One thing that annoyed me about the Ohio Cipher was that the quality of the newsprint scan of the original 3rd July 1916 article was simply terrible.

ohio-cipher-version-1

Yes, it really was exactly that bad. Having said that, the version of the same cipher in the follow-up 7th July 1916 article was, comparatively speaking, in excellent shape:

ohio-cipher-version-4

But… which was the correct version of the cryptogram? What’s worse, both of these differed again from the one that ended up in the Futility Closet nearly a century later. So will the real Ohio Cipher now please stand up, please stand up? (…so that we can give it a proper go at solving it, at least partially).

Anyway, a little earlier this year I had a good idea as to how to resolve this: why not find a list of newspaper archives that might possible hold a physical copy of the Lima Times-Democrat from that particular day (3rd July 1916), and see if I could get a fresh scan of it from there? There must, I reasoned, surely be more than a single extant copy of that particular edition, and in all probability they can’t all be as bad as the online one I’d been working with, surely?!?

Hence I contacted the Ohio Historical Society to see if they had a list of such archives, and yesterday got an unexpectedly positive response from this via Tom Rieder of the Ohio History Connection, Columbus OH. He very kindly scanned two different copies of the same article and sent them through to me (they’re at higher resolution than they appear within the blog post body, so feel free to click through to them in all their fuzzy monochromatic glory):-

ohio-cipher-version-2

ohio-cipher-version-3

So, thanks to Tom Rieder’s help, I think we can now say with a reasonable amount of certainty that the Ohio Cipher’s ciphertext was similar but not quite identical to the second version given above, and should read:-

Was nvlvaft by aakat txpxsck upbk txphn ohay ybtx cpt mxhg wae sxfp zavfz ack there first txlk week wayx za with thx

What does this mean? Here we go (at last)… 🙂

If you try to read this off the page as a normal monoalphabetic cipher, the fact that “txp” occurs twice and “tx” occurs four times (and that “TH” is the most common letter-pair in English) would probably make you strongly suspect that “txp” = “THE”. Further you’d probably like to hazard a guess at this point that “txlk” = “THIS” and that “ybtx” = “WITH”. (“aakat” I don’t believe is correct, so let’s skip past that that for the moment.)

But… this approach simply doesn’t work. Even putting only the cipher-like words into CryptoCrack as a patristocrat yields gibberish-like plaintext (such as “fmomewseenesstaturngainstalfpleddistrasktlycebutwahemwhernstoncedthe”, which isn’t particularly close to anything anyone apart from a statistical linguist might describe as a normal language).

There also seems to be some kind of odd-even pattern to the letters, in that ZA appears three times all on even letter boundaries. So my suspicion is that what we’re looking at here is something like a Frankenmixture of plaintext and Polybius ciphertext (but indexed with letters rather than numbers), i.e. with (say) [ A P S U X ] on one side and [ T H K M Z ] across the top, plus other stuff (such as spelling mistakes, transmission errors and possibly extra letters coded as themselves) to confuse the picture. *sigh*

I’m sorry if that’s not as robust a decryption-style reading as you’d like to be getting from Cipher Mysteries, but it is what it is, and please feel entirely free to see if you can do better yourself, ain’t nothin’ stoppin’ ya. 🙂

Here’s a nice departure from normal: a ‘Peter Crossman’ short story that just appeared on tor.com called The Devil in the Details, by Debra Doyle and James D. McDonald.

It’s a kind of high-octane (parody of / homage to) the modern-day Knights-Templar-as-God’s-Special-Ops novel genre, based around missing pages from the Voynich Manuscript being offered at a dangerously high-powered auction, at an arcane and mysterious venue with the Vatican and (possibly) Google Research also trying to bid, if they can stay alive long enough… you get the idea.

The writing sustains a quirky balance between rigid Latin medievalism and modern weapon fetishism, with tongue firmly in cheek. I hope you like it! 🙂

A few weeks ago, web comic artist Andy Warner emailed to ask if he could bounce some questions about the Voynich Manuscript off me.

Perhaps because many of the answers I gave him were short enough to fit into speech bubbles, Andy’s Voynich article ended up being largely about me and William Friedman and Marcello Montemurro (excellent company to keep).

Voynich-field-of-broken-dreams

Doubtless this will ruffle a whole load of Voynichian feathers, but there you go. Enjoy! 🙂

…i.e. was he a member of broadly the same group of Odd Fellows that used the Action Line Cryptogram to acrostically encrypt their initiation ceremonies?

In South Australia, Odd Fellows founded their first Lodge in Adelaide in late 1840 (according to this 1843 page from their journal), at just about the same time as a Lodge was formed in Sydney: and even today, Odd Fellows in SA are apparently still going strong.

So… looking again at the Tamam Shud text, it parallels the Action Line Cryptogram: that is, it gives cryptologists a very strong impression of having been constructed as an acrostic English ciphertext, because its letter frequency distribution closely follows the same frequency distribution pattern found in English texts.

tamam-shud-closeup

All the same, pure acrostic cryptograms are relatively rare in the wild, because they are more mnemonic than cryptologic: they are there to remind the reader of something they already know rather than to communicate something unexpected to someone else. The more personal the message, the more unknowable its contents: and that’s they way it is, I guess.

So perhaps in this instance Marshall McLuhan is right, and the medium (an Odd Fellows-style acrostic cryptogram) is the message. If so, the most we are likely to infer from this is that it was written by someone who was (or had been) a member of an Odd Fellows Lodge, very probably in Adelaide itself. The Somerton Man may well have been down on his uppers (albeit very shiny uppers), but I expect those same shoes had likely been inside an Adelaide Lodge at some stage.

Now, Pete Bowes will likely take this as a cue for explaining why (in his belief) the contents of the suitcase were laid out in such a ceremonial way: and why the name link to recently-deceased Adelaide Freemason Tom Kean was never explored by the police. But… one thing at a time, Petey-boy, one thing at a time… 🙂

Even though I was, in a recent post here, able to decrypt a few lines of the Action Line Cryptogram (and commenters Clay and SirHubert both improved upon my guesses and decrypted parts of other sections)… I remained hungry to do better. I wondered: might I be able to find something really close to the plaintext?

It was then that I made a lucky guess. 🙂

After stumbling around for a while online looking for plausible-looking Masonic sources, I found a Pennsylvanian bookseller (“Bookworm & Silverfish”) selling a small Odd Fellows pamphlet from 1899 that seemed very close indeed to what I was looking for. I bought it immediately, crossing my fingers really tightly…

esoteric-booklet476

Though I can’t claim that this particular methodology will work every time, in this instance it paid off handsomely, because the contents turned out to be almost exactly the cryptogram’s plaintext right down to the tiniest detail (there are a few minor differences, but these all seem to be completely non-critical).

If you want to see the booklet, I’ve updated my permanent Action Line Cryptogram page with a complete set of scans (all bar the blank back cover page).

How nice to be able to say: crack complete! 🙂

I very rarely cover Enigma machines on Cipher Mysteries, mainly because I didn’t think there were many open cipher-related mysteries to do with it (not unless you include the question of why US film-makers apparently feel so compelled to mash up history every time they include Enigmas on camera.).

But it turns out that the two men who (apparently) had the patents for the Enigma design in the 1920s were not the real inventors of the device at all: in fact, the clever principles of modern rotor cryptography were invented by two Dutch naval officers during the First World War. However, when the Dutch Navy refused to proceed with bringing their design to practice, events took a slightly strange turn…

That story – and lots, lots more about Enigma, plus a few early crypto machines – is in the following splendid Google Tech Talk by well-known (and very affable) crypto collector Ralph Simpson, with captions (which you can turn off with the keyboard-like icon just to the left of the settings icon). It’s not often I recommend a 1hr 16min YouTube video, but this is excellent, well worth putting an hour and a bit of your time aside for. Enjoy! 🙂

(If the above embedded video fails to appear for you, here’s a direct link to it instead.)

PS: at 6:49, Ralph holds up a commercial cryptography book which he describes as being from “1988”, but it is of course actually from 1888… just so you know! 😉

Just a quick heads up for you, that Yale Assistant Chief Conservator Paula Zyats (who you may remember having a tete-a-tete with Rene Zandbergen in the 2009 Austrian Voynich Manuscript documentary) will be giving a talk entitled The Mysterious Voynich Manuscript: Collaboration Yields New Insights.

Paula Zyats

It’ll be on Thursday July 10th 2014 at The Library Company of Philadelphia, 1314 Locust Street, Philadelphia, PA 19107, from 5.30pm to 7.30pm, followed by the opening of an exhibition of miniature books made by the Delaware Valley Chapter of the Guild of Book Workers (it says here). If you go, let me know how it goes (and no heckling, ok?) 🙂

Last year, I was contacted by a young French guy called Emmanuel Mezino: he was writing a book about the famous “La Buse” cryptogram and treasure, and asked if my publishing house Compelling Press might publish it. From my experience with “The Curse of the Voynich”, I told him that if he structured it in two distinct halves – the front half summarizing facts and historical research (giving sources), and the second half comprising his inferences and speculation – then yes, I would be very interested.

My rationale for this was simple: even if readers happen to disagree with every single aspect of the reasoning (which, let’s face it, is often the default position with cipher mysteries), the book would still stand a good chance of being hugely interesting, entertaining, and useful in its own right – the story of La Buse is fascinating and intriguing, and I have found few properly historical accounts that do justice to any phase of the pirate’s life.

However well-intentioned that was, it was perhaps too tightly-fitting an editorial straitjacket for a young writer to want to wear; and so Emmanuel ended up editing and publishing his book himself, giving it a romantic-looking cover:-

1ere_couverture-213x300

For its title, Mezino used the phrase allegedly called out by Olivier Levasseur (‘La Buse’) en route to the gallows, as he (so the story goes) threw a piece of paper containing his cryptogram to the crowd – “Mon Trésor à qui saura le prendre” (i.e. “My [fabulous] treasure [will go] to he who will take it”). Buying it will cost you rather less than the bejewelled gold cross of Goa: 18,00 euros (plus postage) for a physical copy, or (perhaps more likely if you happen to live outside France) 11,99 euros for the ebook.

Without much doubt, I think the best bit about the book is that it includes some close-up photographs of parts of a new cipher document – what could very possibly be a second copy of La Buse’s cryptogram. It’s not a perfect scoop (a low resolution colour version of this was included on page 8 of Liz Englert’s (2013) treasure-hunting omnishambles book “My Adventures of the Famous La Buse Treasure“), but the quality of the scans Mezino includes is on the whole extremely good.

Having said that, armchair treasure hunters will be perhaps less than fully impressed that Mezino somehow fails to include a close-up of the lines of cipher that only appear in this second version of the cryptogram, settling on giving merely his interpretation of what those extra letters say (which may or may not be correct).

Another less than satisfactory section was Mezino’s imaginative rendition of the “La Buse” legend, which for all its liveliness was plainly derived from a variety of unreliable sources (apparently including his interpretation of the drawings around the second cryptogram). Though this wasn’t as bad as Pauline B. Innis’ (1973) “Gold in the Blue Ridge” (a teeth-grindingly dreadful imaginative historical reconstruction of the Beale Papers story, which I wearily read recently), I’m not planning to return to either any time soon.

And it should be no surprise that, for all Mezino’s claims that he has (by collecting together an assortment of markings on rocks scattered across the northern half of Réunion; interpreting them as a star map written on land; reconciling that with sacred-geometry-style details overlaid on the cryptogram itself; and then back-linking everything to the astronomer Hevelius) logically deduced the only possible answer to the cryptogram… I’m more than just a bit skeptical. In fact, I don’t think there’s even a single detail in his reasoning that I’d ‘fess to agreeing with.

But as you’d expect, Mezino brooks no disagreement with his Grand Plan: and as writer and editor, that’s ultimately his right. You buy his book or you don’t, and you agree with him or you don’t. It’s all fine.

For me, though, his account is all a bit of a missed opportunity: pictures aside, he’s included all the stuff I’d have left out, and omitted all the stuff I’d have put in. There’s no critical appraisal of the second cryptogram as a source document (or even, dare I say it, as a possible modern forgery made to impress treasure hunters), nor any critical appraisal of La Buse’s own history and the quality of the sources.

Nor is there any kind of critical assessment of La Buse’s earlier life in the Caribbean, nor Le Butin’s trustworthiness as the (alleged) source for the first cryptogram, nor a critical assessment of Charles de la Roncière’s (1934) “Le Flibustier Mysterieux”, which first brought the cryptogram to the world’s attention.

Many Cipher Mysteries readers will doubtless link all this with my recent grouchy post about The Voynich Manuscript for Dummies, where I moaned about how people tend to fixate on the mythology of cipher mysteries, and seem to have no time for looking at the basic historical dimensions of the claimed evidence – transparency, reliability, agenda, bla bla bla. Well, yes: and it would be hard to deny that Emmanuel’s book has ended up somewhat hollow in this respect, which is a big shame.

But even so, I do appreciate that writing an evidence-centred cipher mystery book that manages to keep a properly analytical cutting edge but without destroying the underlying mystique is a really tough writing brief – perhaps almost impossible for a writer’s first book. Ultimately, though, perhaps Mezino’s book will – for all its many shortcomings – prove to be a useful first step in the right direction. Hopefully: and yet from where I’m standing, we’ve got a very long way to go on that road just yet…

Browne’s Master Key is another piece of encrypted Freemasonry, once again uncovered by Klaus Schmeh… and once again, here’s my partial decryption of it.

This time, though, all it took was a quick web search that revealed a page describing broadly how Browne’s Master Key works, and the rest was just a load of head-scratching to prise the bones from their cryptographic coffin:-

In Browne’s Master Key, the cypher was as follows: Substitute the vowels a e i o u y with the letters of Browne’s name; precede most words by meaningless capital letters, and then substitute letters including c for e, and then substitute the words Brethren or Masons with exclamation marks and then run the words together indiscriminately and do not use punctuation.

So, it’s an ambiguous cipher, very much along the lines of the medieval “magical cipher” (where you replace each vowel with the letter immediately after it in the alphabet, thpvgh jt’s npt fxbctlz vfrz sfcvrf), so arguably a little closer to steganography than to cryptography. Let’s look at the first page:-

Browne-Masterkey1

After the “SIT LUX, ET LUX FUIT” heading (“There is light and there was light”, apparently the magical motto of Adolphus Frederick Alexander Woodford of the Hermetic Order of the Golden Dawn), the ciphertext begins like this:-

Splrbsrtwbs Sostmronwprnongthrlwdgr – Brwthr Rsrn owrwbidrn vhb Tosthrfo Rstcbr Rbrfwr Rthrmbstr RowcrRdstw wprnhoslwdgr – Brwth Rrjnnowrwidrnplrbsrtwsr Rthbtdntedwnr – WwisHo Pfnlsrnowrwbrdrnwhrnewnwbsmbdrb rhr Rrstw wd thrmbstrr – – Hosbnsonrssthr Rr – Brwthr Rsonthinbmrwfthrgrbnd – Brwthr Rspllrbst Wbchbrgrd – Brwthr Rsplrbsrtwat Trndth rchbrgr – Tlrko Ngbndthrc Rbftwoth ***

…which I (partially) decrypt as…

[Mason]s please to assist me in opening the lodge – brother senior (wbidrn) what is the first call before the master (ow) needs to open his lodge – brother junior (widrn) please to see that duty done – (ooishopfNl) senior warden when you was made at here stood the master – his business there – brothers in the name of the grand – brothers (pllrbst Wbchbrgad) – brothers please to attend the charge – (tlrkO ng bUdthEN Ebftwoth ***)

Perhaps a kind reader with a stronger stomach than me for this kind of faffy Freemasonic folderol will feel inspired to decrypt some more – frankly, a paragraph is pretty much my limit. 🙁

What would a “Voynich Manuscript for Dummies” look like? It’s easy to poke fun at the foolish mess Wikipedia editors have made of the subject, but it’s not so easy to do it properly.

For me, the first big step would be finding sufficient writing courage to discard all Voynich theories. Yes, all of them. Every single one. Come on, is there a single Voynich theory out there that genuinely adds anything significant to what we know about the manuscript itself?

(Even my Antonio Averlino hypothesis is a bit guilty in that respect, because it was so painstakingly built on top of best-in-class historical evidence that it ended up a bit too precise and monochromatic for most people’s tastes. And the stuff it did predict [e.g. the concealed machine drawings] nobody yet feels comfortable with. Oh well!)

I also really don’t care for the kind of who-might-have-done-it-and-why speculation that fills the Wikipedia Voynich Manuscript page: that’s another whole category of stuff that should get the +10 Blue Pencil of Death wielded at it.

In addition, the whole what-flower-is-that-drawing-similar-to cult that seems to have monopolized many Voynich researchers’ attentions in the last few years is a thing that for me warrants only the briefest of mentions. It is such a hazard-rich and information-poor approach to history: and the whole supposed point of the activity (to find cribs for code-breakers to work with) is destroyed by the complexity of Voynichese . If we can’t even tell vowels from consonants, numbers from letters, or even what ‘the’ or ‘and’ is across hundreds of pages of text, how much help could a crib give us? [“Not much” is the sad answer.]

But once you’ve stripped out all the rubbish, what is left? Well… the internal evidence (the codicology and palaeography, i.e. the construction, the writing and the pre-1600 history), the external evidence (mainly provenance from 1600 onwards), and the Art History (techniques employed, similarities with other documents and drawings, etc). And… errrm… that’s about it.

At this point, you’d have to point out that I’d obviously be writing for some fairly sophisticated Dummies. And I suspect that this is ultimately the problem, because almost everything written to date on the subject isn’t about the Voynich Manuscript itself, but about the Foolish Mythology of the Voynich Manuscript. And what a waste of everyone’s time that exercise has proved to be, huh?

I suppose that this is what I despair about: not only that the unfortunate legacy of Victorian historians (and their search for moral tales for the edification and instruction of the young) was a portfolio of polished pants myths that have taken over a century to dismantle, but also that the mythological-and-as-yet-largely-undeconstructed Voynich Manuscript remains very much in that disappointingly shiny vein. I mean, Roger Bacon and John Dee… is that honestly the best people can do after a hundred years? *sigh*

All this rant boils down to is this: that I’ve become heartily sick and tired of re-reading the same basic “Voynich Mystery Mythology for Dummies” account that bloggers, journalists, novelists, meeja luvvies, computer scientists and even (gasp!) historians seem so keen to regurgitate ad nauseam; and that I think the discourse around the Voynich Manuscript has become so worn-through that many people would struggle to recognize a genuinely informative and accurate account of the object itself.

Remove all the lurid speculation and the mad theories from the next Voynich article you read, and is anything much left?