Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

Similar documents
Exploring the Enigma [The MATH Connection]

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Ciphers that Substitute Symbols

Sherlock Holmes and the adventures of the dancing men

FOR OFFICIAL USE ONLY

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

PA Substitution Cipher

Institute of Southern Punjab, Multan

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Most people familiar with codes and cryptography have at least heard of the German

CS408 Cryptography & Internet Security

Appendix Cryptograms

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

An Introduction to Cryptography

Substitution cipher. Contents

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

Zodiackillersite. Backward E = 3/ G = 14 / Y K E = = 36 3/14/36

cryptography, plaintext; ciphertext. key,

The Paper Enigma Machine

CSc 466/566. Computer Security. 4 : Cryptography Introduction

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Baudot code channels

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

A reprint from American Scientist

The Swiss cipher machine NeMa

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Note: This document should only be used as a reference and should not replace assignment guidelines.

This article was published in Cryptologia Volume XII Number 4 October 1988, pp

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

Developing Your Musicianship Lesson 1 Study Guide

Circle of Fifths - Introduction:

INTERVALS Ted Greene

The Spaces of the Treble Clef

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Attacking of Stream Cipher Systems Using a Genetic Algorithm

How I Broke the Confederate Code (137 Years Too Late)

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

New Address Shift Linear Feedback Shift Register Generator

USC Dornsife Spatial Sciences Institute Master s Thesis Style Guide Effective for students in SSCI 594a as of Fall 2016

Primo Theory. Level 7 Revised Edition. by Robert Centeno

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

The Web Cryptology Game CODEBREAKERS.EU edition 2015

by Staff Sergeant Samuel Woodhead

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

~ A Ron and Bob Story ~ Book 2. Stink Bombs. R. Fulleman. LorRonCo

The Art of Improvising: The Be-Bop Language

WHAT INTERVALS DO INDIANS SING?

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Cabinet War Rooms SIGSALY. The A-3 scrambler

E Lesson Plan Day #1 Choir-Crowther

Student Guide for SOLO-TUNED HARMONICA (Part II Chromatic)

Annette Marshall ID Number Exam Number Harvest Moon Pkwy Kyle, TX

Tyr s Day, November 27: The Beauty Myth

Math, Music and Memory: Fall 2014 Section 2.4: Key Signatures and the Circle of Fifths

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Collaboration with Industry on STEM Education At Grand Valley State University, Grand Rapids, MI June 3-4, 2013

AP Music Theory Rudiments II and Analysis Exam

Learning Objectives Lower Grammar Stage. Kindergarten: The Cradle of Civilization Year First Grade: The Greek Year Second Grade: The Roman Year

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Update to 8 June 2011 Press Release

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Different jobs called for different kinds of writing in the Roman world. Here are the three most common:

Annette Marshall ID Number Exam Number Harvest Moon Pkwy Kyle, Texas

DOWNLOAD OR READ : TONAL HARMONY 7TH EDITION WORKBOOK ANSWER KEY BOOK PDF EBOOK EPUB MOBI

Examining The Dorabella Cipher with Three Lesser-Known Cryptanalysis Methods

GRADUATE/ transfer THEORY PLACEMENT EXAM guide. Texas woman s university

2 seventeenth-century news

Teacher Manual. Package A - B

"Ways Verbal Play such as Storytelling and Word-games Can Be Used for Teaching-and-learning Languages"

Preface. Ken Davies March 20, 2002 Gautier, Mississippi iii

GLOSSARY OF TERMS. It may be mostly objective or show some bias. Key details help the reader decide an author s point of view.

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Kansas College and Career Ready Standards - Aligned NAEP Sample Questions. 4th Grade Reading

Corporate house style

KVMEA Judges Handbook First Edition 2012

Edward Simpson: Bayes at Bletchley Park

Homework Booklet. Name: Date:

Music Selection Prepared by Lorraine Barrows with input from past scripts by Carolyn Butler, Vicki Uhr, Marge Bailey, Joni Bescos.

Music F193: Introduction to Music Theory

Music Theory. Solfege Scales and The Piano

MOUNT DORA HIGH SCHOOL STORM FORCE JAZZ BAND

REPORT ON THE NOVEMBER 2009 EXAMINATIONS

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

The Practice Room. Learn to Sight Sing. Level 2. Rhythmic Reading Sight Singing Two Part Reading. 60 Examples

Transcription:

Courtney Hulse November 1, 2010 Dorabella Cipher Cryptography peppers the world s history as an aid to military communication and national strategizing. During the Second World War, cryptography was perhaps the key factor that allowed the Allies to come home victorious, and before that, kings, like Louis XIV of France, used cryptography to maintain security of their political plans, but cryptography has not always had such a serious use. Cryptography has been used as a means of correspondence between forbidden lovers, and also as a series of challenges among friends as can be seen on the web in the form of sites dedicated to unsolved ciphers. The Dorabella cipher was one example as such: a code simply for fun without any weighty significance. Sir Edward William Elgar, the virtuosic composer of Pomp and Circumstance March, sent an enciphered note to his close friend, Miss Dora Penny, in 1897. Elgar had been visiting with Dora s family, and many believe he was romantically linked to Dora, despite her being many years his junior (although other sources say he visited with his wife, Alice). The note was included in a letter thanking Dora s family, and although it was clearly addressed to her ( Miss Penny was written on the reverseside), the fact that her whole family would see the note suggests that the message was not a private affair. Probably, Elgar wanted to offer a challenge to his friend, or he was referencing something they had discussed during

his visit. Dora knew Elgar well enough to understand his peculiar writings, which included phonetic spellings, puns, and cryptograms (i.e. xqqq signifies excuses, IXpin signifies ninepin ). Occasionally in his notes to her, Elgar would change the order of the letters of a word just to keep the reader on her toes. For example, cipher might be written as crehpi. (Palmer) Because of this arbitrary style of writing, Elgar s cipher text has countless possible solutions because the plaintext is not required to spell out actual words. Dora herself never deciphered the note; she died without ever discovering its meaning. However, she did publish the cipher text in her memoirs, and it has become a popular unsolved cipher, known as the Dorabella Cipher for the nickname Elgar gave her. There are many cryptanalysts who claim to have deciphered the Dorabella, but it is impossible to tell who, if anyone, is correct, as there are countless probable messages, and Elgar never revealed his intended meaning. The cipher consists of a series of cusps, oriented in different directions, containing one, two, or three cusps, and many believe the symbols are derived from the way Elgar signed his initials in cursive. It is also possible, however, that the cusps represent the letter c as in C major, the most basic scale on the piano. Perhaps Elgar is hinting that the note, if it is actually a melody, should be played in C major. (Effluvium) Another musical possibility could read the cusps as representations of one-note, two-note, or three-note chords. (Ancient) The note contains only eighty-seven characters, a limited cipher text, which makes it very difficult to break. Longer cipher texts are easier to decrypt because there is a greater likelihood for repetition of words and phrases, which can be used as cribs.

Frequency analysis was a tool developed by Al-Kindi as early as the tenth century, which analyzes a cipher text in terms of the number of occurrences of each individual letter. More letters allow for a more accurate frequency analysis, an accurate analysis can almost completely decrypt monoalphabetic ciphers. (Singh 17) Despite the brevity of the cipher, cryptanalysts have tried frequency analysis, but the result is always gibberish, indicating that it must not be a monoalphabetic substitution cipher. Even later, when additional cipher text was found scribbled in the margins of a concert program, the frequency analysis still yielded no helpful result. (BBC) The failure of this initial test led many to believe that the Dorabella cipher was doubly encrypted. Popular opinion has since departed from this belief, instead considering Elgar s tendencies toward artistic thinking. However, this trend is a dangerous one, because with enough creativity, almost any solution that looks wrong can be justified by tweaking the spelling and adding cryptograms as Elgar might have done. One theory hypothesizes that there was a connection between the cipher and Elgar s music. One of his grand works, Enigma Variations, which served as the namesake for the German Enigma machine that would come later, used many of his friends as inspiration for the music, coding the notes in Morse code, and personalizing the melodies to sound like his friends. For example, Dorabella had a stutter, so her section of the Enigma had quickly repeated notes that emulated the sound. (New Scientist) The ensuing idea is that the Dorabella cipher was similarly related to a piece of music. Eric Sams, a twentieth century musicologist, proposed that perhaps the eight different positions of the cusps represent rotations around a clock-like diagram where each stop is a progressing musical note (do, re, mi, fa, so, la, ti, do), and where the three variations of

cusps represent sharps, flats, and natural notes, making the cipher text a melody instead of a message. (Unsolved) The groupings of eight symbols of similar cusp-shape seem to indicate that the cipher, if it is a melody, would span three octaves. (Ancient) There may be something to the clock analysis, as there were drawings of similar dials found in a late notebook of Elgar s; perhaps he was trying to remember the encryption that he had used. (Ancient) Many have tried to capitalize on this clue, and they have come up with a number of varying answers. One cryptanalyst uses a compasslike wheel with three dashes on the edge of each quadrant, and on each section of the dissecting axes crossing through the circle. The resulting twenty-four dashes supposedly represent an alphabetical substitution, and the symbols line up so that the open part of the cusp faces toward the origin of the compass. (Palmer) Note, that there are only twentyfour symbols, yet there are twenty-six letters in the English alphabet. Kevin Jones, a professor at Kingston University in London, speculates that two of the more uncommonly used letters, probably J and V, share a symbol with their neighbors. (BBC) It is also possible that the cipher uses the Biblical Greek alphabet, which does contain twenty-four letters, but this is unlikely. (Ancient) A confident cryptanalyst writes, the cipher has now been solved it turns out to be a simple substitution cipher. (Roberts) He postulates that Elgar used the keyword phrase: Lady Penny, writing in code is such busy work, which becomes LADPENNY WRITIGC OSUHBYWK when repeated letters are removed, beginning at the end. This

phrase is then divided into three sets of eight letters, supposedly corresponding with the eight different orientations of symbols with one, two, or three cusps. Roberts claims the plaintext reads, P.S. Now droop beige weeds set in it pure idiocy one entire bed! Luigi Ccibunud luv ngly tuned liuto studo two. (Roberts) After some editing, the ensuing message could discuss gardening and Luigi Cherubini, the Italian composer, or it could easily be nonsense. Another cryptanalyst, Jean Palmer, found the plaintext, B LCAT IE AWR USIN NF NN ESHLL WY YOUD INTAQRAYEIN NET DMINUNEHO M SRRY YOU THEO O THS GOD THEN M SO LA OD E ADYA, and deciphered it as, Bella hellcat i.e. war using hens shells is why your antiquarian net diminishes hem sorry you theo oh tis God then me so la do E Adieu. This translation is also quite a stretch, even when Palmer points out a reference in a letter of Dora throwing eggs at Elgar. (Palmer) It is clear that the cryptanalysts took liberties with spelling and interpretation to fit their work. However, this approach is not so ludicrous; in fact, it is almost necessary given Elgar s bizarre use of language. Many of Elgar s legitimate writings resembled nonsense, so it is hard to tell what partial decryptions should be pursued further. The attempts as outlined above have merit, but they are wasted because there is no answer key for comparison. In 2007, the Elgar Society, in the United Kingdom, created a contest to celebrate the 150 th anniversary of Elgar s birth. They offered a prize of 1500 pounds to the person who could produce the most logical solution to the cipher. The society received many submissions in addition to the ones outlined above, some written in Latin, others written backwards, and still others using words that were not used colloquial until after the time the code was written. (New Scientist) None of the submissions were satisfactory, and

consequently, no prize was awarded. To be fair though, there is no way for the Society to know if the true plaintext can ever be derived because Elgar seems to have taken it to the grave. There even exists the possibility that the Dorabella cipher was simply a silly note meant to fool a friend and there never was any real meaning to his scribbles. Perhaps the whole ordeal was meant to be a joke; likely the world will never know. Regardless, it has become a source of fascination for the cryptographic community. The Dorabella Cipher was surely one of the least constructive examples of cryptography, but it found a beneficial use in its later life. The cipher was used as a test for those recruited to Bletchley Park, the famous British center for cryptanalysis. Churchill had ordered the leaders at Bletchley to assemble a diverse group of minds. (Singh 179) To do so, they gave the recruits known ciphers and watched how they went about decrypting them; the Dorabella cipher was one of these tests. It did not matter that the cipher was a dead end, because the object was to look at technique. (Effluvium)

Works Cited The Dorabella Cipher. Posted by nickpelling February 25, 2009. Accessed October 27, 2010. http://www.ciphermysteries.com/the-dorabella-cipher Hoschel Jr., George, Tony Gaffney, Tim Roberts, Jean Palmer. Unsolved Problems: In Number Theory, Logic, and Cryptography. Accesed October 27, 2010. http://unsolvedproblems.org/index_files/solutions.htm, unsolvedproblems.org/s04.doc Jones, Kevin. The Dorabella Code. Last updated August 2007. Accessed October 27, 2010. http://www.bbc.co.uk/proms/2007/interact/puzzles/dorabellacode.shtml Jones, Kevin. Breaking Elgar s Enigmatic Code. New Scientist Magazine, issue 2470, pg 56. Published December 25, 2004. Accessed online on October 27, 2010. http://homepage.mac.com/turder/iblog/b561081935/c663716685/e538429514/index.htm l Edward Elgar s Dorabella Cipher. Ancient Cryptography. Last post: March 15, 2009. Accessed October 27, 2010. http://www.aerobushentertainment.com/crypto/index.php?board=2.0 Website of The Elgar Society and Elgar Foundation. Last updated October 1, 2010. Accessed October 27, 2010. http://www.elgar.org/welcome.htm BFG. The Dorabella Cipher: Analysis 1. Effluvium of Consciousness: Brainfarts From the West Coast. February 27, 2010. Accessed October 27, 2010. http://baldfatgit.wordpress.com/2010/02/27/the-dorabella-cipher-analysis-1/ Sams, Eric. Variations on an Original Theme (Enigma). The Musical Times, Mar. 1970, pg 258-262. Accessed October 31, 2010. http://www.ericsams.org/sams_elgar2_eng.htm Singh, Simon. The Code Book. Random House: 1999. Palmer, Jean. The Agony Column Codes & Ciphers. http://listverse.com/2007/10/01/top- 10-uncracked-codes/ Note: Professor Kevin Jones was the chair of the judging panel for the Elgar Society s competition.