Jump to content

Acme Commodity and Phrase Code

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Chicdat (talk | contribs) at 10:41, 28 July 2022 (Adding local short description: "Codebook published in 1923", overriding Wikidata description "book"). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Acme Commodity and Phrase Code
AuthorA. C. Meisenbach
SubjectCipher and telegraph codes
Publication date
1923
Publication placeUnited States
Pages902
OCLC1050563
LC ClassHE7676 .A2

Acme Commodity and Phrase Code is a codebook providing the general-purpose commercial telegraph code known as the Acme Code. It was published in 1923 by the Acme Code Company. The book provides a listing of condensed terms and codes used to shorten telegrams and save money. The book was extremely popular amongst businesses in the 1930s.[1] This code was one of the few telegram codes permitted by the Allied powers during the Second World War.[2]

Description

The Acme code consists of one hundred thousand five letter codes each intended to stand in for a phrase. It was designed to be tolerant of transposition errors; the author claims that "no transposition of any two adjoining letters will make another word in the book". However, as later discovered by J. Reeds, the code did not provide this level of error correction, containing at least eleven pairs of words differing only by the transposition of two letters.[3] Despite these errors, this code is a precursor to more modern error correction codes.[4]

References

  1. ^ Newton, David E. (1997). Encyclopedia of Cryptology. Santa Barbara California: Instructional Horizons, Inc. p. 4.
  2. ^ Kahn, David (1996). The Codebreakers. Simon and Schuster. p. 274. ISBN 978-0-684-83130-5.
  3. ^ Bellovin, Steven M. (27 July 2011). "Compression, Correction, Confidentiality, and Comprehension: A Look at Telegraph Codes" (PDF). Retrieved 17 November 2018.
  4. ^ Simmons, G.J. (May 1988). "A survey of information authentication". Proceedings of the IEEE. 76 (5): 603–620. doi:10.1109/5.4445.