Bacon's cipher

Last updated
Image of Bacon's cipher. FBacon alfa1.jpg
Image of Bacon's cipher.

Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. [1] [2] [3] A message is concealed in the presentation of text, rather than its content. Baconian ciphers are categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces).

Contents

Cipher details

To encode a message, each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'. This replacement is a 5-bit binary encoding and is done according to the alphabet of the Baconian cipher (from the Latin Alphabet), shown below:

LetterCodeBinary
Aaaaaa00000
Baaaab00001
Caaaba00010
Daaabb00011
Eaabaa00100
Faabab00101
Gaabba00110
Haabbb00111
I, Jabaaa01000
Kabaab01001
Lababa01010
Mababb01011
LetterCodeBinary
Nabbaa01100
Oabbab01101
Pabbba01110
Qabbbb01111
Rbaaaa10000
Sbaaab10001
Tbaaba10010
U, Vbaabb10011
Wbabaa10100
Xbabab10101
Ybabba10110
Zbabbb10111

A second version of Bacon's cipher uses a unique code for each letter. In other words, I, J, U and V each have their own pattern in this variant:

LetterCodeBinary
Aaaaaa00000
Baaaab00001
Caaaba00010
Daaabb00011
Eaabaa00100
Faabab00101
Gaabba00110
Haabbb00111
Iabaaa01000
Jabaab01001
Kababa01010
Lababb01011
Mabbaa01100
LetterCodeBinary
Nabbab01101
Oabbba01110
Pabbbb01111
Qbaaaa10000
Rbaaab10001
Sbaaba10010
Tbaabb10011
Ubabaa10100
Vbabab10101
Wbabba10110
Xbabbb10111
Ybbaaa11000
Zbbaab11001

The writer must make use of two different typefaces for this cipher. After preparing a false message with the same number of letters as all of the As and Bs in the real, secret message, two typefaces are chosen, one to represent As and the other Bs. Then each letter of the false message must be presented in the appropriate typeface, according to whether it stands for an A or a B. [4]

To decode the message, the reverse method is applied. Each "typeface 1" letter in the false message is replaced with an A and each "typeface 2" letter is replaced with a B. The Baconian alphabet is then used to recover the original message.

Any method of writing the message that allows two distinct representations for each character can be used for the Bacon Cipher. Bacon himself prepared a Biliteral Alphabet [5] for handwritten capital and small letters with each having two alternative forms, one to be used as A and the other as B. This was published as an illustrated plate in his De Augmentis Scientiarum (The Advancement of Learning).

Because any message of the right length can be used to carry the encoding, the secret message is effectively hidden in plain sight. The false message can be on any topic and thus can distract a person seeking to find the real message.

Baconian cipher example

The word 'steganography', encoded with quotation marks, where standard text represents "typeface 1" and text in boldface represents "typeface 2":

To encode a message each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'.

The pattern of standard and boldface letters is:

ba aabbaa b aaabaaa abba aaaaaa bb aaa bbabaabba ba aaaaaaaa ab b baaab bb babb ab baa abbaabb 'b' bb 'b'.

This decodes in groups of five as

baaab(S) baaba(T) aabaa(E) aabba(G) aaaaa(A) abbaa(N) abbab(O) aabba(G) baaaa(R) aaaaa(A) abbba(P) aabbb(H) babba(Y) bbaaa bbaab bbbbb

where the last three groups, being unintelligible, are assumed not to form part of the message.

Bacon and Shakespeare

Some proponents of the Baconian theory of Shakespeare authorship, such as Elizabeth Wells Gallup, have claimed that Bacon used the cipher to encode messages revealing his authorship in the First Folio. However, American cryptologists William and Elizebeth Friedman refuted the claims that the works of Shakespeare contain hidden ciphers that disclose Bacon's or any other candidate's secret authorship in their The Shakespeare Ciphers Examined (1957). Typographical analysis of the First Folio shows that a large number of typefaces were used, instead of the two required for the cipher, and that printing practices of the time would have made it impossible to transmit a message accurately. [6]

The Friedmans' tombstone included a message in Bacon's cypher not spotted for many years. [7]

See also

Related Research Articles

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">Autokey cipher</span> Classic polyalphabet encryption system

An autokey cipher is a cipher that incorporates the message into the key. The key is generated from the message in some automated fashion, sometimes by selecting certain letters from the text or, more commonly, by adding a short primer key to the front of the message.

<span class="mw-page-title-main">Tabula recta</span> Fundamental tool in cryptography

In cryptography, the tabula recta is a square table of alphabets, each row of which is made by shifting the previous one to the left. The term was invented by the German author and monk Johannes Trithemius in 1508, and used in his Trithemius cipher.

In cryptography, coincidence counting is the technique of putting two texts side-by-side and counting the number of times that identical letters appear in the same position in both texts. This count, either as a ratio of the total or normalized by dividing by the expected count for a random source model, is known as the index of coincidence, or IC for short.

<span class="mw-page-title-main">William F. Friedman</span> American cryptologist (1891–1969)

William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.

A straddling checkerboard is a device for converting an alphanumeric plaintext into digits whilst simultaneously achieving fractionation and data compression relative to other schemes using digits. It also is known as a monôme-binôme cipher.

In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream. The earliest description of such a cipher was given in 1892 by French mathematician Arthur Joseph Hermann. Usually, the book to be used would be agreed ahead of time, while the passage to be used would be chosen randomly for each message and secretly indicated somewhere in the message.

The affine cipher is a type of monoalphabetic substitution cipher, where each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a standard substitution cipher with a rule governing which letter goes to which. As such, it has the weaknesses of all substitution ciphers. Each letter is enciphered with the function (ax + b) mod 26, where b is the magnitude of the shift.

<span class="mw-page-title-main">Elizebeth Smith Friedman</span> American cryptanalyst and author (1892–1980)

Elizebeth Smith Friedman was an American cryptanalyst and author who deciphered enemy codes in both World Wars and helped to solve international smuggling cases during Prohibition. Over the course of her career, she worked for the United States Treasury, Coast Guard, Navy and Army, and the International Monetary Fund. She has been called "America's first female cryptanalyst".

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

<span class="mw-page-title-main">M-94</span> US cryptographic equipment

The M-94 was a piece of cryptographic equipment used by the United States Army, consisting of several lettered discs arranged as a cylinder. It was also employed by the US Navy, under the name CSP 488.

The Two-square cipher, also called double Playfair, is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four-square cipher while still being slightly stronger than the single-square Playfair cipher.

<span class="mw-page-title-main">Baconian theory of Shakespeare authorship</span> Alternative Shakespeare authorship theory

The Baconian theory of Shakespearean authorship contends that Sir Francis Bacon, philosopher, essayist and scientist, wrote the plays, which are publicly attributed to William Shakespeare. Various explanations are offered for this alleged subterfuge, most commonly that Bacon's rise to high office might have been hindered if it became known that he wrote plays for the public stage. The plays are credited to Shakespeare, who, supporters of the theory claim, was merely a front to shield the identity of Bacon. All but a few academic Shakespeare scholars reject the arguments for Bacon authorship, as well as those for all other alternative authors.

<span class="mw-page-title-main">Elizabeth Wells Gallup</span> American educator and philosopher (1848–1934)

Elizabeth Wells Gallup was an American educator and exponent of the Baconian theory of Shakespearean authorship.

<span class="mw-page-title-main">Orville Ward Owen</span> American physician and Baconian (1854–1924)

Dr. Orville Ward Owen was an American physician, and exponent of the Baconian theory of Shakespearean authorship. Owen claimed to have discovered hidden messages contained in the works of Shakespeare/Bacon. He deciphered these using a device he invented called a "cipher wheel". The alleged discoveries were published in Owen's multi-volume work Sir Francis Bacon's Cipher Story (1893–95).

<span class="mw-page-title-main">George Fabyan</span> American businessman who founded a private research laboratory

"Colonel" George Fabyan was a millionaire businessman who founded a private research laboratory. Fabyan's laboratory pioneered modern cryptography & was the forerunner of the NSA. The National Security Agency has recognized Riverbank Laboratories as the birthplace of U.S. cryptology.

<span class="mw-page-title-main">Music cipher</span> Musical algorithm for encrypting and decrypting information

In cryptography, a music cipher is an algorithm for the encryption of a plaintext into musical symbols or sounds. Music-based ciphers are related to, but not the same as musical cryptograms. The latter were systems used by composers to create musical themes or motifs to represent names based on similarities between letters of the alphabet and musical note names, such as the BACH motif. Whereas music ciphers were systems typically used by cryptographers to hide or encode messages for reasons of secrecy or espionage.

References

  1. Bacon, Francis (1605). The Proficience and Advancement of Learning Divine and Humane.
  2. Bacon, Francis (1640). Of the Advancement and Proficience of Learning. Translated by Wats, Gilbert. Oxford University. pp. 257–271.
  3. Dupuy, Jr., Paul J. "The Advancement of Learning". An Authorship Analysis – Francis Bacon as Shake-speare. London: Shake-n-Bacon. Chapter 1. Archived from the original on 2017-03-18. Retrieved 2017-03-18.
  4. Helen Fouché Gaines, Cryptanalysis: a Study of Ciphers and Their Solutions (1989), page 6]
  5. Biliteral can mean: "written in two different scripts", Oxford English Dictionary
  6. Kahn, David (1996). The Code-breakers (2nd ed.). New York: Scribner. pp. 882–888. ISBN   0-684-83130-9.
  7. Dunin, Elonka (17 April 2017). "Cipher on the William and Elizebeth Friedman tombstone at Arlington National Cemetery is solved" (PDF). Elonka.com.

Further reading