Talk:ADFGVX cipher

Spring Offensive
I think we need to rewrite the significance of Painvin's contribution to defeating the Spring Offensive, after carefully researching it. To claim, as here, that Painvin and the French were solely responsible for defeating it is quite false as the first major campaign of the offensive had already been defeated (largely by Commonwealth troops, not French) by 25th March 1918, before Painvin had even broken the cipher; the second campaign failed mainly for logistical reasons; and the third was actually quite successful up until its final battle. Painvin's solution was probably most effective at the Second Battle of the Marne (the final, closing battle of the Spring Offensive; see also Spring Offensive), where the French repeatedly had excellent intelligence &mdash; usually represented as coming from prisoners! However I am merely speculating there and some research will be required.

It would also be useful if someone could find a date for the first occasion when Painvin produced a plain text, and when he produced them regularly. -- Securiger 23:17, 31 May 2006 (UTC)

ADFGX
I can suggest to add an "ADFGX cypher" link, whose redirect here ? because a good part of the article is about the earlier (and conceptually identical) adfgx cypher, I think the addition of a adfgx cypher redirect there will be useful, if not, for the sake of completeness ;) dott.Piergiorgio 00:13, 21 July 2006 (UTC)


 * Good idea. ADFGX cipher, and ADFGX created as redirects. (ADFGVX already existed.) -- Securiger 05:03, 21 July 2006 (UTC)
 * Thanks. dott.Piergiorgio 16:51, 22 July 2006 (UTC)

Columnar transposition
The article says "Next, the fractionated message is subject to a transposition similar to (but not quite the same as) the standard columnar." What is the difference? I'm not seeing it. --Doctorhook (talk) 23:32, 4 February 2010 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified 1 one external link on ADFGVX cipher. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20060428005221/http://www.intelligence-history.org:80/jih/reviews-2-2.html to http://www.intelligence-history.org/jih/reviews-2-2.html

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at ).

Cheers.— InternetArchiveBot  (Report bug) 02:12, 1 October 2016 (UTC)

Was the algorithm itself known by the French cryptanalyst?
Was the algorithm known and the cryptanalysis only had to find the proper keys? If yes: Did the Germans know that the French knew the algorithm and the security relies only on the keys? --RokerHRO (talk) 11:00, 23 May 2017 (UTC)

“Usually much longer keys or even phrases were used”
That doesn't make much sense to me. The letters in the key are sorted alphabetically but this is a problem when a letter is used more than once. So the phrase couldn't be longer than 36 symbols and had not to have duplicate letters? 1234qwer1234qwer4 (talk) 17:38, 4 April 2019 (UTC)