Here is a list of accumulated evidence pertinent to the issue addressed here: 
  
A computer test provided
         strong statistical evidence that B1 and B3 were created with the same cipher and key. The distribution of cipher numbers in
         B1 and B3 suggests that B3 was enciphered first and B1 was enciphered second as a continuation of cipher B3.
    
In his letter of January 4th, Beale refers to the members in his party, saying "
         I thought, at first, to give you their names in this letter, but reflecting that someone may read the letter, and thus be
         enabled to impose upon you by personating some member of the party, [I] have decided the present plan is best." His short, yet, "to the point" letter of January 5th, with a description of the contents of Paper
         No. 3, was no doubt prompted as a consequence of actually preparing Paper No. 3 on that very day. 
   
Cipher B2 contains a mixture of cipher numbers that occur once (freq=1) and some that occur multiple
         times (freq>1). For the most part, the freq=1 cipher numbers are randomly distributed over the entire cipher. However,
         there is an unusually long run of 95 freq>1 cipher numbers that overlaps the words "number three herewith"
         in the deciphered text. This suggests that B1 might have been amended to include new words "number
         three herewith" and that the process involved replacing the letters in this phrase using cipher numbers
         already present in the cipher text. If so, then any freq=1 cipher number replaced by a cipher number associated with the
         new words would be or become a freq>1 cipher number. This could explain the unusually long run of 95
         freq>1 cipher numbers. 
   
A computer program was written to create 10,000 plain texts that simulate Beale's
         Papers No. 3 and No. 1. No. 1 was appended to the end of No. 3 and each plain text was enciphered with a homophonic cipher.
         Different types of homophonic ciphers were tried. In each case, a count was made of the number of repeated 2-grams
         (pairs of cipher numbers that repeat) in each cipher text. The number of repeats for all 10,000 cipher texts was plotted as
         a distribution. The number of repeated cipher text 2-grams in B3B1 (B1 appended to the end of B3) was also computed,
         and this number was compared with the plotted distribution for each trial in which 10,000 cipher texts were produced. In each
         case, the number of repeated 2-grams in B3B1 fell outside and below the distribution for the 10,000 cipher texts. In
         other words, there are too few 2-grams in B3B1 for these two ciphers to be the result of enciphering a plain text with a homophonic
         enciphering key. If the ciphers are real, it means that the plain text had to first undergo a step, e.g., an additional
         enciphering step, that caused the resulting intermediate text to have a somewhat "flattened" distribution,
         which would account for the paucity of repeated 2-grams in B3B1.
   
A computer simulation program
         was written to test the hypothesis that Beale's longest monotonically increasing letter string could be created using a process
         of double encipherment. The assumption was made that double encipherment was performed as part of the step
         of enciphering an intermediate text with a homophonic enciphering key to produce the final cipher text. The program succeeded
         in producing monotonically increasing letter strings of length 21 in roughly one in 22 attempts. It succeeded in producing
         monotonically increasing letter strings of length 21 and of the form A...P (similar to Beale's longest letter string ABCDEFGHIIJKLMMNOOPPP)
         or better, namely A...P or A...Q or A...R or A...S or A...T or A...U, in roughly one in 100 attempts. However, the results
         are disappointing and would have to be characterized as failure.
   
Double encipherment could be made to
         work if nulls could be employed. Nulls decode as blanks or "nothing." But as a computer test has shown
         that B1 and B3 were created with the same cipher and key, nulls won't work due to the fact that the cipher numbers are, in general, spread across both ciphers (B3 and B1). This means that cipher
         numbers in B1 denoting nulls would, in many cases, also occur in B3. This would reduce the effective length
         of the plain text representing Paper No. 3, which is already so short that any reduction to its length would seem to
         invalidate B3 as a credible cipher.
    
But, there is a way that the letter strings could have
         been created with double encipherment, although it is not double encipherment in the usual sense. The strings were created
         first, even before the homophonic enciphering key was created. Instead of starting with an initialized enciphering
         key and selecting cipher numbers that can be decoded as desired plain text letters using two different keys, cipher numbers are
         assigned to letters in the enciphering key that can be decoded to desired plain text letters using two different keys. In
         effect, this provides an extra degree of freedom that permits double encipherment to succeed. As more and more numbers are
         assigned to letters in the key, it is possible in some cases to perform double encipherment in the usual sense, i.e., selecting
         cipher numbers already assigned to letters in the enciphering key rather than assigning additional cipher numbers to
         letters in the enciphering key.