Difference between revisions of "Solved 408-character cipher"
(→Information, Analysis, Experiments) |
(→Images) |
||
(7 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
*[[Comparison of cipher alphabets]] | *[[Comparison of cipher alphabets]] | ||
*Solution key | *Solution key | ||
− | **[[Comparison of solutions | + | **[http://zodiackillerciphers.com/images/z408-z340-combined-keys.png Z408 key (combined with Z340 key, with equivalent decodings highlighted)] |
+ | **[http://zodiackillerciphers.com/images/z408-key.png Another image of the Z408 key] | ||
+ | **[https://docs.google.com/spreadsheets/d/1xAZFiFqJRNKoJlNda3tMZI9fAZqFHa_RZScYCbqx4Dc/edit?usp=sharing Comparison of solutions] - Comparisons of solutions from various sources (newspapers, police reports, etc) | ||
**[http://en.wikisource.org/wiki/Zodiac_Killer_letters#July_31st_1969 Transcription of the letter and the Hardens' solution] | **[http://en.wikisource.org/wiki/Zodiac_Killer_letters#July_31st_1969 Transcription of the letter and the Hardens' solution] | ||
**Donald and Bettye Harden's solution key. [http://www.zodiackillerfacts.com/gallery/albums/userpics/10001/1abcd_-_ZODIAC_-_July_69_Cipher_part_1_Vallejo_Times-Herald_w_Harden_worksheet.jpg Part 1] | [http://www.zodiackillerfacts.com/gallery/albums/userpics/10001/1bcdef_-_ZODIAC_-_July_69_Cipher_part_3_SF_Examiner_w_Harden_Worksheet.jpg Part 2] | [http://www.zodiackillerfacts.com/gallery/albums/userpics/10001/1cdef_-_ZODIAC_-_July_69_Cipher_part_2_CHRONICLE_w_Harden_worksheet.jpg Part 3] | **Donald and Bettye Harden's solution key. [http://www.zodiackillerfacts.com/gallery/albums/userpics/10001/1abcd_-_ZODIAC_-_July_69_Cipher_part_1_Vallejo_Times-Herald_w_Harden_worksheet.jpg Part 1] | [http://www.zodiackillerfacts.com/gallery/albums/userpics/10001/1bcdef_-_ZODIAC_-_July_69_Cipher_part_3_SF_Examiner_w_Harden_Worksheet.jpg Part 2] | [http://www.zodiackillerfacts.com/gallery/albums/userpics/10001/1cdef_-_ZODIAC_-_July_69_Cipher_part_2_CHRONICLE_w_Harden_worksheet.jpg Part 3] | ||
Line 14: | Line 16: | ||
**[http://zodiackillerciphers.com/408/key.html Detailed analysis] (For explanation, [http://www.zodiackillerciphers.com/?p=233 see this article]) | **[http://zodiackillerciphers.com/408/key.html Detailed analysis] (For explanation, [http://www.zodiackillerciphers.com/?p=233 see this article]) | ||
*[[Word frequency analysis (408)|Word frequency analysis of the 408 character cipher's plaintext]] | *[[Word frequency analysis (408)|Word frequency analysis of the 408 character cipher's plaintext]] | ||
− | *[[Letter frequency analysis (408)| | + | *[[Letter frequency analysis (408)|Frequency analysis of the 408's ciphertext and plaintext]] |
*[[Levenshtein distance analysis]] - A look at the occurrences of repeated sequences that are not exact matches. | *[[Levenshtein distance analysis]] - A look at the occurrences of repeated sequences that are not exact matches. | ||
*[[Quadrant analysis]] - Do the n-gram counts improve If we split the cipher text into four quadrants? | *[[Quadrant analysis]] - Do the n-gram counts improve If we split the cipher text into four quadrants? | ||
Line 20: | Line 22: | ||
*[[Errors in the 408 cipher|Are the misspellings in the solution due to transcription errors?]] | *[[Errors in the 408 cipher|Are the misspellings in the solution due to transcription errors?]] | ||
*[http://www.zodiackillerfacts.com/forum/viewtopic.php?f=50&t=1339 Omnidirectional repetitions] - An investigation into patterns that repeat in arbitrary directions by following "snake-like" paths. | *[http://www.zodiackillerfacts.com/forum/viewtopic.php?f=50&t=1339 Omnidirectional repetitions] - An investigation into patterns that repeat in arbitrary directions by following "snake-like" paths. | ||
+ | ** (Above link is broken. [http://zodiackillerciphers.com/Zodiac%20Killer%20Forum%20-%20View%20topic%20-%20Omnidirectional%20repetitions.html Click here for an archived copy.)] | ||
*[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=23179#p23179 "Complexification"] - Did the cipher author begin with a simpler set of cipher symbols, then "complexify" certain symbols to further flatten the symbol distributions? | *[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=23179#p23179 "Complexification"] - Did the cipher author begin with a simpler set of cipher symbols, then "complexify" certain symbols to further flatten the symbol distributions? | ||
*[[Substring ranking]] - Can we apply measurements that give us a way to find interesting sections of cipher text for focused attacks? | *[[Substring ranking]] - Can we apply measurements that give us a way to find interesting sections of cipher text for focused attacks? | ||
Line 28: | Line 31: | ||
The last 18 letters of the decrypted plaintext are gibberish when using the same key that is used to decrypt the rest of the plaintext. What are the explanations for this? | The last 18 letters of the decrypted plaintext are gibberish when using the same key that is used to decrypt the rest of the plaintext. What are the explanations for this? | ||
*Possibility: The symbols were pulled down from symbols above the last row of the cipher text. | *Possibility: The symbols were pulled down from symbols above the last row of the cipher text. | ||
− | **[http://www.zodiackillerfacts.com/forum/viewtopic.php?f=49&t=423 Glurk's original proposal]. There is good support for this explanation. | + | **[http://www.zodiackillerfacts.com/forum/viewtopic.php?f=49&t=423 Glurk's original proposal] [https://web.archive.org/web/20170815063831/https://zodiackillerfacts.com/forum/viewtopic.php?f=49&t=423 (Wayback copy)]. There is good support for this explanation. |
**[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=22217#p22217 Columnar repetition experiment]. This tests how often random selections of the last 18 symbols would "accidentally" produce the same number of columnar repetitions (12) that we see in the original 408 cipher. | **[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=22217#p22217 Columnar repetition experiment]. This tests how often random selections of the last 18 symbols would "accidentally" produce the same number of columnar repetitions (12) that we see in the original 408 cipher. | ||
**[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=22242#p22242 Second experiment which includes repeated tetragram]. This tests how often random selections of the last 18 symbols would "accidentally" produce the same number of columnar repetitions (12), where a tetragram repeats in the same column. | **[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=22242#p22242 Second experiment which includes repeated tetragram]. This tests how often random selections of the last 18 symbols would "accidentally" produce the same number of columnar repetitions (12), where a tetragram repeats in the same column. | ||
**[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=22254#p22254 Combinatorial calculation]. This is a calculation of the probability that random selection of the last 18 symbols would produce columnar repetitions that are observed in the unmodified 408 cipher. | **[http://www.zodiackillerfacts.com/forum/viewtopic.php?p=22254#p22254 Combinatorial calculation]. This is a calculation of the probability that random selection of the last 18 symbols would produce columnar repetitions that are observed in the unmodified 408 cipher. | ||
*Possibility: A plaintext message is encoded somewhere in the last 18 symbols, using some other system of encipherment. | *Possibility: A plaintext message is encoded somewhere in the last 18 symbols, using some other system of encipherment. | ||
+ | |||
== Homophone sequences == | == Homophone sequences == | ||
*[[Homophone sequences]] - Several plaintext letters are assigned multiple homophones (ciphertext symbols) to conceal the language frequencies of the plaintext message. This page enumerates the sequences in which these homophones appear in the original ciphertext. What was the scheme used by the killer to select from the multiple homophones? | *[[Homophone sequences]] - Several plaintext letters are assigned multiple homophones (ciphertext symbols) to conceal the language frequencies of the plaintext message. This page enumerates the sequences in which these homophones appear in the original ciphertext. What was the scheme used by the killer to select from the multiple homophones? | ||
Line 58: | Line 62: | ||
|[[File:Chronicle Cipher July 1969.jpg|thumb|Clearer scan of Part 3]] | |[[File:Chronicle Cipher July 1969.jpg|thumb|Clearer scan of Part 3]] | ||
|} | |} | ||
+ | |||
+ | Still images from Tom's evidence room videos: [https://www.tapatalk.com/groups/zodiackillerfr/concerned-citizen-clues-t10814-s20.html#p238800 (Post on Tom's forum)] | ||
Other images: | Other images: |
Latest revision as of 05:34, 21 March 2023
Contents
Information, Analysis, Experiments
- Comparison of cipher alphabets
- Solution key
- Z408 key (combined with Z340 key, with equivalent decodings highlighted)
- Another image of the Z408 key
- Comparison of solutions - Comparisons of solutions from various sources (newspapers, police reports, etc)
- Transcription of the letter and the Hardens' solution
- Donald and Bettye Harden's solution key. Part 1 | Part 2 | Part 3
- 2nd version of Part 1 (from Dayton Daily News, 12/14/1969)
- Donald and Bettye Harden's solution key (Higher-resolution scan from Zodiac Unmasked by Robert Graysmith): Part 1 | Part 2 | Part 3
- Harden's key, summary worksheet (TODO: find original source)
- "Code key" sent to the Vallejo Police Department on August 10, 1969. This was unavailable to the general public until recently.
- "Code key" article. Contains more information about the "Concerned Citizen" key, including handwriting comparisons.
- Tabular version of the key
- Detailed analysis (For explanation, see this article)
- Word frequency analysis of the 408 character cipher's plaintext
- Frequency analysis of the 408's ciphertext and plaintext
- Levenshtein distance analysis - A look at the occurrences of repeated sequences that are not exact matches.
- Quadrant analysis - Do the n-gram counts improve If we split the cipher text into four quadrants?
- Quadrant analysis Part 2 - An expansion of the previous quadrant analysis experiment. Is it possible to produce quadrant arrangements that increase the number and quality of homophones detected algorithmically?
- Are the misspellings in the solution due to transcription errors?
- Omnidirectional repetitions - An investigation into patterns that repeat in arbitrary directions by following "snake-like" paths.
- (Above link is broken. Click here for an archived copy.)
- "Complexification" - Did the cipher author begin with a simpler set of cipher symbols, then "complexify" certain symbols to further flatten the symbol distributions?
- Substring ranking - Can we apply measurements that give us a way to find interesting sections of cipher text for focused attacks?
- Catalog of repeating fragments - A comprehensive list of portions of cipher text that occur more than once in the cipher text.
- Corpus Experiments - A collection of corpus-based experiments performed on the Zodiac ciphers
Last 18 symbols of the 408 cipher
The last 18 letters of the decrypted plaintext are gibberish when using the same key that is used to decrypt the rest of the plaintext. What are the explanations for this?
- Possibility: The symbols were pulled down from symbols above the last row of the cipher text.
- Glurk's original proposal (Wayback copy). There is good support for this explanation.
- Columnar repetition experiment. This tests how often random selections of the last 18 symbols would "accidentally" produce the same number of columnar repetitions (12) that we see in the original 408 cipher.
- Second experiment which includes repeated tetragram. This tests how often random selections of the last 18 symbols would "accidentally" produce the same number of columnar repetitions (12), where a tetragram repeats in the same column.
- Combinatorial calculation. This is a calculation of the probability that random selection of the last 18 symbols would produce columnar repetitions that are observed in the unmodified 408 cipher.
- Possibility: A plaintext message is encoded somewhere in the last 18 symbols, using some other system of encipherment.
Homophone sequences
- Homophone sequences - Several plaintext letters are assigned multiple homophones (ciphertext symbols) to conceal the language frequencies of the plaintext message. This page enumerates the sequences in which these homophones appear in the original ciphertext. What was the scheme used by the killer to select from the multiple homophones?
- Nick Pelling's articles on homophone sequences. Part 1 | Part 2
- John Graham-Cumming's article on automatic detection of homophone sequences
- John C. King & Dennis R. Bahler, "An Algorithmic Solution of Sequential Homophonic Ciphers". In their paper, King and Bahler describe an algorithm that can identify homophone sequences to simplify homophonic ciphers. Abstract
- Brute force search for homophone sequences - Shows sequences detected in the 408 and 340 ciphers by performing brute force searches for sequences involving up to 6 symbols.
Images
Images from Michael Butterfield (zodiackillerfacts.com) and Tom Voigt (zodiackiller.com):
Still images from Tom's evidence room videos: (Post on Tom's forum)
Other images: