Running Key Cipher
A book as the key — the closest classical cipher to the one-time pad
Why This Matters
The running key cipher solved Vigenère’s fatal flaw — the repeating keyword — by using a full book passage as the key. It appears statistically similar to a one-time pad, but its reliance on natural language as key material introduces subtle vulnerabilities that cryptanalysts can exploit.
The running key cipher applies Vigenère's logic but replaces the short repeating keyword with a full-length passage from a pre-agreed text — a book, a speech, a newspaper article. With no repeating key, Kasiski's examination finds nothing. The cipher appears to have the same statistical properties as the one-time pad.
It was used by diplomats and spies who could carry an innocuous-looking book and know which page and line to start from. The key distribution problem was solved by having both parties own the same edition of a common book.
Plain: ATTACKATDAWN Key: FROMTHISBOOK Cipher: each letter shifted by key letter A+F=F, T+R=K, T+O=H, A+M=M, C+T=V, K+H=R, A+I=I, T+S=L...
Security depends entirely on the key text never being identified. If an attacker guesses the source (any printed book), they can test it against the ciphertext trivially.
If the key source (a book, speech, or document) can be guessed, the cipher breaks instantly. Historical running key ciphers were often broken when the source text was identified through context clues — agents were known to favor the Bible, Shakespeare, or popular novels of their era.
Even without knowing the source, the key text has English statistical structure. Both the plaintext and key obey English letter frequencies. This creates detectable second-order patterns that sophisticated statistical attacks can exploit — making the running key cipher weaker than a true one-time pad.
| Concept from Running Key Cipher | Modern Evolution |
|---|---|
| Key length = message length | One-time pad: this is exactly the OTP principle — the key must be as long as the message |
| Non-repeating key | Modern stream ciphers: keystream length = message length, never reused |
| Key source = security weakness | True randomness: OTP keys must be random, not drawn from patterned text |
| Exhibit | 11 of 37 |
| Era | 19th Century |
| Security | Weak |
| Inventor | Various 19th century cryptographers |
| Year | ~1850s |
| Key Type | Full-length key text (book or speech) |
| Broken By | Source text identification · Statistical analysis |