I’ve just had a particularly interesting email exchange with Paul Relkin concerning the Feynman Challenge Ciphers, which he has generously allowed me to share here. The context is that the first Feynman Challenge cipher’s plaintext was from the very start of Geoffrey Chaucer’s Canterbury Tales, i.e. the first twelve lines of the General Prologue:

WHAN THAT APRILLE WITH HIS SHOURES SOOTE
THE DROGHTE OF MARCH HATH PERCED TO THE ROOTE
AND BATHED EVERY VEYNE IN SWICH LICOUR
OF WHICH VERTU ENGENDRED IS THE FLOUR
WHAN ZEPHIRUS EEK WITH HIS SWEETE BREFTH
INSPIRED HATH IN EVERY HOLT AND HEETH
THE TENDRE CROPPES AND THE YONGE SONNE
HATH IN THE RAM HIS HALVE COURS Y-RONNE
AND SMALE FOWELES MAKEN MELODYE
THAT SLEPEN AL THE NYGHT WITH OPEN YE
SO PRIKETH HEM NATURE IN HIR CORAGES
THANNE LONGEN FOLK TO GO ON ON PILGRIM[AGES]

Paul writes:


The Prologue

I’d like to share with you a possible clue I’ve discovered to the sources of the 2nd and 3rd Feynman Ciphers. My findings relate to the identification of a specific published transcription of the Canterbury Tales that is the probable source of the 1st Feynman Cipher.

As you are probably aware, the Canterbury Tales have been transcribed and reprinted innumerable times. Among the many different published editions of the Canterbury Tales, there are several idiosyncratic spellings associated with particular transcriptions. Although individual lines are spelled the same way in many different editions, I found that the 12 lines of the Feynman Cipher taken together are unique enough to match only one published transcription, like a “word fingerprint”.

To find the edition that the Feynman Cipher is based on, I extensively searched for editions of the General Prologue that were published before or during World War II and compared the word spellings to the Feynman Cipher.

First, I discovered what may be a typo in the 1st Feynman Cipher. The word “brefth” does not appear in any published edition of the General Prologue I have been able to identify. The most likely correct spelling is “breeth”.

Second, I found that the only version of the General Prologue that matches the Feynman Cipher is Fred Norris Robinson’s 1st edition of Chaucer’s Complete Works. In the introduction to his book, Robinson actually discusses several of the uniquely spelled words that later found their way into the 1st Feynman Cipher and explains why he rejected the popular spellings and chose less common ones.

Possible Sources

Having identified Robinson’s transcription as the probable source of the 1st Feynman Cipher, I discovered that there are only a few different editions of this transcription that were published between 1933 and 1938 that could have been used by the author of the Feynman Ciphers:

In 1933, Houghton Mifflin published this book in at least three editions:

The Complete Works of Geoffrey Chaucer (black):

The Complete Works of Geoffrey Chaucer, Student’s Cambridge Edition (red):

The Poetical Works of Chaucer, Cambridge Edition (white):

In 1936, Houghton Mifflin published small books containing parts of Robinson’s Canterbury Tales with an introduction written by Max John Herzberg. The title of the book that contains the quote used in the cipher is “The Prologue, the Knight’s Tale, and the Nun’s Priest’s Tale”:

In 1938, Houghton Mifflin included Robinson’s Canterbury Tales in a two volume collection of British poetry by Paul Robert Lieder called “British Poetry and Prose” (Volume 1):

Interestingly, Robinson’s 2nd edition of Chaucer’s Complete Works in 1957 no longer matches the spellings in the cipher!

It’s specifically here where I think we may find clues to the 2nd and 3rd ciphers. It seems plausible to me that “British Poetry and Prose” contains other literary works that were the basis for the 2nd and 3rd Feynman Ciphers. For example, several of its poems have 6 letter words that repeat twice, consistent with “CJUMVRCJUMVR” in the 2nd Feynman Cipher.

Robinson’s 1933 book of Chaucer’s Complete Works could also be the source of the 2nd and 3rd ciphers. The 1933 book is part of a series of books called “The Cambridge Poets” and the 1936 book is part of a series called “The Riverside Literature Series”. The other books in the series are also potentially worth looking at.

Los Alamos?

My research suggests that several copies of these books have the original owner’s name and other notes written in them. If we were able to locate the copy that was used at Los Alamos, it might reveal the name of the scientist who created the ciphers. There may be other writings within it that would give further clues about the ciphers.

I discovered that the Mesa Public Library in Los Alamos has a copy of Robinson’s 1933 book. The Mesa Public Library originated during World War II in the Big House where Feynman lived, so I wondered whether the library book could be the copy that was used to create the cipher.

So, I recently arranged to borrow that book through interlibrary loan. Since I live on the East Coast, I had to try 5 different libraries before I found one that would let me request that particular book. It then took two tries because they accidentally requested the book from the Mesa Public Library in Arizona instead of the one in New Mexico. I finally received the book I requested. Unfortunately, the book plate indicates that it was donated to the library in the 1970s. This makes it unlikely (albeit not impossible) that this was the specific copy used in the period around World War II to create the 1st Feynman Cipher.

I hope you find this information interesting and that it brings us a step closer to solving the 2nd and 3rd Feynman Ciphers.

Chaucer and Cryptography?

(((NickP: I responded here, pointing out:)))

Incidentally, there are two interesting links between Geoffrey Chaucer and cryptography. The first (which you may well have heard of) is that he included six blocks of ciphertext in his Treatise on the “Equatorie” (basically a kind of astrolabe). But the second is that a very major work on Chaucer (finally published in 1940) was written by John Matthews Manly and Edith Rickert, both well-known code-breakers. (I’ve covered them a few times on CM, mainly because of Manly’s links to the Voynich Manuscript.)

However, Rickert died in 1938, Manly died in 1940 and Los Alamos only really started in 1943, so we can rule out a direct transmission from either of them to Feynman. All the same, I do consider it entirely possible that one/both of them was/were the ultimate source of the three cryptograms. Just so you know!

(((To which Paul replied:)))

Concerning your excellent point about Rickert and Manly, there was another colorful link between a Chaucer scholar and Los Alamos that I found while I was researching editions of the Canterbury Tales. John Strong Perry Tatlock was a famous Chaucer expert who transcribed Chaucer’s Complete Works. His daughter, Jean Frances Tatlock, had a romantic relationship with J. Robert Oppenheimer between 1936 and 1939. They continued to have an affair during Oppenheimer’s marriage. Their relationship was used as evidence against Oppenheimer during his security clearance hearings because Tatlock was a member of the Communist Party. As you know, Oppenheimer and Feynman had more than a passing acquaintance – as for Tatlock and Feynman, who knows?

Back in 2006, I reasoned (in The Curse of the Voynich) that if the nine-rosette page’s circular city with a castle at the top…

…represented Milan (one of only three cities renowned for their circular shape), then the presence of swallowtail merlons on the drawing implied it must have been drawn after 1450, when the rebuilding of the old Porta Giovia castle (that was wrecked during the Ambrosian Republic) by Francesco Sforza as [what is now known as] the Castello Sforzesco began.

Ten Years Later, A Challenge

However, Mark Knowles recently challenged me on this: how was I so sure that the older castle on the site didn’t also have swallowtail merlons?

While writing Curse, for the history of Milan I mainly relied on the collection of essays and drawings in Vergilio Vercelloni’s excellent “Atlante Storico di Milano, Città di Lombardia”, such as these two pictures from Milano fantastica, in “Historia Evangelica et actos apostolorum cum alijs illorum temporum eventibus cum figuris crebioribus delineatis”, circa 1380:

…and this old favourite (which Boucheron notes [p.199] is a copy probably made between 1456 and 1472 of an original made in the 1420s)…

On the surface, it seemed from these as though I had done enough. But coming back to it, might I have been too hasty? I decided to fetch down my copies of Evelyn Welch’s “Art and Authority in Renaissance Milan” and Patrick Boucheron’s “Le Pouvoir de Bâtir” from the book overflow in the attic and have another look…

Revisiting Milan’s Merlons

What did I find? Well: firstly, tucked away in a corner of a drawing by Galvano Fiamma (in the 1330s) of a view of Milan (reproduced as Plate IIa at the back of Boucheron’s book), the city walls appear to have some swallowtail merlons (look just inside the two outermost towers and you should see them):

And in a corner of a drawing by Anovelo da Imbonate depicting and celebrating the 1395 investiture of Gian Galeazzo Visconti (reproduced in Welch p.24), I noticed a tiny detail that I hadn’t picked up on before… yet more swallowtail merlons:

Then, when I looked at other miniatures by the same Anovelo da Imbonate, I found two other (admittedly stylized) depictions of Milan by him that also unmistakeably have swallowtail merlons:

So it would seem that Milan’s city walls may well have had swallowtail merlons prior to 1450. The problem is that the city walls aren’t the same as the Porta Giovia castle walls (built from 1358, according to Corio): and I don’t think we know enough to say whether or not the castle itself had swallowtail merlons. It’s debatable whether the drawing of the 1395 investiture (which took place in the Porta Giovia castle) depicts the castle itself having swallowtail merlons: I just don’t know.

But the short version of the long answer is that because the Porta Giovia castle was only built from 1358-1372 (or thereabouts), we can’t rely on texts written before then (such as Galvano Fiamma’s). And there seems quite good reason to suspect (the Massajo drawing notwithstanding) that the Porta Giovia castle may well have had swallowtail merlons when it was used for the Visconti investiture in 1395. But I don’t know for certain, sorry. 🙁

There are texts that might give us an answer: for example, the (1437) “De Laudibus Mediolanensium urbis panegyricus” by Pier Candido Decembrio (mentioned in Boucheron p.74), or Bernardino Corio’s “Storia di Milano”. There are plenty of documents Boucheron cites in footnotes (pp.202-205), including “Lavori ai castelli di Bellinzona nel periodo visconteo”, Bolletino della Svizzera italiana, XXV, 1903, pp.101-104 (which I’ll leave for another day). But it’s obviously quite a lot of work. 🙁

Finally, I should perhaps add that a few details by Anovelo da Imbonate have an intriguingly Voynichian feel:

Though there were plenty of other miniature artists active in the Visconti court in Milan in the decades up to 1447, parallels between their art and the Voynich Manuscript’s drawings haven’t been explored much to date. Perhaps this is a deficiency in our collective Art Historical view that should be rectified. 🙂

Whether we like it or not, history as practised nowadays is a tower built upon textuality, upon the implicit evidentiality striped within and through texts. Even archaeology (of all but the obscenely distant past) and Art History rely heavily on texts for their reconstructions.

Alternative, explicitly visual approaches to history have lost the battle to control the locus of meaning. The mid-twentieth century Warburg/Saxl/Panofsky dream that highly evolved iconography/iconology might be able to surgically extract the inner semantic life of symbols from their drab syntatical carapaces now seems hopelessly over-optimistic, fit only for the Hollywood cartoons of Dan Brown novels. Sorry, but Text won.

What, then, are contemporary historians to make of the Voynich Manuscript, a barque adrift in a wine-dark sea of textlessness? In VoynichLand, we have letters, letters everywhere, and not a jot for them to read: and without close reading’s robotic exoskeleton to work with, where could such a text-centric generation of scholars begin?

Well, given that the Voynich Manuscript’s text-like writing has so failed yielded nothing of obvious substance to linguists or cryptologists (apart from long lists of things that they are sure it is not), historians are only comfortably left with a single door leading to the disco floor…

“Step #1. Start with the pictures.”

Yes, they could indeed start with the pictures: the Voynich’s beguiling, misleading, and crisply non-religious images. These contain plants that are real, distorted, imaginary, and/or impossible; strange circular diagrams; oddly-posed nymphs arranged in tubes and pools; and curious map-like diagrams. They famously lead everywhere and nowhere simultaneously, like a bad mirror-room fight-scene in 1960s Avengers TV episodes.

Without the comforting crutch of referentiality to lean on, we can’t tell whether a given picture happens to parallel one of the plants in Ulisse Aldrovandi’s famous (so-called) “alchemical herbals” (which unfortunately seem to be neither alchemical nor particularly herbal); or whether we’re just imagining that it echoes a specific plant in this week’s interesting Arabic book of wonders; or whether its roots were drawn from a dried sample but its body was imagined; or whether a different one of the remaining three hundred and eighty post-rationalizations that have been made for that page happens to hold true.

But on the bright side, it’s not as if we’re talking about a set of drawings that has previously made fools of just about everyone who has tried to form a sensible opinion about them, right? [*hollow laugh*]

So, “start with the pictures” it is. But what should we do then? Again, there seems little choice:

“Step #2. Find a telling detail.”

In my opinion, here’s where it all start to go wrong: where the road leads only to a cliff-edge, and one that has a sizeable drop below it into the sea.

The elephant-in-the-room question here is this: if looking for telling details is such a good idea, why is it that more then a century’s worth of looking for telling details has revealed practically nothing?

Is it because everyone who has ever looked at the Voynich Manuscript has been stupid, or inexperienced, or foolish, or delusional, or crazy, or marginal, or naive? Because that’s essentially what would need to be true for your own contribution to bring a new bottle to the party, if all you’re going to do yourself is look for telling details.

The thing that almost nobody seems to grasp is that we collectively have already applied an extraordinary amount of eyeballs at this issue.

Even though the Voynich’s imagery has been seen and ‘closely read’ for over a century by all manner of people, to date this has – in terms of finding the single telling detail that can place even part of it within an illustrative or semantic tradition – achieved nothing, zilch, nada.

Incidentally, this leads (I think) to one of only two basic constructional models: (a) the drawings in the Voynich Manuscript are from a self-contained culture whose internal frame of reference sits quite apart from anything we’re used to looking at [a suggestion which I’m certain the palaeography refutes completely]; or (b) the process of making the drawings for the Voynich Manuscript somehow consciously stripped out their referentiality.

But I’m not imagining for a moment that what I’m pointing out will stop anyone else from reinventing this same square wheel: all I’m saying is that this is how people approach the Voynich Manuscript, and why they then get themselves into a one-way tangle.

“Step #3. Draw a big conclusion.”

Finally, this is the point in the chain of the argument where the cart rolls properly over the cliff: though it’s a long way down, at least gravity’s accelerative force means anybody in it won’t have very long to wait before the sea comes up to meet them (relatively speaking).

How is it that anyone can comfortably draw a step #3 macro-conclusion from the itty-bitty (and horrendously uncertain) detail they latched onto in step #2? As proofs go, this step is completely contingent on at least three different things:
(a) on perfect identification of the detail itself,
(b) on perfect correlation with essentially the same thing but in an external tradition, and
(c) on the logical presumption that this is necessarily the only feasible explanation for the correlation

Each of these three would be extremely difficult to prove on its own, never mind when all three are required to be true at the same time for their sum to be true.

In my experience, when people put forward a Voynich manuscript macro-conclusion based on local correlation with some micro-detail they have noticed, they almost always haven’t noticed how weakly supported their overall argument is. Not only that, but why is it – given the image-rich source their external tradition normally is – that they can typically only point to a single image in it that supports their claimed correlation? That is fairly bankrupt, intellectually speaking.

How can we fix this issue?

This is a really hard problem. Art History tends to furnish historians with the illusion that they can use its conceptual tricks and technical ‘flow’ to tackle the Voynich Manuscript one single isolated detail at a time, but this isn’t really true in any useful sense.

A picture is a connected constellation of techniques, formed not only of ways of expressing things, but also of ways of seeing things. And so it’s a mystery why there should be such an otherness to the Voynich Manuscript’s drawings that deconstructing any part of it leaves us with next to nothing in our hands.

Part of this problem is easy to spot, insofar as there are plenty of places where we still can’t tell content from decoration from elaboration from emendation. Even a cursory look at pages such as the nine-rosette page or f116v should elicit the conclusion that they are made up of multiple layers, i.e. multiple codicological contributions.

For me, until someone uses tricks such as DNA analysis and Raman imaging to properly analyze the manuscript’s codicological layers, internal construction, and/or the original bifolio order of each of the sections, too many people will continue trying to read not “the unreadable”, but “the not-yet readable”: all of which will continue to lead to all manner of foolish reasoning and conclusions, as it has done for many decades.

I really want you understand that this isn’t because people are inherently foolish: rather, it’s because they almost all want to kid themselves that they can draw a solid macro-conclusion from an isolated and uncertain micro-similarity. And all the while that this continues to be the collective research norm, I have little doubt that we’re going to get nowhere.

Alexandra Marraccini’s presentation

You can see the slides and the draft article accompanying Alexandra Marracini’s recent talk here (courtesy of academia.edu).

The core of Marraccini’s argument seems to reduce to this: that if one or more of the circular castle roundels in the Voynich Manuscript’s nine-rosette foldout is in fact the same flattened city that appears in BL Sloane MS 4016 f.8v and/or Vat.Chig. F.VII 158 f.12r and/or BNF Lat 6823 f.13r (the first two of which also have a little dragon in one herbal root), then we might be able to place the Voynich Manuscript in one branch of the Tractatus de Herbis tradition (all of which derive from Firenze Biblioteca dipartemental e di Botanica MS 106).

Even though this is arguably a reasonable starting point for future investigation, I’m not yet seeing a lot of methodological ‘air’ between what she’s doing and the mass of detail-driven Voynich single-image theories Marraccini would doubtless wish to distance herself from. The structural weakness of their arguments are still – to a very large degree – her argument’s weakness too.

Going forward, this amounts to a theoretical lacuna which I think she might do well to address: that there is no obvious historical / analytical methodology to apply here that satisfactorily bridges the gap between micro-similarities and macro-conclusion in the absence of accompanying texts. OK, pointing to an absence is perhaps a bit more of a problematique than most historians these days are comfortable with, but I’m only the messenger here, sorry.

Anyway, there’s a nice transcription of the Q&A session she gave after her presentation (courtesy of VViews) here, which I’m sure many Voynich researchers will find interesting.

Oddly, though, the questions from an audience Voynichero with my 2006 book “The Curse of the Voynich” in mind were almost exactly the opposite of what I would myself have asked (had I been there). The single most important question is: why is your argument structurally any better than all the other similar arguments that have been put forward?

So, what is missing here?

The answer to this certainly isn’t working hypotheses about the Voynich Manuscript, because there’s no obvious shortage of those. Even the suggestion that there might be some stemmatic relation (however vague and ill-defined) between the drawings in Voynich Manuscript and BL Sloane MS 4016 has been floating around for some years.

Instead, what I think is missing is a whole set of evidential basics: for example, physical data and associated reasoning that tell us without almost no doubt which paints were original (answer: not many of them) and which were added later; or (perhaps more importantly) what the original bifolio nesting order was.

With these to work with, we could reject many, many incorrect hypotheses: and we might – with just a little bit of luck – possibly be able to use one or two as fixed points to pivot the whole discourse round, like an Archimedean Lever.

The alternative, sadly, is a long sequence of more badly-structured arguments, Groundhog Day-stylee. Even if my ice-carving technique has got stupendously good, it would be nice to have a change, right?

Here’s a thing that struck me the other day about the Anthon Transcript that I thought I ought to mention.

The way that the story has been passed down to us makes it far from easy to reconcile the “Caractors” page…

…with the “singular scrawl” shown to Professor Charles Anthon in 1828:

“It consisted of all kinds of crooked characters disposed in columns, and had evidently been prepared by some person who had before him at the time a book containing various alphabets. Greek and Hebrew letters, crosses and flourishes, Roman letters inverted or placed sideways, were arranged in perpendicular columns, and the whole ended in a rude delineation of a circle divided into various compartments, decked with various strange marks, and evidently copied after the Mexican Calendar given by Humboldt, but copied in such a way as not to betray the source whence it was derived.”

It would seem as though the first page was arranged in horizontal rows, while the second page was arranged in vertical columns and with a compartmentalized circle added after it. It sounds as though we are talking about two quite different things, and so shouldn’t even attempt to reconcile them as one. Yet in the decade up to his death in 1888, David Whitmer repeatedly asserted that this first page was indeed the very same “original paper” that Martin Harris had taken to Charles Anthon.

At this point, any passing Intellectual Historian might gently suggest that all these statements may well have been said in good faith: and that what is actually stopping us seeing them all as descriptions of the same thing is not the evidence itself, but our stubbornly persistent misreading of what is in front of our faces.

Can we do better?

The case of the ‘H’

I suspect that we can: and the giveaway that may well help to point us in the direction of what happened is the capital ‘H’ shape that occurs at least eight times:

How on earth did the person copying this down not notice that this was nothing more than an ornate ‘H’ shape? Though I’ve long wondered about this, reasonable answers have to date always eluded me. But what I noticed here is that perhaps the actual explanation is painfully simple: that the person who originally wrote these down copied the shapes as if they were written in columns, i.e. without seeing them as ‘H’ shapes at all.

The photograph in Clay County Museum directly supports this idea, because the writing on the other side of the fold (“The Book of Generation Adam”) is written sideways:

The two-button mouse

Even though most of the Caractors are evenly inked, the strong downward strokes of one of the three “two-button mouse” shapes also seems to indicate to my eyes that the letters were written ninety degrees rotated from what we see now (though I’d appreciate other people’s palaeographical insights on this particular issue):

I’d have thought the suggestion that these letters were originally written in columns rather than rows would be a palaeographical hypothesis that could be tested out and resolved one way or the other.

Reconstructing the sequence

If the above is basically right, it would seem that the stages that this page went through were:

(1) The shapes were copied in columns from a source that was (wrongly) believed to have also been written in columns.

This caused letters such as the ornate ‘H’ shape to be copied not semantically as letters, but instead as a series of strokes. I would also expect that these columns were copied downwards as per the following image:

I can see how someone who had not grasped the correct orientation of these letters might have considered their rotated versions to be “hieroglyphic”-like. (I can also see how going from “hieroglyphic”-like to reconstructing the 2500 B.C. Jaredite flight from Egypt to America in submarines might seem a little too extreme for some.)

Note that I can easily see how the bottom of this page (beneath the ragged fold in the museum photograph) could have originally contained a “rude delineation of a circle divided into various compartments”: in which case the page was obviously longer. The overall page was also probably folded in half (parallel to the longest edge) at around this time, because only a single crease is apparent in the photograph.

This, then, would have been what was shown to Charles Anthon in 1828.

(2) The circular calendar section was removed, and the ‘Caractors’ word added.

Note that MacKay et al [*1] showed that the “Caractors” lettering at the top and the lettering of the curious letters were all done in the same ink. However, it also seems likely to me (from the orientation) the Caractors word was added in a quite separate construction phase, and their conclusion that this word was added at the same time as the rest of the letters ought to be examined very carefully indeed.

I believe that the circular calendar section was removed around now because of the following phase…

(3) The “Book of Generation Adam” text is added circa 1830, halfway down the reverse side.

Because this text was added right in the middle of the reverse side, it seems likely to me that the circular calendar section had already been removed (or else this text would probably have appeared further up the [slightly longer] page).

We can date this addition to 1830 or after, because that is when the phrase “The Book of Generation Adam” began to be used in the Mormon Church.

(4) The “Book of Generation Adam” half of the page is removed before 1884.

As Grindael noted, the part of the page with the “Book of Generation Adam” text was almost certainly “torn off sometime before 1884, because it is described as having the same dimensions then as it did in 1903”.

(5) The remaining fragment is sold to the RLDS Church in 1903.

“This collection of documents [was] eventually given into the care of George Schweich, a nephew of David J. Whitmer, who subsequently sold them to the RLDS Church for $2450 in 1903.”

Is this sequence correct?

I don’t honestly know. But if you were to try – while wearing an Intellectual Historian hat – to reconcile what you see in the RLDS Caractors fragment with the different testimonies assuming they were all given in good faith, then I strongly suspect that this sequence is extremely close to where you would necessarily end up.

And perhaps that’s as good as it gets, at this distance in time. Or… perhaps this is just the start?

[*1] MacKay, Michael Hubbard; Dirkmaat, Gerrit J.; Jenson, Robin Scott. The “Caractors” Document: New Light on an Early Transcription of the Book of Mormon Characters – Mormon Historical Studies, vol. 14, No. 1.

Having studied unsolved cipher mysteries for more than a decade, it seems to me that there are some distinct patterns of behaviour around them (by owners and by others) that serve to muddy the waters for modern researchers.

And so for the sake of collaborative clarity, I think that each of these behaviours ought to be given a ‘pattern name’. (There’s a very large “Patterns” literature in Architecture, Computer Science and Management, where common patterns of behaviour [both good and bad] are given names.) You may agree or disagree with the specific examples I give (and/or you may have a better pattern name in mind), but please hear me out, see what I’m trying to get at here…

“Cipher myth-making”

This behaviour typically occurs in the situation where someone has inherited or found an unsolved historical cipher, but has no provenance or definite historical context to work with. Unable to solve the cipher, the owner then (for whatever reason) concocts a myth or legend around it that they would like to be true.

The prime example here would seem to be the first version of “La Buse”‘s cryptogram (as famously described by Charles de la Roncière in his 1934 book “Le Flibustier Mysterieux”).

To my eyes, the odds are high that this was found in a notarial archive but with nothing accompanying it to help place or date it. And then, perhaps inspired by the early twentieth century Mauritian “gold rush” to find the Nageon de l’Estang pirate treasure, the owner presumed (though without proof) that it was a pirate treasure map.

My guess is that the myth that was added here was that of Olivier Levasseur hurling a treasure map into the crowd just before his execution, and exclaiming “Mon trésor à qui saura le prendre“. (There is, as far as I can tell, not a jot of evidence to support the idea that this melodramatic little scene actually happened.)

Without that, why would anyone link the cryptogram with La Buse?

“Cipher backfilling”

This behaviour occurs when the unsolved cipher has some kind of story already associated with it, but the absence of useful support details offers an evidential vacuum that demands to be filled in.

This differs from cipher myth-making in that here some kind of basic story needs to first be in place (though whether that story itself is true or false is another matter entirely): the additions are then in the form of elaborations to the core narrative, fleshing out its skeletal structure.

The obvious example of this would seem to be the second “La Buse” cryptogram:

Here, the elaborations would be the extra lines of cipher (some apparently cribbed from Poe), the drawings (some apparently cribbed from Howard Pyle), and the pigpen ciphertext saying “LA BUSE” (apparently cribbed from the myth).

The Beale Papers?

As with the two different “La Buse” cryptograms, the evidential haze around many other unsolved cipher mysteries can exhibit both cipher myth-making and cipher backfilling at the same time.

For example, I think there’s a strong argument that while the Beale Ciphers themselves could well be genuine, the case for the Beale Papers‘ being genuine is somewhat less straightforward.

The supposed bedrock of the history is that Beale placed an iron box with the cryptograms in trust with an innkeeper called Robert Morriss, who then opened it 23 years later (in 1845). However, the well-known problem with this timeline is that Morriss did not start work at the Washington Hotel until 1823, which was apparently after the box had already been left.

This suggests that Morriss may well have inherited the box from a previous innkeeper at the Washington Hotel: and that even if Morriss knew the correct name of the box’s owner (which was presumably, but not necessarily, written on the box itself), he may well never have actually met him.

This further suggests that Morriss may have taken the basic story about how Thomas Beale left a box at the Washington Hotel in the early 1820s and backfilled it until it became a tale worth telling and re-telling (while perhaps also advancing his personal claim on any treasure that may get found on it).

Moreover, it would seem that Morriss’s tale was then further elaborated by the (unnamed) author of the Beale Papers, until it became a tale worth printing (and hopefully buying).

However, if you put the Beale cryptograms to one side, I don’t currently see any evidence that anything about the Beale Papers is genuine, not even Thomas Beale’s name. Which perhaps goes to show how careful you have to be when trying to make sense of cipher mysteries.

The Voynich Manuscript?

It could well be that the the 1665 Marci letter that famously accompanied the Voynich Manuscript contains distant echoes of previous cipher myth-making: its suggested link to Roger Bacon now seems somewhat spurious, but was notable enough for Raphael Mnišovský to remember some decades later.

The supposed link between the Voynich Manuscript and John Dee / Edward Kelley is somewhat easier to deal with: without any real doubt, this was Wilfrid Voynich’s own cipher backfill. But his notion that the only conceivable way the manuscript could have travelled from England to Bohemia was via Dee and/or Kelley seems both historically and intellectually unsatisfactory.

Perhaps the bigger story here, as I’ve argued elsewhere, is that the Rosicrucian Manifestoes might possibly be the most extraordinary cipher backfill ever, i.e. that they were part of a huge after-the-event false history construction designed to appropriate the Voynich Manuscript into a scheme to con(vince) Holy Roman Emperor Rudolf II into backing a proto-Freemasonic group. But we may never be able to determine whether or not this is true.

Nowadays, there seems to be no end of people putting out YouTube videos and websites with Voynich-related backfill: indeed, perhaps the biggest challenge we face going forward is swimming through the brown tide of cipher backfill. Oh well!

The other day, I was wondering where in East London (according to the story the owner told me) the Blitz Ciphers were found: and also wondered if they might have been left behind by some kind of mathematical society.

As an aside, the problem with any speculative mathematical link to Freemasonry is that even though Masonic theoretical historians like to talk about (capital-G) Geometry and how the Great Architect of the Universe (errrrm: God, basically) is somehow ineffably mathematical, their rather grand Platonic-Christian narrative breaks down when you bother to look at the details. The short version is that if there is any genuine maths in Masonry beyond basic Euclid-for-Dummies, it seems to me to be extraordinarily well-hidden.

(As always, if you happen to know of specific examples of mathematical Masonic societies that run counter to this sweeping generalization, please feel free to leave a comment below.)

So I instead went looking for genuine historical mathematical societies in London’s East End: and was delighted to discover the all-too-brief splendour of the Spitalfields Mathematical Society.

The Spitalfields Mathematical Society, Crispin Street

Conspiracy theorists and armchair cold case amateur detectives know this part of London well: the Ten Bells pub just around the corner was frequented by Jack the Ripper’s victims, the last of whom was found in Millers Court (close to Crispin Street). (Pastry chef geezer Jamie Oliver’s great-great-grandfather was for a while the Ten Bells’ landlord, for all you TV trivia fans.)

Incidentally, I found a rather nice website that blends historical photos of Spitalfields (taken by C. A. Mathew around 1912) with modern photographs taken on the same spot, to give an eerily evocative effect (such as the following image of Crispin Street):

But long before even C. A. Mathew, the history of the area revolved around Huguenot weavers, whose houses in Fournier Street are still there:

And it was the Huguenot immigrants who the Spitalfields Mathematical Society was originally aimed at, according to most accounts. De Morgan’s (1872) “A Budget of Paradoxes” describes it thus:

Among the most remarkable proofs of the diffusion of speculation was the Mathematical Society, which flourished from 1717 to 1845. Its habitat was Spitalfields, and I think most of its existence was passed in Crispin Street. It was originally a plain society, belonging to the studious artisan. The members met for discussion once a week ; and I believe I am correct in saying that each man had his pipe, his pot, and his problem. One of their old rules was that, “If any member shall so far forget himself and the respect due to the Society as in the warmth of debate to threaten or offer personal violence to any other member, he shall be liable to immediate expulsion, or to pay such fine as the majority of the members present shall decide.” But their great rule, printed large on the back of the title page of their last book of regulations, was “By the constitution of the Society, it is the duty of every member, if he be asked any mathematical or philosophical question by another member, to instruct him in the plainest and easiest manner he is able.” We shall presently see that, in old time, the rule had a more homely form.

I have been told that De Moivre was a member of this Society. This I cannot verify : circumstances render it unlikely ; even though the French refugees clustered in Spitalfields ; many of them were of the Society, which there is some reason to think was founded by them. But Dollond, Thomas Simpson, Saunderson, Crossley, and others of known name, were certainly members. The Society gradually declined, and in 1845 was reduced to nineteen members. An arrangement was made by which sixteen of these members, who were not already in the Astronomical Society became Fellows without contribution, all the books and other property of the old Society being transferred to the new one. I was one of the committee which made the preliminary inquiries, and the reason of the decline was soon manifest. The only question which could arise was whether the members of the society of working men for this repute still continued were of that class of educated men who could associate with the Fellows of the Astronomical Society on terms agreeable to all parties. We found that the artisan element had been extinct for many years ; there was not a man but might, as to education, manners, and position, have become a Fellow in the usual way. The fact was that life in Spitalfields had become harder : and the weaver could only live from hand to mouth, and not up to the brain. The material of the old Society no longer existed.

London had a fair few broadly similar societies – the Mechanic’s Institution and the London Architectural Society to name but two – but if you were looking for a mathematical society in East London that had long disappeared and some of whose papers might -possibly- have been the Blitz Ciphers, the Spitalfields Mathematical Society would seem to be at the very least an interesting candidate, right?

But the immediate question is…

Was Crispin Street bombed in WWII?

Having once idly flicked through a copy of “The London County Council Bomb Damage Maps 1939-1945” hardback when it came out in 2015, I half-remembered that the London bomb maps were all at the London Metropolitan Archive, and had once upon a time been in an exhibition there. There’s also tons more stuff in the National Archives in Kew (in whose downstairs bookshop I saw the book, incidentally).

But this being the Internet, there are also online bomb damage maps to try out. And it turns out that even though nearby streets were hit (such as Frying Pan Alley)…

…it would seem that Crispin Street escaped WWII unscathed.

So it would finally seem that we may well be out of luck with any possible connection between the Blitz Ciphers and the Spitalfields Mathematical Society. But all the same, I’m glad I looked. 🙂

And finally…

The Astronomer’s Drinking Song

Augustus De Morgan’s “A Budget of Paradoxes” includes the lyrics of a song sung at a Mathematical Society dinner in 1798, in honour of its solicitor, Mr. Fletcher. He had defended it against charges brought against them by “Informers”, but refused all offers of payment. Splendidly, De Morgan included the lyrics, which I reproduce below.

Of course, classic comedy song connoisseurs will instantly spot the connection with Monty Python’s “Rhubarb Tart Song“, which also mentions René Descartes (The principles of modern philosophy / Were postulated by Descartes. / Discarding everything he wasn’t certain of / He said ‘I think therefore I am a rhubarb tart.’)

THE ASTRONOMER’S DRINKING-SONG.

WHOE’ER would search the starry sky / Its secrets to divine, sir,
Should take his glass I mean, should try / A glass or two of wine, sir !
True virtue lies in golden mean, / And man must wet his clay, sir ;
Join these two maxims, and ’tis seen / He should drink his bottle a day, sir !

Old Archimedes, reverend sage ! / By trump of fame renowned, sir,
Deep problems solved in every page, / And the sphere’s curved surface found, sir:
Himself he would have far outshone, / And borne a wider sway, sir,
Had he our modern secret known, / And drank his bottle a day, sir !

When Ptolemy, now long ago, / Believed the earth stood still, sir,
He never would have blundered so, / Had he but drunk his fill, sir :
He’d then have felt it circulate, / And would have learnt to say, sir,
The true way to investigate / Is to drink your bottle a day, sir !

Copernicus, that learned wight, / The glory of his nation,
With draughts of wine refreshed his sight, / And saw the earth’s rotation ;
Each planet then its orb described, / The moon got under way, sir ;
These truths from nature he imbibed / For he drank his bottle a day, sir !

The noble Tycho placed the stars, / Each in its due location ;
He lost his nose by spite of Mars, / But that was no privation :
Had he but lost his mouth, I grant / He would have felt dismay, sir,
Bless you ! he knew what he should want / To drink his bottle a day, sir !

Cold water makes no lucky hits ; / On mysteries the head runs :
Small drink let Kepler time his wits / On the regular polyhedrons :
He took to wine, and it changed the chime, / His genius swept away, sir,
Through area varying as the time / At the rate of a bottle a day, sir !

Poor Galileo, forced to rat / Before the Inquisition,
E pur si muove was the pat / He gave them in addition :
He meant, whate’er you think you prove, / The earth must go its way, sirs ;
Spite of your teeth I’ll make it move, / For I’ll drink my bottle a day, sirs !

Great Newton, who was never beat / Whatever fools may think, sir ;
Though sometimes he forgot to eat, / He never forgot to drink, sir :
Descartes took nought but lemonade, / To conquer him was play, sir ;
The first advance that Newton made / Was to drink his bottle a day, sir !

D’Alembert, Euler, and Clairaut, / Though they increased our store, sir,
Much further had been seen to go / Had they tippled a little more, sir !
Lagrange gets mellow with Laplace, / And both are wont to say, sir,
The philosophe who’s not an ass / Will drink his bottle a day, sir !

Astronomers ! what can avail / Those who calumniate us ;
Experiment can never fail / With such an apparatus :
Let him who’d have his merits known / Remember what I say, sir ;
Fair science shines on him alone / Who drinks his bottle a day, sir !

How light we reck of those who mock / By this we’ll make to appear, sir,
We’ll dine by the sidereal clock / For one more bottle a year, sir :
But choose which pendulum you will, / You’ll never make your way, sir,
Unless you drink and drink your fill, / At least a bottle a day, sir !

It’s well-known that over the last two centuries, the quest for the mysterious “Money Pit” on Oak Island has yielded no sign of treasure while simultaneously consuming an inordinate quantity of diggers’ dollars – and if you can even think about all that without silently mouthing the phrase ‘ironically enough’, you have a huge amount of self-control. 😉

Yet despite all that ‘activity’, nothing of any actual substance about the whole curious enterprise that put or left the (so-called) pit there in the first place seems to have emerged. All that has been achieved is that (a) a small island has been ravaged by glinty-eyed treasure hunters, and (b) bookshelves have been filled with books that almost all manage to leave readers somehow less knowledgeable than when they began.

If you pause to reflect on the scale and prolonged fruitlessness of this archaeological disaster zone even momentarily, you’ll surely find it hard to prevent the two words “Epic” and “Fail” from lurching to the front of your mind. 😐

“The Curse of Oak Island”

Perhaps naturally enough, it seems that the (apparently obligatory) combination of determination, hubris, cupidity and stupidity that Oak Island treasure hunters have also makes them ideal Reality TV subjects, every bit as good as the Kardashians, TOWiE or whatever. Which is why the Canadian reality TV show “The Curse of Oak Island” (which premiered in 2014, and follows the Oak Island treasure hunt being pursued by Michigan brothers Marty and Rick Lagina) is now in its fantabulous 4th season. Will it ever end? (What do you think?)

Whatever you personally make of the whole Oak Island reality TV project, it is surely a brutal mirror to hold up to modern culture’s pox-plagued visage: for if all it boils down to is a fruitless search for something that nobody can describe and for which there seems to be no actual evidence, surely nobody involved can emerge the other side looking or smelling good. 🙁

Yet, curiously paralleling the Anton Transcript at the core of Mormonism, at the heart of the Money Pit mythology lies a cipher mystery that has had so much screen time in Z-grade historicalist documentaries that it practically has its own Equity card. Yes, I’m talking about a cipher that could get gigs on cruise ships.

As per normal, nobody knows whether or not this cipher is the real deal or merely Milli Vanilli. Moreover, it turns out that – just like the two versions of La Buse’s cryptogram – it also has a secret twin cipher (and nobody knows whether or not that’s real either), which we’ll (eventually) return to in Part 2. 🙂

Anyhoo, it’s time we all had a proper Cipher Mysteries look at the first (and infamous) Oak Island cipher…

The 80-foot Rock Cipher

Though most modern authors call it the “90-foot rock” cipher, this was claimed to have been found carved into a rock found eighty feet underground. As usual, I try to avoid following trends if I know they’re broken. 🙂

Regardless, the first documentary mention of it is in a 2nd June 1862 letter written by treasure hunter Jotham B. McCully of Truro, printed in the “Liverpool Transcript” in October 1862 in response to a critical article entitled “The Oak Island Folly”. McCully wrote “The Oak Island Diggings” to explain why he and the other treasure hunters were so convinced there was treasure in the Pit.

Bearing in mind that, according to other records, the original ‘Onslow Company’ search started in about 1795…:

“About seven years afterwards, Simeon Lynds, of Onslow, went down to Chester, and happening to stop with Mr. Vaughn, he was informed of what had taken place. He then agreed to get up a company, which he did, of about 25 or 30 men, and they commenced where the first left off, and sunk the pit 93 feet, finding a mark every ten feet. Some of them were charcoal, some putty, and one at 80 feet was a stone cut square, two feet long and about a foot thick, with several characters on it.”

According to this admirably source-heavy webpage, the stone was “yet to be seen in the chimney of an old house near the pit” (19th February 1863, Yarmouth Herald).

Then, the “remarkable” stone was then revealed to have been found “pretty far down in the pit, laying in the centre with the engraved side down”, and the house was revealed to be that of John Smith. It contained “a number of rudely cut letters and figures upon it. They were in hopes the inscription would throw some valuable light on their search, but unfortunately they could not decipher it, as it was either too badly cut or did not appear to be in their own vernacular.” (2nd January 1864, The Colonist, Halifax N.S.)

George Cooke, in a 27th January 1864 letter, described the marks as “rudely cut letters, figures or characters […]. I cannot recollect which, but they appear as if they had been scraped out by a blunt instrument, rather than cut with a sharp one.” He hoped that they could be deciphered in the future.

But what did the marks say? At that point in the cipher’s history, it seems nobody had decrypted it. But, according to the Oak Island Treasure Company prospectus (the copy transcribed on pp.215-225 of Geoff Bath’s “Maps, Mystery, and Interpretation” [Part 2] is dated 1894):

Many years afterwards, it was taken out of the chimney and taken to Halifax to have, if possible, the characters deciphered. One of the experts gave his reading of the inscriptions as follows: “Ten feet below are two million pounds buried.” We give this statement for what it is worth, but by no means claim that this is the correct interpretation. Apart from this however, the fact remains that the history and description of the stone as above given have never been disputed.”

Hence it was (apparently) first decrypted between 1864 and 1894.

Creighton’s Bookstore

The next mention of the “quaint carven stone” has it in Creighton’s Bookstore in Halifax, N.S.: “but the inscriptions were erased long ago after the stone had endured the blows from a bookbinder’s mallet. But at the time of the discovery of the stone the inscriptions were translated to read: ‘Ten feet below, 2,000,000 pounds lie buried.'” (29th April 1909, Fairbanks Daily News Miner).

Yet… the 19th August 1911 edition of Collier’s Magazine contains an eyewitness account supplied by Captain H.L. Bowdoin that departs somewhat from the dominant narrative. He wrote:

“While in Halifax we examined the stone found in the Money Pit, the characters on which were supposed to mean: “Ten feet below two million pounds lie buried.” The rock is of a basalt type hard and fine-grained.”

“There never were any characters on the rock found in the Money Pit. Because: (a) The rock, being hard, they could not wear off. (b) There are a few scratches, etc., made by Creighton’s employees, as they acknowledged, but there is not, and never was, a system of characters carved on the stone.”

There was backed up thoroughly by a 27th March 1935 eyewitness statement by Harry W. Marshall, who was the son of one of the owners of Creighton & Marshalls:

One of the Creighton’s was interested in the Oak Island Treasure Co. and had brought to the city a stone which I well remember seeing as a boy, and until the business was merged in 1919 in the present firm of Phillips & Marshall. The stone was about 2 feet long, 15 inches wide, and 10 inches thick, and weighed about 175 pounds. It had two smooth surfaces, with rough sides with traces of cement attached to them. Tradition said that it had been part of two fireplaces. The corners were not squared but somewhat rounded. The block resembled dark Swedish granite or fine grained porphyry, very hard, and with an olive tinge, and did not resemble any local stone. Tradition said that it had been found originally in the mouth of the “Money Pit”. While in Creighton’s possession some lad had cut his initials ‘J.M.” on one corner, but apart from this there was no evidence of any inscription either cut or painted on the stone. Creighton used the stone for a beating stone and weight. When the business was closed in 1919, Thos. Forhan, since deceased, asked for the stone, the history of which seems to have been generally known. When Marshall left the premises in 1919, the stone was left behind, but Forhan does not seem to have taken it. Search at Forhan’s business premises and residence two years ago disclosed no stone. The full history of the stone was written up in ‘the Suburban” about 1903 or 1904.

(Incidentally, people have searched for this issue of “The Suburban” but without any success.)

The two stones

Nobody seems to have dwelt much on what – to me, at least – is the most obvious problem with the above. Which is that we seem to be talking about two quite different stones here.

The first stone: “a stone cut square, two feet long and about a foot thick”, found eighty feet underground, and put into a chimney. Has curious writing on. Repeatedly described as having been “cut square”, like a “flagstone”.

The second stone: “2 feet long, 15 inches wide, and 10 inches thick”, “rounded” corners, found near the mouth of the Money Pit, and had been taken out of a chimney. Apparently has no writing on. “Basalt type hard and fine-grained” (Bowdoin), or “dark Swedish granite or fine grained porphyry, very hard, and with an olive tinge” (Marshall).

While it is entirely possible that the first stone was cut down to make it fit in John Smith’s chimney, the two descriptions don’t seem to fit each other in any other way either.

The most likely explanation to my mind is that we are talking about two entirely separate rocks both coming from the Money Pit, the first with marks roughly carved into it (and so perhaps a softer stone such as sandstone), and the second a much harder stone with no marks carved into it (the “JM” was added during its time in Halifax).

The first stone may therefore still be extant somewhere, perhaps in the garden of a Halifax house of a former treasure hunter.

Images of the 80-foot rock cipher

The short version is that there are no tracings or copies made from the object itself whose veracity we can be even remotely sure of: most of the images floating round the Internet are mock-ups of what people think it should look like.

Worse, the cipher’s plaintext seems to have changed along the way. Whereas in 1894 it was described as saying “Ten feet below are two million pounds buried”, this later changed into “Forty feet below two million pounds are buried” – note both the different depth and the different word order.

Where did this change? The first time we see the “forty feet” version is in a circa 1949 typewritten account of Oak Island by Reverend Austen Tremaize Kempton (which was never published):

Here’s what it looked like in print (I believe this is in Edward Rowe Snow’s 1949 “True Tales of Buried Treasure”):

The person now often said to have decrypted the inscription was Dalhousie University Professor of Languages James Leitchi: there’s a good-sized page on him here.

Of course, one problem with this is that Leitchi was not actually an “old Irish school Master” but Swiss. However, he was (according to the timeline) a teacher at Halifax High School up until 1884: and we know that the stone was decrypted in Halifax before 1894.

Analyses and theories

Even though there is essentially zero doubt that the cipher as presented by Kempton (and then Snow) does indeed read “Forty feet below two million pounds are buried”, plenty of extra interpretations (typical “dual cipher” theories) have been put forward. One such was Dr. Wilhelm’s (modified) “At eighty guide maize or millet estuary or firth drain F”, described here.

Other webpages suggest that the letter shapes are all mathematical symbols, but this seems a bit lame to me: the shapes are just simple cipher shapes, nothing funky.

Other webpages suggest that Kempton faked the cipher, or that the whole thing is in fact a Masonic cryptogram or riddle. There’s also a theory by Keith Ranville, who also once put forward a Silk Road prostitution theory about the Voynich Manuscript

But I think all these theories and ideas are missing the big problem: which is that because we can’t account for the change in wording between the two versions of the cipher, we simply can’t comfortably trust the versions we have.

However, it’s entirely possible that I’ve missed something important in all the timelines. Please let me know if I have, thanks! 🙂

In a recent post here, I floated the idea that the Zodiac Killer’s Z408 (solved) cipher’s unusual homophone distribution may have arisen not conceptually (i.e. from a hitherto-unknown book on cryptography), but instead empirically (i.e. emerging from the properties of a specific text).

It’s certainly possible that he might have used his own (private) text to model his homophone distribution, in which case we probably almost no chance of reconstructing it. However, I think it likely that he instead used the first few characters of an already existing public text (such as Moby Dick, the Book of Genesis, the Declaration of Independence, or whatever) to do this.

It’s a reasonable enough suggestion, I think: and moreover one that we can try to test to a reasonable degree.

Z408’s homophones

A homophonic cipher key allocates a number of cipher shapes to individual plaintext letters, usually (but not always) in broad proportion to their frequency. So in a typical homophonic cipher key you would expect to see far more shapes for E (the most common letter in English) than for, say, Z or Q.

Though this is essentially the case for what we see in the Z408 cipher (particularly for the more frequent letters, ETAOINS), the numbers of homophones chosen for the less frequent letters seem somewhat idiosyncratic and arbitrary:

7 shapes – E
4 shapes – T A O I N S
3 shapes – L R
2 shapes – D F H
1 shape  – B C G K M P U V W X Y
Did not appear: J Q Z

People have long searched for a primer or textbook on cryptography where the description of the alphabetic frequency distribution matches this, or even where the alphabetic frequency ordering (e.g. ETAOINSHRDLU etc) matches the order here, but in vain.

Designing a filter

The basic idea for the filter is easy enough:
* read in characters from the start of a passage (we’re only interested in capitalized alphabetic letters, i.e. A-Z)
* if the instance count of that character is higher than the top of the desired range, then the test fails
* if the instance counts for all the characters are within the desired range at the same time, then the test passes
* else keep reading in more characters until the test terminates

As a side note: of all the Z408 homophones, only X appears exactly once in the Z408 ciphertext itself: but while it is conceivable that the Zodiac Killer might have allocated extra homophones for X, it does seem fairly unlikely.

The desired ranges for each of the characters would look like this (though feel free to adapt this if you disagree with the homophone counts listed above):

[7,7] – E
[4,4] – T A O I N S
[3,3] – L R
[2,2] – D F H
[0,1] – B C G K M P U V W Y J Q Z
[0,3] – X (to err on the side of safety)

Note that the single-letter characters have a slightly broader [0,1] range because we have no way of knowing whether or not they would have actually appeared in the original text.

Here are two test texts that should both pass:

EEEEEEETTTTAAAAOOOOIIIINNNNSSSSLLLRRRDDFFHHZZZZZZZZZZZZZZZZZ

BCGKMPUVWYJQZXEEEEEEETTTTAAAAOOOOIIIINNNNSSSSLLLRRRDDFFHHZZZ

Which texts to try?

Though any text published before August 1969 would potentially be a match, it would make sense to look at all manner of texts, and possibly even the first few lines of different chapters of books (though I’d be a little surprised if that was the case). All the same, the filter is easy enough to write (and should execute in a matter of microseconds) and to test, so the difficulty here lies mostly in getting hold of enough texts to try, rather than the compute time as such.

Oddly, I don’t really have a solid feel for how often the filter will find a match: my gut instinct is that roughly one in a million English text comparisons will pass, but that’s just a guesstimate based on each letter having its own little bell-curve distribution, all of which have to match at the same time.

So what do you think will match? “Catcher in the Rye” or “Moby Dick”? Place your bets! 😉

A little while back, I had a email from Marie about Alexander d’Agapeyeff’s (1939) book “Codes and Ciphers”, highlighting some interesting mistakes she had found in his section on double transposition cipher.

D’Agapeyeff described this as a cipher system that the Russian Nihilists had used, but said that they had used the same keyword for both halves of the transposition (i.e. for transposing both the columns and the rows), a technical flaw that made it easy to crack. (Oddly, the Nihilists are nowadays associated with an entirely different kind of encipherment.)

Let’s take a closer look…

D’Agapeyeff’s Double Transposition

What follows is d’Agapeyeff’s account, with comments along the way.

At the end of the nineteenth century the Russian Nihilists used a double cipher, which, having been transposed vertically, was then transposed horizontally; but they made the mistake of using the same keyword in both transpositions. As it is a common variation of double columnar cipher, we give it as an example:

The first thing that Marie picked up on was that the way that d’Agapeyeff converted the transposition keyword SCHUVALOF to an ordering was clearly incorrect: F is the sixth letter of the alphabet, so there is no obvious way that it would be counted as the highest ranked of the nine letters in the keyword. When I looked at this, I immediately guessed that it should instead have read SCHUVALOV – as it turned out, this was a good try, though still very slightly wrong. 😐

Regardless, it should already be clear that something a little non-obvious is going on here.

Now suppose we have to encipher the following: ‘Reunion to-morrow at three p.m. Bring arms as we shall attempt to bomb the railway station. Chief.’

The ‘abcd’ at the end are ‘nulls’ used to fill in the squares.

Now we transpose the message according to the letter sequence of the keyword:

So the message reads:

OMPBOETTMWORATMROTMREBRHEPIATHILBERWTYSIOATANOEUNTRNIOSGAASNRMWLSHATEALTAHIBCCEFD

In all languages where certain letters must follow or precede certain others, the deciphering of this script will never present difficulties. We first count the number of letters in the script (81), which will give us the size of the square (9×9), and once this is done all we have to do is remember that in nine cases out of ten ‘h’ follows either ‘t’ or ‘s’ or ‘c’, and that the bigrams such as AT, TO, WE and the very helpful (English) trigram ‘the’, and the doubles TT, LL, EE, etc., are the most common. In fact, the Russian police soon found out all about that conspiracy.

The second thing Marie noted here was that d’Agapeyeff was using the double transposition decryption direction here, rather than the encryption direction.

All in all, I’d agree with Marie that d’Agapeyeff didn’t seem to have fully understood how the system worked. Smartly, though, Marie now doggedly decided to look at d’Agapeyeff’s crypto sources, to see if he had copied this whole section blindly from somewhere. And, eventually, she found that d’Agapeyeff’s direct source for the above was none other than…

Auguste Kerckhoffs

…the Dutch cryptographer Auguste Kerckhoffs (1835-1903).

Kerckhoffs’ influential book (well, extended article, really) “La Cryptographie Militaire” is available online as a PDF, or as an HTMLized version here.

What follows is my usual free translation of Kerckhoffs’ description of double transposition, which we can immediately see beyond any reasonable doubt as being the source for d’Agapeyeff’s version:

On the occasion of the Nihilists’ last appearance in court, the Russian newspapers published the accused’s secret cipher. It is a system of double transposition, where the letters are first transposed by vertical columns, and are then further transposed by horizontal rows. The same word serves as a key for both transpositions: to do this, the keyword is transformed into a series of numbers, where each number matches the rank of the letter within the normal alphabetical sequence.

Here is the process applied to the word SCHUVALOW:

OK, though I was on this occasion very slightly wrong (SCHUVALOV rather than SCHUVALOW), I was at least wrong in the right kind of way. 🙂 Kerckhoffs continues:

Now, if we were to transpose a sentence such as this one – Vous êtes invité à vous trouver ce soir, à onze heures précises, au local habituel de nos réunions – we would proceed first as in the previously described [single transposition] case, and then carry out the same operation for the horizontal rows.

   = s c i a u e s e l a v i v o n t e u v t r e r s o u c a c a b i o l h t n e l o s u d e r, etc.

However complicated this transposition may appear to us, deciphering a cryptogram written with this system, can never present insurmountable difficulties in languages ​​where certain letters only present themselves in particular combinations, such as q or x in French. Here, the Russian decipherers seem to have carried out their decryption work in a relatively short time.

For any passing conlang fans, Auguste Kerckhoffs was also closely associated with the artificial language Volapük, which some people think is really koldälik. 🙂

d’Agapeyeff + Kerckhoffs = …?

It’s important to remember that d’Agapeyeff wasn’t himself a cryptographer, but rather someone who was trying to collect together interesting crypto stuff into a book that had originally been commissioned for someone else entirely to write. The project wasn’t something he was aiming to do, but rather something that fell in his lap.

As Marie points out, the big technical thing that d’Agapeyeff got wrong is that the numbers are the wrong way round, and so he is performing a double transposition decryption rather than a double transposition encryption: the two are not the same at all. That is, if you used SCHUVALOW as your single transposition keyword and then single transposition encrypted the text “SCHUVALOW”, you should get the ciphertext “ACHLOSUVW”: but both Kerckhoffs and d’Agapeyeff (copying Kerckhoffs) seem to have got this the wrong way round.

Having thought about this for a little while, I’ve come to suspect that d’Agapeyeff may well have faultily believed that double transposition was a self-inverse process, i.e. where the decryption and encryption transformations are identical.

All of which would dovetail very neatly indeed with the report that we have that he was unable to decrypt his own challenge cipher: for if he (wrongly) believed that double transposition was self-inverse, then he wouldn’t (if his challenge cipher had used double transposition) have been able to decrypt it at all. If this is correct, then his failure wasn’t anything as foolish as misremembering the keyword, but instead misunderstanding one of the component ciphers that made up the overall chain.

Might this insight help us decrypt his challenge cipher? Well… insofar as it now seems far more likely to me that he used double transposition as one of his stages, then the answer may very well be yes. Hopefully we shall see… 🙂

Prolific (if occasionally prolix) Cipher Mysteries commenter bdid1dr has long wondered whether the Somerton Man was someone in her ex-husband’s family. (She also suspects her ex-husband was the infamous Zodiac Killer, but let’s leave that for another day.)

Even though it at first sounds like an outrageously long shot (and one that would perhaps necessitate a Warren Commission ‘magic bullet’), it does in fact concord with many of the things we know about the Somerton Man, in perhaps surprising ways.

For a start, the aluminum comb, the packet of Juicy Fruit chewing gum found in the Somerton Man’s American-stitched coat and indeed the coat itself have all been taken as suggesting that the Somerton Man was American (or had recently travelled from America).

More specifically, Derek Abbott launched his recent (but unsuccessful) crowdfunding campaign on the back of a fragmentary DNA match between one of the hairs found embedded in the plaster cast bust of the Somerton Man and Thomas Jefferson.

Yet it turns out that the Shackelfords are an old Virginian family… with links to Thomas Jefferson. OK, this is all still very far from proof, but we’re not yet veering into anything like the canonical Lands Of Somerton Nonsense: so please bear with me just a little longer as we take a look at the Shackelfords…

Lee Erwin Shackelford

According to the Sydney Morning Herald, he was born on 12th April 1945 to Willian Shackelford and Normaleen (nee Park):

SHACKELFORD (nee Normaleen Park). April 12, King George V Hospital, Camperdown, semi-private, wife of T./Sgt. W. Shackelford, U.S. Air Corps – a son (both well)

And thanks to a little archival magic (big tips of the Cipher Mysteries hat to Eye and Aye for this), we have a photo of Lee Erwin Shackelford from the USS Ticonderoga circa 1964:

He was also bdid1dr’s first husband: she says that he died in New York a few years ago.

He had a brother (Preston Park Shackelford) who was born 10th April 1948 in Vallejo CA: and another brother (Mark) who was born in New Mexico in 1952.

William Jesse Shackelford Jr

Eye and Aye came up trumps here as well, with William Jesse Shackelford Jr’s US Armed Forces registration card (note: image behind a Fold3 paywall). According to this, he was born on 17th May 1922 in Norfolk VA: the “Name And Address Of Person Who Will Always Know Your Address” field is marked up as “Mrs A. B. Shackelford, 1631 Willoughby Ave, Norfolk, VA”. (Willoughby Ave is close to Norfolk’s Lyon Shipyard: #1631’s plot was long since sacrificed to make way for the I-264.)

According to the Registrar’s Report (note: image also behind a Fold3 paywall), William Shackelford Jr was white, 5′ 5″, 125 lbs, hazel eyes, brown hair, and with a ruddy complexion. He received his honourable discharge from the Army on the 30th August 1945 (ref: 13-062-516).

Unless he secretly had access to a Tardis, William Shackelford was not the Somerton Man: he was still very much alive in 1950, 1960, and even 1970.

Misca pointed out that:

On ancestry there is a record of a Normaleen May Shackelford travelling from Brisbane to San Francisco with her son Lee Ervin/Erwin. The name of the friend/relative she states she is visiting is William Shackelford, 835 Oaklette Avenue, Norfolk, Virginia. A 1940 census document shows two William J Shackelfords living on Oaklette. One is 39 and the other is 17. Father and son. Further research shows the son as having been in the US Airforce in WW II. He is William Jesse Shackelford. He married three times. First wife unknown but I suspect it may have been Normaleen. Second wife (married in 1957) Leila Barnes Stewart (who seems to have died), third wife Catherine Anne Garrett.

William Jesse Shackelford Sr

William Jesse Shackelford Sr’s obituary (in the 7th December 1972 Virginia Beach Sun looked like this:

William Jesse Shackelford, 73, of 292 Stancil St., Princess Anne Plaza, an insurance agancy [sic] operator, died in a hospital November 28 after a long illness.
He was a native of Walter Valley, Tex., a son of William J. and Mrs Martha Farley Shackelford, and the husband of the late Mrs Josephine Taylor Shackelford.
He was the owner of William J. Shackelford Insurance Co. He was a member of Norfolk Elks Lodge 38, American Legion, and Commodore FOP Lodge 3.
He was a World War I veteran.
Surviving are two daughters, Mrs Bennie S. Jordan of McLean and Mrs Shirley S. Becker of Virginia Beach; a son, William Jesse Shackelford Jr of Alexandria; two sisters, Mrs Cordelia Willcox of Tuolumne, Calif., and Mrs Sylvia S. Snyde of Corpus Christi, Tex.; a brother, Feilx Shackelford of Odessa, Tex.; 11 grandchildren; and 11 great grandchildren.

Might there be a missing Shackelford…?

I hope it’s not construed as unkind of me to note that bdi1d1dr’s handed-down family stories don’t quite add up. At this remove in both time and space, tales about her ex-husband’s family’s life in Australia (he moved to the US at a very young age) are bound to be fragmentary and incomplete.

What is either interesting or just plain Chinese Whispered here is that she was sure that there was also a Lee Irving Shackelford in Australia, who somehow disappeared: and quite how he fits into the whole picture nobody seems to know or remember.

And so my challenge to you fine people is to find out if there was a disappearing relative in William Jesse Shackelford (Jr or Sr)’s immediate family tree. Oh, and who was “Mrs A. B. Shackelford”?

Incidentally, one unusual (but possibly useful) resource here is the Shackelford Clan, a group that published a family history newsletter from May 1945 to April 1957 (scanned issues are listed online here) researching… the history of the Shackelford family. Good hunting! 🙂