My Web page about Cryptology
The Louis XIV's codebooks
|
UtilisationA codebook (one part or two part) is used to encrypt the exchanges between two people: the King (or his representative) and a character of the state who is far from the central power. For example between Louvois (the Minister of War) who is present at Versailles and Marshal Catinat who is waging war in the Alps. Perhaps a codebook was also used to allow a group of people to communicate, such as governors of military places as suggested by the letter from Louvois to Bonnais (see later in this page ). The lifetime of a codebook is limited in time, maybe one year? If we inspect an authentic code, we find the year of publication and the correspondents written on it (cf. the code of 1688). We will show at least one example of codebook used during more than a year (see the codebook of 1690). Obviously these measures exist to improve safety. The compromise of a code used between X and Y has no impact on exchanges between X and V, W and Z. The longer a code is used, the greater the risk of capture. Its use is therefore limited in time. Codebooks structureA concrete example: the two part codebook of 1688Here is the structure of this code (cf. codebook of 1688)
A one part codebook of 1684Here is the study of a simple table cipher (cf. the codebook of 1684) There is obviously a lot of similarity with the previous codebook: There are letters, syllables, frequent words. On the other hand, the main difference is that a piece of plain text is represented by only one codegroup to respect a logical order. For example the syllables da, de, di, do, du are respectively coded by the codegroups 311, 331, 331, 341, 351. Note that the codegroups do not follow each other directly but if the nomenclator is ordered in columns (one column for each ten), the previous codegroups appear in the same column. However, this organization excludes the use of duplicates. Even the letters are only coded by one codegroup each: a: 10, b: 12, c: 14, d: 16, e: 18, … This stereotyped organization greatly reduces the differences that may exist between two nomenclators. For example, the beginning of letters in another codebook may begin differently: a: 11, b: 13, … but in the end, it's a small difference. Obviously, this type of codebook provides much lower security than the codes with double tables and even lower than the previous codes (cf. the 1676 code). Security proceduresFrom the book "Le masque de fer (The Iron Mask)":The manipulation of codes, two centuries ago, was the object of the most minute precautions. A letter from Louvois (addressed to Mr de Bonnais), among other proofs, shows the importance attached to this matter. Sir, you will receive by the care of Mr. … a packet which encloses a new codebook, which the King intends it to remain thus sealed until further orders from His Majesty, unless the place where you order does not comes to be attacked; in that case His Majesty, desires that all the news that you will have to give either to Her, or to the governors or intendants in your neighbors, containing the state and the needs of the said place, be encoded with the codebook which is enclosed in said package. You can also open it in case you receive letters from a place of His Majesty, attacked by enemies, which were ciphered with a codebook other than the one used presently, and when you have opened the package mentioned above, you will take bother to tell me and the reasons you have had for doing so, and except in the said cases, you will not open the said package for any reason whatsoever, and you will put yourself in a position to send it back when I send it to you at the end of the campaign, just as it will have been given to you. However, you will acknowledge receipt of it by a letter that will only speak of that. You will also observe that you should never carry this package on you, and that it will be necessary, when you leave the place, that you leave it to whoever will be in charge in your absence, with this one who will teach him how to use it. From Louvois. Note: This letter is followed by the oldest two part codebook (dating from 1676) which is given as sample codebook. References
|