Jefferson Disk
   HOME

TheInfoList



OR:

The Jefferson disk, also called the Bazeries cylinder or wheel cypher, is a cipher system commonly attributed to
Thomas Jefferson Thomas Jefferson (, 1743July 4, 1826) was an American Founding Fathers of the United States, Founding Father and the third president of the United States from 1801 to 1809. He was the primary author of the United States Declaration of Indepe ...
that uses a set of wheels or disks, each with letters of the alphabet arranged around their edge in an order, which is different for each disk and is usually ordered randomly. Each disk is marked with a unique number, and a hole in the center of the disks allows them to be stacked on an
axle An axle or axletree is a central shaft for a rotation, rotating wheel and axle, wheel or gear. On wheeled vehicles, the axle may be fixed to the wheels, rotating with them, or fixed to the vehicle, with the wheels rotating around the axle. In ...
. The disks are removable and can be mounted on the axle in any order desired. The order of the disks is the cipher key, and both sender and receiver must arrange the disks in the same predefined order. Jefferson's device had 36 disks while Bazeries' system had 20. Once the disks have been placed on the axle in the agreed order, the sender rotates each disk up and down until a desired message is spelled out in one row. Then, the sender can copy down any row of text on the disks other than the one that contains the plaintext message. The recipient has to arrange the disks in the agreed-upon order, rotate the disks so they spell out the encrypted message on one row, and then look around the rows until they see the plaintext.


History

In the late 18th century
combination locks A combination lock is a type of Lock and key, locking device in which a sequence of symbols, usually numbers, is used to open the lock. The sequence may be entered using a single rotating dial which interacts with several discs or ''cams'', by ...
, known in Europe since 15th century, were popularized by Edmé Régnier L'Aîné, and versions of them with letters have been suggested to be the origin of cipher machines. The first prototype resembling the Jefferson disk was invented by Swedish baron F. Gripenstierna in 1786, but it operated on a different principle: rather than substitute letters with letters, it used 57 disks to substitute letters entered by a cleared official on the one side of device with numbers on the other side of device visible to a clerk. At some point in the 1790s (exact date is not clear)
Thomas Jefferson Thomas Jefferson (, 1743July 4, 1826) was an American Founding Fathers of the United States, Founding Father and the third president of the United States from 1801 to 1809. He was the primary author of the United States Declaration of Indepe ...
described the device now named after him, with 26 letters on a wheel and estimated 36 to 48 wheels, and its operation in a manuscript. It's commonly claimed that he invented it himself but it is not backed by any evidence, and Jefferson himself didn't imply so in the text. The manuscript was apparently forgotten until it was discovered in 1922 (a year after M-94 entered service, see below) by historian Edmund C. Burnett studying the
Continental Congress The Continental Congress was a series of legislature, legislative bodies, with some executive function, for the Thirteen Colonies of British America, Great Britain in North America, and the newly declared United States before, during, and after ...
. It doesn't appear that the device was ever fabricated, and Jefferson abandoned the idea after receiving a description of columnar transposition cipher from Robert Patterson in 1803, which he found more practical. In the early 1980s NSA acquired for its museum a large incomplete device of Jefferson's type (picture 1 of this article) with 35 remnant disks (out of 40 originally) and 42 characters, including French letters, on each. It was dated to the second quarter of the 19th century and it's not clear if it is related to Jefferson despite originating from
West Virginia West Virginia is a mountainous U.S. state, state in the Southern United States, Southern and Mid-Atlantic (United States), Mid-Atlantic regions of the United States.The United States Census Bureau, Census Bureau and the Association of American ...
. When in 1854 Bristol dentist John H. B. Thwaites submitted a "new" cipher (which was in fact just a variant of the
Vigenère cipher The Vigenère cipher () is a method of encryption, encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key (crypt ...
) to the ''Journal of the Society of the Arts'',
Charles Babbage Charles Babbage (; 26 December 1791 â€“ 18 October 1871) was an English polymath. A mathematician, philosopher, inventor and mechanical engineer, Babbage originated the concept of a digital programmable computer. Babbage is considered ...
mentioned in his response that he likes to use "rings of box-wood placed side by side on a cylinder, and having the twenty-six letters on the circumference of each". However, it's not clear from this description whether the letters were in alphabetic or random order.


Basis for later military ciphers

A device mechanically similar to Jefferson's but somewhat improved was independently re-invented in 1891 by Commandant Etienne Bazeries, but did not become well known until he broke the Great Cipher, of Rossignols. In 1893, French mathematician Arthur Joseph Hermann (better known for founding Éditions Hermann) redesigned the device to use 18 flat wooden or cardboard strips. Cryptologists in other countries also considered similar devices. The Bazeries cylinder was the basis for the US " M-94" cipher machine, which was introduced in 1922 and remained in service until 1942. In 1914, Parker Hitt experimented with the Bazeries device, building one prototype using slides on a wooden frame, with the cipher alphabets printed twice consecutively on the slides, and then another using disks of wood. He forwarded his experiments up the Signal Corps chain of command, and in 1917 Joseph Mauborgne refined the scheme, with the final result being the M-94. The M-94 used 25 aluminium disks on a spindle. It was used by the
Army An army, ground force or land force is an armed force that fights primarily on land. In the broadest sense, it is the land-based military branch, service branch or armed service of a nation or country. It may also include aviation assets by ...
,
Coast Guard A coast guard or coastguard is a Maritime Security Regimes, maritime security organization of a particular country. The term embraces wide range of responsibilities in different countries, from being a heavily armed military force with cust ...
, and the Radio Intelligence Division of the
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States government that regulates communications by radio, television, wire, internet, wi-fi, satellite, and cable across the United States. The FCC maintains j ...
until early in
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
. The Army changed back to Hitt's original slide scheme with the " M-138-A" cipher machine, which was introduced in the 1930s and was used by the
US Navy The United States Navy (USN) is the naval warfare, maritime military branch, service branch of the United States Department of Defense. It is the world's most powerful navy with the largest Displacement (ship), displacement, at 4.5 millio ...
and
US State Department The United States Department of State (DOS), or simply the State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs o ...
through World War II. The M-138-A featured 100 strips, with 30 selected for use in any one cipher session. It was an improvement in security for the
State Department The United States Department of State (DOS), or simply the State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs o ...
, which during the interwar years had used insecure codes, even in one case a standard commercial
telegraph Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas ...
code.


Example of operation

To encrypt a message, the encrypter rotates the disks to produce the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
message along one "row" of the stack of disks, and then selects another row as the
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext ...
. To decrypt the message, the decrypter rotates the disks on his cylinder to produce the ciphertext along a row. Decryption is easier if both the encrypter and the decrypter know the offset of the row, but not necessary since the decrypter can look around the cylinder to find a row that makes sense. For example, a simplified "toy" Bazeries cylinder using only ten disks might be organized as shown below, with each disk "unwrapped" into a line and each marked with a designating number: If the "key", the sequence of disks, for this Bazeries cylinder is and the encrypter wants to send the message "" to the decrypter, the encrypter rearranges the disks as per the key and rotates each disk to obtain the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
, which is shown at the left, with spacing added for clarity: The encrypter then selects the ciphertext from the sixth row of the cylinder up from the plaintext. This ciphertext is also highlighted above with spacing, and gives: . When the decrypter gets the ciphertext, they rearrange the disks on their cylinder to the key arrangement, rotate the disks to give the ciphertext, and then read the plaintext six rows down from the ciphertext, or look over the cylinder for a row that makes sense.


Cryptanalysis

The Bazeries cylinder was a relatively strong system at the time (compared to many other systems in use), and Etienne Bazeries, a French military cryptanalyst, is said to have regarded it as indecipherable. The " Pers Z S" code-breaking group of the German Foreign Office cracked the M-138-A in 1944. However, by that time the Americans had more sophisticated cipher systems in operation. The French cryptographer Gaetan de Viaris (a.k.a. Marquis Gaetan Henri Leon Viarizio di Lesegno), who is famous for one of the first printing cipher devices (1874), solved the Bazeries cylinder in 1893. One major weakness of the Bazeries cylinder is that the offset from the plaintext letter to the ciphertext letter for the cipher alphabet on each disk will be exactly the same. In the example shown above, this offset is six letters. For example, if a cryptanalyst found a message encrypted on the ten-disk Bazeries cylinder described in the example above and has captured their own cylinder, they could decipher the message by entering it on their cylinder and rotating it until they found the message. Still, the number of possible permutations of the disks of the example Bazeries cylinder is . Due to the large size of this number,
trial and error Trial and error is a fundamental method of problem-solving characterized by repeated, varied attempts which are continued until success, or until the practicer stops trying. According to W.H. Thorpe, the term was devised by C. Lloyd Morgan ( ...
testing of the arrangement of the disks is difficult to perform by hand.


References


Sources

* *


External links

{{Cryptography navbox , machines, state=expanded American inventions Encryption devices Thomas Jefferson