Fractionated Morse Cipher
Morse code introduces irregular structure — frequency analysis struggles
Why This Matters
The Fractionated Morse cipher exploits Morse code’s variable-length encoding to destroy the regular letter-by-letter structure that frequency analysis relies on — an early example of using data representation itself as a cryptographic defense.
The Fractionated Morse cipher exploits Morse code's variable-length encoding as a cryptographic feature. Because different letters produce different numbers of dots and dashes, converting plaintext to Morse before encryption destroys the regular letter-by-letter structure that frequency analysis relies on.
- Convert plaintext to Morse code (dots, dashes, letter separators)
- Group the Morse stream into triples (·, -, X where X = separator)
- Replace each triple with a letter using a keyed substitution alphabet
H = · · · · E = · L = · - · · HELLO → ···· · ·-·· ·-·· --- Group triples: ··· ·_· -·· ·-·· --- Each triple → substituted letter
Despite the variable-length encoding, Morse has predictable structure. Single dots (E) and single dashes (T) are the most common elements. The frequency distribution of triples is non-uniform and reflects Morse letter frequencies. With enough ciphertext, the triple-to-letter mapping can be recovered through frequency analysis of the 27 possible triples.
| Concept from Fractionated Morse Cipher | Modern Evolution |
|---|---|
| Variable-length encoding | Huffman coding: common values get shorter codes — used in data compression |
| Symbol grouping before substitution | Block cipher modes: plaintext is processed in fixed-size chunks |
| Irregular structure as security | Modern cipher padding: irregular padding is a vulnerability, not a feature |
| Exhibit | 17 of 37 |
| Era | 19th Century |
| Security | Broken |
| Inventor | Unknown |
| Year | ~1880s |
| Key Type | Substitution alphabet for Morse triples |
| Broken By | Structural analysis of Morse patterns |