HOME

TheInfoList



OR:

A null cipher, also known as concealment cipher, is an ancient form of
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
where the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
, which can be used to hide ciphertext. This is one of three categories of cipher used in
classical cryptography In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand ...
along with substitution ciphers and
transposition cipher In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units ...
s.


Classical cryptography

In
classical cryptography In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand ...
, a ''null'' is an extra character intended to confuse the
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
. In the most common form of a null cipher, the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is included within the
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext ...
and one needs to discard certain characters in order to decrypt the message (such as first letter, last letter, third letter of every second word, etc.) Most characters in such a cryptogram are nulls, only some are significant, and some others can be used as pointers to the significant ones. Here is an example null cipher message, sent by a German during
World War I World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
: Taking the first letter of every word reveals the hidden message " Pershing sails from N.Y. June I". Following is a more complicated example from England's Civil War which aided Royalist Sir John Trevanian in his escape from a Puritan castle in
Colchester Colchester ( ) is a city in northeastern Essex, England. It is the second-largest settlement in the county, with a population of 130,245 at the 2021 United Kingdom census, 2021 Census. The demonym is ''Colcestrian''. Colchester occupies the ...
:
WORTHIE SIR JOHN, HOPE, THAT IS YE BESTE COMFORT OF YE AFFLICTED, CANNOT MUCH, I FEAR ME, HELP YOU NOW. THAT I WOULD SAY TO YOU, IS THIS ONLY: IF EVER I MAY BE ABLE TO REQUITE THAT I DO OWE YOU, STAND NOT UPON ASKING ME. TIS NOT MUCH THAT I CAN DO; BUT WHAT I CAN DO, BEE YE VERY SURE I WILL. I KNOW THAT, IF DETHE COMES, IF ORDINARY MEN FEAR IT, IT FRIGHTS NOT YOU, ACCOUNTING IT FOR A HIGH HONOUR, TO HAVE SUCH A REWARDE OF YOUR LOYALTY. PRAY YET YOU MAY BE SPARED THIS SOE BITTER, CUP. I FEAR NOT THAT YOU WILL GRUDGE ANY SUFFERINGS; ONLY IF BIE SUBMISSIONS YOU CAN TURN THEM AWAY, TIS THE PART OF A WISE MAN. TELL ME, AN IF YOU CAN, TO DO FOR YOU ANYTHINGE THAT YOU WOLDE HAVE DONE. THE GENERAL GOES BACK ON WEDNESDAY. RESTINGE YOUR SERVANT TO COMMAND.
The third letter after each punctuation reveals "Panel at East end of Chapel slides". A similar technique is to hide entire words, such as in this seemingly innocent message written by a prison inmate but deciphered by the FBI: Taking only every fifth word, one can reconstruct the hidden text which recommends a "hit" on someone: Historically, users of concealment ciphers often used substitution and
transposition cipher In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units ...
s on the data prior to concealment. For example,
Cardinal Richelieu Armand Jean du Plessis, 1st Duke of Richelieu (9 September 1585 – 4 December 1642), commonly known as Cardinal Richelieu, was a Catholic Church in France, French Catholic prelate and statesman who had an outsized influence in civil and religi ...
is said to have used a grille to write secret messages, after which the blank spaces were filled out with extraneous matter to create the impression of a continuous text.


Dot concealment cipher

A dot or pinprick concealment cipher is a common classical encryption method in which dot or pinprick is placed above or below certain letters in a piece of writing. An early reference to this appears in
Aeneas Tacticus Aeneas Tacticus (; fl. 4th century BC) was one of the earliest Greek writers on the art of war and is credited as the first author to provide a complete guide to securing military communications. Polybius described his design for a hydraulic se ...
's book ''On the Defense of Fortifications.'' The Germans improved upon this, using a dot of
invisible ink Invisible ink, also known as security ink or sympathetic ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means, such as heat or ultraviolet light. Invisibl ...
during
World War I World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
and
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
. In 19th-century England, pinpricks in newspapers were once a popular way to send letters with little or no cost. If dots were placed far apart, this cipher could be used effectively. The dots should be small and the null text must make sense in the context of the senders and their relationship. Both also must have agreed on the page, chapter, article, or section to be used, typically several. Another option is to have an indicator, such as the date in a newspaper, which shows which page the message is on. This version is less secure.


Acrostics

The acrostic puzzle is an extended form of null cipher, but not an anacrostic (which uses a set of lettered clues with numbered blanks representing the letters of the answer to figure out the second part, a long series of numbered blanks and spaces representing a message into which the answers for the clues fit). Hidden or otherwise unmentioned acrostics are a type of null cipher. This method can be used to secretly insult a famous or important individual. For example, Rolfe Humphries received a lifelong ban from contributing to
Poetry Magazine ''Poetry'' (founded as ''Poetry: A Magazine of Verse'') has been published in Chicago since 1912. It is one of the leading monthly poetry journals in the English-speaking world. Founded by poet and arts columnist Harriet Monroe, who built it int ...
after he wrote and tried to publish "a poem containing a concealed scurrilous phrase aimed at a well-known person", namely
Nicholas Murray Butler Nicholas Murray Butler (April 2, 1862 – December 7, 1947) was an American philosopher, diplomat, and educator. Butler was president of Columbia University, president of the Carnegie Endowment for International Peace, a recipient of the Nobel ...
.


Definition of a null

Put simply, a null cipher is any cipher which involves a number of ''nulls,'' or decoy letters. As well as the methods shown above, a null cipher could be plaintext words with nulls placed in designated areas or even a plaintext message broken up in different positions with a null at the end of each word. However, a message with only a couple nulls (for example, one at the beginning and one at the end) is ''not'' a null cipher. A null cipher is technically only a term for hidden letters or words within an otherwise unimportant message, however, it is occasionally used for the entire category of concealment ciphers.


Usage

In general, it is difficult and time-consuming to produce covert texts that seem natural and would not raise suspicion, but a null cipher is an option if one is unable to use an advanced encryption method and has ample time. If no key or additional encryption is involved, the security of the message relies entirely on the secrecy of the concealment method. In the present day, null ciphers are used by prison inmates in an attempt to have their messages pass inspection. Null ciphers are one of three major cipher types in classical cryptography (the other types being substitution and transposition), but they are less well known than the others. They are often marked as a subcategory of transposition ciphers, but that is not true, as transposition ciphers are scrambled messages.


See also

*
Transposition cipher In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units ...
* Substitution ciphers *
Acrostic An acrostic is a poem or other word composition in which the ''first'' letter (or syllable, or word) of each new line (or paragraph, or other recurring feature in the text) spells out a word, message or the alphabet. The term comes from the Fre ...
* Nulls *
Cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
*
Code In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communicati ...
*
Classical Cryptography In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand ...
*
Cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
*
Steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...


References

{{Cryptography classical Classical ciphers Steganography Cardinal Richelieu