
To meet those needs, on 29 November 1775, the Second Continental Congress established a Committee of Secret Correspondence-soon renamed the Committee of Foreign Affairs. At the apporoach of the Revolutionary War came the realization of a need for an alliance with France, which involved confidential communications with the government of Louis XVI, as well as the gathering and transmittal of information concerning British resources and strategies. minister to France (1784-1789), and Adams was minister to England, ciphers were essential because European postmasters routinely opened and read all foreign correspondence. However, during the years when Jefferson was the U.S. John Adams, resisted the very idea of secrecy. The founders and leaders of the early American republic were dedicated to the “rule of reason” and to honesty and openness in domestic and foreign diplomacy. By the eighteenth century most European countries, including France, England, Spain, and the great city-states of Venice and Florence in Italy, had developed a wide variety of intricate and effective cryptographic systems, including the bureaucratic structures not only to maintain secure communications but also to pursue interception and code-breaking. Its use became widespread beginning in the sixteenth century, when intercontinental exploration resulted in the building of farflung empires. The origins of cryptology lie deep in the history of written languages, when Arabic scholars began systematically studying the subject. In general, codes and ciphers were not applied to entire letters or other documents, but only to names, actions, and judgments. For example, Lewis used a set of symbols to encode his evaluations of Army officers for Jefferson (see Lewis’s Report on Army Officers). Ciphers systematically substitute letters or numbers for the letters in a message codes consist of symbols, words, or groups thereof, which stand for other words, parts of words, or ideas. The process of applying a key to a cipher in order to decode it is known as decryption. The result of the encryption is called the cipher (often spelled cypher) or ciphertext. The secret formula for encrypting the plaintext is called the key. The source information is called the plaintext.

OriginsĬryptology-from the Greek words kryptos, “hidden,” and logos, “word”-began as the science of communicating critical information, usually of a political or military nature, in a secret language known only to the sender and the legitimate receiver. That Jefferson, however, initially took the idea seriously is suggested by the fact that he devised two slightly different ciphers with Lewis’s journey in mind. Lewis himself never mentioned the cipher in any correspondence, nor in his journals, and there is no other evidence that he ever resorted to it. In the official orders he issued in April 1803, Jefferson urged Lewis to keep him informed “at seasonable intervals” concerning the progress of the expedition, “putting into cypher whatever might do injury if betrayed.” Donald Jackson, Letters of the Lewis and Clark Expedition with Related Documents (2nd ed., 2 vols., Urbana: University of Illinois Press, 1987), 1:65. We are indebted to Sharon Touton of Pasadena, California, for calling attention to our errors in the original version of this page, and for clarifying the encoding of numbers with Jefferson’s … Continue reading

#CIPHER WHEEL CODE#
Those four numbers and their corresponding letters intersect at the code letters b, u, b, and q, which is the ciphered form of 1789.
#CIPHER WHEEL PASSWORD#
The number 1798 is represented by the password letters as a, n, t, and i. To encode the number 8 in 18, follow the number 8 across to the n column, which intersects with the 8 line at the letter v. To encode numbers, write the them beneath the letters of the password, in this instance “antipodes.” Reading from the figure 1 across to the a in the top row, then down that column to the first a in the left column will produce an encoding of b. A keyword is used for simplicity and speed in encoding and decoding. The top row and the extreme left-hand column are the basic coordinates. It is used to create a substitution cipher, in which any letter of the alphabet is made to stand for another letter. Sometime in 1803 Thomas Jefferson presented Meriwether Lewis with a cipher based on a square table or tableau such as that published in 1516 by Johannes Trithemius, a Benedictine abbot in Germany, and which had found common usage during the eighteenth century.
