arabic origins of cryptology vol. 6
TRANSCRIPT
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
1/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
2/199
Series on
Arabic Origins of Cryptology
Volume Six
Two Treatises on CryptanalysisThe Two Essays
The Treatise of ibn Wahab al-K tib
Series Editors
M. Mrayati, Ph.D.
Y. Meer Alam, Ph.D. M. H. at-Tayyan, Ph.D.
Published by
KFCRIS & KACST
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
3/199
ii
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
4/199
iii
Acknowledgments
The editors of this series greatly appreciate the encouragement they
received from Dr. Yahya Mahmoud Ben Jonayd, Secretary General of
King Faisal Center for Research and Islamic Studies, to publish this
Series. We are also in the debt to Dr. Saleh Athel, the President of
King Abdulaziz City for Science and Technology (KACST), for
supporting the project of translating this series into English.
Many thanks go to Dr. Daham Ismail Alani, the Secretary General ofthe Scientific Council of KACST, for his efforts to make this
publication possible. Special thanks are also due to Dr. M. I. al-
Suwaiyel and to His Royal Highness Dr. Turki ibn Muhammad ' l
Suoud, the former and present vice-Presidents of KACST, for their
unceasing encouragement of the project.
The typesetting of this bilingual series was realized with skill and
dedication by Mr. Ousama Rajab, to whom we express our deepest
appreciation.
Finally, we would like to mention our recognition to the many who
had previously contributed to the Arabic version of this series, and
particularly to Dr. Wathek Shaheed, Dr. Shaker al-Fahham, the lateProf. Rateb an-Naffakh and, last but not least, to Dr. Fouad Sezgin.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
5/199
iv
Series on
Arabic Origins of Cryptology
Volume 6
Translated by
Said M. al-Asaad
Revised by
Mohammed I. al-Suwaiyel, Ph.D.
Ibrahim A. Kadi, Ph.D.
Marwan al-Bawab
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
6/199
v
Contents
Transliterating Arabic words .......................................................vii
Preface ............................................................................................ ix
The First TreatiseThe Two Essays
Chapter 1: Analytical Study of the Two Essayson Cryptanalysis ....................................................... 3
1.1. Preliminary ............................................................................ 5
1.2. The First Essay on the Cryptanalysis of Straightforward
Ciphers (Simple Encipherment) ............................................ 6
1.2.1. Requisite Tools for the Cryptanalyst ............................. 7
1.2.2. Algorithms Not Based on Statistical Analysis ............... 8
1.2.3. Algorithms Based on Statistical Analysis ...................... 14
1.2.4. A Practical Example ....................................................... 161.2.5. Conclusions ..................................................................... 16
1.3. The Second Essay on the Cryptanalysis of Elaborate and
Demanding Ciphers (Advanced Cryptanalysis) .................... 17
Introduction ............................................................................ 17
1.3.1. Algorithms for Cryptanalysis ......................................... 17
1.3.2. Cryptanalysis of Simple-Substitution Ciphers Using Two
Cipherforms for the Letter () ....................................... 181.3.3. Cryptanalysis of Ciphers Rendered Using Forms of Close
Frequency ....................................................................... 19
1.3.4. Unanswering Ciphers ...................................................... 21
1.3.5. Annex .............................................................................. 24
1.4. Originality of the Author of the Two Essays ........................ 24
Chapter 2:The Edited Two Essays on Cryptanalysis ..............272.1. Editing Methodology............................................................ 282.2. Description of the Manuscript.............................................. 29
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
7/199
vi
2.3. The Texts (Arabic Original and English Translation) ........... 33
2.3.1. The First Essay ................................................................ 34
2.3.2. The Second Essay. ........................................................... 56
The Second TreatiseThe Treatise of ibn Wahab al-K tib
Chapter 1: Analytical Study of ibn Wahabs Treatise ............. 711.1. Preliminary ........................................................................... 73
1.2. Structure of the Treatise ....................................................... 73
Introduction: Motives for Using Secret Writing .................... 741.2.1. Letter Forms and Representations ................................... 74
1.2.2. Methods of Encipherment .............................................. 76
A) By Substitution (at-Tar ama) ................................... 76
B) By Concealment and Transposition (at-Ta miya) ..... 76
1.2.3. Algorithms of Cryptanalysis ...........................................80
- Form Count ....................................................................80
- Statistical Analysis (Frequency of Letters) ................... 80
- Combination of Letters ..................................................81
- Bigrams ..........................................................................81
- The Probable-Word Principle ........................................82
- Outlets of Letters ........................................................... 82- Word Length ..................................................................85
1.2.4. An Overview of Poetry Cryptanalysis ............................ 86
1.2.5. An Encipherment Method ................................................87
1.3. Originality of ibn Wahab al-K tib ..........................................87
Chapter 2:ibn Wahabs Edited Treatise ................................. 892.1. Description of the Manuscript.............................................. 902.2. ibn Wahabs Treatise
(Original Arabic Text and English Translation) .................. 93
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
8/199
vii
Transliterating Arabic words
For transliterating Arabic words (names, titles, etc.) we have adopted the
International System for the Transliteration of Arabic characters, devised by the
International Standards Organization (ISO). The system constitutes ISO
Recommendation R233 (December 1961). Given below is this system, with some
additional explanations found to be necessary.
Vowels:
Arabic characters Transliteration Examples
Short
Vowels
(fat a) a as u in cup.
( amma) uas o in rock,
and u in put.
(kasra) ias e in red,
and i in big.
Long
Vowels
As a in last.
(preceded by ) as oo in moon.
(preceded by ) as ee in sheet.
Consonants:
Arabic
charactersTransliteration Examples
' (e.g. 'amr, 'ibr h m, fu' d, kis ' , t ').
as a in add (e.g. ' dam, qur' n).
b as b in back. t as t in tea. as th in thin.
as g in logic. (e.g. tim). (e.g. lid). d as d in day. as th in then. r as r in red.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
9/199
viii
z as z in zoo. s as s in soon. as sh in show. (e.g. mi r). (e.g. ir r). (e.g. riq). (e.g. fir). (e.g. Abb s).
(e.g. lib).
f as f in few. q (e.g. qur' n). k as k in key. l as l in led. m as m in sum. n as n in sun. h as h in hot. w as w in wet (e.g. wahab, nawfal).
y as ie in orient (e.g. y q t, dunayn r).
Notes:
(t ' marb a): In the absolute state, ignored in transliteration (e.g. mad na); in
the construct state, rendered by (t) (mad nat annab ).
(suk n): Ignored in transliteration.
( adda): Rendered by doubling the consonant.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
10/199
ix
Preface
This is the sixth book ofThe Arabic Origins of Cryptologyseries,
which addresses the cryptological contributions of the Arabs, and
translates a number of treatises by Arab cryptologists. The first four
books are each dedicated to one treatise. Volume One was devoted to
the oldest treatise ever found on cryptanalysis, written by al-Kind , the
well-known Arab philosopher, about 1200 years ago. That volume isintroduced by a chapter studying the historical background of
cryptology as part of the Arab civilization. It studies the factors that
led to the early advances of Arab cryptology, highlighting important
aspects of the science in relation to other sciences. Volume Two
tackles ibn Adl n's treatise al-mu'allaf lil-malik al-'A raf (A manual
on cryptanalysis written for King al-A raf). Volume Three deals with
ibn ad-Durayhim's treatise Mift al-Kun z f al-Marm z (Key
to treasures on clarifying ciphers). Volume Four covers ibn Dunayn r's
book Maq id al-Fu l al-Mutar ima an all at-Tar ama
(Expositive Chapters on Cryptanalysis).
Volume Five, unlike the previous four volumes, includes threetreatises on the cryptanalysis of poetry, i.e. those of ibn ab ab , the
Author ofThe Art of Poets, and al- urhum .
This volume (Volume Six) consists of the following two treatises:
1. A treatise incorporating the Two Essays on Cryptanalysis by an
author known only by these Essays that date back to the 4th
or 5th
century AH (10th
or 11th
AD); and
2. The treatise of ibn Wahab al-K tib, who is estimated to have
lived during the late 3rd
century AH (9th
AD) and the better part of the
4th
AH (10th
AD).
To be noted is that the first three volumes of this series are theEnglish translation of Book One of our Arabic book entitled ilm
at-ta miya wasti r al-mu amm ind al- Arab (Origins of Arab
Cryptography and Cryptanalysis), published by the Arab Academy,
Damascus, 1987.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
11/199
x
On the other hand, the second three volumes (i.e. Volumes Four,
Five and Six) are the English version of Book Two of our afore-stated
Arabic original, also published by the Arab Academy, Damascus,
1997.
More Arab treatises, dealing mainly with ancient calligraphs, are
currently in preparation in both Arabic and English.
* * *
Damascus, January 2007
Dr. M. Mrayati
Dr. Y. Meer Alam Dr. M. H. Tayyan
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
12/199
1
The First Treatise
The Two Essays on Cryptanalysis
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
13/199
2
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
14/199
3
Chapter 1
Analytical Study ofthe Two Essays
on Cryptanalysis
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
15/199
4
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
16/199
5
1.1. Preliminary
The Two Essays constitute something of a compact treatise,
addressing simple encipherment that is easy to cryptanalyse, as the
author describes it, as well as demanding and highly elaborate
ciphers. The manuscript has the distinction of including cryptological
concepts of paramount importance, and also indications that the author
was a seasoned old hand at the art of cryptography, who experienced
encipherment and cryptanalysis through correspondence with
dignitaries and state officials. A chronological approximation showsthat the Two Essays must have been written prior to ibn Dunayn r
(AD 1187-1229), who makes reference to them in his bookExpositive
Chapters on Cryptanalysis.1
The likelihood is that they have been
written after ibn ab ab (d. AD 934), on the basis that their author
adopts for the termenciphermentthe term rendering or tar ama,
which is the one ibn ab ab uses in his Treatise on Cryptanalysis.
This is particularly sensible, given that the terms encipherment and
ciphers were the common terms in use before him. This leads to the
conclusion that the Two Essays are supposed to have been written
sometime in the 4th
and 5th
centuries of the Hegira (10th
and 11th
AD).On the other hand, the identity of the author is still unknown. Except
for a single indication by ibn Dunayn r to the Author of the Two
Essays,2
no reference whatsoever has been made to him in the sheer
bulk of authoritative sources consulted. ibn Dunayn rs refrainment
from explicitly stating the name of the Author of the Two Essays
could be attributed to one of the following two reasons:
1. Some prominent early figures are better known by their major
works than by their own names. This phenomenon is not
uncommon in the Arabic literature; for example Ab Al
al-F ris is widely known as the author of al-' , and Ab al-Baq ' al- Ukbur is dubbed the author of al-'I r b. If this
argument held good in our case, it would be an evidence of the
1See ibn Dunayn r (Volume Four of this Series), p.54 and p.176.
2See ibn Dunayn r, p.176.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
17/199
6
authors extensive knowledge in this science, and an expression
of the importance of the Two Essays.
2. The Author of the Two Essays was anonymous. Failing to
establish his name, ibn Dunayn r opted to identify him with his
Two Essays. Apart from that, he refers in his book to other
cryptological figures by name, such as al-Kind and ibn
ab ab .
Although there is not the slightest indication in the Two Essays as
to the motive for writing them, the odds are that they have been drawn
up at the instance of a then influential person, who seems to appreciatethe use of cryptography in the state affairs. This tone is demonstrated
towards the end of the First Essay, when the author cautions
professional experts in this invaluable science against downgrading
its worthy applications to unproductive ends, such as using it for fun
and betting on trifles that serve no purpose, instead of employing it in
pursuit of honourable objectives. This statement, in addition to the
ciphertext given in the First Essay as a practical example, reflects the
thriving activity of encipherment, and shows how far it was enjoying a
boost in circulation at the time of the Author.
1.2. The First Essay on the Cryptanalysis ofStraightforward Ciphers (SimpleEncipherment)
This essay opens right with the words: I tell you, may God
shepherd your steps3. By this the Author may be addressing himself
to every reader in the tradition of early Arab writers, not that the
discourse might be directed to the one for whom the Two Essays have
been written. This practice, if anything, is not unfamiliar; it was
observed before by al-Kind who addressed his treatise to Ab al-Abb s ibn al-Mu ta im,
4and by ibn Adl n later addressing his work
to the King al-'A raf.5
However, this possibility is rather discounted
3See p. 34.
4See al-Kind (Volume One of this series), p.118.
5See ibn Adl n (Volume Two of this series), p.29.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
18/199
7
by the fact that the formula of address used has nothing special, and
falls short of the big honorific openings that are particularly cut out for
personalities of high status.
1.2.1. Requisite Tools for the Cryptanalyst
The Author turns straight to discuss the tools necessary for the
cryptanalyst, and the attributes characteristic of him/her. These are:
1)Exercising the utmost degree of patience, and showing a real
sense of commitment.2)Quitting idleness and slackness.3)Poring over the cipher symbols from beginning to end, in the
interests of readjusting and learning by heart.
4)Applying the mind with wholehearted dedication. (This is aprinciple of special importance, probably unprecedented.)
5)Temporarily putting off elaborate ciphers to refresh the spiritbefore making an attempt again.
6)Familiarity with the algorithms typically utilized incryptanalysing simple ciphers. If cryptanalysis proves to be
impossible by the above, the following tools should be
observed:7)Acquaintance with the principles of elaborate encipherment that
is impervious to solution.
8)Cryptanalysis of insolvable ciphers that do not seem to respondexcept by sheer coincidence, i.e. through an inadvertent
omission of the encipherer. As the author puts it: possibly as
a result of an error on the part of the cipherer. A cryptologue
with cogent argument, sound intuition and genuine insight can
stand a chance of cracking it in consequence.6
This is a major
principle widely used in cryptanalysis; it is based on tracing
encipherment errors and turning them to good account towards
cryptanalysis. (To the best of our knowledge, this principle isalso unprecedented, and peculiar to the Author of the Two
Essays.)
9)The cipher length: The ciphertext should be ten lines at theminimum, because less than that is nothing if not wearing and
6See p. 34.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
19/199
8
literally exacting. Letters, if not used frequently enough, would
turn out futile.7
Determining the technique of processing or the algorithm of
cryptanalysis is dependent on the length of the cryptogram. Unless the
cryptogram exceeds ten lines (i.e. 400-500 letters), the statistical law
of letter frequency would no longer be applicable to it, and the
cryptogram is thus rendered quite difficult to handle by these
quantitative expedients. In fact this reflection goes to show the
Authors extensive grasp of the principles of encipherment in general,
and letter frequencies and their relative connection in particular. To be
noted is that al-Kind (d. AD 873) was the first to mention thisstatistical law. He says: It could happen sometimes that short
cryptograms are encountered, too short to contain all the symbols of
the alphabet, and where the order of letter frequency cannot be
applied. Indeed the order of letter frequency can normally be applied
in long texts, where the scarcity of letters in one part of the text is
compensated for by their abundance in another part. Consequently, if
the cryptogram was too short, then the correlation between the order
of letter frequency in it and in that of the language would no longer be
reliable, and thereupon you should use another, qualitative expedient
in cryptanalysing the letters.8
Later on, ibn Adl n (d. AD 1268) came to determine the
approximate minimum number of letters a ciphertext should include
for successful cryptanalysis. The length of the text to be
cryptanalysed, he argues, should be at least in the neighborhood of
ninety letters as a rule of thumb, because the letters thus would have
had three rotations. Yet the number of letters may be less than that in
certain cases.9
1.2.2. Algorithms Not Based on Statistical Analysis
There are a number of simple algorithms for cryptanalysis that aremore concerned with practice and experience than statistical analysis.
Of thesealgorithmstheAuthor of the Two Essays states the following:
7See p. 36.
8See al-Kind s treatise (Volume One of this series), pp.124-126.
9See ibn Adl ns treatise (Volume Two of this series), p.52.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
20/199
9
(1)Separation of letters with no spacers between words, such as: (plain) = (cipher)
(2)Transposition within each word, e.g. (plain) = (cipher)321 4321 1 2 3 1 2 3 4
The numbers indicate the relative positions of letters within
each word.
(3)Concealment by letters: operative and inoperative letters, i.e. byintroducing insignificant letters (nulls) in between the
ciphertext letters, e.g.
(plain) = (cipher)(4)Reversal of text with letters broken up, so that reading is
conducted from left to right:
(plain) (cipher)
123456789 1 2 3 4 5 6 7 8 9
(5)Transposition of letters by splitting them into two lines, startingwith the first. Example:
Plain Cipher
=(6)Concealment of letters within words; only one letter of each
word (e.g. the first, second, third, fourth, or the last) is the
target letter. Example:
=
(7)Concealment within words, the starting point being the edge ofa page or the first letter of each line in it, so that these letters
together form a group of words making up the cryptogram.
Some later authors have taken a special interest in this kind ofwriting, and so compiled books on various fields such that
different information comes out pursuant to the way pages are
read: if a page is read widthways, a text in one field of science
emerges; if it is read lengthways ab initio, another field of
science develops; if read lengthways ab intra from a certain
point, a third field of science appears; and so on. A typical
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
21/199
10
example on hand thereupon is a book entitled: Unw n a - araf
al-W f (The Quintessence of Distinction) by 'Ism l ibn Ab
Bakr al-Muqri' (d. AH 837/ AD 1434), covering the five
sciences of Islamic jurisprudence, history, syntax, prosody and
rhymes. Each page is divided into columns; reading it
widthways, irrespective of the columns, emanates
jurisprudence; the right-hand column concerns prosody; the
next columns are on history, syntax and rhymes respectively. A
sample page of the book is here quoted just for illustration.
(8)Concealment by changing especially the letters of the highestfrequency (i.e. , , , , , ), of which two, three, four, or fiveletters may be concealed. For instance, by concealing the two
letters: (= ) and (=3), the cleartext becomes in
cipher: 3 3 .
(9)Encipherment by arranging the letters of the alphabet in twoaligned arrays as follows:
and substituting reciprocally within the pairs ( and ), ( and
), ( and ), etc. For example:
(plain) = (cipher)
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
22/199
11
(
(
(
(
)
( )
( )
)
(
A sample page of the book Unw n a - araf al-W f
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
23/199
12
(10) Substituting some letters of the alphabet according to a setkey, such as that stated by the Author: Then consider the
key often used in our days, i.e. ( ). 10 Encipherment is done by substitution reciprocally only within
these pairs: ( and ), ( and ) ,( and ), ( and ), and( and ); all other letters of the alphabet remain unchanged:
Thus, the name is ciphered: .
(11) Encipherment utilizing the arithmetic of decimally-weightednumerical alphabet (ADWNA), giving the cryptogram the
appearance of a financial register (accounting sheet). The
Author invokes an example demonstrating a method for
expressing the tens, hundreds and thousands in order to
conceal the ADWNA numbers. He says: Encipherment may
be predicated on a special arithmetic [ADWNA]. You
arrange the numbers denoting units from one to nine using
whole [dinars]; under the tens you write fractions of quarters,
and under the hundreds write fractions of halves. Under the
thousand (standing for the letter ) you write fractions ofhalves and quarters.
11This can be represented as follows:
10See p. 38.
11See p. 38.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
24/199
13
Nine Eight Seven Six Five Four Three Two One
9 8 7 6 5 4 3 2 1
dinar dinar dinar dinar dinar dinar dinar dinar dinar
90 80 70 60 50 40 30 20 10
quarter quarter quarter quarter quarter quarter quarter quarter quarter
900 800 700 600 500 400 300 200 100
half half half half half half half half half
1000
quarter and half
Accordingly, the name , for instance, can be enciphered:
one three seven five two four four eight one
quarter quarters quarters quarters dinars dinars quarters dinars dinar
It is evident that ibn Dunayn r has taken this method from the TwoEssays, and included it in his Expositive Chapters on Cryptanalysis
anonymously of any ascription.12
12See ibn Dunayn r's book (Vol. 4 of this series), p.138.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
25/199
14
1.2.3. Algorithms Based on Statistical Analysis
In case the method of encipherment used turns out to be none of the
afore-mentioned or kindred ciphering methods, it is then supposed to
be simple encipherment. Cryptanalysis is conducted through the
following steps:
1. Counting up the cipher forms meticulously, taking special care of
the forms that are close in shape. Two closely similar forms may
be mistaken for one form, such as: or or the like; for inthat case cryptanalysis would become extremely taxing.
13Here
three cases can be distinguished:(a) If the count is found to be twenty-eight forms, you decide
that each letter of the alphabet has been assigned a single
form, with () deemed as two individual letters [not as adistinctive letter].
14
(b) If the count adds up to twenty-nine forms, then () isincluded as a stand-alone letter, too.
15
(c) If, however, it amounts to thirty forms, you conclude that
a space recurs between words.16
2. Sorting out the cipherforms: Then sort the forms out. The sorting
process involves taking up the first form, computing its frequencyof occurrence in the cipher, and affixing the frequency number to
it. Subsequent patterns are handled alike.17
3. Endorsement of cipherforms: Next, you mull the forms over, and
endorse them for good by marking them each with a point under
the number.18
4. Seek for a cipherform of higher frequency than all other forms,
making it the letter () in case the cryptogram is comprised oftwenty-nine letters.
19
13See p. 40.
14See p. 40.
15See p. 40.
16See p. 40.
17See p. 40.
18See p. 40.
19See p. 40.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
26/199
15
5. Recording the letters of the alphabet against their respective
cryptanalysed counterparts in tabular form, according to their
relative frequencies.
6. Hunting for an adjacent element that seems to recur often with the
most frequent letter, and approximates it in number, making it the
letter (). You can verify that by seeking for both forms togetherand consecutively to develop the definite article ().
7. If the cipher uses word-spacers [30 different cipherforms], you
are getting along well towards cryptanalysis, given the fact that
the spacer has a higher frequency than both () and (). It might be
extracted from within the cipher by sound intuition. If this provesdifficult, try to assume the last form of the cipher to be the space,
and estimate the context accordingly. Otherwise take up the first
form and check up on it, since it is possible to start a cipher with a
spacer as a method of further deception.20
8. Now that the space comes out right with both () and (), lookbetween two spaces for a light word such as: , , , or thelike, on the basis of what goes before and after, which you should
adopt and build upon.21
9. Taking advantage of any possible words deliberately kept plain in
the cryptogram, and using them as a vehicle for the intended goal.
10. Utilization of the probable word concept: In case the cipher
turns out to have been rendered without spaces, seek beside ( )a form which you can fairly guess as the letter ( ) and so read thename of God (). Now consider preceding and following formsalready known, and guess at such typical expressions as: , , , , , or the like as dictated by the context.
22
20See p. 42.
21See p. 42.
22See p. 42.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
27/199
16
1.2.4. A Practical Example
Having completed his discussion of the tools and algorithms of
cryptanalysis, the Author turns to give an illustrative cipher of topical
importance at the time. It is in fact a message describing the suffering
of harassed peasants in the Town of Peace, and their abandonment of
their farmlands as a result of the sharp increase in the number of
claims made on them for payment. It is worth noting that the original
version of the ciphertext is not without errors, additions and
omissions. However, these have all been redressed and set right in
light of the cleartext.
1.2.5. Conclusions
The Author concludes his First Essay by considering the benefits of
grasping this science, and regularly practising it to promote practical
experience. Serious cryptanalysts do not content themselves just with
the easy and straightforward, but show keen interest in pursuing the
opaque and the formidable. The Author strongly advises against
degrading this precious science, particularly on the part of those who
have attained the dizzy heights of knowledge in it, by using it for
unworthy intentions such as staking, entertainment, or fun in
company. Instead, he suggests, it should be employed in far more
serious purposes in activities that have to do with state affairs and
the like. This statement of the Author clearly indicates that
encipherment in his days was used for both objectives.
The Author stakes out his position on the issue of employing this
science for betting on solving ciphers, as this proves futile for two
reasons:
(a) that such ciphers are intended solely for sustained mentalexertion, which is impractical; and
(b) that they are unrealistic and not meant for live correspondence
between two minds or souls.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
28/199
17
1.3. The Second Essay on the Cryptanalysis
of Elaborate and Demanding Ciphers(Advanced Cryptanalysis)
This Second Essay incorporates advanced methods of
encipherment and algorithms of cryptanalysis, as opposed to the
contents of the First, which serves as an introduction to cryptanalysis.
This one may be equivalent to what is termed an advanced paper in
todays terminology, and can be divided into the following topics:
Introduction
It is a brief statement that lists types of advanced ciphers. These
are:
a) Ciphers responsive to cryptanalysis by deep insight and common
sense.
b) Ciphers that involve two or more types of encipherment, and are
therefore misleading to the cryptanalyst, giving him/her a false
impression of solution.
c) Ciphers hard to cryptanalyse, although seeminglystraightforward.
d) Ciphers that defy cryptanalysis, even by dedicated professionals
who might well, if at all, manage on mature reflection.
1.3.1. Algorithms for Cryptanalysis
According to the Author, elaborate ciphers may be cryptanalysed
along the following steps:
1. Attempting the tools and algorithms cited in the First Essay. The
Author says: If you are invited to solve a cipher that baffledother peoples endeavours, consider it first by all the weapons
I have already given you.23
23See p. 56.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
29/199
18
2. Verifying the cipherforms are properly sorted out: Make sure of
the sort-out and the number of cipherforms, for that is the
backbone of the whole process.24
3. Seeking for letters of high frequency of occurrence: Seek for
one of the pillars, namely the letters () and (). 25 4. Utilizing the ten principles earlier mentioned in the First Essay,
especially the last five. In the Authors own words: Work out the rest
by the algorithms already known to you. If [the cipher is] found still
unresponsive to ordinary techniques of treatment, you should realize
that the letter () probably assumes two cipherforms. 26 This suggestsa modification to the method of encipherment based on simplesubstitution.
1.3.2. Cryptanalysis of Simple-Substitution CiphersUsing Two Cipherforms for the Letter ()
Encipherment is here rendered by assigning two cipher symbols to
the most frequent Arabic letter (), rather than just one, as is typicallythe practice in simple substitution, particularly if the cryptogram
consists of thirty of them;
27
thereupon:a) Give up working on the letter () [for a while] and seek for theletter (); you will find more of it than all other forms. 28
b) Now spot its exact image next to it, add another unknown form
before it and guess at the word (), presuming the preceding letter tobe () by approximation, 29 denoting the utilization of the probableword (
), which was undoubtedly in common use in correspondence
at the time.
c) Look at the word closely and reflect on it; if you manage to
draw out the form of the letter () from this word, [ ], then trace its
other form with the adjoining () as they recur together in other
24See p. 56.
25See p. 56.
26See p. 56 and p. 58.
27See p. 58.
28See p. 58.
29See p. 58.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
30/199
19
positions, 30
namely make use of two-letter words (bigrams) of
higher frequency in general, and () in particular.d) With the forms of the letters , and coming out right, rack
your brains to resolve the rest.31
Otherwise, quit this algorithm altogether and use another approach;
the cipher could have been rendered by simple substitution but on a
different variation. The following are further possible approaches.
1.3.3. Cryptanalysis of Ciphers Rendered Using Forms
of Close Frequency
The count of cipher characters may turn out to be in excess of thirty
(the count of the alphabet and the space), and a statistical
(quantitative) analysis of the cipher text may give comparable
frequencies of the cipher forms. In this case the cryptologue can
decide for sure that the letters () and () are made to assume twocipher forms each, and that the cryptogram thus has its defects and
frailties blurred.32
Note that the main defect of encipherment by
simple substitution is the possibility for a cryptanalyst to arrive at the
letters of higher frequency in the language through statistical analysis.
It follows, the Author suggests, that cryptanalysis grows all the harderwhen high-frequency letters such as () and () are assigned more thanone cipher symbol.
Cryptanalysis of such ciphers is accomplished according to the
following steps:
1. Look for another technique; do not try to cryptanalyse the
pillars [=the letters () and ()] unless they emerge haphazardly uponreflection.
33
2. Seek for a form that is higher in frequency than all others, and
make it one of the abundant letters, i.e. , , , and . Take thepattern of the letter () if it has been assigned two forms. In case the ()assumes more forms than two, it certainly does not belong to the
30See p. 58.
31See p. 58.
32See p. 60.
33See p. 60.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
31/199
20
group of lucid letters, 34
i.e. the abundant letters or the letters of
highest frequency. Needless to say, this is an important indication of
the Authors deep understanding of the fine points of letters and their
frequency of occurrence. This idea can be elucidated by looking at the
table of frequency of the abundant (high-frequency) and common
(moderate-frequency) letters, as observed by al-Kind :35
High-Frequency Letters Moderate-Frequency LettersLetter Rank Percentage of Occurrence Letter Rank Percentage of Occurrence
1 16.36 8 4.22
2 11.91 9 3.57 3 8.72 10 3.32 4 7.44 11 3.27 5 7.14 12 3.05 6 6.87 13 3.05 7 6.02 14 2.50
15 2.48 16 1.71 17 1.55 18 1.25
Given that the letter () has two forms, the percentage of occurrencefor each would be 16.36/2 = 8.18%, which falls within the range of
abundant letters or lucid letters as the Author dubs them. If,
however, the () assumes three forms, the percentage becomes16.36/3 = 5.45%, which falls short of that of the last abundant letter
(i.e. = 6.02%), and therefore each of the forms representing the letter.) is effectively outside the range of these letters)
3. If a form is entertained to be the letter (), for example, match itup where you find it, and look if it blends in well with its
surroundings. Identify it with identical instances throughout the
cipher.4. If it comes out right, you have achieved the goal; if not, then
you have to retrace your steps straight from the beginning. Assume the
selfsame form to be the letter (), and manipulate it the way you have
34See p. 60.
35See Volume One of this series, p. 58.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
32/199
21
manipulated the (). You may this time fare well; otherwise, make itone or the other of the two forms representing the letter () and manageit as before until you are done with all the lucid letters.
36
1.3.4. Unanswering Ciphers
The Author of the Two Essays proceeds to advance a number of
issues and ideas of paramount importance on encipherment methods
and cryptanalysis algorithms. His argument is based on the following:
(1) There are some intricate ciphers that defy cryptanalysis by theafore-mentioned algorithms; they might be resolved quite by chance.
the Author says: If the cipher proves so refractory that employing all
these techniques of cryptanalysis is out of the question, you should
recognize that it is irretrievable except by sheer chance, since it is
hermetically sealed from all sides.37
(2) Other ciphers add nulls. The Author urges the cryptanalyst to
strain for tracing the nulls, now dropping one symbol, now including
another. On that you build, in the hope that it may respond.38
(3) Some ciphers are intended to be communicated specifically
between a sender and a recipient, and therefore they are impossible to
pierce by a third party.
(4) A wide knowledge of the algorithms of cryptanalysis and the
various techniques of cipher manipulation is bound to help in the
design of unattainable or inaccessible ciphers, through sealing up all
the gaps. He says: A retrievable cipher is typically positively
definable and restricted to specific limits, of which the clues to
cryptanalysis are often predictable. Stopping up these clues makes the
cipher impossible to solve, however great the toil is.39
This is a
general principle which is still effective even today: The encipherer
should assume the role of the cryptanalyst, trying to close the gaps in
his/her cipher and to offset the shortcomings therein, making it astightly and as closely knit as to grow unresponsive to solution.
36See p. 60.
37See p. 62.
38See p. 62.
39See p. 62.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
33/199
22
However, the belief of the existence of such an impregnable cipher
does not, in fact, hold good all the way. Mathematically speaking, all
ciphers are breakable somehow or other except the so-called one-time
pad cipher, proposed in 1917 by Gilbert Vernam, and proved
mathematically to be perfectly secure by Shannon in 1949.
(5) There are ciphers based on simple substitution, in which several
characters are used for each letter, thus increasing the count of
cipherforms to, perhaps, as many as a hundred. Consequently,
decipherment becomes a very complex and demanding task both to
the sending encipherer, should he need to read his cryptogram some
time later, and the receiving cryptologue, who has knowledge of theencipherment method used and also the key for decipherment. In fact
carrying the cipher complexity to excess would necessarily lead to
delays in deciphering the message a reality that can entail serious,
indeed sometimes disastrous, adverse consequences when the cipher
involves an urgent situation or a critical state of affairs that needs
prompt action, such as war.
This view of the Author of the Two Essays still holds true
nowadays. For all the sophistication and state-of-the-art electronics of
today, excessive complexity in the design of encryption algorithms
has its own drawbacks in implementation and decryption, even though
algorithms are known both to the sender and the recipient. Indeed anydelay may incur the forfeiture of precious opportunities, the loss of
which would cost dear. A case in point is the delay that occurred in
breaking a highly complex cipher transmitted to the U.S.S.Pueblo on
its maiden voyage to collect intelligence for the top-secret Operation
Clickbeetle. The incident ended in the ship being attacked and
captured by North Korean gunships on the high seas in January 1968
well before the completion of its first mission, showing how damaging
the intelligence loss is to national security.40
(6) Ciphering and cryptanalysis played an important role at the
time of the Author. It was practised on a large scale in many state
affairs among such personalities of high status as the king,
leaders, ministers, governors, etc., with each employing a scribe
40See Kahn, D. Kahn On Codes, New York: Macmillan, 1983, pp. 35, 181 & 188.
See also Lerner, Mitchell B. The Pueblo Incident: A Spy Ship and the Failure of
American Foreign Policy, University Press of Kansas, 2003.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
34/199
23
responsible for tasks concerned with cryptography and cryptanalysissomething similar to what is called today black chambers.
(7) The Second Essay concludes with an example of setting up a
cipher that is hard to retrieve and yet easy to read, given that the count
of the cipherforms is no more than 28. The method is based on
misleading the cryptanalyst into thinking that it is a simple-
substitution cipher, while it is really not. The letter () is here assignedthree symbols ( , , ) and the letter () three others ( , , ). Sucha practice is bound to complicate the statistical analysis on tha part of
the cryptanalyst. The four extra cipher symbols (i.e. , , , ) used
for () and () are compensated for by reducing the total count ofcipherforms to 28 through assuming a single symbol to at oncerepresent three letters having the same orthographic pattern such as
,) , ,) and ( ) and (, ), thereby making the count of cleartextletters and ciphertext symbols equal. As a result the seemingly easy
cryptanalysis would prove to be extremely difficult.
A noteworthy feature in the frequency of cipherforms so rendered
is the so-called spectrum flattening of the cipher symbols. A
comparison of the frequency of cipherforms to the original frequency
of letters shows a variation in the order of letters as well as bigrams in
terms of their frequency. The bigram () turns to assume nine (3x3)
possibleforms,namely: , , , , , , , and .The same applies to bigrams consisting of letters having the same
orthographic pattern, namely: , , . Such a variation in theorder of letters and bigrams results in considerable difficulty in
processing for statistical cryptanalysis.
It should be pointed out that ibn Dunayn r in his ExpositiveChapters on Cryptanalysis refers to this method of the Author,
disapproving of his use of a single form to denote orthographically
identical letters. This, ibn Dunayn r argues, is likely to confuse the
legitimate decipherer and create ambiguity in determining which of
the identical letters is meant.41
Although initially sound, ibn
Dunayn rs criticism would prove misplaced, given that the general
context and word order would all but certainly help the astute
legitimate decipherer to remove any possible ambiguity. This view is
particularly substantiated by the fact that the Arabic letters were
originally written undotted. It is not beyond the bounds of possibility,
41See ibn Dunayn rs book (Vol.4 of this series),p. 54 and p. 176.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
35/199
24
therefore, that this fact itself has prompted the Author of the Two
Essays to develop this method of encipherment.
1.3.5. Annex
The Two Essays, whole and complete, have been appended by a
practical follow-up that comes in useful in statistical cryptanalysis. It
covers the letters of the Arabic alphabet classified into three broad
categories as per their frequency of occurrence.
Order of letters Number Letters
Abundant(High Frequency)
7
Common(Medium Frequency)
12
Scarce(Low Frequency)
9
Total 28
By analogy, it is interesting to recall ibn Adl ns classification of
Arabic letters into these three categories.42
Apart from the slight
variation in the order of letters within each category, there is no other
difference between ibn Adl ns classification and that of the Author
of the Two Essays except for the letter (), which belongs under thescarce category according to the formers calculations, and under the
common category according to the latters. However, no significant
effect ensues, as the letter () often occupies a middle positionbetween the two categories.
1.4. Originality of the Author of the Two
Essays
The Author attains the furthest limits of distinction in his precision
of expression and profusion of information. He puts forward important
ground-breaking ideas, unprecedented in other cryptological
42See ibn Adl ns treatise (Vol. 2 of this series),p. 18 and p. 48.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
36/199
25
compilations so far explored. The Two Essays are in many ways
reminiscent of al-Kind s treatise as regards their originality. The
Authors contributions include:
1) The relative spectrum flattening in the frequency of the forms in
the ciphertext, through the utilization of several symbols to represent
one high-frequency letter. Note that the first use ever of this principle
in the West dates from the reign of King Henry IV of France (1589-
1610), that is at least four centuries later than the time of writing the
Two Essays.43
2) Advising against inordinate complexity in cipher construction,
as too much elaboration in encipherment can be dangerous, and mayincur the loss of irrecoverable opportunities owing to delayed
decryption.
3) Drawing attention to the importance of spotting potential errors,
inadvertently incurred by the encipherer, and using them profitably
toward cipher cryptanalysis. Note also that this principle has not been
conveyed by cryptographers in the West until quite recently.
4) Restricting the use of encipherment to serious matters related to
state affairs and military and diplomatic correspondence, cautioning
against using the art for unworthy purposes such as staking,
entertainment or the like.
5) Developing a method of encipherment that seems simple andeasy to solve on the face of it, but actually quite involved.
6) Thorough and perceptive knowledge of cryptanalysis by
statistical analysis of letters.7) A clear distinction between simple and complex ciphers.
8) Highlighting the cryptanalytical experience and expertise
required in cipher design, which contributes to sealing up the gaps, if
any, to ensure a tightly-knit cipher.
9) The Two Essays include many cryptological terms, some of
which are novel coinages; e.g. lucid letters, elaborate ciphers, ciphers
that do not answer (unanswering ciphers), closely-knit ciphers,
cipherforms, letter spotting, etc.
10) Stressing the psychological aspect in cryptanalysis. The Author
says: Then apply yourself to it wholeheartedly, undaunted and
unflinchingly determined to solve it, never letting go of hope. Set your
43See Treatise on Cryptography, A. Lange and E.A. Soudart; Laguna Hills, CA:
Aegean Park Press, 1981,pp. 4-5.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
37/199
26
mind at ease while exerting yourself all out for one day or so.
Otherwise, just relax and refresh your soul. Do not overtax your mind
in pursuit, since it is unlikely to pay in that mood.44
11) The Two Essays have become a source for other later authors
on cryptology to tap, such as ibn Dunayn r and probably ibn Adl n.
44See p. 34.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
38/199
27
Chapter 2
The Edited Two Essays
On Cryptanalysis
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
39/199
28
2.1. Editing Methodology
The main purpose of editing is the reproduction of a text as close to
the author's original as possible. In line with this objective, we have
opted for preserving the statement of the original whenever possible.
The very nature of the original manuscripts required theaddition -where appropriate- of explicatory titles in the
interest of marking out divisions or classifications. This
would prove useful for easy understanding and clarity of
ideas.
No effort has been spared in the interpretation of citations(Koranic verses, Prophetic traditions, lines of poetry,
sayings, etc.) contained in the treatises. We have given brief
biographical identification of individuals (in footnotes to
Arabic text only), referring interested readers (in Arabic) to
such authorities as al-A l m by ayr al-D n al-Zirkily or
Mu am al-mu'allifn by Omar Ri Ka la, for further
and more detailed biographical reference. Those citations
and individuals that could not be interpreted or identified
have also been properly recorded.
In explaining the linguistic terms included in the treatise wehave made use of various dictionaries, old and modern,
foremost of which are: Lis n al- Arab and Matn al-lu a.
Unless otherwise necessary, no reference has been made to
any dictionary.
We have adopted the same symbols and signs commonlyemployed by editors of Arabic manuscripts, and conformed to
the modern spelling and transliterating norms. We have
enclosed requisite contextual additions -i.e. explanatory
insertions and comments other than the writer's own words-
within square brackets [ ]; examples illustrating rules of
encipherment have been set off by round brackets (parentheses)( ); book titles in italics; quoted material and Prophetic
traditions have appeared within quotation marks , while
floral brackets have been used to enclose Koranic verses.45
45Translator's explanatory additions are placed between pairs of hyphens: --.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
40/199
29
2.2. Description of the Manuscript
The manuscript of the Two Essays is part of the assemblage of
cryptology, which is estimated to date back to the sixth century of the
Hegira (12th
century AD).46
The Two Essays together occupy eleven
sheets, i.e. the sheets 108/B- 118/B, with the sheet no. 115/B
representing the end of the First Essay and the beginning of the
Second. The following two Exhibits are photocopies of the first sheet
of the First Essay, and the first sheet of the Second Essay (includingthe concluding lines of the First Essay).
46See Volume Two of this series, p. 28 for a full description of the assemblage and
its content. On the other hand, the identification number of the assemblage has
turned out to be 5300, not 5359 as previously stated; we do apologize for this
omission.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
41/199
30
Exhibit 1: A photocopy of the first sheet of the First Essay(Document No. 5300, as-Sulaym niyya Ottoman Archives, Istanbul, Turkey)
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
42/199
31
Exhibit 2: A photocopy of the first sheet of the Second Essay,featuring the concluding lines of the First Essay(Document No. 5300, as-Sulaym niyya Ottoman Archives, Istanbul, Turkey)
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
43/199
32
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
44/199
33
2.3. The Texts(Arabic Original and English Translation)
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
45/199
34
In the name of God
the Compassionate, the Merciful
Sufficient unto me is He
2.3.1. The First Essay
On the Cryptanalysis of
Straightforward Ciphers
[1. Requisite Tools for the Cryptanalyst]
I tell you, may God shepherd your steps, that the first things thecryptanalyst needs are: exercising the utmost degree of patience,
quitting idleness and slackness, scrutinizing the cipherforms from
beginning to end in the interests of readjusting and learning by heart.
Then apply yourself to them wholeheartedly, undaunted and
unflinchingly determined to solve the cipher, never letting go of hope.
Set your mind at ease while exerting your self all out for one day or
so. Otherwise, just relax and refresh your soul. Do not overtax your
mind in pursuit, since it is unlikely to pay in that mood. Reconsider it
later, keen to work it out according to the lights I have set for you and
your mind. If your attempt does not come to fruition, put it off again,
only to re-examine it yet again [later on]. If found anywayunresponsive, you should recognize it is one of the elaborate ciphers I
am to describe in the Second Essay. In this case the cipher is
calculated to be hermetically sealed and unlikely to yield to solution
except haphazardly, possibly as a result of an error on the part of the
cipherer. A cryptologue with cogent argument, sound intuition, and
genuine insight can stand a chance of cracking it in consequence.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
46/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
47/199
36
[2. Algorithms Not Based on Statistical Analysis]
The ciphertext should be ten lines at the minimum, because less
than that is nothing if not wearing and literally exacting. Letters, if not
used frequently enough, would turn out futile. First try the simple
algorithms, as the cipher might have been rendered by someone who
thinks that separating the letters of words would make them difficult
to read, such as:
Or by transposition within each word, writing each word in reverse:
=
Or through concealment by letters: operative and inoperative, e.g.
=
Or by inverting the text, with letters broken up:
=
Encipherment may also be accomplished by splitting the letters of
the ciphertext into two lines, and then taking one letter from the first
line, followed by the corresponding one from the other line
alternately, such as:
= {
Or by concealing the letters within words, so that only one letter ofeach word the first, second, third, fourth, or the last is the intended
letter. Example:
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
48/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
49/199
38
Another method involves selecting for encipherment certain letters
e.g. two, three, four, or five- such as the letters , , , , , , and
leaving the rest intact.
Or by concealment within words, the starting point being the edge
of the page or the first letter of each line in it.
Or by systematically substituting for each letter another; thus
substituting for , for , etc. and vice versa after this fashion.
Then consider the key often used in our days, i.e. ( ).
Encipherment is done by substitution reciprocally only within the
pairs: ( and ), ( and ), ( and ), ( and ) ), and and ); all
other letters of the alphabet remain unaltered. Note that letters can be
written joined or detached. Cryptanalysis is thereby achieved using the
same rule.
Encipherment may be predicated on a special arithmetic
[ADWNA]. You arrange the numbers denoting units from one to nine
using whole [dinars]; under the tens you write fractions of quarters,
and under the hundreds write fractions of halves. Under the thousand
(standing for the letter ) you write fractions of halves and quarters,
and so on. Accordingly, the name , for instance, can be
enciphered thus:
one
dinar
eight
dinars
four
quarters
four
dinars
two
dinars
five
quarters
seven
quarters
three
quarters
one
quarter
Treat all kindred cases likewise, and investigate this category of
algorithms to its full potential.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
50/199
39
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
51/199
40
[3. Algorithms Based on Statistical Analysis]
You may get along perfectly well using the above algorithms. If so,
you have practically attained your objective; otherwise, you set about
counting the cipherforms meticulously, taking special care of the
forms that are close in shape. Two closely similar forms may be
mistaken for one form, such as: or or the like; for in that case
cryptanalysis would become extremely taxing.
If the count is found to be twenty-eight forms, you decide that each
letter of the alphabet has been assigned a single form, with () deemed
as two individual letters [not as a distinctive letter]. If the count adds
up to twenty-nine forms, then () is included as a distinctive letter,
too. If, however, it amounts to thirty forms, you conclude that a spacer
recurs between words.
Then sort the forms out. The sorting process involves taking up the
first form, computing its frequency of occurrence in the cipher, and
affixing the frequency number to it. Subsequent patterns are handled
alike.
Next, you mull the forms over, and endorse them for good by
marking them each with a point under the number. Seek for a
cipherform of higher frequency than all other forms, making it the
letter () in case the cryptogram is comprised of twenty-nine letters.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
52/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
53/199
42
Now write down the letters of the alphabet. Under the letter ( ) set
down the form held to be the letter ( ). Then hunt for an adjacent
element that seems to recur often with it, and approximates it in
number, making this cipher form stand for the letter () and affix it to
the letter (). You can seek for both forms together and consecutively
to develop the definite article () in one place.
If the cipher uses word-spacers [30 different cipher forms], you are
getting along well towards cryptanalysis, given the fact that the spacer
has a higher frequency than both () and (). It might be extracted from
within the cipher by sound intuition. If this proves difficult, try to
assume the last form of the cipher to be the space, and estimate the
context accordingly. Otherwise take up the first form and check up on
it, since it is possible to start a cipher with a spacer as a method of
further deception.
Now that the space comes out right with both () and (), lookbetween two spaces for a light word such as: , , , , , ,
,
, , , , , or the like, on the basis of what goes before and after,
which you should adopt and build upon. With such words laid clear,
cryptanalysing the rest would be plain sailing, particulary if you take
advantage of any possible words some encipherers deliberately leave
plain, and which you can use as a vehicle for the intended goal, God
willing.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
54/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
55/199
44
In case the cipher turns out to have been rendered without spaces,
seek beside ( ) a form which you can fairly guess as the letter ( )and so read the name of God (
). Now consider preceding and
following forms already known, and guess at such typical expressions
as: , , , , , or the like as dictated by the context. Indeed it is an agreed fact among encipherers
that once the letters () and () come out right, they are all but sure topoint to the rest, provided the cryptologue is endowed with patience. I
would call on you to bear with me while I give you an illustrative
example, so as to lend a helping hand to you and support to my own
argument, with the good assistance of God.
[4. Practical Example: Cryptanalysing a Ciphertext]47
And I have laid before you the following cipher to consider:
47The cryptogram has suffered some errors, omissions and additions in the original
manuscript. These, however, have been set right in light of the plaintext that
follows shortly, and by making use of the cipherforms of the original as shown in
the scribes handwriting.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
56/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
57/199
46
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
58/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
59/199
48
For cryptanalysis, you set out to approach the cipher using all the
afore-mentioned simple methods. Or then you carefully compute its
component cipherforms in line with that I have already shown you.
Having found that their count adds up to thirty forms, you sort them
out, indicating the occurrence frequency of each cipher element apart
as follows48
:
Examing them closely in conformity with the rules I have
explained to you, you will find this form ( ) has higher frequencythan others; it recurs 64 times, and is therefore held to be the space.
You further support your belief sensibly by observing possible word
limits according to what I have previously stated.
Now you seek another form that occurs at the next higher
frequency than other letters. No other than () presents itself; it recurs30 times, and is consequently judged to be the letter ().
Then you look for a neighbouring and equally recurring form, to
find this () and to establish accordingly that it stands for theplaintext letter (). Set it down in place under the letters of thealphabet:
48The cipher elements in fact exceed 30 in number, as some of them are repeated. In
addition, they are not sorted out, nor are their frequencies indicated. However,
they will soon be stated properly under their respective letters of the alphabet
after cryptanalysis.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
60/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
61/199
50
Subsequently hunt for two spaces enclosing the letters ( ), plusanother letter yet unknown. At first glance you recognize this: ,
the unknown form being . Considering preceding forms so far
unfolded, you spot an (), an unknown letter, followed by () and ()respectively, thus: . You readily come to realize that this
unknown letter is (), and the first unknown is reasoned to be [theletter ], so that you read the statement:
. Your
discerning choice is fixed on the letter () in the word () ratherthan the letter ( ) (making ) because ( ) has already been workedout in the word (
). Thus you can now designate the letters
in their proper locations.In another location you come across two spacers with two forms in
between ( ), one of which is still covert. But owing to its highoccurrence frequency in the sort-out, you hold it to be the letter ().
In yet another location you find this: , of which two
letters are known and another unknown. Guided by the context, you
read it ( ).
Elsewhere you pick out this pattern: , followed by this:
, of which the letters () and ( ) have previously beendisclosed with the letter ( ) also uncovered already. On the spot it
comes home to you that it is the word ( ). So you designate theforms drawn.
49Then you observe these forms: , of
which the letters , , and have been made clear by now.Later you spot this: , which is known, and you read it:
.
This is followed by four known forms, namely , making
the word ( ).
49i.e. of the newly emerging letters: , , , and .
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
62/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
63/199
52
You keep on in the same vein outright, reflecting on the
cipherforms and appropriately affixing them to their respective letters
of the alphabet, until they are exhausted. Thereupon you get the
following arrangement of the letters and their cipher counterparts50
:
Thereby you can read the plaintext, fully developed. The space is 51
:
52
53
54
50Note that the two letters and have not been used in the cipher.
51The space symbol could have been better placed at the end of the arrangement.
52So written in the original as well as in the ciphertext; it is typically written
.
53Just so written in the ciphertext, instead of.
54The square-bracketed statement has somehow been dropped from the original
here, and redressed from the ciphertext.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
64/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
65/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
66/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
67/199
56
2.3.2. The Second Essay
On the Cryptanalysis of
Elaborate and Demanding Ciphers
These include: [1] the difficult ciphers that are only responsive to
cryptanalysis by deep insight and common sense, [2] those [composite]
ciphers that mislead the cryptanalyst as to solution while in fact they
are still far from it, [3] ciphers that are hard to cryptanalyse although
they apparently seem straightforward, and [4] the ciphers that areinherently unresponsive to cryptanalysis even by dedicated
professionals who might well, if at all, manage on mature reflection.
[1. Algorithms for Cryptanalysing Elaborate Ciphers]
I have already considered the straightforward ciphers, and wearied
you with cryptanalysing the tough ones. I have also guided you to the
special snags and hitches thereof. Be sure to make that your standard
paradigm, and to take it as a basis of your knowledge and a prop to
your intellect. Never neglect or despise the art in the mistaken belief
that it is too easy for you to grasp, nor are you required to delve toofar into the depths of what remains unknown to you of this science.
Now that you got to grips with the better part of the foundations for
cryptanalysis, all that remains are bits and pieces not of vital
importance, and details too long to be discussed in a treatise the size
of this, but are bound to be acquired through abundant first-hand
involvement and enhanced by steady personal experience as time goes
by.
If you are invited to solve a cipher that baffled other peoples
endeavours, consider it first by all the weapons I have already given
you. Retreat into privacy to concentrate and work undisturbed in a
mood of peaceful mind. Make sure of the sort-out and the number ofcipherforms, for that is the backbone of the whole process. Seek for
one of the pillars, namely the letters () and (); extracting either ofthem would facilitate the cryptanalysis of the greater portion of the
enciphered message. Work out the rest by the algorithms already
known to you.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
68/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
69/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
70/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
71/199
60
[3. Cryptanalysis of Ciphers Rendered Using Forms of Close
Frequency]
Should you notice that the count of cipherforms exceeds thirty, and
that they are of close frequency, then you decide for sure that the letter
) also assumes two forms, and that the cryptogram thus has its)
defects and frailties blurred. So look for another technique; do not try
to cryptanalyse the pillars unless they emerge haphazardly upon
reflection. Instead, seek for a form that is higher in frequency than all
others, and make it one of the abundant letters, i.e. , , , and .
Take the pattern of the letter () if it has been assigned two forms. In
case the () assumes more forms than two, it certainly does not belong
to the group of lucid letters. Match it against other forms. The
matching is done such that if you entertain a given form to represent
the letter (), for example, you start right from where you find it and
reflect on it, guided by common sense and sound approximation. Keep
identifying the form, namely the assumed (), in its positions with
identical instances throughout the cipher. If it comes out right, you
have achieved the goal; if not, then you have to retrace your steps
straight from the beginning. Assume the selfsame form to be the letter
(), and manipulate it the way you have manipulated the (). You may
this time fare well; otherwise, make it one or the other of the two
forms representing the letter () and manage it as before. Carry on
patiently until you are done with all the lucid letters.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
72/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
73/199
62
[4. Unanswering Ciphers]
If the cipher proves so refractory that employing all these
techniques of cryptanalysis is out of the question, you should
recognize that it is irretrievable except by sheer chance, since it is
hermetically sealed from all sides. On the other hand, strain for tracing
the nulls, now dropping one symbol, now including another. On that
you build, in the hope that it may respond.
Furthermore, not every cipher communicated strictly and
exclusively between two persons is of necessity penetrable by a third
party. A retrievable cipher is typically positively definable and
restricted to specific limits, of which the clues to cryptanalysis areoften predictable. Stopping up these clues makes the cipher impossible
to solve, however great the toil is, particularly if more than one form
are assumed for each letter, thus increasing the number of cipherforms
to, perhaps, a hundred. Such ciphers, of course, would be hard to solve
even for those immediately concerned; cryptanalysis would take quite
a long precious time, and require serene frame of mind. Any delay in
cryptanalysing an intricately forged message of sensitive nature can
entail serious, if not disastrous consequences. Supposing the message
is conveyed to a sovereign by an army commander in wartime
demanding urgent military aid, defeat might be incurred in case of any
delay in fulfilling the need.
Let me now give you a typical example of a cipher the count of
whose forms does not go beyond twenty-eight letters55
.
55i.e. with () excluded.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
74/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
75/199
64
To set up a cipher that is the very devil to resolve and yet easy for
you to read, assume for the letter () the letters of a light name such as [, , ] and [ , , ], using them one by one. Do the samefor the letter (). On the other hand, assume a single form to at oncerepresent the letters , and , 56 and the same for and , [and alsofor and ]. The rest of the letters are each assigned one form, and ()is given a distinctive pattern, so that the letters of the alphabet are
represented as follows:
In this way, the letters are rendered thoroughly sealed and
impossible to break, because the encipherer represents the letter ( )once as (), another time as (), and a third time as (). And suchlikefor the letter (). If the letters () and () happen to occur together, youuse the set-up pattern
57that is unresponsive to solution, though
seemingly easy to solve, Deo volente.
End of the Two Essays. Praise belongs to God.
56Since they share the same orthographic pattern.
57i.e. the letters () and () are enciphered each by one of 3 forms; the outcome is 9possible bigrams to encipher ().
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
76/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
77/199
66
[5. Annex]
Letters of high frequency in rank order of occurrence:
, , , , , ,
Letters of medium frequency in rank order of occurrence:
, , , , , , , , , , ,
Letters of low frequency in rank order of occurrence:
, , , , , , , , and .
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
78/199
35
1
1
2
3
4
5
6
7
8
9
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
79/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
80/199
37
2
1
2
3
4
5
6
7
8
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
81/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
82/199
39
1
2
3
4
5
6
7
8
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
83/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
84/199
41
3
1
2
13943
1293
345481
4
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
85/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
86/199
43
1
2
3
4
5
6
7
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
87/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
88/199
45
4
1
2
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
89/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
90/199
47
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
91/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
92/199
49
1
2
3
4
5
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
93/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
94/199
51
1
2
3
4
5
6
7
8
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
95/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
96/199
53
1
2
3
4
5
6
7
8
9
10
11
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
97/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
98/199
55
5
2
1
2
3
4
5
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
99/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
100/199
57
1
1
2
3
4
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
101/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
102/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
103/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
104/199
61
3
1
2
3
4
5
6
7
8
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
105/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
106/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
107/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
108/199
65
1
2
3
4
5
6
7
8
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
109/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
110/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
111/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
112/199
69
The Second Treatise
The Treatise of ibn Wahab al-Katib
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
113/199
70
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
114/199
71
Chapter 1
Analytical Study of
ibn Wahabs Treatise
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
115/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
116/199
73
1.1. Preliminary
ibn Wahabs treatise does not seem to fall in one single work.
Rather, it appears in the assamblage of cryptology under the title:
From the book: al-Bay n Wattaby n (Eloquence and Elucidation) by
Ab al- usayn 'Is q ibn 'Ibr h m ibn Sulaym n ibn Wahab al-
K tib. Upon further investigation, it turned out that the treatise,
whole and complete, is part of an edited book, also by ibn Wahab,
entitled: al-Burh n f Wu h al-Bay n (Demonstration of Eloquence
Aspects), printed twice: in Baghdad (1967) and in Cairo (1969).However, compared to the book, the assemblage version is found to
be broken and interrupted in two places: just prior to the manuscript
text, and right after it. Therefore, the treatise has been here completed
by making up the insufficiency from al-Burh n.
The Wahabs were household names in the writing profession. It
seems that this profession used to be passed down amongst them from
generation to generation. Moreover, some of them were concerned in
politics and high-powered government affairs, thus enjoying the best
of both worlds. They were known to have been favoured more by the
Abbasids than the Omayyads. To be noted is that the highly esteemedstatus of the Wahabs inspired great Abbasid poets, such as Ab
Tamm m, al-Bu tur and ibn ar-R m , to make panegyrics on
members of the family.
ibn Wahab, the author of this treatise, is estimated to have lived the
greater part of his life during the fourth century of the Hegira (10th
AD).
1.2. Structure of the Treatise
ibn Wahabs treatise can be divided into an introduction and five
sections as follows:
- Letter forms and representations
- Methods of encipherment
- Algorithms of cryptanalysis
- An overview of poetry cryptanalysis
- An encipherment method
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
117/199
74
Introduction: Motives for Using Secret Writing
ibn Wahab starts by summing up the motives for utilizing secret
writing in general. He maintains that these are incorporated in the
need to keep certain information confidential for reasons of having
best interest properly safeguarded, so that such information can only
be disclosed to the initiated.
The author distinguishes between two states of such utilization, i.e.
the written state, for which encipherment is the appropriate means;
and the oral (spoken) state, for which signalling gesture is the suitable
medium.
1.2.1. Letter Forms and Representations
Given the constant change of writing styles everywhere according
to the changing conditions of people, the author establishes that the
letters of the Arabic alphabet in use are 29 in number. Hedifferentiates between the two terms of a letter and a letter image.
A letter, to him, is the uttered sound or contrastive sound unit the
so-called phoneme in todays terminology; while the letter image isits written form or grapheme. A grapheme represents any of the
letters of the Arabic alphabet. Indeed ibn Wahabs differentiation is
bound to resolve the mistaken belief, held by latter-day and modern
scholars, of considering () as one single stand-alone letter, makingthe count of letters thirty.
The fact remains that the Arabic alphabet consists of 29 letters, of
which 28 have fixed graphemes, with a distinctive articulation for
each. The 29th
letter, that is the alif, has no independent articulatory
pattern because it is ever neutral (quiescent) and never vocalized
(mobile). What appears to the laity as an alif pattern is in fact
nothing more than a prolonged hamza (). Since it is impossible forthe alif to be enunciated on its own, there was a need to use it alongwith another voiced letter, ideally the letter (), and thus () hasoriginated. Oddly enough, this pattern () has become an independent,free-standing symbol on printers, typewriters and computer
keyboards. It was not until the Arabic Standard ASMO 449 was
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
118/199
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
119/199
76
far as meaning is concerned, between reading the Koranic verse
with a clear final () and an () slanted to ( ), or reading with a clear () and with the () slanted to ().
By extension, ibn Wahab addresses the letters that share the same
orthographical patterns, gathering that the 29-letter Arabic alphabet is
basically made up of 18 patterns, since the letters ( , , ) have thesame pattern in common, as do the letters ( , ) and ( , , .), etcThis typical feature has been put to good account by restricting
encipherment exclusively to these 18 letter-patterns, as we shall see in
the following paragraphs.
1.2.2. Methods of Encipherment
ibn Wahab distinguishes between two types of encipherment:
A) Encipherment by Substitution (at-Tar ama), i.e. by substituting
for each letter or its pattern another pattern.
B) Encipherment by Concealment and Transposition (at-Ta miya),
i.e. by concealing letters in names of species and genera, or by
changing their relative positions within the ciphertext
(transposition).
He then elaborates on two methods of the encipherment by
at-tar ama:
1. With each letter assuming the form of another, such as using
the form of the letter () to denote the letter (), and () toindicate ( ), etc. This is a type of encipherment using simplesubstitution observed by al-Kind and his successors, and
exemplified by the Qumm and Bis m encipherment.1
2. With letters assuming devised forms that do not pertain to
letter forms, such as: , ,
1The Qumm encipherment: i.e. employing the Qumm cipher alphabet in letter
substitution according to its key:
See Vol.3 of this series, p.10 ff and pp. 60-62. See also Vol.2, pp. 16-17 and pp.
42-44.
-
8/7/2019 Arabic Origins of Cryptology Vol. 6
120/199
77
As for the encipherment by at-ta miya, ibn Wahab identifies threemethods:
1. Encipherment by related conceptions what al-Kind calls theconceptual relationship and diffusion method, using generic or
species names to represent letters.1
2. Encipherment by transposition, through changing the order ofletters within a given cipher. This involves many approaches, of
which the author restricts himself to three, although he points to
a type of composite encipherment that utilizes transposition and
substitution together, making cryptanalysis more and more
difficult. However, ibn Wahab says, this method ofencipherment may be augmented either by letter substitution or
by pattern contrivance, thus intensifying obscurity.2 a
gesture of prime importance on the part of ibn Wahab.
3. Encipherment by letter addition and reduction, through the
inclusion of null letters, as has been stated earlier by al-Kind .3
ibn Wahab refers here to three different cases:
(a) Addition of insignificant nulls; for example: (clear)= (cipher), where a negligible null is added after eachletter. ibn Wahab indicates the possibility of incorporating
tar ama into nulls to obtain composite encipherment.(b) Reduction of letters through assigning common letter
combinations (such as the bigrams: , , , and thelike) single patterns in cipher, creating inconsistency between
the letter count of the ciphertext and that of the plaintext.
Given that such bigrams are normally extremely helpful in
the cryptanalysis process, ciphering them in this way is
bound to add to the difficulty of cryptanalysis, and to make
encipherment even more complicated. Indeed this is another
worthy gesture that is noted to ibn Wahabs credit.
(c) Reduction of letters by giving a single pattern to letters that
share the same orthographic image (e.g. , , ). This impliesthe adoption of the 18 images of the letters, not the 29 lettersproper, and also suggests non-observance of letter dotting.
1See Vol.1, p. 93 and p. 132; Vol.3, pp. 27-28 and p. 76; and Vol.4, p.34 and p.110.
2See p. 100.
3See Vol.1 of this series, p.92 and p.138.
-
8/7/20