# Renaissance science – XLVI

One area that is not usually counted among the sciences is cryptography, lying as it does, in this day and age, between, logic, mathematics, and informatics. In earlier times it is perhaps best viewed as a part of logic. Perhaps surprisingly, cryptography underwent a major development during the Renaissance provoked by an earlier development in the hands of Islamicate scholars.

Cryptography means literally hidden writing, coming from the Greek kryptos meaning hidden and graphiameaning write, express in written characters, so codes. We have very little evidence of the use of codes by the ancient Egyptians, Babylonians, or Greeks, although it can be assumed that they did so. It is known that the ancient Greeks sent secret messages by shaving the head of a slave, writing, or tattooing the message on their skull, and then waiting until the hair grew back. Not really encryption and anything but high-speed communication.

The most well-known system of encryption from antiquity is the Caesar cipher, used by Julius Caesar in his correspondence. This is a very simple substitution code in which each letter in the plain text is replaced by the letter so many places before or after it in the alphabet. Up till the Middle Ages, in Europe all codes were some form of simple substitution code.

The first significant work on cryptography was written the Arabic philologist Abu ‘Abd ar-Raḥmān al-Khalīl ibn Aḥmad ibn ‘Amr ibn Tammām al-Farāhīdī al-Azdī al-Yaḥmadī (718–786 CE) known as Al-Farāhīdī or Al-Khalīl. His book Kitab al-Muamma (Book of Cryptographic Messages), which has been lost, presents the use of permutations and combinations to list all possible Arabic words with and without vowel.

Al-Khalīl’s book influenced the work on cryptography by the Arabic polymath Abū Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindī (c. 801–873), whose theory of radiations played a significant role in the history of optics. In his book Risāla fī Istikhrāj al-Kutub al-Mu’ammāh (On Extracting Obscured Correspondence), al-Kindī introduced the concept of frequency analysis, which made all simple substitute codes accessible to solution. He wrote:

One way to solve an encrypted message, if we know its language, is to find a different plaintext of the same language long enough to fill one sheet or so, and then we count the occurrences of each letter. We call the most frequently occurring letter the “first”, the next most occurring letter the “second”, the following most occurring letter the “third”, and so on, until we account for all the different letters in the plaintext sample. Then we look at the cipher text we want to solve and we also classify its symbols. We find the most occurring symbol and change it to the form of the “first” letter of the plaintext sample, the next most common symbol is changed to the form of the “second” letter, and the following most common symbol is changed to the form of the “third” letter, and so on, until we account for all symbols of the cryptogram we want to solve.

Ai-Kindī’s explication of frequency analysis meant that a new more complex approach to encryption was necessary, and this was first delivered by the Renaissance polymath Leon Battista Alberti (1404–1472), whom we have already met in this series in the episodes on linear perspective and architecture. Alberti is one of those people, who deserves to be much better known than he is.

Alberti published the earliest known description of a polyalphabetic cipher in his De componendis cifris in 1467.

In a polyalphabetic cipher not one but several substitution alphabets are used for different sections of the text, changing at random intervals, with a signal in the text to indicate for the reader deciphering the code of the alphabetical change. A polyalphabetic cipher is, in theory, not susceptible to frequency analysis; this, of course, is only true if one doesn’t know the method. In order to implement his method Alberti invented his cipher disc, which he explained in a letter was inspired by the recent invention of the movable type printing press.

How the whole thing is supposed to function is described by Alberti in his De componendis cifris

Chapter XIV. I will first describe the movable index. Suppose that we agreed to use the letter k as an index letter in the movable disk. At the moment of writing I will position the two disks of the formula as I wish, for example juxtaposing the index letter to capital B, with all other small letters corresponding to the capital letters above them. When writing to you, I will first write a capital B that corresponds to the index k in the formula. This means that if you want to read my message you must use the identical formula you have with you, turning the movable disk until the letter B corresponds to the index k. Thus all small letters in the ciphertext will receive the meaning and sound of those above them in the stationary disk. When I have written three or four words I will change the position of the index in our formula, turning the disk until, say, the index k is under capital R. Then I will write a capital R in my message and from this point onward the small k will no longer mean B but R, and the letters that follow in the text, will receive new meanings from the capital letters above them in the stationary disk. When you read the message you have received, you will be advised by the capital letter, which you know is only used as a signal, that from this moment the position of the movable disk and of the index has been changed. Hence, you will also place the index under that capital letter, and in this way you will be able to read and understand the text very easily. The four letters in the movable disk facing the four numbered cells of the outer ring will not have, so to speak, any meaning by themselves and may be inserted as nulls within the text. However, if used in groups or repeated, they will be of great advantage, as I will explain later on.

Chapter XV. We can also choose the index letter among the capital letters and agree between us which of them will be the index. Let us suppose we chose the letter B as an index. The first letter to appear in the message will be a small one at will, say q. Hence, turning the movable disk in the formula you will place this letter under the capital B that serves as an index. It follows that q will take the sound and meaning of B. For the other letters we will continue writing in the manner described earlier for the movable index. When it is necessary to change the set up of the disks in the formula, then I will insert one, and no more, of the numeral letters into the message, that is to say one of the letters of the small disk facing the numbers which corresponds to, let’s say, 3 or 4, etc. Turning the movable disk I will juxtapose this letter to the agreed upon index B and, successively, as required by the logic of writing, I will continue giving the value of the capitals to the small letters. To further confuse the scrutinizers you can also agree with your correspondent that the capital letters intermingled in the message have the function of nulls and must be disregarded, or you may resort to similar conventions, which are not worth recalling. Thus changing the position of the index by rotating the movable disk, one will be able to express the phonetic and semantic value of each capital letter by means of twenty-four different alphabetic characters, whereas each small letter can correspond to any capital letter or to any of the four numbers in the alphabet of the stationary disk. Now I come to the convenient use of the numbers, which is admirable.

I leave it to the reader to decipher Alberti’s instructions.

Alberti was not the only Renaissance scholar to suggest the adoption of a polyalphabetic cipher. The German, Benedictine monk, Johannes Trithemius (1462–1516), born Johann Heidenberg, was Abbot of the Abbey of Sponheim and from 1506 of the St, James’ Abbey in Würzburg.

Trithemius was a polymath active as a lexicographer, chronicler, cryptographer, but above all he is known as an occultist. As I have noted in an earlier episode in this series the occult sciences played a significant part in Renaissance thought. Trithemius is considered to have had a major influence on both Paracelsus (c. 1493–1541) and Heinrich Cornelius Agrippa von Nettesheim (1486–1535).

Trithemius’ most famous work was his Steganographia (written c. 1499 but first published in 1606), which was initially thought to be about magic and was placed on the Index Librorum Prohibitorum (List of Prohibited Books) by the Catholic Church in 1609. In fact, the book was written in code and already in 1606, the first two volumes were shown to be about steganography (a word that Trithemius coined) and cryptography. Steganography is:

The practice of hiding messages, so that the presence of the message itself is hidden, often by writing them in places where they may not be found until someone finds the secret message in whatever is being used to hide it. (def. Wiktionary).

The third volume was, thought to be really about magic but has comparatively recently also shown to be about cryptography.

Trithemius also wrote his Polygraphiae libri sex (Six books of polygraphia), the first printed book on cryptography, a further text on steganography, which was published posthumously in 1518.

This work contains a progressive key polyalphabetic cipher now known as the Trithemius cipher.

Our third Renaissance cryptographer was Blaise de Vigenère (1523–1596) a French, diplomat, cryptographer, translator, and alchemist.

Although, he created a polyalphabetic cipher, the one that bears his name was actually first described by Giovan Battista Bellaso (1505–?) an Italian cryptographer in his La Cifra del Sig. Giovan Battista Belaso published in 1553. Bellaso went on to publish a second book, Novi et singolari modi di cifrare, in 1555 and a third one Il vero modo di scrivere in cifra, in 1565. Vigenère published his polyalphabetic cipher, first in 1586, in his Traicté des Chiffres ou Secrètes Manières d’Escrire. 1586. Both men’s ciphers were based on a so-called auto key but differed in detail.

An autokey cipher (also known as the autoclave cipher) is a cipher that incorporates the message (the plaintext) into the key. The key is generated from the message in some automated fashion, sometimes by selecting certain letters from the text or, more commonly, by adding a short primer key to the front of the message. (Def. Wikipedia).

The Vigenère cipher was thought to be unbreakable and in fact Charles Lutwidge Dodgson (better known as Lewis Carroll), a very competent logician, said that it was unbreakable in 1868, unaware that Charles Babbage had already broken it earlier but had not published his results. The first to publish a general system to solve polyalphabetic ciphers, including the Vigenère cipher, was the German soldier, cryptographer, and archaeologist, Friedrich Wilhelm Kasiski (1805–1881) in his Die Geheimschriften und die Dechiffrir-Kunst (Secret Writing and the Art of Deciphering) in 1863, a publication that, at the time, went largely unnoticed. It was first in the nineteenth century that the art of cryptography evolved past the innovations of the Renaissance cryptographers, Alberti, Trithemius, Vigenère, and Bellaso.

Filed under Renaissance Science

### 9 responses to “Renaissance science – XLVI”

1. rtpoe

Two things are worth noting:

First, by around 1600, pretty much every method that you could use without computers (or electronic assistance, e.g. the Enigma Machine) had been developed. Homophone substitution ciphers, where special symbols were used to represent certain common words or letter groups; the inclusion of deliberate misspellings in the plaintext to confound the attempts at deciphering…..

Also, pretty much every government or large organization had their own Cryptographic Office, staffed by professionals. I understand that Spain’s was so weak that Philip II complained that other governments must have been using witchcraft to decipher his communications.

https://www.atlasobscura.com/articles/cryptography-renaissance-venice

2. “Two things are worth noting:

First, by around 1600, pretty much every method that you could use without computers (or electronic assistance, e.g. the Enigma Machine) had been developed.”

I recommend you read a popular book on codes and ciphers. I have David Kahn’s “The Codebreakers” published in paperback in 1973. An example of an advance you have ignored is Jefferson’s wheel cipher, which is a polyalphabetic substitution but has the particular advantage that any of the cipher alphabets can be used to send the same message as only one line at the receiving end will make sense.

A note for Thony: shaving the slave’s head, or in another example, writing the message on the wooden base of a blank wax-covered writing tablet is steganography, an ancient equivalent of the modern microdot.

• My post actually includes the definition of steganography.

The Jefferson disc, which is an improved polyalphabetic cipher but dating from 1795 is outside of my timeframe

• Thony, the first part of my response was directed to rtpoe, rather than you. Secondly, it is not the Jefferson disk (it is not like the Alberti disk) because the letters of the code alphabets are written on the outside of the cylinders, not on the face.

• The Jefferson disk, also called the Bazeries Cylinder or wheel cypher…

3. What??? no mention of the pig pen cipher! I’m shocked. Someone unleash the History Hulk.

• Although Pigpen might be regarded as a fun cipher to use, it offers almost no cryptographic security at all. Its use of symbols instead of letters in no way impedes cryptanalysis, and this cipher is not otherwise different from any other simple monoalphabetic substitution cipher. Worse, because it is both very well-known and instantly recognizable, it is arguably among the worst ciphers one can possibly choose from a security standpoint. Indeed, knowledge of Pigpen is so ubiquitous that an interceptor might not need to actually break this cipher at all, but merely decipher it, in the same way that the intended recipient would. (Wikipedia)

4. "Pat" Ballew

Yeah, Sometimes when I try tongue in cheek I end up biting my tongue. I actually know how simple it is, and taught it to 6th and 7th graders, even with a couple of variations that a tiny bit more security. I would never presume that I was in a position to judge the quality of your historical writing, or much of anything els.

• 🙃