Skip to main content

Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence

  • Chapter
  • First Online:
The New Codebreakers

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9100))

Abstract

The conventional narrative for the invention of the AT&T one-time pad was related by David Kahn. Based on the evidence available in the AT&T patent files and from interviews and correspondence, he concluded that Gilbert Vernam came up with the need for randomness, while Joseph Mauborgne realized the need for a non-repeating key. Examination of other documents suggests a different narrative. It is most likely that Vernam came up with the need for non-repetition; Mauborgne, though, apparently contributed materially to the invention of the two-tape variant. Furthermore, there is reason to suspect that he suggested the need for randomness to Vernam. However, neither Mauborgne, Herbert Yardley, nor anyone at AT&T really understood the security advantages of the true one-time tape. Col. Parker Hitt may have; William Friedman definitely did. Finally, we show that Friedman’s attacks on the two-tape variant likely led to his invention of the index of coincidence, arguably the single most important publication in the history of cryptanalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Betsy Rohaly Smoot suggests that these two keywords might be a reference to Parker Hitt [37]. Hitt was an expert on riflery and had just coauthored a book on it with Thomas Brown [17].

  2. 2.

    There is some ambiguity about the year of the letter. There is a note on it, apparently by Parker, concluding that it was 1942; Friedman’s October 1943 response [21, Friedman to Parker, 12 Oct 1943], which refers to Parker’s letter as being from “a number of months ago”, makes one suspect that 1943 is more likely. However, since it is Parker’s letter and he concluded that it was 1942, I have used that date.

  3. 3.

    A photocopy of the memo is in the AT&T archives [4, Churchill to Mauborgne, 8 Aug 1918].

  4. 4.

    See Sect. 101–103 of Title 35 of the U.S. Code.

  5. 5.

    U.S. Patent 1,310,719, page 3, column 1, line 18.

  6. 6.

    U.S. Patent 1,356,546, page 2, column 1, line 30.

  7. 7.

    This is from Section 30 of the Patent Act of 1870, which was in effect at the time.

  8. 8.

    The two patents were drafted by the same attorney, G.E. Folk.

  9. 9.

    This text is taken from Kahn’s notes. I was unable to locate Ballard’s letter.

  10. 10.

    Yardley accused Friedman of stealing his solution; Friedman strongly disputed this and noted that his manuscript had been finished in September 1917, before Yardley had even tackled the problem.

  11. 11.

    I have not seen the original of this letter. This excerpt is contained in the attachment [21, Extracts from Correspondence Relating to Solution of A.T. and T. Printing Telegraph Cipher, 12 Oct 1943] to a letter from Friedman to Parker [21, Friedman to Parker, 12 Oct 1943]. The attachment also shows the extent of Yardley’s involvement in the evaluation.

References

  1. AT&T Machine folder. Dr. David Kahn Collection, National Cryptologic Museum

    Google Scholar 

  2. Bellovin, S.M.: Frank Miller: inventor of the one-time pad. Cryptologia 35(3), 203–222 (2011). An earlier version is available as Technical report CUCS-009-11. http://dx.doi.org/10.1080/01611194.2011.583711

  3. Clark, R.W., Purple, The Man Who Broke Purple: The Life of Colonel William F. Friedman, Who Deciphered the Japanese Code in World War II. Boston: Little, Brown (1977)

    Google Scholar 

  4. Warren, N.J.: File 41–10-03-01. AT&T Archives

    Google Scholar 

  5. Warren, N.J.: File 433–06-01-02. AT&T Archives

    Google Scholar 

  6. Folder 491. NSA William Friedman Collection

    Google Scholar 

  7. Folder 545. NSA William Friedman Collection

    Google Scholar 

  8. Folder 546. NSA William Friedman Collection

    Google Scholar 

  9. Friedman, W.F., Methods for the Solution of Running-key Ciphers. Riverbank Publication No. 16. Geneva, IL: Riverbank Laboratories (1918)

    Google Scholar 

  10. Friedman, W. F.: Can cryptologic history repeat itself? In: NSA William Friedman Collection. Folder 433 Ref ID: A516913. July 21, (1948). https://www.nsa.gov/public_info/_files/friedmanDocuments/ReportsandResearchNotes/FOLDER_433/41711059075043.pdf

  11. Friedman, W.F.: Can cryptologic history repeat itself? In: NSA Technical Journal XVIII.3 (1973)

    Google Scholar 

  12. Friedman, W.F.: Differential primary keys in cryptography. In: Item, William F. Frieman Collection, George Marshall Foundation Library, Lexingon, VA. Although the actual manuscript was created no earlier than 1924, it contains a typed headnote saying that it was based on materials prepared at Riverbank in 1920 (1056)

    Google Scholar 

  13. Friedman, W.F.: Mechanics of differential primary keys. In: Item, 1056: William F. Frieman Collection, George Marshall Foundation Library, Lexingon, VA (1920)

    Google Scholar 

  14. Friedman, W.F.: Methods for the solution of the AT&T machine cipher. In: Item 669. Frieman, W.F., Collection, George Marshall Foundation Libray, Lexington, VA. The title page has a hand-written note denouncing the March 1919 date as an example of Fabyan’s finagling. Friedman did not return from Europe until April 1919, and did not solve the system until December. Geneva, IL: Riverbank Laboratories (1919)

    Google Scholar 

  15. Gilbert Sandford Vernam Collection. George Marshall Foundation Libray, Lexington,VA. http://www.marshallfoundation.org/Library/documents/Vernam_Gilbert_Sandford.pdf

  16. Parker, H.: Manual for the Solution of Military Ciphers. Army Service Schools Press, Fort Leavenworth (1916). http://books.google.com/books?id=2MVBAAAAIAAJ

    Google Scholar 

  17. Hitt, P., Brown, T.W.: Description and Instructions for the Use of the Fire Control Rule. United States Infantry Association (1917). https://encrypted.google.com/books?id=ExgxAQAAMAAJ

  18. Item 669, Folder Nielssen. William F. Frieman Collection, George Marshall Foundation Library, Lexington, VA

    Google Scholar 

  19. Item 669.2. William F. Frieman Collection, George Marshall Foundation Library, Lexington, VA

    Google Scholar 

  20. Item 669.3. William F. Frieman Collection, George Marshall Foundation Library, Lexington, VA

    Google Scholar 

  21. Item 669.4. William F. Frieman Collection, George Marshall Foundation Library, Lexington, VA

    Google Scholar 

  22. Item 669.5. William F. Frieman Collection, George Marshall Foundation Library, Lexington, VA

    Google Scholar 

  23. Kahn, D.: Modern Cryptology. In: Scientific American 215.1, pp. 38–46 (1966)

    Google Scholar 

  24. Kahn, D.: Private communication. 5 July 2013

    Google Scholar 

  25. Kahn, D.: Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939–1943. Houghton Mifflin, Boston (1991)

    Google Scholar 

  26. Kahn, D.: The Codebreakers. Macmillan, New York (1967)

    Google Scholar 

  27. Kahn, D.: The Reader of Gentlemen’s Mail: Herbert O Yardley and the Birth of American Codebreaking. Yale University Press, New Haven (2004)

    Google Scholar 

  28. Parker, R.D.: Recollections concerning the birth of the one-time tape, printing-telegraph machine cryptography. In: NSA Technical Journal I.2, pp. 103–114, July 1956

    Google Scholar 

  29. Parker Hitt Papers. David Kahn Collection, National Cryptologic Museum

    Google Scholar 

  30. RG 120, Entry 2040, Correspondence of the CSO, Box 233. National Archives and Records Administration

    Google Scholar 

  31. RG457, E9032, Box 705. National Archives and Records Administration

    Google Scholar 

  32. RG457, E9032, Box 776; also in SRM-050. National Archives and Records Administration

    Google Scholar 

  33. Sheldon, R.M.: The Friedman Collection: An Analytical Guide (2011). http://marshallfoundation.org/library/documents/FreidmanCollectionGuide.pdf

  34. Slusky, R.D.: Invention Analysis and Claiming: A Patent Lawyer’s Guide. Solo & Small Firm Section, American Bar Association, General Practice (2007). http://books.google.com/books?id=WvpuGlMVg-QC. ISBN 9781590318188

  35. Smoot, B.R.: An accidental cryptologist: the brief career of Genevieve Young Hitt. Cryptologia 35(2), 164–175 (2011). http://www.tandfonline.com/doi/abs/10.1080/01611194.2011.558982

    Article  Google Scholar 

  36. Smoot, B.R.: Pioneers of U.S. military cryptology: Colonel Parker Hitt and his wife, Genevieve Young Hitt. Fed. Hist. 4, 8 (2012)

    Google Scholar 

  37. Elizabeth Rohaly Smoot. Private communication, 7 May 2014

    Google Scholar 

  38. Standard ECMA-10 for Data Interchange on Punched Tape. Second. Geneva, Switzerland: European Computer Manufacturers Association (1970)

    Google Scholar 

  39. The Friedman Legacy: A Tribute to William and Elizabeth Friedman. Sources in Cryptologic History 3. Center for Cryptologic History, National Security Agency (2006). http://www.nsa.gov/about/_files/cryptologic_heritage/publications/prewii/friedman_legacy.pdf

  40. Vernam, G.S.: Cipher printing telegraph systems for secret wire and radio telegraphic communications. J. Am. Inst. Electr. Eng. XLV, 109–115 (1926). https://www.cs.columbia.edu/ smb/vernam.pdf

    Google Scholar 

Download references

Acknowledgments

My primary thanks must go to David Kahn. He more than suggested this project, he strongly and repeatedly urged it, even though he realized that the conclusions might disagree with what he wrote all these years ago—as indeed they have. Beyond that, his well-organized notes from 50 years ago were extremely useful.

This paper could not have been begun, let alone written, without the aid of AT&T Archivist George Kupczak. His help was invaluable, especially his work in finding the crucial file folder containing not just the cited letters but also the original paper tapes sent to Fabyan in the challenge. My long-time friend and collaborator Bill Cheswick assisted in the research there.

Equally valuable was the assistance of Paul Barron, archivist at the George C. Marshall Foundation Library; he arranged for access to papers from the William Friedman Collection. Kathleen Kain, independent research assistant for the George C. Marshall Foundation, copied those documents for me.

Ben Lee provided useful guidance on patent legalisms. David Lesher assisted in research at the National Archives.

Betsy Rohaly Smoot of the NSA Center for Cryptologic History, an expert on the Parker and Genevieve Hitt, found many useful files and letters on most of the people mentioned here. Rene Stein of the National Cryptologic Museum Library helped me with access to papers from the Dr. David Kahn Collection.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steven M. Bellovin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bellovin, S.M. (2016). Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence. In: Ryan, P., Naccache, D., Quisquater, JJ. (eds) The New Codebreakers. Lecture Notes in Computer Science(), vol 9100. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49301-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49301-4_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49300-7

  • Online ISBN: 978-3-662-49301-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics