167:, a book cipher has a considerable advantage for a spy in enemy territory. A conventional codebook, if discovered by the local authorities, instantly incriminates the holder as a spy and gives the authorities the chance of deciphering the code and sending false messages impersonating the agent. On the other hand, a book, if chosen carefully to fit with the spy's cover story, would seem entirely innocuous. The drawback to a book cipher is that both parties have to possess an identical copy of the key. The book must not be of the sort that would look out of place in the possession of those using it, and it must be of a type likely to contain any words required. Thus, a spy wishing to send information about troop movements and numbers of armaments would be unlikely to find a cookbook or romance novel useful keys.
20:
1623:
192:. In Scovell's method, a codeword would consist of a number (indicating the page of the dictionary), a letter (indicating the column on the page), and finally a number indicating which entry of the column was meant. However, this approach also has a disadvantage: because entries are arranged in alphabetical order, so are the code numbers. This can give strong hints to the
80:
This simple version fails if the message uses a word that does not appear in the text. A variant that avoids this problem works with individual letters rather than words. Namely each letter of the plaintext message would be replaced by a number that specifies where that letter occurs in the key book.
590:
attempt to use a book cipher. Their attempts are undone, however, when it is revealed that the novel in question is composed of two volumes, and Ĺ vejk has delivered the first volume to the officers, thinking that they intended to read the novel, rather than the second, which is used for the cipher.
162:
The main strength of a book cipher is the key. The sender and receiver of encoded messages can agree to use any book or other publication available to both of them as the key to their cipher. Someone intercepting the message and attempting to decode it, unless they are a skilled cryptographer (see
233:
to guess other codewords, or even to break the code completely by identifying the key text. This is, however, not the only way a book cipher may be broken. It is still susceptible to other methods of cryptanalysis, and as such is quite easily broken, even without sophisticated means, without the
516:(episodes "Where There's Smoke" and "Center of the Storm", 2010): Michael Westen steals a Bible from a safe deposit box that is the code book of Simon. This becomes part of the season plot to track an organization starting wars for profit as Michael tries to arrange an interview with Simon.
694:, two brothers use a book cipher. Luther determines they must be using a book that is readily available in case the book is lost and/or so the users can always have it to hand. This leads him to discovering the book cipher is using Gideon's Bible.
212:
is a widely available book that is almost always printed with chapter and verse markings making it easy to find a specific string of text within it, making it particularly useful for this purpose; the widespread availability of
50:
A simple version of such a cipher would use a specific book as the key, and would replace each word of the plaintext by a number that gives the position where that word occurs in that book. For example, if the chosen key is
237:
If used carefully, the cipher version is probably much stronger, because it acts as a homophonic cipher with an extremely large number of equivalents. However, this is at the cost of a very large ciphertext expansion.
200:. The wide distribution and availability of dictionaries also present a problem; it is likely that anyone trying to break such a code is also in possession of the dictionary which can be used to read the message.
180:
Another approach is to use a dictionary as the codebook. This guarantees that nearly all words will be found, and also makes it much easier to find a word when encoding. This approach was used by
820:
229:
has been eliminated by using an existing text. However this means, as well as being attacked by all the usual means employed against other codes or ciphers, partial solutions may help the
642:, who is investigating the case, and the message, "Save yourself. Kill them all", with the intent of having Will and his family fall victim to the killer. In the 1986 film adaptation
146:
created for the purpose: a simple dictionary-like listing of all the words that might be needed to form a message, each with the respective code number(s). This version is called a
384:. The Germans break the code, coming near to catching Wimsey and Bunter. Wimsey then improvises a new code, based on an unpublished text known only to himself and his wife.
1603:
1433:
810:
860:
498:
by the UNSUB via Agent
Hotchner's wife. The cypher was part of a larger puzzle to find a girl who had been missing for two years. The key text was
1286:
225:
Essentially, the code version of a "book cipher" is just like any other code, but one in which the trouble of preparing and distributing the
85:
book as the key, the message "no ammo" could be encoded as "12 10 / 50 31 59 34" since the words with those positions in the novel are "
665:
by J D Welch, Jess uses a
Shakespearean speech to construct a book cipher to communicate with an enemy who may or may not be an ally.
437:
252:
185:
485:
released in 2007, a book cipher was used on each puzzle's box to hide spoilers and reveal information about the show to the fans.
316:
finds that a prisoner is communicating with his confederate using a double book cipher. Since the prisoner has only one book,
746:
853:
538:
276:
537:
smugglers to communicate with their agents and with each other through graffiti messages. He eventually finds it: the
19:
1279:
787:
1076:
417:
1066:
846:
668:
In
Bitterblue by Kristin Cashore, Bitterblue uses a book(?) code to unlock secrets of her father's reign as king.
380:, on assignment for British Intelligence in World War II Nazi-occupied Europe, uses a code based on the works of
136:
1071:
163:
Security below), must somehow identify the key from a huge number of possibilities available. In the context of
1482:
303:, a television series, the resistance movement uses a book cipher to communicate between members of the cells.
596:
1272:
197:
1598:
1553:
1366:
1086:
1651:
1477:
77:", etc. This method requires that the sender and receiver use the exact same edition of the key book.
772:
319:
1593:
591:
Furthermore, the key to the cipher is identical to an example given in a published military textbook.
142:
Both methods, as described, are quite laborious. Therefore, in practice, the key has usually been a
578:
336:
decrypts a message enciphered with a book cipher by deducing which book had been used as a key text.
1583:
1573:
1428:
560:
495:
432:
392:
1578:
1568:
1371:
1331:
1324:
1314:
1309:
639:
1319:
655:
651:
402:
372:
1626:
1472:
1418:
1197:
888:
476:
467:
453:
397:
57:
1122:
1588:
1512:
1228:
1132:
1058:
525:
8:
1351:
1247:
1242:
1156:
990:
815:
546:
534:
259:
147:
132:
621:, the protagonist Magnus Pym uses a book cipher based on the German text Simplicissimus.
1457:
1441:
1388:
1223:
1142:
1048:
980:
752:
704:
690:
626:
601:
345:
328:
299:
271:
44:
24:
911:
608:, a book cipher conceals one character's family history and its relationship with the
457:
used a book cipher to send confidential messages to each other. The key text was the
1517:
1507:
1378:
1192:
1112:
1081:
975:
906:
783:
742:
635:
609:
408:
377:
358:
214:
756:
583:
1452:
869:
779:
734:
643:
520:
1013:
970:
939:
921:
631:
530:
363:
333:
263:
436:, a book cipher (called an "Ottendorf cipher") is discovered on the back of the
1656:
1527:
1447:
1408:
1356:
1341:
1232:
1127:
1008:
901:
896:
673:
490:
448:
441:
313:
308:
189:
181:
1645:
1608:
1563:
1522:
1502:
1398:
1361:
1336:
1184:
1038:
1018:
998:
949:
929:
681:
handlers use a book cipher to communicate with him while he is undercover in
617:
565:
500:
482:
387:
267:
248:
230:
193:
128:
1558:
1403:
1393:
1383:
1346:
1295:
1117:
1028:
934:
738:
682:
458:
151:
43:
of a message is replaced by some code that locates it in another text, the
1537:
1202:
1169:
1033:
729:
Changda Wang; Shiguang Ju (2008). "Book Cipher with
Infinite Key Space".
678:
570:
512:
505:
340:
284:
52:
1497:
1467:
1462:
1423:
1236:
1218:
1023:
954:
605:
381:
1487:
1174:
646:, the book used is mentioned to be a list of statues in the state of
587:
164:
40:
563:", Jonas Blane (a.k.a. Snake Doctor) uses a book code from the poem
1532:
1492:
944:
731:
2008 International
Symposium on Information Science and Engineering
709:
647:
555:
226:
143:
550:(2011), Prof. Bressler's passwords are obscured by a book cipher.
423:
1413:
1137:
1003:
877:
350:
234:
cryptanalyst having any idea to what book the cipher is keyed.
36:
533:
searches for a book that is the key to a cipher being used by
27:, a highly available publication suitable for the book cipher.
1107:
1102:
1043:
354:
209:
811:"Cicada 3301 update: the baffling internet mystery is back"
415:
A book cipher plays an important role in the TV version of
251:, of which Document No. 2 uses (a variant printing of) the
654:, the book is changed to the French cooking encyclopedia
638:
killer, with the message containing the home address of
283:
Book ciphers have consistently been used throughout the
728:
150:, and was extensively used from the 15th century up to
1434:
Cryptographically secure pseudorandom number generator
170:
830:
771:
1643:
658:to fit in with that movie's depiction of Lecter.
471:forum to make the key text harder to identify.
1280:
854:
722:
634:uses a book code to encrypt a message to the
396:, several books are used, and an edition of
266:used a book cipher, sometimes known as the
1287:
1273:
868:
861:
847:
688:In the series 2 finale of the BBC TV show
131:. This variant is more properly called a
69:" — since the 335th word of the novel is "
488:"The Fisher King", a two-part episode of
390:'s protagonists often use book codes. In
253:United States Declaration of Independence
802:
494:, features a book cipher brought to the
247:A famous use of a book cipher is in the
18:
769:
573:, that he has arrived safely in Panama.
217:can ease the encoding process as well.
1644:
63:all plans failed, coming back tomorrow
1268:
842:
823:from the original on 8 January 2014.
323:, the solution is easily discovered.
39:in which each word or letter in the
277:Commentaries on the Laws of England
171:Using widely available publications
157:
13:
461:books, but the messages were sent
188:'s army in some campaigns of the
14:
1668:
1622:
1621:
1294:
808:
438:U.S. Declaration of Independence
16:Encryption and decryption method
203:
127:". This method was used in the
1483:Information-theoretic security
763:
1:
770:Yardley, Herbert O. (1981) .
715:
677:, protagonist Martin Rauch's
597:An Instance of the Fingerpost
421:. The key text is Voltaire's
291:
175:
569:to communicate to his wife,
81:For example, using the same
7:
1599:Message authentication code
1554:Cryptographic hash function
1367:Cryptographic hash function
698:
241:
220:
10:
1673:
1478:Harvest now, decrypt later
774:The American Black Chamber
586:, the officers in Ĺ vejk's
444:" letters as the key text.
67:335 219 881, 5600 853 9315
1617:
1594:Post-quantum cryptography
1546:
1302:
1264:
1211:
1183:
1155:
1095:
1057:
989:
963:
920:
887:
876:
838:
834:
650:. In the 2002 adaptation
343:'s World War II thriller
1584:Quantum key distribution
1574:Authenticated encryption
1429:Random number generation
496:Behavioral Analysis Unit
447:The protagonists of the
1579:Public-key cryptography
1569:Symmetric-key algorithm
1372:Key derivation function
1332:Cryptographic primitive
1325:Authentication protocol
1315:Outline of cryptography
1310:History of cryptography
479:: Mystery of the Island
367:as the basis of a code.
65:" could be encoded as "
1320:Cryptographic protocol
870:Classical cryptography
739:10.1109/ISISE.2008.273
656:Larousse Gastronomique
579:The Good Soldier Ĺ vejk
403:Tales from Shakespeare
373:A Presumption of Death
196:unless the message is
28:
1473:End-to-end encryption
1419:Cryptojacking malware
468:The Lord of the Rings
454:The Six Sacred Stones
312:, published in 1868,
58:The War of the Worlds
22:
1589:Quantum cryptography
1513:Trusted timestamping
1229:Index of coincidence
1133:Reservehandverfahren
523:" of the BBC series
1352:Cryptographic nonce
1248:Kasiski examination
1243:Information leakage
816:The Daily Telegraph
615:In John Le Carre's
481:, a series of four
260:American Revolution
133:substitution cipher
129:second Beale cipher
1458:Subliminal channel
1442:Pseudorandom noise
1389:Key (cryptography)
1224:Frequency analysis
1123:RasterschlĂĽssel 44
705:Running key cipher
602:historical mystery
346:The Key to Rebecca
329:The Valley of Fear
272:William Blackstone
186:Duke of Wellington
29:
1652:Classical ciphers
1639:
1638:
1635:
1634:
1518:Key-based routing
1508:Trapdoor function
1379:Digital signature
1260:
1259:
1256:
1255:
1151:
1150:
748:978-0-7695-3494-7
671:In the TV series
610:English Civil War
433:National Treasure
430:In the 2004 film
409:Our Man in Havana
378:Lord Peter Wimsey
359:Daphne du Maurier
270:, which used Sir
135:, specifically a
83:War of the Worlds
73:", the 219th is "
61:, the plaintext "
1664:
1625:
1624:
1453:Insecure channel
1289:
1282:
1275:
1266:
1265:
885:
884:
863:
856:
849:
840:
839:
836:
835:
832:
831:
825:
824:
806:
800:
799:
797:
796:
780:Ballantine Books
777:
767:
761:
760:
726:
521:The Blind Banker
519:In the episode "
393:The Human Factor
255:as the key text.
158:Choosing the key
25:King James Bible
1672:
1671:
1667:
1666:
1665:
1663:
1662:
1661:
1642:
1641:
1640:
1631:
1613:
1542:
1298:
1293:
1252:
1207:
1179:
1147:
1091:
1053:
985:
959:
922:Polybius square
916:
880:
872:
867:
829:
828:
807:
803:
794:
792:
790:
768:
764:
749:
733:. p. 456.
727:
723:
718:
701:
663:The Darwin Code
632:Hannibal Lecter
531:Sherlock Holmes
334:Sherlock Holmes
294:
264:Benedict Arnold
244:
223:
206:
198:superenciphered
178:
173:
160:
17:
12:
11:
5:
1670:
1660:
1659:
1654:
1637:
1636:
1633:
1632:
1630:
1629:
1618:
1615:
1614:
1612:
1611:
1606:
1604:Random numbers
1601:
1596:
1591:
1586:
1581:
1576:
1571:
1566:
1561:
1556:
1550:
1548:
1544:
1543:
1541:
1540:
1535:
1530:
1528:Garlic routing
1525:
1520:
1515:
1510:
1505:
1500:
1495:
1490:
1485:
1480:
1475:
1470:
1465:
1460:
1455:
1450:
1448:Secure channel
1445:
1439:
1438:
1437:
1426:
1421:
1416:
1411:
1409:Key stretching
1406:
1401:
1396:
1391:
1386:
1381:
1376:
1375:
1374:
1369:
1359:
1357:Cryptovirology
1354:
1349:
1344:
1342:Cryptocurrency
1339:
1334:
1329:
1328:
1327:
1317:
1312:
1306:
1304:
1300:
1299:
1292:
1291:
1284:
1277:
1269:
1262:
1261:
1258:
1257:
1254:
1253:
1251:
1250:
1245:
1240:
1226:
1221:
1215:
1213:
1209:
1208:
1206:
1205:
1200:
1195:
1189:
1187:
1181:
1180:
1178:
1177:
1172:
1167:
1161:
1159:
1153:
1152:
1149:
1148:
1146:
1145:
1140:
1135:
1130:
1128:Reihenschieber
1125:
1120:
1115:
1110:
1105:
1099:
1097:
1093:
1092:
1090:
1089:
1084:
1079:
1074:
1069:
1063:
1061:
1055:
1054:
1052:
1051:
1046:
1041:
1036:
1031:
1026:
1021:
1016:
1011:
1006:
1001:
995:
993:
987:
986:
984:
983:
978:
973:
967:
965:
961:
960:
958:
957:
952:
947:
942:
937:
932:
926:
924:
918:
917:
915:
914:
909:
904:
899:
893:
891:
889:Polyalphabetic
882:
874:
873:
866:
865:
858:
851:
843:
827:
826:
801:
788:
762:
747:
720:
719:
717:
714:
713:
712:
707:
700:
697:
696:
695:
686:
674:Deutschland 83
669:
666:
659:
622:
613:
592:
584:Jaroslav Hašek
574:
551:
542:
517:
509:
491:Criminal Minds
486:
483:jigsaw puzzles
472:
449:Matthew Reilly
445:
442:Silence Dogood
428:
418:Sharpe's Sword
413:
385:
368:
337:
324:
314:Monsieur Lecoq
309:Monsieur Lecoq
304:
293:
290:
289:
288:
281:
280:as a key text.
256:
243:
240:
222:
219:
205:
202:
190:Peninsular War
182:George Scovell
177:
174:
172:
169:
159:
156:
15:
9:
6:
4:
3:
2:
1669:
1658:
1655:
1653:
1650:
1649:
1647:
1628:
1620:
1619:
1616:
1610:
1609:Steganography
1607:
1605:
1602:
1600:
1597:
1595:
1592:
1590:
1587:
1585:
1582:
1580:
1577:
1575:
1572:
1570:
1567:
1565:
1564:Stream cipher
1562:
1560:
1557:
1555:
1552:
1551:
1549:
1545:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1523:Onion routing
1521:
1519:
1516:
1514:
1511:
1509:
1506:
1504:
1503:Shared secret
1501:
1499:
1496:
1494:
1491:
1489:
1486:
1484:
1481:
1479:
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1456:
1454:
1451:
1449:
1446:
1443:
1440:
1435:
1432:
1431:
1430:
1427:
1425:
1422:
1420:
1417:
1415:
1412:
1410:
1407:
1405:
1402:
1400:
1399:Key generator
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1377:
1373:
1370:
1368:
1365:
1364:
1363:
1362:Hash function
1360:
1358:
1355:
1353:
1350:
1348:
1345:
1343:
1340:
1338:
1337:Cryptanalysis
1335:
1333:
1330:
1326:
1323:
1322:
1321:
1318:
1316:
1313:
1311:
1308:
1307:
1305:
1301:
1297:
1290:
1285:
1283:
1278:
1276:
1271:
1270:
1267:
1263:
1249:
1246:
1244:
1241:
1238:
1234:
1230:
1227:
1225:
1222:
1220:
1217:
1216:
1214:
1212:Cryptanalysis
1210:
1204:
1201:
1199:
1196:
1194:
1191:
1190:
1188:
1186:
1185:Steganography
1182:
1176:
1173:
1171:
1168:
1166:
1163:
1162:
1160:
1158:
1154:
1144:
1141:
1139:
1136:
1134:
1131:
1129:
1126:
1124:
1121:
1119:
1116:
1114:
1111:
1109:
1106:
1104:
1101:
1100:
1098:
1094:
1088:
1085:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1064:
1062:
1060:
1059:Transposition
1056:
1050:
1047:
1045:
1042:
1040:
1037:
1035:
1032:
1030:
1027:
1025:
1022:
1020:
1017:
1015:
1012:
1010:
1007:
1005:
1002:
1000:
997:
996:
994:
992:
988:
982:
979:
977:
974:
972:
969:
968:
966:
962:
956:
953:
951:
948:
946:
943:
941:
938:
936:
933:
931:
928:
927:
925:
923:
919:
913:
910:
908:
905:
903:
900:
898:
895:
894:
892:
890:
886:
883:
879:
875:
871:
864:
859:
857:
852:
850:
845:
844:
841:
837:
833:
822:
818:
817:
812:
809:Bell, Chris.
805:
791:
789:0-345-29867-5
785:
781:
776:
775:
766:
758:
754:
750:
744:
740:
736:
732:
725:
721:
711:
708:
706:
703:
702:
693:
692:
687:
684:
680:
676:
675:
670:
667:
664:
660:
657:
653:
649:
645:
641:
637:
633:
629:
628:
623:
620:
619:
618:A Perfect Spy
614:
611:
607:
603:
599:
598:
593:
589:
585:
581:
580:
575:
572:
568:
567:
566:Paradise Lost
562:
561:Paradise Lost
558:
557:
552:
549:
548:
543:
540:
536:
532:
528:
527:
522:
518:
515:
514:
510:
507:
503:
502:
501:The Collector
497:
493:
492:
487:
484:
480:
478:
473:
470:
469:
464:
460:
456:
455:
450:
446:
443:
440:, using the "
439:
435:
434:
429:
426:
425:
420:
419:
414:
411:
410:
405:
404:
399:
395:
394:
389:
388:Graham Greene
386:
383:
379:
375:
374:
369:
366:
365:
360:
356:
352:
348:
347:
342:
338:
335:
331:
330:
325:
322:
321:
318:The songs of
315:
311:
310:
306:In the novel
305:
302:
301:
296:
295:
286:
282:
279:
278:
273:
269:
268:Arnold Cipher
265:
261:
257:
254:
250:
249:Beale ciphers
246:
245:
239:
235:
232:
228:
218:
216:
211:
201:
199:
195:
191:
187:
183:
168:
166:
155:
153:
149:
145:
140:
138:
134:
130:
126:
124:
119:
117:
112:
110:
105:
103:
98:
96:
91:
89:
84:
78:
76:
72:
68:
64:
60:
59:
54:
48:
46:
42:
38:
34:
26:
21:
1559:Block cipher
1404:Key schedule
1394:Key exchange
1384:Kleptography
1347:Cryptosystem
1296:Cryptography
1164:
1118:One-time pad
991:Substitution
814:
804:
793:. Retrieved
778:. New York:
773:
765:
730:
724:
689:
683:West Germany
672:
662:
625:
624:In the book
616:
595:
577:
564:
554:
545:
544:In the film
535:Chinese Tong
524:
511:
499:
489:
475:
466:
462:
459:Harry Potter
452:
431:
422:
416:
407:
401:
398:Charles Lamb
391:
371:
362:
349:refers to a
344:
339:The name of
327:
317:
307:
298:
275:
236:
231:cryptanalyst
224:
215:concordances
207:
204:Bible cipher
194:cryptanalyst
179:
161:
152:World War II
141:
122:
121:
115:
114:
108:
107:
101:
100:
94:
93:
87:
86:
82:
79:
74:
70:
66:
62:
56:
49:
32:
30:
1547:Mathematics
1538:Mix network
1170:Code talker
1049:Running key
981:Four-square
679:East German
640:Will Graham
636:Tooth Fairy
513:Burn Notice
506:John Fowles
406:is used in
341:Ken Follett
285:Cicada 3301
53:H. G. Wells
33:book cipher
1646:Categories
1498:Ciphertext
1468:Decryption
1463:Encryption
1424:Ransomware
1219:Cryptogram
1113:Kama Sutra
1082:Rail fence
1077:Myszkowski
1024:Chaocipher
976:Two-square
955:VIC cipher
907:Trithemius
795:2023-02-13
716:References
652:Red Dragon
627:Red Dragon
606:Iain Pears
539:London A-Z
382:John Donne
351:German spy
292:In fiction
176:Dictionary
137:homophonic
1488:Plaintext
1143:Solitaire
881:by family
644:Manhunter
588:battalion
559:episode "
361:'s novel
165:espionage
90:ineteenth
55:'s novel
41:plaintext
1627:Category
1533:Kademlia
1493:Codetext
1436:(CSPRNG)
1231:(Units:
1067:Columnar
1014:Beaufort
971:Playfair
945:Tap code
940:Nihilist
912:Vigenère
821:Archived
757:15768123
710:Codebook
699:See also
648:Maryland
556:The Unit
526:Sherlock
320:BĂ©ranger
287:mystery.
242:Examples
227:codebook
221:Security
184:for the
144:codebook
120:", and "
1303:General
1009:Autokey
897:Alberti
878:Ciphers
547:Unknown
424:Candide
364:Rebecca
258:In the
1414:Keygen
1198:Grille
1138:Slidex
1072:Double
1039:Pigpen
1019:Caesar
1004:Atbash
999:Affine
964:Square
950:Trifid
930:ADFGVX
902:Enigma
786:
755:
745:
691:Luther
451:novel
357:using
300:Colony
37:cipher
1657:Books
1444:(PRN)
1193:Bacon
1157:Codes
1108:DRYAD
1103:BATCO
1096:Other
1087:Route
1044:ROT13
1029:Great
935:Bifid
753:S2CID
571:Molly
355:Cairo
210:Bible
139:one.
111:ortal
104:lmost
99:", "
75:plans
35:is a
1235:and
1203:Null
1175:Poem
1165:Book
1034:Hill
784:ISBN
743:ISBN
600:, a
477:Lost
208:The
148:code
118:ight
113:", "
106:", "
92:", "
23:The
1237:Nat
1233:Ban
735:doi
661:In
604:by
594:In
582:by
576:In
553:In
504:by
474:In
463:via
400:'s
370:In
353:in
326:In
297:In
274:'s
71:all
45:key
1648::
819:.
813:.
782:.
751:.
741:.
630:,
529:,
465:a
376:,
332:,
262:,
154:.
125:wn
47:.
31:A
1288:e
1281:t
1274:v
1239:)
862:e
855:t
848:v
798:.
759:.
737::
685:.
612:.
541:.
508:.
427:.
412:.
123:o
116:m
109:m
102:a
97:f
95:o
88:n
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.