Hall V · American Field American Revolution · 1779–1780 Compromised by capture (1780)

Arnold–André Book Cipher Blackstone’s Commentaries · 1779–1780

A book cipher with two volumes of Blackstone’s Commentaries as the key. The cipher held; the courier didn’t.

OperatorsMajor General Benedict Arnold & Major John André (British Army)
YearJuly 1779 – September 1780
BookBlackstone’s Commentaries on the Laws of England (also Bailey’s Dictionary)
FormatTriple page.line.word, e.g. 27.4.6 = page 27, line 4, word 6
CompromiseAndré captured 23 Sept 1780 with cipher key, plans, and pass

Why This Matters

In July 1779, Major General Benedict Arnold — hero of Saratoga, lately appointed military governor of Philadelphia — opened a secret correspondence with the British command in New York under the cover-name “Monk” (after General George Monck, who restored the English monarchy in 1660). His liaison was Major John André, the cultivated young Adjutant-General to General Sir Henry Clinton. Their negotiations centred on Arnold’s offer to deliver the Hudson River fortress at West Point to the British in exchange for cash and a brigadier’s commission in the British Army.

Their cipher was a book code. Both men carried matching copies of Sir William Blackstone’s Commentaries on the Laws of England (André alternatively used Nathan Bailey’s Universal Etymological English Dictionary). Each plaintext word was located in the book and transmitted as a numeric triple: page, line, word. The sister of an American spy could carry the resulting strings of numbers without arousing suspicion.

The plot collapsed not through cryptanalysis but through plain bad luck. On 23 September 1780, three New York militiamen stopped André near Tarrytown as he returned from a meeting with Arnold. They searched him, found the cipher key and the plans of West Point in his boot, and turned him in. André was hanged as a spy on 2 October. Arnold escaped to British lines, sailed for England, and lived out his life in disgrace. West Point did not fall.

⚙️How It Works

Both correspondents own identical copies of an agreed reference book. To encrypt a word, the sender finds it in the book and writes down a triple page.line.word. To decrypt, the receiver looks up that triple in their own copy and recovers the plaintext.

Unique to a book cipher: the “key” is a published book, easy to obtain innocuously and impossible to memorise. There is no codebook to capture, no machine to seize — unless the courier is searched, in which case everything is exposed at once.

Words not in the book had to be spelled out letter by letter using a parallel scheme — either a simple letter-position code or, in Arnold’s correspondence, occasional substitutions and abbreviations agreed in advance. Modern cryptanalysis classifies this as a homophonic / nomenclator hybrid.

The demo above uses a deterministic 240-word “book” organised as 12 pages × 5 lines × 4 words. Words not in the book fall through to per-letter triples on “page 14”, bracketed by sentinel triples 13.1.1 and 15.1.1 — mirroring how Arnold and André handled out-of-book words in practice.

💀How It Was Compromised
Capture of the courier (23 September 1780)
Complexity: Three militiamen, an unscheduled patrol

André was returning from West Point in civilian clothes — a fatal mistake, since it made him a spy under the laws of war rather than a uniformed officer. John Paulding, David Williams, and Isaac Van Wart stopped him near Tarrytown, found the documents in his boot, and turned him over to the Continental Army. He was tried, convicted, and hanged within ten days.

Cryptanalysis was never required
Complexity: Moot — the plaintext was recovered with the key

A book cipher with a published reference is genuinely hard to break given only ciphertext: the analyst must guess which book is the key, and there are millions to try. But once the courier and the key are captured together, the entire correspondence becomes readable. The Arnold cipher was never broken cryptanalytically; it never needed to be.

🔬What It Teaches Modern Cryptography
Arnold–André lessonModern echo
Public reference as the keyTrusted-third-party root certificates: well-known but high-value targets
Single point of failure (the courier)The 2010s SolarWinds / supply-chain attacks against single trusted channels
Cryptography held; operations failedThe defining pattern of modern breaches: TLS is fine, the operator clicked the link
Carrying key + ciphertext togetherWhy modern protocols separate key storage from encrypted data (HSM ≠ disk)
📚Research Trail

Satoshi Tomokiyo's Cryptiana notes on the Arnold-André correspondence are among the clearest specialist introductions to how Revolutionary-era book ciphers were actually organised on the page. They pair well with this exhibit because they show the operational side of book codes rather than only the treason narrative.

Quick Facts
OperatorsMajor General Benedict Arnold & Major John André (British Army)
YearJuly 1779 – September 1780
BookBlackstone’s Commentaries on the Laws of England (also Bailey’s Dictionary)
FormatTriple page.line.word, e.g. 27.4.6 = page 27, line 4, word 6
CompromiseAndré captured 23 Sept 1780 with cipher key, plans, and pass
← Previous Culper Ring / Tallmadge Code