A Simulation Of

Major Bazeries Cipher Device

Version 1.1.1
Copyright 1997-2003 by Wilhelm M. Plotz (aka CipherClerk)


On the meaning of perfection:

J M H X N   P J X O Q   F G Z Z M   N X S B V
V P P D V   S D I V E   N H P B J   G K K D L
V B K Y K   N Y A J B   K J I I V   A Z Y L I
Q M F H D   E B V I T   Z M O F F   H Z A X A
F N G K E   S D S P L   M G C E Z   Q V V Z V
F N S X X   _ _ _ _ _   _ _ _ _ _   _ _ _ _ _

Major Bazeries said that his device would be perfectly secure because of its complexity. Another frenchmen had a different understanding of perfection...


This is a simulation of Major Bazeries cipher device. The applet is the same as for the M-94, so there is no difference ion using it. I merly didn't want to locate the device under the description of the US M-94. Nor did I want to change the user interface so that switching between M-94 and Bazeries setup can be done at runtime. Please note that the letter W is not avaliable. This is not a bug in the simulator, it's a feature of the original device: For the frenchman Bazeries, this letter was dispensible. To encrypt a W, replace it by two V's: VV looks quite like W, doesn't it? The decission to drop W is offcourse based on statistical properties of the french language where - in contrast to english - J is more frequently used than K.
The device has less disks than the M-94 and the alphabets are not so well mixed as those of the M-94. For this reasons, it is less secure. The lack of security was not just hypotethical: The french cryptographer deViaries found an attack that demolished the security of Major Bazeries cipher completely.

Please note that this cipher is not secure. Do not use it to protect vital or valuable information!


The Cipher Device Simulator

The data for the simulation was taken from Decrypted Secrets : Methods and Maxims of Cryptology by Friedrich L. Bauer. For a description of the simulator, please refer to the U.S. version of the device.


Legal Stuff

Major Bazeries Cipher Device Simulator, and Virtual US Army Cipher Device, Model M-94, Version 1.1.1 are copyrighted 1997-2001 by Wilhelm M. Plotz. Altough this software is copyrighted it may be used and distributed freely.

For off-line use, you may download WheelCipher.zip. You need a system capable of using long filenames, e.g. more than 8+3 characters.

I DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL I BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.


References

Advanced Military Cryptography by William F. Friedman, Aegean Park Press (C-8), 1976, or Buckmaster Publishing.

Military Cryptanalytics, Part II, Volume 1 by Lambros D. Callimahos and William F. Friedman, Aegean Park Press (C-44), 1985.

The Codebreakers, David Khan, Scribner, 1967, 1996.

Decrypted Secrets : Methods and Maxims of Cryptology by Friedrich L. Bauer, Springer Verlag

National Maritime Museum Association: http://www.maritime.org/csp488.htm (includes pictures of the device)

Khan's book is the book on the history of cryptography. Bauer's book is pretty good as well: It's much shorter, but more mathemathical and technical. Nevertheless it should be readable to almost everyone. I strongly recommend both! (Provided that you're interested in crypto, offcourse!)


If you are interested in classical cryptography, you might want to have a look my CipherClerk's Applet at members.aon.at/cipherclerk . This applet / application implements some historic cipher schemes and cipher machines.