Beruflich Dokumente
Kultur Dokumente
OR
'TOGRA
OR
The
CIPHER-WRITING
BY
.
FI^EDWARD HULME,
\\\
F.L.S.,
F.S.A
AUTHOR OF " FAMILIAR WILD FLOWERS," " MYTHLAND," "NATURAL HISTORY LORE AND LEGEND," "THE BIRTH AND DEVELOPMENT OF "W AYSI DK ORNAMENT," SKETCHES," ETC
LONDON
CO.
LIMITED
E.C
CONTENTS
CHAPTER
Meaning
of
PAGE
Objections to its study Its legitimate use and value Historic examples of its employment Delight in the mysterious Many other
cryptography
conveying secret information Symbolism of The spoken word imprisoned and dispatched A matter not necessarily secret because one cannot Chinese understand it Egyptian hieroglyphics characters Indian mutiny Greek Ancient Biblical Sir Henry Sheshach of Jeremiah cryptogram Kawlinson thereon Statements for and against Julius Caesar's secret code The waxed tablet of Demaratus Difference between hidden and secret writing The shaven head a writing tablet Charlemagne and Alfred the Great as cryptographic experts Mediaeval authorities Trithemius the Benedictine
ways
of
action
"
Stegauographia
Dr. Dee
Dabbling in the black art " Batista Porta's book on " Natural Majick
"
Chemical methods by vitriol, Writing on glass or crystal Papal Inquisition Disappearing writing Messages wrapped round rollers Two methods A slave's back the writing surface Chemical methods of no great value ordinarily Disadvantages of use Action of light and heat Chloride of cobalt, sulphate of copper, etc.
Invisible writing
etc.
alum,
.11
CONTENTS
CHAPTER
II
PAGE
Ancient use of arbitrary symbols Tyronian abbreviations Early works on shorthand Excessive abbreviation of inscriptions on coins, etc. Telegram-English Mason-marks Eise of cipher-writing in England
Battle of History of the Rebellion and decaptured correspondence ISTaseby Royal ciphered Published by Parliament Weighted naval signal-codes Charles I. a great expert in crypto-
Clarendon's
"
"
graphy
Use
of iiulles or non-significants
Numeri-
Mediaeval inscription without vowels cal ciphers Ciphers of Queen Henrietta and Sir Ralph Verney
Great use of cipher at troublous periods of history The " Century of Inventions " of the Marquis of "Worcester Birth of the steam-engine Dedication His numerous suggesof his labours to the nation
tions
for
cryptograms
Principle modified to sliding strip Bead alphabet Heraldic representation of colours in black and white
The
" string
"
cipher
thusiast
His
essentials
Bacon a cryptographic ena good cipher His of a cipher His plan cumbrous
A
mark
.
Trithemian
ciphers
.
example. .
No real mystery
.
them
.61
CHAPTER
Is
III
The
art of
for the analysis of a cryptogram deciphering Oft recurring letters Great repetition of vowels Patient Papers on the subject in
Keys
1742
Yalue
Noughts knowledge Conrad's rules The letter E " and crosses cryptogram Its construction Ciphers from agony columns of Standard and Times Prying
busybodies
Alternate letters significant
Ciphers
of "
general
CONTENTS
based on divers shif tings of the letters Cryptogram " " Inventor in 1761 of Arithmetic!* in Cocker's
PAGE
supposed absolutely secret system His hopes and Illegal to publish Parliamentary debatesEvasion of the law Poe's use of cryptogram
fears thereon
Secret marks made by tramps and vagin story rants Shop ciphers for marking prices on goods Oryptogrsmmic trade advertisements Examples of
volving grill"
The "grill" cipher -The "reThe "slip-card" Forms of numeriThe " Mirabeau " Count Grousfield's cal cipher cipher Communication by use of a dictionary The
cipher construction
" NeAvark
"
two-word
.
"
cipher
Conclusion
.108
ILLUSTRATIONS
FIG.
1. 2.
TAGE
.46
48
WKONG RULER
.
.
3.
.48
.
4.
5.
49
50
6.
7.
.51
.
8.
9.
...
66
88
91 98
100
10.
11.
12.
13.
105
THE
THE
" "
"
CIPHER
:
124
126
14.
15.
"
KEY CHANGED
.
.154
16. 17.
THE
"
GRILLE
"
:
SENT OFF
158
18.
THE
"
REVOLTING GRILLE
9
FORM OF CIPHER
160
10
FIG.
ILLUSTRATIONS
PAGE
19.
TOTAL
OF OPENINGS
MADE
BY
REVOLUTION
OF
GRILLE
20. 21.
161
BY "REVOLVING GRILLE"
.
.
THE MESSAGE
163
165
174
.175
177
25. 26.
CLOCK-HANDS
"
CIPHER
.181
.
183
CHAPTER
Cleaning of cryptography imate use and value
ment Delight in the mysterious Many other ways of conveying secret information Symbolism of action The spoken word imprisoned and dispatched A matter not necessarily secret because one cannot understand it Egyptian hieroglyphics Chinese characters Indian mutiny Greek Ancient Biblical cryptogram. Sheshach of Jeremiah Sir Henry Rawlinson thereon Statements
for
tablet
and against Julius Caesar's secret code The waxed of Demaratus Difference between hidden and secret writing The shaven head a writing tablet Charlemagne and Alfred the Great as cryptographic
experts
dictine
Mediaeval
"
authorities
"
Dabbling in the black art Dr. Dee Batista Porta's book 011 "Natural Majick" Invisible writing Chemical methods by vitriol, alum, etc. Writing on glass or crystal Papal Inquisition Disappearing writing Messages wrapped round rollers Two methods A slave's back the writing surface Chemical methods of no great value ordinarily Disadvantages of use Action of light and heat Chloride
Steganographia
of cobalt, sulphate of copper, procure the materials.
etc.
Often impossible to
iHE word
first
Cryptography
is
derived from
signifying
that
which
is
concealed
12
CRYPTOGRAPHY
meaning
to write
is
secret
manner
of
any intelligence we
may
It
desire to communicate.
may
an
cryptography that
an art that
evil
may
adapted to
anything to
a
purpose,
and that
study
of
in
doing
facilitate its
we
are placing
ill-disposed.
weapon
is
in
the hands
the
This
equally to
many
of great value.
Astronomy may
in evil
stars
hands
them;
fortune-teller
may
be
derived
the
valuable
dye,
the
healing
it,
may
be perverted to supply
subtle
the arsenal
of
Moreover, even
we regard cryptography
as affording
means
OR CIPHER-WRITING
for clandestine or treasonable
it
13
communications,
sword,
is
clearly
a
its
double-edged
and a
knowledge of
may
the
be used to unmask
tangled
skein
deceit
and
to
unravel
the
of
traitor.
It is sufficiently evident,
flection,
on a moment's
re-
There are
when
it
is
be conducted
to a successful issue
if all
inception
had
and
common
way
In the same
national danger
if
foe,
and become
who
could
14
CRYPTOGRAPHY
of the reign
we
Royalist and
preserved
other
in
the
British
Museum and
abundantly
our
national
archives
this,
testify.
Previously to
in
the
stirring times of
of
of the
French
in-
Revolution,
fluence
when no man
safe
of
any mark or
was
we
find
an immense use of
at
its
deadly work, or
That which
is
secret
and mysterious,
calling
OR CIPHER-WRITING
the
15
human mind.
we have
Hence
scale
Hebrew
or figured prophets clothed in mystic language 1 in strange symbolic action, and at the other
its
such-like
reader.
This
love
of
the
mysterious,
this
work
to excel
is
cipher-writing
has
undoubtedly at
all
times possessed.
Secrecy of
take
communication
may
of
course
many
forms.
The
scarcely
perceptible
movement
finite
1
of the eye
may convey
a very de-
influence
This symbolism has always exercised a very marked Our readers will amongst Eastern peoples.
recall, as
an example, the sending of a bird, mouse, frog, and arrow by the Scythians to the Persians, as a gentle
hint to
by
flight,
them that unless they could escape as a bird could swim as frogs, or conceal themselves as
16
CRYPTOGRAPHY
may
The
means
of conveying a message.
significance of
flowers
may make
of
a bouquet
of the
spell out
feeling.
The
Romans had
thus
Watch-
waving
have
bells,
all
been utilized
to
is
but
all
these are
since
mentioned
present
but
dismiss
to
them,
our
purpose
deal
methods of communication
by means of writing.
so
are
possible
we cannot
forbear
a
in
quaint
suggestion
that
we encountered
an old
human
was
made
the
medium
to
of
transmis-
sage was
OR CIPHER-WRITING
17
was
carefully
and
securely
closed
at
he
had
to
the
message
This
was
the
receiver.
latter,
on obtaining possession
to
of the tube,
was careful
course
open
it
at the
end
last sealed, as of
it
was
of great import-
by inadvertence the wrong end were opened, the operator was warned that the message would come out in
If
inverted order.
idea
tions
On
would
lead to
the
result
deprecated.
plugged up
we
However,
this is a
mere
detail,
and a very
B
little
CRYPTOGRAPHY
was best
to
to open.
Baron Munchausen
hit
seems
have
quite
accidentally
upon
the
when
when
warmed room
A
just
to
matter
is
because
we
it.
or
fail
understand
truisms
when once
needs enun-
ciation nevertheless.
and
of
so
of
the
whole educated
caste
the
nation.
when
OR CIPHER-WRITING
19
could neither read nor write, the epistles that " quality," and written in passed between the
legible
enough characters
" scollerds "
for those
who were
sufficiently
to
scarcely
be considered
examples of
graphy.
tea-chest
was
that
they
might
convey
meaning.
The Cantonese or Anioy man who painted them was adding information, and had no
thought or intention of bewildering the outer
barbarian whose
Eugby, Harrow, or board
of the
it,
communication has
but the intention
it.
to
do with
If we,
to
keep
it
in
if
the family
into
it
one thing
but
we drop
is
in the room,
and
20
is
CR YP TO GRAPH Y
not quite convenient that the details of our
dis-
quite another.
If
an English
little
officer at
message
brother officer
in
or
silly
passed in hundreds
between British
officers
An
intercepted
message written
read
easily
in
enough
every camp
of
the
possessed
of
valuable
military
information;
them.
It has
ties
that
examples
of
cipher-
writing
may
Sheshach by Jeremiah.
He
is
who
uses
it,
OR CIPHER-WRITING
assures
21
us
is
meaningless in
itself, it is
the
Hebrew word
for
Babylon.
If a
prudent to
as Nodnol, those
of
who
detected the
transposition
the
letters
would have no
little
hesitation
accepting
the
Sheshach
authority
as
an
archaic
cryptogram.
One
might
we questioned
name
we
is
find,
"How
is
how
How
among
Babylon
!
become
"
an
astonishment
little
the nations
half
when
Sir
22
CRYPTOGRAPHY
authority, does not feel the accepted explanation so entirely satisfactory as to render
any
He
Abraham,
and
if
this be so the
transposition of letters
coincidence.
becomes
merely
remarkable
for
Sheshach then
capital,
stands
Ur,
the
ancient
modern
from
its
birth in lowly
Ur
of the Ohaldees to
the day
when he wrote
his
words of warning and reproof; but here again on going to the fountain head,
Babylon
we
find
the
whole
reference
to
be in the
tells
present tense.
of
what "might have been," and we certainly seem to need a firmer foundation than this
possibility.
The two
alternatives
before
us
are
equally perplexing.
so
Would any
one
writer
be
cautious
and
reticent
moment,
OR CIPHER WRITING
so plainly outspoken the
all
23
if
next,
his object
through was
?
prudent suppression
if
of
name
On
the two
names
as, for
it
refer to
two entirely
different places
is
not
the
most
extraordinary
coincidence
that
letters in the
name
them
one
order,
?
the
other has
them exactly
reversed
What
occurring?
It
was absolutely
as
is
we have
Bible
logists
and
of
commentators
as
the
earliest
example
we
may.
This
simple
reversal
of
the
alphabet,
24
CRYPTOGRAPHY
representing Z,
etc.,
is
far too
evident to
grammic
letters
is
value, as the
very
quickly perceived.
tells
The
his-
torian
in
Suetonius
forwarding
his
dispatches,
changed
places,
;
the
by four
making
this,
stand for A,
a
for
M, and
was
so on
still
but
the
though
trifle
better,
most
elementary work.
ring to
it,
Scaliger,
we
see, in refer-
styles it a
Polybius
collected
tells
together twenty
kinds of
in
secret writing,
some
of
Herodotus
a
mentions
of
that
one
Demaratus,
commander
the
forces,
and
then
had
them smoothly
coated
over
OR CIPHER-WRITING
25
them, and
this
who were
in
the
will
message stood
be
noted,
revealed.
But
secret
this,
it
was
a
scarcely
letter
writing,
any more
than
fastened
secret
down
in
an envelope to-day
process.
It
becomes
is
writing by the
when
the
wax
of
of
the
or
the covering
surface
the
all
secrecy.
Most
of
secret
communication
were of
this
nature.
to
shave a
it
and then
to write
upon
any
the
When
conceal
was
sufficiently
grown
to
the
matter, the
man was
it
with
whom
was desired
communicate,
off
fifty
miles
an hour
is
26
CRYPTOGRAPHY
at breakfast in
our newsthat
paper
the
details
of
the
insurrection
method
together
feeling
of
al-
too
and we
cannot
help
habit
when
nobody seemed
in
a hurry, the
any great
have found a
ing
it.
leisurely
way
of
dispatch-
Charlemagne kept up a private correspondence in cipher- writing, and the secret alphabet
may
still
be
We
also,
dur-
ing the
fifth
century,
find
Pharamond and
who
could either
OR CIPHER-WRITING
number.
a perfect
27
When we come
epidemic
to the
Middle Ages
Europe, and
ran round
it
cryptographia, or, as
polygraphia
or
steganographia,
en-
Those who
may
1560.
Should
this
not have
damped
their
ardour, they
may next
Trithemius,
Schottus,
Caspi,
Cardanus, Walchius,
Selenus,
Tridenci,
Niceron,
Dalgarno,
then,
writ-
Even
they so wish
of
it,
are open to
them the
ings
Eidel,
Soro,
Amman,
Breitkampt,
Conradus,
De
who do
not
knowledge out
of such dusty
is
the very
and
they,
these
present
28
CRYPTOGRAPHY
much enlightenment
as they need.
As many
had a
great knack of
into
profit
;
own
store, there
would be
in referring at
we
Trithemius,
old
writers,
the
first in
He
was
first
Abbot
really
Spanheim, and
treatise
his
was the
elaborate
on cryptogram-
mic writing.
The
first
Library
Its
title
is
of
characteristic
:
of books
that period.
"
Steganograpliia
hoc
est
avthore
OR CIPHER-WRITING
reverendissimo
et
29
clarissimo
ciro
Joanne
Tri-
Magistro perfectissimo."
curious
one,
somewhat
he
compiled
many
folios full of
the use of
and mundane
The
result
was
energy.
Unforof extra-
added a number
diurui
and
lie
spiritus nocturni,
the
result
being that
was accused
of dabbling in the
He was
He had
lavish
tune
to
incur
the
abuse of
Jerome
Cardan,
himself the
author of a system of
cryptography,
and
was
by him
relentlessly
who was
as a follower of divers
uncanny
arts that
were
30
CRYPTOGRAPHY
bring
supposed to
him
into
closer
relation
all
justi-
of
the
work
of
Trithemius.
He was
often
sent
abroad on
of
more or
by the Ministers
find
Antwerp on February
He was
of
so,
as
Antwerp
Monas
year
;
Hieroglyphica,
the following
but as
his
private
affairs
were
scarcely
sufficiently
good
reason
why
he should
be
he adds that he
is
much
1
for
staying
on,
he
one
|
"
:
Allready
have
purchased
boke,
1
for
wch
andum
In reference to this appeal of Dr. Dee, Cecil's memoris extant stating that the applicant's time beyond
the sea
had been
well spent.
OR CIPHER-WRITING
31
man hath
seeke
:
Whose use
is
therof
spred
:
not
unknowne
on
this
:
you Wise
is
wherof in
epistles,
and
in
sundry
other
mens bokes
commo-
meeter
or
X dayes
have
copyed oute
And now
man
a noble:
perceyve that I
(with
the
longer
pleasure
as
leave
my
prince)
to
him
at
my
hands he requireth.
Thys boke,
32
CRYPTOGRAPHY
now have
whole and
yt,
eyther as I
or hereafter shall
pleas you
have
yt, fully
p'fit (yf it
to accept
my
present)
I give
as the
most precyous
juell that I
have yet of
other
mens
travailes recovered.
is
"
The account
it,
to
have copied
it
by the courtesy
it,
of the noble-
man
possessing
to
him.
From
the
Dee puts on the book, it is evident that The book was was a manuscript copy.
forty-three
to
Cecil.
years
of
Dee
The
direct
gift
to
Cecil
we
in
al-
may
lowed
perhaps,
without
as
being
wanting
charity, regard
to
a gentle bribe to be
stay
vancement
OR CIPHER-WRITING
Batista
piled
five
33
Porta,
books
on
ciphers,
" Les
Notes
in
occultes
des
lettres"
year 1606, and he also " " " of his Bookes Natural devotes one of the
Strasbourg in
the
Majick"
The
edition before us as
we
write
that
is
dated 1658,
the
title
page stating
the
book was
"printed
by
Thomas
are
at
Young and
sold
at
in
Samuel
Three
Paul's
Speed, and
Pigeons,
to
be
the
St.
and
the
Angel
Churchyard."
are " set forth
them,
the
Natural
Sciences,"
and the
result
is
His first book deals strange medley indeed. " the Causes of Wonderful things,' a with
5
sufficiently
extensive
subject
in
itself
and
including
Other sec-
the
wonders of
the beautic
34
CRYPTOGRAPHY
etc.,
fjing of women,
cerns
last
itself
is
with
"invisible
5
His
find
book
we
promiscuous mass of
fit
matter
that
either
would not
in happily in
any
of the other
information
original
when
This
dealt
with
in
its
position.
chaotic
section
to
in-
how
to
make
it
how
distil
from the
how
to
to
make
grow
of themselves,
how
make an
at
in
instrument whereby
a
great
distance,
impostors,
and
much
of
more or
less
are handled
secret
marks,
which
they
vulgarly
call
OR CIPHER-WRITING
syfers
:
35
is
worthy of
a treatise by
Men
and
and
write to some
I shall set
man
that
knows the
invention.
:
plainly
but
these
things
must be
by growing
common amongst
respected/'
Our
much
and on
all his
labour.
fails
to
show
how
the
and
the
careful
36
CRYPTOGRAPHY
manuscript
themius remained in
years.
some
fifty
Porta's division of
at first
sight a
little
unless
visible
marks
carry
We
soon
find,
however, on reading
visible
what he means by
marks
the
that
are
enough
to
is
all
beholders
though
their
significance
unknown,
and
worthy of a
treatise to
themselves.
In the present
work he
deals
until
some
them
to
view.
He, in
:
fact,
begins his
first
chapter
ways
them
OR CIPHER-WRITING
fire,
37
or rub
them with
dust, or smeer
them
over."
His
It is to
first
recipe
is
a double-barrelled one.
if
be employed
"
letters
not seen
may
may
be hid."
to
This
briug about.
would be put
off
whom
to
was
really sent
first
remove the
visible writing,
and then
to
make
by the ap-
cedure
is
as
follows
it
dissolved, strain
clear
:
it
the water
grow
:
with that
are dry
liquor write
upon paper
when they
will write
CRYPTOGRAPHY
between the former
lines,
in the spaces
scribe
dein
at large.
Galls
:
and
need, wipe
it
was not
I
will
seen,
may
in
be made ap-
parent.
Now
As
show
what
liquors
letters to
be
:
in
:
water
filtre
let
them through a
that
else,
may make
send
it
make
letters
desire to have
:
concealed
to
them
and the
be seen."
The
materials,
:
may be
noted, are
an important point
to consider.
that
we may
dissolve
OR CIPHER-WRITING
alum in water and write with
and the
is it
39
upon linen
this writing
like,
declaring that
when
dry
it
will
be invisible.
render
it
visible, it
will suffice
soak the
sheet or
napkin in water.
it
The
fabric will
by the alum
message
will
which
litharge, citron-juice,
goat's
fat,
dients
figure,
up
his first
section,
"
On how
may
a writing dip'd in divers Liquors be read," by the assertion, " there are
arts, too tedious to relate,"
many such
and he
letters
how
may be made
of
visible
by the action
of heat.
sharp things,
their
you make
is
it
hot at the
discovered
:
fire,
acrimony
presently
for
40
CR YPTOGRAPH V
they were
ripe.
If
and
in
will
colour
tree,
they
would
when
to
sowbread a
show
divers
colours
by the
fire.
By
these
means Maids
There
:
is
also
Ammoniac
water,
this
powdred
white
and mingled
letters,
with
will
write
them
to the fire,
and they
shew black."
a
suggestion
for
making
until
communications
1
that
cannot
be
read
The
Pyrus torminalis, of a
OR CIPHER-WRITING
the
41
paper be burnt
upon
at
which
they
are
made.
fashion
:
He
"
arrives
this in
the following
white of an
Egg
:
and
stir it
well
Letters
fire,
and
will
The
This sounds
out in practice.
fact
We
that
dinary ink
to read
burnt,
we may
also
often
still
be able
on
its
writing,
but
we know
of
much
of the writing
is
is
may
break
it
in-
42
CRYPTOGRAPHY
gum
solution, tlie
milk of
The milk
of the fig
accessible as
we were
writ-
ing these
of its efficacy
we can
say
we
forthwith pro-
when
soot
over
its
is
surface.
also an
Our author
us that
" there
to write
upon Chrystal
ent no
man
will
dream
and the
letters
may
lie
hid therein.
Do
thus.
Dissolve
Gum
it it
Arabick in water, or
Gum
it
Tragacanth, that
is
may
will
be cleer
and when
well dissolved,
if
it
or upon a
Cup
or Glass, for
when
invisible.
No man
will
imagine
it,
of
wine
when he would
and the
letters
OR CIPHER-WRITING
will presently
43
be seen."
This also
we brought
upon a
glass
bottle
with
solution
of
gum-arabic.
The
writing
absolutely invisible.
On
we were
wiping this
off
at
At
the
same time
there seem to be practical difficulties ; one can " Would you hardly imagine a prisoner saying,
kindly oblige
me
handful of
events
straw
and a match
"
At
all
his
getting
them.
shown again
in Porta's in-
structions as to
how
of
secret messages
tells
may
be
sent
"
by means
eggs, for he
us that
Inquisition,
and no fraud
suspected
to
be in them."
44
CRYPTOGRAPHY
Hence prisoners might perchance receive eggs from their friends, and with them messages
from the outside world.
it is
However
this
may
be,
al-
One has
ways
going melancholy
or
mad
in dripping dungeons,
man
sitting
down
laid
egg with
it,
surprise.
Porta
is
also great
It
might at times be an
advantage
election, the
turncoat politicians, or
OR CIPHER-WRITING
there might of course be occasions
45
when some
up
in
laid
the
enemy for use at some moment, and when its production after
critical
all
as a
differ-
Ordinarily,
how-
the meaning of a
safer
it
many
and more
ways
of disposing of
than trust-
chemical
to
obliterate
its
secrets.
In
the
hearth, or in the
bustle
will
of
roaring
camp
fire,
expeditiously enough
fulfilled its
In
like spirit of
adverse criticism
this,
we would
"that invisible
visible
some time
shall
become
and
show themselves."
We
46
CRYPTOGRAPHY
juice of
write with
Citrons
or
Oranges on
this
on for twenty
the same
may
it
be done
It
indeed that
of days
to
number
a desideratum.
One
ordinarily desires
HHHHBHR
FIG.
1.
know
sees
at once
to
fit
make
if
desire to do so
mystery attaching
grave importance.
was an indication of
its
The two
" of letters
on divers
things
which,
though
OR CIPHER-WRITING
47
by
no great value.
One
on parchment, and
then put
when
it
will
will
be so twisted
will
be unreadable.
The harshit is
any attempt at
even
if it
forcible
out, so that
we
is
detect the
presence of a communication
able.
let
not get-atis
But
lay
"
if
in
it it
him
it
will
be dilated again
it
and
all
will
appear as
letters
did at
it
first,
that you
may
read the
upon
Archimedes
and
mentioned by
TVo
equal
48
plied,
CRYPTOGRAPHY
one being held by the one correspondent
other.
long thin
spirally
paper must
now be wrapped
FIG.
2.
round one
length, and
of each letter
LAI
LU
3.
IVIL
iUUIM
FIG.
comes on each
tion
is
side,
written.
The paper
to
then unrolled
and forwarded
stick,
the
and
he,
on rolling the
around
this,
OR CIPHER-WRITING
is
49
The theory
notice
of
that no
these
the
experiment
we found no
difficulty,
without
we had
is
previously written.
seen,
and that
If
is
quite
as
a clue.
any
of
our
readers like
selves,
them-
they place a
any
of the lines of
FIG.
4.
this printed
letter is
its
"
Expect me
shows the
spirally
wrapped D
50
strip
its
CR YPTOGRAPI1Y
of
edges.
when
unrolled from
the
;
pencil
while Fig. 2
if
wrapping
it
round a
ruler.
Fig. 3 has a
FIG.
5.
anyway
whose
but
if
into
hands
strip
came would
and
place, as
in
Fig.
4,
the
is
the message
once
as
legible
as
any
orthodox
rewinding
round
pencil
could
make
it.
OR CIPHER-WRITING
51
A
write
very
much
better
way
of workis
paper
method
not
to
message,
right
along
the
edges,
but
across the
strips
strip
\\\>
,
themselves.
of
<3\
we wrote
another
will not
<V\\
,
as
upon same
it
^
.v
roller the
size, or
you
The appearance
staff
of our message-bearing
may
looked
be
seen in
Fig.
5,
while
Vj
'
Fig. 6
as
it
shows
for sending
It will at
our correspondent.
once be seen
is
how
far
more
puzzling this
in Fig. 3.
Some
of
the
material
we
find
in
p
s
sidered to
of
^
^
"invisible
since
the methods
he adopts
are
akin to
52
CRYPTOGRAPHY
in
an envelope that
in-
we have already cited. He tells, for stance, how a communication was once
within a
loaf,
sent
and
in
another case
;
in
the
interior of
a dead hare
how
others,
again,
how
pigeons
may
be used as messengers,
into
or intelligence shot
or guns.
this
camp
or fortress
by arrows
of
He
of
quotes
numerous
instances
;
sort
from Theophras-
and others.
He
with
that
to
the
slave
shaven
it
head,
but
he
also
recognises
that an
may
oftentimes be
desirable
is
being thus
1 great use was made of pigeons as messengers daring the Franco-German war, and the pigeon-loft of to-day is as much an item of war strength as a Maxim gun.
OR CIPHER-WRITING
employed.
possibly
53
Had he
to
this
knowledge, he might
desert
the
enemy, or
be
filled
with such exaltation of spirit at the importance of his mission as to betray himself and
awaken
of the
suspicion.
If
he
fell into
the hands
fair
promises, or
his mission of
it,
;
by
threats, to
reveal
whereas,
if
he were unconscious
his
and he would
pass on his
way
unchal-
He
was,
therefore,
given no letter
to
conceal; nothing
was handed
awaken
his
him
to
;
suspicions
under the
influence
of
an
opiate,
his
own
inscribe
the
message
re-
quired to be transmitted.
ferred to
This method
is re-
by Porta, but
it
ancient history,
to
it.
54
CRYPTOGRAPHY
Speaking
in
a general
way, but
at
the
same time
periment,
as the
outcome
of considerable ex-
we should be
the various
and
many
until developed
by the action
of
of
light,
or of
heat, or
tion,
another soluvalue
;
are of no great
practical
while
common
enough,
may
not
of
always
be
forthcoming.
The commander
hostile land,
an advanced post in a
desirous
of
who was
communi-
sand
miles
of
from
cobalt,
the
for
nearest
place
where
pro-
chloride
curable.
example,
was
A
of
great practical
such materials
is that,
very
difficult to see
what one
dries,
is
writing;
it
as
very
OR CIPHER-WRITING
55
memory
all.
as to
what was
really put
down
Such a message,
easily
too,
on
its
receipt,
might
any
special
solicitude
for
preservation
suspicion.
would
at once excite
comment and
Any
person
who
entertained
such suspicion
secret
message
visible,
and
on
its
application
the
forth
revealed to
quite
whom
it
was intended.
of these simple preparations
;
Some few
we
in
may
refer to
as
those
who
are
curious
the
for
themselves.
careful
to
Any one
use
doing
should
be
as
a clean
quill
pen;
and
56
CRYPTOGRAPHY
little
some
discretion.
Any
who
leaves
a clear,
colourless
teacup
or
kitchen or dining-room
called
may very
possibly be
to explain; while
devoted to this
As
familiar
example
of
the
chemicals
affected
silver.
tion of this
would remain
to
time
as
exposed
daylight.
On
this
ex-
chocolate-brown,
and, once
made
visible,
re-
mains
so.
The writing
artificial light;
should, of course, be
done by
satis-
factory
mixture.
in
instead
of
placing the
it
paper
vessel
the
daylight
we hold
of
over
containing
sulphate
ammonia the
OR CIPHER-WRITING
57
If
it
we make
will
colour
fluid
it
so slight
there
is
anything to
a
be
seen.
On warming
fire
the
paper before
good strong
as
the
paper
so.
cools,
a matter
some
five
minutes or
The
be
we
warming
the communication
in
a clear
and beautiful
blue colour.
Equal parts
of sulphate of copper
and
sal-
ammoniac dissolved
of
a beautiful
at
all
turquoise-blue
strongly,
dries
This,
if
applied
on the paper
too
of a pale
greenish
colour,
a tint
weak
58
to
CRYPTOGRAPHY
be
legible,
though not
scrutiny.
too
weak
to
be
the
noticeable on a
On warming
made by
this
of
disappears.
The
juice
effect,
by means
afterwards
colour.
If
of
it
being at
legible
invisible,
but
clearly
and of
a yellow
we wish
to
will
is
set up,
and
The
solution
to
should be
cool,
and
is
Anything written
by
this
agency
is
in
theory supposed to be
at the fire brings
warming
OR CIPHER-WRITING
it
59
though
at first invisible,
became on
On
might escape
it.
tiny reveals
The
that
if
we
the
white
of
characters,
heat,
though
it,
on the
a
clear
application
develops
;
into
if
and excellently
legible black
while
we
use
when
application
of
warmth.
is
hardly
absolute invisibility
is
our obthis
is
and
of
worth anything.
Many
other
chemical methods
might
all
be
does not
60
CRYPTOGRAPHY
Nothing but perany real
use.
of
One
when brought
experiment.
to
the
vital
test
of
actual
CHAPTER
II
Ancient use of arbitrary symbols Tyronian abbreviations Early works on shorthand Excessive abbreviation of
on coins, etc. Telegram-English MasonEise of cipher-writing in England Clarendon's " History of the Eebellion" Battle of Kaseby Eoyal correspondence captured and deciphered Published by Parliament Weighted naval signal-codes Charles I. a great expert in cryptography Use of nulles or noninscriptions
marks
Numerical ciphers Mediaeval inscription Ciphers of Queen Henrietta and Sir Kalph Yerney Great use of cipher at troublous periods of history The " Century of Inventions " of the Marquis of Worcester Birth of the steam-engine Dedication of his labours to the nation His numerous suggestions for cryptograms The "disk" cryptogram Principle
significants
without vowels
Bead alphabet
in black and
cipher
His essentials of a good cipher His highest perfection of a cipher His plan cumbrous and unsatisfactory A Trithemian example Elizabethan arbitrary mark
ciphers
No
real
mystery
in them.
METHOD
of representing
introduced by the
62
CR YP TO GRAPH Y
Maecenas, Cicero, Seneca
tlie
Philargirus,
Tyro,
and
many
other
writers
these marks.
of
By
these
They
are or-
dinarily
termed Tyronian.
Thousands of these
may be
Probus,
the
writings
of
Valerius
decipher
it.
only grew
was
The "Ars
Scribendi
is
character is,"
written
shorthand
extant,
while
English
OR CIPHER-WRITING
book
1588.
63
on
It
the
subject
did
and
entitled
or
the
Art
of
Short,
Swift,
and
Secret
is
Writing."
The
title.
notion of cryptography
If
present in this
of
man employs
it is
a system
abbreviated
it is
writing because
short or swift,
to
him
he adopts
it
because
it is
secret,
in.
A man
who
writes
in
known system of shorthand, or who adopts any of the modern telegraph code-books that
compress a long sentence into a single arbitrary
word,
;
is
if
no disciple of
he, like
cryptography
in his
therein
diary,
but
Pepys
famous
on the
affairs private,
shorthand
stands
on
quite
different
Such codes
one exposed,
all
Not only
risk
of
is
Pepys,
to
the
having
one's
64
CR YPTOGRAPH Y
is
also
the pro-
own knowledge, where a man kept his business and family memoranda by a shortour
result
little
doubt
that
to
the family
from want of
clue to
of
An
ancient
form
writing
employed
amongst the Romans was the excessive abbreviation of wxxrds in inscriptions on statues,
coins,
and
so
forth;
secrecy.
Any
abundant
illustrations
Siglarium
Ro-
manum
"
of Gerrard.
In
fact,
Fid. Def. on
our present
money
with a good example of the curtailment necessary where one desires to get a good deal of
OR CIPHER- WRITING
material in a very circumscribed space.
better
of
65
still
in
the
coinage
George
where
we may
as
find
such
:
concentrated
information
the
following
of
we
Mag nee
Sacri
Britan-
Francice
et
Brunnovici
Lunebergi Dux,
et
Eomani
Imperil Archithesanrarius
Elector."
We may
say
parenthetically
that
in
all
cryptogrammic
communications the
message
consistent
with
intelligibility.
One
style
purpose
the
telegram- English.
less
It
makes
less
labour
and
sender,
ceiver,
and
This
last, as
we
shall
66 see
CRYPTOGRAPHY
when we come
presently to consider the
is
FIG.
7.
On
old
buildings
called
we may sometimes
that
see
what are
stones.
It
has
suggested
these
had
originally
symbolic
meaning
known
OR CIPHER-WRITING
67
freemasonry.
Some
authorities
tell
us that
race,
old as the
human
they
probably
is
had
lost,
in
early
times
meaning that
now
an
essential
rule
for
their
formation
least
was
one angle.
We
of these
buildings.
There
at
is
all
of
them contain
prosaic ex-
least
The more
is
planation of these
to
marks
the pay-
Each mason
The
enthusiasts
cult claim
who
see in these
68
CRYPTOGRAPHY
may
be found even on
the Pyra-
mids;
point
only indicates
was
as neces-
workmanship
cathedrals
we
think, at all
a paragraph
at
and an
posal.
illustration in
the
space
our
dis-
pearance in
of
Queen Elizabeth.
but
it
was scarcely
we
find
it
really
Many examples
of the
it.
Charles
we
find
an immense use of
OR CIPHER-WRITING
Amidst the
the
historical
69
documents preserved in
to light
House
of Lords,
and brought
by the
is
the
a correspondence
which Dr. John Wallis, a distinguished mathematician of those days, analysed and
ally
fin-
deciphered, and
which
ultimately
cost
the defeated
monarch
his head.
"
(Book IX.
vol.
ii.
p.
508)
we read
to quit
all
the
field,
and
to leave Fairfax
master of
was
his
own
1
cabinet,
where
his
most secret
letters were,
and
letters
One scarcely sees how, in the turmoil of battle and the sudden realization of defeat, an incident so untoward
1
On
always kept in a leaden case, perforated with so that when surrender is imperative the whole
is dropped overboard, that it may not fall into the hands of the enemy. Even this, however, owing to the
thing
officer,
70
CRYPTOGRAPHY
of
and him,
was
agreable to their
in
that
so
much
them
as they thought
would
asperse either of their Majesties, and improve the prejudice they had raised up against
them
have
particulars with
The
battle
14th,
1645.
On June
Commons
and
It
was
to the
Kingdoms,
" to the
man may lose his head, though to outward appearance without a scar), is not always an efficient safeguard. Within a mile of Charing Cross, in the Royal
heat of action a
United Service Museum, may be seen the weighted signal code of the United States ship Chesapeake, captured on
board that vessel by the British ship Shannon,
OR CIPHER-WRITING
intent that they
into Scotland
71
may
to
and
the
said
letters
and papers
be put in
such as
desire
it
may
peruse the
ori-
ginals."
Some
receipt
sixty letters
were captured,
had been already deciphered by the King or Queen, and the translation
Many on
the
war
some
cele-.
them
His
brat.ed letter
in
but
his
favourite idea
was
the
Naseby
letters
were
"
good many
"
dummy
in addition to those
Such dum-
72
CRYPTOGRAPHY
are unauthorized to read the letters off
is
who
very
common
are
as a cryptographic expedient.
They
known
and we
shall
Various
that
is
are
likely to
frequently recur.
of
This
clearly
a great saving
time,
as
Oxford
in full a couple
all
of
numbers
will
at once express
we want, and
is
of course
the
same principle
applied
as
to
such conregiment,
are
stantly
wanted words
and the
artillery,
provisions,
of
like.
Where words
non-betrayal
;
more immaterial
are
and
chathus,
to the
racter, they
for instance,
we
Queen writing
Capell
King
voir
as
follows
" Mr.
nous
a fait
que cy 27
23
52 33
62
28
31
45 9
8
6G
que
4
ce
48 31 34 8
10
27
50 28
35
23
47
16
50
17
3 c*t tout 33
50
OR CIPHER-WRITING
73
5-62
cest
pour
qiioy
si
66
4 46 189 18
40
11
."
69-2-70
In one
intantion de donner 62
letter of the
sorely troubled
Queen
matters
suis
have
so
harassed
tourmantee
"
que
de
je
extremcment
fait
du mal
en
syfre
l
teete
qui
que
je
mesteray
fait
inoy
jovois
mesme"
and
finishes
We
give
the commencement, and place over the sym" Theer bols their
significance
:
beeing hear
74
letter
CRYPTOGRAPHY
goes on in the
The
translafitfc
is
that
"260
thought
at his
to
speake to him to
for
to
1ST
solicit
KD
arriuall
to
dispatch of
6000
armes to be sent
to
to
imploy any
other
way 189
thinke good.
WM
be-
Englishe Catholiques in
F haue
layed their
260 doth
therefore
desire
189 to aduertise
to be sent.
WM
189
of the place
may
to
write
WM
in
the
cipher
189
ment
be veiled in cipher.
The
publica-
by
the Parliamentarians
we
are told
at,
a mat-
wondered
and we can
189 and
care to
well
260,
imagine
that
KD
and
WM,
good
OR CIPHER- WRITING
It will
nofc
75
notice
of of
have
escaped
while
the
the
careful
in
reader that,
little
some
the
letters
the
extract
we have given
by the
same number,
31,
H,
is
represented by
39 or 40,
This
is
45 or 46, and
is
50 or 51.
frequently
a
little
is
resorted
patient
cryptography,
of
or
analysis
a communication
would
upon
it.
First a small
more would
E, for instance,
is
the
one
1
that
occurs
oftenest
will
mean
E. 1
carious old inscription over the decalogue in a country church runs as follows
:
PRSVRYPRFCTMNVRKPTHSPRCPTSTN.
meaning of this was not discovered for hundred years but if our readers will add to these letters a sufficient sprinkling of one more letter "E " " Perthey will have no difficulty in converting it into
It is said that the
t\vo
severe, ye perfect
men
76
CRYPTOGRAPHY
Double
is
common
final,
so
if
we
find
two
similar
symbols
recurring
at
ends of
words we
may
course
at
least
think them to be
LL.
Of
they
may
be
double
if
SS,
as-
another
common
for
termination; but
the
we
sume
then
them
time
being to be LL,
we may
little,
look
it
up ELL.
is
That means
events
very
but
at
all
some-
Then we think
well,
fell,
and
letter
to
our
store.
All this
course
it is
is
in
direction that
he
who would
decipher a
As another
pher
illustration
of
the
number
by
ci-
we may
instance
that
used
of
it
Sir
Kalph Verney.
An
example
may
be
Long Parliament,"
valuable
that
may
issued
be seen in the
reproductions
by the Camfollow-
den Society.
ing note
"
:
The
editor
makes the
OR CIPHER-WRITING
in
77
pencil
by the hand
of
Sir
Ralph Verney
ci-
look like
pher.
I
in-
add
the
genuity of some
reader
may
discover their
entirely non-
meaning."
As they
evidently
why he
If
should
called
them " an
attempt
to
" take
notes."
we
come
Museum
covered
scarcely
in-
with
arrow-head
regard
or,
forms,
it
we
may
legitimately
difference,
tion,
with
supercilious
at
best,
contemptuous
tolera-
as
the
quaint
attempt of
some
poor
nor
should
we
lament
from
our
his queer
A
to
in deciphering the
be
rough
notes
of
matters referred to
78
in
CRYPTOGRAPHY
Parliament.
Though
there
can
be
no
patent
against
Ralph,
writing
probably
many
in
distractions,
was not
employed,
entirely at
home
the
cipher he
cipher
his
used
by
Sir
:
Ralph Yerney
17
in
making
3
3
memoranda
5
"28
15
5
22
5
14
10
817 220
1514
7
15 17
17
15
15
8
85 176
to
20
18 18
1316 285
15."
letters
16
87
"
:
No
extracts of
An28
" 5
1512
16
27 10
10
5
-
17
710
28
is
17
16
noli
15
7,"
15
"
signifying
The
prince
come
to
Greenhich."
should
probably
in
now
or
not,
the difference
being
considerable^
OR CIPHER-WRITING
the
direct
79
affirmative
is
contrast
between
"
an
"
and
negative.
Come
"
to
in
the
was probably carelessness rather than craft. The ingenious and painstaking Mr. Cooper
presently
same
letter,
and that
the
Of course
and
so
is
not
in
1,
and
and C
3,
forth
regular
easy an
find
arrangement, so that
it
remains to
has
that
as
out
what
arbitrary
analysis
arrangement
it is
been made.
the letters
follows
:
On
are
found
represented
by numerals
10 =
16 = 1
17-0
12 = P
13-D
SO
CRYPTOGRAPHY
In
the
memoranda
find
that
have
come
to
light
we
no use of
24 or
26,
we
find
that by
use in
less-commonly emor
that
Q,
V,
we may
of
therefore
assume
four
the
missing
equivalents
For
facility
of
reading
anything already
given,
written,
the
table
we have
is
numbers
;
and then
if
letters,
the
most useful
but
we
desired to write
anything ourselves, a
table
is
having
first
letters
of
more
a good
service.
stiff
If
we want
Russian,
to
trans-
late
piece of
we
turn
to the
ary
but
we
desire
to
translate
our
own
English-Russian
portion of
our
a
book.
crypto-
In the same
way
the
sender of
gram
uses
"
ordinary letter-cryptogrammic,"
OR CIPHER* WRITING
while
the
receiver
8l
employs
to
translate
"
it
letter
table.
A=14
H=7
82
CRYPTOGRAPHY
17
8
felt
25
18
8,"
317
note
286
18
16
28
15
he
that
our
an intrusion,
in
also
shows
the
we
had
succeeded
mastering
We
also
find
great revival
of
crypto-
stormy period
flight
that
has
II.
its
of
James
and
III.,
when
in
of
plot
and
of
sought
safety
the
use
cryptograms.
of
The adherents
the
Mary Queen
of
Scots
and
followers
also
the
Pre-
tender were
in their use.
naturally
very
proficient
of
Worcester,
little
in
the
year
1633 a
book
This
the
"
Century of
greatly
Inventions."
nobleman was
pursuits,
addicted to
scientific
in
comunder
mand
Charles
to
of
I.
body
of
troops
He
of
afterwards
Charles
attached himself
II.
the
suite
in
exile
in
OR CIPHER-WRITING
France,
83
and
to
being
sent
over
by
him
to
London
put under
lock
at
and key
liberty
leisure
leisure
in
the
the
Tower.
Kestoration.
He was
His
set
at
enforced
in
for
the
Tower
gave
his
him
abundant
as
study,
at
is
while
so
position
man
plains
of
affairs
it
stormy
period ex-
how
hundred
inventions
of
mark
Suffice
to
it
book as a whole.
majority of
practical
his
say
that
the
inven-
tions
are of an
entirely
of
character,
to-
ind
the
germ
all its
the
steam engine of
day in
utility
pervading
is
to
be found
observations.
The
which
Tower was suddenly forced off by the pressure of the confined steam, and he drew
the
84
CRYPTOGRAPHY
this
from
the
suggestion
that
such a force
might be turned
to useful account.
in the
value
of
work
of
is
cation
cellent
his
book
to
the King's
most ex-
Majesty,
sensible
plus
on
the
principle
to
his
having he
more
:
than
"
one
string
bow,
writes
The
Treasures
and
Pleasure,
if
being
I say
it
:
seems a Vanity
since
Truth
no good Spring
is
drawn
is
weave
his
web
The
inforc'd.
shall be pleased to
make
of
my
Inventions
the
more Inventive
you
find
another,
ability.
my
And
as to
my
heartiness therein
there
needs
no addition, nor to
my
readi-
OR CIPHER-WRITING
ness
begin,
till
85
and
and
spur.
desist
Therefore
be
pleased
to
me
I flag in
my
Serve
my King
and Country.
Before
For certainly you'l find me breathless first t'expire my hands grow weary, or my legs do tire."
list is
No. 1 on his
some
shewing by
scrues,
all
by gages,
fastening or unfastening
Upon any
Accompts
of
these Seals
of Receipts
one Farthing to
an
By
but in English
may be
and
and
in English itself
different sense,
unknown
opened before
it
the
Enemy."
86
CRYPTOGRAPHY
No. 2
is
how
may
or
No. 3
trived,
"a Cypher
line,
Character so concir-
that one
without returns or
cumflexes, stands
for each
and every
of the
24
letters,
and as ready
the
other,"
to be
made
the
for one
letter
as
in
while
inventive
it
faculty
him, growing, as he
use.
declared
would,
refined
by
and
No. 4
is
"this
that
Invention
a
point
so
abbreviated
the
24
letters
to
be made with
will
two pens,
but
as
that
no time
the
be
lost,
one
finger riseth
other
may make
the
following letter,
never
clogging the
memory with
words
are
thus
and punctually,
letter, set
multiplied
points.
And
be
less
than a
point."
OR CIPHER-WRITING
hit
87
upon the idea of dipping his fingers in the ink and so making four or five points at
His once instead of being content with two. " a way by a Circular motion fifth invention is
either along
any
Alphabet,
that
the
self-same
Point
ad-
individually
ditional
placed,
without
the
least
mark
24
twice in
ten
sheets
yet
as
easily
if it
same
letter
constantly signified."
We
labours
were
of
first
the
them
ferring
to
in
an
always,
educational
work,
all
but
pre-
where
at
practicable,
it
go
to
the
original,
we
turned
up
in
the students'
Paranote
gives
at
the
British
Museum.
the
We
with
great
regret
that
author
88
CRYPTOGRAPHY
sketch
as
short
in
we
have
already
quoted
This
the case of
one or two of
his,
them.
fifth
invention of
FIG.
8.
is
was largely
Fig.
OR CIPHER-WRITING
8
is
89
circle
an
illustration.
Wo
draw a
on a
its
we
ABC
sequence of
We
and
in these
we
We
next
through
the centre,
one in a line
the
other.
The person
whom we
arrangement, an<J
as in
we arrange
shall
together that,
to
Fig.
8,
be
adjusted
out,
A.
true
We
then
spell
the
words
the
the
letters
being those of
90
CRYPTOGRAPHY
we
desire
then
by means
of this
diagram to
write the
as
word February, it would come out DZOXEJXT. The sender reads from the
while the re-
reads
the
characters
at
from inner
to
a glance
showing
him that
on.
if
is
really F, that
is
E, and so
;
This
may be
but
we want
med-
dler
who
same
give
etc.,
is
necessary
is
to
now
onlooker
is
at once
thrown
the scent.
Our
this
know
turn,
of
and give
his
card a similar
arranged.
It
but this
for
in-
may
by a
thus,
easily be
might,
stance,
KKQ
we
OK CIPHER- WRITING
shift
till
A
to
should be Q; and
we
in the course of a
page or two
then
to
change
again,
BBX
spin
Y
D
X became
A
new
equivalent of A.
and revolving
excellent one,
circles
its
is
a most
only drawback
little
B@
^
being that
difficult
it is
perhaps a
the
K^
N
'-
to
read
radiating
>
T
V
letters,
is
ab-
s~^
solutely straight
up the others
we
get at
to
one
that
is
absolutely
all,
upside-down.
ever,
After
howshould
X _~-*
-
little
practice
of
them a
K
F JG
.
who
feel
difficulty
Fig.
9.
92
CRYPTOGRAPHY
come
the
for
should
as
boon
"
and
blessing
is
where
changed
"
Ring- wise
"
arrangement
a
Rule."
the
that
along
that
We
must
ness
confess
of
ourselves
compact-
No.
more
than
compensates to
our
mind
for
possibilities
of being torn
other
less
papers.
We
than half
the part
AK,
To
of
we have shown,
bears to
AZ.
strip
make
this
ed in
it,
and opposite
are
to
these,
in of
at
regular the
al-
sequence,
phabet,
A
and
is
then
cut
strip
top
and
is
bottom,
narrower
it
of
card
inserted so that
will
slip,
up and down.
distances
apart
strip,
the
openings
the
on
the
of
broader
are
placed
letters
OR CIPHER-WRITING
the
93
When
a
the whole
;ting
found
place,
should
still
be so
first
what we want
is
not only a
surplus, so that
Of course
card
method
already
shown,
that
"head"
would be
XVRT,
the
narrow
slipped
upwards or downwards.
until
we
to
down
came opposite
no
longer be
A, then
but
''head"
would
XYRT,
BKDN.
clearly be
must be guarded
against.
opposite to
94
CRYPTOGRAPHY
suffice to
A will
To
now
to our
ingenious Marquis.
"Century"
all
to
there
;
may
and
42,
this
and Nos.
and 43 are
all
secret
all.
to be
being so arranged
and
grouped that
scarcely to be imagined
OR CIPHER-WRITING
would make these fancies workable
95
realities.
We
would end
in a
com-
castor
oil,
oil,
lavender water,
and as many
as
would
up an alphabet.
string,
One
of
his
methods
calls
by a knotted
and another he
a bracelet alphabet. a
new
tinder
52
we
find
him harping on
the old string again, if devising an alphabet by the " jangling the Bells of any parish church "
we
are in-
"
how
may
set
down
a whole
without knowing a
letter, or
when
96
CRYPTOGRAPHY
Marquis had the whole
field of
the
possible
ing out of so
many schemes
narrow
field of investigation.
The
we
take,
blue,
the alphabet, as
to
communication.
observation.
Receiver
and
sender
of lettering
this
by
and
if
at
any time
of
were
colours
discovered
re-arrangement
the
made
OR CIPHER-WRITING
in
97
By way
of a
:
start
we would suggest
and green
the
N"
following key
A = red
D= yellow and
black
= white and red O = green and white P = black and green Q = white and green R = white and black S = yellow and white
T== white and yellow
J= green
divide
words, or
they
may
be
If
inserted
mywliere as non-significants.
themselves
of
the
beads
initials
are
not
available,
;
the
if
the
thus,
we
can-
A
the
we can by EG.
for
As B
blue
is
already refor
quired
black,
must be T
it
turquoise.
Ignoring
T wherever
comes,
it
the letters
in pairs, as
98
CRYPTOGRAPHY
number
be
of
in-
misleaders,
may
troduced.
"Mind
see Cecil"
would therefore
read
ters into
sham words
to
to mislead
investigators
that
we chose
make.
marking
their colours
1
in
heraldic work.
Their message
the begin-
Should any of our readers not know these, they would them, as they come in very serviceably not only in finding from these signs the actual colours of arms engraved in illustrations, book plates, and the like, but they are also very useful as a shorthand
1
way
any purpose,
as, for
example,
OR CIPHER-WRITING
99
A
seen
curious
in
be
Fig.
of
Eacli
of
the
persons
desirous
of board
this
of
was
according to the
common
ular fashion, so
their appearance
all
made
somewhere
in the series.
and by
the
it,
top
of
strip,
place.
The
wood
or card-
On
person
our beads.
silver or
series of
dots, while
white are
Red
is
shown by a
black
is
upright lines and blue by horizontal ores, while in plaid by lines both
Green is indicated horizontally and vertically disposed. by inclined lines downwards from right to left.
100
CRYPTOGRAPHY
The
was
way
hands
of
it
the
receiver.
He, on
receipt,
wound
round
his counterpart
OR CIPHER-WRITING
but
t]ie
IOI
A we
in the alpha-
we marked
it
ACH, and
drawback
that,
this
no use to
of
us.
The only
is
to this
method
communication
unless
slip
FIRST
GJSTU,
to the
this
great bewilderment of
the
receiver
of
enigmatical message.
cryptology.
He
three
laid
down
the
law in
matters.
The
essentials
good
were
facility in
from
is
perhaps not
safety
is
from
whom
the com-
102
CRYPTOGRAPHY
A method
our
that
he himself devised,
introduced as
"a cypher
own which
everything."
sounds
most convincing
and awe-inspiring.
people will accept a
valuation he sets
man
pretty
much
at the
asks what
it
would be "very
As
and
a cipher
it
it
own
first
rule, since it is
by no means
letters
facile in use.
He
then
we
it
letters,
would
be
necessary to
It
is
if
use
far
two
too
hundred and
fifty.
;
therefore
slow in operation
even
would involve
OR CIPHER-WRITING
five
103
times
the
labour
of
ordinary writing.
five
is
as liable of
of decipher-
discovery, on the
same principles
Of course,
clue,
if
this
the task
difficult,
and
as follows
A=AAAAA
104
CRYPTOGRAPHY
on the same
following,
lines
as that of Bacon,
is
the
old
which
:
we
extract
from
an
encyclopedia
A=lllll
OR CIPHER-WRITING
only the second letter in each
all
105
word
"
counts, and
the rest
is
mere padding
abrach
Baldach abasar
abrai
disaria
lemai
clamech
misach
all,
athanas."
bibit,"
This, after
it
only signifies
" Abel
and
nine
them we
those
this,
we have represented
though
it
Fig.
12.
But
mys-
looks at
first
sight very
terious,
in
it
difficulty
106
CRYPTOGRAPHY
whether we
spell
It is really immaterial
cat
we have
learnt to call
to a point
lines
coming
and a horizontal
we have got used to as A), and a third symbol made up of an upright line and then a horizontal line across
its
we
are
accustomed to
that
call
T), or
whether we decide
instead
shall
shall be a
thing
made up
of
two
If
circles, like
a figure 8
turned sideways.
tain
we
form
is
we
and
its
shape
is
a matter that
is
absolutely
indifferent to us.
we know
it
would
it
is
as easy
to write
dog
in
Greek or German
Fig.
letters, or in
12, as in the
is
which
this
page before us
printed.
OR CIPHER-WRITING
107
Why
CRYPTOwe
GRAM
are not.
does
and
That
is
CHAPTER
Is
III
an undecipherable cryptogram possible P The art of deciphering Keys for the analysis of a cryptogram Ot't recurring letters Great repetition of vowels Patient
perseverance Papers 011 the subject in Gentleman's Magazine of 1742 Value of general knowledge Conrad's
rules
The
letter
Its construction
"
"
Prying busy bodies Alternate letters significant Ciphers based on divers shiftings of the " " Inletters Arithmetick Cryptogram in Cocker's in ventor 1761 of supposed absolutely secret system His hopes and fears thereon Illegal to publish Parliamentary debates Evasion of the law Poe's use of cryptogram in story Secret marks made by tramps and vagrants Shop ciphers for marking prices on goods Cryptoconstruction
grammic trade advertisements Examples of cipher The "grill" cipher The "revolving grill" The " slip-card Forms of numerical cipher The Communi"Mirabeau" Count Grousfield's cipher cation by use of a dictionary The "Newark" The " " The " two-word" cipher Conclusion. Clock-hands
? '
fTlHE
"*"
time
will
successfully
investigation
Some would
have
it
that as
all
CIPHER- H'RITIXG
of the ingenious cryptographist,
it
109
should not
of
be impossible
to
build
up a monument
all assault,
and certainly
itself to
this is
would
tell
man
could deyise
safe
man
to search out.
Howeyer
this
may
be,
settled,
we must bear
ordinary
in
to
the
man
is
hopeless
may
not proye so to
mination as that.
it
is
emphatically
makes
perfect."
There
immense
assistance
in
the
analysis
of a
10
0? YPTOGRAFHY
cryptogram.
There
are
special
conditions,
"
much more
"
freely
used
letter
in
In the
"
is
with
the
greatest
frequency.
is
The
easiest
cipher to translate
or
P may
all
through.
Where
be, are
munication,
and broken up
into
words.
A
diffi-
we have
already
may
be sometimes
written as J, at others as S, or
at once
M,
or X.
We
add greatly,
all
words are
rily
broken up.
Non- significants
it is
also
add
to
a good plan
OR CIPHER-WRITING
to cut out every
like
III
common words
that can at
all
be spared.
The English tongue abounds in monosyllables. Of course the letters that necessarily qccur most commonly are the vowels, and in words
of
two
is
letters,
such as am,
in, of,
or we, one of
them
necessarily a vowel.
is
commonest
but
it
also
been, seen,
EA
ease,
and
OU
monly go together,
and
be A, or
is
I,
or 0.
Of
all
English words
the
the
"and" runs
very closely.
If,
therefore,
we
in our mysterious
cryptogram
is
E, then
of three
word
letters
may
and
letters
112
of
occurrence
see,
feet,
tool,
shall,
well,
miss,
and
loss
are
illustrations.
A
as,
common
begins
two-letters, an,
of,
and
at,
and
so,
on,
or,
and
to.
or second letter
a vowel.
always has
after
I.
it.
No
on
English word
terminates with
It
is
may
is
There
disa-
no royal road
crimination
and unlimited
chieve success.
When
may now
or
certain
equivalents are
determined,
"We
any word
occur,
in
more
of
them
and then
just
dawns.
Very often
this
proceeding at once
if
so
we have
OR CIPHER-WRITh\G
tors
113
for
instance,
we have
are
A,
I,
words
down
them
and
it
presently begins to
dawn upon us
5 '
that the
fit
words "railway
AYe
If
station
would
this
just
in.
at
all
events
accept
tentatively.
we
are right
for
we have added
see
largely
to
our
store,
we now
that
F must
really be
will be
R,
T must
is
be L,
must be W,
be
0,
Y, J
1ST.
S,
E must
while
represents
ters
Our knowledge
the
of three letIf
we
>resently
of
letters
JQXTT, we remember
to be
we
know
station
really
A,
us
and
to
our
railway
that
it
guess
S,
has
led
is
believe
is
really
if
and T
L;
into
we
S
try
how
looks
we turn JQXTT
ALL.
shall, so
This
suggests to us small,
stall,
and
is
114
CRYPTOGRAPHY
either
or
we know
that the
word
is is
not
stall,
because
P.
T we
or
already
know
at
shown by
One
will
two endeavours
words
containing
shall read it as
Z, the
commonest
to be
symbol of
E, and
all,
PQZ THE, so Q
often
is
T'E
there
is
evidently
not M,
for
is
is
no word
THE,
but H.
JQXTT
failure,
therefore
SHALL.
what
it
it
might
be,
we
by step press
on.
.The
it
down a
wall finds
difficult to
a start, but
when he has
first
all
the
others
the
follow,
every
making
of
work
easier.
The
insertion
the
skill;
blow after
fall
blow of
then
the
swinging hammers
it,
swiftly
upon
and
each
tells,
OK CIPHER-WRITING
until presently the great block of
115
many
tons
in
weight
is
riven in twain.
9
In the Gentleman
1742
will
papers
s*
on
deciphering,
entitled
Cryptographia
David
Arnold
general
curiously
to
introduction
he
first
enough,
exposition
in
of
an
the
English
magazine,
an
German language,
pointof
ing
out
the
characteristic
recurrences
letters,
forth,
by
in
which
that
one
may
to
attack
cryptogram
language.
He
then
proceeds with
the
equal
thoroughness
then the
analyse
Dutch
language,
Italian,
Latin,
and Greek.
He
of
Attempt
to
explain
it
with
by
this
and
of
convinc-
116
CRYPTOGRAPHY
who
it.
There are to be
are
Men
to
of
assert
is
no Success
so
from Enquiries
doubtful and
pronounce no
positively that
the Inter-
if it
ever can
be attained,
is
The Art
of Deciphering
be exactly known.
it
difficult
its
may
may
be attained,
stood,
when
the Theory of
it
is
under-
The Usefulness
Correspondences
may
be detected cannot be
OR CIPHER-WRITING
denied, nor
is
ifc
17
Study of
it
that those
who
profess
it
are em-
War
particularly,
Study
supposed
of
Knowledge.
He must
be in the
first
Place
for each
Word.
He
and
particularly
Latin,
which
is
most
fre-
quently
made use
of in secret Writings;
and
Knowledge
for
of
Languages
is
more extensive;
the
Decipherer
is,
has to
in
which the
Writing
is
and by
this
Art are
to
each Language.
"It
is
likewise necessary to
understand at
least the
IlS
CRYPTOGRAPHY
may
be more easily
to
the
or
Explication
another.
Cryptography,
be understood, by which so
are
practiced,
so
many
Artifices
many
intricate
Alphabets
for Secrecy
formed, and so
many Expedients
the
produced as
to
requires
explain.
in
utmost Acuteness
the whole as
detect and
Upon
Learning
Man
advances
he
becomes
"By
Accuracy
of
Method and a
just
is
Deour
cer-
used
Truly
our
author
magnifies
it
his
subject!
He who would
who
Primate of
shine in
would be a man
or
might have
all
been
Solicitor- General
England had he
not
I
chosen
OR CIPHER-WRITING
119
Then the
rule
says
more Opportunities
Frequency,
remarking
of
the
Combination,
the
Letters."
One
would
have
man
what
old
need of
:
practically a repetition of
it
merely
matter
under
says
a
that
new name.
"
Another
are
proposition
The
Vowels
outnumbered by the Consonants, the Yowels must therefore recur most frefour times
quently."
as follows:
The
rule that
is
based on this
is
"The
Some
of
his
suggestions
are
very good,
Thus we are gravely told, if the writing be in Dutch any three-letter word must
all.
120
CRYPTOGRAPHY
bad, baf,
bak,
bal,
ban,
bas, bed,
bef, bek, bel, ben, bes, bid, bik, bil, bit, bly,
bos,
dat,
bot,
biy,
bnl,
bus,
des,
dag,
die,
dam, dan,
dik,
dis,
das,
dit,
dek,
den, der,
dol,
elf,
doe,
eer,
dog,
eet,
dop,
elk,
dor,
dun,
erf,
dur,
dyk,
een,
end,
hundred
through
and
eighty-two
till
more
right
away
the alphabet
we
of
pull
all
up
finally at zyn.
Whether
be at
all
this
list
three-letter
words
Dutch
he
roundly
in
declares
that
any
at
three-letter
all
word
that language
list
must,
of
events,
gives.
On
many
omis-
sions*
The
words, for
instance,
beginning
with
that
;
and men
but to these we
may
at once
add
OR CIPHER-WRITING
mop,
121
mow,
mud,
and
mug.
As we have
one
initial
letter
into
sixteen,
it
will
all
readily be seen
in-
his
grand
total
of
His formula to be of
therefore
of
use
should
be
extended
will
"Any
word
three
letters
be found to be
perchance,
it
may
many
words that
Be-
we have omitted
sides, in
any
If
it
letter
into
"
is
either one of
of
those a
list
three,
or,
of
other words,
the
help
given
is,
after
all,
not
of
great
122
CRYPTOGRAPHY
Setting up
as
value.
some
little
authority
to
on
the
matter
ourselves,
we may add
all
these rules of
to
have
overlooked
that
words
be-
ginning with
will
be found to be either
dreds of
other words
that
commence with
that letter.
The
letter
is
all
of
Statistical enthusi-
thousand
letters
in
of
prose, one
will in
hundred
English be
that
This
are
is
matter
our
readers,
who
once
statistic
and
the
enthusiastic,
can
them,
at
if,
check
from
page before
it
indeed,
we may assume
to fulfil
should
occur
times
one
hundred
a
and
eighty-four
thousand,
OR CIPHER-WRITING
123
in
much
larger
proportion
than
English
while the
very
eight
are
lish;
close,
per
Spanish
in this
and
Italian
respect as Eng-
sand
assigned
letter
to
Italian,
while
in
Spanish
occurs
one
hundred
all
and
forty-five
times.
Of
course,
these
numbers
are
necessarily
only
approximate.
The only
letters of
the former
coming out
in Italian
at about one
at
sand
letters
used
in
Italian
and
Spanish
An
old
fellow
we once
met,
and who
us that
I2 4
CRYPTOGRAPHY
of the
some
in of
"
"
agony-column
advertisements
perplexity
great
correspondents,
and
he
CL
OR CIPHER-WRITING
endeavour
to
125
our communication.
The form
of
cryptogram
we employed
is
we
on postcards,
in
etc.
Proschool-
their
days
have
"
played
to
noughts
and
crosses
"
down
zontal
and two
vertical
as
shown
in
13,
and place
in the
various letters
far
it
of
alphabet
so
fact,
as
they will
use
As a matter
of
of
will
up
eighteen
lines
them.
as
Then
place
see,
two other
the right
in
X-wise,
we may
to
of
the
previous
arrangement,
spaces the
that
and
these
the
four
place,
intervening
also
make
eight
in
in
pairs,
remaining
letters.
These
letters
may be arranged
126
CRYPTOGRAPHY
Should
it
any order.
that
trated
at
some
the
unauthorized
mystery,
to
shift
it
would
letters
merely
be
start
necessary
the
and
happily again.
This
shifting
would
be
ar-
PW EC KY
UH LS
ZD QT IM
JECkXCVVUJREaEE
VOLIECFlUQCFirOEHFIG. 14.
ranged as
of letters,
thirteen.
follows:
On
counting
the pairs
we
find,
of course,
Two
and
1
two
in the
second,
so
Our
present
arrangeIt
ment
is
CL
R X 3NQ,
and
so forth.
OR CIPHER-WRITING
is
127
evident that
the
spondent
IP
into
W2 EGr
whose
3KY, any
hands
this,
it
unauthorized
person
it.
fell
might reconstruct
To avoid
we should not
we should use
These would be
letters
and
any
that
fol-
lowed them
we
should,
on
receipt,
merely
in
run our
pens
through.
We
it
have
the
might run as
follows:
so
forth.
12F037CJ5LS910KA9IM4UH, and
We
should,
on getting
this,
draw
out
the
the
skeleton lines
and
lightly
to
number
construct
spaces,
and
then proceed
FO
LS
the
fifth,
we have no
To use
put
it
in.
this
cryptogram,
we must
note the
The
central space in
is
diagram in Fig. 13
128
CRYPTOGRAPHY
space above
it
it
would be
line
;
square,
except
that
has no top
is
the
space to right of
also
three-
being
;
incomplete
for
want
of
applies
the
all
space
round.
below,
the
left
and
so
on
The
X-like
figure
sideways.
in
each space
we merely draw
square,
that
space; thus
letter
is
we
represent
by a
cross
we have
placed four
where we please
J,
and such
or
little-used
X,
Z may
detect
their
non-essential
of Fig.
character.
13
is
the
at
mesthis
we send by
our
it
"
sat
On
arriving
Frank
down."
Below
the
OK,
CIPHER-WRITING
Fig.
14,
this
129
second
other
combination,
we
place
an-
communication; but
our readers,
find
with the
difficulty
key before
in
it
them, should
for
no
so
deciphering
to them.
is
themselves,
we
leave
The following
from an advertisement
in
1892 :-
vhkk mns rzx vgzs li Nq vgzs rvdds sghmfr Izx qhrd tmrntfgs. He h bntkc nmkx ad pthsd rtqd, H sghmj h'c cqno tonm sgd
SN gzud
!
NADX.
sgntfgs,
ektqd
It is
AKZQMDX.
each letter
of
is
B
so
is
really
on.
It
what
the
is
is
really
W,
of
and
one
is
poetic
effusion
It
"
"
Blarney
(AKZQMDX).
"
read as follows :-
130
CRYPTOGRAPHY
"
:
Ngv
og
mpqy aqw
and ease
ctg
okpf," meaning,
Let
me know you
F was
are safe,
my
tortured mind."
substituted
The
story involved
must
heart was
evident in
its
appeal.
Three
"
know
work
some third person, and the correspondence once came to an end. That this penetramatters deemed secret must often
is
tion into
take place
that
one not unfrequently sees that a certain advertisement referred to was not inserted
the person whose
by
name
be
or other sign
it
bore.
We may
that
perhaps
allowed to
of
say
here
the
illustrations
decipherment
we
of
the
"
Curiosities
of
Literature
type.
OR,
CIPHER-WRITING
131
we have foreborne
to
who make
use of crypto-
graphy do
measure
at their
own
risk,
and
in
some
may
lenge to busybodies,
into
base
to
do
that to
for
letter
may be
or any
other
such meanness.
Some advertisements
so
are so abbreviated, as
much
so
ito
}he
-as,
hpy
in
nw
hme, so
fr yr ftre."
wanting in accuracy, as used genewho have no proper work to busy themselves with, or who, having it, neglect it to attend
little
term a
132
CRYPTOGRAPHY
may
as
into
others,
a,
but
retaining
b,
them
b remaining
and simply
are
letters that
and so on,
of the message. to
For instance,
if
we
"
desire
"
Get
away
once,"
astro
it
would read
as
Lgpestra
it
rwnapyi
eniciel."
We
thus
could break
letters
up
run
into
it
or
into
one
it
might
read,
Rgoentlavwxalyvaft Polnjcien.
all
In either case
it
we should need
to do to decipher
all
would
the odd
numor
and
then
read
off
what was
left,
put, as
letter
that
of
is
of
thirty
it.
letters requiring
OR,
Iii
CIPHER-WRITING
133
we may make
of
the
first
of
the
first
third
the
first
of the next, then the second of the following " " Get one, and so on. away at once would
then read,
of
"go pey
ei."
rst al
this
sft
pn
loc
By
means we have
to
This
in
is
certainly a
drawback, and
felt to
it
would
if
an especial degree be
be so
all
the
a lengthy one.
Such
devices,
however, have
the
advantage that the letters employed to spell out the communication are the real letters.
There
tuted
is
characters,
and one
is
also
spared the
may
such a code.
Decimal, Loga-
"
According to Cocker,"
i.e.,
an accuracy of statement
The phrase occurs in a farce entirely beyond question. called The Apprentice, and hit the popular fancy.
134
CRYPTOGRAPHY
and Algebraical Arithmetick," pubthe
rithmical,
lished
in
year 1684,
we
find,
following
this
remain unchanged;
is
if
A, and
we
replace
B.C.D.F.G.H.K.L.M.N.P.R.S.T.W.X.Z.
by
a
Z.X.W.T.S.K.P.N.M.L.K.H.G.F.D.C.B.
mere
reversal
of
of the consonants,
we
shall find
no
difficulty
By
this
code Constan-
tinople
would be
XOLGFALFILOKNE.
from a man who
lutely
safe
cryptogram.
He
declares
to
that
"when
out,
the present
break
secret
gentleman,
versed
to
in
alphabets, but
subject,
chancing
to
think upon
the
happened
the
hit
cipher,
properties
of
very
extraordinary,
not
only
him
but
also to
some
of
his
make
<9A ,
CIPHER-WRITING
135
rash
lay
conclusions.
He
therefore
without dein-
judging
it
might
prove
Measures
war
to be
waged
of
many and
so
removed parts
the world.
But
this attempt,
and likewise a
meantime some
tous to
know
should,
properties,
he would be pleased to
let
them know
those
whether he
whole
due
affair.
The candid
peruse
artist,
having taken
time
to
those
writings,
made
and
answer
that
if
that
he
could not
read them,
ascribed
136
CRYPTOGRAPHY
art.
But
in
was not
his business to
meddle further
when he had
making
this art
advantageous to the
sell
British
it
for a
sum not
ward, to which
many thought
it
entitled.
But
upon consulting
his principles
he found that
monarch
"
of his
own
country.
at
home and
abroad,
and
secret
may
happen,
by lying by,
himself to
and
means
is,
of
making
it
it
useful,
and
this
method
to publish
later,
century
we may
parenthetically
so far as
OR,
this,
CIPHER-WRITING
137
sum
in
seat
the
Universal
Cryptogram
" at
step,
Company,
Limited.
He
goes
on
to
say
that
first
he
to this
but they
rea-
soon
as
the
following
:
First,
that
Supreme Wisdom hath locked up every man's secrets, good and bad, in his own
the
breast.
Secondly, that
imitated the
Supreme, by
punish-
unlawfully break
open
Governments
will still
have
as
much
in their
power as ever
to suppress
all
clauses.
And
this,
138
of
CRYPTOGRAPHY
singular
convenience
and
advantage
to
only
private
instructions
upon lawful
busi-
ness, but
of nations.
"
publish this
art
but,
diffident
of his
made
the
two
in
following
case
First, that
a true representation
of
command
and demonstrate the properties he attributes to it, then will the author cheerfully obey, and
rejoice in the
honour
of
arming
his Majesty's
hand with
he would
so advantageous a
weapon.
And
much
to devote
country
should Surely in the breast of a patriot these two be transposed, and the national interest placed first.
OR,
CIPHER-WRITING
139
;
of the
nor
till
Again, he will
till
he hath given
to do so.
And,
if
that
it
shall
For
he
human
the
it
ills.
But,
if
no
sufficient reasons
then
think
delay.
without further
evil
or
more good
tion?
"
it
result
The
can
Firstly,
be
wrote
offhand
it
in
the
common
characters.
Secondly,
140
CRYPTOGRAPHY
ing
it
are
so
can, in five
minutes' time, be so
perfectly communicated
out further
help
or
any
previous
practice,
to write offhand
set
forth.
and read
at sight as above
all
Fourthly, though
the
men
in
two
of
them, by
agreement
upon a
small
variation (to be
made
hands of
all
the
rest.
is
the art of
man
to read
N.B.
That
may
be demonstrated that
it
impossible
cipher that
shall
not be
by
many
de-
grees.
"
An
OR,
CIPHER-WRITING
is
141
the
hands of a prince,
that
he can with
letters
own
in
tents to ciphering
at
and deciphering
;
clerks, first
or to any person
whom
he
Another advantage
it,
is,
that a prince,
master of
every day at
will,
and make,
at the
same time,
im-
every variation a
new
cipher, absolutely
who
are masters of
and
to all
if
human
sagacity.
realms,
first
communicated
be the sole
in his
that he
so
may
it
possessor of
and
have
power
to disperse it to
only as his
And
the use of
ought to be reserved
may be communi-
142 for
CRYPTOGRAPHY
an arcanum imperil.
It should
be made
man
to
and
after
betray
it
he hath given
it
up
to
his
Majesty.
"
The
toil
and
delays
ciphers
hitherto
clog
see,
And we
of
the
letters
that
them
to such
ruinous delays.
all
This cipher
delay.
is
exempt from
ciphers
such
toil
and
The best
fit
hitherto invented
and found
for business
are held,
by the best
authorities
artist.
upon the
subject, legible
by an able
And
this
must be true
would
'This cipher
is,
in every variation
im-
pervious to
all
human
penetration.
The author
OR,
CIPHER-WRITING
;
143
will,
mankind
in
unless a
happen
friend,
to oblige
in
him
them
to a select
for ever."
Whether
ment
this
were so
all
potent an instru-
as the inventor
nor
by the
secret
should
be
kept inviolate, as
he himself
suggested,
it.
by the whole
dangerous
to
world
sick-
being told
Perhaps the
its
progress
allow
the
summons
view of
objects,
mundane
itself,
into insignificance, or a
have
befallen
him and
his
made
all
notification of
secret
a thing impossible.
144
CRYPTOGRAPHY
this
However
sufficient
may have
that
all
been,
we have
the
fact
is
clue to the
wondrous
cryptogram
It
was long
Parliament.
In
the
various
series
of
the
Gentleman's Magazine
in
we
find
"
Proceedings
"
the
running at
considerable length
The names
we have an
Analysis
etc., of
Names
of the
Hurgoes, Climabs,
Lilliput," in
names
Climab
are
is
a Lord,
of
and
;
Commons
Shomlug,
spoke
Toblat,
really
was
on
by
Lords
and Cartaret.
that
at.
tales of
Edgar Allen
OA\
CIPHER-WRITING
145
Poe
will
cryptography
in the story of
"
Legrand
of an
of
enormous treasure
gold coins of
fine
diamonds, eighteen
by means
of
an old parch-
cm
cryptography
The treasure
in
question
was
supposed
ious
pirate
Kidd.
Half
buried
in
the
sea
piece
"
We
million and a half of dollars, and upon the subsequent disposal of the trinkets and jewels it was found that we had
146
CRYPTOGRAPHY
011
of
this
some few
mysterious
application
were noted.
On
the
cryptogram, and
The
direc-
and then
from
at a certain distance
and direction
the massive
wealth.
chest
which
holds
this
ill-gotten
lost
The
piratical vessel
was
manned
it
of bringing to
The
story
itself,
at length
to
;
hunt
all
it
up
in
any
collection of
Poe's works
that
now
OR,
CIPHER-WRITING
147
concerns us
is
This also
given in
in
it
we need not
full
is
set
out in detail, as
story.
it is
length in the
it
that
is
not
would
literary
of
concoct,
while
it
is
exactly what
possibilities
the
would put
(t)
together*
Thus we
the
dagger
representing D,
asterisk (*)
(J)
dagger
is
being 0.
The
(;)
parenthesis mark,
is
(,
representative of
T.
The
interrogation
mark
(?),
the
^f,
and the
53Ut305))6*;4826)4J
The
decipherment of
is
this
abstruse
memor-
andum
believe in a present
is
was patented a
48
CR YPTOGRAPH V
all
Probably
on
their
gate-posts
door-steps
certain
mysterious
chalk-marks,
the
cryptographic
successors
what
fate
their
appeal
for
soft-
alms
may be
and
likely to
meet with.
a
little
The
hearted,
perhaps
soft-headed,
householder
who
falling
off
little
in
the
stream of
since
the
white
to
mark on
suffice
man
who
mark on
his door
is
is
an intimation that he
circle
visitors, the
to
man
who
is
6>A>,
CIPHER-WRITING
a kind
149
Business
of
is
We
should
man was
prepared
proper
and pro-
he would not
feel
it
any
difficulty
If for
is
less legiti-
mate, he
ful for
unable to do
is
need-
him
to
the
letters
are
different,
letters
seriatim will
1234567890.
we
us 27/6.
With
this
key before us
marked
MG /N" will
cost
We
pushing business
man breaking
150
CRYPTOGRAPHY
An
energetic
who
its
terms.
As
he was prepared to
same price
his
to all comers,
cryptogram or
The
result
irritate
others
it
would
call at-
nam
uoy
Hams
oreneg
levon
fi
ton gnitseretni.
Ti sekat
yromem;
wef
senil.
Ew
OR,
CIPHER-WRITING
uoy yam wonk
elit
151
seotatop, os taht
fo meht,
eurt eulav
i
leef erus
uoy
8a
lliw taeper
i
wonk
evali
on
uoy
ym
suoreneg
xis
dna
lliw ta ecno
fo
ym
tseb seotatop
"
! ! !
spelling,
little
practice
of
reading the reverse way one makes it out very " The potato man thinks after reading readily
:
this,
you
generosity
novel
if
not interesting.
memory
few
this is the
lines.
We
potatoes, so that
of
CR YPTOGRAPHY
time.
As
know
the potatoes
are
good, I
my
and
sixpence,
and
will
at once
send you
my
best
potatoes
We may
we
of
and that
of the excellent
is
which nevertheless
as follows
:
advertised,
"
STI
CKPH
illus-
As one more
the following
advertisement
ot
"My
1
darling,
Rof tobacco og
Nospmoht,
Daetspmah Daor."
And
!
that
we
gram
OK,
CIPHER-WRITING
is
153
he be
smoker, he
pouch.
may
find
due replenishment of
of
his
the crypto-
gram
that
it
We have
turies
now
of
shopkeeper of
Hampstead Road.
Our
not been,
at least
we
trust,
it
will
has taken
its
making
history,
and
in the rise
and
fall
of great causes,
and that
it is
something more
154
CRYPTOGRAPHY
to the
knave or
the veiled appeal of the love-struck swain in the columns of the newspaper.
15.
We
cation,
turn
now
communi-
and the
first
of these
is
that
known
as
OR,
CIPHER-WRITING
155
the
"grille."
It is a
short
communications.
re-
and
this
cardboard
is
pierced with
The sender
then writes his message through these openings on to a piece of plain paper that
is
1
placed
fills
beneath.
He
grille,
and
up the
any other
letters
him
as being calculated
off
the scent.
The
and reads
him no
distraction, since
hidden by the
Sometimes the
to
message
is
veiled
by the addition
it
of
into an
is
entirely
innocent-looking affair;
but this
very
1
difficult to
do properly.
la grille',
Any
in
indication
In France, Le chassis or
Git-ten.
Germany, Netz
or
Tf)6
CRYPTOGRAPHY
-)--
iCO:
OK,
CIPHER-WRITING
157
it
distribution,
tion
"
were merely an
tennis.
It
is,
for lunch
and lawn
the message
is
and then leave the objectionable third person to get such comfort as he can out of
Fig. 15
uses,
it.
and
duplicate.
16
represents the
message,
"
Come
it
as soon as
as
when
is
the grille
is
placed upon
while Fig. 17
how
it
looks
when
dispatched, and
how
it
The dotted
that the
may
trace
they
158
If,
CRYPTOGRAPHY
however,
we
make one
VIGOR
IVJERI
C/\ST<3
SOREOHlC
UpTI|jNOSP SI^EBL
Hive
LofTu
for
^HL
FIG. 17.
joLoic
IE
EST R.VH
it
himself or herself, as
would only be
in
necessary to
know which
squares
each
row were
pierced.
OR,
CIPHER-WRITING
159
sent
second,
and
seventh.
If
then
we
of
take the
first figure to
indicate the
number
it
would be easy
to send a formula
by which
five
grille,
could be
would
run as
follows: 124703146802136804246051357.
We
entirely
we have
all
it
grille,
is
known,
to turn
being
now
new
we have
a somewhat
160
CR YPTOGRAPH Y
contrivance,
it is
similar
the
still
"
revolving
grille,"
though
perhaps
more puzzling.
The
it
grille this
oo o
D
FIG. 18.
(of
course
we need
scarcely pause
is
to
say
a very
easier to
minor
point.
Sometimes
it
would be
OR,
CIPHER-WRITING
l6l
round one)
whole message.
To use
this grille,
we
first
FIG. 19.
AB
is
upper-
we
place as
still
many
keep-
We
then,
162
CRYPTOGRAPHY
grille
turn the
so that
BD
is
and
in these
new blanks go on
writing our
filled.
We
it
DC
and
is
and proceed
as before,
finally
we
give
OA
we
to the
us in
see in
Fig. 19.
a very hopeless-looking
mixture of
20.
letters,
is
the effect
we
get in Fig.
This Fig. 20
sender dispatches
it,
and as
it
appears to
who may
see
it.
To
duplicate
grille
and places
it,
AB
its
openings he
need."
He
and
The
is the top edge, " the openings now read only hold ou." next turn, DO, tells him " t another we,"
grill until
BD
and the
card to
CA
as its
OR,
CIPHER-WRITING
163
him
"
most.
how
made by
164
CRYPTOGRAPHY
have
already
in Fig. 9
We
is
shown what
"
technically called
the
"
ladder
cipher, a
now have
in
Fig.
21
another
arrangement
it
works out
somewhat
"
differently.
To make
slip -card,"
we
of cardboard,
slits
longitudinal
so as to about divide
three
equal portions.
place
On
of
the the
portion
we
the
letters
We
slip
on the
first
strip.
This second
in
card
is
divided into
squares,
and
these
squares
we
way we
letter shall
of
all
the
About four
slip
of these
columns
We now
of these
columns alongside
OR,
CIPHER-WRITING
If
165
the
we
con-
evident
any outsider
stood
;
what
letter
"for
or E, and so on
but we
can
as
shift the
card as often
we
like
during
of
the
making up
sage,
so
our mes-
that
is
no
ample,
but at the
next
shift will
be D, and then
it is
presently
on.
T,
and
so
The
shifting
must
re-
be intimated to the
ceiver,
or
the
message
go chaotic
at
to
him, so that
the
by
its
proper
66
CRYPTOGRAPHY
to.
have changed
2, 3,
1,
and
4,
the others,
being used
to separate
as blinds
words.
If
then we desired to
at once
seiid the
it
warning,
" If
will
be too
late," it
ZU6SPR9TP6HPM2EDUIEW8G
The
U6VWPD3GQ8KGXX6HT5QZZXFQT.
obvious that
should be
1,
and
2,
and so
on; but we
may make
matters a
little
more
being 26,
very
little
in
15 22
7,
12 13 23 22 13 24 22, 4 18 7 19, 9 22 24 7 12
21-
OR,
1-2
CIPHER-WRITING
7,
167
15 15 22 20 22, 11
4, 7
19 12
19 18 13 20
7,
8,
12 26 23, 13 22 3
14 12 13 7 19."
As
the matter
is
now
we
XY
it
will ex-
how
things
stand.
go abroad next
its
month."
construction, this
faulty in
having
letter,
and
up by commas
into words.
These
The
numbers
six,
too,
of the alphabet.
we have
seen, in the
is
Stuart times.
The
is
best arrangement
still
more.
It is better, too,
168
CRYPTOGRAPHY
there
is
comma
off
Should
is
at
numbers
is
readily effected.
as
an
illustra-
70.
J.
S. 48, 35.
26, 27.
K.
T. 82, 58.
C. 31, 52.
L. 32, 36.
D.
83, 65.
M.
72, 98.
V. X.
61, 76.
77, 66.
W. 33,
Y. 89,
81.
67, 96.
97.
G. 29, 40.
H.
I.
22, 30.
Z. 24, 45.
This
is
the sender's
list
figures
first,
as follows
OR,
21. A.
CIPHER-WRITING
49. 0.
50. P. 63. A.
64.
169
72.
76. 77.
30.
H.
39. R.
40. G. 41.
M.
90.
K.
I.
I.
22.
H.
31. C.
32. L.
K.
V. 91.
23. 0.
24. Z.
51.
U.
65. D.
K
W.
D.
I.
92.
33.
W.
42. 0.
52. C.
56, 0.
66.
67.
N.
80. E.
93.
U.
A.
25. E.
26. B.
34. E.
43. U.
45. Z.
X.
81.
95.
96.
97. 98.
35. S. 36. L.
57. Q. 58.
68. F. 69. R,
70.
82. T.
83.
X.
Y.
27. B.
28. F. 29. G.
46. J.
47. P. 48. S.
T.
37. J.
38. Q.
61. V.
62.
I.
A.
86.
89.
M.
71.
U.
Y.
This,
it
will
15, 16, 17, 18, 19, 20, 44, 53, 54, 55, 59, 60,
73, 74, 75, 78, 79, 84, 85, 87, 88, 94,
and 99
and
would be an advanit
Twenty- seven
anything that
may
Any one
any figures he
to the
170
letter
CRYPTOGRAPHY
he wants
;
32 or 36 are equally
The prying would-be decipherer is thus at once thrown off the scent. He knows, for inL.
stance,
that double
;
is
a rather
common
is
termination
repre-
and
this
sometimes by another,
double L.
"
he
cannot
find
would read
too, that
48223236 or 35303632.
He
knows,
;
E
it
is
the
commonest
but when
may
detecting
but small.
As our
we
for
hand over
decipherment
224247412680627769239834823
043393565218933344190.
By
the alphabet
letters
each,
letter
and
thus
each
these
rows
is
also
OR,
CIPHER-WRITING
171
marked.
letter
C, for instance,
first
in the
five,
be
of
o, o
while
would be the
group
of
five,
the
second
o
7.
and
would
therefore be
regular alphabetical
arrangement
tell-tale.
would
be
The
figures
9,
and the
his
is
The number
row
number
is
the posi-
letter
in the
row.
:
QGALY; PKFUZ;
this code
2 5
DHNRX;
:
BIMSY;
EOTWC.
"Constantinople"
by
575^23^51
52
This
that
bols
is
it
It will
be seen
of
thus
the
thrice
172
CRYPTOGRAPHY
occurring
of this
word
is
sented by a quite
exercise in the
different
As an
?A!AA^J>l_i.?A^ 29 4 38 27 18 3 17 1 19
4,
4,7
4'
is
that
of
For
this
any three
figures
The message
We now
C we use
the
it
instead of
it,
we employ
of
and instead
the
from
it,
while for
E we recommence
there-
by taking
alphabet from
fore
read
it
GRNI DU SQDI
WP
YV.
Here
is
again
will
OR,
CIPHER-WRITING
173
letter.
is
in one part of
Gr,
and in
E, or S,
is
Of
course,
we took 513
as the recurring
num-
we introduced
gram would be
first,
is,
we need
composed of four or
five.
Thus
we might,
31
niessao-e o
for
04
Come
3104
23
at
once
key
1042
to us,
being,
cryptogram based on
this
FPMI
CW PNGG WP UW.
The
we
KM-HSV-FQCQSHis
CJFO-LWJ.
The system
a very simple
174
CRYPTOGRAPHY
only reveal their meaning
when read
right,
in
some
special
way
to
left
left,
to
up-
wards, or
downwards, or diagonally.
They
OR,
CIPHER-WRITING
the
letters
175
way
is
to
wrap
up
amongst
divers non-significants,
message
shall
/\BC
176
CRYPTOGRAPHY
type
a
in
different practice,
si
i
though that
is,
of
course,
thing
we
should
do
far
tels
fet
so
//
sigh be o sigh u
sign
has in
smu
sip
lo
peps ndo
ex.
ri
see tomo ss rr
ped
ow
is
one fairly
our store,
it
add
to
we
is
give details of
it.
At
by no
means
have
so
good as some
on.
it
the
is
others
we
dwelt
A
is
square
drawn, and
each face of
divided into
From
subdivided into
of
small ones.
In the
the
first
these
F, in
we
the
ABC,
in
second
DE
third Gr
H I,
and so on
in regular sequence,
We
then
place,
also in
from one
tirely
to nine,
irregular
and
it
way.
In
our
present example
OR, CIPHER-
WRITING
177
numbers run as follows: 47.3.8.1.5.2.9.6. In this key a plain 4 stands for A, a oncedotted 4 for B, and a twice-dotted 4 for C,
and so
on
all
through.
South
Kensington
WTl
178
CRYPTOGRAPHY
If
number.
any
treachery
or
underhand
sub-
bination.
If
copy
the
same
edition
of
a good
dictionary, they
may be
in
is
able to
communicate
cryptogrammic fashion,
only
is is
though
fairly
the
method
words,
available
of
for
common
and
no use for
proper names.
not the word
finds a certain
The method
itself,
to write
down
number
back or
for-
ward.
"
ing,
off
instead
in
these
we
our dictionary three places behind them. So that our message reads, " Gesticulator
artless yolk
awakening sonneteer
camphor."
that
shown
13;
but
we
our-
thinking
them
over
devised
O/t,
CIPHER-WRITING
179
which we
crypto-
give
the
name
of
is
the
Newark
an improvement on
have
as
being
It
somewhat
clearer
and more
is
definite.
seems to us
in
that
it
rather a
weak
point
Fig.
23
letter
Fig. 13,
threes,
and
in
letters
into
as
to
second
E.
Having
got,
as
in
Fig.
13,
may be
disposed in them
The
six characall,
ters in
for
in-
though they
angle,
and
within
it
three
lines.
By
this
little
ingenuity,
we
may
180
CRYPTOGRAPHY
twenty-six
letters
get the
of
our
alphabet
different
is
represented by symbols.
over
two
hundred
letter,
being the
line,
first
repre-
sented by one
the
third
T by two
lines,
;
and L,
being
letter,
by three
lines
all
is
the
first
letter,
and there-
fore one-lined
the
two- lined
the
third letter,
and therefore
three-lined, in
direction.
a right
clock-hands
"
cipher.
It is less effective as
have preceded
stant
it,
the
same
forms
always
representing
easy of
great advantage of
is
so simple in character
is,
and
it
OR,
CIPHER-WRITING
l8l
The dots are absolutely meaningless, and are merely put at random as blinds.
read.
simple in character."
ABCDEEEFCHIJKL
A>v<n;u-m\i MM OPQR5TUVWXV
Z
FIG. 25.
The
one,
"
two word
"
cipher
is
a very good
the
same
letter
being
represented by
this
different
characters.
To work
out,
we
upper edge of a
of
ruled squares
182
CRYPTOGRAPHY
side.
one
let-
the
squares
are
filled.
The words
(see
we
thoughtful
this,
mean
ten
squares
wide
and
:
ten
deep,
one
hundred
squares altogether
bet
so that
we
repeated
in
full
three
times,
and only
see now,
We
by referring
OTJ,
to E, that
it
may
be either NT,
EH,
or
DTJ, while
double
S would be
or
RL
at pleasure.
still
Of course,
is
that
to say,
key-words
still
more
combinations
the
is
present
number
is
There
number
"
Ordinary thought
squares,
would have
that
given us
fifty-six
and
would
have meant
that
over,
the
alphabet
would have
thrice.
come twice
It
is
and a few
letters
>/?,
C1PHER-WRIT1NG
be words
at
all;
183
letters
should
one might
The words
ORDINARILY
A
184
CRYPTOGRAPHY
to
we send
"
our
correspondent
"
the
words
ordinarily
thoughtful
on a post-card, no
suspicion
to
is
make
his key, so
many
so
many
them
in with
Each
real letter
message
is
then,
by the
it
into
append
is,
Hope
you by Tues-
RORF.
might
equally well
have been
IUOGILNT.
as
an absosay,
lutely indecipherable cipher one cannot " combination must but this " two word
come
OR,
sufficiently
CIPHER-WRITING
that
ideal
185
all
near
for
practical
purposes.
The
subject
is
interest
of
abundant
ingenuity
that
of
the
arfc
has
called forth.
secret writuses,
ing
may
it
be turned to
basest
to
many
while
creation
its
such that
of
knowledge of
or
avert
may
save
hundreds
the
lives,
itself.
catastrophe from
nation
INDEX
" So essential did I consider an Index to be to every book, that i proposed to bring a Bill into Parliament
to deprive any author who published a book without an Index of the privilege of copyright, and, moreover, to subject him to a pecuniary penalty." Campbell's "Lives of the Chief Justices of
England"
" Ars
A.
"
Scribendi Character -
and
"
cipher of Lord
advertise-
Bacon, 103.
Astronomy, perverted in
aim, 12.
its
Abbreviated
ments, 131.
Abbreviation
tions, 64, 65.
of
inscrip-
B.
Backs
Bacon,
of
slaves a writing
surface, 53.
" of
Agony columns
the
cryptographic
enthusiast, 101.
Alum as
39.
Bracelet
alphabet,
96.
how
in-
made,
Brass,
Arbitrary
writing
upon
visibly, 46.
188
C.
INDEX
Cooper, Mr., as a decipher-
Camden
Society, reproduc-
Copper,
invisibly
94
"
on shorthand, 63.
Count Grousfield's
172.
"
cipher,
Charlemagne
as
a crypto-
Cryptographia
the,
denudata"
Chemicals, use
ing, 55.
of,
D.
Dactylogy
16.
or
finger-talk,
Cherry
writing
of,
Derivation of cryptography,
11.
History of the
Kebellion," 69.
"Clock-hands"
cipher, 180.
form
of
Colours expressed by
98.
lines,
Conrad us
on
art
of
de-
Dutch
three-letter
words,
cipherment, 115.
119, 120.
INDEX
E.
189
arable and
Gum
gum
tra-
gacanth,42.
H.
Head
of
slave
as
writing
for
commonest English
Herodotus as an authority,
F.
42. Fig-tree juice as an ink, as mirrors signals, Flashing
16.
24.
Hidden,
not
necessarily
secret, 25.
14.
Hurgoes
in
and
Climabs
in
writing,
Parliament, 144.
38.
"
Gentleman's
reference
to,
Magazine,"
115, 134.
55.
I.
Goats' fat
as writing ma-
Inscription
country
church, 75.
gram
in,
145.
J.
Jangling
of
bells
as
Juniper
as
writing
190
K.
INDEX
<k
Newark
179.
"
form of cipher,
use
of,
Nitrate of silver,
"
Knotted
bet, 95.
string
alpha-
56.
"
Nulles,
of cipher,
or non-significants,
of, in ciphers,
Numbers, use
"
Lexicon
the, 64.
Diplomaticum ,"
its
Litharge,
use in secret
writing, 39.
of
M.
Marquis
of
58.
as
writing
Mary Queen
of Scots' use
of cipher, 82.
P.
Message
wrapped
round
ruler, 47.
"Mirabeau" form
170.
"
of cipher,
"
Monas Hieroglyphica
Dee, 30.
of
26.
Pigeons as message-bearers,
52.
N.
Naseby, battle of, 69, 70. " " Natural of Magick
Porta, 33.
Polygraphia
graphia, 27.
or
Stegano-
INDEX
Porta
191
on
cipher
as
writing,
for
28, 33.
Soot
|
Potatoes
subject
of
cipher, 150.
"
Publication
Parlia!
from, 129.
Steam
83
'
engine,
germ
of the,
R
Rawlinson
21-
on
Sheshach,
mess age
wrapped
by means
of
round, 47.
cipher,
I
"Revolving
160.
grille
String, message
of>
99.
"
an
nk
57.
Rule
92.
form
of cipher, 87,
Symbolism
of action, 15.
S.
T.
Taste, sense
of,
used, 94.
Sheshach as a cryptogram,
20.
Shop
Tramps and
Trithemius,
1st,
"
cryptograph-
28, 104.
Sinking
"
of
"
ships
signal
Tudor
code, 69.
period, great use of cipher, 68. " Two-word " cipher, nature of, 181.
192
Tyronian symbols, 62.
V.
INDEX
Vowels,
the
commonest
letters, 111.
w.
Watch-fire signals, 16. Waxed tablets, use of, 24,
-Jo.
Weapon
12.
of the ill-disposed,
Vinegar
and
vitriol
as
Writers on
27.
cryptography,
Butler
&
Tanner,
The Sehvood
Printing
University of Toronto
Library
DO NOT REMOVE
THE
CARD
FROM
THIS