A Kryptos Primer

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
The landscape at the Langley CIA complex includes several unique items which are part of Kryptos. Near the main entrance, a copper plate containing morse code is sandwiched between slabs of granite. Across the sidewalk are more slabs of granite, on top of which is a compass engraved into the stone. The compass points across the slab to a lodestone which sits on top of yet another copper plate. Next, a smaller triangular piece of granite appears to pierce the surface of the ground. Within the courtyard, more slabs of rock flank two sides of a still pool of water. Behind this building is the focal point of the Kryptos installation which includes letters carved into a copper sheet, petrified wood, another pool, and several large stones. A computer-generated model of the courtyard, which contains the main parts of Kryptos, allows for a dynamic view of the sculpture. Manipulating the S-shaped copper sheet into a flattened representation offers a more practical view. The copper sheet is actually composed of four panels, each of which are about five feet tall by about nine feet wide. Panels three and four are reversed relative to panels one and two. After the two panels are rotated, all of the letters are moved onto a grid in preparation of attempting to solve the puzzle. The objects in these photos may hold clues for solving the puzzle on the copper sheet. But then again, they might not. Mister Sanborn, in an interview with Wired News, was asked this question: "So just by reading the text taken from Kryptos and posted online, you can solve the puzzle?". To which Sanborn replied, "well, yeah". The text of Kryptos appears to have been designed with a fictitious operative in the field in mind. Ed Scheidt, the man who taught cryptography to Jim Sanborn, described the idea of getting a message to an operative and that the message must contain the clues, or keys, for decrypting the message. What might an operative, who is trained in cryptography, make of the text from the Kryptos panels? Scanning the characters of each line would reveal that there are four question marks breaking up the text. A trained eye would easily recognize the Vigenere Tableau. The operative might find it curious that three alphabets surround the tableau, and that four extra columns have been appended to the right edge. At least some of the message was encrypted using substitution, because of the Vigenere Tableau. However, the operative would likely perform a frequency analysis to expose any use of transposition. Many of the letters J K Q V X and Z will show up in substitution. But only a few of these letters will exist in a message encrypted using transposition. An analysis of each line reveals that there is one section encrypted using transposition and two sections using substitution. The substitution sections were likely encrypted using the provided Vigenere Tableau. Encrypting with a Vigenere Tableau implies the use of one or more keywords. Keywords can often be recovered through an analysis of the cipher-text. First, the operative would attempt to identify the length of the keyword by looking for sets of repeating letters in the cipher-text. The first two lines contain the five repeating letters V J Y Q T at 20 characters apart. This suggests a keyword length of at least five. So either five or 10. The next two lines contain the five repeating letters G W H K K at 16 characters apart. Therefore, the length of the keyword must be five or more letters. So, it's most likely an eight-letter keyword. At lines 11 and 13, the letters N U V P D repeat at 72 characters. Possible keyword lengths are 6 8 9 and 12. The spacing of other pairs of repeated letters suggests a keyword length of eight. Because a longer message is easier to decrypt than a shorter one, the operative might attack the lines three through 14 first. To begin, the letters are placed into rows of eight, leaving out the punctuation. The two alphabets, written at the top of this grid paper, are for reference. The first is the Kryptos alphabet taken from the first row of the vigenere tableau. Below the letters are written the numbers 0 through 25. The second is just the regular alphabet. Below this alphabet are numbers from the Logarithmic Weights of Letter Probabilities, in chapter nine of the 1990 Army Field Manual on Basic Cryptanalysis. These numbers were assigned to each letter based on how often the letter appears in the English language. To begin the analysis, the first column of cipher-text is written along the left side of the grid paper. The letter A is placed at the top of two columns to the right. Using the Vigenere Tableau, each letter of the cipher-text is decrypted using the letter A as the key. The short-hand method is to subtract the key from the cipher-text. The numbers associated with each letter come from the first alphabet at the top of the grid paper. When the result is a negative number, 26 is added. Next, the plain-text letters are each assigned a weight value from the logarithmic weights alphabet. These numbers are totaled at the bottom of the column. This entire process is repeated 25 more times using each letter of the alphabet as the key in the formula. Now the column with the highest total will reveal the first letter of the eight-letter keyword. Here, column A has the highest total of 350. So, the keyword likely begins with A. This entire process is repeated with each of the eight columns of cipher-text. When finished, the keyword ABSCISSA is revealed by the eight columns which have the highest totals. The eight columns with the highest totals also contain the plain-text which, when brought together, reveals the deciphered message. This process doesn't work as well when the amount of cipher-text is small, as is the case with the first two rows. As discovered earlier, the keyword length could be either five or ten, so the cipher-text is placed in rows of both five and ten letters. Using the same process as before, the highest totals for the five columns results in a keyword of: P E L J K. The highest totals for the ten columns results in a keyword of: P A L I Z P E G J S. Because both keywords are non English words, the plain-text under both keywords is examined to see if any whole or partial English words stand out in any or all of the rows. The text under the ten-letter keyword looks the most promising. The word BETWEEN is apparent in the first row. The fifth column should be replaced so that an E is at the top. An E at the top is found under the key letter M. The seventh column should be replaced so that an N is at the top. An N at the top is found under the key letter S. Now the keyword can be made out and the rest of the cipher-text is easily decrypted. The portion of the cipher-text which involves the use of transposition will be addressed next. The simplest form of transposition is the rotation of a block of letters which have been arranged into a square. This method will be attempted first. The number of letters in the Kryptos transposition cipher will determine the size of the square to be used. The total is 336, and the square root of 336 is 18.33. An exact square is not possible. Therefore, several integer-pairs are calculated which are close to 18.33 and are a factor of 336. These integer pairs are: 12 and 28, 14 and 24, and 16 and 21. The number pair closest to forming an exact square is 16 and 21. The 336 letters are rotated and placed into rows of both 16 and 21 letters. Clockwise is the standard direction of rotation. One of these rectangles is selected to work with. A new rectangle is then started, bottom up, by taking five letters at a time starting at the lower right corner of the chosen rectangle. If an English word doesn't start to form in the left-most column a new rectangle is started using six letters at a time, then seven, and so on. If not successful with the first selected rectangle, the other rectangle will be selected. Success is achieved, when 12 letters at a time are taken from the 21 by 16 rectangle. The word SLOWLY appears in the left-most column. And more English words appear in other columns as well. Working from bottom to top, the remaining letters are placed into the rows of twelve. The rectangle is rotated one last time to make it easier to read. Here, the final result is placed into 12 rows of 28. The first encrypted message, referred to as K1, appears to make reference to the lower atmosphere, outer space, the northern lights, and the earth's magnetic field. Between subtle shading, and the absence of light, lies the nuance of illusion. The word illusion contains the letter Q in place of the first L. The importance of this Q will be made apparent later in the recovery of keywords from the text of Kryptos. The second encrypted message, which is referred to as K2, is composed of several individual messages which are separated from each other by the letter X. The first message of K2 may be describing the act of hiding an entire ship from being detected by radar. The next three messages seem to share a common but vague topic. The word underground, however, is misspelled. The extra letter U will play a part later in the recovery of keywords. The fifth message contains numbers in the form of latitude and longitude coordinates. These numbers will become important later as part of a proposed algorithm used in solving the fourth message. The sixth message, which appears to be part of the fifth message, simply says, I D BY ROWS. However, mister Sanborn offered a correction, saying that a letter S had been omitted. The corrected message is preceded by an X and says LAYER TWO. This message will also play a part later in the recovery of keywords. The third encrypted message, which is referred to as K3, describes the act of opening the tomb of King Tutankhamun. The first line contains three raised letters, and the word desperately, which is misspelled with an A in place of an E... and also has a missing E before the L Y. All of these are clues in the recovery of keywords. The letter Q, just before the question mark at the end of K3, will also play a role later in the recovery of keywords from the text of Kryptos. The first part of this video was created in order to establish a mind-set. This was done by demonstrating some of the standard analytical techniques involved in working with an encrypted message. The remainder of this video will focus on the final 97 letters of Kryptos referred to as K4. Since K4 appears to be a substitution cipher, keyword recovery would be attempted next. However, it becomes difficult when there are only short sets of repeating letters. K4 was designed to be more challenging. The keywords for K4 are actually hidden in the text of the sculpture. They must be found before K4 can be decrypted. After the keywords are found, there is a specific technique which was used in K4 to mask the English language. And that technique must be discovered as well. The next part of this video will cover an idea of what the keywords are and where to find them, as well as present the masking technique which may have been used to arrange and encrypt those last 97 letters. First, the masking technique. K4 appears to have been encrypted by first placing the letters into rows below two keywords. For now, call the keywords A and B. Keyword A is seven letters and keyword B is eleven letters making a total of 18. K4 is placed into five rows of 18 and then one row of seven below the two keywords. K4 is then divided on the keyword boundary making two puzzles. At first glance it appears that K4 was split and each side was encrypted with its own keyword. The two sides were then put back together to appear as a single puzzle. Analysis of side A will produce valid results. So will analysis of side B. But, analysis on K4 as a single puzzle will fail. The English language won't be exposed. And we have uncovered the masking technique. If only it was that simple. It appears that the masking technique is more complicated than that. Encrypting requires the use of an alphabet. But with K4 it appears that each row segment in each half of the puzzle may have been encrypted with its own alphabet. Or rather one of six possible alphabets. The six alphabets would be numbered three through eight to match the same numbers used in the latitude and longitude coordinates provided in K2 which use only the numbers: 3 4 5 6 7 and 8. The latitude coordinate numbers 3 8 5 7 6 5 are placed alongside puzzle A. And the longitude coordinate numbers 7 7 8 4 4 are placed alongside puzzle B. The first row of puzzle A, for example, would be decrypted using alphabet number three. The second row would use alphabet number eight, and so on. There may be even more to the masking technique than this. Instead of two keywords, there may be eleven keywords, one for each segment. Ed Scheidt made the comment that the key is the algorithm or the instructions of how to proceed. The keywords A and B give instructions to use two streams of letters as keywords. Instructions for where to get the streams of letters was not provided. However, the text of Kryptos would be a likely source for an operative in the field to find these key-streams. Unlike an operative in the field, we have the advantage of seeing part of the original encryption sheets which were supplied to the media by Mister Sanborn. Using clues provided on this code sheet, it appears that the cipher-text of K1 and K2 provide the two streams of letters. K4 has been arranged into rows of 18 letters and on the code sheet can be seen marks at the 18th character on the first lines of both K1 and K2. Two arrows are also drawn on K1 to show the direction in which the key-stream is to be taken off... from left to right on the first row... and from right to left on the second row. Another mark found on the second line of K1 indicates where to stop. Eighteen letters from K1 brings us to the first mark. Two more sets of 18, and a set of seven letters brings us to the stop mark, with a total of 61 letters from K1. Eighteen letters from K2 brings us to its mark. Then eighteen more makes 36 letters from K2, and a total of 97 letters from the two streams. Another possibility is to take the two sets of 18 letters from K2 and place them before the letters from K1. Some trial an error will obviously be required to determine which arrangement is correct. The masking technique appears to have been accomplished by dividing K4 into eleven puzzles, using two key-streams as eleven keywords, and eleven numbers as indices into six alphabets. If K4 was designed to be this complex, then it explains why Ed Scheidt said, "you need to solve the technique first, and then go for the puzzle". As previously indicated, six alphabets are to be used. Where can they be found? The six alphabets are actually created from one alphabet by using something called decimation. An alphabet is decimated when it is systematically reordered using a selected integer, such as three. The third letter is taken first, then the sixth, ninth, twelfth, and so on. When the end of the alphabet is reached, counting continues by wrapping around to the start. When all 26 letters have been taken, the alphabet has become a decimated alphabet. This doesn't work with some integers, such as four. Every fourth letter is taken until the end of the alphabet is reached, then counting wraps around to the start. After the second loop, it wraps around to a letter which has already been taken. The only integers which can be used to decimate an alphabet must be co-prime with the length of the alphabet, which is 26 in this case. These integers are: 1 3 5, 7 9 11, 15 17 19, 21 23 and 25. What is needed are six alphabets decimated using the numbers 3 4 5 6 7 and 8. So, a 26-letter alphabet cannot be used. What can be used is a 31-letter alphabet because 31 is a prime number and all other integers are co-prime with 31. This is why four extra columns were added to the vigenere tableau. Each row now contains a 30 letter alphabet, and one of the rows has a 31 letter alphabet. The six required alphabets are obtained by decimating this alphabet using the numbers 3 4 5 6 7 and 8. Now for the recovery of keywords from the text of Kryptos. Up to now the two main keywords have been referred to as A and B. Together, they have the meaning of two key-streams. Keyword A is the seven letter word LETHEAN, which is a certain river in Greek mythology. Keyword B is the eleven letter word PARASYSTOLE, which indicates the existence of a second pacemaker. Applying these words to cryptography, the role of a keyword is equated to being a pacemaker, with there being two. And the river is equated to being a stream. Combined, there are two key-streams. These two keywords have been hidden somewhere in the text of Kryptos. Not only did Mr. Sanborn have to figure out how to hide these two keywords, but he also had to figure a way to specify that they should be joined end to end. And that the word LETHEAN should be placed before the word PARASYSTOLE. The keyword PARASYSTOLE is the easiest to discover. It is found in the plain-text at the start of K3. The two words, SLOWLY and DESPERATELY, possess most of the necessary letters in which to hide the word PARASYSTOLE. Two A's are needed, but there is only one A available. So an E was switched to an A. The W, and the second L of the word SLOWLY are not needed... as well as the D of DESPERATELY. So these three letters were raised as an indicator to get rid of them. All that is needed now is a way to communicate where to stop taking letters from the start of K3. Removing a letter would signal where to stop. So this is why the letter E was removed. The three raised letters, W L and D, are replaced (after the transposition process has been completed) by the letters Y A and R. So, it's the position of the raised letters Y A and R that's important, not the letters themselves. The keyword LETHEAN is much more difficult to recover from the text of Kryptos. The keyword PALIMPSEST, from K1, offers one of two clues. Palimpsest refers to layers of writing. The other clue can be found in the words, LAYER TWO, located at the end of K2. If this top panel is layer two, then the bottom panel must be layer one. By placing one layer of this text on top of the other, a few of the same letters of both layers will become aligned. This is a type of steganography and it is how the letters of the keyword LETHEAN were hidden in the text of Kryptos. Rather than showing how to find the keyword, it might be beneficial to see what steps were required to hide the keyword LETHEAN. To begin, the text was originally placed into rows of 31 characters, with two necessary exceptions. Also at this stage, the words ILLUSION and UNDERGROUND are spelled correctly. The letter Q, placed at the end of K3, is intentional. It will act similar to a registration mark used by professional printers to align color layers. The ideal position for overlapping the two layers must be found next. By moving layer two, nine rows down, and one column to the right, five of the seven letters of the keyword LETHEAN are either aligned, or close to being aligned. The first letter is brought into alignment by shifting the corresponding row of layer one by two columns to the left. The two left-most letters are then moved up and to the end of the row. The second letter is brought into alignment by shifting the corresponding row of layer two, one column to the left. The left-most letter is also moved up and to the end of the next row. The fifth letter is brought into alignment by shifting the corresponding row of layer two, one column to the right. A letter is then borrowed from the end of the row above in order to fill the void at the left. An operative in the field will need to know how to align these two layers correctly. To mark this exact position, the letter Q on layer one is located. And then the letter directly beneath the Q, on layer two, is forced to become a Q when decrypted. It just happens to be the first L in the word ILLUSION. Aligning the letter Q of both layers will bring five letters of the word LETHEAN into alignment. The remaining two letters of the word LETHEAN are to be aligned by first taking the top nine rows of layer one and moving them down to cover the bottom nine rows of layer two. Two letters are already aligned on the next row to be used. A letter T is wanted, but not the letter N. There happens to be another letter T which can be used. This letter T is brought into alignment by shifting the corresponding row of layer two, one column to the right. Doing so takes the letter N out of alignment. One letter is borrowed again from the end of the row above in order to fill the void at the left. Six of the seven letters of the word LETHEAN have been aligned on both layers. The final required letter is an E. However, there happens to be ten more letters which are already aligned just by coincidence. Assuming the final letter E is aligned, an instruction must be left to use only the first seven letters to make a word. This is accomplished by finding the next available letter E, on layer one, and then forcing a misspelling of the word beneath it, on layer two. The desired effect will be to draw attention to the letter and raise the question of why it is there. The answer, of course, is to take the letter E which is above the misspelled letter U and unscramble the letters up to that point. One final task remains. An instruction must be included to place the word PARASYSTOLE after the word LETHEAN. If one more random letter was brought into alignment, there would be eleven random letters after the seven letters which make up the word LETHEAN. A letter E on each layer has a separation of only one column. These are brought into alignment by shifting the corresponding row of layer one, one column to the left. The left-most letter is again moved up and to the end of the row. This brings the total to eleven. However, to insure additional words or phrases are not to be made from these random eleven letters, several letter-swaps will be made. The row with the aligned letter C has two letters on each layer which are each separated by two columns. The row on layer one is shifted one column to the right, and a letter is borrowed from the end of the row above. The row on layer two is shifted one column to the left, and the left-most letter is moved up and to the end of the row. The letter C is replaced by the letters A and N. Next, the letters H and S are both removed. They are on the same row, so they are tied to the same action. The row on layer two is shifted one column to the left, and the left-most letter is moved up and to the end of the row. The removal of those two letters leaves one space to be filled. The next row contains the letter E which is only off by one column between the two layers. The row on layer one is shifted one column to the right and a letter is borrowed from the end of the row above. With the alignment of the letters completed, the rows are restored to their original positions. The jagged right edge of the two layers is explained by the adjustments which were made in order to align the 18 chosen letters. Imagine an operative in the field receiving only a sheet of paper with the transcribed text of Kryptos. The design of Kryptos was oriented toward a fictitious operative in the field. And the text of Kryptos contains both the message and the keys. Mister Sanborn revealed that the text is the only item required for decrypting its messages. Half of the text contains encrypted messages. The other half contains a Vigenere Tableau. Letter frequency analysis reveals the use of both substitution and transposition ciphers. Groups of repeating letters in the top half reveal that two keywords are used, and that the top half contains two puzzles. Keywords for the two puzzles are recovered by calculating the logarithmic weights assigned to all possible plain-text letters for each puzzle. The columns with the highest totals reveal some or all of the keyword letters. The last question mark reveals the end of the third puzzle, which utilizes a transposition cipher. It is decrypted by first rotating the 336 letters clockwise and into a block. This is followed by a restructuring of the block of letters to discover English text. Then one final rotation of the letters makes it readable. The solution to K4 comes in two stages, the first of which is to figure out how the puzzle was structured so that the English language will not be revealed through standard analysis techniques. The process begins by discovering two keywords in the text of Kryptos. One keyword is found at the start of the K3 plain-text by taking the letters up to the missing E in the word DESPERATELY, and then discarding the three raised letters prior to unscrambling the remaining letters. The other keyword is found by first aligning the two Q's on the bottom and top halves of the puzzle. Five of the same letters will become aligned on the two layers. Bringing the top nine rows down will reveal the alignment of twelve more letters. The letter E, which is on top of the letter U in the misspelled word UNDERGROUND, is also included. The first seven letters are unscrambled to reveal the keyword LETHEAN. The remaining eleven letters are a placeholder for the keyword PARASYSTOLE. The 97 letters of the fourth puzzle are then placed in rows below the two keywords. The puzzle is then divided on the keyword boundary, making a total of eleven row segments. Next, the eleven numbers provided in K2 as latitude and longitude coordinates are placed alongside the eleven row segments. A specific alphabet in the center of the tableau, which is 31 letters in length, is decimated using the numbers 3 through 8 in order to make six unique alphabets. The integers which make up the coordinates, are used as indices into the list of six alphabets. The definitions of the two keywords LETHEAN and PARASYSTOLE lead to the idea of using two key-streams. The source of the key-streams must be available to the operative in the field. The cipher-text of K1 and K2 offer streams of random letters as a source for the two key-streams. The puzzle called K4 appears to actually be eleven puzzles, each encrypted as a one-time-pad. This arrangement resembles the rows and divisions of the Berlin Clock. The two words, BERLIN and CLOCK, are the solution to the 64th through the 74th letters of K4. The question now is, what algorithm was used to encrypt BERLIN CLOCK to N Y P, V T T, M Z F P K.
Info
Channel: k4hasgotme
Views: 9,851
Rating: 4.8873239 out of 5
Keywords: Kryptos Sculpture, CIA, Langley, Unsolved Puzzle, K4, Sanborn, Primer, Kryptos, Lethean, Parasystole, Abscissa, Palimpsest, Vigenere Tableau, Berlin Clock, Layer Two
Id: yKRZ0rvAf4I
Channel Id: undefined
Length: 37min 25sec (2245 seconds)
Published: Tue Jan 09 2018
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.