WWII carrier pigeon message discovered in Surrey chimney

Ad: This forum contains affiliate links to products on Amazon and eBay. More information in Terms and rules

From Monty to Ike,
Sure do like that Bradley chap, perhaps we could all have dinner sometime? And bring that fellow Patton, I hear he does an excellent rendition of "Lilly Marlene"; Can't get enough of that song!
 
Seriously though, this might be a hard one to crack. It's been done using a 'one time pad', where the sender and recipient have a pad of identical letter sequences used once only for each message, then destroyed. Possibly the hardest code to crack, unless in possesion of the original pad(s).
 
It's been done using a 'one time pad', where the sender and recipient have a pad of identical letter sequences used once only for each message, then destroyed. Possibly the hardest code to crack, unless in possesion of the original pad(s).

If that's what it is and was done properly (no lazy repetition etc) then it actually is impossible.

Steve
 
Exactly - which was the whole reason for the one time pad. In terms of freqeunt use, it was (and still is) slow and cumbersome, as a user had to have a supply of the pads, which were printed, in duplicate, in huge numbers. Encoding and decoding took time of course, and the users had to have the correct, identical pair of pads.
The identification for which pad was being used was given at the start of the message, or in the first letter group - for example EXGHL, which might mean PAD 12. Each pad had pages of code groups, each page being for one message, or part of a message. Once a message had been encoded, the page was torn from the pad and destroyed.
Even if today's 'computer power' can break into this message, there is absolutely no way it can be certain that any 'translation' is accurate and correct and, in addition, any actual code words used in the message, and then re-coded using the pad, would be impossible to identify.
The beauty of the system, still in use today, is that it is a simple code, but only used once, so therefore foolproof.
 
I've heard a one time pad code can be broken if the message is long enough by matching letters to figures in the coded message based on the frequency of use of letters in the English language and matching it up with the frequency of use of symbols in the message, but the message has to be quite long. Don't think they will get this one.

And yes I read Tom Clancy
 
7.JPG


Geo
 
I've heard a one time pad code can be broken if the message is long enough by matching letters to figures in the coded message based on the frequency of use of letters in the English language and matching it up with the frequency of use of symbols in the message, but the message has to be quite long. Don't think they will get this one.

And yes I read Tom Clancy

If Tom Clancy (who I haven't read) wrote that then he is wrong.
The frequency of letters in the encrypted message has no mathematical relationship with the frequency of letters in the original in the "one time pad" system.
Cheers
Steve
 
Probably says, "Screw Poland, we're staying out of this one..."
 

Users who are viewing this thread

Back