Tap Code

From Wikipedia, the free encyclopedia

The Tap Code is a code, commonly used by prisoners in jail to communicate with one another. The method of communicating is usually by "tapping" either the metal bars or the walls inside the cell, hence its name. It is a very simple code, not meant to avoid interception, since the messages are sent in cleartext.

It was reportedly invented in June 1965 by four POWs imprisoned in Hoa Lo, Vietnam: Captain Carlyle ("Smitty") Harris, Lieutenant Phillip Butler, Lieutenant Robert Peel and Lieutenant Commander Robert Shumaker. Harris remembered an Air Force instructor who had shown him a code based on a five-by-five alphabet matrix (a Polybius square), as shown on the graph below. Each letter was communicated by tapping two numbers: the first designated the row (horizontal) and the second designated the column (vertical). The letter "X" was used to break up sentences and the letter "C" replaced the letter "K".

The Tap Code is featured in Arthur Koestler's classic work, Darkness at Noon, which was published in 1941. The prisoners refer to it as the knock code, but the technique is still the same.

The Tap Code is outlined in the table below:

1 2 3 4 5
1 A B C D E
2 F G H I J
3 L M N O P
4 Q R S T U
5 V W X Y Z

For example, to specify the letter "A", you would tap roughly the following: . .

Or to communicate the word "WATER" the code would be the following (the time between each pair of numbers is smaller than the one between two different letters):

..... ..  . .  .... ....  . .....  .... ..
 (5,2)   (1,1)   (4,4)     (1,5)    (4,2)
   W       A       T         E        R

Because of the difficulty and length of time required for specifying a single letter, most prisoners devised abbreviations and acronyms for common items or phrases, such as "GN" for Good Night, or "GBU" for God Bless You.

[edit] See also

[edit] References


Classical cryptography
v  d  e
Ciphers: ADFGVX | Affine | Alberti | Atbash | Autokey | Bifid | Book | Caesar | Four-square | Hill | Keyword | Nihilist | Permutation | Pigpen | Playfair | Polyalphabetic | Polybius | Rail Fence | Reihenschieber | Reservehandverfahren | ROT13 | Running key | Scytale | Smithy code | Solitaire | Straddling checkerboard | Substitution | Tap Code | Transposition | Trifid | Two-square | VIC cipher | Vigenère
Cryptanalysis: Frequency analysis | Index of coincidence
Misc: Cryptogram | Bacon | Polybius square | Scytale | Straddling checkerboard | Tabula recta
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers