Military Cryptanalytics
Encyclopedia
Military Cryptanalytics is a revision by Lambros D. Callimahos
Lambros D. Callimahos
Lambros Demetrios Callimahos was a US Army cryptologist. Born in Alexandria of Greek parents, the family emigrated to the United States when he was four...

 of the series of books written by William F. Friedman
William F. Friedman
William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signals Intelligence Service in the 1930s, and parts of its follow-on services into the 1950s...

 under the title Military Cryptanalysis. It also contains contributions by other cryptanalysts. It was a training manual for National Security Agency
National Security Agency
The National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...

 and military cryptanalysts
Cryptanalysis
Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key...

. It was published between 1957 and 1977, though parts I and II were written in 1956 and 1959.

From the Introduction in Part I, Volume I, by Callimahos:
"This text represents an extensive expansion and revision, both in scope and content, of the earlier work entitled 'Military Cryptanalysis, Part I' by William F. Friedman. This expansion and revision was necessitated by the considerable advancement made in the art since the publication of the previous text."

The series consists of several parts, the first two of which have been declassified; the third has so far only been released in such a severely redacted
Redaction
Redaction is a form of editing in which multiple source texts are combined and subjected to minor alteration to make them into a single work. Often this is a method of collecting a series of writings on a similar theme and creating a definitive and coherent work...

 form that it wasn't considered worth publishing on its own. (The unredacted portions repeat material from the first two parts.)

Callimahos referred to parts III-VI at the end of the first volume:
"...Part III will deal with varieties of aperiodic substitution systems, elementary cipher devices and cryptomechanisms, and will embrace a detailed treatment of cryptomathematics and diagnostic tests in cryptanalysis; Part IV will treat transposition and fractioning systems, and combined substitution-transposition systems; Part V will treat the reconstruction of codes, and the solution of enciphered code systems, and Part VI will treat the solution of representative machine cipher systems."

Parts IV through VI were contemplated by Lambros D. Callimahos, but not completed before his death.

Both Military Cryptanalytics and Military Cryptanalysis have been subjects of FOIA
Freedom of Information Act (United States)
The Freedom of Information Act is a federal freedom of information law that allows for the full or partial disclosure of previously unreleased information and documents controlled by the United States government. The Act defines agency records subject to disclosure, outlines mandatory disclosure...

 requests, including one by John Gilmore.

Parts I and II are available from Aegean Park Press
Aegean Park Press
Aegean Park Press is a publisher based in Walnut Creek, California, specializing in cryptology, military intelligence and Mayan languages. The company's books on cryptology are "mostly reprints of fairly advanced texts," Including at least 16 books by World War II cryptologists William F. Friedman,...

. Each part consists of two volumes: the first volume contains the tutorial text and the second volume contains appendices. Part I includes material on both uniliteral and multiliteral ciphers and polyalphabetic ciphers. Part II includes material on repeating-key and bipartite systems and periodic ciphers. Part II, volume II includes the Zendian Problem
Zendian Problem
The Zendian Problem was an exercise in communication intelligence operations devised by Lambros D. Callimahos as part of an advanced course, CA-400, that Callimahos taught to National Security Agency cryptanalysts....

, a practical exercise in traffic analysis
Traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and...

 and cryptanalysis.

For the Aegean Park Press edition, Wayne G. Barker added programs for the TRS-80
TRS-80
TRS-80 was Tandy Corporation's desktop microcomputer model line, sold through Tandy's Radio Shack stores in the late 1970s and early 1980s. The first units, ordered unseen, were delivered in November 1977, and rolled out to the stores the third week of December. The line won popularity with...

.

Books

  • Military Cryptanalytics, Part I, Volume 1, ISBN 0-89412-073-5
  • Military Cryptanalytics, Part I, Volume 2, ISBN 0-89412-074-3
  • Military Cryptanalytics, Part II, Volume 1, ISBN 0-89412-075-1
  • Military Cryptanalytics, Part II, Volume 2, ISBN 0-89412-076-X
  • Military Cryptanalytics, Part III, unpublished (portions remain classified)
  • Military Cryptanalysis, Part I, ISBN 0-89412-044-1
  • Military Cryptanalysis, Part II, ISBN 0-89412-064-6
  • Military Cryptanalysis, Part III, Simpler Varieties of Aperiodic Substitution Systems, ISBN 0-89412-196-0
  • Military Cryptanalysis, Part IV, Transposition and Fractionating Systems, ISBN 0-89412-198-7

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK