Friday, Feb. 16, 1968

IURP WKH WURYH*

THE CODEBREAKERS by David Kahn. 1,164 pages. Macmillan. $14.95.

In his letters to Cicero, Julius Caesar employed a cipher in which each character was replaced by one standing three places down the alphabet--thus D stood for a, E for b, F for c, etc. Mary Queen of Scots wrote conspiratory messages in cipher; when intercepted and interpreted by England's first great cryptanalyst, Thomas Phelippes, they helped bring Mary to the chopping block. In the U.S., Benedict Arnold employed several codes, including one that was keyed to Volume I of the fifth Oxford edition of Blackstone's Commentaries.

Such are some of the nuggets from the cryptologic trove amassed by David Kahn, past president of the American Cryptogram Association. His huge volume shows how the science of cryptology has influenced the course of nations and the fate of rulers and rogues, soldiers and statesmen, poets and pirates. The speed with which the Navy switched codes following the Pueblo crisis is only the latest public indication of cryptology's continuing importance.

Since the purpose of codes is secrecy, there probably cannot ever be a "definitive" book on the subject. Still, Kahn, an ex-reporter, has produced an astonishingly thorough study. He deals not only with the codebreakers but also with the codemakers and nearly everyone of any consequence who has ever used codes--or seriously thought about them. As he guides the reader through the difficulties of steganography (invisible ink, microdots), monalphabetics (simple, one-alphabet systems, such as the one described in the box, next page), and polyalphabetics (many alphabets used in the same cipher message), Kahn keeps his subject lively and even dramatic. He describes, for example, how cryptology helped get the U.S. into one world war-- and helped shorten another.

The Purple Code. The World War I episode concerns the notorious telegram sent by the German Foreign Minister, Arthur Zimmermann, to his envoy in Mexico; in code it stated Germany's intention of opening unlimited submarine warfare against the U.S. and offered various bribes to get Mexico's support. Decoded by British cryptanalysts, the telegram provided President Wilson with telling evidence to support the U.S. declaration of war on Germany.

As for World War II, almost everyone knows that the U.S. broke Japan's highest level "Purple Code" before Pearl Harbor. But precious few realize what the breakthrough entailed. The code was based on a rotor system--mazes of wires connecting two or more alphabetic rotors that change ciphers at every punch of a keyboard. The use of two rotors permits 676 different cipher positions; five rotors provide 11,881,376 codes.

The solution of the Purple Code fell to the U.S. Army Signal Corps' chief cryptologist, William Friedman, whom Kahn calls the world's greatest code expert. Friedman and his superb team had a head start. For example, they had already solved lower-level codes, and were familiar with common Japanese forms, such as "I have the honor to inform Your Excellency." As Kahn says, "these constituted virtual cribs."

After intense effort, the cryptanalysts arrived at a good pencil-and-paper analogue of the Purple Code. That was only the beginning. From there they went on to construct their own model of Japan's encoding machine, which "spewed sparks and made loud whirring noises," but worked.

Other Galaxies. Foreknowledge of Japanese intentions helped the U.S. in the battles of Coral Sea and Midway, undoubtedly gaining crucial time for the U.S. to prepare its final blows. But the personal toll on Friedman was tremendous: "The despair of the long weeks when the problem seemed insoluble, the repeated dashings of uplifted hopes, the tension and the frustration and the urgency and the secrecy all converged and hammered furiously upon his skull." He collapsed, but three months after his breakdown, Friedman returned to work, although in a less demanding area. Today, at 76, he lives in Washington in retirement.

His coup is now in the past. What of the future? For several years, radio antennas in the U.S., Britain, France, Russia and Australia have been scanning other galaxies, on the off-chance that some sort of creature might be sending signals to earth. When and if such a communication is established, it is certain that it will require cryptanalysts to read the message.

* Solution: Caesar's Code.

This file is automatically generated by a robot program, so reader's discretion is required.