Читать книгу Secret and Urgent - The Story of Codes and Ciphers - Анон - Страница 13
III
ОглавлениеThe ciphers of Sparta and Rome left no recognizable direct descendents. Roger Bacon’s, whatever one may think of the Newbold decipherment, was an isolated effort; and the interpretation of the records of the rocks took place at a time when cryptography was already highly developed. A certain Abbot Trithemius who wrote an early book on ciphers in Holland, says that Charlemagne used ciphers to communicate with his agents, but the tale stands on about the same basis as the confident medieval assertions that Virgil was a necromancer who could fly through the night on broomsticks. We know as a matter of historical fact that Charlemagne himself never learned to read or write any language till he reached maturity, and that most of the great officers of his court remained illiterate to the end. Any kind of writing would have been cipher enough in such an age.
And if Charlemagne did use ciphers, it was another case of an isolated effort. The genuine sources of modern cryptography can be traced, vaguely and with some difficulty, to two widely separated medieval springs—clerkly authorship and thieves’ slang. The first may reasonably be looked upon as the beginning of ciphers and the latter of codes, but the two blend and divide like a slow stream passing many islands, and it is not until relatively modern times that they become sharply distinguished.
It is a little difficult to realize today that during the Middle Ages literature was an extra-hazardous occupation. The Church exercised both a monopoly and a close censorship of it and used that censorship in a manner that seemed to contemporaries highly capricious. When a writer set down his thoughts, he knew for a certainty that sooner or later they would come to the attention of the Church authorities, but not what the result would be. Thus Roger Bacon’s writings were discovered to be highly heretical; he was put into prison. But the works of his pupil, Thomas Aquinas, were found not only good doctrine but extremely valuable, and he was canonized.
Under the circumstances most medieval writers tried to conceal authorship by some device that would enable them to throw off the mask if the Church approved their work, but keep it up if she did not. One of these devices was that of anagramming the author’s name; Rabelais thus appeared as Messer Alcofribas, just as Monsieur Arouet junior (1.j.) was later to become famous under his anagram of Voltaire. The Newbold decipherment has at least the justification that anagramming was common practice at the time the Bacon manuscript was written.
A more common device and one more important in the history of ciphers was that of suppressing the vowels in signatures and doubtful passages. There were two methods of doing this. One was to replace the vowels with dots on a regular system, I being represented by a single dot, A by two, E by three and 0 by four. (U, then written as V, was let alone.) Thus “Richard, Roi d’Angleterre” would become R.ch..rd, r..... d’..ngl...t...rr... The other system was to replace the five vowels, in their order, with B, F, K, P and X, making of “Archepiscopus Arnulfus” BRCHFPKSCPPXS BRNXLFXS. The second scheme violated one of the cardinal principles of cryptography by making it difficult to tell a letter of the clear from an enciphered letter; and both were so simple and so well known that they could hardly have deceived anyone, even in the Middle Ages. But as the objective seems to have been not so much complete deception as something to furnish a lawyer’s talking point in case the matter came before an ecclesiastical court, these simple devices seem to have served their purpose.
At this point there occurs in the history of cryptography one of those gaps which can be crossed only on the slack wire of hypothesis. The earliest known writing concerned with ciphers is a book by one Sicco Simonetta, who was connected with the chancellery of the Sforza Dukes of Milan between 1375 and 1383. It is called the Liber zifrorum; its nature is that of a manual for the diplomatic agents of the duchy. In it Simonetta recommends the use of simple substitution ciphers with suppression of frequencies and the insertion of an occasional code sign. This argues that the Italian courts had already learned the method of solving straight simple substitution ciphers, and requires a brief digression to describe that method.