On the Optimization of Military Encryption

Just do not get the wrong militia involved.

Refer to the original manual for the instructions.

Select the insignia displayed on the module to go to their respective tables.

The first table for each insignia have words that are encrypted by ADFGX Cipher, and WITHOUT Columnar Transposition.

The second table shows counts for each of the letters, A, D, F, G, and X in that order when the encryption is applied.

On the References of Two Ciphers Used In Military Encryption

Columnar Transposition

Example: OVERPING, 4231

4231
OVER
PING

1: RG, 2: VI, 3: EN, 4: OP -> RGVIENOP

ADFGX Cipher

Example: DGFXDDAFADXGDAAXGE, Private rank

ADFGX
ADTHFR
DAGVNC
FLUXQI
GESBKW
XPYOMZ

DG -> N
FX -> I
DD -> G
AF -> H
AD -> T
XG -> M
DA -> A
AX -> R
GE -> E

Result: NIGHTMARE