Six Lectures Concerning Cryptography and Cryptanalysis (Cryptographic Series, No. 67)
(These six comprehensive lectures, with illustrations, wer...)
These six comprehensive lectures, with illustrations, were prepared and delivered at NSA headquarters by Mr.Friedman at the request of the Agency in order to have the history of cryptology recorded by the most eminent pioneer in the application of scientific principles to the field -- one who, without question, laid the foundation for modern concepts of cryptography and cryptanalysis. Text contains a complete historical study concerning cryptography and cryptanalysis.
Cryptography and Cryptanalysis Articles (Cryptographic Series)
(These articles, previously classified, appeared in variou...)
These articles, previously classified, appeared in various issues of The Signal Corps Bulletin. Included in Vol. 1 are "Cryptanalysis" by William F. Friedman, "Problems of Code" by Marcel Givierge, "Solution of The Playfair Cipher" by Alf Monge, and "Analysis Versus The Probable Word" by Howell C. Brown. Two pages of Playfair Cipher problems for the student have been added to the text.
Military Cryptanalysis - Part II: Simpler Varieties of Polyalphabetic Substitution Systems
(Military Cryptanalysis - Part II: Simpler Varieties of Po...)
Military Cryptanalysis - Part II: Simpler Varieties of Polyalphabetic Substitution Systems is one of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the National Security Agency (NSA), this publication is key in helping individuals understand and solve cipher systems. Military Cryptanalysis - Part I is the second publication in a series of four and focuses on polyalphabetic substitution systems.
(This is a great beginner-level book to learn about the ar...)
This is a great beginner-level book to learn about the art and science of breaking cipher systems. What makes this book even more valuable is that many dozens of problems, all carefully selected and constructed, are keyed to the text, so that the student can solve problems while learning.
(This volume contains important appendices for Military Cr...)
This volume contains important appendices for Military Cryptanalytics, Part I, Vol. 1, plus several added BASIC computer programs. Appendices contain material on concealment systems, communication intelligence operations, principles of cryptosecurity, plus numerous problems for the student. The text contains a large amount of frequency data concerning English, word and pattern lists, and also letter frequency data concerning the German, French, Italian, Spanish, Portuguese, and Russian languages.
The Friedman legacy a tribute to William and Elizebeth Friedman (SuDoc D 1.2:F 91)
(The objective of this series of lectures is to create an ...)
The objective of this series of lectures is to create an awareness of the background, development and manner of employment of a science that is the basis of a vital military offensive and defensive weapon known as CRYPTOLOGY, a word that comes from the Greek kryptos, meaning secret or hidden, plus logos meaning knowledge or learning. Cryptology will be specifically defined a little later; at the moment, however, I'm sure you know that it has to do with secret communication.
(First published in 1956 as a classified text by the U.S. ...)
First published in 1956 as a classified text by the U.S. Government, this book discusses the analysis of unilateral, multilateral, and polygraphic systems, as well as the use of isologs, pattern-words, etc. The use of the international (Baudot) teleprinter code and the Morse code in cryptography is also covered. It is particularly thorough in its analysis of four-square, two-square, and the Playfair Cipher system. Cryptosystems employing irregular-length cipher units, monome-dinome systems, are covered in depth.
The Shakespearean Ciphers Examined: An analysis of cryptographic systems used as evidence that some author other than William Shakespeare wrote the plays commonly attributed to him
(William and Elizebeth Friedman were both researchers in c...)
William and Elizebeth Friedman were both researchers in cryptography at The Riverbank Laboratories. This 1957 book is the result of an insightful report that won the Friedmans the Folger Shakespeare Library literary prize. Within it, the Friedmans address theories, which, through the identification of hidden codes, call the authorship of Shakespeare's plays into question. As ciphers were abundantly used in the sixteenth century, such coding is far from impossible. Accordingly, this work gives a fair and scientific hearing to those anti-Stratfordians whose theories were often dismissed completely. The Friedmans document the history and foundations of such theories, before thoroughly examining and critiquing a great number of them. Indeed, it has even been suggested that this text itself contains ciphers, making it of even greater interest to scholars of literary codes and cryptography, as well as those wishing to discover more about the various debates surrounding the authorship of Shakespeare's plays.
William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s.
Background
He was the son of Frederic Friedman, a Romanian Jew in the Russian postal service, and Rosa Trust, daughter of a Moldavian merchant. Two years later the family moved to Pittsburgh, Pennsylvania, where his father became a sewing-machine salesman. The Friedmans were naturalized in 1896; and in that year Wolfe was renamed.
Education
After graduating from Pittsburgh's Central High School in 1909, Friedman entered Michigan Agricultural College.
After one year he transferred to Cornell University, earning B. S. and M. S. degrees in plant breeding in 1914 and 1915.
Career
In Geneva, Illinois, from 1915 to 1917 and from 1919 to 1920 he headed the genetics department at the Riverbank Laboratories of the eccentric tycoon George Fabyan; while there he also began research in cryptology.
By 1917, because of World War I, various federal offices were calling upon the Friedmans for deciphering; the couple set up a school in cryptology for military personnel at Riverbank. They also wrote a series of landmark treatises, Riverbank Publications on Cryptography and Cryptanalysis (1917 - 1920).
Commissioned as a first lieutenant in the army, Friedman worked on solving German codes and ciphers while at American headquarters in Chaumont, France, from July to November 1918.
He was demobilized in April 1919 and returned to Riverbank. In January 1921 Friedman moved to Washington, D. C. , as a civilian cryptologist at Army Signal Corps headquarters. That December he was appointed the War Department's chief cryptanalyst. He was commissioned as a captain in the reserve, gaining promotions to major in 1926, lieutenant colonel in 1936, and colonel in 1940.
He rationalized the army's cryptologic program; pioneered research linking cryptology to mathematics and statistics; and made numerous cryptographic inventions in electromechanical enciphering equipment. In addition to many articles, he wrote several books that became standard references, including Elements of Cryptanalysis (1926) and The History of the Use of Codes and Code Language (1928), which became the army's cryptologic bible when it was published in its expanded four-volume form by World War II.
His services were often in demand by other federal agencies, and he became a leader in many international communications activities. Meantime, his wife became a noted cryptanalyst in the Treasury Department, deciphering smugglers' messages. When the Signal Corps established the Signal Intelligence Service (SIS) in 1930, Friedman was chosen as its chief. A primary function of the unit was "black chamber" work (covert interception and analysis of other governments' messages).
In addition to setting up a global network of radio-intercept stations, Friedman's group also developed new codes and ciphers and established the Signal Intelligence School. Friedman proved adept at selecting gifted subordinates, notably Frank Rowlett, Abraham Sinkov, and Solomon Kullback, who would become renowned in cryptology.
SIS began work in 1937 on solving "Purple, " the code name given to the new, complex Japanese cipher for top-priority diplomatic messages. In early 1939 Friedman was freed of many administrative chores so that he could lead the team trying to break Purple. By August 1940 Friedman's group had achieved significant progress and had built a mock-up of the Purple machine.
Eventually they could read a high proportion of Purple texts. These included messages between Tokyo and Japanese embassies around the world, which provided valuable data for the conduct of the war. Many writers have lauded Friedman's role in breaking Purple, but he himself claimed it was "a collaborative, cooperative effort" at SIS. Friedman suffered a nervous breakdown in January 1941.
He was discharged from the army for health reasons that spring but returned to SIS as director of communications research. (In 1946 he was restored to active duty as a colonel. )
During the same interval, his wife continued her work, setting up and heading the cryptographic section of the Office of Strategic Services. After World War II Friedman was active in reorganizing cryptologic activities in the American defense establishment, while also serving on Allied intelligence bodies and undertaking special missions to Europe. In the period from 1945 to 1951 he was director of communications research in the Army Security Agency and then consultant to the Armed Forces Security Agency. When the National Security Agency (NSA) was established at Fort Meade, Maryland, in 1952, he was appointed special assistant to the director.
Friedman and his wife were also interested in alleged literary ciphers. They coauthored The Shakespearean Ciphers Examined (1957), which won several awards.
In 1958 they journeyed to Yucatan to study Mayan hieroglyphs.
Long subject to severe depression, Friedman was hospitalized in neuropsychiatric units on numerous occasions, especially after 1948. He also suffered two heart attacks in 1955.
He died in Washington, D. C. The NSA auditorium at Fort Meade was later named for him.
Achievements
In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.
During the years from 1941 to 1945 he also worked on breaking other Japanese codes and ciphers and on improving American cipher machines. For his SIS services he received the War Department's Commendation for Exceptional Civilian Service in 1944, and President Harry S. Truman bestowed the Medal for Merit on him in 1946.