In the late summer of 1781, General George Washington finally saw an opportunity to take New York City away from the British. Virtually from the beginning of the War for Independence six years earlier, the British had held this key city, and Washington had long desired to take it into American hands. Washington laid siege to the town all summer. With the expected arrival of Admiral de Grasse and ships of the French fleet along with an additional 3,000 French soldiers, he believed he finally had his chance. But on August 14, he changed his mind and turned his eye to Yorktown, Virginia.
Washington received intelligence, gained partially through the decryption of captured British messages, that gave him the assurance he needed to complete his move on Yorktown.
Communication plays an important role in both a country’s diplomacy and its wars. Keeping those communications secret and understanding the adversary’s communications can make the crucial difference in a leader’s actions and abilities.
At the time of the American Revolution, both the British commanders and the American rebels practiced a variety of methods to keep their written communications secret. Both turned to invisible inks, hidden messages, and secret writing in the form of ciphers and codes.
Cryptography—the use of ciphers and codes—makes messages unintelligible to an adversary by the use of keys and lists. Ciphers re arrange letters or change individual letters into a different letter, number, or symbol based on a prearranged setting known as a key. Codes change entire words or phrases into other words, number groups, or symbols based on a list or a book. To decrypt the secret messages, the receiver needs access to the original key, list, or book. Theoretically, the adversary wouldn’t have the original source and therefore could not understand the message even if it were captured.
Solving a message without having the original key or list—cryptanalysis— has been employed by governments and militaries for as long as people have used cryptography to make messages secret. The ability to capture and read the enemy’s communications provides invaluable information for a military commander. With foreknowledge of an adversary’s intentions, leaders can develop counteractions and turn a battle in their favor.
This is the story of revolutionary communications and cryptologic secrets and the role they played in America’s war for independence.
Language
English
Pages
105
Format
Kindle Edition
Publisher
Penny Hill Press Inc,
Release
October 12, 2012
Revolutionary Secrets: Cryptology in the American Revolution
In the late summer of 1781, General George Washington finally saw an opportunity to take New York City away from the British. Virtually from the beginning of the War for Independence six years earlier, the British had held this key city, and Washington had long desired to take it into American hands. Washington laid siege to the town all summer. With the expected arrival of Admiral de Grasse and ships of the French fleet along with an additional 3,000 French soldiers, he believed he finally had his chance. But on August 14, he changed his mind and turned his eye to Yorktown, Virginia.
Washington received intelligence, gained partially through the decryption of captured British messages, that gave him the assurance he needed to complete his move on Yorktown.
Communication plays an important role in both a country’s diplomacy and its wars. Keeping those communications secret and understanding the adversary’s communications can make the crucial difference in a leader’s actions and abilities.
At the time of the American Revolution, both the British commanders and the American rebels practiced a variety of methods to keep their written communications secret. Both turned to invisible inks, hidden messages, and secret writing in the form of ciphers and codes.
Cryptography—the use of ciphers and codes—makes messages unintelligible to an adversary by the use of keys and lists. Ciphers re arrange letters or change individual letters into a different letter, number, or symbol based on a prearranged setting known as a key. Codes change entire words or phrases into other words, number groups, or symbols based on a list or a book. To decrypt the secret messages, the receiver needs access to the original key, list, or book. Theoretically, the adversary wouldn’t have the original source and therefore could not understand the message even if it were captured.
Solving a message without having the original key or list—cryptanalysis— has been employed by governments and militaries for as long as people have used cryptography to make messages secret. The ability to capture and read the enemy’s communications provides invaluable information for a military commander. With foreknowledge of an adversary’s intentions, leaders can develop counteractions and turn a battle in their favor.
This is the story of revolutionary communications and cryptologic secrets and the role they played in America’s war for independence.