Poem code

Poem code

The poem code is a simple, and insecure, cryptographic method.

The method works by the sender and receiver pre-arranging a poem to use. The sender chooses a set number of words at random from the poem and gives each letter in the chosen words a number. The numbers are then used as a key for some cipher to conceal the plaintext of the message. The cipher used was often double transposition. To indicate to the receiver which words had been chosen an indicator group is sent at the start of the message.

The method is insecure for, if one message is broken by any means (including threat, torture, or even cryptanalysis), future messages will be readable if the source poem has been identified. Since the poems used must be memorable for ease of use by an agent, there is a temptation to use well known poems or poems from well known poets. (e.g. SOE agents often used verses by Shakespeare, Racine, Tennyson, Molière, Keats, etc).

Every poem code message commenced with an indicator-group of five letters, which showed which five words of an agent's poem had been used to encrypt the message. If the agent used the same poem code words to send a number of messages, these words could be discovered easily by enemy cryptographers. If the words could be identified as coming from a famous poem or quotation, then all of the future traffic submitted in that poem code could be read.

When Leo Marks was appointed codes officer of the Special Operations Executive (SOE) in London during World War II, he very quickly recognized the weakness of the technique, and the consequent damage to agents and to their organizations on the Continent, and began to press for changes. Eventually, the SOE began using original compositions (thus not in any published collection of poems from any poet, though perhaps without so much literary merit) to give added protection, but also adopted other more secure methods such as Worked-out Keys (WOKs) and the one-time pad.

A project of Marks', named by him "Operation Gift-Horse", was a deception scheme aimed to disguise the more secure WOK code traffic as poem code traffic, so that German cryptographers would think "Gift-Horsed" messages were easier to break than they actually were. This was done by adding false duplicate indicator groups to WOK-keys, to give the appearance that an agent had repeated the use of certain words of their code poem. The aim of Gift Horse was to waste the enemy's time, and was deployed prior to D-Day, when code traffic increased dramatically.

Bibliography

* "" by Leo Marks, HarperCollins (1998) ISBN 0-00-255944-7; Marks was the Head of Codes at SOE and this book is an account of his struggle to introduce better encryption for use by field agents; it contains more than 20 previously unpublished code poems by Marks, as well as descriptions of how they were used and by whom.

ee also

* Book cipher
* "The Life That I Have" (also known as "Yours", arguably the most famous code poem)


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Poem for Rent — is a nonprofit project for arts distribution. This is done mainly by posting poems on bulletin boards, in the same format like standard house for rent posts, with several detachable tear offs in the bottom. One difference is that instead of a… …   Wikipedia

  • Code (cryptography) — For other uses, see Code (disambiguation). In cryptography, a code is a method used to transform a message into an obscured form, preventing those who do not possess special information, or key, required to apply the transform from understanding… …   Wikipedia

  • List of Code Lyoko episodes — This is a list of episodes for the French animated television series, Code Lyoko. The first season has no set viewing order save for the last two episodes, so it is listed by the order in which it aired. The following seasons have their episodes… …   Wikipedia

  • Marmion (poem) — This article is about the poem. For other uses, see Marmion. Marmion is an epic poem by Walter Scott about the Battle of Flodden Field (1513). It was published in 1808. Scott started writing Marmion, his second major work, in November 1806. When… …   Wikipedia

  • Obfuscated code — Obfuscated code is source or machine code that has been made difficult to understand for humans. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic to prevent… …   Wikipedia

  • The Life That I Have — (sometimes referred to incorrectly as Yours ) is a short poem written by Leo Marks and used as a poem code. In the Second World War, famous poems were used to encrypt messages. This was, however, found to be insecure because enemy cryptographers… …   Wikipedia

  • Special Operations Executive — The Special Operations Executive (SOE), (sometimes referred to as the Baker Street Irregulars after Sherlock Holmes fictional group of helpers) was a British World War II organisation. It was initiated by Winston Churchill and Hugh Dalton in July …   Wikipedia

  • World War II cryptography — Cryptography was used extensively during World War II, with a plethora of code and cipher systems fielded by the nations involved. In addition, the theoretical and practical aspects of cryptanalysis , or codebreaking , was much advanced. Probably …   Wikipedia

  • List of World War II topics (P) — # P 15 Termit # P 59 Airacomet # P 61 Black Widow # P 80 Shooting Star # P 4 class torpedo boat # P. G. Wodehouse # P. O. Box 1142 # P. Y. Saeki # P107 # Paavo Berg # Paavo Nurmi # Paavo Yrjölä # Pablo de Escandón y Barrón # Pacific Fighters #… …   Wikipedia

  • Denise Bloch — (1915 1945) fut, pendant la Seconde Guerre mondiale, un agent secret français du Special Operations Executive. Elle mena des actions clandestines successivement au sein de plusieurs réseaux : DETECTIVE, DIPLOMAT, WHEELWRIGHT, puis, après une …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”