Manual for the Solution of Military Ciphers/Source: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 3,421:
The process of examination in an office with one examiner, one stenographer and one clerk, might be as follows: On receipt of a captured cipher with accompanying report, the stenographer makes four copies of the cipher on the typewriter. The clerk and stenographer then check the work. The stenographer then proceeds to fill out the first column and first two lines of the second column of the record blank from the report of the capturing officer, keeping the original cipher and two copies with the record. He may also fill out the first seven lines of the second column, if this data is on the captured cipher in plain text. In the meantime the clerk is counting and setting down the whole number of letters of the cipher and the occurrence of AEIOU, LNRST, and JKQXZ, while the examining officer is looking over the cipher for possible recurring groups of letters and underlining them when found.
 
This work being completed, the examining officer is in a position, ordinarily, to decide on the class of the cipher and he may have found something in his examination which will lead him to the case under the class. The clerk in this preliminary count should [</span>[[#pb20|20]]]</span>keep track of the total occurrence of each of the fifteen check letters and not of the three groups given above. This takes a little longer but when done, the data for fifteen letters of the alphabet for a frequency table is completed, leaving only eleven other letters, and in Spanish, but nine, to be counted, in case it is necessary to prepare a frequency table.</div>
 
If the examining officer decides the cipher to be of the transposition class, no further work with frequency tables is necessary. The clerk should proceed to count and set down the number of vowels in each line and column and the examining officer should look for any occurrence of the letter Q and try to connect it with U and another vowel. The stenographer may be set to work putting the cipher into rectangles of different dimensions. The clerk’s work gives data for possible rearrangement, for if the vowels are much out of proportion at any point, they must be connected with the proper proportion of consonants as a first step in rearrangement. Work with transposition ciphers must necessarily include much of the fit and try method. The details of this work are taken up later.
Line 3,447:
Transposition ciphers are limited to the characters of the original text. These characters are rearranged singly, according to some predetermined method or key (monoliteral transposition), or whole words are similarly rearranged (route cipher).
 
There may also be a combination of transposition and substitution methods in enciphering a message but in this case it will fall into the substitution class on first determination and after solution as a substitution cipher it must be handled as a transposition cipher. Examples of this case will be given. [</span>[[#pb24|24]]]</span></div>
 
We may also find transposition or substitution methods applied to words taken from a code book, or to numbers which represent these words. Thus cipher methods blend into code work, for a code is, after all, only a specialized substitution cipher.
Line 3,461:
If these proportions do not hold within 5%, one way or the other, the cipher is certainly a substitution cipher. Note, however, that often the end of a message is filled with letters like K, X, Z to complete cipher words and it is best to neglect the last word or words in making a count. Also, if the cipher be a long one, this determination can safely be made by taking 100 or 200 consecutive letters of the message, either from the beginning or, if nulls at the beginning are suspected, from the interior of the message.
 
The distinction between the route cipher (transposition) and the substitution cipher where whole words are substituted for letters of the original text, must be made on the basis of the words actually used. It is better to consider such a message as a route cipher when the words used appear to have some consecutive meaning bearing on the situation [</span>[[#pb25|25]]]</span>at hand. A substitution cipher of this variety would only be used for transmission of a short message of great importance and secrecy, and then the chances are that certain words corresponding to A, E, N, O and T would appear with such frequency as to point at once to the fact that a substitution cipher was used. Watch the initial or terminal letters in such a cipher; they may spell the message.</div>
 
In general, the determination of class by proportion of vowels, common consonants and rare consonants may be safely followed. We will now proceed to the examination of the more common varieties of each class of cipher.
Line 3,531:
|-
|}
[</span>[[#pb27|27]]]</span></div>
 
(''c'') ''Alternate Horizontal'':
Line 3,953:
and is sent:
 
OTLCV LYART RDHSI EAARH SEIEX [</span>[[#pb30|30]]]</span></div>
 
Case 1-j.
Line 4,431:
meaning that the 4th column of the plain text was transferred in enciphering so it became our 1st, the 2d column remained the 2d; the 6th column became our 3d, etc.
 
Actually, this cipher was solved because the word VILLA was suspected and all the necessary letters were found in line six of the arrangement in [</span>[[#pb33|33]]]</span>twelve columns. The order 1, 6, 3, 11, 8 was tried and gave this result.</div>
{| style="border-spacing:0;width:1.1076in;"
|- style="border:none;padding:0.0194in;"
Line 4,877:
|-
|}
[</span>[[#pb34|34]]]</span></div>
 
 
Line 5,019:
|-
|}
This is a transposition cipher, English text and [</span>[[#pb35|35]]]</span>the number of letters, 70, leads us to try rectangles of 10 × 7 and 7 × 10.</div>
 
 
Line 5,382:
|-
|}
Although of no particular importance, it may be stated that the column key in this case was GRAND [</span>[[#pb36|36]]]</span>and the line key was CENTRAL, both used as in enciphering [[#c2a|Case 2-a]].</div>
 
Case 3. Route ciphers. In this case, whole words of the message are transposed according to some of the methods of Case 1 or 2 or their equivalents. The route cipher is little used at present. Its development and use during the Civil War was caused by the inability of the telegraphers of that day to handle regular cipher matter correctly and rapidly. It was, even in those days, frankly only a delaying cipher and, to be of any value, had to be filled with meaningless words to conceal the message proper. An example from the Signal Book will suffice to show the general character of route ciphers. To one familiar with monoliteral transposition ciphers, even the best of route ciphers offers but little difficulty.
Line 5,418:
MOVE STRENGTH PLANNED SAY ''NEVER'' DAYLIGHT ONE AS PRISONERS ''LEAVING'' ENEMY HUNDRED HIM NORTH ''UNCHANGED'' APPROACHING THOUSAND MEET FROM ''COME''.
 
The words in italics are nulls and not a part of [</span>[[#pb37|37]]]</span>the message and the receiver eliminates them before arranging his message in columns to get the sense of it.</div>
 
As an additional complication, it was customary for each correspondent to have a dictionary or code in which the names of all prominent generals and places and many of the prominent verbs,—as to march, to sail, to encamp, to attack, to retreat,—were represented by other words.
Line 5,430:
However, transposition ciphers are often encountered. They are favorites with those who find the substitution ciphers too difficult and too tedious to handle and who believe that their transposition methods are either absolutely indecipherable or sufficiently so for the purpose of concealing the text of a message for the time being. They seem to be particularly popular with secret agents and spies, presumably because special apparatus is rarely necessary in enciphering and deciphering.
 
Although the number of transposition methods is legion, they can practically all be considered under one of the three cases already discussed. It is surprising how often transposition ciphers prepared [</span>[[#pb38|38]]]</span>by complicated rules, will, on analysis, be seen to be very simple.</div>
 
To be successful in solving transposition ciphers, one should constantly practice reading backward and up and down columns, so that the common combinations of letters are as quickly identified when seen thus as when encountered in straight text. Combinations like EHT, LLIW, ROF, DNA, etc., should be appreciated immediately as common words written backward.
Line 5,436:
A study of the table of frequency of digraphs or pairs is also excellent practice and such a table should be at hand when a transposition cipher is under consideration. It assists greatly if Case 2 be encountered and is of considerable use in solving Case 1.
 
The solution of route ciphers is necessarily one of try and fit, with the knowledge that such ciphers usually are read up and down columns. It is not believed that route ciphers will often be met with at the present day. [</span>[[#pb39|39]]]</span></div>
 
== Chapter VI ==
Line 5,450:
2. By certain rules we determine how many alphabets have been used, if there are more than one, and then isolate and analyze each alphabet by means of a frequency table.
 
3. If the two preceding steps give no results we have to deal with a cipher with a running key, a cipher of the Playfair type, or a cipher where two or more characters are substituted for each letter of the text. Some special cases under this third head will be given but, in general, military ciphers of the substitution class will usually be found to come under the first two heads, on account of the time and care required in the preparation and deciphering of messages by the last named methods and the necessity, in many cases, of using complicated machines for these processes. [</span>[[#pb40|40]]]</span></div>Case 4-a.
 
''Message''
Line 5,470:
|-
|}
The word RETIRESE occurs in the fourth line, and, if the whole message be handled in this way we find the rest of the fourth line to read USTED POR EL MISMO ITINERARIO QUE MARCHO. The message was enciphered using an alphabet where A = X, B = Y, C = Z, D = A, etc. noting that as this message is in Spanish the letters K and W do not appear in the alphabet. [</span>[[#pb41|41]]]</span></div>Case 4-b.
 
''Message''
Line 5,909:
|-
|}
Our first assumption might be that B = A and F = E but it is evident at once that in that case, S, T, U and V (equal to R, S, T and U) do not occur and a message even this short without R, S, T or U is practically impossible. By trying B = E we find that the two tables agree in a general way very well and this is all that can be expected with such a short message. The longer the message the nearer would its frequency table agree with the standard table. Note that if a cipher disk has been used, the alphabet runs the other way and we must count upward in working with a graphic table. Note also that if, in a fairly long message, it is impossible to coördinate the graphic table, reading either up or down, with the standard table and yet some letters occur much more frequently than others and some do not occur at all, we have a mixed alphabet to deal with. The example chosen for [[#c6a|case 6-a]] is of this character. An examination of the frequency table given under that case shows that it bears no graphic resemblance to [</span>[[#pb44|44]]]</span>the standard table. However, as will be seen in [[#c7b|case 7-b]], the preparation of graphic tables enables us to state definitely that the same order of letters is followed in each of a number of mixed alphabets.</div>
 
=== General Remarks ===
Line 5,919:
QDBYP BXHYS OXPCP YSHCS EDRBS ZPTPB BSCSB PSHSZ AJHCD OSEXV HPODA PBPSZ BSVXY XSHCD
 
This message was received from a source which makes us sure it is in Spanish. The occurrence of B, H, P and S has tempted us to try the first two words as in case 4 and 5 but without result. We now prepare a frequency table, noting at the same time the preceding and following letter. This latter proceeding takes little longer than the preparation of an ordinary frequency table and gives most valuable information. [</span>[[#pb45|45]]]</span></div>
 
'''Frequency Table'''
Line 6,101:
It is clear from an examination of this table that we have to deal with a single alphabet but one in which the letters do not occur in their regular order.
 
We may assume that P and S are probably A and E, both on account of the frequency with which they occur and the variety of their prefixes and suffixes. If this is so, then B and H, are probably consonants and may represent R and N respectively. D and X are then vowels by the same method of analysis. Noting that HC occurs three times and taking H as N we conclude that C is probably T. Substitute these values in the last three words of [</span>[[#pb46|46]]]</span>the message because the letters assumed occur rather frequently there.</div>
 
 
Line 6,572:
In this class belong the methods of Vigenere, Porta, Beaufort, St. Cyr, and many others. These methods date back several hundred years, but variations of them are constantly appearing as new ciphers. The Larrabee cipher, used for communication between government departments, is the Vigenere cipher of the 17th Century. The cipher disk method is practically the Vigenere cipher with reversed alphabets.
 
In using these ciphers, there is provided a number of different cipher alphabets, usually twenty-six, and each cipher alphabet is identified by a different letter or number. A key word or phrase (or key number) is agreed upon by the correspondents. The message to be enciphered is written in lines containing a number of letters which is a multiple of the number of letters of the key. The key is written as the first line. Then each column under a letter of the key is enciphered by the cipher alphabet pertaining to that letter of the key. For example, let us take the message, “All radio messages must hereafter be put in cipher,” with the key Grant, using the Vigenere cipher alphabets given below. Each of these alphabets is identified by the first or left hand letter which represents A of the text. We thus will [</span>[[#pb52|52]]]</span>use in turn the alphabets beginning with G, with R, with A, with N, and with T.</div>
 
 
Line 6,739:
This method of arranging the message into lines and columns and then enciphering whole columns with each cipher alphabet is much shorter than the method of handling each letter of the message separately. The chance of error is also greatly reduced.
 
All these cipher methods can be operated by means of squares containing the various alphabets, cipher disks or arrangements of fixed and sliding alphabets. For example, this was the original cipher of Vigenere: [</span>[[#pb53|53]]]</span></div>
 
 
Line 7,625:
|-
|}
[</span>[[#pb57|57]]]</span></div>
 
Here again the large letters at the left correspond to the letters of the key and, in each pair of alphabets, the upper one is that of the plain text and the lower is that of the cipher.
Line 7,676:
The other ciphers mentioned are merely variations of these that have been discussed. It is immaterial, in the following analysis, which variety has been used. The analysis is really based on what can be done with a cipher made up with a mixed cipher alphabet which may be moved with reference to the fixed alphabet of the text, (See Case 7-b). Clearly this is a much more difficult proposition than dealing with a cipher in which the cipher alphabets run in their regular sequence, either backward or forward. In fact, in the analysis of Case 7, we may consider any cipher prepared by the method of Vigenere or any of its variations as a special and simple case.
 
It was long ago discovered that, in any cipher of this class, (1) two like groups of letters in the cipher are most probably the result of two like groups of letters of the text enciphered by the same alphabets and (2) the number of letters in one group plus the number of letters to the beginning of the second group is a multiple of the number of alphabets used. It is evident, of course, that we may have similar groups in the cipher which are not the result of enciphering [</span>[[#pb58|58]]]</span>similar groups of the text by the same alphabets but if we take all recurring groups in a message and investigate the number of intervening letters, we will find that the majority of such cases will conform to these two principles.</div>
 
Changing the key word and message to illustrate more clearly the above points, the following is quoted from the Signal Book, 1914, with reference to the use of the cipher disk in preparing a message with a key word.
Line 7,758:
|-
|}
“Now bring the ‘a’ of the upper disk under the first letter of the key word on the lower disk, in this case ‘D’. The first letter of the message to be enciphered is ‘A’: ‘d’ is found to be the letter connected with ‘A’, and it is put down as the first cipher letter. The letter ‘a’ is then brought under ‘I’ which is the second letter of the key word. ‘R’ is to be enciphered and ‘r’ is found to be the second cipher letter.... Proceed in this manner until the last letter of the key word is used and beginning again with the letter ‘D’, so continue until all letters of [</span>[[#pb59|59]]]</span>the message have been enciphered. Divided into groups of five letters, it will be as follows:</div>
 
“DRZCS XOTFG EYRIF HZRWC SXETA EBKSX MQQQW CKBPT DMF.”
Line 7,808:
The messages in question appeared in an English newspaper. It is fair to presume then that the cipher is in English. This is checked negatively by the fact that it contains the letter W which is not used in any of the Latin languages and that the last fifteen words of the message consist of from two to four letters each, an impossible thing in German. It contains 108 groups which are probably words, as there are 473 letters or an average of 4.4 letters per group, while we normally expect an average of about 5 letters per group. The vowels AEIOU number 90 and the letters JKQXZ number 78. It is thus a substitution cipher (20% of 473=94.6).
 
Recurring words and similar groups are AIIWG, AII<nowiki>; </nowiki>BKSM, BKAI<nowiki>; </nowiki>CT, CTWY, CTW<nowiki>; </nowiki>DLMMJXL, DL<nowiki>; </nowiki>ESF, ESBP<nowiki>; </nowiki>FJNVX, FJHVSI<nowiki>; </nowiki>NPSI, NPUXQG<nowiki>; </nowiki>OSB, OSY, ROSB<nowiki>; </nowiki>OL, OL<nowiki>; </nowiki>PORTELOGJ, PO<nowiki>; </nowiki>SQ, SQA<nowiki>; </nowiki>TP, TP<nowiki>; </nowiki>TLBWTPZ, TLFNS, TLFTWMC<nowiki>; </nowiki>UVZUA, UVD, UV<nowiki>; </nowiki>XMKUL, XMKUHW<nowiki>; </nowiki>YJL, YJVTI. [</span>[[#pb61|61]]]</span></div>
 
=== Frequency Table for the Message ===
Line 8,697:
|| 6=2×3
| align=center| XQ
| align=right| 144=2×2×2×2×3×3[</span>[[#pb65|65]]]</span>
|- style="border:none;padding:0.0194in;"
|| ER
Line 8,758:
Out of one hundred and one recurring pairs we have fifty with the factors 2×3=6; out of twelve recurring triplets, nine have these factors; and the four recurring groups of four or more letters all have these factors. The percentages are respectively 49.5%, 75% and 100% and we may be certain from this that six alphabets were used. But, before the six frequency tables are made up, there is one more point to be considered; why are there so many recurring groups which do not have six as a factor? The answer is that one or more of the alphabets is repeated in each cycle; that is, a key word of the form HAVANA has been used. If this were the key word, the second, fourth and sixth alphabets would be the same. We will see later that in this example the second and sixth alphabets are the same and this introduces the great number of recurring groups without the factor 6.
 
We will now proceed to make a frequency table for each alphabet. As the message is written in thirty columns, we take the first, seventh, thirteenth, etc., as constituting the first alphabet; the second, eighth, fourteenth, etc., as constituting the second alphabet and so on. The prefix and suffix letter is noted for each occurrence of each letter. The importance of this will be appreciated when the form of the frequency tables is examined. None bears any resemblance to the normal frequency table except that each is evidently a mixed up alphabet. The [</span>[[#pb66|66]]]</span>numbers after “Prefix” and “Suffix” refer to the alphabet to which these belong, for convenience in future reference.</div>
 
=== Frequency Tables ===
Line 9,319:
|| 1
|| R
| align=right| H [</span>[[#pb67|67]]]</span>
|- style="border:none;padding:0.0194in;"
| colspan="5" | Fifth Alphabet
Line 9,659:
|-
|}
In the 1st alphabet, T and X are placed as A and E respectively on the basis of frequency. In the 2d and 6th alphabets, O and E are placed as A and E respectively on the basis of frequency. In the 4th [</span>[[#pb69|69]]]</span>alphabet, E and S are placed as A and E, and in the 5th, D, U and L are placed as A, E and O for the same reason. We now have an excess of E’s and a deficiency of A’s, which will be corrected if, in the 3d alphabet, we place L, I and C as A, E and O respectively. As a check, this gives us TOLEDO as the key word.</div>
 
In the second alphabet, O is four letters to the left of E<nowiki>; we may place </nowiki>O four letters to the left of E in the fourth and it comes under V. Note that in the fourth frequency table O (= V) does not occur. In the same way in the fourth alphabet, S is four letters to the right of E<nowiki>; placing it in the same position with respect to </nowiki>E in the second and sixth, we have S under I. We have already noted that S probably represents a vowel in these two alphabets. In this way, we may add D and U to the third alphabet from their position in the fifth with respect to L and we may add I and O to the fifth from their position in the third with respect to L. In every case we check results from the frequency tables and find nothing unlikely in the results.
Line 9,973:
|-
|}
This alphabet has been determined from many radio messages from A, the superior, to B, his sub-ordinate, who has a force of about 2,000 men near the border. A uses the form ORDENO QUE instead of the more familiar MANDO QUE in all his messages giving orders to B. The following message is received from A by B’s radio station (and other listening stations) and about an hour [</span>[[#pb73|73]]]</span>later there is a good deal of noise and movement as if B’s force were breaking camp.</div>
 
 
Line 10,067:
|-
|}
Clearly there is nothing here and the assumed words, if they occur, are in the middle of the message. We may jump to the combination PEGQGV at once since the preceding letters do not make ORDENO QUE. We try this without result and proceed to EGQGVJ, GQGVJJ, QGVJJE, GVJJEE, [</span>[[#pb74|74]]]</span>VJJEEE, JJEEEH, JEEEHO, EEEHOB, EEHOBG, EHOBGV, HOBGVG, OBGVGJ, BGVGJC, GVGJCA, VGJCAG, all without result. This work requires less time than might be imagined and is the kind of work which can be divided among a number of operators. Now let us come to the next combination GJCAGX. We add the next three letters, AES, against QUE.</div>
 
If
Line 10,379:
In preparing a cipher by this method, a key word is chosen by the correspondents. A large square, divided into twenty-five smaller squares, is constructed as shown below and the letters of the key word are written in, beginning at the upper left hand corner. If any letter recurs in the key word, it is only used on the first occurrence. The remaining letters of the alphabet are used to fill up the square. It is customary to consider I and J as one letter in this cipher and they are written together in the same square.
 
If the key word chosen is LEAVENWORTH, then the square would be constructed as follows: [</span>[[#pb77|77]]]</span></div>
 
 
Line 10,462:
The message is then broken up into groups of five letters for transmission.
 
To decipher such a cryptogram, (knowing the key word), the receiver divides it into pairs, and [</span>[[#pb78|78]]]</span>from his table finds the equivalent of these pairs, taking the letter immediately above each, when they are in the same vertical line; those immediately on the left, when in the same horizontal line; and those at opposite angles of the rectangle when this is formed.</div>
 
It is evident, from the foregoing description, that any letter of the plain text may be represented in cipher by one of five letters, viz: The one next below it and the other four letters in the same horizontal line with it in the square. Take, for example, the letter D of the plain text, in combination with each of the other letters of the alphabet. We have, using the key LEAVENWORTH:
Line 10,580:
DB FN EX TZ MF TO VB QB QT OB XA OF PR TZ EQ RH QK QV DX OK AB PR QI EL TV KE EX XS FS BP WD BO BY BF RO EA BO RH QK QV TX GU EL AB TH TR XN ON EA AY XH BO HN EX BS HR QB ZM SE XP HF GZ UG KC BD PO EA AY XH BO XP HF KR QI AB PR QI EL BX FZ BI SE FX PB RA PR QI WC BR XD YG TB QT EA AY XH BO HN EX BS HR QB PR QI EL BX BT HB QB NF SI SE BX NU XP BU RB XB QR OX BA TB RH BP WD RP RO GU GX QR SE ZY OX BA EL AX CW BY BA SX RK RO PR HB OP BD PI CN OX EM RP KR XT EL AX CW EQ FZ SX EL RH RO PR HB UX DA SE XN ZN GU EL BX FS DG DB TB ZL VE RH BO RQ.
 
From this message, we make up the following table, considering the letters of each pair: [</span>[[#pb80|80]]]</span></div>
 
''First Letters of Pairs''
Line 11,364:
|-
|}
Let us now check this by picking out the combinations beginning with EL and seeing if the table will solve them. We find, ELTV, ELAB, ELBXFZ, ELBXBT, ELAXCWBY, ELAXCWEQ, ELRH, ELBXFS. Now, on the assumption that the letter after EL represents E, we have it represented by A three times, B three times, R once and T once. This requires [</span>[[#pb82|82]]]</span>that A and B be put in the same horizontal line with E, since T is already there, and R is tentatively under E.</div>
 
The combination ELTV now equals THEZ. If the T were moved one place to the left, it would be THEY, a more likely combination, but this requires the L to be moved one place to the left also, by putting I or K in the key word and taking out O, R or X and returning it to its place in the alphabetical sequence. The most frequent pairs containing O are B O six times, R O four times, and O X three times. Now these pairs equal respectively E N, E S and H E, if O is put between N and P in the fourth line. We will therefore cease to consider it as a letter of the the key word. The combination ELAB can only be THE_ on the assumption that A is the first letter to the right of E. The combination ELBX occurs three times. If it represents THE_, the B must be the first letter of the first line and the X must now be placed under E where the R was tentatively put. We can get THE_ out of ELRH by putting R in the first line or leaving it where it is, but the preponderance of the BX combination should suggest the former alternative.
Line 11,404:
|-
|}
As I put in the space under B will give the word BEATRIX and as a vowel is clearly necessary there, we will so use the IJ and leave K between H and L. This leaves C, D and F to be placed. It appeared at [</span>[[#pb83|83]]]</span>first that F was in the key but if it is in the second line, in proximity to the letters of the first line, it will give the same indications. Completing the square then, we have</div>
 
 
Line 12,335:
and this table will solve the cipher message.
 
In ciphers coming under case 9-b and 9-c, it is not uncommon to assign some of the unused numbers such as 85, 93, etc., to whole words in common use or to names of persons or places. In case such groups are found, the meaning must be guessed at from the context; but if many messages in the same cipher are available, the meaning of these groups will soon be obtained. The appearance of such odd groups of figures in a message does not interfere materially with the analysis, and it will be apparent at once on deciphering the message that they represent whole words instead of letters. [</span>[[#pb90|90]]]</span></div>
 
== Chapter IX ==
Line 12,411:
|-
|}
[</span>[[#pb94|94]]]</span></div>
 
The enciphering of the message then proceeds, dealing with the indicator and substituted letters as if they were the letters of a word. The decipherer arriving at an X, a series of the letters of the above table and another X, casts out the X’s and substitutes numbers for the letters.
Line 12,417:
Sometimes no indicator is used, but the system of substitution of a certain letter for each numeral is followed. Again, the indicator NR may be used instead of a single letter.
 
Conventional letters may also be substituted for special characters like ?, $, ”, -, and periods and commas, but this is rarely done except for the period and question mark. The context will usually determine the meaning of such letters when found. In this connection, the use of X to represent end of a sentence and Q to represent a question mark is quite common. [</span>[[#pb95|95]]]</span></div>
 
== Chapter X ==
Line 12,595:
|| 6
| align=center| '''. . . . . .'''
| align=right| - . . . .[</span>[[#pb98|98]]]</span>
|- style="border:none;padding:0.0194in;"
|| 7
Line 12,660:
Line 7, <u>V</u> should be Y. A mistake in copying.
 
Line 8, <u>SKZRX</u>. If we take X as a period, then this line might be OVER, the R being correct and [</span>[[#pb100|100]]]</span>SKZ being in question. The corresponding cipher letters are AEO and if we encipher OVE we get ETJ. Here again we have a telegrapher’s error, . - .--- becoming .- . ---</div>
 
Line 9, <u>L</u> should be I. The corresponding cipher letter should be K instead of H<nowiki>; an error in copying by the encipherer.</nowiki>
Line 12,722:
=== Availability ===
 
<span style="background-color:#ddddee;color:#000000;">This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the </span>[http://www.gutenberg.org/license Project Gutenberg License]</span><span style="background-color:#ddddee;color:#000000;"> included with this eBook or online at </span>[http://www.gutenberg.org/ www.gutenberg.org]</span><span style="background-color:#ddddee;color:#000000;">.</span>
 
<span style="background-color:#ddddee;color:#000000;">This eBook is produced by the Online Distributed Proofreading Team at </span>[http://www.pgdp.net/ www.pgdp.net]<span style="background-color:#ddddee;color:#000000;">.</span>