I’ve just had a nice email from my old friend GC, asking what I think happened with Quire 8 (“Q8”). You see, the problem is that Q8 contains a whole heap of codicological oddities, all of which fail to join together in a satisfactory way:-

  • f57v has a bottom-right piece of marginalia that (I think) looks rather like “ij” with a bar above it – yet it’s not one of the quire numbers, and doesn’t appear on the back of a quire.
  • f66r has some bottom-left marginalia (the “mus del” nymph): yet unlike most similar Voynich Ms marginalia doesn’t appear on the front or back of a quire.
  • The first (f57 + f66) bifolio contains both circular diagrams and plants
  • The second (f58 + f65) bifolio contains two text-only pages and two herbal pages
  • f58r and f58v have stars linked to most of the paragraphs: but these have no tails, and hence are more like the “starfish” and “stars” found in Quire 9 (Q9) than the paragraph stars used in the recipe section at the end.
  • The page numbers on f65, f66, and f67 all appear to have been emended by a later owner (you can still see the old faint 67 to the right of the new 67)
  • And don’t even get me started about the circular diagram on f57v (with the repeated sequence on one of the rings). Put simply, I think it’s not a magic circle, but rather something else completely masquerading as a magic circle.
  • But sure: at the very least, f57v’s circular diagram would seem to have much more in common with the circular diagrams in Q9 than with herbal quires 1-7.

Generally speaking, though, Q8 seems to be broadly in the right kind of place within the manuscript as a whole. Because its bifolios contain both herbal and diagrammatic stuff, it seems to “belong” between the herbal section and the astronomical section. However, the bifolios’ contents (as we now see them) appear to be rather back-to-front – the circular diagram and the stars are at the front (next to the herbal section), while the herbal drawings are at the back (next to the astronomical section).

This does suggest that the pages are out of order. And if you also look for continuity in the handwriting between originally consecutive pages, I think that only one original page order makes proper sense: f65-f66-f57-f58. When you try this out, the content becomes:

herbal, herbal, text, herbal, herbal, // circle, stars + text, star + text

Where I’ve put the two slashes is where I think the first (herbal) book stops and the second (astronomical) book begins: and I believe the “ij-bar” piece of marginalia on the circle page is one owner’s note that this is the start of “book ij” (book #2).

So, I strongly suspect that what happened to Q8 was a sequence very much like this:-
1. The original page order was f65-f66-x-x-x-x-x-x-f57-f58
2. The bottom right piece of marginalia was added to f57v (start of book “ij”, I believe)
3. The pages were mis-/re-bound to f66-f65-x-x-x-x-x-x-f58-f57 -OR- (more likely) the front folio (f65) simply got folded over to the back of the quire, leaving f66r at the front: f66-x-x-x-x-x-x-f57-f58-f65
4. The nymph & text marginalia were added to f66r.
5. The pages were mis-/re-bound to f57-f58-x-x-x-x-x-x-f65-f66.
6. The quire numbers were added to f66v.
7. The page numbers were added to all the pages.
8. The central three bifolios were removed / lost.

But what happened to pages 59 to 64, which apparently got lost along the way?

Currently, my best guess is that these were never actually there to be lost: there is practically no difference in quill or handwriting between f58v and f65r, which suggests to me that they originally sat adjacent to each other… that is to say, that Q8 probably only ever contained two bifolios. And so, the proper page numbers added (at 7 above) were probably 57-58-59-60, which would make perfect sense.

So… why were they later emended to 57-58-65-66?

My suspicion is that, temporarily bound between Q8 and Q9, there was an extra tricky set of pages, which the page-numberer skipped past before continuing with 67 (in the astronomical section). But what tricky block might that be?

Could it have been the nine-rosette fold-out section? Might the page-numberer have skipped past that, before subsequently noticing that an earlier owner had given it a higher quire number, and so moving it forward to its proper place? It’s a bit of a tricky one to argue for, but I do strongly suspect that something in someone’s system broke down right around here, causing more confusion than we can easily sort out.

However, I’ll leave the nine-rosette section for later: that’s quite enough codicology for one day! 🙂

I’m getting a bit cheesed off with the Internet: every time I do a search for anything Cipher Mysteries-ish, it seems that half Google’s hits are for ghastly sites listing “Top 10 Unsolved Mysteries” or “10 Most Bizarre Uncracked Codes“. Still, perhaps I should be more grateful to the GooglePlex that I’m not getting “Top 10 Paris Hilton Modesty Tips” and its tawdry ilk.

Realistically, there is only one uncracked code/cipher listing on the web from which all the rest get cut-and-pasted: Elonka’s list of famous unsolved codes and ciphers. But Elonka Dunin has long since moved on (coincidentally, she went from cryptography into computer game production at about the same time that I made the reverse journey), which is perhaps why all of these lists look a bit dated. Perhaps I should do my own list soon (maybe, if I had the time).

Happily, Elonka did manage to nail most of the usual suspects: the Beale Papers, the Voynich Manuscript, Dorabella, Zodiac Killer, d’Agapeyeff, Phaistos Disk, and so on… each typically a piece of ciphertext which we would like to decipher in order to crack a historical mystery. However, one of the items on her list stands out as something of an exception.

For John F. Byrne’s 1918 “Chaocipher”, we have a description of his device (the prototype fitted in a cigar box, and allegedly contained two wheels with scrambled letters), and a fair few examples of both Chaocipher ciphertext and the matching plaintext. So, the mystery isn’t so much a whodunnit as a howdunnit. Though a small number of people are in on the secret mechanism (Lou Kruh, for one), Byrne himself is long dead: and the details of how his box of tricks worked have never been released into the public domain.

Was Byrne’s Chaocipher truly as unbreakable as he believed, or was it no more than the grand delusion of an inspired cryptographic outsider? This, really, is the mystery here – the everything-or-nothing “hero-or-zero” dramatic tension that makes it a good story. Yet hardly anybody knows about it: whereas “Voynich” gets 242,000 hits, “Chaocipher” only merits 546 hits (i.e. 0.0022% as much).

Well, now you know as well: and if you want to know a little more about its cryptography, I’ve added a Chaocipher page here. But the real site to go to is Moshe Rubin’s “The Chaocipher Clearing House“, which is so new that even Google hasn’t yet found it (Moshe emailed me to tell me about it, thanks!) Exemplary, fascinating, splendid – highly recommended. 🙂

OK, enough of the raw factuality, time for the obligatory historical riff. 🙂

I’m struck by the parallels between John Byrne’s device and Leon Battista Alberti’s cipher wheel. Both men seem to have caught the leading edge of a wave and tried to harness its power for cryptography, and made high-falutin’ claims as to their respective cipher systems’ unbreakability: whereas Alberti’s wave was mathematical abstraction, Byrne’s wave was (very probably) algorithmic computing.

Circa 1920, this was very much in the air: when J. Lyons & Co. hired the mathematician J.R.M. Simmons in 1923, the company was thinking about machines, systems, and operational management: mathematical calculators were absolutely de rigeur for them. The first Enigma machines were constructed in the early 1920s (and used in a commercial environment), and there were doubtless many other broadly similar machines being invented at the same time.

Do I think that there was anything unbreakable in Byrne’s box? No, not really: the real magic in there was most likely a programmatic mindset that was cutting-edge in 1918, but might well look somewhat simplistic nearly a century later. But I could be wrong! 😉

I’m off for a few days now, so I’ll leave you with a thought from Chapter IV of Nietzsche’s “Beyond Good and Evil”:-

146. He who fights with monsters should be careful lest he thereby become a monster. And if thou gaze long into an abyss, the abyss will also gaze into thee.

The little-mentioned thing about this well-known quotation is that the sayings around it are primarily to do with women: so what is Woman to Nietzsche, a monster or an abyss? And is he advising us not fight with or gaze into Her, lest we become Her or She meets our gaze?

The Voynich Manuscript is no monster to fight with: and it is only an abyss for those who are trying to read Hungarian with a French dictionary. Now look to your bookshelf!

Later!

A new day brings a new Google Adwords campaign from Edith Sherwood (Edith, please just email me instead, it’ll get the word out far quicker), though this time not promoting another angle on her Leonardo-made-the-Voynich-Manuscript hypothesis… but rather a transposition cipher Voynichese hypothesis. Specifically, she proposes that the Voynich Manuscript may well be Italian written in a simple (i.e. ‘monoalphabetic’) substitution cipher, but also anagrammed to make it difficult to read.

Anagram ciphers have a long (though usually fairly marginal) history: Roger Bacon is widely believed to have used one to hide the recipe for gunpowder (here’s a 2002 post I made on it), though it’s not quite as clear an example as is sometimes claimed. And if you scale that up by a factor of 100, you get the arbitrary horrors of William Romaine Newbold’s anagrammed Voynich ‘decipherment’ *shudder*.

More recently, Philip Neal has wondered whether there might be some kind of letter-sorting anagram cipher at play in the VMs: but acknowledges that this suggestion does suffer from various practical problems. I also pointed out in my book that Leonardo da Vinci and Antonio Averlino (‘Filarete’) both used syllable transposition ciphers, and that in 1467 Alberti mentioned other (now lost) kinds of transposition ciphers: a recent post here discussed the history of transposition ciphers in a little more detail.

So: let’s now look at what Edith Sherwood proposes (which is, at least, a type of cryptography consistent with the VMs’ mid-Quattrocento art history dating, unlike many of the more exotic ciphering systems that have been put forward in the past), and see how far we get…

Though her starting point was the EVA letter assignments (with a few Currier glyphs thrown in), she then finessed the letter-choices slightly to fit in with the pharma plant label examples she picked: and there you have it (apart from H, J, K, Q, X, Y, Z and possibly F, which are all missing). All you’d have to do, then, is to anagram the rest of the text for yourself, sell the book rights, and retire to a sea-breezy Caribbean island.

edith-sherwood-alphabet2

Might Edith Sherwood be onto something with all this? No, not a hope: for example, the letter instance distribution is just plain wrong for Italian, never mind the eight or so missing letters. As with Brumbaugh’s wobbly label-driven decipherment attempts, I somehow doubt you would ever find two plausible adjacent words in the main body of the text. Also: what would a sensible Italian anagram of “qoteedy” (“volteebg”) be?

Her plants are also a little wobbly: soy beans, for example, were only introduced into Europe in the eighteenth century… “galioss” is a bit of a loose fit for galiopsi (not “galiospi”, according to “The Botanical Garden of Padua” on my bookshelf), etc.

As an aside, I rather doubt that she has managed to crack the top line of f116v: “povere leter rimon mist(e) ispero”, “Plain letter reassemble mixed inspire” (in rather crinkly Italian).

All the same, it is a positive step forward, insofar as it indicates that people are now starting to think in terms of Quattrocento dating and the likely presence of non-substitution-cipher mechanisms, both of which are key first steps without which you’ll very probably get nowhere.

In retrospect, it all seems bleakly inevitable: that enigmatologists would move on from the lardy Bacon-stuffed margins of Shakespeariana to find new hunting grounds. Personally, I thought Nostradamus scrabbled pretty hard to find rhymes for his verses, but a new book claims these were all just a cover story, and that it was no more than an enciphered journal.

“Rise to Consciousness” (2008) by Michal Deschausses claims to decipher the truth hidden in Nostradamus’ work, allegedly revealing a story about “one strong woman” in the far future who seems to resemble… Michal Deschausses?

I-1
Some publishers will assist with offering the knowledge in this Century. In pure reason they will rush her through it. The bout the year of her death secures vast knowledge through the age and the verses will release facts which people will hardly believe.

Could it really be that Nostradamus’ quatrains (strictly speaking, “vers commun”) enciphered a “multi-lingual” secret message? Or is it simply the case that you can, just as Leo Levitov famously did for the Voynich Manuscript, “decipher” just about any given text-like thing into an entirely parallel “polyglot oral tongue”, a stream of Romance language fragments from which you can read basically any message you like?

For reference, Nostradamus’ Century 1 Quatrain 1 is probably an “evocation of the Delphic Oracle, after Iamblichus’s De Mysteriis Aegyptiorum“: and goes like this:-

Estant assis de nuict secret estude,
Seul reposé sus la selle d’aerain:
Flambe exigue sortant de solitude,
Faict prosperer qui n’est à croire vain.

The two are connected, errrm, how? Anyhoo, because Michal Deschausses has been good enough to include her deciphering methodology as an appendix, I’ll probably end up buying a copy and having a look. But having seen Levitov’s book, I won’t be holding my breath.

Now… we’ve had hundreds of years of people claiming that Nostradamus’ verses predict every d&mn thing in the news, from the end of the world, to war(s) in Iraq, and even (most recently) to Barack Obama and his running mate:-

Born of obscure and dark family,
Of white and black of the two intermixed.
The dark one biding his time,
Before the Empire changes.

But… hold on a minute: “Born of obscure and dark family” is a line from Century V Quatrain 84, “Of white and black of the two intermixed” is a line from Century VI Quatrain 10, “The dark one biding his time” appears just to have been made up, while “Before the Empire changes” is a line from Century I Quatrain 43.

So, Nostradamus bloggers have supposedly got themselves excited about three lines moved waaaaay out of context with a filler line added in to form a supposed verse about Obama. Oh, really?

OK… let me try for myself, restricting the search to a high-speed sleective scan through Century I:-

Lost, found, hidden for so long an age,
In the future by headless idiots
That which shall live without having any sense
submerged, killed, dead through brainless idiocy

Profoundly predictive, don’t you think? 😮

Essentially, a ciphertext is a piece of text where the individual letters have been transformed according to a rule system – substitution cipher rules replace the shape of the letters (as if you had just changed the font), while transposition cipher rules manipulate the order of the letters.

THIS IS A CIPHER —> UIKT KT B DKQIFS  (substitute each letter with the one after it in the alphabet)

THIS IS A CIPHER —> SIHT SI A REHPIC (transpose the letters, writing each word back-to-front)

So, as long as (a) you know [or can crack!] the rules by which the “plaintext” (the original unenciphered text) was transformed, and (b) those rules can be played out in reverse, then you can decipher the ciphertext.

OK so far… but if you’re looking at historical ciphers, there’s a problem.

Prior to 1400, transposition ciphers were extremely rare, partly because words themselves were rare. Many documents were written without spaces – and without spaces, where do words begin and end? Effectively, this meant that in-word transposition ciphers (such as reversing syllables, as the Florentines Antonio Averlino and Leonardo da Vinci both used) would only happen in those few places (such as Florence) where people had a modern concept of what words were. A well-known modern example is “Pig Latin“, a (20th century) humorous in-word transposition cipher: and there’s the 19th century “loucherbem” in French, too.

Round about 1465, these flowered into some kind of complex system (by an unknown practitioner, and now apparently lost forever): Alberti, writing in Rome during 1465-1467, mentioned a number of ideas for a complex transposition system, though he recommended his own cipher wheel in preference to them.

Yet after 1500, these basically disappeared into the historical footnotes of cryptographic works. What replaced them (circa 1550) was the “rail-fence” Renaissance notion of transposition cipher: this was instead grounded in the print-centric culture of movable type. This saw messages as sequences of characters tick-tocking away to a metronomic beat (i.e. one per tick), and transposition ciphers not as a way of disrupting word contents, but instead as a way of disrupting (& subverting) the metronomic pulse of letters – a very different beast indeed.

THIS IS A CIPHER --> ISTHAY ISYAY AYAY IPHERCAY   (Pig Latin cipher)

THIS IS A CIPHER ---> T I I A I H R    (Railfence cipher)
                      H S S C P E X

It is this latter (16th century) two-dimensional transposition cipher that is widely used in modern cipher-systems, not the late medieval ‘anagrammatical’ transposition cipher.

cipher-timeline

Older histories of cryptography tended to situate all these cipher techniques within what I call a  “progressivist mythology” – the mistaken notion that every new idea not only flows out of all previous ideas, but also improves and refines them. In practice, of course, that’s not how things work : many brief local flowerings of ideas (basically, all the cipher varieties marked in italic above) made almost no impression on contemporary cryptographic practice. Even Vigenère’s autokey cipher (taught on every modern cipher course) did not get picked up by cryptography practitioners for more than two hundred years!

And now for the punchline of this post: if you discard the progressivist mythology, the range of possible local enciphering strategies for a given ciphertext is sharply constrained by the date and position of a document.

I argue that the Voynich Manuscript ciphertext is likely a prime example of this: its internal evidence dates it no earlier than 1450 and no later than 1470 – right at the time of the brief flowering of the kind of syllabic and interline transposition ciphers mentioned by Alberti in his De Componendis Cyfris (1467).

And so, if we seek to apply “pure” modern substitution cipher analytical techniques to something built around an unknown transposition cipher system, we would surely fail to make any sense of it – and this is, I believe, what has happened in the case of the VMs… why it has remained a “cipher mystery” for so long.

Here’s an odd little thing: a site ranking 200 different jobs. What I found interesting there was the complete lack of overlap between the top ten “best” jobs (based on a combination of “Stress, Work Environment, Physical Demands, Income and Outlook”)…

(1) Mathematician, (2) Actuary, (3) Statistician, (4) Biologist, (5) Software Engineer, (6) Computer Systems Analyst, (7) Historian, (8) Sociologist, (9) Industrial Designer, (10) Accountant.

…and the ten most “satisfying” jobs…

(1) Clergy, (2) Physical Therapist, (3) Firefighter, (4) School Principal, (5) Artist (Fine Art), (6) Teacher, (7) Author, (8) Psychologist, (9) Special Education Teacher, (10) Construction Machinery Operator.

I’ve marked in bold those hats which I wear most days (although I’m sometimes accused of being too “preachy” about the VMs, I don’t think I could claim to be a member of a Voynich “clergy”) – 6/10 from the first list, and 1/10 from the second. Curiously, though, I found “Author” to be just about the least satisfying job of all: far too obsessive and antisocial while writing, and more brickbats than bouquets afterwards. 😮

Also, I really wouldn’t have predicted “Historian” would be one of the top 10 highest-rated jobs: but perhaps part of the reason for the enduring level of interest in the VMs is that it appeals to affluent, clever people in good jobs who have leisure time to waste how they please. 🙂

A few years ago, Sarah Goslee (who I believe has her own blog here) gradually become more and more interested in medieval / Renaissance history, specifically (in accordance with her science background) with cosmology, astrology, botany, and cryptography. I doubt any Cipher Mysteries regular would be hugely surprised to find out that, somewhere along in the way, she ended up “hooked” on the Voynich Manuscript. 🙂

Her VMs research has mainly concentrated on PCA (Principle Coordinate Analysis) of the VMs’ text: which I think is a bit of a shame, given that the text was apparently constructed in an anti-analytical way to render that kind of approach largely useless. Oh well!

However, infinitii recently emailed me (thanks!) with a link to Sarah’s fascinating description of the late medieval manuscript simulacrum she constructed. Inspired by a fifteenth century Italian herbal and a fifteenth century Austrian alchemy notebook (MS LJS419 and MS LJS382), she set out to create her own SCA (Society for Creative Anachronism)-style astronomical notebook. Structurally, this has limp vellum binding, rag paper, oak gall ink, quill pens, and writing patterned after a fifteenth century herbal: contents-wise, it has a calendar, the metonic cycle, Domenical letters, location of the sun, etc.

It’s a nice, brief description of a well-contained project: recommended! 🙂

Here’s another post inspired by the book I’m currently reading, Joscelyn Godwin’s “The Pagan Dream of the Renaissance”.

Whereas 15th century Renaissance art was largely orderly, linear, a lot of Mannerist late 16th-century art is disorganized, curvilinear, riotous – this has led to the label of antirinascimento, the “Anti-Renaissance”. But to someone like Godwin with both feet in the iconological trenches, this speaks of a deeper dichotomy – between the ordered Apollonian meme and the disordered Dionysian meme. Godwin pitches the austere, Roman-loving Quattrocento humanists’ dry perspective against the carnal obsessions and pagan thematics of corrupted Cinquecento cardinals – an extended Apollo vs Dionysus grudge-match in an art historical arena.

All of which is quite cool, in an iconological sort of way. 🙂

But once you start looking at things in this way, you begin to see echoes everywhere: in my own research area of Quattrocento ciphers, you could view Alberti’s über-ordered cipher wheel as a quintessentially Apollonian solar device, and then compare it with the apparently disordered, fragmented Voynich manuscript cipher statistics (that I link with Antonio Averlino, AKA Filarete) – Roman austerity against Greek cunning.

Yet does this kind of dichotomistic model really give us a real insight into the kind of secret history that iconologists believe lurks just beneath? Or is it just a modern quasi-thermodynamic meta-narrative (historicizing the universe’s eternal battle of order vs disorder) being stamped over the top of something that is no more significant than a difference in personality?

Reading anything to do with iconography makes me feel like I’m watching a renegade episode of the X-Files, where Mulder and Scully are arguing the toss over something foolishly marginal. Though occasionally I have brief moments where I think “Yes, that does make sense”, you simply cannot infer from the existence of a debate that any of the mad theories being proposed has to be correct. Oh well!

Update: Dennis Stallings points out off-list that the Apollo vs Dionysus grudge-match as an art-historical thema only really kicked off with Nietzsche’s (1872) “The Birth of Tragedy”, which is entirely true – here’s a nice 1996 paper showing (basically) how you can use the A. vs D. dichotomy as a way of blagging your way through literature studies. 🙂

There are many different ways of, well, reading the unreadable: what isn’t so well-known is that the technical terminology we use tends to highlight those particular aspects that we think are worthy of study (as well as to occult those aspects we are not so interested in). The big three buzzwords are:-

  • Cryptographywriting hidden messages – a historical / forensic approach
  • Cryptanalysis: analysing hidden messages – a statistical / analytical approach
  • Cryptology: reading hidden messages – a linguistic / code-breaking approach

Generally, you’ll see these terms used extremely loosely (if not interchangeably): but that’s something of a tragedy, as each strand is concerned with a different type of discourse, a different type of truth to help us get to the end-line, that of finding out what happened.

(1) If you study the cryptography of the Voynich Manuscript, you would primarily focus on issues such as: the intellectual history behind (and embedded within) the glyphs, the forensic layering of the writing itself, the physical strokes that make up the letters, what corrections there are to be found, how Voynichese practice evolved during the construction of the document, how the writing interrelates with the drawings, etc. This is reconstructive forensic history, that seeks to establish the truth of the writing system – to establish the mental structures that were given systematic shape (and yet were hidden) in the writing. In many ways, the end-product would be an accurate transcription of the text – but I strongly believe that this strand has not yet been pursued to its logical conclusion.

(2) If you study the cryptanalysis of the Voynich manuscript, you would instead take the study of the cryptography completely as a given, and use the resulting transcription as a starting point for your analytical research, however (in)accurate it may be. The argument has typically been that even if, say, 10% of the transcription is wrong, statistical analysis of the remaining 90% should still yield informative results that are (to a certain degree) illustrative of the underlying mechanisms. Yet the specific reliance upon the transcription cannot be ignored, particularly when you go hunting for larger-scale patterns (such as words, or lines).  And there is a very strong case to be made that the absence of convincing statistical results to date arises not from inadequate statistical testing, but instead from some basic division within the text being misunderstood.

(3) If you study the cryptology of the Voynich Manuscript, then you would take as a given a carefully-selected set of statistical properties previously derived from cryptanalysis, and look for some kind of linguistic fit between those properties and the properties of known languages and/or transformations of known languages (such as shorthand, patois, abbreviation, contraction, etc). Many Voynich theories are based on a very naive cryptological reading, often filling the vast gaps between the two models by expanding the range of possible languages that are present all at the same time, and hence resulting in a claimed plaintext that is a hugely interpretative soup of Romance language fragments – though Leo Levitov’s “polyglot oral tongue” is a prime example, it is very far from being the only one of its kind.

In terms of this framework, I’ve invested most of my time on the VMs’ cryptography, to the point where I believe I can give an account of each of the glyphs and of the evolution of the writing system: but I’m now at the point where I have to move on to the cryptanalysis in a more focused way to make progress.

The overall point I’m trying to make is that we need to get the history (cryptography), the statistics (cryptanalysis) and the linguistics (cryptology) sorted out in order to get over the high walls of the Voynich Manuscript’s defences: its singular beauty arises from how it manages to confound all three of these approaches simultaneously. This is, I suspect, merely a byproduct of the ‘undivided’ Quattrocento thinking that gave it life – that it comes from the time-period just before we (as a culture) imposed artificial divisions on the way we think about the world… just before intellectual specialization took hold. The historian part of me wants to shout: look, it’s the product of a Renaissance Man, in every useful sense of that much-abused phrase.