Cipher methods Homophonic
Book cipher
Each letter (or word) is coded by its coordinates in a reference book: page, line, word. Security rides on the shared book.
- Family :
- Homophonic
- Difficulty :
- Advanced
- Era :
- Historical (18th-19th centuries), Benedict Arnold, Beale
Also known as : Arnold cipher · Beale cipher
The book cipher is an ancient method where the book shared between sender and recipient serves as a giant key. Each plaintext letter (or word) is coded by its coordinates in the book: a triplet like page.line.word or page.line.letter.
Made famous by Benedict Arnold (West Point treason correspondence during the American Revolution, 1780) and by the mysterious Beale cipher (Virginia, 1820), one of whose three messages remains unsolved to this day.
Principle
- The correspondents share an identical copy of a specific book (edition, pagination, everything).
- To encrypt, find each plaintext letter (or word) in the book and note its coordinates.
- The ciphertext is a sequence of number triplets separated by dots or spaces.
Abbreviated example: to encrypt HELLO using a given edition, you might get:
15.4.2 — H is on page 15, line 4, word 2
08.1.5 — E is page 8, line 1, letter 5
...
Famous variants
- Arnold cipher (1779-1780) — Benedict Arnold uses a law dictionary to correspond with British officer John André. Uses
page.line.word. - Beale cipher (Virginia, 1820) — three encrypted texts claiming to locate a treasure. Only the second was broken (key = Declaration of Independence). The others remain unresolved despite decades of effort.
- Late Bellaso variants — sometimes mixed with a book cipher for extra security.
- VIC cipher — modern Soviet cipher combining book, Polybius and transposition.
Strengths
- Enormous keyspace: any existing book can serve.
- Portable key: an innocuous book (Bible, travel guide) raises no suspicion.
- Hard to attack without the book: in short messages, coordinates alone don’t reveal the source.
Weaknesses
- Security rests on the book: if it’s identified (via a raid for instance), all is lost.
- Identical edition required: different pagination between sender and recipient breaks everything. A frequent operational mistake.
- Cribs: in long messages, rare letters (
Q,X,Z) always force the same coordinates → redundancy analysis. - Short words: if the cipher encodes words rather than letters, a common
THEstands out immediately.
In CipherChronicle
Book cipher is narrative by nature: each grid can come with a reference to a fictional or famous book the player must guess. Advanced puzzles may include a book excerpt as a hint — or not.
Grid
- 1
Number stream
Numbers that could point to pages, lines, words — without a reference, nothing to do.
- 2
Reference-book hypothesis
The attacker must know or guess the book — a key external to the message.
- 3
Reading: each number = a word or letter position in the book
12 = page 12, 08 = line 8, 15 = word 15, etc. (simplified to two digits here).
- 4
Open the book
Flip through the shared copy and extract the letters/words at the given positions.
- 5
Message revealed
The plaintext appears once positions are resolved.