''Military Cryptanalytics'' (or MILCRYP as it is sometimes known) is a revision by
Lambros D. Callimahos
Lambros Demetrios Callimahos (December 16, 1910 – October 28, 1977) was a US Army cryptologist and a flute player.
Early life and education
Callimahos was born in Alexandria of Greek parents; the family emigrated to the United States when he ...
of the series of books written by
William F. Friedman under the title ''Military Cryptanalysis''. It may also contain contributions by other
cryptanalyst
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
s. It was a training manual for
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
and military
cryptanalysts. It was published for government use between 1957 and 1977, though parts I and II were written in 1956 and 1959.
Callimahos on the work
From the Introduction in Part I, Volume I, by Callimahos:
"This text represents an extensive expansion and revision, both in scope and content, of the earlier work entitled 'Military Cryptanalysis, Part I' by William F. Friedman. This expansion and revision was necessitated by the considerable advancement made in the art since the publication of the previous text."
Callimahos referred to parts III–VI at the end of the first volume:
"...Part III will deal with varieties of aperiodic substitution systems, elementary cipher devices and cryptomechanisms, and will embrace a detailed treatment of cryptomathematics and diagnostic tests in cryptanalysis; Part IV will treat transposition and fractioning systems, and combined substitution-transposition systems; Part V will treat the reconstruction of codes, and the solution of enciphered code systems, and Part VI will treat the solution of representative machine cipher systems."
However, parts IV–VI were never completed.
Declassification
Both ''Military Cryptanalytics'' and ''Military Cryptanalysis'' have been subjects of Mandatory Declassification Review (MDR) requests, including one by
John Gilmore in 1992-1993 and two by Charles Varga in 2004 and 2016.
All four parts of ''Military Cryptanalysis'' and the first two parts of the ''Military Cryptanalytics'' series have been
declassified
Declassification is the process of ceasing a protective Classified information, classification, often under the principle of freedom of information. Procedures for declassification vary by country. Papers may be withheld without being classif ...
. The third part of ''Military Cryptanalytics'' was declassified in part in December 2020 and published by GovernmentAttic.org in 2021. In 1984
NSA released copies of ''Military Cryptanalytics'' parts I and II to the (US)
National Archives and Records Administration
The National Archives and Records Administration (NARA) is an " independent federal agency of the United States government within the executive branch", charged with the preservation and documentation of government and historical records. It i ...
, Record Group 457, as SRH-273 and SRH-274, respectively. ("SRH" stands for "Special Research History.")
Reprints
All the declassified books except the third part of Military Cryptanalytics have been reprinted by
Aegean Park Press. Each part of ''Military Cryptanalytics'' consists of two volumes: the first volume contains the tutorial text and the second volume contains appendices. Part I includes material on both uniliteral and multiliteral ciphers and
polyalphabetic ciphers. Part II includes material on repeating-key and bipartite systems and periodic ciphers. Part II, volume II includes the
Zendian Problem, a practical exercise in
traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observed ...
and cryptanalysis.
For the Aegean Park Press edition, Wayne G. Barker added programs for the
TRS-80
The TRS-80 Micro Computer System (TRS-80, later renamed the Model I to distinguish it from successors) is a desktop microcomputer launched in 1977 and sold by Tandy Corporation through their Radio Shack stores. The name is an abbreviation of ...
.
Books
* Military Cryptanalytics, Part I, Volume 1,
* Military Cryptanalytics, Part I, Volume 2,
* Military Cryptanalytics, Part II, Volume 1,
* Military Cryptanalytics, Part II, Volume 2,
* Military Cryptanalysis, Part I,
* Military Cryptanalysis, Part II,
* Military Cryptanalysis, Part III, Simpler Varieties of Aperiodic Substitution Systems,
* Military Cryptanalysis, Part IV, Transposition and Fractionating Systems, {{ISBN, 0-89412-198-7
See also
*
National Security Agency academic publications
External links
Military Cryptanalysis at NSA.gov this provides the text of the Friedman series (only)
Friedman publications at NSA.govFriedman collection at Archive.orgIncluding Military Cryptanalysis I, II, III and IV and Military Cryptanalytics I and II
EFF "Legal Cases - Privacy/FOIA - Gilmore v. NSA (Crypto Docs)" Archive2004 FOIA Request for Military Cryptanalytics Vol III2016 FOIA Request for Military Cryptanalytics Vol IIIMilitary Cryptanalytics, Part III, by Lambros D. Callimahos, 1977
Cryptographic attacks
Military communications
Cryptography books