Cryptography
Cryptography
'it
.,i
f.
.,(,.
-)4
lilii
''^
H91
The
original of this
book
is in
restrictions in
text.
http://www.archive.org/cletails/cu31924074296256
In compliance with current copyright law, Cornell University Library produced this replacement volume on paper that meets the ANSI Standard 239.48-1984 to replace the irreparably deteriorated original.
1992
CRYPTOGRAPHY
OR
THE HISTORY,
PRINCIPLES,
AND PRACTICE OF
CIPHER-WRITING
CRYPTOGRAPHY
OR
The
CIPHER-WRITING
BY
F.
EDWARD HULME,
F.L.S.,
F.S.A
AUTHOR OF "familiar WILD FLOWERS," "mVTHLAND," " NATURAL HISTORY LORE AND LEGEND," **THE BIRTH AND DEVELOPMENT OF
ORNAMENT,'* " WAYSIDE SKETCHES," ETC
**
LONDON
CO,
LIMITED
E.C
led
33!
so
"
CONTENTS
CHAPTER
Meaning
of cryptography
"
Objectious-_to studyIts legitimate use and value Historic examples of employment Delight in the mysterious Many other ways of conveying secret inf ormation^Symbolism of action The spoken word imprisoned and dispatched matter not necessarily secret because one cannot Egyptian hieroglyphics Chinese tiuderstand characters Indian mutiny Greek Ancient Biblical cryptogram Sheshach of Jeremiah Sir Henry Rawliuson thereon Statements for and against Julius Caesar's secret code The waxed tablet of Demaratus Difference between hidden and secret writing The shaven head a writing tablet Charlemagne and Alfred the Great as cryptographic experts Medlasval authorities Trithemius the Benedictine " Steganographia " Dabbling in the black art Dr. Dee Batista Porta's book on '"Natural Majick Invisible writing Chemical methods by alum, Writing on glass or crystalPapal Inquisition Disappearing writing Messages wrapped round rollers Two methods A slave's back the writing surface Chemical methods of no great rakie ordinarily Disadvantages of use Action of light and heat Chloride of cobalt, sulphate of copper, Often impossible to procure the materials
its
PAGE
its
:A.
it
vitriol,
etc.
etc.
.
11
CONTENTS
CHAPTER
II
PAGE
Ancient use of arbitrary symbols Tyronian abbreviations Early Tvorks on shorthand Excessive abbreviation of inscriptions on coins, etc. Telegram-English Mason-marks Eise of cipher-writing in England Clarendon's " History of the Rebellion " Battle of Naseby Royal correspondence captured and deciphered Published by Parliament Weighted naval
signal-codes
graphy
cal ciphers
Charles
I.
Great use of cipher at troublous periods of history " Century of Inventions '' of the Marquis of Worcester Birth of the steam-engiue Dedication of his labours to the nation His numerous suggestions for cryptograms The "disk" cryptogram Principle modified to sliding strip Bead alphabet Heraldic representation of colours in black and white The " string " cipher Bacon a cryptographic enthusiast His essentials of a good cipher His highest perfection of a cipher ^His plan cumbrous Trithemiau and unsatisfactory example Elizabethan arbitrary mark ciphers No real mystery
The
in
them
61
CHAPTER
Is
III
Keys
The
art of
cryptogram
Patient
Oft
recui'ring letters
Great
repetition of vowels
knowledge Conrad's rules The letter E "Noughts and crosses " cryptogram Its construction Ciphers from agony columns of Standard and Times Prying
busybodies
Alternate
letters significant
Ciphers
CONTENTS
based on divers shiftings of the letters Cryptogram in Cocker's " Arithmetick " Inventor in 1761 of supposed absolutely secret system His topes and fears thereon Illegal to publish Parliamentary debates Evasion of the law Poe's use of cryptogram in story Secret marks made by tramps and vagrants Shop ciphers for marking prices on goods Ci-yptogrammic trade advertisements Examples of cipher construction The "grill" cipher The "revolving grill" ^The " slip-card " Forms of numeri7
PAGE
cal cipher
The
Count
"The
Grousfield's
of a dictionary
Tlie
103
"The
" Clock-hands
cipher
Conclusion
ILLUSTRATIONS
Tia.
1.
PAGE
.46
48
48
2.
3.
4.
5.
49
50
6.
7.
...
.
51
.
66
8.
9.
Cipher
.88
.
91 98
10.
11.
...
.
.100
.
12.
13.
105
124
126
1-54
14.
15. 16. 17. 18.
Pierced Card
....
The
Sent off
158
160
Form of Cipher
lO
19.
of Openings
by Revolotion
of
Grille
20. 21.
174
175 177
181 183
25. 26.
CHAPTER
Meaning
of cryptography Objections to its study Its legitimate use and value Historic examples of its employment Delight in the mysterious Many other ways of conveying secret information Symbolism of actioii The spoken word imprisoned and dispatched A matter not necessarily secret because one cannot understand it Egyptian hieroglyphics Chinese characters Indian mutiny Greek Ancient Biblical cryptogram Sheshach of Jeremiah Sir Henry Rawlinson thereon Statements
and against Julius Coesar's secret code The waxed tablet of Demaratus Difference between hidden and secret writing The shaven head a writing tablet Charlemagne and Alfred the Great as cryptographic
for
" Steganographia " Dabbling in the black art Dr. DeeBatista Porta's book on "Natural Majick" Invisible writing Chemical methods by vitriol, alum,
dictine
etc.
experts
Mediaeval
Writing on glass or crystal Papal Inquisition Disappearing writing Messages wrapped round rollers Two methods A slave's back the writing surface Chemical methods of no great value ordinarily Disadvantages of use Action of light and heat Chloride Often impossible to of cobalt, sulphate of copper, etc. procure the materials.
is
derived from
-^
the
signifying
that
which
is
concealed
12
CRYPTOGRAPHY
in brief the
conveying
secret
manner
of
any intelligence we
may
It
desire to communicate.
may
an
cryptography that
an art that
evil
may
adapted to
anything to
a
facilitate its
study
we
are placing
weapon
is
in the
hands of
the ill-disposed.
This
equally to
many
of great value.
Astronomy may
in evil
hands
them-
stars
mere counters
for
the
fortune-teller
may
be
derived
the
valuable
dye,
the
healing
it,
may
be perverted to supply
subtle
Moreover, even
we regard cryptography
as affording
means
OR CIPHER-WRIT] NO
13
clearly
a
its
double-edged
sword,
and a
knowledge of
may
unmask
skein
deceit.
tlie
and
to
unravel
the
tangled
of
traitor.
It
is
sufficiently evident",
on a moment's
re-
There are
a nation when
it
is
be conducted
to a successful issue
if all
common
national danger
if
foe,
and become
who
could
14
CRYPTOGRAPHY
who could copy
we
by Royalist and
the
British
Museum and
our
other
national
archives
this,
abundantly
stirring
testify.
Previously to
in the
times of
of
Revolution,
fluence
when no man
safe
of
any mark
(5r
in-
was
we
find
an immense use of
at
its
deadly work, or
when
by timely
is
flight.
That which
secret
and mysterious,
calling
OR CIPHER-WRITING
the
human mind.
we have
of the
scale
Hebrew
and
at the other
its
pabulum
conundrums, and
such-like
reader.
This
love
of
the
mysterious, this
work
to excel
is
cipher-writing
has
undoubtedly at
all
times possessed.
Secrecy of
take
communication
may
of course
many
forms.
The
scarcely
perceptible
movement
finite
^
of the eye
may convey
a very de-
influence
This symbolism, has always exercised a very marked amongst Eastern peoples. Our readers will
recall, as
them that unless they could escape as a bird by flight, could swim as frogs, or conceal themselves as
mice, they were hastening to swift destruction.
l6
CRYPTOGRAPHY
may
Tlie
significance of
may make
of
a ,boiiquet
spelL out
feeling.
The;
Romans
..
Watch-,
waving
have
bells,
all
.all
these are
since
mentioned
present
but
dismiss
to
them,
our
purpose
methods of communication
by means
so
of writing.
are
possible
.
we cannot
forbear
Ave
a quaint
in
suggestion
that
encountered
an old
human
was
made
the
medium
of
transmis-
The person
OR CIPHER-WRITING
words slowly and
that
I7
was
carefully
and
securely
closed
at
message
This
was
the
receiver.
latter,
on obtaining possession
it
of the tube,
was
careful to open
at the
end
was
of great import-
If
by inadvertence
On
we cannot
given would
the
result
deprecated.
plugged up
we
However,
this is a
mere
detail,
and a very
B
little
18
CRYP TOGRA PH Y
wliicli
end of the
tube
it
was best
to
to open.
Baron Munchausen
hit
seems
have
quite
accidentally
upon
when the
when
warmed room
A matter is
just
to
because
we
it.
or
fail
understand
truisms
when once
needs enun-
ciation nevertheless.
Ben Jonson
and so
of
of
the
whole educated
caste
the
nation.
OR CIPHER-WRITING
could neither read nor write,
tlie epistles
tHat
enough characters
for those
who were
sufficiently
scarcely be
considered
examples of
graphy.
us
"Western people
was
that
they
might
or
convey
meaning.
painted
The Cantonese
Harrow, or board-
to
do with
If we,
from a laudable
talk
;
desire to keep
in
if
it
the family
one thing
but
Ave
drop into
is
in the room,
and
it
20
is
CRYPTOGRAPHY
not quite convenient that the details of our
dis-
quite another.
If
an English
little
officer at
message
a brother
officer
in
or silly
passed in hundreds
between British
officers
An
intercepted
enough
in
every camp
of
the
possessed
of
valuable
military
information;
them.
It has
ties
that
examples
of
cipher-
writing
may
Sheshach by Jeremiah.
He
is
who
uses
it,
OR CIPHER-WRITING
assures us that
itself, it is
tlie
21
term
is
meaningless in
Hebrew word
for
Babylon.
If
prudent to
as Nodnol, those
who
detected the
transposition of
the
letters
would have no
little
hesitation
accepting
the
Sheshach as an
authority
liave
archaic
cryptogram.
One
we
name
we
is
find,
"How
is
how
How
among
Babylon
!
become
"
an
astonishment
little
the nations
half
when
Sir
22
CRYPTOGRAPHY
authority, does not feel the accepted explanation so entirely satisfactory as to render
any
other superfluous.
of
He
and
if
this be so the
transposition of letters
coincidence.
becomes
merely
remarkable
for
Sheshach then
capital,
stands
Ur,
the
ancient
modern
from
its
birth in lowly
Ur
of the Chaldees to
the day
when he wrote
his
Babylon
words
of
we
find
the
whole
reference
to
be in the
tells
present tense.
of
cei-tainly
possibility.
The two
alternatives
before
us
are
equally perplexing.
so
Would any
one
writer
be
cautious
and
reticent
moment,
OR CIPHER- WRITING
SO plainly outspoken tlie
all
23
if
next,
his
object
of
through was
?
prudent suppression
if
name
On
two
the two
names
as, for
it
I'efer to
is
not
the
most
extraordinary
coincidence
that
letters in the
name
one
order,
?
the
other has
them exactly
reversed
What
occurring?
It
was absolutely
we have
Bible
Ipgists
is
and
commentators
as
the
earliest
he
may.
This
simple
reversal
of
the alphabet,
24
CRYPTOGRAPHY
representing Z,
etc.,
is
far too
grammic
letters
is
value, as the
The
his-
torian
in
Suetonius
forwarding
his
dispatches,
changed
places,
the
by four
so
making
this,
stand for A,
for
M, and
was
on
but
the
though
trifle
better,
still
most
elementary work.
ring to
it,
Scaliger,
we
see, in refer;
styles it a "
pure absurdity"
yet
Polybius
collected
tells
together twenty
kinds of
in
secret writing,
some
of
Herodotus
a
mentions
of
that
.the
one
Demaratus,
commander
forces,
and
then
had
over
OR CIPHER-WRITING
25
them, and
this
who were
But
in the secret,
removed
revealed.
will
be
noted,
was
a
scarcely
letter
secret
writing,
any more
than
fastened
down
in
an envelope to-day
becomes
is
secret writing
by the process.
It
wax
of
of
the
or
the covering
surface
the
all
Most
of
secret
communication
were of
this
nature.
to shave a
it
and then
to write
upon
any
the
When
conceal
was
sufficiently
grown
to
the
matter, the
man was
it
with
whom
was desired
communicate,
off
fifty
miles
an hour
is
26
CRYPTOGRAPHY
at breakfast in
tlie
our newsthat
details' of
insurrection
method
of
al-
together
feeling
too
and we
cannot
help
such
habit
when
nobody seemed
in a hurry, the
any great
have found a
ing
it.
leisurely
way
of
dispatch-
Charlemagne kept, up a private correspondence in cipher- writing, and the secret alphabet used by Alfred
the Great
may
still
be
We
also,
dur-
ing the
fifth
century,
find
Pharamond and
who
could either
OR CIPHER-WRITING
number.
27
When we come
to tlie
Middle Ages
Europe,, and
a perfect epidemic
cryptographia, or, as
ran round
it
polygraphia
or steganographia, had
en-
Those who
may
Should
this
their
ardour, they
may next
Trithemius,
Schottus,
Caspi,
Cardanus, Walchius,
Selenus,
Herman Hugo,
La
Fin,
Niceron,
Tridenci, Comiers,
Dalgarno,
Even
then,
writ-
they so wish
of
Eidel,
it,
are open to
them the
ings
Soro,
Amman,
Breitkampt,
Conradus,
De
who do
not
is
the very
and
they,
present
28
CRYPTOGRAPHY
Avill
pages they
thence as
feel
much enlightenment
of these
As many
others
little
into
profit
;
own
store, there
would be
to their
in referring at
any length
works
we
Trithemius, the
old
writers,
first in
He
was
first
Abbot
really
Spanheim, and
treatise
his
was the
elaborate
on cryptogram-
mic writing.
The
first
Library
Its
title
is
of
characteristic
:
of books
that period.
" SteganograpMa
avthore
OR CIPHER-WRITING
reverendissimo
et
29
clarissimo
vivo
et
Joanne
Tri-
Magioe Natur-
Magistro perfedissimo."
curious
one,
somewhat
he
compiled
many
folios full of
and mundane
The
result
was
TJnfor-
and
spiritus nocturni,
the
result
He was
He had
tune
to
incur
Jerome
was
by him
relentlessly
Dr. Dee,
who was
as a follower of divers
uncanny
arts that
were
30
CRYPTOGRAPHY
bring liim
tlian
into- closer
-supposed to
witli
relation
all justi-
demons
was held
to
be at
of
^fiable,
the
work
of
Trithemius.
He was
often
sent abroad
on
more or
by tbe Ministers of
find
Antwerp on -February
He was
of
so,
as he
at
Antwerp
Hiero'ghjphica,
the following
year
but as
his
private
affairs
were
scarcely
sufficiently
good
reason
why he
should
be
he adds that he
is
much
for
staying
on,
he
one
" Allready
for
have
purchased
boke,
'
wch
anduiii
lu reference to this appeal of Dr. Dee, Cecil's iiiemoris extant stating that the applicant's time beyond
the sea
had been
well spent.
OR CIPHER-WRITING
been bj others offred and yet could
obteyned.
hoiJ
31
be
man hath
seeke
:
Whose
is
is
therof
spred
not unknowne:
on
this
:
Wise
wherof in
made, and in
-his
:
epistles,
and in sundry
other
mens bokes
commo-
meeter
or
boke
the one half, Avith contynuall Labor and watch the most part of
X dayes
And now
man
of
T stand at the
Courtesye of a noble-
that I
the
longer
pleasure
as
at
(with
leave
of
my
prmce)
to
him
points of Science
my
hands he requireth.
Thys boke.
32
CRYPTOGRAPHY
now
liave yt, or hereafter
p'fit (yf it
eyther as I
shall
have
yt, fully
whole and
pleas
you
to accept as the
my
most precyous
have yet of
other
mens
travailes recovered."
is
The account
to
have copied
it
by the courtesy
it,
of the noble-
man
possessing
to
it
him.
is
From
the
evident that
until
forty-three
to
Cecil.
years
of
Dee
The
direct
gift
to
Cecil
we
in
al-
may
lowed
perhaps,
without
as
being
wanting
charity, regard
to
a gentle bribe to be
stay
vancement of
OR CIPHER-WRITING
Batista
piled
five
33
Porta,
books
on
ciphers,
"
lies
Notes
in
occultes
des
lettres,"
Strasbourg in
the
he also
invisible writing.
The
we
write
that
is
dated 1658,
the
title
page stating
the
book was
"printed
by Thomas
are
at to
Young and
sold
Samuel
Three
Paul's
Speed, and
Pigeons,
be
at
in
the
St.
and
the
this
Angel
Churchyard."
In
them,
the Natural
Sciences,"
and the
His
first
result is
book deals
Wonderful things," a
subject
in
itself
extensive
and
Other sec-
the
wonders of
the beauti-
34
f-ying of
CRYPTOGRAPHY
women,
with
etc.,
and
tlie
sixteenth con-
cerns
last
itself
is
"invisible writing.'.'
His
find
book
we
promiscuous mass of
fit
either
would not
in happily in
books, or which
looked, or
information
original
when
This
dealt
with
in
its
position.
chaotic
section
to
in-
how
to
make
it
how
distil
from the
how
to
to
make
grow
of themselves,
how
make an
instrument whereby
a
great distance,
we may
to
else
hear sounds at
frauds
in
less
how
detect
of
impostors,
and
much
more or
secret marks,
which
they
vulgarly
call
OR CIPHER-WRITING
syfers
:
35
is
worthy
of
a treatise by
Men
and
write to some
I shall set
man
that
knows the
invention.
plainly: but
of
these things
them
must be
by growing
common amongst
respected."
much
all his
labour.
fails
to
show
how
the
exposition and
the
careful
36
CRYPTOGRAPHY
manuscript
themius remained in
years.
some
fifty
Porta's division of
liis
unless
visible
marks
carry a
We
soon
find,
however, on reading
visible
what he means by
marks
that
evident
enough
to
is
all
beholders
though
these, as
their
significance
unknown,
and
themselves.
imtil
some
them
to
view.
He, in
:
fact,
begins his
first
chapter
ways
them
OR CIPHER- WRITING
fire,
37
or rub
them with
dust, or smear
them
over."
His
It is to
first
recipe
is
a double-barrelled one.
if
be employed "
you
not seen
may
may
be hid."
to
This
bring about.
The enemy
or other
un-
would be put
off
whUe
the person to
whom
to
was
really sent
first
remove the
visible writing,
to
make
the
first,
teU out
its
story
by the ap-
The pro-
cedure
is
as
follows
Boyling water:
so long
till
when
dissolved, strain it
the water
grow
:
clear
with that
are dry
liquor write
upon paper
when they
will write
38
in tlie spaces scribe
CRYPTOGRAPHY
between the former
lines,
dein
at. large.
Galls
:
and
need, wipe
it
was not
I
will
seen,
may
in
be made ap-
parent.
Now
As
show
what
liquors
then powder
finely,
in
water
filtre
let
them through a
that
else,
may make
send
make
letters
desire to have
concealed
it
to
them
and the
be seen."
The
materials,
:
may be
noted, are
an important point
to consider.
that
we may
dissolve
OR CIPHER-WRITING
alum
and
is
39
in water
it
upon linen
this writing
tlie like,
it
declaring
when
dry
will
be
invisible.
render
it
visible, it
will suffice
the
The
fabric will
it
by the alum
message
will
in
which
dients
figure,
he winds up his
section,
On how a writing dip'd in divers Liquors may be read," by the assertion, "there are many such arts, too tedious to relate," and he
'
"
how
letters
may
be
made
visible
by the action
tells us,
of heat.
sharp things,
their
you make
is
it
hot at the
discovered
:
fire,
acrimony
presently
for
4o
CJi yp
TOGRAPH V
stow
if
fortli
they were
If
and
will
colour
tree,
they
upon the
when
to
sowbread a
show
divers
colours
by the
fire.
By
these
means Maids
There
:
is
also
Ammoniac
this
powdred
white
and mingled
letters,
with
water, will
write
them
to the
fire,
and they
shew black."
a
suggestion
for
making
until
communications
^
that
cannot
be
read
The
Pyrus tm-minalis, of a
OR CIPHER-WRITING
tlie
paper be burnt
are
made.
fashion
:
He
arrives
white of an
Egg
:
and
stir it
well
Letters
fire,
and
The
white.
This sounds
out in practice.
fact
We
that even
is
when a
dinary ink
to read writing,
burnt,
we may
often
still
be able
on
its
but
we know
also
of
much
break
of the writing
is
is
may
up,
at straightening
futile.
in-
42
CRYPTOGRAPHY
wifcli
writing
vinegar,
gum
solution, tlie
milk of
The milk
of the fig
accessible as
we were
writ-
ing these
so
of its efficacy
we can
say
pro-
we forthwith
when
soot
over
its is
surface.
also an
Our author
us that
" there
to write
upon Chrystal
ent no
man
will
dream
and the
letters
may
lie
hid therein.
Do
thus.
Dissolve
Gum
it
Arabick in water, or
Gum
Tragacanth, that
well dissolved,
may
will
be cleer
and when
it is
if
it
it
or upon a
Cup
or Glass, for
when
invisible.
No man
will imagine
of wine
when he would
and the
letters
OR CIPHER-WRITING
will presently
43
be seen."
upon a glass
with
solution
of
gum-arabic.
The
writing
absolutely invisible.
On
wiping this
off
at
At
one can
Would you
me
handful of
events
straw
and a match
? "
At
all
his
getting
them.
shown again
in Porta's in-
structions as to
how
of
secret messages
tells
may
be
sent by
means
eggs, for he
us that
and no fraud
is
suspected to be in them."
44
CRYPTOGRAPHY
receive eggs
However
this
may
be,
al-
One has
ways
going melancholy
or
mad
in dripping dungeons,
man
sitting
down
laid
%^^ with
it,
surprise.
Porta
is
also great
any great
if
value.
It
might at times be an
the eve of an
advantage
promises
made on
election, the
turncoat politicians, or
OR CIPHER-WRITING
there might of course be occasions
45
when some
up
in
laid
the
enemy
its
for use at
some
critical
all
production after
as a
differ-
Ordinarily,
how-
the meaning of a
safer
it
many
and more
ways
of disposing of
than trust-
chemical
to
obliterate
its
secrets.
In
the
roaring
camp
fire,
will
expeditiously enough
fulfilled its
In
like spirit of
adverse criticism
we would
some time
shall
become
visible
if
and
one
show themselves."
We
46
CRYPTOGRAPHY
of
Citrons
or
Oranges on
this
on for twenty
letters will
the same
may
be done
many
other ways,
in water,
will
is
Ammoniac
it
It
number
of days,
to.
a desideratum.
One
ordinarily desires
Fig.
1.
know
sees
at once
to
fit
make
if
desire to do so
mystery attaching
grave importance.
was an indication of
its
The two
things
which, though
OR CIPHER-WRITING
47
by
no great value-
One
Ms
then put
it
when
it
will
state of the
will be so twisted
will
be unreadable.
The harshit is
even
if
we
detect the
presence of a communication
able.
let
it is
not get-at-
desires to read
what
is
in it
it
him
be dilated again
it
and
all
will
appear as
letters
did at
it
first,
that you
may
read the
upon
Archimedes
and
mentioned by
on a
strip of
stick.
Two
sticks of
48
plied,
CRYPTOGRAPHY
one being held by the one correspondent
other.
long thin
Tig.
2.
round one
length,
and
letter
rvorrT
comes on each
tion is written.
k/ r
cnnM
3.
Fig.
side, the
required communicais
The paper
to
then unrolled
and forwarded
stick,
and
he,
on rolling the
around
this,
Ok CIPHER-VVklTiNG
is
49
The theory
notice
that no
of these
experiment
we found no
we had
is
difficulty,
without
previously written.
seen,
and that
is
quite
as
a clue.
If,any of our
if
they place a
[XPCCTMCS WN-,
Fig.
4.
this printed
letter is
shows the
spirally
wrapped
D
50
strip
its
CRYPTOGRAPHY
of
edges.
when
unrolled from
the
pencil
how
employed,
wrapping
it
round a
ruler.
Fig. 3 has a
Fig.
5.
anyway
whose
but
if
into
hands
strip
came would
and
place, as
in
Fig.
4,
the
is
the message
once
as
legible
as
any
orthodox
rewinding
round
pencil
could
make
it.
OR CIPHER-WRITING
A
write
paper
method
not
is
to
message,
right
along
the
the
^V 7^
U\A
v^jV
-rvXN
.
edges,
but
across
strips
strip
themselves.
of paper
round our
we wrote
another
as
follows
upon same
it
" Get
roller the
size,
The appearance
staff
of our message-bearing
may
be
seen in
Fig.
5,
while
strip
Fig. 6 shows
as
it
a portion of the
looked
for sending
our correspondent.
how
far
more
puzzling this
in Fig. 3.
is
Some
of
the material
we
find
in
-At
sidered to
of
-I
"invisible
since
Ji'^<=^-
adopts
-i
6.
are
akin to
52
tlie
CRYPTOGRAPHY
ordiuaiy letter put in an envelope that
vre
have already
cited.
He
tells,
for
in-
stance,
sent
within a
and
in
another case
\
in
the
interior of
a dead hare
how
others,
again,
or in
how
pigeons
may
camp
or fortress
by arrows or guns.
of
this
He
of
quotes
numerous
instances
;
sort
from Theophras-
and others.
He
with
that
the
slave
shaven
it
head, but
he
also
recognises
may
oftentimes be
desirable
that an
is
being thus
A great
use
was made
the Franco-German war, and the pigeon-loft of to-daj is as much an item of War strength as a Maxim gun.
OR CIPHER-WRITING
employed.
possibly
53
Had
desert
the
enemy, or be
spirit at the
filled
import-
awaken
of the
suspicion.
If
he
fell into
the hands
fair
promises, or affrighted
his mission of
it,
;
by
threats, to
reveal
whereas,
if
he were unconscious
his
and he would
pass on his
way unchal-
He
was, therefore,
given no letter
to
conceal; nothing
him
to
his suspicions
an
opiate,
his
own
the
re-
utilised
as
the
message
quired to be transmitted.
ferred to by Porta, but
it
This method
is re-
ancient history,
to
it.
Ovid,
54
CRYP TOGRAPH Y
Speaking
in
a general
way, but
at
the
same time
periment,
as the
we should be
the various
by the action
of
of
light, or of
heat, or the
tion,
washing over
another soluvalue
;
are of no great
practical
while
common
enough,
may
not
of
always
be
forthcoming.
The commander
hostile land,
an advanced post in a
desirous
of
of
who was
communiwith
operations, or
sand
miles
of
from
cobalt,
the
for
nearest
place
where
pro-
chloride
curable.
example,
was
A
of
great practical
such materials
is that,
very
difficult to see
what one
dries,
is
writing;
it
as
very
OR CIPHER-WRITING
55
memory
all.
as to
what was
really put
down
Such a message,
easily
too,
on
its
receipt,
might
any
special
solicitude
for
preservation
suspicion.
would
at once excite
comment and
Any
person
who
secret
message
visible,
and
on
its
application
the
forth
revealed to
quite
whom
may
it
was intended.
of these simple preparations
Some few
refer
we
to;
as
those
who
are
curious in
them
for
themselves.
careful
to
Any one
use
so
doing
should
be
as
a clean
quill
pen;
and
some, at
least, of
56
CRYPTOGRAPHY
little discretion.
some
Any
who
leaves
clear,
colourless
solution
in
teacup
or
kitchen or dining-room
called
may very
possibly be
to explain; while
As a
affected
silver.
familiar
example
of
the
chemicals
nitrate of
by
light
we may mention
Any
as
tion of this
would remain
invisible until
such
ex-
time
exposed to daylight.
On
this
made
visible,
re-
mains
so.
The writing
artificial light;
should, of course, be
done by
satis-
factory mixture.
instead
of
placing the
it
paper in
vessel
the
daylight
we hold
over
containing
sulphate of
ammonia the
OR CIPHER-WRITING
57
If
it
we make
will
be of a pale pink in
is
but tbe
colour
fluid it
there
is
be seen.
On warming
fire
the
paper before a
good strong
as the
paper
so.
cools,
a matter of some
five
minutes or
The
be
we
warming
and beautiful
Equal parts
of sulphate of copper
and
sal-
ammoniac dissolved
of
a beautiful
all
turquoise-blue
strongly,
dries
This,
if
applied at
of a pale
on the paper
greenish
colour,
a tint too
weak
58
to
CRYPTOGRAPHY
be legible, though, not
scrutiny.
too
weak
to
be
the
noticeable on a
On warming
made by
this
disappears.
The
juice
effect,
by means of
afterwards
colour.
If
it
being at
legible
invisible,
but
clearly
and of
a yellow
we wish
to
we have
oil
is
set up,
and
The
solution
to
should be
cool,
and
Anything written
by
this
agency
is
in
theory supposed to be
at the fire brings
warming
OR CIPHER- WRITING
it
59
we found,
became on
On
it.
might escape
tiny reveals
The
difficulty is
that
if
we
the
white
of
characters,
heat,
though
it,
on the
a
clear
application
develops into
;
and excellently
legible black
while
if
we
use
weak
colour
on the application of
warmth.
is
hardly
and
worth anything.
Many
other
chemical methods
might
all
be
does not
6o
CR YP TOGRA PH Y
of
any
real
use.
One
when brought
experiment.
to
the
vital
test
of
actual
CHAPTER
II
Ancient use of arbitrary symbols Tyronian abbreviations Early works on shorthand Excessive abbreviation of inscriptions on coins, etc. Telegi-am-English Masonmarks Eise of cipher-writing in England Clarendon's "History of the Rebellion" Battle of Nasoby Royal correspondence captured and deciphered Published by Parliament Weighted naval signal-codes Charles I. a great expert in cryptography Use of nulles or nonsignificants ^Numerical ciphers Mediaeval inscription without vowels Ciphers of Queen Henrietta and Sir Ralph Verney Great use of cipher at troublous periods of history The " Century of Inventions " of the Marquis of Worcester Birth of the steam-engine Dedication of his labours to the nation His numerous suggestions
for cryptograms The " disk " cryptogi'am Principle modified to sliding strip Bead alphabet Heraldic representation of colours in black and white The " string " cipher Bacon a cryptographic enthusiast
His essentials of a good cipher His highest perfecHis plan cumbrous and unsatisfaotoiy A Trithemian example Elizabethan arbitrary mark ciphei's No real mystery in them.
tion of a cipher
METHOD
of representing words
was
62
CRYPTOGRAPHY
Maecenas, Cicero, Seneca
tlie
Philargirus,
Tyro,
and
many
other
By
of
or-
They are
termed Tyronian.
Thousands
of these
may be
Probus,
the
writings
Valerius
characters
was ignorantly
;
decipher
it.
only grew
was
The
" Ars
Scribendi
is
character is"
written
while
English
OR CIPHER-WRITING
book on
1688.
It
tlie
63
subject
and
entitled
Art
of
Short,
Swift,
and
Secret
is
Writing."
The
title.
notion of cryptography
If
present in this
man employs
it is
a system of abbreviated
short or swift,
it is
writing because
to
him
he adopts
it
because
it is
secret,
in.
A man
adopts
who
writes
in
known system
any
of the
shorthand, or
who
is if
no disciple of
he, like
cryptography
in his
but
Pepys
famous
shorthand
stands
on
quite
different
Such codes
one exposed,
all
Not only
is
one's
64
CRYPTOGRAPHY
is
our
shortresult
got at once
they never
little
doubt
that
to
the family
from want of
clue to
of
An
ancient
form
writing
employed
amongst the Romans was the excessive abbreviation of words in inscriptions on statues,
coins,
and
so
forth
secrecy.
Any
abundant
illustrations
" Siglarium
D.Gr.
Ro-
inanum
" of Gerrard.
In
fact, the
and
Fid. Def. on
supplies us
with a good example of the curtailment necessary where one desires to get a good deal of
OR CIPHER-WRITING
material in a very circumscribed space.
better
of
65
A still
such
George
where
we may
as
find
concentrated
information
the
following
M
S
of
we
Britan-
Francice
et
Brunnovici
Lunebergi Dux,
et
Sacri
Bomani
Imperii Aixhithesaurarius
Elector."
We may
say parenthetically
that
in
all
cryptogrammic
communications the
message
consistent
with
intelligibility.
One
style
purpose
the
telegram-English.
less
It
makes
less
labour
and
sender,
ceiver,
and
This
last, as
we
shall
66
see
CR YPTOGRAPH V
wlien
we come
Fig.
7.
On
stones.
old
buildings
called
we may
-sometimes
see
what are
It
has
suggested
that
these
had
originally
symbolic
meaning
known
OR CIPHER-WRITING
67
freemasonry.
Some
authorities
tell
us that
race,
old as the
human
they
probably
is
had in
lost,
early times
meaning that
now
an
essential
rule
for
their
formation
was
We
of these
buildings.
There
is
all
of
them contain
prosaic ex-
at least one
The more
is
the pay-
Each mason
had
his distinctive
The
enthusiasts
cult claim
who
see in these
68
CRYPTOGRAPHY
mids;
only indicates
was as neces-
workmanship as
when Salisbury
or
Amiens
Whatever may
are,
we
think, at all
and an
posal.
'''
illustration in
the
space
at our dis-
Queen Elizabeth.
back
until
Great
but
it
was scarcely
we
find
it
really
Many examples
Charles
we
find
an immense use
of
it.
OR CIPHER.WRITING
Amidst the
historical
69
documents preserved in
Royal Commission on
historical
MSS.,
is
the
correspondence
distinguished
mafin-
deciphered, and
which
ultimately
cost
(Book IX.
vol.
ii.
p. 508)
we read
to quit
all
and
was
his
own
cabinet,
most secret
letters were,^
and
letters
One scarcely sees how, in the tarmoil of battle and the sudden realization of defeat, an incident so untoward could well be prevented. On board a man-of-war the code of signals is always kept in a leaden case, perforated with holes, so that when surrender is imperative the whole
'^
is dropped overboard, that it may not fall into the hands of the enemy. Even this, however, owing to the
thing
oflBcer,
70
CRYPTOGRAPHY
of wliicli tliey shortly
after
and him,
made
was agreable
in
to their
:
that
so
much
them
as they thought
would
have
many
particulars with
The
battle
14th,
1645.
On June 23rd
the House of
Commons
and
It
was
to the
Kingdoms, "
to the
man may lose his head, though to outward appearance without a scar), is not always an efficient safeguard. Within a mile of Charing Ci-oss, in the Royal
heat of action a
United Service Museum, may be seen the weighted signal code of the United States ship Gliesapealie, captured on
board that vessel by the British ship Shannon.
OR CIPHER-WRITING
intent tliat tliej
into Scotland
may
and
to foreign parts,
shall
and that
be put in
and papers
such as desire
it
may
peruse the
ori-
ginals."
Some
receipt
sixty letters
were captured.
Many on
the
war
some
cele-
and His
them
in
to the
mooted, was
composed
directions
but
his
favourite idea
was
the
A good
many
"
dummy "
in addition to those
Such dum-
72
CRYPTOGRAPHY
are unauthorized to read the letters off
is
who
very
common
are
as a cryptographic expedient.
They
known
and we
shall
Various
that
is
are
likely to
frequently recur.
of
This
clearly
a great saving
time,
as
Oxford
in full a couple
of
numbers
will
we want, and
is
of course
the
same principle
applied
as
to
such conregiment,
are
stantly
artillery,
provisions,
of
like.
Where words
non-betrayal
;
more immaterial
are
and
chathus,
to the
racter, they
for instance,
we
Queen writing
Capell
King
voir
as
follows:
"Mr.
52 62
nous a fait
que cy
27 50
20
28
31
45 9
8
6G
q%ie
48 31
10
35
33
7
47
50
33
ce
34 8
27
28
23
10
p><i
tout
60
OR CIPHER-WRITING
73
'
62
2
cest
pour qumj
si
66
4 46 189 18
69
70 intantion de donner 62 40
letter of the
11
."
In one
sorely troubled
Queen
matters
siiis
have
so
harassed
tourmantee
" que
de
je
extremcment
fait
du mal
en
syfre
^
teete
qui
que
je
viesteray
jovois
fait
moy
mesme."
The
trusted
and
finishes
We
give
son
their
significance
a 47
35
39
74
letter
CRYPTOGRAPHY
goes on in the same manner, but
we
The
translafitt
of
it
is
that
" 260
thought
at his
to
speake to him to
for
to
solicit
KD
arriuall
to
dispatch of
6000
armes to be sent
to
to
imploy any
other
way 189
thinke good.
WM
be-
Englishe Catholiques in
260 doth
therefore
desire
189 to aduertise
sent.
"WM
189
of the place
may
write to
WM
in
in
the
cipher
189
ment
to be
veiled
The
publica-
by the Parliamentarians
a matwe can
189 and
care
to
wondered
at,
and
well
imagine
that
KD
and
WM,
uncommonly good
OR CIPHER- WRITING
It will
75
notice
of
not
have
escaped
the
in the
little
extract
we have given
same number,
31,
being always
others
T
to
vary, so that
is
is
represented by
39 or 40,
This
45 or 46, and
is is
50 or 51.
frequently
resorted
patient
cryptography,
of
or
little
analysis
a communication would
it.
First a small
more would
E, for instance,
is
the
most commonly
in English;
one
1
that
occurs
oftenest
will
mean
E.^
PRSVRTPRFCTMNVRKPTHSPRCPTSTN.
meaning of this was not discovered for but if oar readers will add to these "E" letters a suflficient sprinkling of one more letter they will have no difficulty in converting it into " Perever teep these precepts ten." severe, ye perfect men
It is said that the
two hundred
yeai-s
7^
CRYPTOGRAPHY
Double
is
common
final,
so
if
we
find
two
similar
symbols
recurring
at
ends of
words we
may
course
at
least
tbink tbem to be
LL.
Of
tbey
may
be
double SS,
if
another
common
for
termination; but
we
as-
sume
then
them
the time
being to be LL,
we may
little,
look up
it is
ELL.
at
all
That means
events some-
very
but
Then we think
well,
fell,
and
letter
to our
store.
All this
course
it is
is
in
direction that
he
who would
decipher a
As another
pher
illustration
of
the number
ci-
we may
instance
that
used
it
by
Sir
Kalph Verney.
An
example of
may
be
Long Parliament,"
valuable
that
may be
issued
seen in the
rejaroductions
by the Camfollow-
den Society.
ing note
:
The
editor
makes the
OR CIPHER-WRITING
in pencil
77
by the hand
of
Sir
Ralph Verney
ci-
1 to 28.
I
in-
add
the
genuity of some
reader
may
discover their
entirely non-
meaning."
As they
evidently
why he
we
should
somewhat
slightingly
attempt " to
" take
come
Museum
covered
scarcely
in-
with
arrow-head
regard
or,
forms,
it
we
may
legitimately
difference,
tion,
with
supercilious
at best,
contemptuous
tolera-
as
the quaint
attempt of
some
poor
j^ssyrian
other
we
lament
from
our
his queer
mean something.
A
to
in deciphering the
be
rough
notes
of
matters referred to
78
in
CRYPTOGRAPHY
Parliament.
Thougli there
can
be
no
patent
against
Ralph,
writing
probably
many
in
distractions,
was not
employed,
entirely at
home
the
cipher he
at
times
introduced.
The following
used
are
examples of
the
cipher
his
by
Sir
:
Ealph Verney in
making
3
memoranda
" 28
17
15
22
10
15
5
'
15 15
17 17
18
18
15."
letters
"
No
extracts of
An
" 5
1512
16
27
28
15
10
5
1516 828
17
710
17
16
1711
15
15
28
10
7,"
signifying
"
The
prince
is
noli
come
to
Grreenhich."
should
probably
in
now
or
not,
the difference
being
considerable,
OR CIPHER-WRITING
the direct
contrast
79
aflSrmative
is
between
"
an
and
negative.
Come
to "
in
the
but this
was probably
letter,
and that
the decipherer.
Of course
and
so
is
not
in
1,
and
2,
and C
3,
forth
regular
it
remains to
has
that
out
what
arbitrary
analysis
arrangement
it
is
been made.
the letters
follows
:
On
are
found
represented
by numerals as
2=F
So
CRYPTOGRAPHY
In
the
memoranda
that
have
come
to
24 or
less-commonly emor
that
Q,
V,
we may
of
therefore
assume
four
the
missing
equivalents
For
facility
of
reading
anything already
given,
written,
the table
letters,
we have
is
numbers
;
and then
if
the
most useful
but
we
ourselves, a
of
more
a good
service.
stiff
If
we want
to
trans-
late
piece of Russian,
we
turn
to the
ary
but
we
desire
to
translate
our
own
English-Russian
portion of
our
a
book.
crypto-
gram
uses
OR CIPHER-WRITING
while
the
receiver
8x
translate
it
employs
to
letter "
table.
of
A = 14
B=6
C = 10
H=7
D = 13
E = 15 F=2
G = ll
82
CRYPTOGRAPHY
25
17
8
18
317
note
286
18
16
28
15
8,"
he
that
felt
our
an intrusion, also
in
shows
the
we
had
succeeded
mastering
We
also
find
of
James
II.
and and
of
when
in
plot
sought
safety
the
use
cryptograms.
of
The adherents
the
of
Mary Queen
of
Scots
and
followers
also
the
Pre-
tender were
in their use.
naturally
very
proficient
of
Worcester,
little
in the
year
of
1633 a
book
This
the
" Century
Inventions."
nobleman was
pursuits,
greatly
at the
addicted to
scientific
and
a
mand
Charles
to
of
I.
large
troops
under
He
of
afterwards
Charles
attached himself
II.
the
suite
in
exile
in
OR CIPHER-WRITING
France,
83
and
to
being
sent
over
by
liim
to
London
and key
liberty
leisure
leisure
in
tlie
Tower.
Restoration.
He was
His
set
at
the
enforced
in the
for
Tower
gave
his
him
abundant
as
study,
at
is
while
so
position
man
of
affairs
it
stormy
period ex-
plains
how
hundred
of
mark
Suffice
majority of
his
inven-
tions
germ
all its
of
the
steam engine of
to-
pervading
utility is
to
be found
observations.
The
which
off
by the
84
CRYPTOGRAPHY
tliis
from
the suggestion
tliat
sucli
a force
in the
value
of
cation of
cellent
his
Majesty,
sensible
on
the
principle
to
his
having
more
than
" The
one
string
bow,
he
writes
Treasures
and
Pleasure,
if
being-
I say
it
seems a Vanity
:
but comprehends
Truth
since
no good Spring
but becomes
it
is
drawn
is
weave
his
web
The
inforc'd.
shall be pleased to
make
of
my
Inventions
the
more Inventive
shall
still
you
find
another, and
ability.
my
And
my
heartiness therein
there
my
readi-
OR CIPHER-WRITING
jaess
85
and
spur.
Therefore
be
pleased
to
begin,
till
I flag in
my
Serve
my King
and Country.
Before
For certainly you'l find me breathless first t'expire my hands grow weary, or my legs do tire."
list is
No. 1 on his
some
shewing by
scrues,
all
by gages,
fastening or unfastening
Upon any
Accompts
of
these Seals a
of Receipts
one Farthing to
an
By
but in English
may be
and
unknown
to be
it
opened before
the Enemy."
86
CRYPTOGRAPHY
No. 2
is
how
may
No. 3
trived,
"a Cypher
or
Character so con-
cumflexes, stands
24
letters,
and as ready
the
other,"
to be
made
the
for one
letter
as
while
inventive
it
faculty in
him, growing, as he
use.
declared
would,
refined
by
and
No. 4
is
*'
this
Invention
so
abbreviated
that
point
the
24
letters
be made with
will
two pens,
bub
as
that no
time
the
be
lost,
one
finger riseth
other
may make
clogging the
memory with
words
are thus
letter, set
and punctually,
multiplied
points.
And
be
less
than a
point."
OR CIPHER-WRITING
hit
87
of
His
invention
is
"a
way by a
Circular motion
either along
any
Alphabet, so that
placed,
Point
ad-
individually
ditional
without
least
mark
24
yet
as
easily
if it
We
labours
were
of
first
the
them
ferring
to
in
an
always,
educational
work,
all
but
pre-
where
at
practicable,
it
go to the
original,
we turned
up
in
the
students'
Paranote
gives
at
the
British
Museum.
the
We
with
great
regret
that
author
88
sliorfc
CRYPtOGRAPHV
skebch
case
as of
Ave
have
already
quoted
This
in the
fifth
one or two of
his,
them.
invention of
Fig.
8.
was largely
Fig.
OR CIPHER-WRITING
8
is
89
circle
an
illustration.
We
draw a
on a
its
we
ABC
sequence of
and
in these
we
We
next
The person
whom we
Fig.
8,
shall
be
adjusted
out,
to
A.
true
We
then
spell
the
words
the
letters
being those of
90
CR yPTOGRAPH Y
word February,
it
DZOXEJXT.
reads the
characters
from inner
circles
to
showing
him that
on.
if
is
really F, that
is
E, and so
;
This
may be
but
we want
med-
dler
who
same
give
etc.,
necessary
is
to
now
onlooker
is at
once thi-own
the scent.
Our
this
know
turn,
of
and give
his
card a similar
It
but this
for
in-
may
by a
thus,
easily be arranged.
might,
stance,
KKQ would
mean
OR CIPHER- WRITING
sliift
91
till
A
to
should be
and
if
we
in the course of a
page or two
then
to
change
again,
BBX
spin
X became
new
equivalent of A.
and revolving
excellent one,
circles
its
is
a most
only drawback
little
being that
difficult
it is
perhaps a
the
to
read
radiating
is
letters, as
ab-
solutely straight
up the others
we
get at
to
one
that
is
absolutely
all,
upside-down.
ever,
After
howshould
little
practice
of
them a
who
feel
difficulty
Fig.
92
shoiild
CRYPTOGRAPHY
come
the
for
as
boon
and
blessing
is
where
changed
arrangement
a
Rule."
the
"We
must
ness
confess
of
ourselves
compact-
No.
more
than
compensates to
our
mind
for
possibilities
other
less
papers.
We
than half
the part
the
AK,
To
of
we have shown,
AZ.
strip
make
this
ed in
it,
and opposite
are
to
these,
in
of at of
regular
the
al-
sequence,
phabet.
A
and
then
cut
strip
top
and
is
bottom,
narrower
it
card
inserted so that
will
slip,
up and down.
distances
apart
strip,
the
openings
the
on
the
of
broader
are
placed
letters
OR CIPHER-WRITING
tte alphabet in any irregular order.
93
"When
a
found
the
strip
should
still
be so
first
what we want
is
not only a
surplus, so that
the slip
to
Of course
card
method
already
shown,
that
"head"
would be
XVRT,
upwards or downwards.
until
If
we
to
slipped
down
came opposite
no
longer be
A, then
but
''head"
would
XVRT,
BKDN.
clearly be
any accidental
shifting
against.
of
the sliding
piece
must be guarded
opposite to
94
CRYPTOGRAPHY
to
A will suffice
lias
taken place.
revert
To
now
to our
ingenious Marquis.
"Century"
all
to
there
may
and
42,
this
and Nos.
and 43 are
all
secret
all.
arranged
and
grouped that
dipped in alum,
salt,
imagined
that even amongst the blind such a sensitiveness to smell or taste could be developed as
OR CIPHER- WRITING
would make
tliese fancies
95
realities.
workable
We
lavender water,
and as many
as
would
up an alphabet.
string,
One
of
his
methods
calls
by a knotted
and another he
a bracelet alphabet.
new
tinder
devising an alphabet
by
in-
how
may
set
down a whole
letter, or
when
96
CRYPTOGRAPHY
ing out of so
many schemes
narrow
field of investigation.
The
we
take,
blue,
the alphabet, as
to
communication.
observation,
lieceiver
and
sender
by
and
if
at
any time
of
this
Avere
discovered
re-arrangement
the
colours
made
OR CIlPHER-WRtTIKG
in
97
By way
of a
start
we would
green
suggest
tlie
following key:-=
A=red and
E=red and
black
Beads
to
of
turquoise blue
used
divide
words, or
tliey
may
be
If
inserted
anywbere as
themselves
of
non-significants.
tlie
beads
initials
are
not
available,
suflS.ce
;
the
if
thus,
we
can-
we can by EG.
black,
As B
is
already re-
quired for
turquoise.
the blue
must be T for
it
Ignoring
wherever
comes,
it
98
CRYPTOGRAPHY
misleaders,
may be
in-
troduced.
"Mind
see Cecil"
would therefore
read
ters into
sham words
to mislead
investigators
that
we
chose to make.
marking
their colours
by the
signs
is
used in
heraldic work.^
Their message
the begin-
Should any of our readers not know these, they would them, as they come in very serviceably not only in finding from these signs the actual colours of arms engraved in illustrations, book plates, and the like, but they are also very useful as a shorthand
1
for
any purpose,
as, for
example,
OR CIPHER-WRITING
99
A
seen
curious
in
foi'm
11.
of
early
cipher
of
tlie
may be
persons
other
Fig.
of
Eacli
desirous
communicating
"witli
eacTi
similar
strip
of board
this
of
was
according to the
common
made
somewhere
in the series.
and by
it,
The
wood
or card-
On
person
our beads.
silver or
series of
dots, -while
white are
Red
is
shown by a
black
is
upright lines and blue by horizontal ones, while in plaid by lines both
Green
is
indicated
by
inclined lines
loo
CRYPTOGRAPHY
The
was
way
hands
of
it
the
receiver.
He, on
receipt,
wound
round
his counterpart
Fio. 11.
munication.
the mes-
sage
The first
line gives us
FIRST,
OR CIPHER-WRITING
but the second line only gives OH, as the
loi
A we
H in the
alpha-
we marked
it
AOH, and
that,
this
this
no use to
of
us.
The only
is
drawback to
unless
method
communication
slip
FIRST
GrJSTU,
to the
this
the receiver of
ciyptology.
He
laid
down
the
law in
matters.
The three
essentials
good
were
facility in
is is
perhaps not
safety
from
whom
the com-
102
CRYPTO GRAPH V
A method
our
that
"a cypher
of
own which
everything."
most convincing
and awe-inspiring.
people will accept a
valuation he sets
man
pretty
much
at the
asks what
it
As a
and
it
cipher
it
own
first
rule, since it is
by no means
letters
facile in use.
He
then
we
it
desire to send a
message of
use
fifty
letters,
would
be
necessary to
It
is
if
two
hundred and
fifty.
;
slow in operation
even
formula at one's
finger's ends, it
would involve
103
OR CIPHER-WRITING
five
times
the
labour
of
ordinary writing.
When we
once
know
is
as liaWe of
same
principles of decipher-
Of
course,
if
and
as follows:
A=AAAAA.
=AABAB
G=AABBA H = AABBB
W=BABAA
X =BABAB
T =BABBA Z =BABBB
cumbrous nature
to
Q = ABBBB
see the
we endeavour
instance,
apply
it.
Such a word,
for
as
cryptogram
would become by
this code
AAABABAAAABABBAABBBABAABAABBAB AABBABAAAAAAAAAABABB
104
CRYPTOGRAPHY
on the same
following,
lines
as that of Bacon,
is
the
old
which
:
Ave
extract
from
an
encjclopsedia
A=lllll
J =12112
S =21122
B =11112
C =11121
1)^11122
K= 12122
li
T =21211
=12211
=21212
M = 12212
1^
V =21221
==11211
= 12221
W = 12121
T-
F =11212
0=12222
G =11221 11 = 11222
J
P =21111 Q =21112
11=21121
=12111
intervals
The
be marked
by 333,
we wished
to
ask
we
arrangement
1112112222122121121133321122122221222212221
833122211222212121
Another
adopted
plan
that
has
been
sometimes
may
OR CIPHER^WRITJNG
105
the rest
is
lemai
clamech abrach
This, after
it
misach abrai
all,
disaria
athanas."
bibit,"
and
nine
them
those
this,
we have
it
But
mys-
though
sight very
terious,
difficulty
in
it
1 06
CR YPTOGRAPHY
we
spell
cat
a curved
line, (that
we have
learnt to call
0),
lines
coming to a point
and a horizontal
we have
made up
an upright
its
line
we
are
accustomed to
that
call
T), or
whether we decide
instead
shall
shall
be a
thing
made up
of
two
If
circles, like
a figure 8
turned sideways.
tain
we
form
is
we
see
we
and
its
shape
is
a matter that
is
absolutely
indifferent to us.
we know
it
would
it
is
as easy
to write
dog
in
Greek or German
letters, or in
which
this
page before us
is
printed.
OR CIPHER-WRITING
07
Why
ORYPTOwe
GrRAM
does
That
is
CHAPTER
Is
III
an undecipherable cryptogram possible ? The art of deciphering Keys for the analysis of a cryptoga-am Oft
recurring
letters
Magazine
rules
perseverance Papers on the subject in Gentleman's Conrad's of 1742 Value of general knowledge
Its construction-^Ciphers from agony columns of Standard and Times Prying busybodies ^Alternate letters significant Ciphers based on divers shiftings of the letters Cryptogram in Cocker's " Arithmetick " Inventor in 1761 of supposed absolutely secret system His hopes and fears thereon Illegal to publish Pai-liamentary debates Evasion of the law Poe's use of cryptogram in story Secret marks made by tramps and vagrants Shop ciphers for marking prices ou goods Cryptogrammic trade advertisements Examples of cipher construction The "grill " cipher The "revolving grill" The "slip-card" Eorms of numerical cipher The " Mirabeau " Count Grousfield's cipher Communication by use of a dictionary The "Newark" The " Clock-hands " Tlic " two- word " ciphers-Conclusion.
Great
repetition of Towels
Patient
r I
iHE
time
will
defy
patient
investigation
Some would
have
it
that as
all
CIPHER-WRITING
of tte ingenious cryptograpliist,
it
109
should not
of
be impossible to
build
up a monument
all assault,
and certainly
itself to
this is
would
tell
man
could devise
man
to search out.
However
this
may
be,
^we
must bear
in
to
the
ordinary
man
is
hopeless
may
not prove so to
accomphshed experts
bare,
just six
months
to lay
mination as that.
it
is
emjihatically
There
immense
assistance
in
the analvsis of a
no
cryptogram.
CR YPTOGRAPHY
There
are
special
conditions,
much more
Italia n
freely
used
letter
in
Spanish or
than in English.
is
In the
English language
"E"
is
with
the
greatest
frequency.
The
easiest
cipher to translate
in
it
letter,
or
'
P may
all through.
munication,
and broken
ujd
into
words.
A
diffi-
we have
already
may be sometimes
M, or X.
if
written as J, at others as S, or
at once
We
the
add
gl'eatly, too, to
the puzzle
words are
rily
all
broken up.
a good plan
OR CIPHER-WRITING
to out out every " like
III
sucli
common words
can at
all
be spared.
in monosyllables.
two
is
letters,
such as am,
in, of,
or we, one of
them
necessarily a vowel.
is
commonest
but
it
also
been, seen,
examples.
EA
ease,
and
OU are
monly go together,
and
be A, or
is
I,
or 0.
Of
all
"
commonly
If,
and
very closely.
therefore,
we
is
E, then
letters
may
and
112
of
CR YPTOGRAPHY
most
usual
occurrence
see,
feet,
tool,
shall,
well,
miss,
and
loss
are
illustrations.
A
as,
common
begins
two-letters, an,
of,
and
at,
and
on,
or,
and
so, to.
or second letter
IT
a vowel.
always has
after
I.
it.
No
on
English word
terminates with
It is
may
is
There
disa-
no royal road
crimination
and unlimited
chieve success.
When
may now
or
certain
equivalents are
determined,
We
more
of
them
occur,
for the symbols standing for them, just put dots for the others until
and then
more
light
dawns.
Very often
this
proceeding at once
if
so
we have
OR CIPHER-WRITING
ters
13
build-
for instance,
tliat
we have
discovered by analysis
really A,
I,
X, L, and
are
tlie
words
FXLTNXO JPXPLBR,
as follows
:
we
set
tliem
down
AI
TATI
and
it
presently begins to
dawn upon us
tbat
fit
tlie
words "railway
station" would
just
in.
We
If
at
all
events
accept
liave
this
tentatively.
we
are riglit
for
we
added largely to
see
our
store,
we now
that
F must
"W,
really be E,
will be
T must
is
be L,
must be
Y, J N.
S,
must be 0, while
of three letIf
B, represents
Our knowledge
ters
we we
JQXTT, we remember
to
that
know
station
be really A,
has
led
and
to
our
railway
that
it
guess
S,
us
believe
is
really
if
and
is
L;
into
we
S
try
how
looks
we turn JQXTT
ALL.
This
suggests to us small,
stall,
and
shall, so
II
is
114
CR YPTOGRAPHY
either
or
not
stall,
H; we know because T we
One
will
tliat
tlie
Avord
is is
already
know
shown by P.
containing
shall read
Q
it
we
as
Z, the commonest
symbol of
E, and
all,
we have
often
decided at once to be
PQZ
so
recurs,
T E
there
is
evidently
THE,
is
not M,
for
is
is
no word
TMB,but
H.
JQXTT
analysis,
failure,
therefore
SHALL.
So by patient
sometimes by
sometimes by success,
sometimes by guessing
what
it
it
might
be,
we
step
pull
start,
by step press
on.
down a
wall finds
difficult to
make a
all
the
every
brick removed
first
making
of
work
easier.
The
insertion
the
skill;
blow after
fall
blow of
then
the
swinging hammers
it,
swiftly
upon
and
each
tells.
OR CIPHER-WRITING
until presently tlie great block of
II5
many
tons
in weight
is
riven in twain.
papers
on
deciphering,
entitled
David Arnold
introduction
Conradus.
After
proceeds,
general
curiously
to
he
first
enough,
in
an
the
English
magazine,
an
exposition of
Grerman
language, pointrecurrences
of
ing
out
the
characteristic
letters,
by
in
which
that
one
may
attack
cryptogram
language.
He
to
then
proceeds with
the
equal
thoroughness
analyse
Dutch
French,
of
language,
Italian,
then the
Grreek.
Latin,
English,
:
and
He
writes
"
The Art
Attempt
to
explain
it
with
by
this
1 1
CR YPTOGRAPHY
tlie
ing those of
Certainty of
it.
tlie
Art wlio
There are to be
ai'e
Men
to
of
assert
is
no Success
so
to
doubtful and
pronounce no
positively that
the Inter-
if it
ever can
be attained,
is
The Art
of Deciphering
"Writings
composed
Secret Characters, so
be exactly known.
it
diflBicult
may
its
may
is
under-
The Usefulness
Correspondences
may
be detected cannot be
OR CIPHER-WRITING
denied, nor
is
it
17
Study
of
it
that those
who
profess
it
are em-
War
particularly,
Liberality.
is
He
supposed
of
Knowledge.
He must
be in the
first
Place
what Letters
Word.
He
fre-
and
particularly
Latin,
which
is
most
quently
made use
of in secret Writings;
and
he
will
portion as
Knowledge
for
of
Languages
is
more extensive;
the
Decipherer has to
is,
in
which the
and by
this
Art are
to
"It
is
least the
Il8
tlie
CRYPTOGRAPHY
Sense of any Passage
may be more
easily
discovered,
Explication,
to
tlie
another.
Cryptography,
or
be understood, by which so
are
practiced,
so
many
Artifices
many
intricate
Alphabets
for Secrecy
formed, and so
the whole as
Man
advances
in
he becomes
"By
Accuracy
of
Method and a
just
is
Deour
cer-
are
to
be used
Truly our
author
magnifies
it
his
subject!
He who would
who
Primate of
all
shine in
would be a
man
or
might have
been Solicitor-General
not
England had he
chosen
OR CIPHER-WRITING
I19
says.
"In
Then the
rule
says
more Opportunities
Frequency,
remarking
of
the
Combination,
the
Letters."
One
would
have
man
what
old
need of
:
practically a repetition of
it
merely
matter
under
says
a
that
new name.
"
Another
are
proposition
The Vowels
therefore recur
is
most
freis
The
"
rule that
based on this
fre-
Some
of
his
suggestions
are
very good,
Thus
Ave are
gravely
told,
if
the writ-
120
CRYPTOGRAPHY
bad,
baf,
bak,
bal,
ban,
bas, bed,
bef, belc, bel, ben, bes, bid, bik, bil, bit, bly,
bos,
bot,
bry,
bul,
bus,
dag,
dam, dan,
dik,
dis,
das,
dit,
dat, dek,
den, der,
dol,
elf,
des, die,
doe,
eer,
dog,
eet,
dop,
elk,
dor,
dun,
erf,
dur,
djk, een,
end,
hundred
throiigh^
and
eighty-two
till
more
right
away
the alphabet
we
of
pull
all
up
finally at zyn.
Whether
be at
all
this
list
three-letter
words
Dutch
he
roundly
declares
that
any
three-letter
all
word
in that language
list
must, at
of
events,
gives.
On
many
omis-
sions.
The
words, for
instance,
beginning
with
that he gives
;
are
and men
but to these
we may
add
OR CIPHER-WRITING
mop, mow,
121
mud,
and mug.
As we have
only one
initial
letter
into
sixteen,
it
will
all
same treatment
should
be
extended
will
into
"Any
eight,
word
three
letters
be found to be
perchance,
it
may be
many
we have omitted
sides, in
Be-
any
If
it
letter
word must
necessarily
decipher
into
either one of of
list
of four or five
the
help
given
is,
after
not
of
great
122
CRYPTOGRAPHY
Setting up
as
value.
some
little
authority
to
on the
matter
ourselves,
we may add
these rules of
to
have
overlooked
that
all
words
be-
ginning with
will be
found to be either
that
commence with
The
letter
is
all
Statistical enthusi-
thousand
letters
in
of
prose, one
Aviil
hundred
in English be
This
are
is
matter
that
our
readers,
who
once
statistic
and
the
enthusiastic,
can
at
if,
check
from
page before
it
them,
indeed,
we may assume
to fulfil
should
occur
times
one hundred
thousand,
and
eighty-four
OR CIPHER-WRITING
mucTi
larger proportion
tlian
1 23
in
English;
"while the
i;lre
French
very
eight
are
lish;
close,
per
Spanish
and
Italian
sand
assigned
letter
to
Italian,
while
in
Spanish
occurs
one
hundred
all
and
forty-five
times.
Of
course,
these
numbers
are
necessarily
only
approximate.
The only
letters of
the former
coming out in
Italian
at about one
at
sand
letters
used
in
Italian
and
Spanish
An
old
fellow
us
tliat
in
124
CRYPTOGRAPHY
of the
some
in
of
tlie
the
correspondents,
and
he
CL
"
OR CIPHER-WRITING
endeavour to get hold of; and
tlie
1 25
final out-
confession that
at
is
it
least,
he never replied to
of
our communication.
The form
cryptogram
we employed
we
on postcards,
etc.
Pro-
days
have
played
to
" noughts
and
crosses
down
vertical
as
shown
in
13,
and place
in the
various letters of
far
it
as
they
use
Avill
As a matter
of
of
fact,
will
up
eighteen
lines
them.
Then
place
see,
two other
the right
X-wise, as
previous
we may
to
of
the
arrangement,
spaces
the
that
and in the
these
four
place,
intervening
also
make
eight
in
pairs,
letters
remaining
be
letters.
These
may
arranged in
126
CRYPTOGRAPHY
Should
it
any order.
that
trated
at
some
the
unauthorized
mystery,
to
shift
it
would
letters
merely
be
necessary
the
and
start
happily again.
This
shifting
would
be ar-
PW
OR CIPHER-WRITING
is
127
evident that
the
if
we merely
formula,
spondent
new
IP
into
W2 FGr
whose
avoid
fell
might reconstruct
it.
To
we
we
should use
These would be
letters
and
any
that
fol-
lowed them
we
should,
on
receipt,
merely
in
We
for
it
have
the
upper part
bination,
of Fig.
might run as
follows:
so
forth.
12r037CJ5LS910EA91M4UH, and
We
shoiald,
on getting
this,
draw
out
the
the
skeleton lines
and
lightly
number
construct
spaces,
and
then proceed
to
FO
LS
the
fifth,
we have no
To use
this
cryptogram,
we must
note the
The
central space in
is
diagram in Fig. 13
128
CRYPTOGRAPHY
space above would be
it it
a square, except
the
that
has no top
is
line
space to right of
also
threefor
being
;
incomplete
want
of
applies
the
all
space
round.
below,
the
left
and
so
on
The
X-like
figure
Vs
sideways.
first letter
each space
tliat
space; thus
letter
is
we
represent
by a dot
cross
the
space.
we have
placed four
where we please
J,
and such
or
little-used
X,
Z may be
also thus
non-essential
of Fig.
character.
13
is
we send by
our
it
" On
sat
the
at
mesthis
arriving
Frank
down."
Below
the
"
OR,
CIPHER-WRITING
Fig.
14,
this
I29
second
other
combination,
we
place
an-
communication; but
our readers,
find
no,
with the
difficulty
key before
in
them, should
for
deciphering
themselves,
so
we
leave
it to
them.
is
The following
from an advertisement
in
1892:
H-
NA-DX. SN gzud
.
vhkk mns
rzjc
vgzs
li
sgntfgs,
He
sghmj
ektqd
It is
!AKZQMDX.
of
is
is
really
is
really
"W,
of
and
one
so .on.. ..It
the
poetic
effusion
" Blarney
(AKZQMDX).
It read as follows
"I will not" say wtat I have thought, Or what sweet things may rise unsought.
If I could only be quite sure,
I-
I30
CRYPTOGRAPHY
:
" Ngv
og
mpqy aqw
and ease
cfcg
me know you
are safe,
my
tortured mind."
F was
substituted
G for
B,
etc.
The
story involved
must
its
appeal.
Three
know
work
some
thii'd
at once
came
an end.
That
this
penetra-
tion into
take place
that
one not unfrequently sees that a certain advertisement referred to was not inserted
the person whose
by
name
be
or other sign
it
bore.
We may
that .the
perhaps
allowed to
of
say
here
Ave
illustrations
decipherment
of the
" Cariosities
of
OR,
CIPHER-WRITING
131
we have foreborne
to
who make
use of cryj)to-
graphy do
measure
at their
own
risk,
and in some
may
is
base
to
do
that to
for
letter
may be
other
such meanness.
Some advertisements
so
are so abbreviated, as
much
into so
as, for
instance,
" so hpy in
fr
nw
hme, so
yr ftre."
wanting in accuracy, as used genewho have no proper work to busy themselves with, or who, having ifc, neglect it to attend
term a
little
to that of others.
132
CRYPTOGRAPHY
may
into
others,
a,
but
them
as
b remaining
and simply
are
letters that
and so on,
of the message.
to
For instance,
if
we
desire
away
once,"
it
rwnapyi astro
eniciel."
We
thus
could break
letters
it
up
run
into
it
or
into
one
it
might
read,
Rgoentlavwxalyvaft Polnjcien.
all
In either case
it
we
would
the odd
numor
and
then
read
off
what was
left,
put, as done
here, a
that
of
is
to count.
the
letters requiring
OR,
CIPHER-WRITING
"we
33
may make
tlie
tlie
letter
of tlie
first
word,
second of
one,
and so
on.
sft
pn
loc
ei."
By
this
means we have to
non-signifiit
This
is
certainly a
drawback, and
felt to
be so
all
the message to be
conveyed were at
devices, however,
a lengthy one.
Such
have
There
is
also
spared the
may
i.e., au accuracy of statement beyond question. The phrase occurs in a farce entirely called The Apprentice, and hit the popular fancy.
134
ritlimical,
CRYPTOGRAPHY
and Algebraical Arithmetick," pubyear 1684,
lished
in the
we
find,
following
this
remain unchanged;
is
if
A, and
we
replace
B.C.D.F.a.H.K.L.M.N.P.R.S.T.W.X.Z. by
Z.X.W.T.S.R.P.N.M.L.K.H.G.F.D.C.B.
mere
reversal of
of the consonants,
we
shall find
no
dijBficulty
By
this code
Constan-
tinople
would be
XOLGFALFILOKNE.
from a
man who
that
lutely
safe
cryptogram.
He
declares
to
"
when
a
the present
break
secret
out,
gentleman,
in
think upon
the
of
happened
the
to
hit
of
upon
kind
cipher,
properties
which
to
appeared
very
extraordinary,
not
only
him
but
also to
some
of
apt to
make
OR,
CIPHER-WRITING
35
rash
lay
conclusions.
He
tlierefore
without dein-
judging
it
might
prove
Measures
be waged
of
war
to
many and
so
removed parts
the world.
But
this attempt,
and likewise a
solici-
know
should,
properties,
them know
those
whether he
whole
due
affair.
The candid
peruse
artist,
having taken
time
to
those
writings,
made
and
answer
that
if
that he
could not
read them,
ascribed
136
CRYP TOGRA PH Y
art.
But
to
meddle further in
when he had
British dominions,
it
that he
could easily
sell
for a
sum not
Parliamentary reit
Ward, to which
many thought
entitled.
But
upon consulting
no crowned head
to purchase
his principles be
of
found that
monarch
of his
own
country.
and
reflecting that to
this
secret
may
happen,
by lying by,
himself to
and
hath
best
now
hit
upon the
and
this
means
is,
making
it
it
useful,
method
to publish
later,
century
we may
parenthetically
OR,
this,
CIPHER-WRITING
137
in
seat
the
Universal
Cryptogram
Company,
Limited.
He
saw
goes
on
to
say
that
" at
first
he
disappeared as
soon
as
the
following
:
rea-
First,
that
the Supreme
Wisdom hath
locked up every
in
his
man's
breast.
secrets,
own
Secondly, that
imitated the
Supreme, by
punish-
iment on those
secrets or letters.
who
unlawfully break
open
wUl
still
have
as
much
in their
power
as ever to suppress
all
And
this,
138
CRYP TOGRA PH Y
singular
of
convenience
and
advantage
to
only
private
instructions
upon lawful
busi-
of nations.^
to
publish this
art
but,
diffident
of his
made
the two
in
following
case
First, that
a true representation of
command
rejoice in the
hand with
so
And
country
' Surely in the breast of a patriot these two should be transposed, and the national interest placed first.
OR,
CIPHER-WRITING
139
than to that of
For, he
citizen
is
of the
till
city.
till
to do so.
And,
if
be so
good
evil
more
than good
will result
that
it
shall be
For
he
human
the
it
ills.
But,
if
no
sufficient reasons
then
think
delay.
duty to publish
it
without further
evil
or
more good
tion ?
result
"
it
The
can
Firstly,
be
wrote
offhand
it
in
the
common
characters.
Secondly,
140
CRYPTOGRAPHY
ing
it
are so
out further
help or
any
previous
practice,
to "write offhand
and read
at sight as
all
above
set
forth.
Fourthly, though
the
uien in
two
of
them, by
agreement u23on a
will),
small
"variation (to
be made at
correspond with
all
the
rest.
is
the art of
man
N.B.
That
that
it
may be demonstrated
impossible
to invent, another
inferior to
this
cipher that
shall
not be
by
many
de-
grees.
"
An
OR,
CIPHER-WRITING
is
141
the
hands of a prince,
that he
can with
letters
own
in
tents to ciphering
and deciphering
to
clerks, first
at home,
any person
whom
he
Another advantage
it,
is,
that a prince,
master of
every day at
will,
every variation a
new
cipher, absolutely
im-
who
are masters of
and
to all
human
sagacity.
of.
" This
these
to
art, if
realms, should be
:
communicated
the sole,
that he
so
may be
it
possessor of
to disperse
it
and
have
in his
power
to
only
as
his
And
the use of
ought
to be reserved
may be communi-
142
CRYPTOGRAPHY
an ai'camim imperii.
It sbould
for
be made
man
to
also,
it
should he
betray
it
he hath given
up
to
his
Majesty.
"
The
toil
and
delays
ciphers
hitherto
And we
by most
it
of
that
hath been resolved rather to pen them than to subject them to such
This cipher
delay.
is
in plain writing
ruinous delays.
all
exempt from
such
toil
and
hitherto invented
and found
best
for business
are held,
by
tlie
authorities
artist.
upon the
subject, legible
by an able
And
this
must be true
would
This cipher
is,
in every variation
im-
j)ervious to all
human
penetration.
The author
43
to
will,
except to
general
;
unless a dangerous
happen
friend,
to oblige in order
him
to
to reveal
them
to a select
for ever."
Whether
ment
this
were so
all
potent an instru-
must
for ever
nor
started where-
by the
secret
should
be kept inviolate, as
he himself suggested,
being told
it.
Perhaps the
its
progress
allow
summons
view of
objects,
mundane
itself,
may
all
have
befallen
him and
his
at
once
made
notification of
secret
a thing impossible.
144
CRYPTOGRAPHY
this
However
sufficient
may have
that
all
been,
we have
the
fact
is
clue to the
wondrous
cryptogram
It
was long
of
Parliament.
In the various
series
of
the.
Gentleman's Magazine
in
we
find
" Proceedings
the
considerable length
The names
Names
Lilliput," in
names
Climab
are
is
Hurgo
of the
is
a Lord,
of
and
;.
member
House
Commons
spoke
was
on
by
Lords
Abingdon,
and Cartaret.
at.
OR,
CIPHER-WRITING
1 45
Pbe mil
cryptography
The
G-old
Legrand
of
art
of
enormous
of
gold coins of
fine
diamonds^ eighteen
by means
of
an old parchthereon.
this point
have
cm
cryptography
The treasure
to
in
question
was
supposed
ious
Half
buried
in
the sea
"
We
146
CRYPTOGRAPHY
was found, and on
tliis
of parcliment
some few
mysterious
markings
were Boted.
On
the
application of lieat
this
parchment revealed
cryptogram, and
lines of
be the clue
The
direc-
and then
from
at a certain distance
and direction
a vigorous digging
the massive chest
which
holds
this
ill-gotten
lost
wealth.
The
piratical vessel
was
manned
it
memorandum found
desolate shore
of
of bringing to
The
story
itself,
at length
to
;
hunt
all
it
up
in
any
collection of
Poe's works
that
now
OR,
CIPHER-WRITING
47
concerns ns
is
out in detail, as
story.
it is
full
is
length in the
it is
The weak
point in
that
not
would
literary
concoct,
while
it
is
exactly what
to the possibilities
of
the
put
together.
Thus we
dagger
(t) representing
D,
dagger
is
(J)
being 0.
The
(;)
parenthesis mark,
is
(,
representative of
T.
The
interrogation
mark
(?),
53Ut305))6*;4826)4+
The
decipherment of
is
this
abstruse
memor-
andum
believe in a present
is
148
CRYPTOGRAPHY
all
Probably
on
tlieir
gate-posts"
mysterious
clialk-marks,
tbe
cryptographic
successors
what
fate
their
appeal
for
soft-
alms
may
The
hearted,
and
perhaps
little
soft-headed,
householder
who
falling
off
little
in
the
stream of
since
the
white
to
mark on
brinig
always
suffice
man
who
mark on
his door
is
an intimation that he
circle
visitors, the
to
man
who
is
OR,
CIPHER-WRITING
1 49
Business
of
is
We
should
man was
fair price
prepared
proper
article at
and pronot
he would
feel
it
any
difficulty
need not
If for
is
less legiti-
mate, he
ful for
unable to do
is
need-
him
to
the
letters
are
different,
letters
seriatim will
0.
123456789
we
us 27/6.
With
this
key before us
will cost
marked MG/JST
We
man
pushing business
I50
CRYPTOGRAPHY
An
energetic
who
its
terms.
As
he was prepared to
same price
his
to all comers,
cryptogram or
The
result
irritate others
it
would
call at-
nam
siht,
Uiw
si
Hams
oreneg
levon
fi
ton gnitseretni.
Ti sekat
yromem;
wef
senil.
Ew
OR,
CIPHER-WRITING
uoy yam wonk
elit
15
seotatop, OS taht
fo mehtj
eurt eulav
i
melit,
leef erus
Sa
wonk
eht seotatop
doog
evali
on
uoy
ym
suoreneg
sgnillilis
dna ecnep"
! ! !
xis
dna
ym
tseb seotatop
spelling,
little
practice
it
of
out very
"
after reading
you
and
generosity
novel
if
not interesting.
It takes
memory
few
this is the
lines.
We
potatoes, so that
of
siire
you
will repeat
52
CR YPTOGRAPHY
time.
As
know
my
my
best
We may
we
and that
which nevertheless
as follows
:
advertised,
"
STI
CKPH
illus-
As one more
the following
advertisement
My
og ot Nospmoht,
Daetspmah Daor."
And
!
that
we
gram
on,
CIPHER-WRITING
is
153
he be
a smoker, he
his
may
find
due replenishment of
of
pouch.
the crypto-
gram
present no
is
that
We
turies
to the
shopkeeper of
the
Hampstead Road.
Our
not been,
we
trust,
it
will
at least have
has taken
its
fall
and that
it is
something more
154
CRYPTOGRAPHY
shield to the
knave or
A
F)
Vy
Fig. 15.
We
cation,
turn
now
communi-
and the
first
of these
is
that
known
as
OR,
CIPHER-WRITING
is
155
the "grille."
It
short communications.
re-
ceiver are each in possession of a similar piece of cardboard, and this cardboard
is
pierced with
The sender
then writes his message through these openings on to a piece of plain paper that
is
placed
fills
beneath.
He
up the
any other
letters
off
the scent.
The
and reads
him no
distraction, since it
hidden by the
Sometimes the
to
message
is
veiled
by the addition
it
of
into an
is
entirely
but this
very
'
difficult to
do properly.
;
Any
in
indication
la France, Le
chassis or la grille
Germany, Neiz
or Gitten.
156
CRYPTOGRAPHY
fJ.
,
1
-^
COi...EEl....
01^,
CIPHER-WRITING
57
it
distribution,
of ingen-
make
the
it
were merely an
tennis.
for lunch
and lawn
It
is,
the message
is
and then leare the objectionable third person to get such comfort as he can out of
Fig. 15
uses,
it.
and
duplicate.
16
represents the
message,
"
Come
it
as soon as
to Louth,"
grille is
it
as
placed upon
while Fig. 17
is
hovF
looks
when
dispatched, and
how
it
The dotted
may
trace
more
readily the
:
they
158
If,
CRYPTOGRAPHY
however, we did not care to risk sending
make one
VIGOR
IVIEF^I
C/\STO
soREoHic pasyLyo
UpTI|slNOSP
SiHeBL
EST rVh
Fia. 17.
IE
himself or herself, as
it
would only be
in
necessary to
know which
squares
each
row were
pierced.
OR,
CIPHER-WRITING
159
sent arrangement
we
second, fourth,
and
then
we
of
take the
the
number
it
would be easy
to
five
could be
would
run as
foUows: 124703146802136804246061357.
We
4 and 6
in order after
the
entirely
all
we have a
all
it
suspicion
is
known,
to turn
being
now
new
l6o
CRYPTOGRAPHY
contrivance,
similar
the
still
" revolving
grille,"
tliougli it is
grille this
perhaps
more puzzling.
The
in
it
made
^O
OR,
CIPHER- WRITING
l6l
round one)
whole message.
To use
this grille,
we
first
Pig. 19.
AB
is
upper-
we
place as
still
many
keep-
We
then,
l62
CRYPTOGRAPHY
grille so that
turn the
BD
is
and
in these
new blanks go on
our
We
it
DC
and
is
and proceed
as before,
finally
we
give
OA
we
to the
see in
The
result
is
a very hopeless-looking
mixture of
20.
letters,
is
the effect
we get
in
Fig.
This Fig. 20
sender dispatches
it,
it,
and
as
it
appears to
who may
see
it.
To
full legibihty,
the receiver
it,
grille
and places
AB
its
He
grill until
BD
is
The next
and the
turn,
DO,
tells
him "
another we,"
final shift of
the card to
CA
as its
OR,
CIPHER-WRITING
163
J.P."
Fig. 19
is
how
made by
64
CR YPTOGRAPH Y have
already
in Fig. 9
We
is
sliown
what
technically called
the
cipher, a
now have
in
Fig.
21
another
arrangement
it
works out
somewhat
differently.
To make
we
we
longitudinal
in
it,
so as to about divide
three
equal portions.
the letters
On
of
the the
We then
card
is
on the
first strip.
This second
in
divided into
squares,
and
these
squares
we
way we
letter shall
the
About four
slip
of these
columns
suffice.
We now
of these
columns alongside
OR,
tlie
CIPHER-WRITING
tlie
165
If
alphabet on
tliis
thin strip.
we
con-
tinned to use
it
column,
evident
any outsider
stood for
;
what
letter
A
we
or E, and so on
but
can
as
we
like
during
of
the
making up
sage,
so
our mes-
that
is
no
next
be D, and then
it is
presently
on.
T, and so
The
shifting
must
or
the
message
go chaotic
at
to
him, so that
the
by
its
proper
i66
CRYPTOGRAPHY
to.
have clianged
2, 3j
and
4,
the others,
being used
to separate
as blinds
words.
If then
we
be too
late," it
It would, of course,
obvious that
should be
1,
and
2,
and
so'
on; but
little
more
being 26,
very
little
in
9. 15 22
7,
14 22, 8 22 13 23, 24 12 9 9 22 8
OR,
CIPHER-WRITING
4 18 15 15, 22 3 11 15 26 18
167
13,
12 16 15 22 20
19 12
4, ?
22, 11 7,
8,
19 18 18 20
7,
12 26 23, 13 22 3
As
the matter
is
now
we
XY
E,.
will ex-
how
things stand.
go abroad next
.
month."
its
faulty in
having
letter,
and
up by commas
into words.
These
The
numbers
six,
too, never
of the alphabet.
we have
seen, in the
is
Stuart times.
The
is
best arrangement
still
more.
It is better, too,
i68
CRYPTOGRAPHY
The message
no need to
tlien
runs continuously
off
tlie
tliere is
comma
Should
is
at
numbers
is
readily effected.
as
an
illustra-
70.
J.
S. 48, 35.
26, 27.
K.
T. 82, 58.
C. 31, 52.
L. 32, 36.
D.
83. 65.
M.
W. 33,
Y.
81.
X. 67, 96.
89,- 97.
H.
I.
Q. 33, 57.
Z. 24, 45.
R. 69, 39.
This
is
the sender's
list;
first,
OR,
21.
CIPHER-WRITING
69
170
letter
CRYPTOGRAPHY
he wants ; L, for instance, being either
32 or 36 are equally
is
L.
thus at
in-
once thrown
stance,
the scent.
He
knows, for
that double
;
is
a rather
common
termination
letter is repre-
and
this
sometimes by another,
double L.
he
cannot
find
48223236 or 35303632.
He
knows,
;
too, tliat
B
it
is
the commonest of
all
the letters
but when
may be
As our
detecting
but small.
we
for
hand over
decipherment
224247412680627769239834823
043393565218933344190.
By
the alphabet
letters
each,
letter
and
thus
each
these
rows
is
also
OR,
CIPHER-WRITING
would be
tlie
17
marked.
C, for instance,
third
be
of
g,
while
would be the
group
of
five,
the
second
-^
and would
therefore be
regular alphabetical
arrangement
tell-tale.
would be
The
figures
The number
of the
row
is
is
the posi-
as
follows v
QaALV; PKFUZ;
this code
5
'5
DHNRX;
:
BIMSY;
EOTWC.
"Constantinople"
by
75^23^512
58 3 2 5 4 1 5 2 3 49 3 3 83 390 1 38 2 10 4 17'
This
that
bols
is it
It will be seen
of
thus
the
thrice
172
CRYPTOGRAPHY
occurring
of this
word
is
As an
4 29 4 38 27 47 18 3 17 1 i9
4'
is
that
of
For
this
The message
following
way
Come
43 14
311314
at
once to us
C we
31
43
We
now proceed
message for
use the
it
instead of
it,
we employ
of
and instead
the
from
it,
while for
E we recommence
there-
by taking
alphabet from
fore read
GRNI DU SQDI
WP
YV.
Here
is
again
it
same symbol
OR,
CIPHER-WRITING
73
letter.
is
in one part of
Gr,
and
in
is
R, or S,
Of
we took 513
as the recurring
num-
we introduced
gram would be
first,
is,
we need
composed of four or
five.
Thus
we
3
1
Oome
3104
23
at
once
The
1042
o u s
being,
FPMI
CW PNGG WP UW.
we pass on
and good
to our readers:
KM-HSV-PQCQSHis
CJFO-LWJ.
The system
a very simple
one, the
letters
are em-
174
CRYPTOGRAPHY
when read
right,
in
some
special
way
to
left
left,
to
up-
wards, or
downwards, or diagonally.
They
OR, CIPHER-MERITING
175
way
is
to
wrap
tlie
letters
up
amongst
some
message
ABC
176
CRYPTOGRAPHY
type
tlie
a different
in
thougli
very
fet
last
that
is,
of
course,
practice,
thing
we
'be
should
it
do
si
tels
wi
so
U sigh
lo
o sigh
ri s
far
sign
has in
ro'
smu
sip
peps ndo
ex.
see tomo ss
ped
ow
is
one fairly
our store,
it
to
add
to
we
is
give details of
it.
At
by no means
so
good as some
on.
it is
the
is
others
we have
dwelt
square
divided into
From
subdivided into
of
In the
the
first
these
F,
we
ABO,
in
second
DE
in the
We
in
then
from one
tirely
to nine, disposing
them
way.
an enIn
our
irregular
and
it
casual
will
present example
OR,
CIPHER-WRITING
177
numbers run as follows: 47.3.8.1.5.2.9.6. In this key a plain 4 stands for A, a oncedotted 4 for B, and a twice-dotted 4 for C,
and
so
on
all
tlirougli.
Soutli
Kensington
m\.
id
ml
178
CRYPTOGRAPHY
If
number.
any
treachery
or
underhand
work were
stitute
bination.
If
copy each of
dictionary, they
same
edition
of
a good
may
in
be able to communicate
cryptogrammic fashion,
is
though
fairly
the
method
words,
only
is is
available
of
for
common
and
no use for
proper names.
not the word
finds a certain
The method
itself,
to write doAvn
number
back or
for-
ward.
ing,
off
the warn-
" Get
of
away soon
these
as
instead
in
we
find
So
our
message
reads,
" Glesticulator
awakening sonneteer
artless
yolk camphor."
is
in Fig. 23 in Fig.
ingenious,
that
shown
13;
but
we
our-
thinking
them
over
devised
OR,
CIPHER-WRITING
tlie
179
selves a combination of
will give
two, to which
we
the
name
of
is
the
Newark
crypto-
an improvement on
Figs. 13
and
2(3
we
have
as
being
It
somewhat
clearer
and more
is
definite.
seems to us
in
that
it
rather a
weak
point
Fig.
23
letters
into
threes,
as
in to
second
E.
Having
got,
as
in
Fig.
13,
may be
please.
disposed in them
any direction we
The
six characall,
ters in
for
in-
angle,
and
within
it
three
lines.
By
this
little
ingenuity,
we
r8o
CRYPTOGRAPHY
twenty-six
letters
get the
of
our
alphabet
different
is
represented by
symbols.
over
two
hundred
letter,
being the
line,
first
repre-
sented by one
the
third
T by two
lines,
and L,
being
letter,
by three
lines; all
is
the
first
letter,
and
there-
fore one-lined;
two-lined
three-lined, in
direction.
have preceded
stant
it,
the
E and
therefore rendering
more
One
is
60 simple in character
is,
and so
OR,
CIPHER-WRITING
are
l8l
read.
The dots
absolutely meaningless,
at
and are
merely put
random
as
blinds.
The
intimation
given beneath
:
the alphabet
in Fig. 25 is as follows
is
simple in character."
\\jyvLi\:\'\vs'rA
ABCDEEE.FCHiJKL
z
A>v<r^m-/\^\i
MM 0PQR5TUVWXY
Fig. 25.
"
cipher
is
a very good
the
same
letter
being
represented by
this
different
characters.
To work
out,
we
upper edge of a
of ruled
squares
l82
CRYPTOGRAPHY
side.
one
In
tliese
squares
we
the
squares
are
filled.
The words
(see
we have
this,
thoughtful "
squares
therefore,
mean
ten
wide
and
:
ten
deep,
one
hundred
squares altogether
bet
so that
we
repeated
in
full
three
times,
and only
see
We
now,
by referring
to E, that
it
may be
either
NT,
OU, RH,
or
DU,
while double
at pleasure.
still
S would be Of course,
is
LH,
NG-, OF, or
RL
that
to say,
key- words
still
more
combinations
present
number
is
There
is
number
given us
squares,
and
that
would
have meant
that
over,
the
alphabet
would have
thrice.
come twice
It
is
and a few
letters
OR,
letters
CIPHER-WRITING
be words at
all;
83
should
one might
useful as
84
to
CR YP TOGRA PH V
our
we send
correspondent
tlie
words
on a post-card, no
lie
aroiised,
and
at once proceeds
make
his key, so
many
so
many
them
in with
Bach
real letter
message
is
and
into
then,
by the
it
ordinary wording.
append
day
is,
equally well
have been
lUOGILNT.
Whether
OR,
sufficiently
CIPHER-WRITING
foi'
85
all
practical
purposes.
The
subject
is
interest of
abundant
ingenuity
that
of
the
art
has
called forth.
secret writuses,
to
ing
may
it
be turned to
basest
many
creation
of
puzzledom
such that
while
its
is
knowledge
may
save
hundreds of
lives,
itself.
or avert
INDEX
" So essential did I consider an Index to be to every book, that I proposed to bring a Bill into Parliament
to deprive any author who published a book 'without an Index of the privilege of copyright, and, moreover, to subject him to a pecuniary penalty."- GampheU's ^' Lives of the Chief Justices of England."
A.
"
" Ars
Scrihendi Gharacler-
and
" cipher of
Lord
Bacon, 103.
Astronomy, perverted in
advertise-
its
Abbreviated
ments, 131.
aim, 12.
Abbreviation
tions, 64, 65.
of
inscrip-
B.
Backs
Bacon,
of
slaves a writing
surface, 53.
of
the
cryptographic
enthusiast, 101.
Alfred
Great, secret
Alum as
39.
Bracelet
alphabet,
96.
how
in-
made,
Brass,
Arbitrary
writing
upon
visibly, 46.
i88
C.
INDEX
Cooper, Mr., as a decipher-
Camden
Society, reproduc-
" Century of
the, 82, 94.
Inventions,"
early book
" Characterie,"
Naseby, 69.
Count Grousfield's
172.
"
cipher,
OryptograpMa
the.
denudata,"
Charles
I.
a great believer
of,
Chemicals, use
ing, 55.
in writ-
D.
Daotylogy
16.
or
finger-talk,
of,
Derivation of cryptography,
11.
form
of
Conrad us on
art
of
de-
Dutch
three-letter
words,
cipherment, 115.
119, 120.
INDEX
E.
189
arabic and
Gum
gum
tra-
gacanth, 42.
Egyptian hieroglyphics,
120.
18.
H.
Head
of slave
as
writing
for
Herodotus as an authority,
E.
Fig-tree juice as an ink, 42
24.
Hidden,
not
necessarily
secret, 25.
Flight of James
82.
circle.
18.
French Revolution,
G-.
the, 14
Human
Toice
shut up in
tube, 16.
Hurgoes and
in writing,
Magazine,''
I.
Climabs
in
Galls,
nse
of,
Parliament, 144.
ma
Inscription
in
country
church, 75.
Poe, crypto-
" Gold
Bug " of
in,
gram
145.
Jangling
of
bells
as
Juniper
juice
as
writing
material, 39.
X90
K.
INDEX
'
Newark
179.
"
form
of cipher,
Nitrate of silver,
alplia-
use
of,
Knotted
bet, 95.
string "
56.
L.
NuUes, or non-significants,
72, 97, 110, 133.
Numbers, use
of, in ciphers,
graphy, 13.
" lues
0.
occultes
Notes
des
Lettres," 33.
Siplomaticum ,"
its
tography, 12.
O, largely used in Italian
Litharge,
use in secret
and Spanish,
"
110, 123.
writing, 39.
" form of
cryptogram, 104.
M.
Marquis
of
Worcester's
of Scots' use
Mary Queen
of cipher, 82.
P.
use, 66.
round
"Mirabeau" form
170.
"
of cipher,
of,
63.
Pharamond, a cryptograph" of
ist,
Monas Hieroglyphica
Dee, 30.
26.
Pigeons as message-bearers,
52.
N.
Naseby, battle
" Natural
145.
of
Magick "
Polygraphia
graphia, 27.
or
Stegano-
Porta, 38.
INDEX
Porta
191
of,
on cipher writing,
as
Smell, sense
used, 94.
28, 33.
Soot
subject
of
or
dust
revealing
Potatoes
for
'
messages, 41.
cipher, 150.
]
Pahlication
from, 129.
Steam
83.
engine,
germ
of the,
Steganographia, 27.
Rawlinson
21.
on
Sheshach,
cipher,
message
wrapped
round, 47.
String, message
of,
by means
use
of
99.
"
Ribbon messages, 95. Ring " cipher, 87. Royalist and Parliamentarian, 14. " Rule " form of cipher, 87,
92.
S.
Suetonius,
early
cipher, 24.
Sulphate of copper as an
ink, 57.
Symbolism
of action, 15.
T.
to
Scythian message
sians, 15.
Per-
Sheshach as a cryptogram,
20.
I
Shop
'Times,"
Tramps and
advertisement
their signs, 148.
" Siglarium
64.
Romanum," the,
ships
signal
cryptograph-
28, 104.
Sinking
of
Tudor
code, 69.
togram, 164.
181.
192
Tyronian symbols, 62.
INDEX
Vowels,
the
commonest
letters. 111.
W.
Watch-fire signals, 16.
Vinegar
and
Titriol
as
Writers on
27.
cryptography,
Cutbr
S:
Tanner,
The
Mm
illlliWIIIt
mm
'^^^"iilf
',
,
,
...
.,'!i.t,.,i!>'...,l.V, ,, tills
WJl*