Exhibit 21 of 37 1890s · France Broken

Bazeries Cipher

Invented by a codebreaker — who knew exactly how breakable it was

InventorÉtienne Bazeries
Year~1890s
Key TypeNumeric keyword (Polybius + transposition)
Broken ByLayered frequency analysis
Modern LessonKey-controlled multi-layer operations

Why This Matters

Étienne Bazeries broke the Great Cipher of Louis XIV — a code unread for 200 years — and independently reinvented Thomas Jefferson’s wheel cipher. His cylinder design became the basis for the US Army’s M-94, used through World War II.

📜Historical Context

Étienne Bazeries was one of the most famous cryptanalysts of his era — he broke the Great Cipher of Louis XIV, a code that had protected French royal secrets for 200 years. Ironically, he also designed his own cipher and spent years trying to convince the French military to adopt it, without success.

The Bazeries cylinder — a mechanical device with rotating disks — was independently invented by Thomas Jefferson and later became the basis for the US Army's M-94 cipher device used through WWII.

⚙️How It Works
Step 1: Convert keyword to number (A=1, B=2...)
        e.g., 'ATTAQUE' → 1,20,20,1,17,21,5

Step 2: Build Polybius square, columns in
        keyword-number order

Step 3: Encrypt using the square

Step 4: Apply transposition using the same
        numeric keyword as column order
KEYWORD → NUMBER → TWO LAYERS ATTAQUE → 1,20,20,1,17,21,5 LAYER 1: SUBSTITUTION Polybius square keyed by word LAYER 2: TRANSPOSITION Column order from number key ★ Same keyword controls BOTH layers This creates interdependence — breaking one helps break the other
One keyword drives both substitution and transposition — a strength in theory, but the shared key creates exploitable correlations
💀How It Was Broken
Multi-Layer Frequency Analysis
Complexity: Hard

The Bazeries cipher's two layers are not independent — they share the same keyword. This correlation can be exploited: recovering the transposition key partially constrains the substitution square. Modern hill climbing attacks that search both layers simultaneously can crack it given several hundred characters of ciphertext.

🔬What It Teaches Modern Cryptography
Concept from Bazeries CipherModern Evolution
Single key controls multiple operationsAES key schedule: one master key generates all round keys
Inventor = famous codebreakerSecurity through obscurity fails: cipher design must be public and peer-reviewed
Mechanical cylinder versionRotor machines: Jefferson Disk → Hebern → Enigma
Quick Facts
Exhibit21 of 37
Era1890s · France
SecurityBroken
InventorÉtienne Bazeries
Year~1890s
Key TypeNumeric keyword (Polybius + transposition)
Broken ByLayered frequency analysis
← Previous ADFGVX Cipher