Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Book cipher
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Encryption and decryption method}} [[File:Exodus 4 - reference to spiritual possession putting words in mouths.jpg|thumb|The [[King James Version|King James Bible]], a highly available publication suitable for the book cipher.]] A '''book cipher''' <!--No reliable source on "Ottendorf" cipher found on Google Scholar. Most search results look like they copied *from* Wikipedia. It seems like the only reference is a movie line from Turteltaub, J. (directed by): National Treasure (2004). Screenplay by Jim Kouf, Cormac Wibberley and Marianne Wibberley https://link.springer.com/chapter/10.1007/978-3-030-85623-6_3 --> is a [[cipher]] in which each word or letter in the [[plaintext]] of a message is replaced by some code that locates it in another text, the [[key (cryptography)|key]]. A simple version of such a cipher would use a specific book as the key, and would replace each word of the plaintext by a number that gives the position where that word occurs in that book. For example, if the chosen key is [[H. G. Wells]]'s novel ''[[The War of the Worlds]]'', the plaintext "''all plans failed, coming back tomorrow''" could be encoded as "''335 219 881, 5600 853 9315''" — since the 335th word of the novel is "''all''", the 219th is "''plans''", etc. Instead of the position of the word, sender can also use for each word a triplet indicating page number, line number in the page and word number in the line, avoiding error-prone counting of words from the start of the book. With the Bible, triplet can be chapter number, verse number, word number. This method requires that the sender and receiver use exactly the same edition of the key book.<ref name=BookCipherIEEE>{{Cite book | last1 = Changda Wang | last2 = Shiguang Ju | chapter = Book Cipher with Infinite Key Space | doi = 10.1109/ISISE.2008.273 | title = 2008 International Symposium on Information Science and Engineering | pages = 456 | year = 2008 | isbn = 978-0-7695-3494-7 | s2cid = 15768123 }}</ref> This simple version fails if the message uses a word that does not appear in the text. A variant that avoids this problem works with individual letters rather than words. Namely each letter of the plaintext message would be replaced by a number that specifies where that letter occurs in the key book. For example, using the same ''War of the Worlds'' book as the key, the message "no ammo" could be encoded as "12 10 / 50 31 59 34" since the words with those positions in the novel are "'''''n'''ineteenth''", "'''''o'''f''", "'''''a'''lmost''", "'''''m'''ortal''", "'''''m'''ight''", and "'''''o'''wn''". This method was used in the [[Beale ciphers|second Beale cipher]]. This variant is more properly called a [[substitution cipher]], specifically a [[substitution cipher#Homophonic substitution|homophonic]] one. Both methods, as described, are quite laborious. Therefore, in practice, the key has usually been a [[codebook]] created for the purpose: a simple dictionary-like listing of all the words that might be needed to form a message, each with the respective code number(s). This version is called a [[code (cryptography)|code]], and was extensively used from the 15th century up to [[World War II]]. == Choosing the key == The main strength of a book cipher is the key. The sender and receiver of encoded messages can agree to use any book or other publication available to both of them as the key to their cipher. Someone intercepting the message and attempting to decode it, unless they are a skilled cryptographer {{xref|(see: {{slink||Security}}, below)}}, must somehow identify the key from a huge number of possibilities available. In the context of [[espionage]], a book cipher has a considerable advantage for a spy in enemy territory. A conventional codebook, if discovered by the local authorities, instantly incriminates the holder as a spy and gives the authorities the chance of deciphering the code and sending false messages impersonating the agent. On the other hand, a book, if chosen carefully to fit with the spy's cover story, would seem entirely innocuous. The drawback to a book cipher is that both parties have to possess an identical copy of the key. The book must not be of the sort that would look out of place in the possession of those using it, and it must be of a type likely to contain any words required. Thus, a spy wishing to send information about troop movements and numbers of armaments would be unlikely to find a cookbook or romance novel useful keys. == Using widely available publications == === Dictionary === Another approach is to use a dictionary as the codebook. This guarantees that nearly all words will be found, and also makes it much easier to find a word when encoding. This approach was used by [[George Scovell]] for the [[Arthur Wellesley, 1st Duke of Wellington|Duke of Wellington]]'s army in some campaigns of the [[Peninsular War]]. In Scovell's method, a codeword would consist of a number (indicating the page of the dictionary), a letter (indicating the column on the page), and finally a number indicating which entry of the column was meant. However, this approach also has a disadvantage: because entries are arranged in alphabetical order, so are the code numbers. This can give strong hints to the [[cryptanalysis|cryptanalyst]] unless the message is [[code (cryptography)#Superencipherment|superenciphered]]. The wide distribution and availability of dictionaries also present a problem; it is likely that anyone trying to break such a code is also in possession of the dictionary which can be used to read the message. === Bible cipher === The [[Bible]] is a widely available book that is almost always printed with chapter and verse markings making it easy to find a specific string of text within it, making it particularly useful for this purpose; the widespread availability of [[bible concordance|concordances]] can ease the encoding process as well. == Security == Essentially, the code version of a "book cipher" is just like any other code, but one in which the trouble of preparing and distributing the [[codebook]] has been eliminated by using an existing text. However this means, as well as being attacked by all the usual means employed against other codes or ciphers, partial solutions may help the [[cryptanalysis|cryptanalyst]] to guess other codewords, or even to break the code completely by identifying the key text. This is, however, not the only way a book cipher may be broken. It is still susceptible to other methods of cryptanalysis, and as such is quite easily broken, even without sophisticated means, without the cryptanalyst having any idea to what book the cipher is keyed.<ref>{{Cite book |last=Yardley |first=Herbert O. |url=https://archive.org/details/americanblackcha00yard/page/n3/mode/2up |title=The American Black Chamber |publisher=[[Ballantine Books]] |year=1981 |isbn=0-345-29867-5 |location=New York |access-date=2023-02-13 |orig-date=1931 |url-access=registration}}<!--There's a diagram he uses to help explain how it's done. A professional could break a book cypher in a matter of hours.--></ref>{{page needed|date=April 2011}} == Examples == * A famous use of a book cipher is in the [[Beale ciphers]], of which Document No. 2 uses (a variant printing of) the [[United States Declaration of Independence]] as the key text. * In the [[American Revolution]], [[Benedict Arnold]] used a book cipher, sometimes known as the [[Arnold Cipher]], which used Sir [[William Blackstone]]'s ''[[Commentaries on the Laws of England]]'' as a key text. * Book ciphers have consistently been used throughout the [[Cicada 3301]] mystery.<ref name=telegraph>{{cite news |last=Bell |first=Chris |title=Cicada 3301 update: the baffling internet mystery is back |url=https://www.telegraph.co.uk/technology/internet/10555088/Cicada-3301-update-the-baffling-internet-mystery-is-back.html |newspaper=[[The Daily Telegraph]] |archive-url=https://web.archive.org/web/20140108022102/http://www.telegraph.co.uk/technology/internet/10555088/Cicada-3301-update-the-baffling-internet-mystery-is-back.html |archive-date=8 January 2014 |url-status=live }}</ref> * [[Eli Cohen]], the Israeli spy who for several years infiltrated the Syrian government until discovered by the Syrian intelligence and executed, used for his communications with Israel a book cypher based on a French-language copy of [[Alexandre Dumas]]'s ''[[The Three Musketeers]]''<ref>The Dumas book is mentioned in an intgerview with Cohen's brother on Israeli radio, May 19, 2025</ref>. === In fiction === * In ''[[Colony (TV series)|Colony]]'', a television series, the resistance movement uses a book cipher to communicate between members of the cells. * In the novel ''[[Monsieur Lecoq]]'', published in 1868, [[Monsieur Lecoq]] finds that a prisoner is communicating with his confederate using a double book cipher.{{clarify|date=February 2021 |reason= What is a double book cipher?}} Since the prisoner has only one book, ''The songs of [[Pierre-Jean de Béranger|Béranger]]'', the solution is easily discovered. * In ''[[The Valley of Fear]]'', [[Sherlock Holmes]] decrypts a message enciphered with a book cipher by deducing which book had been used as a key text. * The name of [[Ken Follett]]'s World War II thriller ''[[The Key to Rebecca]]'' refers to a [[Abwehr|German spy]] in [[Cairo]] using [[Daphne du Maurier]]'s novel ''[[Rebecca (novel)|Rebecca]]'' as the basis of a code.<!--why he wasn't provided an actual code prepared by ''Abwehr'' or ''B-Dienst'' is never explained...--> * In ''[[A Presumption of Death]]'', [[Lord Peter Wimsey]], on assignment for British Intelligence in World War II Nazi-occupied Europe, uses a code based on the works of [[John Donne]]. The Germans break the code, coming near to catching Wimsey and Bunter. Wimsey then improvises a new code, based on an unpublished text known only to himself and his wife. * [[Graham Greene]]'s protagonists often use book codes. In ''[[The Human Factor (novel)|The Human Factor]]'', several books are used, and an edition of [[Charles Lamb (writer)|Charles Lamb]]'s ''[[Tales from Shakespeare]]'' is used in ''[[Our Man in Havana]]''. * A book cipher plays an important role in the TV version of ''[[Sharpe's Sword (TV programme)|Sharpe's Sword]]''. The key text is Voltaire's ''[[Candide]]''. * In the 2004 film ''[[National Treasure (film)|National Treasure]]'', a book cipher (called an "Ottendorf cipher") is discovered on the back of the [[United States Declaration of Independence|U.S. Declaration of Independence]], using the "[[Silence Dogood]]" letters as the key text. * The protagonists of the [[Matthew Reilly]] novel ''[[The Six Sacred Stones]]'' used a book cipher to send confidential messages to each other. The key text was the [[Harry Potter]] books, but the messages were sent ''via'' a ''[[The Lord of the Rings]]'' forum to make the key text harder to identify. * In ''[[Lost (2004 TV series)|Lost]]: Mystery of the Island'', a series of four [[jigsaw puzzle]]s released in 2007, a book cipher was used on each puzzle's box to hide spoilers and reveal information about the show to the fans. * "The Fisher King", a two-part episode of ''[[Criminal Minds]]'', features a book cipher brought to the [[Behavioral Analysis Unit]] by the UNSUB via Agent Hotchner's wife. The cypher was part of a larger puzzle to find a girl who had been missing for two years. The key text was ''[[The Collector]]'' by [[John Fowles]]. * ''[[Burn Notice]]'' (episodes "Where There's Smoke" and "Center of the Storm", 2010): Michael Westen steals a Bible from a safe deposit box that is the code book of Simon. This becomes part of the season plot to track an organization starting wars for profit as Michael tries to arrange an interview with Simon.<!--unexplained is why Westen doesn't simply break the damn cypher.--> *In the episode "[[The Blind Banker]]" of the BBC series ''[[Sherlock (TV series)|Sherlock]]'', [[Sherlock Holmes]] searches for a book that is the key to a cipher being used by [[Tong (organization)|Chinese Tong]] smugglers to communicate with their agents and with each other through graffiti messages. He eventually finds it: the [[Geographers' A–Z Street Atlas|London A-Z]]. * In the film ''[[Unknown (2011 film)|Unknown]]'' (2011), Prof. Bressler's passwords are obscured by a book cipher. * In ''[[The Unit]]'' episode "[[Paradise Lost (The Unit)|Paradise Lost]]", Jonas Blane (a.k.a. Snake Doctor) uses a book code from the poem ''[[Paradise Lost]]'' to communicate to his wife, [[Molly Blane|Molly]], that he has arrived safely in Panama. * In ''[[The Good Soldier Švejk]]'' by [[Jaroslav Hašek]], the officers in Švejk's [[battalion]] attempt to use a book cipher. Their attempts are undone, however, when it is revealed that the novel in question is composed of two volumes, and Švejk has delivered the first volume to the officers, thinking that they intended to read the novel, rather than the second, which is used for the cipher. Furthermore, the key to the cipher is identical to an example given in a published military textbook. * In ''[[An Instance of the Fingerpost]]'', a [[historical fiction|historical mystery]] by [[Iain Pears]], a book cipher conceals one character's family history and its relationship with the [[English Civil War]]. * In John Le Carre's ''[[A Perfect Spy]]'', the protagonist Magnus Pym uses a book cipher based on the German text Simplicissimus. * In the book ''[[Red Dragon (novel)|Red Dragon]]'', [[Hannibal Lecter]] uses a book code to encrypt a message to the [[Francis Dolarhyde|Tooth Fairy]] killer, with the message containing the home address of [[Will Graham (character)|Will Graham]], who is investigating the case, and the message, "Save yourself. Kill them all", with the intent of having Will and his family fall victim to the killer. In the 1986 film adaptation [[Manhunter (film)|Manhunter]], the book used is mentioned to be a list of statues in the state of [[Maryland]]. In the 2002 adaptation [[Red Dragon (2002 film)|Red Dragon]], the book is changed to the French cooking encyclopedia [[Larousse Gastronomique]] to fit in with that movie's depiction of Lecter. * In ''The Darwin Code'' by J D Welch, Jess uses a Shakespearean speech to construct a book cipher to communicate with an enemy who may or may not be an ally. *In Bitterblue by Kristin Cashore, Bitterblue uses a book(?) code to unlock secrets of her father's reign as king. *In the TV series ''[[Deutschland 83]]'', protagonist Martin Rauch's [[East German]] handlers use a book cipher to communicate with him while he is undercover in [[West Germany]]. *In the series 2 finale of the BBC TV show ''[[Luther (TV series)|Luther]]'', two brothers use a book cipher. Luther determines they must be using a book that is readily available in case the book is lost and/or so the users can always have it to hand. This leads him to discovering the book cipher is using Gideon's Bible. == See also == * [[Running key cipher]] * [[Codebook]] ==References== {{reflist}} {{Cryptography navbox | classical}} [[Category:Classical ciphers]] [[Category:Books|cipher]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite book
(
edit
)
Template:Cite news
(
edit
)
Template:Clarify
(
edit
)
Template:Cryptography navbox
(
edit
)
Template:Page needed
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:Xref
(
edit
)