Abstract
Simple substitutions generalize the Caesar cipher. One step further are the nomenclators and codebooks, which we present in this chapter. They work like simple substitions, except that they have much larger alphabets: not just letters, but also digrams, syllables, words, and names of people and places. Examples exist already from the 14th century, and a century later we find code factories at work that output series of codebooks by minor variation of a general template. In the First World War, top secret diplomatic messages were encrypted in this way, for example the Zimmermann telegram discussed in Chapter I.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
von zur Gathen, J. (2015). Chapter D Codebooks. In: CryptoSchool. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48425-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-48425-8_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48423-4
Online ISBN: 978-3-662-48425-8
eBook Packages: Computer ScienceComputer Science (R0)