Hall V · WWI — Cold War · 1914 – 1970

Military & Spy Ciphers

When lives depend on secrecy — the peak of hand-cipher design

The ciphers in this hall were designed not for scholars but for soldiers and spies — people who needed to encrypt messages quickly in the field, under fire, without a computer. They represent the absolute peak of what human ingenuity could achieve in manual cryptography. Some fell within weeks. One — the VIC cipher — may never have been broken by cryptanalysis alone.

WWI WWII Cold War 5 Hard-to-Break Exhibits
⚔️

The military cryptographer's dilemma: A cipher must be strong enough that the enemy cannot read it — but simple enough that a soldier can encrypt and decrypt in the field without a computer, under stress, with minimal training. Every cipher in this hall represents a different solution to that impossible trade-off.

🇫🇷

Georges Painvin and the cipher that changed WWI: In June 1918, Germany launched its final offensive toward Paris. Their communications used the ADFGVX cipher. French cryptanalyst Georges Painvin worked for 48 consecutive hours, lost 15 pounds, and broke the cipher — revealing German supply routes. Allied forces repositioned. The offensive failed. Many historians credit Painvin's break as a turning point of the war. He never claimed the title himself.

🔄Layering → Multiple Rounds

ADFGVX combined substitution and transposition — two different operations. Modern block ciphers like AES apply 10–14 rounds of four different operations (SubBytes, ShiftRows, MixColumns, AddRoundKey) for the same reason: layering makes each step harder to undo.

📋Checkerboard → Variable-Length Encoding

The VIC cipher's straddling checkerboard assigns shorter codes to common letters (like Huffman coding) while also obscuring the alphabet mapping. This dual purpose — compression and encryption — is a sophisticated design insight that modern protocols use separately.

🕵️Human Factors Always Win

The VIC cipher was never broken cryptanalytically. It was broken by a defector. The ADFGVX was broken partly because operators reused keys. The lesson of this hall: the strongest cipher fails when humans make procedural mistakes.

← Previous Hall Hall IV: Transposition & Fractionation