The top 10 cracked ciphertexts from history

Filed Under: Featured, Privacy, Security threats

CipherA cipher is a method for encrypting messages to keep them safe from prying eyes.

Until the advent of the digital computer, ciphers relied on pen-and-paper or mechanical techniques, and were often much more easily cracked than their designers ever thought possible.

In the words of the eminent historian of ciphers, David Kahn:

"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break."

In no particular order, here's a quick round up of notable solved ciphertexts over the last five millennia.

1. The Babington Plot - 16th Century England

Roman Catholic Mary, Queen of Scots was put under house arrest by her Protestant cousin Queen Elizabeth in 1568.

After 18 years of imprisonment, a plot was hatched by Anthony Babington to free Mary, assassinate Elizabeth and start a rebellion supported by a Spanish invasion of England.

Mary conspired with Babington through the exchange of encrypted letters, using a complex substitution cipher with more than 63 different symbols to encrypt letters and words.

Encrypted letters

Nevertheless, Elizabeth's spymaster Walsingham was able not only to read their correspondence but also to forge messages of his own to extract more information from the conspirators.

Babington went to the gallows in 1586 and the following year, Mary was executed for treason.

2. The Zimmermann Telegram - 1917, World War I

German foreign minister Arthur Zimmermann sent an encoded telegram to Mexico to encourage it to declare war on the neutral United States.

Zimmermann telegram

The telegram was intercepted by a British cryptography team known as Room 40, who set about decoding it.

William Montgomery, along with other British cryptanalysts, was able to use other similarly-coded telegrams to crack it.

On 1 February 1917, Germany announced resumption of "unrestricted" submarine warfare, leading to the breakdown of relations with the United States.

On 19 February, the decrypted telegram was passed to the US, further hardening US opinion until, on 6 April, the US declared war on the German Empire.

3. The Battle of Midway - 1942, World War II

Battle of MidwayOn 20 May 1942, the US intercepted a Japanese message detailing an attack on an island in the Pacific.

A delay in the Japanese issuing new codebooks meant that the Allies could decrypt nearly all of it and learnt of the attack, but doubt remained as to which island the code 'AF' referred to.

Midway was suspected so the base there was asked to transmit a message saying their water distillation plant had been damaged.

The Allies then intercepted a Japanese message reading 'AF short on fresh water' confirming the target of the attack was Midway and allowing the Americans to mobilise their fleet and win a critical fight in the battle for the Pacific.

4. Hieroglyphics - 3200 BC to AD 400, Ancient Egypt

HeiroglyphicsThere is little difference between the challenge of reading a message deliberately encrypted to obscure its meaning and a dead language whose meaning died out centuries ago.

The written language of the Ancient Egyptians baffled archaeologists and linguists alike until 1799 when the Rosetta Stone was discovered by Napoleon's invading army.

Containing the same text written in three different languages (Greek, Demotic and Hieroglyphics), it acted as a cryptanalytic crib.

The decryption of a language that hadn't been spoken for over eight centuries permitted historians a much better understanding of the ancient civilisation.

5. Copiale Cipher - 1760 to 1780, Wolfenbüttel, Germany

Secret societies and ciphers go hand-in-hand. For more than 260 years the contents of this 105 page encrypted manuscript were a mystery, until April 2011 when a team of Swedish and American linguists used statistically-based machine translation algorithms on modern computers to unscramble it at last.

Copiale cipher

The complex substitution cipher which once protected the secrets of the initiation ceremony for the occultist order of Wolfenbüttel fell foul of modern computing power.

6. Poe's Challenge - 1839, Philadelphia, US

Edgar Allen PoeEdgar Allan Poe, American author, editor and hobbyist cryptanalyst, encouraged readers of his newspaper to send in encrypted messages which he would then crack.

After having solved over 100 ciphers, he published two ciphertexts sent in by a 'Mr W. B. Tyler' which he hadn't been able to solve himself.

More than a century later, in 1985, it was suggested that Poe had written the messages himself as a challenge to his readers. The first of the two was solved in 1992 but it wasn't until 2000 that the second was finally cracked.

The significance of the decrypted messages, however, remain a mystery.

7. Chaocipher - 1953, Maryland, US

Chaocipher is a mechanical method of encipherment invented by John F. Byrne in 1918, and is a classic case of a cryptographer claiming his cipher to be flawless.

Byrne confidently published four ciphertexts, totalling over 10,000 letters, and offered cash prizes to anyone who could decrypt them.


It seems, however, the strength of his cipher relied on the fact that only a select few people knew how it worked.

But obscurity is not security, and in 2010, after the inner workings of Chaocipher were published, two of the four messages were cracked.

Nevertheless, the other two remain unsolved.

8. Oak Island Money Pit Cipher Stone - 1795, Nova Scotia, Canada

Treasure. Image from ShutterstockFor over 200 years, there have been many attempts to locate hidden treasure supposedly stashed at the bottom of a pit on Oak Island.

In the early eighteenth century, an inscribed stone tablet was uncovered some 27m down.

The inscription, consisting of 40 symbols, is said to have been decoded as "Forty Feet Below Two Million Pounds Are Buried".

Alternative decryptions have been posed, and some consider the stone tablet to be a hoax.

Whatever the case, the treasure has yet to be found.

9. The Legend of Olivier Levasseur - 18th Century, West Africa

Oliver Levasseur, aka La Bouche ('The Buzzard') was a French pirate in the Indian Ocean. After five years of looting, Levasseur was captured and executed in 1730.

As he was hanged, clutching a necklace displaying a 17-line cryptogram, he exclaimed to the crowd, "My treasure is buried here... find it who may."

Levasseur's cryptogram

Copies of La Bouche's ciphertext have materialised over the years but despite many a search, the treasure has not been found.

10. Smithy Code - 2006, High Court of Justice, England

After all this talk of lost treasure, beheaded queens and occultist socities, here's a lighter note to finish on.

In April 2006, Judge Sir Peter Smith ruled that defendant Dan Brown, accused of stealing ideas for his book 'The Da Vinci Code', was innocent.

In his judgement, purely for his personal amusement, Sir Peter hid a cryptogram of his own, indicated by italicising certain letters.

Smithy code

It was cracked by Dan Tench, who found that it said, "Jackie Fisher who are you? Dreadnought".

What's your favourite story involving a ciphertext? Feel free to leave a comment below


You might like

24 Responses to The top 10 cracked ciphertexts from history

  1. Eric Haas · 974 days ago

    You've got the wrong dates for the Babington plot. The dates should be in 1500s, not the 1800s.

  2. jimisen · 974 days ago

    By 1868, Mary was so old it seems pointless to have arrested her. Elizabeth should have been looking out for Victoria!

  3. nimitta · 974 days ago

    Good article! I'd add the Zodiac killer's 1969 cryptograms - their author wrote that the police would be able to catch him if they could decipher the code, and the 340-symbol message has yet to be cracked...

    • Paul Ducklin · 973 days ago

      To be fair to Julian, the article is entitled "The Top Ten *cracked* ciphertexts"...

      But the Zodiac business is indeed an interesting example of cryptological intrigue.

      I don't know about you, but I'm looking forward to "The Top Ten uncracked ciphers" as a follow-up :-)

  4. nimitta · 974 days ago

    One more: the symbols found on clay seals and stone in the Indus Valley Civilization...never deciphered, though some have fraudulently claimed so!

  5. Duggan · 974 days ago

    I feel like the author cheated a bit, including some ciphertexts which haven't been cracked yet.

    • Paul Ducklin · 973 days ago

      Sure...but at least *some* of the enciphered material associated with each problem was recovered. (The Allies weren't able to read *every* encrypted transmission sent by the Nazis during WW2, but the fact that they read what they did means we talk about "cracking Enigma".)

      As I mentioned above to @nimitta, perhaps a second article about ciphers that haven't been unscrambled at all (Julian doesn't like that word - and I have to admit it's not very mathematical :-) would be a nice follow-up...

  6. guest · 974 days ago

    The Babington Plot - 16th Century England
    the cited years are wrong ... Mary's arrest in 1586, not 1868
    Babington to the gallows in 1586, not 1856
    Interesting history nevertheless ... !

    • Paul Ducklin · 973 days ago

      We discussed that one here at Nak Sec...once again, a good (indeed, perhaps a leading) candidate for that follow-up article.

  7. Steve · 973 days ago

    Nice work, Julian! Thank you.

  8. How about the zodiac ciphers? By the zodiac killer? Are those still un-dechiphered?

  9. Nigel · 973 days ago

    Fascinating article! Looking forward to the follow-up article on uncracked ciphers.

  10. Sturgeon · 970 days ago

    Several good examples mentioned above.
    As for WW2 ciphers, there's an awful lot of talk about the Enigma machines, but not that many knows about the Geheimschreiber, the Siemens & Halske T52 (code name Sturgeon at Bletchley Park).

    The Swedish mathematician Arne Beurling used only 24 hours of traffic to break the cipher.

    As David Kahn writes in his book:
    "Quite possibly the finest feat of cryptanalysis performed during the Second World war was Arne Beurling's solution of the secret of the Geheimschreiber."

  11. sluewhale · 969 days ago


    • Paul Ducklin · 969 days ago

      Perhaps another article? "Another Top Ten ciphers". Like some of the ones here, Kryptos has yielded some, but not all, of its secrets...

  12. Donald C. · 948 days ago

    Babington Plot - While imprisoned, Mary was allowed deliveries of her favoured french wine. Cunningly the conspirators concealed the written ciphers inside the bungs of the wine barrels. Somehow this was discovered by her jailors leading to uncovering the plot.

  13. Dave Newton · 339 days ago

    Poe's "The Gold Bug" is a nice short story of a treasure hunt which includes a cipher and the method used to decode it.

  14. Pjotr · 255 days ago

    In the summer of 1940 Beurling single-handedly deciphered and reverse-engineered an early version of the Siemens and Halske T52 also known as the Geheimfernschreiber ("secret teletypewriter") used by Nazi Germany in World War II for sending ciphered messages.[1] The T52 was one of the so-called "Fish cyphers", that, using transposition, created nearly one quintillion (893,622,318,929,520,960) different variations. It took Beurling two weeks to solve the problem using pen and paper. Using Beurling's work, a device was created that enabled Sweden to decipher German teleprinter traffic passing through Sweden from Norway on a cable. In this way, Swedish authorities knew about Operation Barbarossa before it occurred. Since the Swedes would not reveal how this knowledge was attained, the Swedish warning was not treated as credible. The cypher in the Geheimfernschreiber is generally considered to be more complex than the cypher used in the Enigma machines.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Julian Bhardwaj is currently a student at the University of Warwick studying for an undergraduate degree in Discrete Mathematics. As a self confessed crypto-geek, he has a passion for all things security related.