Complete Essays, Literary Criticism, Cryptography, Autography, Translations & Letters. Эдгар Аллан По
Чтение книги онлайн.

Читать онлайн книгу Complete Essays, Literary Criticism, Cryptography, Autography, Translations & Letters - Эдгар Аллан По страница 24

СКАЧАТЬ cipher, or the construction of its key. The difficulty of reading a cryptographical puzzle is by no means always in accordance with the labor or ingenuity with which it has been constructed. The sole use of the key, indeed, is for those au fait to the cipher; in its perusal by a third party, no reference is had to it at all. The lock of the secret is picked. In the different methods of cryptography specified above, it will be observed that there is a gradually increasing complexity. But this complexity is only in shadow. It has no substance whatever. It appertains merely to the formation, and has no bearing upon the solution, of the cipher. The last mode mentioned is not in the least degree more difficult to be deciphered than the first — whatever may be the difficulty of either.

      In the discussion of an analogous subject, in one of the weekly papers of this city, about eighteen months ago, the writer of this article had occasion to speak of the application of a rigorous method in all forms of thought — of its advantages — of the extension of its use even to what is considered the operation of pure fancy — and thus, subsequently, of the solution of cipher. He even ventured to assert that no cipher, of the character above specified, could be sent to the address of the paper, which he would not be able to resolve. This challenge excited, most unexpectedly, a very lively interest among the numerous readers of the journal. Letters were poured in upon the editor from all parts of the country; and many of the writers of these epistles were so convinced of the impenetrability of their mysteries, as to be at great pains to draw him into wagers on the subject. At the same time, they were not always scrupulous about sticking to the point. The cryptographs were, in numerous instances, altogether beyond the limits defined in the beginning. Foreign languages were employed. Words and sentences were run together without interval. Several alphabets were used in the same cipher. One gentleman, but moderately endowed with conscientiousness, inditing us a puzzle composed of pot-hooks and hangers to which the wildest typography of the office could afford nothing similar, went even so far as to jumble together no less than seven distinct alphabets, without intervals between the letters, or between the lines. Many of the cryptographs were dated in Philadelphia, and several of those which urged the subject of a bet were written by gentlemen of this city. Out of, perhaps, one hundred ciphers altogether received, there was only one which we did not immediately succeed in resolving. This one we demonstrated to be an imposition — that is to say, we fully proved it a jargon of random characters, having no meaning whatever. In respect to the epistle of the seven alphabets, we had the pleasure of completely nonplus-ing its inditer by a prompt and satisfactory translation.

      The weekly paper mentioned, was, for a period of some months, greatly occupied with the hieroglyphic and cabalistic-looking solutions of the cryptographs sent us from all quarters. Yet with the exception of the writers of the ciphers, we do not believe that any individuals could have been found, among the readers of the journal, who regarded the matter in any other light than in that of a desperate humbug. We mean to say that no one really believed in the authenticity of the answers. One party averred that the mysterious figures were only inserted to give a queer air to the paper, for the purpose of attracting attention. Another thought it more probable that we not only solved the ciphers, but put them together ourselves for solution. This having been the state of affairs at the period it was thought expedient to decline farther dealings in necromancy, the writer of this article avails himself of the present opportunity to maintain the truth of the journal in question — to repel the charges of rigmarole by which it was assailed — and to declare, in his own name, that the ciphers were all written in good faith, and solved in the same spirit.

      A very common, and somewhat too obvious mode of secret correspondence, is the following. A card is interspersed, at irregular intervals, with oblong spaces, about the length of ordinary words of three syllables in a bourgeois type. Another card is made exactly coinciding. One is in possession of each party. When a letter is to be written, the key-card is placed upon the paper, and words conveying the true meaning inscribed in the spaces. The card is then removed and the blanks filled up, so as to make out a signification different from the real one. When the person addressed receives the cipher, he has merely to apply to it his own card, when the superfluous words are concealed, and the significant ones alone appear. The chief objection to this cryptograph is the difficulty of so filling the blanks as not to give a forced appearance to the sentences. Differences, also, in the handwriting, between the words written in the spaces, and those inscribed upon removal of the card, will always be detected by a close observer.

      A pack of cards is sometimes made the vehicle of a cipher, in this manner. The parties determine, in the first place, upon certain arrangements of the pack. For example: it is agreed that, when a writing is to be commenced, a natural sequence of the spots shall be made; with spades at top, hearts next, diamonds next, and clubs last. This order being obtained, the writer proceeds to inscribe upon the top card the first letter of his epistle, upon the next the second, upon the next the third, and so on until the pack is exhausted, when, of course, he will have written fifty-two letters. He now shuffles the pack according to a preconcerted plan. For example: he takes three cards from the bottom and places them at top, then one from top, placing it at bottom, and so on, for a given number of times. This done, he again inscribes fifty-two characters as before, proceeding thus until his epistle is written. The pack being received by the correspondent, he has only to place the cards in the order agreed upon for commencement, to read, letter by letter, the first fifty-two characters as intended. He has then only to shuffle in the manner pre-arranged for the second perusal, to decipher the series of the next fifty-two letters — and so on to the end. The objection to this cryptograph lies in the nature of the missive. A pack of cards, sent from one party to another, would scarcely fail to excite suspicion; and it cannot be doubted that it is far better to secure ciphers from being considered as such, than to waste time in attempts at rendering them scrutiny-proof, when intercepted. Experience shows that the most cunningly constructed cryptograph, if suspected, can and will be unriddled.

      An unusually secure mode of secret intercommunication might be thus devised. Let the parties each furnish themselves with a copy of the same edition of a book — the rarer the edition the better — as also the rarer the book. In the cryptograph, numbers are used altogether, and these numbers refer to the locality of letters in the volume. For example — a cipher is received commencing, 121-6-8. The party addressed refers to page 121, and looks at the sixth letter from the left of the page in the eighth line from the top. Whatever letter he there finds is the initial letter of the epistle — and so on. This method is very secure; yet it is possible to decipher any cryptograph written by its means — and it is greatly objectionable otherwise, on account of the time necessarily required for its solution, even with the key-volume.

      It is not to be supposed that Cryptography, as a serious thing, as the means of imparting important information, has gone out of use at the present day. It is still commonly practised in diplomacy; and there are individuals, even now, holding office in the eye of various foreign governments, whose real business is that of deciphering. We have already said that a peculiar mental action is called into play in the solution of cryptographical problems, at least in those of the higher order. Good cryptographists are rare indeed; and thus their services, although seldom required, are necessarily well requited.

      An instance of the modern employment of writing in cipher is mentioned in a work lately published by Messieurs Lea & Blanchard, of this city — “Sketches of Conspicuous Living Characters of France.” In a notice of Berryer, it is said that a letter being addressed by the Duchess de Berri to the legitimists of Paris, to inform them of her arrival, it was accompanied by a long note in cipher, the key of which she had forgotten to give. “The penetrating mind of Berryer,” says the biographer, “soon discovered it. It was this phrase substituted for the twenty-four letters of the alphabet — Le gouvernement provisoire.”

      The assertion that Berryer “soon discovered the key-phrase,” merely proves that the writer of these memoirs is entirely innocent of cryptographical knowledge. Monsieur B. no doubt ascertained the key-phrase; but it was merely to satisfy his curiosity, after the riddle had been read. He made no use of the key in deciphering. The lock was picked.

      In our notice of the book in question (published in the April СКАЧАТЬ