Book Cipher
If both correspondents have the same book, the book itself is the key.
Why This Matters
A book cipher trades cryptographic complexity for a logistical secret: the book itself. If you and I both own a copy of the same edition of Don Quixote, I can encode my message as a list of page/line/word triples and you can read it. Adversaries who don't know which book is in use face a search problem of unbounded size. The American Revolutionary War, the Aaron Burr conspiracy, the Beale Treasure papers, German WWI sleeper-agent traffic, and SOE WWII low-priority cells all used book ciphers.
Benedict Arnold and John André used a book cipher keyed to Blackstone's Commentaries in 1780; Aaron Burr used one for his 1807 conspiracy correspondence. The most famous book cipher is the second of the three Beale papers — encoded against the Declaration of Independence and decoded by James Ward in 1885 (who then published it along with the still-unsolved papers 1 and 3). German agent ciphers in both World Wars frequently used commercial novels (so they could be replaced if compromised). SOE used printed-silk one-time pads for high-value circuits but reverted to book ciphers for low-priority agents whose loss could be tolerated.
Pick a book and an edition. To encode the word RIVER, scan the book until you find that word; record its location as (page, line, word) — say (127, 14, 6). Send the triplet. Variants: letter-level book ciphers (every plaintext letter is encoded as the position of any matching letter in the book), word-only ciphers (faster but less flexible — rare words must be spelled out), and number-only ciphers (the running Beale-style format that is just lists of integers).
If the analyst can guess the book, decryption is mechanical. Hints leak constantly: a (page, line, word) format that uses small page numbers suggests a pamphlet rather than a novel; recurring locations suggest a short text re-read; word lengths inferable from spacing point at common words. James Ward solved Beale Cipher 2 by simply trying the Declaration of Independence. Beale 1 and 3 remain unsolved because no one has identified their books.
| Concept from Book Cipher | Modern Evolution |
|---|---|
| The hard part is key distribution | Same insight drives modern PKI |
| Out-of-band key sharing | Couriered books prefigure Diffie-Hellman: get a shared secret without revealing it on the wire |
| Unguessable secrets | If the adversary knows your book is one of 50 popular novels, you have at most ~6 bits of key |
Ciphertext: 48.1 5.1 42.1 15.1
Hint: each pair is a lookup into the shared text. The word is short, valuable, and famous in this cipher family.
| Era | 18th–20th c. |
| Security | Secure if the book is unguessable; broken otherwise |
| Origin | Pre-revolutionary French military couriers; American Revolutionary War |
| Year | 1700s onward |
| Key Type | An agreed-upon book; ciphertext is a list of (page, line, word) or (page, word) coordinates |
| Broken By | Identifying the book — the Beale Cipher 2 was solved when James Ward tried the Declaration of Independence |
| Modern Lesson | Key distribution is the hard part; the underlying primitive can be trivial |