In the third step, the text created with the nomenclator is subtracted from the key stream (modulo 90):

27  8  8  0 35
32 30 20 22 37
--------------
85 68 78 58 88

Step 3 represents the application of a One Time Pad (OTP). It is unusual that cleartext and key stream subtracted instead of added, but from a cryptographer’s point of view this does not make a big difference. An OTP-like encryption based on a deteministicly generated key stream is also referred to a “stream cipher”.

All in all, Code # I is a combination of a nomenclator and a stream cipher.

In order to make this system more secure, Kaczynski introduced various safeguards, including the use of intentional misspellings, encryption errors, meaningless punctuation, nonsense words, and Spanish and German text intermixed with English plaintext and ciphertext. Kaczynski also chose to omit and add word breaks at random and use meaningless numbers (nulls).

There are a few details I omitted in my description (e.g. the way the key is placed in front of the cipher text). For a complete specification please refer to the Cryptologia publication.

The following image shows a decryption process (this means that addition instead of substraction is used). The ciphertext is “72 24 74 …”. It was encrypted with the key stream “47 74 64 …”. Adding the two sequences modulo 90 results in “29 8 48 60 …”, which is translated by the nomenclator to “I WILL HAVE …”.

Unabomber-Journal-Sample

 

Code # II

Code # II is similar to Code # I, but less complex. Again, a nomenclator is used:

Unabomber-Nomenclator-2

Like Code # I, Code # II subtracts the numbers generated with the nomenclator from a key stream. This key stream is generated by adding the number sequences given in two different notebooks.

 

Conclusion

Kaczyinski’s approach of combining a nomenclator with a stream cipher is nothing outstanding from a cryptographer’s point of view. Modern encryption methods, like AES or RSA, are by magnitudes more secure. However, Kaczyinski’s methods are among the most complex and most secure manual encryption systems (i.e., they were applied without a computer). Encrypting a whole journal in such a complex code is certainly unusual.

Jeanne Anderson, in her article, comes to the following conclusion: “His [Kaczyinski’s] systems, while complex and theoretically successful in concealing messages from someone with no knowledge of the systems, would be impractical for use operationally. They require many key documents to encipher and decipher, and their complexity would rule out broad usage. Kaczynski, however, was able to successfully use these systems as a personal encryption method to secure his outlet for his emotions and personal thoughts. He utilized these systems to both express and conceal his frustrations and anger with society. His writings gave details about his attacks as well as his satisfaction with his crimes.”

Further reading: Who can make sense of a child murderer’s encrypted notes?

1 / 2

Kommentare (12)

  1. #1 Klaus Schmeh
    4. September 2016

    Bart Wenmeckers via Facebook:

    Thanks for posting.Teds ciphers have also been used as test cases for some of the zodiac research as (I think) he was a poi at one point (still might be). Also his style and methods were unique.

  2. #2 PROMETHEUS
    housten
    4. September 2016

    deciphering the scam. R.C.Hoagland is an actor.
    we are watching you

  3. #3 Klaus Schmeh
    4. September 2016

    @PROMETHEUS:
    Could you please be a little more precise? What do you mean?

  4. #4 PROMETHEUS
    4. September 2016

    “Be smart – work hard – solve Problems” – Bill (of the) Gates

    WHO IS JOHN GALT?

  5. #5 tomtoo
    4. September 2016

    @klaus
    Mahl ehrlich da kann ich doch alles hineininterpretieren oder ?

  6. #6 Knox
    4. September 2016

    The general public has to pay a private organization $97 for thirty days access to a writeup about public records.

  7. #7 Klaus Schmeh
    5. September 2016

    Mark Romo via Facebook:

    Very interesting

  8. #8 idiot
    23. Oktober 2022

    you have no idea how it works because you didnt even decipher your own encryption

  9. #9 Wandee Thaweetham
    Chanthaburi - Thailand
    24. Oktober 2022

    @idiot

    Why don’t you enlighten us all if you have the answer?

  10. #10 Max Baertl
    24. Oktober 2022

    @Wandee Thaweetham

    don‘t feed the Troll

  11. #11 Wandee Thaweetham
    Chanthaburi - Thailand
    24. Oktober 2022

    Thanks Max, I appreciate your concern, but maybe he can make some contribution to the conversation and if it only provides the fact that he deserves his alias (idiot).

    What I found interesting about the article was that Kaczynski used two systems to create his ciphers. The first system are his journals, which became the Rosetta Stone for the FBI, and without it they would have been unable to decrypt his ciphers. Developing systems like that isn’t that difficult for someone without skills in cryptography, but it contradicts the statements Shannon and Kerckhoffs made and hence have no use as a communication tool between two or more parties. If Kaczynski would have shared his journals with someone else and planned a bank robbery, using his systems to develop a plan how to do it, by the time they would have finished their project and finally meet to go ahead, the bank would have already moved business online and in the building would be a fast food service or something else :).

  12. #12 David Oranchak
    http://zodiackillerciphers.com
    3. Februar 2023

    I finally made a video about the Unabomber’s codes:

    https://www.youtube.com/watch?v=2aqx67s19mA

    It’s basically a weird variation of one time pad. But he put a lot of interesting patterns in the grid he was using for a pad. So I still wonder how secure it was.