Quantcast
Channel: Cipher Mysteries
Viewing all 843 articles
Browse latest View live

At last, the secret history of that dead cipher pigeon…

$
0
0

I spent last Saturday at the National Archives in Kew, accompanied by fellow programmer Stu Rutter who is just as fascinated by the whole pigeon cipher mystery as I am. Between us we did a kind of “Extreme Programming” two-man research team thing, where every time one found something unexpected or cool or had an insight, he would call the other over to see, or we’d both go downstairs to the café and discuss where we’d got to over a sandwich or whatever (reminder to self: don’t choose the double chocolate muffin again, it wasn’t very good).

The big result is that we ended up (I’m pretty sure) working out the secret history of this dead pigeon… and we didn’t even need to break its cipher (though Stu’s still on the case, more on that below). I’ll divide the overall argument down into a series of individual steps so that any passing Army historian who wants to take me to task over any detail can do so nice and easily. icon smile At last, the secret history of that dead cipher pigeon...

1. Percy was an Army pigeon

I was already pretty sure of this: when I looked up all the “A Smith”s in the armed forces, every single “Serjeant” [with a 'j'] was in the British Army. But what emerged at the National Archives were two widely-distributed pigeon-related documents (one from 1941, the other from 29th Jan 1944) that made it absolutely clear what different colour pigeon-carried canisters meant:
WO 205/225 – see pages 1/2/3 (at the back of the folder)
* Red = US Forces + British Army
* Blue = US Forces + British RAF
* Blue with coloured disk = British RAF
* Blue with white patch = RAF
* Red with coloured disk = British Special Service
* Grey = British Special Service
* Green = British Special Service
* Black = British Civil Police
* Yellow = British Commercial

Hence our dead pigeon was an Army pigeon; or (to be more precise) a NURP pigeon commandeered by the British Army.

2. The signature is that of Lance Serjeant William Stout

Knowing for sure that we’re looking at an Army message helps us narrow down the list of suspects to (I’m quite certain) one and only one individual – Lance Serjeant William Stout of 253rd Field Company of the Royal Engineers (as predicted here before), whose war grave says he died on 6th June 1944, the day better known as D-Day. You’ll read far more about Stout further down…

3. The pigeon was sent from France by a French speaker

I’m 99% certain that the “lib. 1625” writing on the cipher message was short for “libéré” (released) in French, and hence it seems overwhelmingly likely to me that the pigeon was released in France. But because there were no Royal Engineers at all in France (or indeed in Holland or Belgium) between the Dunkirk Evacuation (27th May 1940 – 4th June 1940) and D-Day (6th June 1944), the pigeon can therefore only have been sent either on or before 4th June 1940, or on or after 6th June 1944.

This gives us two “bubbles” of historical possibility to consider, the first ending with Dunkirk, the second starting on D-Day. How can we possibly tell which one of these was the right one? And can we be even more specific?

4. The pigeons were not released on or before Dunkirk

We’re helped here by the two pigeons’ ring tag identifications. Pigeon “NURP.37.DK.76″ was the 76th pigeon to be ringed in 1937 by the DK (probably Dorking, we think) group of NURP [National Union of Racing Pigeons] pigeon fanciers, while “NURP 40 TW 194″ was the 194th pigeon to be ringed in 1940 by the TW (almost certainly Tunbridge Wells) group. Yet having now read up on war-time pigeon-breeding administrivia at the National Archives, I know that (a) pigeons don’t normally breed in Winter; (b) pairs of pigeons will typically produce up to three pairs of eggs in a year, starting in Spring; (c) a young bird aged 6-8 weeks is called a “squeaker” and needs a fair bit of training before it is ready to race; and (d) pigeon races held in the first part of the summer almost never involve pigeons born earlier that year.

Hence if pigeon “NURP 40 TW 194″ flew on 5th June 1940, it would have had to have been born in the middle of Winter right at the start of 1940: and the chances of there having been 193 other birds born and ringed earlier in 1940 among a single group of lofts around (say) Tunbridge Wells are extremely close to zero. Once you look at it like that, I think that there is no real chance that this pigeon was sent back from the Dunkirk evacuation, because it would simply have been too young.

5. The pigeons were released on D-Day itself – 6th June 1944

Here, the letter and number groups in the ciphertext itself give us the clues we need. Having also read up on the multitude of Army ciphers used in WW2 at the NA, I’m 99% certain how the structure of the wrapper around the cipher was contructed. Firstly, whatever system was employed for the cipher itself, the AOAKN letter group (which appears at the start and at the end of the message) is very likely an obfuscated or enciphered key reference for the message as a whole. And if this is right, then 1525/6 must surely hold the time and day of the month the cipher was sent at. “1525″ = 3.25pm, “6″ = “6th June 1944″… i.e. D-Day itself. But as we will see with Lance Serjeant Stout, this is the only day he could have sent it… though not quite as simply as you might expect from his gravestone.

6. Lance Serjeant Stout was mortally wounded on D-Day, and died on 28th June 1944

Right before the National Archives closed on Saturday, Stu & I managed to sneak a few minutes with the 1944 War Diaries for 253rd Field Company in the locked room at the back (someone else had put these diaries aside for photocopying this precise page, which made Stu and me both wonder if he or she might be a Cipher Mysteries lurker? Well, a big hello to you if that’s you!). Here’s what the entry for D-Day says:-

d day At last, the secret history of that dead cipher pigeon...

Well… not really very informative, you might think at first glance. Yet here’s where Stu Rutter really shone: having taken a photo of every page for June in these War Diaries, he then checked them all that evening and was pleasantly surprised to find an informative entry discussing Stout on the 28th June 1944:-

stout At last, the secret history of that dead cipher pigeon...

From this, we know for sure (a) that Stout was indeed in Normandy on D-Day; (b) that he was mortally wounded near Hermanville-sur-Mer (where he was later buried in the War Cemetery); (c) that he died of his wounds on the 28th June 1944; and that (d) he was in No. 2 Platoon. Stout was an NCO (“non-commissioned officer”, i.e. someone who had advanced through the ranks, rather than parachuted in from a public school fast-track), and at 37 was doubtless older than most of the men in in his Field Company. As my friend Ian suggested, perhaps this helped make Stout something of a father figure to many, for I think there’s definitely a warm combination of respect and fondness at play in this latter entry, quite a contrast to the consciously dry detachment evident in most of the others.

Combine what we know from this with the entry for 6th June 1944, and we can see precisely what Stout was doing on D-Day: assisting the tanks of 185th Infantry Brigade as they tried (unsuccessfully, as it turned out) to push inland to take the town of Caen by nightfall. But… what happened to 185th Inf Bde on D-Day?

7. Meet the unnamed NCO who spiked them all.

Having gone looking for a history of 185th Infantry Brigade, I found this web-page from a group of historical re-enactors who have a particular interest in that very brigade on that very day. Essentially, according to their accumulated history of events on D-Day, what happened is that around about 2pm, 185th Infantry Brigade’s advance was being held up by a group of Germans shooting at it from the cover of some woods. It needed help to make progress against these very well dug-in defences. The web-page continues:-

Eventually a Pole was captured who knew the way through the wire at the back of the battery. The gunners fled into the woods, harried for some hundreds of yards by the Company. The guns were then blown up by an unnamed N.C.O. of the Divisional R.E.s, who, though badly wounded, succeeded in “spiking” them all.

Who was that “unnamed NCO”? Unless anyone can demonstrate otherwise, I think it’s not being overly romantic to believe that this man was Lance Serjeant William Stout – he was an experienced NCO in the Royal Engineers, he was in No. 2 Platoon assisting 185th Infantry Brigade outside their temporary base in Hermanville, he was badly wounded, yet he did the right thing in obviously difficult and trying circumstances. If anyone can be said to be “Stout-hearted”, it was surely him.

8. What kind of cipher did he use?

According to diagrams in the documents we found in WO 193/211, Royal Engineers were only supposed to use low grade ciphers in the field. But which?

One likely candidate is the Double Transposition Cipher (introduced 5th Nov 1943 in document 32/Tels/943). Yet one problem with Double Transposition as a candidate here is that encipherers were required to finish up the message with a pure number group containing the number of letters in the cryptogram followed by a forward slash and the day of the month (i.e. “179/12″), which plainly wasn’t what was used here. For a number of reasons like this, Double Transposition was thought to be “difficult and slow to operate”… possible but not ideal for use in the field.

The other major possibility here is the low grade “Syllabic Cipher”, a system I unfortunately failed to find described in any of the National Archives documents I looked through (which, let’s face it, do tend to be more administrative than operational). However, I do know that this cipher used a book marked “BX 724″, while the Royal Engineers had their own specific version marked “BX 724/RE”: these presumably comprised tables of syllables, which were then offset / obfuscated using a key from a Daily Key Allocation List. Stu has already gone off looking for anything like this and/or any other information on the Army’s Syllabic Cipher, but please email me or leave a comment here if you know where in the archives to find more information on these!

9. After all that… what did Stout’s pigeon message say?

It’s 3pm in the afternoon of D-Day. Lance Serjeant William Stout has just destroyed the arms of a German battery to help clear the way for 185th Inf Brde to move on towards Caen. He’s wounded. He wants to get a message back to his field company, but radio traffic has to be kept to a minimum. My best guess? 185th Infantry Brigade have brought with them some pigeons and a bilingual (but English-born) translator who is also a pigeon fancier. Despite his pain, Stout writes down his message and he (or someone else) rapidly enciphers it using a Syllabic Cipher (or possibly a Double Transposition Cipher, though I somewhat doubt it). This contains 27 groups of five letters, i.e. up to 135 plaintext letters – roughly 25 to 30 words. So, perhaps we can guess it says something along the lines of… SPIKED ARMS OF GERMAN BATTERY OUTSIDE HERMANVILLE 185 INF BDE NOW MOVING FORWARD AM BADLY WOUNDED TELL WIFE AND CHILDREN ETC. He starts copying the enciphered message onto the form at 15:22 (British Time), finishes copying it at 15:25, passes it off to the bilingual pigeon fancier, who signs them off at 16:25 French Time, places them in red Army canisters, attaches them to a pair of commandeered pigeons and then releases them.

However, it’s worth remembering that of the 16,000+ pigeons released on the Continent by SOE, I believe that only around 1,250 returned safely. So perhaps unsurprisingly, it could well be that one of these two pigeons failed to make it back at all; while the other did make the 136 or so miles back to Bletchingley, which I suspect will turn out to be remarkably close to its home loft: flying at 45mph or so, the bird likely took about three hours. Yet as it briefly rested there on top of a roof at about 6.30pm at the end of what had been a thankfully clear day (or else D-Day would have been an unmitigated disaster!), could it be that someone in the house below lit an evening fire in a hearth, unknowingly sucking the poor pigeon to its death down in the chimney?

* * * * * * * * *

All of which makes a great dinner-table story, with the added bonus that a fair proportion of it is certainly true… but will this turn out to be the whole story? Perhaps we’ll find out before too long… fingers crossed that we do! icon smile At last, the secret history of that dead cipher pigeon...

Incidentally, has anyone tried to trace Lance Serjeant William Stout’s son (also William Stout) or daughter (Urula Stout)? Perhaps they already know even more about this than we do… I for one hope they do!


“The Roger Williams Code” cracked (the old-fashioned way)…

$
0
0

A fulsome hat-tip to Flavia H for bouncing this rather nice Slate article on in my direction. It tells the story of how Brown’s student Lucas Mason-Brown managed to crack a 17th century shorthand system, one that had been used to squeeze a whole load of notes for an unpublished religious book on antipedobaptism (“opposing infant baptism”, if you’re interested) into the margins of a 240-page printed book after about 1679.

Its author was the theologian Roger Williams (as you may have guessed from the title), who was one of the founders of Rhode Island (hence the interest from Brown’s University, and in whose library the book sits). Incidentally, Williams was best known for his books “A Key Into the Language of America” (1643) [a little dictionary of Native American words], and “The Bloody Tenent of Persecution for Cause of Conscience” (1644) [which persuasively espoused the principle of absolute liberty of conscience], the latter of which caused Parliament to order “the public hangman to burn the book”. Really, anyone who can be that annoying in print is more than OK by me.

As to the importance of all this, I’d fully agree it’s hard to talk up unpublished 17th century notes on antipedobaptism: all the same, it’s still a nice slice of research, with history and sleuthery in equal measures – so what I want to say is “well done, Lucas, great job!” Next stop the Anton Transcript? =:-p

2012 Advent Calendar Day #10: Book theft with climbing rope…

$
0
0

Earlier this year I found a true story about an obsessed book thief and a high-up monastery that I loved & wanted to share: all of which (in a funny sort of way) brought to mind Allison Hoover Bartlett’s very enjoyable (2009) “The Man Who Loved Books Too Much“, which would be a nice Christmas gift for a bibliophile (I already have a copy, so it’ll just have to be Belgian chocolates again this year, *sigh*).

It’s a tale of how local teacher Stanislas Gosse found an old map in the Strasbourg city archives showing a nearby monastery’s secret stairways and passages, and then decided to go exploring. He ended up in an room in the library locked to the outside, and impulsively decided to take some books and carry them down the mountain – he ended up with a thousand books in his flat before finally getting caught. Of course, he never sold any, it was more a private obsession that grew for the thrill of it than for anything as sordid as financial gain, I suspect. Anyway, a great little story… enjoy! icon smile 2012 Advent Calendar Day #10: Book theft with climbing rope...

Dead WW2 pigeon cipher cracked with WW1 codebook (says the Mail)… errr, really?

$
0
0

According to today’s Mail on Sunday, Canadian expert Gord Young has cracked most of the dead WW2′s pigeon’s cipher message using a WWI Royal Artillery codebook. It’s not a big old message, so let’s line up the decrypt for ourselves, shall we?

What is immediately clear is that
* The decrypt is done down columns of groups, not along rows of letters (…which isn’t how it was usually done at all)
* Each five-letter cipher group is presumed to be a completely independent initial-based sentence (…which isn’t etc)
* Each independent sentence’s decryption is guessed at somewhat hopefully (…which isn’t etc)
* “J” mostly codes for “J[erry]”
* “Q” pretty much always codes for “[Head]q[uarters]”
* “P” mostly codes for “P[anzers]” (a word which was only coined in about 1940, awkwardly for the WW1 codebook idea)
* Eight of the five-letter cipher groups are skipped because they don’t fit this (already very loose) pattern. (What?)

(1)AOAKN (?)HVPKD (10)FNFJ[W/U] (?)YIDDC
(2)RQXSR (7)DJHFP (11)GOVFN (15)MIAPX
(3)PABUZ (?)WYYNP (12)CMPNW (16)HJRZH
(?)NLXKG (?)MEMKK (?)ONOIB (17)A[K/R/H]EEQ
(4)UAOTA (8)RBQRH (?)DJOFM (18)TPZEH
(5)LKXGH (?)RGGHT (13)JRZCQ (19)FNKTQ
(6)KLDTS (9)GQIR[U/W] (14)AOAKN

(1) AOAKN – Artillery observer at ‘K’ Sector, Normandy.
(2) RQXSR – Requested headquarters supplement report.
(3) PABUZ – Panzer attack – blitz.
(4) UAOTA – West Artillery Observer Tracking Attack.
(5) LKXGH – Lt Knows extra guns are here.
(6) KLDTS – Know where local dispatch station is.
(7) DJHFP – Determined where Jerry’s headquarters front posts.
(8) RBQRH – Right battery headquarters right here.
(9) GQIR[U/W] – Found headquarters infantry right here.
(10) FNFJ[W/U] – Final note, confirming, found Jerry’s whereabouts.
(11) GOVFN – Go over field notes.
(12) CMPNW – Counter measures against Panzers not working.
(13) JRZCQ – Jerry’s right battery central headquarters here.
(14) AOAKN – Artillery observer at ‘K’ sector Normandy.
(15) MIAPX – Mortar, infantry attack panzers.
(16) HJRZH – Hit Jerry’s Right or Reserve Battery Here.
(17) A[K/R/H]EEQ – Already know electrical engineers headquarters.
(18) TPZEH – Troops, panzers, batteries, engineers, here.
(19) FNKTQ – Final note known to headquarters.

Sorry, Mail editors, but you’ve landed yourself a bit of a dud story here. If there is something good about this theory (and I for one haven’t found it yet), it’s hidden beneath a tangled mess of obviously wrong & over-interpretative nonsense, the kind of foolishly hopeful non-decrypticity David Kahn termed “enigmatology”. Ohhhhh dearrrrry me. icon sad Dead WW2 pigeon cipher cracked with WW1 codebook (says the Mail)... errr, really?

“The Curse of the Voynich”, now back on sale…

$
0
0

TheCurseOfTheVoynich title The Curse of the Voynich, now back on sale...

Just a quick note to let you know that a freshly printed boxful of my book “The Curse of the Voynich” arrived here today, and with shinier covers than ever. icon smile The Curse of the Voynich, now back on sale... It is, of course, a perfect last-minute cipher-mystery-related Christmas present (for others or indeed for yourself), so feel free to order a copy (click on the appropriate PayPal-linked Buy Now button at the top there, and off you go).

If you don’t know about my take on the Voynich Manuscript, I’ve posted a 1000-word summary of the book here, part of which was covered in the National Geographic Ancient X-Files half-episode you may have seen (and which YouTube has now taken down). What I like best about “Curse” is that for all the potshots people have tried to take at it, it’s all basically still standing, which – considering that this is a highly-contested field where a typical Voynich theory has a shelf-life of a few days at most – is pretty good going, I think. icon smile The Curse of the Voynich, now back on sale...

As always, I sign all copies bought direct from the Compelling Press site, and offer the option of adding an anagrammatic dedication at the front: so if your name was (for example) “Leonardo da Vinci”, you could have your copy dedicated to “Vindaloo and Rice” (which remains one of the best anagrams ever, however much you happen to like “Invalided Racoon”).

Incidentally, of all the other books on the Voynich Manuscript out there, I’d strongly recommend Mary D’Imperio’s classic (1976) “An Elegant Enigma”, which is now freely downloadable from the NSA as a PDF. Anyone with an interest in the Voynich Manuscript should read this – even if it is a little bit dated in places, D’Imperio does cover a lot of ground.

“Small explosion in Unicode factory, nobody hurt”… :-)

$
0
0

Well, that was what I thought when I first saw the ciphertext in Part 2 Chapter 8 of “The Fates Unwind Infinity“, an online book detailing the anonymous author’s thoughts on a whole load of speculative-philosophy-style stuff (a great big hat-tip to Richard Greendale who passed a link to it my way, sorry it’s taken so long to post about it!) It’s the kind of obsessively intense book that seems to have been written in a three-day sleep-free trance: as far as I can tell, you might well need to enter a broadly similar state in order to make proper sense of it.

All the same, there’s something quaintly naive about the cipher alphabet used, in that it is made up of a load of rare characters all thrown together, like one of those abysmal Chinese emails where the proper character encoding has failed to arrive with the main text:-

˛¿?,.ç*ϕ , ¥ϕ’¡ˇ∆-.#-ϕπ¡q.µ•∆ˇ•.,*ϕ ,˚ç¿¡˛¡ç˚•ç¡çq˘.Ω’*ϕ¡Ô.çº-.¿˚¡∆ ,. ¥µç,.˛
¡*º•¡º•ˇ.˚’ϕ.ˇ¡π.ç∞¿µ¿.ç¡∆-.y¡,ˇç*•¡•˚.¿¡’•˛•¥ç¡çµ•¿,¿.ç.•Ωç¿ϕ¡’.ˇ˚.ºÔq.¿ π˘
¡-*˚∆.•*.•#-˛¿ˇ’ç.¥¡ˇ¿¡ π¿µ¡¿.ç∆’,Ω.,˚¡•˘.ˇ•∆.¿,˘¡˛¡ç.µ•¥.•*∞Ô¡º-∆¿˘ç˚ϕ-**.
¿¥¡ç.•.ç¡,.¿πˇ•.q’ˇ¡˘’,º-ˇ∆.•ºΩ.#¡•µ*˘.˚¥¿ç.-∆’¡˛ π˘.ç•¿*•,.ç.Ôqç,¿¡ç-
∆º.•˘’¿’•.ˇµ˛ç,ˇ˚ˇ∆¿¡*y,∞¿µ¿ç.˛Ωπ.-.,•¡’º•.ç∆ ¥ yç˚.ç¿,¿ç*Ô¡’•.πϕ-˘*•ç.•˛¡-.
¿,.µç•Ω¡¿.º-µˇ•.^ˇ˚∞¿ π*ç’∆•µ¡Ô˘ˇ.µ ¥*µ˚∆.¿¡Ω•.-ˇ¿•., πç˘º.-º*∆¡*˚•qÔ
¡’.˚’#¿˛*ˇ.˘ πçˇ•Ω¡¿¥ π.µˇ¿˘.∆º˚µç˚•.*’∆µ¡-˘¡¿-ç.,¿.¿*∆.,•¡¿ç π*.-.
¿˘,Ω’Ω.ç#ˇµ•’˚µÔ¡¿˛*¥¡’.¿∆ç π*.• ¥Ωq,˘∞.¿¿-*µ-*¥¡•µçµ¡•.,˛.¿µ∆˚,.º-
çµ πˇÔµ¡’µ.’•ϕ’ ¥-#y˚∆µº-¡ˇ¿µ•ç.µ¡˛.•˘π¡Ô,µ¡˚˚µ’µ,¿,∆-˛.Ωç•.¿¥µ.µçµ,-˘¿π
¡q•.Ô∆.˚ˇ-,µˇ’µç•’¿µ-˘¡ˇ¡µ˚.π∆.•∞-µç*Ô˛˘¿.Ω¡¥˚ˇ,•y.,∆•¡˛-¡*,¿π ,,µ.˛ç∆-
µ˚*˘•.’•.ˇ’-µ¿.ˇΩçyÔçˇ¡•˘¡˚*’,.∆º¿ç•ç π , ¥˘•¿.∞-¡˚˘*µ.Ω•.¿-˛qç,¡,•∆˛¿˘-
¿.•ˇ¥µçˇ,,’*ç’*˚ˇ¡∆ π ,*Ô¿’˛¿•.µy¡,畺Ωç-˚ ¥ ,ˇ•¿∆¿µ˛¡˘-¿•,¡*. π∆qç.º•,º*¿#
¡˛.,µ˚.¿çq˛çˇ,ç’¡µ•.¿’.,.qç˛¥∆硢*•,-∞•¿,˘¡qÔ¥.∆µ˛•.˚’¿,-∆^,•Ω
¿*çµπ纕q˘˚-˛¡ˇ-,,.µ#.’*ˇyº˛ϕ ,Ôˇç,˘¡∆q˘¥.¿’ç˛¿,•º*º•Ω¿µ˚,,硲.q¡¿∆π
¿∆µ.,祿-¡¿.˘.ç˛∆¡¿•¡¿çy-.¿º*.¿*ç∞¿∆’¡,µˇ•.’•,.ç¿-¿ˇº*ç*¡˚.’¥π.çºΩ¡*˘˛
¿∆.#.,•¡¿çµµ¿Ô∆•ç*∆-µº*qµ˚.-.¿Ω ,絲¿çˇ¥’¡µˇ•¡ˇ•., π.’ç¥*∆¿µyç.˚’µ¡¿,-
çº*ºµ.•˛.˚Ô¿µq¡ˇ.¥•˘.*,.¿-˚,µπ¡*.¿•µ¿µç˛µ-˚ç¥∞µç.•’¡ˇ,.-.’∆.Ωq’Ô¿•˚¡¿π.#,.
¥.¿˛¡,ç-˘*yµ*.¿•∆.ˇ,¿˚çº-˘¡˛,ç¿¥-*硵.,Ω•.˚ πçq¿•ˇç¿Ô.ˇ¡’Ωˇµ.*∆.ç’˛,¡¿,.
¥-.*˚’•.* π¡ºΩº.yç-.˛µ.¿¡ˇ¥µ,µç•,.˘.,.˛¡¿∆º.qç*ç¿˚-.•*.¿,˘ºç,ç¡∞.Ω’.ˇ˘ˇ
¡¿Ô∆.#ç˚•µçΩµç˛¿µµ ¥ˇ*ç¿ π*.*∆.•¿µ,ç-’ç˚-*•¡-Ωπ ,¿¥¡ç∆˚¿.Ôq*¿¿∞.•ˇ.˛
¿çˇ¡q.¿,µ•’¿-,.˚¡’-¡*º•˛ç.ˇ,,¿.µç∆Ωπ.y¥µç˚*¡˛¿,¥,’¥¡∆çµ-ç•*.^Ô˚¿q•Ω.˛,˘µç
¥ˇµ-ˇ∞*.’ π∆¡’*˚q˘•ˇ.q∆¥µ¡˘.*¥Ô¿µ˛∆ç,.?µ˛¿.¡

Note that some of the shapes are in bold, though I haven’t transcribed these any differently (which may well be a mistake). Yet in fact, for all its typographical showiness, it turns out that this ciphertext uses only 27 different characters. Leaving ‘q’ and ‘y’ intact and replacing the rest with A-H and J-Z (I don’t like using ‘I’, it’s too easy to confuse it with ’1′ and ‘l’), you get the rather more usable:

ABCDEFGHDJHKLMNOEPOHQLqERSNMSEDGHDTFBLALFTSFLFqUEZKGHLVEFWOEBTLNDEJRFDEA
LGWSLWSMETKHEMLQEFXBRBEFLNOEyLDMFGSLSTEBLKSASJFLFRSBDBEFESZFBHLKEMTEWVqEBQU
LOGTNESGESPOABMKFEJLMBLQBRLBEFNKDZEDTLSUEMSNEBDULALFERSJESGXVLWONBUFTHOGGE
BJLFESEFLDEBQMSEqKMLUKDWOMNESWZEPLSRGUETJBFEONKLAQUEFSBGSDEFEVqFDBLFO
NWESUKBKSEMRAFDMTMNBLGyDXBRBFEAZQEOEDSLKWSEFNJyFTEFBDBFGVLKSEQHOUGSFESALOE
BDERFSZLBEWORMSEYMTXBQGFKNSRLVUMERJGRTNEBLZSEOMBSEDQFUWEOWGNLGTSqV
LKETKPBAGMEUQFMSZLBJQERMBUENWTRFTSEGKNRLOULBOFEDBEBGNEDSLBFQGEOE
BUDZKZEFPMRSKTRVLBAGJLKEBNFQGESJZqDUXEBBOGROGJLSRFRLSEDAEBRNTDEWO
FRQMVRLKREKSHKJOPyTNRWOLMBRSFERLAESUQLVDRLTTRKRDBDNOAEZFSEBJRERFRDOUBQ
LqSEVNETMODRMKRFSKBROULMLRTEQNESXORFGVAUBEZLJTMDSyEDNSLAOLGDBQDDREAFNO
RTGUSEKSEMKORBEMZFyVFMLSULTGKDENWBFSFQDJUSBEXOLTUGREZSEBOAqFDLDSNABUO
BESMJRFMDDKGFKGTMLNQDGVBKABSERyLDFSWZFOTJDMSBNBRALUOBSDLGEQNqFEWSDWGBP
LAEDRTEBFqAFMDFKLRSEBKEDEqFAJNFMUGSDOXSBDULqVJENRASETKBDONYDSZ
BGFRQFWSqUTOALMODDERPEKGMyWAHDVMFDULNqUJEBKFABDSWGWSZBRTDDFMAEqLBNQ
BNREDFJBOLBEUEFANLBSLBFyOEBWGEBGFXBNKLDRMSEKSDEFBOBMWGFGLTEKJQEFWZLGUA
BNEPEDSLBFRRBVNSFGNORWGqRTEOEBZDFRABFMJKLRMSLMSEDQEKFJGNBRyFETKRLBDO
FWGWRESAETVBRqLMEJSUEGDEBOTDRQLGEBSRBRFAROTFJXRFESKLMDEOEKNEZqKVBSTLBQEPDE
JEBALDFOUGyRGEBSNEMDBTFWOULADFBJOGFLREDZSETQFqBSMFBVEMLKZMREGNEFKADLBDE
JOEGTKSEGQLWZWEyFOEAREBLMJRDRFSDEUEDEALBNWEqFGFBTOESGEBDUWFDFLXEZKEMUM
LBVNEPFTSRFZRFABRRJMGFBQGEGNESBRDFOKFTOGSLOZQDBJLFNTBEVqGBBXESMEA
BFMLqEBDRSKBODETLKOLGWSAFEMDDBERFNZQEyJRFTGLABDJDKJLNFROFSGEYVTBqSZEADURF
JMROMXGEKQNLKGTqUSMEqNJRLUEGJVBRANFDECRABEL

However, despite the promising-looking frequency counts, I haven’t yet had any luck cracking this as a monoalphabetic substitution cipher. The Friedman index of coincidence for this is 1.52 (slightly too low for English), which makes me strongly suspect that some punctuation is being enciphered here. Yet the commonest letter (‘E’) seems too frequent to be a plaintext ‘e’, and it doesn’t seem to encipher a space either.

As far as n-grams go, repeated 2-grams include:-
* EB (28 instances)
* SE (23)
* DE (19)
* ES (17)
* RF LB EF (16)
* ED (15)
* FE BR (14)
* BE NE BD (13)
* etc

Repeated 3-grams include:-
* GEB OEB MSE (5 instances)
* ETK EOE EBD SED KSE NES FES (4)
* LQE LBF DEJ OUL RMS RTE RFS QGE BEF BDU LBE GNE DBE EDS EBL DUL DEF DSL EKS EQN SDE GWS FTS ESG ERF JRF LKE SME SLB SEB ZSE SGE (3)
* etc

Sadly CrypTool-online only goes up to length-3 n-grams, as I suspect there may be some interesting 4-grams and 5-grams in there. An exercise for the reader! icon wink Small explosion in Unicode factory, nobody hurt... : )

I don’t know what to make of this: when I first transcribed it, I really thought the answer would just pop out, but I haven’t had any luck with it so far… so I think I’m missing a trick. Any thoughts, codebreakers? icon smile Small explosion in Unicode factory, nobody hurt... : )

On irony, question marks, brackets, and the Voynich Manuscript…

$
0
0

It may surprise you a little, but sometimes I do like to think about things which aren’t to do with cipher mysteries at all. Today I stumbled upon a short video on situational irony that, just like Alanis Morissette’s song “It’s Ironic”, professed to explain irony by example yet failed miserably. Having said that, perhaps the creator’s inability to explain irony despite setting out to do so is the best example of irony that could be given… but I’ll leave you to decide for yourself.

But that set me thinking about irony punctuation, specifically the reversed question mark ‘⸮’ which your browser may or may not support. And that set me thinking about the 16th century English origins of the modern question mark glyph ‘?’. And that set me thinking about the late mediaeval abbreviation for ‘quaestio’ (‘what’) i.e. ‘qo’ or ’4o’, where (many typography historians believe) the ‘o’ subsequently migrated down beneath the ‘q’/’4′ to yield the modern question mark shape.

But that reminded me of a decade ago when I was tracing the origins of the ’4o’ shape seen in the Voynich Manuscript: back then, I stumbled across some late 14th and early 15th century examples of ’4o’ in legal documents, but have been unable to find any since. In retrospect, I think that what I was looking at were very probably examples of abbreviated ‘q[aesti]o’, i.e. prototypical question marks. In fact, this ’4o’ glyph pair appears in a number of Northern Italian fifteenth century ciphers, particularly in Milan (but that’s another story).

Yet in Voynichese, the ’4o’ shape almost always appears at the start of words (which isn’t where question marks go), and at the start of multiple adjacent words such as ‘qokedy qokedy’ etc (which is also not how question marks work). Hence I believe that what we are looking at in Voynichese’s ’4o’ is a 14th century abbreviation-cum-shape being appropriated and put to some other confusing use within a non-obvious textual system, in just the same way that the Voynich’s ‘aiir’ / ‘aiiv’ family of shapes appears to be a 13th-14th century page numbering abbreviation-cum-shape being appropriated and put to some other confusing use within a non-obvious textual system.

If you can think of a better definition of cryptography, please let me know. icon smile On irony, question marks, brackets, and the Voynich Manuscript...

But while I was idly looking all this up, I noticed several mentions of medieval brackets: apparently, the widely used convention for these was to surround the contents with reversed brackets (i.e. back-to-front relative to modern brackets) and to underline the contents. So, whereas we would write (tum ti tum), a medieval scribe would write )tum ti tum( instead.

Wait just a minute, I thought, I’ve seen these early on in the Voynich Manuscript. Isn’t it the case that what researchers sometimes call “split gallows” enclosing text is simply visually hiding an upside-down medieval bracket set?

f8v split raw On irony, question marks, brackets, and the Voynich Manuscript...

Just to be clear, here’s what I’m thinking:-

f8v split annotated On irony, question marks, brackets, and the Voynich Manuscript...

This visual trick only occurs right at the start of the manuscript (in fact, the above example is from f8v, on the back of the first bifolio). However, I suspect that splitting gallows in this way served to highlight the contents rather than to hide them, and so the encipherer then finessed the cipher system to use other (far less obvious) ways of achieving the same end through the rest of the document. Hence I believe that this was an early experiment in hiding the contents of the split gallows, which morphed into the far less visually obvious horizontal Neal keys (pairs of single-leg gallows, usually placed about 2/3rds of the way across the top line of a page or paragraph).

So… I started out trying to read about irony (and not do Voynich research), and ended up doing Voynich research after all. Is that ironic?

The unfortunate life of the Army’s Cysquare cipher…

$
0
0

When I was trawling through WW2 pigeon / cipher-related documents at the National Archives, I found a brief mention of a medium grade Army cipher called “Cysquare”. I half-remembered the name and that it was (unsurprisingly) a cy[pher] based around a square, but couldn’t remember the context at all.

However, when I later searched for it on the Internet, it all started to come back to me… because Cysquare had been devised by my cryptological hero, master codebreaker Brigadier John Tiltman (‘The Brig’). Very much as the NSA PDF paean to him would have it, few would disagree that Tiltman was indeed “A Giant Among Cryptanalysts“.

Tiltman himself wrote a short introduction to his Cysquare (recently declassified, though brutally redacted) called “A Cryptologic Fairy Tale“, on the basis (a) that he’d lost the original material and had had to make up some examples, and (b) that it had a happy ending (which I guess was that the Allied Forces won the war). Here’s how The Brig described it (though with a few linefeeds added to make it acceptable to our modern short attention spans):-

Sometime later in 1941 I produced the “Cysquare” which was accepted by the War Office as a low-echelon cipher to replace the “Stencil” cipher and issued to the Eighth Army in North Africa, Figures 8 and 9 [both redacted, *sigh*] give photographs of two pages of the printed instructions.

The grille has 676 (26 x 26) squares. Each column and each line contains 10 white (permitted) squares, with the exception of 3 “plus” lines containing 20 white squares each and 3 “minus” lines which contain no white squares at all. The key for the day consists of 26 letters of the alphabet in random order with the numbers from 1 to 26 written under them also in random order. For each message the operator selects a 4-letter indicator from a random list of such groups provided him for use in turn. The indicator in the case of the example given [but redacted] is GMBX. The numbers corresponding to this indicator are 11 19 20 7, i.e., position 11, line 19, column 20, taking out number 7. The grille could be used with any of its sides at the top. Position II indicates that the grille is used as shown with numbers 8 to 13 at the top.

The numerical key for the day is written from left to right at the top of the grille and from the bottom upwards on the left hand side. The plain text is written into the grille starting at the next white square after the square described by the line coordinate 19 and the column coordinate 20, using the elements of the key to define the corresponding lines and columns. If and when the operator reaches the last white square in the grille he proceeds from the top left-hand corner. He then takes out the columns of letters starting at the top of the grille and in the column designated by the taking out number, i.e., in this case 7.

The message is written out in 4-letter groups preceded by the 4 letter indicator and followed by the number of letters, the indicator repeated, and the time and date. No message of more than 220 letters was permitted. If a message handed in for transmission exceeded this length it had to be divided into parts, none of them exceeding 200 letters in length.

However, somewhat contrary to Tiltman’s story’s name, Cysquare itself didn’t really have a happy ending. For a start, a number of people thought that cryptanalysts such as Tiltman shouldn’t be messing about with making their own cipher systems, and so there was a certain amount of resistance to it from within, right from the beginning.

The second problem was to do with implementation: even though it relied on disposable pads containing pre-printed grilles, somewhere along the line someone had the bright stupid idea that they could economize by getting the Army cipher clerks in North Africa to reuse the pads, by writing messages in pencil and then erasing them with a rubber. However, before very long it became impossible to tell a blank square from a dark square – everything in the grille ended up fifty shades or grey (so to speak). Hence the cipher clerks refused to use the system, and it was quietly abandoned.

However, when Germans captured Cysquare pads and implementation notes, their cryptographers rather liked it. And so in 1944, a new system started to appear in German messages: the Rasterschlüssel (also known as RS44), a system derived directly from Tiltman’s Cysquare cipher. Of course, Tiltman quickly recognized it: and had the Germans not made some mistakes when designing their pads’ grille designs, they might have been extremely hard to decipher.

So… was Cysquare a success, or a disaster? It was certainly quite secure (if somewhat awkward to use): but in the end, it nearly gave Germany a cryptographic edge late in the war.

For fans of the pigeon cipher story, it seems unlikely that its message used Cysquare… and so the search for that goes on.

PS: there’s an 2004 article in Cryptologia by Michael J. Cowan called “Rasterschluessel 44 — The Epitome of Hand Field Ciphers“.


Bigrams in the pigeon cipher…

$
0
0

I’ve been wondering whether the pigeon cipher might be based around bigrams, i.e. where you split the cipher into pairs. If you disregard what seems to be the ‘AOAKN’ key indicator at the start and end, there are two basic ways to split the message into pairs. What is immediately interesting is that if you start immediately after AOAKN, you get three repeated pairs in the message (rather than just one), and that four of those six repeats occur every other pair along a short stretch towards the end of the message.

AOAKN
HV PK DF NF JW YI DD CR QX SR DJ HF PG OV FN MI AP XP AB UZ WY
YN PC MP NW HJ RZ HN LX KG ME MK KO NO IB AK EE QU AO TA RB QR
HD JO FM TP ZE HL KX GH RG GH TJ RZ CQ FN KT QK LD TS GQ IR U
AOAKN

AOAK
NH VP KD FN FJ WY ID DC RQ XS RD JH FP GO VF NM IA PX PA BU ZW
YY NP CM PN WH JR ZH NL XK GM EM KK ON OI BA KE EQ UA OT AR BQ
RH DJ OF MT PZ EH LK XG HR GG HT JR ZC QF NK TQ KL DT SG QI RU
AOAKN

The WW2 “Slidex” code works by having a table of codes particular to each arm of the armed forces (i.e. Royal Engineers, Operations/Signals, etc) where each bigram pair encodes a particular word often used by that arm. To encipher numbers or words, you bracket them inside a pair of SWITCH ON and SWITCH OFF bigram codes (there are several of each), and pick bigrams that correspond to each letter or digit or digit pair.

Hence I strongly suspect that what we are looking at in “GH RG GH TJ RZ CQ FN” is a sequence of letters enciphered in the Slidex SWITCH mode, i.e. where each letter is enciphered as a bigram.

Unsurprisingly, I would really like to read the 1944 Revised Instructions for using the Slidex R/T Code, and to have copies of the various Slidex code sheets and coordinate offsets used by the Royal Engineers and Infantry Brigade on D/Day, as I suspect these will allow us to read this message (does anyone have copies of these I can see?) Fingers crossed!

What lurks in the basement?

$
0
0

You don’t have to have the hundred eyes of Argus nor Watchman Ozymandias‘ wall of screens to notice that most stuff on the Internet is, errrm, a bit rubbish.

And yet… every once in a while, something unexpected pops up that (almost) makes it all worthwhile.

So, here’s a page that takes you on an unforgettable historical journey into a basement in Portland, Oregon. No ciphers, but great pictures, great text, great punchline… basically, I love it all. Bless you, Cabel, I hope you have a great 2013. icon smile What lurks in the basement?

The Voynich Manuscript, Voynich theorists, and professional historians…

$
0
0

In four words, the Voynich Manuscript is a puzzling old thing (and really, ain’t that the truth?). Filled with unknown plants, unrecognizable astrology & astronomy, and numerous drawings of small naked women, the fact that we also can’t read a single word of its ‘Voynichese’ text doubles or even triples its already top-end mystery. Basically, the Voynich Manuscript is to normal mysteries as a Scooby sandwich is to an M&S prawn mayonnaise sandwich.

People have their theories about it, of course. The last ripe strawberry of a mainstream Voynich theory came back in 2004 from academic Gordon Rugg, who declared that it was a hoax made using late 16th century cryptographic table-based trickery. Sadly 2009 saw an early 15th century radiocarbon dating of its vellum, which would seem to have made a fool of such fruity ingredients. Or if not a fool, then certainly a bit of a mess.

Despite almost-irreconcilable dating problems, numerous Voynich theories continue to find support from eager evangelists, angrily jabbing their fingers at any epistemological cracks they can see. The most notable get-out clause proposed is that some devious so-and-so could theoretically have used centuries-old vellum for <insert fiendishly clever reason here>, rather than some fresh stuff. This is indeed possible. But also, I think, rather ridiculous.

Why? Because it adds yet another layer of possible unlikeliness (for it is surely extraordinarily unlikely that someone back then would have such a modern sensibility about faking or hoaxing that they would knowingly simulate a century or more of codicological activity), without actually helping us to manage or even reduce any of the existing layers of actual unlikeliness.

Ironically, many such theorists prove anxious to invoke Occam’s Razor even as they propose overcomplex theories that sit at odds with the (admittedly somewhat fragmented) array of evidence we have. Incidentally, my own version is what I call “Occam’s Blunt Razor”: “hypotheses that make things more complicated should be tested last, if ever“.

For more than a decade, I’ve been watching such drearily unimpressive Voynich theories ping (usually only briefly, thank goodness) onto the world’s cultural radar. Most come across as little more than work-in-progress airport novella plots, but without the (apparently obligatory) interestingly-damaged-yet-thrustingly-squat-jawed protagonist to counterbalance the boredom of trawling through what passes for historical mystery research these days (i.e. the first half of Wikipedia entries).

And so I think it was something of a surprise when, back in 2006, I grew convinced that the Voynich Manuscript had been put together by the Italian architect Antonio Averlino (better known as Filarete), and even wrote a book about it (“The Curse of the Voynich”). But by taking that step, wasn’t I doing exactly the same thing as all those other Voynich wannabe theorists? Wasn’t I too putting out an overcomplex theory at odds with the evidence that signally failed to explain anything?

Well… no, not at all, I’d say. Averlino was the cherry on the dating cake I’d patiently built up over the years: the cake led me to the cherry, not the other way around. And that dating framework still stands – all the analysis I’ve carried out in the years since has remained strongly consistent with that framework.

Even so, I’m not wedded to Averlino: my guess is that you could probably construct a list of one or two hundred Quattrocento candidates nearly as good a match as him, and it could very well have been one of those. Yet what I am sure about is that when we ultimately find out the Voynich’s secrets, it will prove to be what I said: a mid-15th century European book of secrets; collected from a variety of sources on herbalism, astronomy, astrology, water and even machines; whose travelling author was linked directly to Milan, Florence, and Venice; and whose cipher was largely composed of 15th century scribal shorthand disguised as medieval scribal shapes (though with an annoying twist).

Averlino aside, please feel free to disagree with any of that… but if you do, be aware that you’ve got some important detail just plain wrong. icon smile The Voynich Manuscript, Voynich theorists, and professional historians...

Perhaps the most disappointing thing about the Voynich Manuscript is that historians still skirt around it: yet in many ways, it offers the purest of codicological challenges ever devised. For without the contents of the text to help us (and a provenance that starts only in the 17th century, some 150 years or so after it was constructed), all a professional historian can rely on is a whole constellation of secondary clues. Surely this is the best gladiatorial arena ever offered?

I’ll happily help any historian who wants to take the mystery of the Voynich Manuscript on, 21st century style. Yet it would seem that few have the skills (and indeed the research cojones) to do ‘proper’ history any more, having lost them in the dense intertextuality of secondary research. Without close reading to back their judgment up, how many can build a historical case from a single, unreadable primary source?

You know, I still sometimes wonder what might have happened if, in the 1920s, John Matthews Manly and Edith Rickert had chosen not Chaucer as their über-subject matter but the Voynich Manuscript instead. As a team, they surely had more than enough cryptological and historical brains to come devilishly close to the answer. And yet… other times it seems to me that the Voynich offers a brutally nihilistic challenge to any generation of historians: for the techniques you have been taught may well be a hindrance rather than a help.

All in all, perhaps (capital-H) History is a thing you have to unlearn (if only partially) if you want to make sense of the Voynich Manuscript’s deep mystery – and that is a terrifically hazardous starting point for any quest. For that reason, it may well be something that no professional historian could ever afford to take on – for as Locard’s Exchange Principle would have it, every contact between things affects both parties. A historian might change Voynich thinking, but Voynich thinking might change the historian in the process… which might well be a risky exchange. Ho hum… icon neutral The Voynich Manuscript, Voynich theorists, and professional historians...

Pigeon bigram / Slidex update…

$
0
0

Having got hold of a WW2 Slidex manual, I’m starting to see what a travesty of a coding system it was – and how a smart German decrypter could (with a bit of practice) decipher it almost in real time.

But Slidex was never intended as a highly secure coding system: it was only supposed to be a convenient way for people to discuss very short-term matters mostly in the clear over the radio or telephone, encoding any individual items or details that should not be overheard by the enemy. In fact because of its obvious lack of security, I don’t believe it was even classified as a “low grade” cipher.

Yet for a whole host of pragmatic reasons, it seems that Slidex was chosen to be used on D-Day for all non-machine cipher traffic. So if the pigeon cipher is in Slidex, can we crack it?

The first big problem we face is that “Slidex as described in the manual” and “Slidex as used in the field” seem to be quite different beasts. For example, though both employ a 12 x 17 (= 204-cell) table, manual-Slidex used a 12 letter horizontal key at the top, whereas field-Slidex (as evidenced by various pictures) seems to have used a pair of characters per key horizontal cursor cell, hence a 24 letter horizontal key. Similarly for the vertical key, manual-Slidex used only 17 characters whereas field-Slidex seems to have used all 26 alphabetic characters. So unless someone kindly comes forward and tells us how Slidex was actually used circa D-Day, we’re kind of stuck in a no-man’s land between manual-Slidex and field-Slidex, uselessly trying to guess what’s inside the Baggins’s nasty little pocket, yessss.

The second big problem is that unless something rather miraculous emerges from GCHQ’s archives, it now seems fairly unlikely we will ever get retrospective access to the daily keys used. Key pairs were tightly controlled and never used for more than 24 hours at a time (keys were normally changed over at midnight each day).

And yet… Slidex is designed to be quick and easy to use, with exactly the same code table and key pair used by both encoder and decoder. And in practice, all the symmetries and shortcuts that yield all that convenience also compromise the security to the point of uselessness.

For example, every 12-column-wide code table is arranged into three groups of four columns: and in each one I’ve seen, each group includes all 26 letters of the alphabet in alphabetic order, as well as a third of the numbers from 00 to 99, and a few SWITCH ON and SWITCH OFF cells. Moreover, in the code half of the cells, all the words are arranged in alphabetic order from top to bottom.

For example, the first four columns of the Royal Engineers Series A code table “No. 1″ proceed like this:-

[?] 08  N  T
0/? G   16 24
OFF 09  O  25
00  H   P  U
A   I   17 26
01  1/? 18 ON
B   J   19 V
C   10  2  27
02  11  Q  W
D   K   20 X
03  12  R  28
E   13  S  29
04  L   ON 3
05  14  21 Y
06  M   22 Z
F   ON  T  30
07  15  23 31

(Original picture from Jerry Proc’s Slidex page, second image from bottom. Note there’s also a photo of an Op/Sigs code table there that closely follows the same kind of layout pattern).

Moreover, the German cryptologists interviewed by TICOM after the war noted that before September 1944, most people using Slidex tended to use the leftmost group of columns almost exclusively, which compromised yet further what was already a poor system. And the widespread habit of using Slidex for entire messages made the daily keys easier to get to rather than harder. What a mess!

And so if our mysterious dead pigeon message is in Slidex, all those flaws and poor enciphering practices might give us enough to decrypt it without a daily key, or even without a code table at all! After all, if the Germans could do it (albeit usually with more depth to work with), surely so can we?

Looking again at the bigram, if we precede each bigram with the number of times the first half of the pair occurs, I suspect we can predict fairly reliably which part of the message is in code and which part is in cipher:-

6HV 3PK 3DF 3NF 2JW 2YI 3DD 2CR
4QX
... 1SR 3DJ 6HF 3PG 1OV 3FN 4MI
4AP 1XP 4AB 1UZ 1WY 2YN 3PC

... ... ... ... ... ... ... 4MP
3NW 6HJ 4RZ 6HN 2LX 4KG 4ME 4MK
4KO 3NO 2IB 4AK 1EE 4QU 4AO 4TA
4RB 4QR 6HD 2JO 3FM 4TP 1ZE 6HL
4KX 3GH 4RG 3GH 4TJ 4RZ 2CQ 3FN
4KT 4QK 2LD 4TS 3GQ 2IR

Because so many single instance “1nn” pairs are clustered in the middle section (“1SR … 3PC”), I’m pretty sure that this is in code, and the last part (“4MP … 2IR”) is in cipher. The first part I’m unsure about.

If we now concentrate purely on the final section and look at the frequency counts and patterns there, plenty of other interesting things jump out:-

... ... ... ... ... ... ... 3MP
2NW 4HJ 4RZ 4HN 2LX 4KG 3ME 3MK
4KO 2NO 2IB 2AK 1EE 3QU 2AO 4TA
4RB 3QR 4HD 1JO 2FM 4TP 1ZE 4HL
4KX 3GH 4RG 3GH 4TJ 4RZ 2CQ 2FN
4KT 3QK 2LD 4TS 3GQ 2IR

From the way they cluster, I think that M and Q probably refer to the same column: and from the few single-instance “1nn” bigrams in there, I suspect that “EE” and “ZE” probably both encipher “E” (while “JO” could well encipher “T”).

What’s interesting is that it seems likely that the four columns encipher letters in alphabetic order: so (say) A-F, G-M, N-T, and T-Z in the case of the Royal Engineers code table #1 (there are a couple of extra E and T characters inserted around the table). It may be that this is enough for someone to try to solve this directly without any other information!

Cipher talk for kids in Kingston (3rd February 2013)…

$
0
0

zodiac killer six lines Cipher talk for kids in Kingston (3rd February 2013)...

Roughly once a month on a Sunday morning, I take my son Alex along to a local kids’ group called Surrey Explorers for what is almost always a fascinating and hands-on talk about something a little unusual / challenging / stretchy / geeky / fun. Recent talks included “The Science of Zombies” (given by Surbiton zombie kung fu science fan-girl Anna Tanczos) as well as one on all sorts of weird and wonderful anamorphic art. These are normally held at Kingston University’s Kingston Hill campus, not too far from the A3.

Anyway, given that (a) I think Surrey Explorers is great, and (b) I blog about what is surely the coolest (if occasionally utterly ridiculous) geek thing going, I thought it was time to give something back to the group. Which is why I’ll be giving the best cipher mystery talk for kids ever there, entitled “Codes and Ciphers in History and Mystery – from The Hobbit to Winston Churchill” on 3rd February 2013 at 10.30am till 12.30pm. Hence the answer to the question “What’s on in Kingston for kids in February?”, the answer is now officially meeeeeeee.

As you’d expect, there’ll be no big surprises about the subject matter (errr… the clue’s in the title). I’ll be starting with a bit of interactive Hobbity rune stuff (A.K.A. “Futhark”), moving on to some real-life magical ciphers and recipes, then rapidly whizzing through a millennium or so of concealed writing (particularly those mysterious ones that nobody can yet read, Cipher Mysteries regulars will be utterly unsurprised to hear), before finishing up with the latest on that dead pigeon code that has so enthralled the media over recent months.

To end the day, I’ll answer questions on just about any cipher-related question anyone cares to throw my way, and perhaps give some recommendations about cool kids’ books based on ciphers.

If you have children aged 6-13 who this might be fun for, I hope to see you & them there – I’m a big fan of Surrey Explorers, and wish more people knew about it, so it would be great to have a full house!

PS: if you want links to some cipher articles to get you in the mood, I’d suggest
* The Phaistos Disk
* Voynich Manuscript
* Beale Papers
* Rohonc Codex
* The Dorabella Cipher
* The Unknown Man
* The Zodiac Killer

Why so many open pigeony questions?

$
0
0

As far as just about any cipher I blog about goes, I have days when a solution seems so comically close I could almost accidentally breathe it in. But I also have days when one seems so tragically far away that it may as well be in a sealed box. On the moon. Guarded by killer robot ninjas. All voiced by James Earl Jones.

What’s at issue isn’t anything like pessimism on my part: rather, it’s the question of why anybody would think these might be solvable without doing a whole load of basic, grindy, grafty research first. Really, I think you almost always have to break the external history of these things before you stand much of a chance of extracting their internal contents.

So, if I list some of the open questions that are bugging me about the dead cipher pigeon story right here right now, perhaps you’ll see why that might be the case:-

* Who owned either of the two pigeons listed on the message?
* Were there any pigeon lofts in Bletchingley itself during WW2?
* Did any British pigeon handlers ever use “lib.” as an abbreviation?
* Why hasn’t a single record from a pigeon loft around Tunbridge Wells or Dorking turned up yet?
* Why can’t I find a single other message written on the same printed pigeon service pad?
* Was the pigeon message we have a hectograph or a carbon copy?
* From its skeleton, how old was the dead pigeon? [What a basic question to have to ask!]
* True or false: “many WW2 pigeon messages were sent encrypted”?
* When were Slidex Series B code cards introduced?
* When did Slidex change from having one letter per horizontal key slot to two letters per slot?
* How many syllabic / bigram ciphers were in use in WW2?
* Where is a copy of the Army syllabic cipher book BX 724 or BX 724/RE?
* Did Bletchley Park / GCHQ ever catalogue the tons of files brought back by the TICOM teams?

Personally, when I look at this fairly long list, I don’t feel hugely confident that we genuinely know even close to enough to enable us to solve this mystery, however engaging and intriguing it may be.

But then again, a single answer to any one of these questions from an unexpected corner might well be enough on its own to turn this miserable tide around. So perhaps we should just try to remain optimistic, for a tiny bit of clarity for any one of these might be enough to get us started. Fingers crossed that we shall see (and very soon!)… icon smile Why so many open pigeony questions?

At last, some genuinely useful Voynich merchandise hits eBay…

$
0
0

A fulsome tip of the Cipher Mysteries hat to Luck Thief Luke Fitch for passing on a link to this (actually rather nice-looking, I think) Voynich-themed iPhone4 case shipped all the way from Hong Kong. Luke bought one for his girlfriend for Christmas “and she loves it“, thus proving once and for all that romance and cipher mysteries can indeed co-exist. (Though I’m not entirely sure my wife would 100% agree.)

Voynich iPhone4 case At last, some genuinely useful Voynich merchandise hits eBay...

As I’m sure at least 20% of Cipher Mysteries regulars will know, the image chosen is cropped from page f40v, the end page of the Voynich Manuscript’s Quire 7. The plant depicted is very similar-looking to the (marginally better-known) plant on f33v, which Hugh O’Neill in 1944 thought was a “sunflower”: Robert Brumbaugh also thought this was the case (though much later).

However, because of a number of compelling counter-arguments raised by Jorge Stolfi, the whole sunflower notion now seems to have, errm, had its day in the sun. More recent alternatives include:-
* Dana Scott suggested in 2001 that it might be related to Epiphyllum oxypetalum;
* Edith Sherwood suggests Crocus vernus;
* Berj N. Ensanian suggests that comparisons with giant Pitcher plants present themselves.

What I can say is that it’s a Herbal ‘B’ page written (as usual) in Currier Hand 2, with a ‘title’ (offset text block) on the bottom-most line. There is only a single l-initial word (‘lar’), and a fair smattering of single-leg gallows. I don’t think its roots or leaves are repeated in either of the later pharma sections.

Even though this is quite vividly coloured, I don’t personally believe this is actually a plant… but that’s another story entirely! icon smile At last, some genuinely useful Voynich merchandise hits eBay...


Some of my pigeon questions answered…

$
0
0

A few days ago I posted a list of open questions about the dead cipher pigeon, really as a way of externalizing the annoyance I felt from knowing so few basic facts. To my great delight, Mike Moor from Melbourne and (well-known military history buff) Christos T. stepped forward with a whole wheelbarrowful of answers. And here they are…

“Did any British pigeon handlers ever use “lib.” as an abbreviation?”

Mike Moor points out that the first message sent back on D-Day was by Reuters reporter Montague Taylor, attached to the eg of the war-seasoned (and subsequently Dickin-Medal-receiving!) carrier pigeon Gustav [NPS.42.31066]. At the bottom of the image (clearly on an RAF pigeon message pad), it says “Liberated 0830” (click to see the full message):-

liberated 0830 Some of my pigeon questions answered...

“Why can’t I find a single other message written on the same printed pigeon service pad?”

For this, Mike Moor points to a message sent by Major General Roberts on a page talking about the Canadian armed forces’ involvement in World War Two. [Incidentally, the abortive Canadian raid on Dieppe was known as "Operation Rutter", I wonder if Stu R knew that?] Even though the quality of the scan is frankly diabolical, it’s very much better than nothing at all, and tells us that this our pigeon message was (without any real doubt) an Army Pigeon Service message pad.

Major General Roberts report by pigeon Some of my pigeon questions answered...

Mike also notes that this was an “Army Book 418B”, the updated version of the Army Book 418 used for pigeon messages in the First World War. It turns out that the National Army Museum near Sloane Square tube in London has an Army Book 418B in its collection described as “Army Book 418B, Pigeon Service Message Book, 1942″, accession number “1975-06-35″: it would be cool to ask the curators there to have a closer look.

“Was the pigeon message we have a hectograph or a carbon copy?”

Mike Moor notes “It is a carbon copy pad with 1 original retained in the book and 2 carbon copies made – which lines up with what you’d expect from the message i.e. 2 copies sent and the blue text of the cipher looks a lot like a carbon copy + black amendments by a second hand presumably prior to sending.” Excellent, thanks! icon smile Some of my pigeon questions answered...

“When did Slidex change from having one letter per horizontal key slot to two letters per slot?”

The (plainly utterly indefatigable) Mike Moor points us to some December 1944 Slidex instructions available on Rob van Meel’s site (a copy will cost you two euros plus international postage from the Netherlands), by which time it had changed to two letters per key slot on the horizontal cursor. That narrows the range down dramatically to ‘sometime in 1944′… we’ll just have to keep digging to find out exactly when in 1944. At least this is a question that we can reasonably hope to get a solid answer on!

“When were Slidex Series B code cards introduced?”

In the Series A “RE No. 2″ (Army Code No. 14070) Card 35 that I got from the excellent royalsignals.org.uk website, the three columns have had their shape changed to break up the columnar structure somewhat, which I believe may point to a rethink & upgrade of the Slidex code during WW2.

At the same time, another Series A card has two versions, one with an Army code and another with a different W.O. (War Office) code, which I suspect points to a post-WW2 handover from the Army to the War Office. But that’s as good an answer as this question has for now.

“Did Bletchley Park / GCHQ ever catalogue the tons of files brought back by the TICOM teams?”

Christos replies: “There are many TICOM file categories: I, IF, DF, M, D. Captured German documents had to be catalogued and then translated. This must have taken years. The question is whether there is a full list of those files. There is a DF list but I don’t know about any document covering the other files.”

Incidentally, p.38 of TICOM I-109 (a report by Lt Ludwig of Chi Stelle OB.d.L) says:

B. Slidex system.

Bigram substitution system.
In use in the army (front line units) and in air support networks (tentacle networks).
The system was known from the monitoring of exercises in Great Britain before the invastion, e.g. “Spartan”. The cryptanalytic detachments in army and GAF were able to get so much experience on these exercises that decoding worked well right at the start of the invasion.
Recovery was done in the army again at NAA St 5, in the GAF in 14/3 (W control 3).
Decoding was often done with so little delay that the messages could be dealt with like clear text in the evaluation.
The results were of more importance to the army than to the GAF, but theu provided the latter too with valuable indications, e.g. elucisation of the individual corps tentacle networks, reconnaissance operations (e.g. 400 and 414 Squadrons) etc.
The messages decoded daily were exchanged between Army and GAF in the form of written reports.

The Massey twins’ Phaistos Disk decryption claim…

$
0
0

I don’t often cover the Phaistos Disk here, simply because it’s almost certainly more of a linguistic mystery than a cipher mystery as such. However, I was particularly taken by some aspects of the analysis offered by Keith & Kevin Massey, so it seemed well worth discussing here.

Incidentally, despite their complementary-yet-competing philological interests, the twins didn’t start their Phaistos Disk adventure together. But, as they put it, “for Kevin to collaborate with his brother Keith was finally inevitable, like dancing with your mad aunt at a wedding reception.

Their Chapters 1-4 summarize a whole load of Phaistos research, while trying to argue for a link between various early European scripts (Cypriotic, Linear B, etc). Their Chapter 5 (pp.48-56) argues for a left-to-right reading of the Phaistos Disk (but not quite as convincingly as they hope, I think). But after all that, their Chapter 6 discards pretty much all their preceding linguistic analysis and instead proposes the hypothesis that Phaistos Disk words with slashes are actually numbers. And that’s essentially where they finish.

phaistos slashed The Massey twins Phaistos Disk decryption claim...

Now, for all the twins’ obvious linguistic smarts, I have to say I just don’t buy into this – at least, not in the way it’s currently presented. And here’s my argument why:

(1) The way that the signs are physically imprinted / stamped into the soft unfired surface of the disk is clearly systematic (i.e. it’s a consciously prepared set of shapes, not one that’s being improvised on a shape-by-shape basis), and the choice of those shapes forms part of the same system.

(2) Furthermore, the whole disk had to be fired once and once only. Hence without much doubt the imprints on both sides had to have been made at the same time using the same basic system.

(3) Regardless of whatever direction you believe it was written in, there are substantial word differences between the two sides. Many words repeat on the same side (in fact, there’s even a three-word pattern that repeats on Side A), yet only a single measly three-imprint word repeats between sides.

(4) There is an imbalance between the shapes on the two sides. The most obvious difference is the frequency of the plumed head imprint: 14 instances on Side A but only 5 instances on Side B. Yet there are plenty of others, such as the beehive (once on Side A but five times on Side B). Indeed, the most visually striking difference is the twelve { PLUMED_HEAD + SHIELD } pairs on Side A compared to the single pair on Side B.

These are the basic observations I personally work from, and the problem is that I just don’t see how these square with the number system suggested by the Masseys. Whatever the actual significance of the slashes, it doesn’t seem to me to coincide with any obvious difference in the language as used (because the PLUMED_HEAD + SHIELD pairs occur just about as often in slashed words as in unslashed ones): and (longhand) numbers are almost always a notably differently-structured part of any language.

For me, the big issue is that Side A is significantly more structured and repetitive than Side B. Also, its word lengths have much greater variance (i.e. Side A has both longer and shorter words than are found on Side B), and they use a different mix of shapes. Yet slashed words occur just as often on both sides. I just don’t get it, me.

I suspect that Side A and Side B use different kinds of language (ritual, performative, poetic, pragmatic, whatever) to assist very different functions: and probably courtly functions at that. But seeing it as a homogeneous number container for (say) Cretan tax accounting seems far too mundane. Bean counters never touched this artefact, no they didn’t! icon smile The Massey twins Phaistos Disk decryption claim...

Slovakian Voynich facsimile edition (2012)…

$
0
0

I found out today that Slovakian publisher CAD Press late last year brought out a new facsimile edition of the Voynich Manuscript, preceded by 176 pages reviewing its history, apparent contents, mad theories, etc. Of course, reading Czech helps, though it contains plenty of other pictures (i.e. quite apart from Voynich imagery) should you wish to buy it as an unreadable coffee table book. icon wink Slovakian Voynich facsimile edition (2012)...

voynichuv rukopis Slovakian Voynich facsimile edition (2012)...

As far as I can tell, the author of the preface (Dr. Jitka Lenková, I believe?) seems to be hopeful that the manuscript’s origin will ultimately turn out to be somewhere in Bohemia. Well, I guess a bit of nationalist spin rarely goes amiss with your home audience: but such rhetoric would be a bit nicer if it were accompanied by a bit of, errrm, factuality to back it up, hmmm?

And no, I don’t really think the Voynich has anything to do with Jan z Lazu, about whom I’ve blogged a fair few times. Sorry again!

Helen Fouché Gaines’ challenge cipher…

$
0
0

To add to our list of challenge ciphers (Bellaso’s, d’Agapeyeff’s, Feynman’s, etc), here’s one I hadn’t seen before from Helen Fouché Gaines’ (1956) “Cryptanalysis: A Study of Ciphers and Their Solution”, which I found courtesy of Greg Ross’s Futility Closet website:-

VQBUP PVSPG GFPNU EDOKD XHEWT IYCLK XRZAP
VUFSA WEMUX GPNIV QJMNJ JNIZY KBPNF RRHTB
WWNUQ JAJGJ FHADQ LQMFL XRGGW UGWVZ GKFBC
MPXKE KQCQQ LBODO QJVEL.

The cipher is the last in a series of exercises at the end of a chapter titled “Investigating the Unknown Cipher,” and she gives no hint as to its source. Of the exercises, she writes, “There is none in which the system may not be learned through analysis, unless perhaps the final unnumbered cryptogram.” The solution says simply “Unsolved.”

If you look at the book itself (p.217), all Gaines says is “Here is one which nobody has been able to decrypt:“. Hence it is not at all clear whether this is a composed challenge cipher (i.e. designed to confound) or an accidental challenge cipher (i.e. one found in the wild but never yet solved). I suspect the latter… but perhaps someone will know for sure either way.

Incidentally, the 1968 comment on this mentioned in the Futility Closet post is online here (it’s on p.5): just so you know, the authors there offer an [entirely fictional, I expect] “Nicodemus J. Grumbow award” for anyone solving it.

As far as the ciphertext itself goes, it has a flattish distribution (Q appears 9 times, while T & Y appear only twice each, all 26 letters are used), with a standard deviation of 1.52144, i.e. much flatter than a normal alphabet would present.

It has no repeated trigrams, while QJ & PN appear three times (DO, GW, QL, GG, VQ, PV, NU, NI and XR each appear twice). There are seven doubled letter-pairs, all appearing once only each (PP, GG, JJ, RR, WW, GG, QQ). There are a few visible patterns in the text that vaguely suggest some kind of structuring (JAJGJ, QCQQ, QLQ and QQL), but all of which might just be random.

As a result, it doesn’t appear to be a monoalphabetic substitution, nor a (conventional) polyalphabetic substitution (as there seems to be no obvious cycles, loops, or repeats). The cipher text is 125 characters long, which (as a mathematician) makes me idly wonder whether this was partly enciphered using some kind of a 5x5x5 three-dimensional transposition cipher, the sort of thing a Bond villain would gloat about in his/her evil monologue. I don’t believe for a minute that this is the case, of course, but I thought I’d mention it all the same. icon smile Helen Fouché Gaines’ challenge cipher...

Any thoughts? Is there anything that suggests to you what kind of a cipher this might be?

Mona Lisa, multimedia-style… ;-)

$
0
0

For over a year, I’ve been collecting links to modern versions of the Mona Lisa made of weird materials – leaves, make-up, chocolate, meat, Lego, coffee, toast, pasta, buttons, jelly beans, mushrooms, Rubik’s cubes, dominoes, ketchup… all sorts of odd stuff.

As such lists go, it’s not even remotely complete (in fact, there were about twenty ASCII Art versions, so I just chose the one that impressed me most). But the fact that I’ve collected over forty different types of Mona Lisa would surely have Leonardo da Vinci squirming in his wormy Renaissance repos. If that were possible. Which it’s not. (Hopefully.)

Just so you know, my favourite (so far) is #23 Buttona Lisa (below), a 3d version covered in buttons, on permanent display at the Hankyu Shopping Centre in Kobe, Japan. Please let me know if you find anything better!

buttona lisa Mona Lisa, multimedia style... ; )

The post Mona Lisa, multimedia-style… ;-) appeared first on Cipher Mysteries.

Viewing all 843 articles
Browse latest View live