I’ve spent twenty-odd years thinking about the mystery of the Voynich Manuscript’s gallows glyphs; and I thought I’d post about how I believe these glyphs evolved. Whether or not I’m right probably doesn’t matter much, because I suspect I may be the only researcher looking at this particular mystery.
The only similar attempt I can recall was when Steve Ekwall posted about the “folding key” (that had been revealed to him by an Excitant Spirit), plus his other page here. What I’m doing here isn’t remotely like that, but seeing as nobody has mentioned Steve in a decade or more, I thought his pages could do with a bit of link love.
My Core Beliefs (About Voynichese)
Cryptographically, my core beliefs about how Voynichese happened are:
- Voynichese did not appear ex nihilo (it’s far too sophisticated and tricky)
- Rather, it was an evolution and a merging of earlier fifteenth century cipher systems / tricks
- If we look carefully, we can catch glimpses of those earlier cipher systems / tricks
- Its structured glyph patterns point away from mid-fifteenth century homophonic ciphers
- Instead, its small cipher alphabet points to other tricks, e.g. steganography and transposition ciphers
- As far as arbitrarily complicated transposition ciphers go, there is a single reference (in Alberti), but we have no matching transposition ciphertexts or other contemporary references to rely on
As far as what the other component cipher systems might be, my inference has long been that one of them was originally a verbose (paired glyph) cipher designed to steganographically conceal the visual presence of Roman numbers. For example, if CLXVI were each encoded as or [C], ol [L] / am [X] / al [V] / ar [I], the number LXXXVII would encode as olamamamalar. Note: this may not be quite how it ended up being used in the Voynich Manuscript, but my guess is that this is where these verbose pairs came from.
What, then, of the gallows glyphs? Where did they come from, and what happened to them along the way? These are the kinds of questions this post is trying to answer (however imperfectly).
Oh, and before I launch into the different evolutionary stages, my core belief is that the gallows glyphs have retained their original shapes throughout all this, but that their function has expanded and developed. Just so you know.
Evolution #1 – Cipher Alphabet Selector (x2)
In the first evolution, I believe there were exactly two gallows glyphs, and that they had the same shapes as the Voynich Manuscript’s EVA t and EVA k. These would have been used only in the first character of a paragraph of ciphertext to indicate one of two cipher alphabets to use, visually concealed as a scribal flourish. We still see echoes of this earliest evolution in Herbal A pages (but mainly p-glyphs), such as the page-initial glyphs on f8v (EVA t) and f27r (EVA k):
The specific reason I think this is because of their shapes: I believe the shapes of these glyphs signalled to the decipherer not only which of two cipher alphabets to use, but where on the cipher ledger page to look for that cipher alphabet. That is, the cipher ledger page for the overall cipher would have contained two ciphers, one written out horizontally (EVA t) and one written out vertically (EVA k).
In a way, this would have been like an early homophonic cipher, but crossed with steganography. It feels like a branch of cryptography that had not yet hit its mid-fifteenth century stride, but as an evolving practice of secret writing whose history had yet to be written. Hence I’d tentatively date this first layer to the 1420s or maybe the 1430s.
Have I or anyone else seen a page of a cipher ledger with both a horizontal cipher key and a vertical cipher key? No, I don’t believe so: but nonetheless I still believe this was the first stage of the glyph evolution.
Evolution #2 – Fake Cipher Alphabet Selector
The next evolution introduced fake cipher selector glyphs at the start of paragraphs and pages – EVA p and EVA f. I believe that this usage is a feint, designed to make code-breakers suspect (wrongly) that the ciphertext they’re trying to crack uses the older cipher system: and that this is exactly what we see in the Voynich Manuscript.
But… why introduce fake cipher selector glyphs at all? My belief is that the cipher creator introduced the (stage 2) fake gallows glyphs to replace the (stage 1) original gallows glyphs, because they wanted to reuse the original glyphs for a different (but related) cryptographic trick, which we’ll see in the next section.
Also: I believe this second stage implies that the cipher creator had shown the first evolutionary stage to multiple potential patrons, in an attempt to sell his cryptographic / intelligencer services to them: or else there would have been no need for tricky misdirection. So I believe this tells a story not of a complete outsider, but rather of someone on the periphery of one or more fifteenth century courts, trying to use their cryptographic smarts to gain patronage.
Evolution #3 – EVA k = Vertical Transposition Cipher Token
In this third evolution, EVA t still referred to a horizontal cipher key and EVA k still referred to a vertical cipher key. That is, the glyph shapes retained the original visual cue to where on the page to look for the key, but the keys had moved to a new place (and on a new page).
So, where are these putative keys? I’ll start with the vertical key: it’s the first token (which might be a glyph or a glyph group) inserted at the start of each line. The idea that there is some kind of insertion going on at the start of lines is an idea that has been floated for decades, e.g. supported by statistical studies indicating that the first word of a line is normally a little longer than the second word. This of course plays havoc with vocabulary (because it yields lots of unique words) and any proposed explanatory grammar (because line-initial words mess up nice neat models).
All the same, few have proposed explanations as to what this vertical key might be for. Philip Neal in particular talked about this a lot: in his honour, these letters are often described as a “vertical Neal key”, though I believe he never felt comfortable hypothesizing about what that might mean cryptographically.
Me, I’m far more comfortable with hypotheticals, because otherwise we keep on hitting Wittgensteinian “whereof walls”. Here, my hypothesis is that EVA k is a transposition token that decipherers should replace with the token inserted at the start of the line. This makes this mechanism it very much a transposition cipher, but rather than a rail-fence cipher (which kind of relies on seeing letters as movable type, and is therefore more of a post-Gutenberg transposition cipher) it is a line-centric transposition cipher.
For an encipherer, then, the sequence would be something like this:
- Scan though the whole of a single plaintext line
- Find the (I imagine) single consonant that appears the most on that line
- Insert an enciphered version of that letter at the start of that line
- All instances of that letter within the line would then be replaced by EVA k
Let’s try this on a concrete example:
TO SLEEP PERCHANCE TO DREAM AY THERES THE RUB
FOR IN THAT SLEEP OF DEATH WHAT DREAMS MAY COME
OK: the most common consonant in the first line is R or T (four times each), and in the second line T (four times). So, replacing the first line Rs and the second line Ts with $ (standing in for EVA k) gives:
RTO SLEEP PE$CHANCE TO D$EAM AY THE$ES THE $UB
TFOR IN $HA$ SLEEP OF DEA$H WHA$ DREAMS MAY COME
Now, on its own, this cipher trick is far from fearsome: but when arrayed as one of a carefully chosen set of cipher tricks, I think it can be quite the monster.
Evolution #4 – EVA t = Horizontal Transposition Cipher Token
Whereas the third stage was a line-centric transposition cipher (i.e. you didn’t need to look beyond the current line to encipher or decipher the text), this fourth evolution is a paragraph-centric transposition cipher. What that means is that a horizontal key is concealed somewhere in the paragraph, and that each time a decipherer encounters an EVA t in the text, they replace the EVA t with the next token along from the horizontal key.
OK, so where is this horizontal key? There seems little doubt to me that it will always be found somewhere on the top line of a paragraph. My suspicion is that in the earliest iterations of the cipher, this horizontal key may well have been placed right at the start of the paragraph. But as time went by, this was seen as a weakness, and so the encipherer would have needed to (what code-makers call) “bury” it inside. (For example, Typex used “buried codresses”, though this always sounds to me like an elaborate fish funeral.)
So, where on the top line of a paragraph should we be looking for these horizontal keys? In my previous post, I went looking for model-unfriendly long words: two of these (highlighted by Mauro) were in Q20 on the top line of paragraphs – chkaidararal on f115v, and shoefcheeykechy on f104v. These could very easily be horizontal keys, right? While that’s indicative, that’s really not systematic enough.
Once again, Philip Neal possibly comes to our rescue. One Voynichese behaviour he has long been intrigued by is the presence of pairs of words on the top line on paragraphs where both words contain EVA p. Philip wondered whether these pairs might somehow be signalling or bracketing a key phrase of some sort: though, as before, he remained hesitant about lurching forward from there into some kind of cryptographic hypothesis. But all the same, it has to be said that these p-paired horizontal Neal keys feel a lot like some kind of metatextual feature, whether a concealed title, or colour hint or what.
Whatever the actual explanation for these Neal keys, they feel almost consciously designed to disrupt nice neat statistics and/or linear language hypotheses about Voynichese. For if you take out all the paragraph-initial EVA p instances, as well as all the EVA p instances in p-paired horizontal Neal keys, then the number of EVA p instances remaining in the text drops down to almost none.
So… where exactly on the top line of a paragraph are the keys? What is the tell for a cipher key? I… don’t know. Yet. But I continue to look. Today I’m wondering whether I might be able to work backwards from odd words like chkaidararal and shoefcheeykechy to understand the visual cues on the page placed there to help a decipherer see the key. And the final answer may well have something to do with horizontal Neal keys. Hopefully we’ll get there before too long.
Evolution #5 – Where Transposition Doesn’t Work
A key problem with these two transposition ciphers is that they rely on you having neat lines and neat paragraphs to embed keys in. But what about pages built around circular diagrams? Here there is neither an obvious top line, nor an obvious line-start to insert before. So I believe a different kind of key would be needed.
For what it’s worth, I believe that an additional verbose cipher was introduced for these pages: ok / yk / ot / yt. Just to make things difficult for you. So I therefore think that “ok” is a verbose cipher, but “k” is a transposition cipher. But I might be wrong.
OK, So Where Next With All This, Nick?
I first suggested much of the above in “The Curse of the Voynich”, nearly twenty years ago: so for a fair few Voynich researchers this is far from breaking news. All the same, there’s lots of other stuff here that is new, so I think it was worth bringing the thread a bit more up to date.
Really, the big ‘where next‘ step here is simply to see if there’s some kind of visual cue (or an evolving set of visual cues) that signals to the decipherer exactly where a horizontal key is buried (e.g. on the top line of a paragraph). But if I’m the only person searching for this stuff, you better not hold your breath waiting for the next update, because it might be some time.