Exhibit 11 of 37 19th Century Weak

Running Key Cipher

A book as the key — the closest classical cipher to the one-time pad

InventorVarious 19th century cryptographers
Year~1850s
Key TypeFull-length key text (book or speech)
Broken BySource text identification · Statistical analysis
Modern LessonKey length = message length (OTP principle)

Why This Matters

The running key cipher solved Vigenère’s fatal flaw — the repeating keyword — by using a full book passage as the key. It appears statistically similar to a one-time pad, but its reliance on natural language as key material introduces subtle vulnerabilities that cryptanalysts can exploit.

📜Historical Context

The running key cipher applies Vigenère's logic but replaces the short repeating keyword with a full-length passage from a pre-agreed text — a book, a speech, a newspaper article. With no repeating key, Kasiski's examination finds nothing. The cipher appears to have the same statistical properties as the one-time pad.

It was used by diplomats and spies who could carry an innocuous-looking book and know which page and line to start from. The key distribution problem was solved by having both parties own the same edition of a common book.

⚙️How It Works
Plain: ATTACKATDAWN
Key:   FROMTHISBOOK
Cipher: each letter shifted by key letter

A+F=F, T+R=K, T+O=H, A+M=M,
C+T=V, K+H=R, A+I=I, T+S=L...

Security depends entirely on the key text never being identified. If an attacker guesses the source (any printed book), they can test it against the ciphertext trivially.

From this book we take our key text ⇓ key source Plain: A T T A C K A T Key: F R O M T H I S Cipher: F K H M V R I L Key = book text Key length = msg length But NOT random → NOT a one-time pad
Book text used as a key matches message length — but English letter patterns make it weaker than a true one-time pad
💀How It Was Broken
Source Text Attack
Complexity: Moderate-Hard

If the key source (a book, speech, or document) can be guessed, the cipher breaks instantly. Historical running key ciphers were often broken when the source text was identified through context clues — agents were known to favor the Bible, Shakespeare, or popular novels of their era.

Statistical Cryptanalysis
Complexity: Hard

Even without knowing the source, the key text has English statistical structure. Both the plaintext and key obey English letter frequencies. This creates detectable second-order patterns that sophisticated statistical attacks can exploit — making the running key cipher weaker than a true one-time pad.

🔬What It Teaches Modern Cryptography
Concept from Running Key CipherModern Evolution
Key length = message lengthOne-time pad: this is exactly the OTP principle — the key must be as long as the message
Non-repeating keyModern stream ciphers: keystream length = message length, never reused
Key source = security weaknessTrue randomness: OTP keys must be random, not drawn from patterned text
Quick Facts
Exhibit11 of 37
Era19th Century
SecurityWeak
InventorVarious 19th century cryptographers
Year~1850s
Key TypeFull-length key text (book or speech)
Broken BySource text identification · Statistical analysis
← Previous Gronsfeld Cipher