we used these. Ah, and do you remember reading crypto keys from punched tape? .. and sending the newbie to get a PRC-E7 from the first sergeant? :)

  • Appendix D (Score:2, Interesting)

    by MynockGuano ( 164259 )
    For all you crossword-puzzlers and wordgames enthusiasts, Chapter 13 [umich.edu] is a great tool to have, and an interesting study in and of itself.
  • FOUO (Score:2, Interesting)

    by Shamanin ( 561998 )
    Just for anyone who cares, this document is marked for official use only (FOUO) which means it contains sensitive material that should not be passed around (especially on /.). Though this is one of the lowest forms of classifications, it is still a classified document.
  • I'm really good at code breaking. So good, I didn't realize you needed a manual for it. Heck, I can break any code in the world. They haven't made code yet that I can't break.

    My secret? I find that randomly inserting punctuation will break just about any code...

  • If you are interested in how this stuff all works and came about in the first place, a really interesting book is "Between Silk and Cyanide" [powells.com] by Leo Marks.

    It was a really great read...
  • by nsaspook ( 20301 )
    A couple of hot hookers and a lot of booze.
  • by ultramk ( 470198 ) <ultramk@noSPAm.pacbell.net> on Monday January 31, 2005 @04:30PM (#11531660)
    hey, I didn't know Taco was Welsh!

    m-
  • by Autonin ( 322765 ) on Monday January 31, 2005 @04:30PM (#11531662)
    This is the manual I used when I trained as a 98C (Signals Intelligence Analyst = SigInt) some 10 years ago. This is *still used* now.

    FOUO classification means it shouldn't have been published at all. Just because it's common knowledge does NOT declassify a document. The document can only be declassified by the originating authority (the people who wrote it, and classified it to begin with). You'll see "DECL:OADR" on these docs a lot - "Declassify on Originating Authority Directive".

    This FM is meant to teach the basics of cryptology to ASVAB-passing recruits. We run through the whole thing. Some very smart people go into Intel. Some pretty dumb ones do too :).

    Everyone is expected to pass the final after this is taught, which consists of 4 days worth of simulated "traffic" being passed between target stations. We've reference books for traffic pattern types, run locational analysis, crack subsitution ciphers - it's romping good fun.

    The encryption methods taught are still used in the field, though less and less thanks to the Internet, crypto-secured frequency-hopping radios, and whatnot, mostly for Meteo and Logistics.

    Brings back some nostalgia, reading though this. I hope they don't get into too much trouble for posting it.
    • I hope that no-one gets into trouble, because this stuff is found in many, many books on crypto-analysis. To think that this is in anyway unique is very, very naive. I mean, I've read books for beginners that even explained the enigma code breaking system. That's way beyond substitution etc. etc.. And academic articles go way beyond even that. That said, it is probably very easy to use in the field, so I'll keep it handy.
  • I've read Singh's "The Code Book". I liked a lot of the examples given and found it an interesting read.

    I'd like to know if there is a good "exercise" book or website with many puzzles of increasing difficulty, including several that may need a computer. I'd much rather do this as an intellectual exercise than crosswords.

    Any ideas? The select few web sites I've found tend to have one simple exercise (monoalphabetic cypher) and then suddenly change to really complex ones.
  • by ks5d ( 554341 )
    I've read several comments here about removing this from the /. site because it's secret, but in reality it's anything but. I teach cryptography in college, and the ciphers explained in the document and the codebreaking techniques are strictly old school. Nobody even uses these anymore. Old-style ciphers like Playfair, Hill, and even Vigniere have been crackable by computer in a ridiculously small time for the past 20 years. The areas of interest for codebreakers are in advanced symmetric ciphers and pu

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...