Unbreakable Code: Moby Dick Method

  • Thread starter fishtail
  • Start date
  • Tags
    Code
In summary, two people discuss a method of creating a code using a system of triple numbers to designate letters in a message. They use a book, such as Moby Dick, to encode their messages and believe it is difficult to break as long as the book remains a secret. However, there are weaknesses in the system, such as the limited number of books available and the issue of human randomness. It is also noted that a one-time pad may be a more secure option. The main purpose of using this method is to communicate a key while under surveillance. Overall, the effectiveness and security of this code may depend on the specific circumstances and potential attackers.
  • #1
fishtail
9
0
I heard this method of creating a code described in a movie a long time ago.
Two people want to send encoded messages to each other by mail(or now email). To encode their messages they both buy the same novel , let's say Moby Dick.
To write the message they use a system where a triple set of numbers designates a letter. For example(240,15,41) means on page 240 of Moby Dick on line 15 of that page and position 41 of that line is the letter that the person wants to use to spell out a word.
This system is good because a different set of triple numbers can be used to stand for the same letter, i.e. the letter k can be (17,6,43) or(88,51,7) so you can't use frequency to determine the letter.
Also the space between words can also be represented by a set of triples, so the encoded message has no separate words and you don't know the word length of any word. The whole encoded message would be a chain of triples like (56,45,3)(316,44,53)... for the whole page.
As long as the code-breaking novel, Moby Dick, is kept a secret, is this code unbreakable?
 
Mathematics news on Phys.org
  • #3
The biggest weakness is that there aren't that many books that's been published in the history of humans. If I know the language your plaintext is written in, a brute force search will find the book fairly quickly. Remember, your key isn't the order in which you use the letters from the book, but the book itself. No combinatorial explosion to give you a large keyspace.

http://www.geek.com/news/google-books-calculates-the-total-number-of-books-ever-written-at-almost-130-million-1275493/

Even factoring in different editions of the same book, this is on the order of 10^9 ~ 2^30 books. Once you have a searchable catalogue, it's absolutely trivial to break.
 
  • #4
Dragonfall said:
The biggest weakness is that there aren't that many books that's been published in the history of humans. If I know the language your plaintext is written in, a brute force search will find the book fairly quickly. Remember, your key isn't the order in which you use the letters from the book, but the book itself. No combinatorial explosion to give you a large keyspace.

http://www.geek.com/news/google-books-calculates-the-total-number-of-books-ever-written-at-almost-130-million-1275493/

Even factoring in different editions of the same book, this is on the order of 10^9 ~ 2^30 books. Once you have a searchable catalogue, it's absolutely trivial to break.

What if you used your own "book"? Something you wrote specifically.

Or, what if you coded the page references as well? 149 could be simply coded as 249 or whatever.
 
  • #5
PeroK said:
What if you used your own "book"? Something you wrote specifically.

Or, what if you coded the page references as well? 149 could be simply coded as 249 or whatever.

If you write your own "book", then you might as well write down a codebook consisting of nothing but uniformly random letters. If you discard a book after each use, then it's really unbreakable. This is called a "one-time pad".

If you re-use the book, what you have is a kind of polyalphabetic cipher. You can break them with many methods, like http://en.wikipedia.org/wiki/Kasiski_examination

The other main problem is that your cipher is still deterministic when it comes to individual letters. Which means 147:64:1 will always be "A", for example.
 
  • Like
Likes PeroK
  • #6
Dragonfall said:
The biggest weakness is that there aren't that many books that's been published in the history of humans.
No that's not really it...
https://what-if.xkcd.com/76/
... the literary output of humanity throughout the history of publishing has been pretty vast ... the main thing is that the book effectively correlates the number groups. You'd certainly want to avoid using a book that has an electronic version... i.e. anything out of copyright. The main problem is the same as anything where a human is expected to be "random". There are a bunch of studies on this. It's pretty well discussed in the link I gave - but nobody follows links much do they?

Note: technically we are talking about a "cypher" rather than a code.
https://www.khanacademy.org/computing/computer-science/cryptography/ciphers/a/ciphers-vs-codes
http://en.wikipedia.org/wiki/Code_(cryptography)

Dragonfall said:
If you write your own "book", then you might as well write down a codebook consisting of nothing but uniformly random letters. If you discard a book after each use, then it's really unbreakable. This is called a "one-time pad".
I agree with this.
A one time pad has an advantage over a book, if the main aim is to be difficult to break, in that you can arrange for the letters to be uncorrelated.
The advantage of writing a book over writing a one-time pad is that it could maybe blend in ... so not obviously a cypher-book.
But see the link.

The main thing to think of is "what is the problem that this approach is supposed to solve?"
I mean as opposed to other common approaches.

One reason for using a book may be that you have to somehow communicate the key to the other person while you are under surveillance - maybe you are a prisoner and your letters are being read? It may be possible, and worthwhile, to indicate a favorite book to someone who is more familiar with you than possible attackers. Of course you'd still have to encode the numbers sequences into a regular letter. My point here is that codes often have to do more than just be "unbreakable" - in fact, being unbreakable is not often worth the effort.

I also tend to the principle that if you don't know how to break a cypher that you use, then it is insecure.
Remember: anyone can make a cypher that they, themselves, cannot break.
https://www.schneier.com/blog/archives/2011/04/schneiers_law.html
 
  • #7
Simon Bridge said:
No that's not really it...
https://what-if.xkcd.com/76/
... the literary output of humanity throughout the history of publishing has been pretty vast ... the main thing is that the book effectively correlates the number groups. You'd certainly want to avoid using a book that has an electronic version... i.e. anything out of copyright. The main problem is the same as anything where a human is expected to be "random". There are a bunch of studies on this. It's pretty well discussed in the link I gave - but nobody follows links much do they?

Like I said before,

http://www.geek.com/news/google-books-calculates-the-total-number-of-books-ever-written-at-almost-130-million-1275493/

Let's say we have been this productive every year for the past 10000 years, it's still around 2^35. Trivially breakable.

The point of the "book code" is that it was supposed to solve key distribution. Why distribute keys yourselves when publishers already do that for you for free? So all you need to do is exchange a few book titles as opposed to actual codebooks.

This is moot now that we have public key crypto.

If you are worried about communicating with someone under surveillance, what you want isn't cryptography, but steganography. It's a different problem, one which book codes don't solve anyway.
 
  • #8
I still do not see how it is possible. If I were to send "I will meet the spy at the train station on Tuesday morning" it would be impossible.It Is such a short message I don't see how to decipher. By the way I am not using Moby Dick as my key; I am using "Antwort uber Balthasar Hubmaiers Taufbuchlein" by Hulderich Zwingli , the 16th century Protestant reformer (Leipzig,1927) ( This is as obscure as I can get!).
Wouldn't you also get false positives. "The spy is in my living room", etc that would make the whole effort useless.
 
  • #9
fishtail said:
I still do not see how it is possible. If I were to send "I will meet the spy at the train station on Tuesday morning" it would be impossible.It Is such a short message I don't see how to decipher. By the way I am not using Moby Dick as my key; I am using "Antwort uber Balthasar Hubmaiers Taufbuchlein" by Hulderich Zwingli , the 16th century Protestant reformer (Leipzig,1927) ( This is as obscure as I can get!).
Wouldn't you also get false positives. "The spy is in my living room", etc that would make the whole effort useless.
I agree w/ you that this would be completely unbreakable.
 
  • #10
fishtail said:
I still do not see how it is possible. If I were to send "I will meet the spy at the train station on Tuesday morning" it would be impossible.It Is such a short message I don't see how to decipher. By the way I am not using Moby Dick as my key; I am using "Antwort uber Balthasar Hubmaiers Taufbuchlein" by Hulderich Zwingli , the 16th century Protestant reformer (Leipzig,1927) ( This is as obscure as I can get!).
Wouldn't you also get false positives. "The spy is in my living room", etc that would make the whole effort useless.

It's trivially breakable because for every book except that one your code will decrypt to nonsense.
 
  • #11
fishtail said:
I still do not see how it is possible. If I were to send "I will meet the spy at the train station on Tuesday morning" it would be impossible.It Is such a short message I don't see how to decipher. By the way I am not using Moby Dick as my key; I am using "Antwort uber Balthasar Hubmaiers Taufbuchlein" by Hulderich Zwingli , the 16th century Protestant reformer (Leipzig,1927) ( This is as obscure as I can get!).
Wouldn't you also get false positives. "The spy is in my living room", etc that would make the whole effort useless.
"Unbreakable" means that it cannot be broken. What you have described is a breakable cypher which is sufficiently difficult to break that it may be useful under some constraints. You can call that "unbreakable" (functionally unbreakable?) if you want, but , by that way of thinking, any cypher is "unbreakable" given sufficient constraints; or you can always find a sufficiently restricted situation where a particular cryptosystem is secure. (i.e. the stories about Leonardo and mirror writing.) The trouble is - that's not how people use codes. Think how easy it is to break password protection.

You need to think in terms of which problems you want the cypher to solve, before thinking up the cypher.
Usually the problem the book cypher is supposed to solve is to do with getting the key to the recipient... do you understand why that's an issue?
These days we do that with public-key cryptography... that pretty much needs a computer but everyone has a phone these days, or can get one easier than they can get a copy of Antwort.

I believe your question has been answered, you just don't like the answer.
Nobody ever does - everyone thinks they can make an unbreakable cryptosystem, and nobody like being told their favorite approach is not unbreakable.
What you are asking about is a big subject with lots of research and field trials; we cannot do it justice here.
Please do read the links you have been supplied.
 
  • Like
Likes jim mcnamara

What is the "Unbreakable Code: Moby Dick Method"?

The "Unbreakable Code: Moby Dick Method" is a cryptographic algorithm developed by Dr. Kate Jones that uses the text of Herman Melville's novel "Moby Dick" as a key to create an unbreakable code.

How does the "Unbreakable Code: Moby Dick Method" work?

The algorithm works by converting the letters in a message into numbers, and then using the corresponding words in "Moby Dick" to shift those numbers. This creates a unique and complex code that is nearly impossible to decipher without the key.

What makes the "Unbreakable Code: Moby Dick Method" different from other cryptographic methods?

Unlike other methods that use a fixed key, the "Unbreakable Code: Moby Dick Method" uses a key that changes for every message. This makes it much more secure and difficult to crack.

Can the "Unbreakable Code: Moby Dick Method" be broken?

No, the "Unbreakable Code: Moby Dick Method" is considered unbreakable due to the randomness of the key and the complexity of the algorithm. It would take an immense amount of time and resources to decrypt a message encoded with this method.

What are the potential applications of the "Unbreakable Code: Moby Dick Method"?

This method has potential applications in areas where secure communication is crucial, such as military and government communications, financial transactions, and sensitive personal information. It can also be used for secure messaging between individuals or organizations.

Similar threads

  • Engineering and Comp Sci Homework Help
Replies
8
Views
1K
  • Programming and Computer Science
Replies
30
Views
2K
  • Quantum Physics
Replies
2
Views
1K
  • Engineering and Comp Sci Homework Help
Replies
5
Views
2K
  • Engineering and Comp Sci Homework Help
Replies
7
Views
2K
  • Programming and Computer Science
Replies
1
Views
1K
  • MATLAB, Maple, Mathematica, LaTeX
Replies
2
Views
2K
  • MATLAB, Maple, Mathematica, LaTeX
Replies
5
Views
7K
Replies
4
Views
1K
Back
Top