Read The Friar and the Cipher Online

Authors: Lawrence Goldstone

Tags: #Fiction

The Friar and the Cipher (25 page)

BOOK: The Friar and the Cipher
7.88Mb size Format: txt, pdf, ePub
ads

Friedman transcription
WILLIAM F. FRIEDMAN COLLECTION, GEORGE C. MARSHALL FOUNDATION

“They probably picked the scheme they did because of visual resemblance of the manuscript characters to various letters and numbers,” Reeds noted. “They must have thought that the gallows characters [21–24] without pedestals paired up with those that had pedestals, and so thought of using a following Z as a kind of accent mark.”

Then, after they produced the punch cards, got their printout, and were prepared to plunge into the actual decipherment, World War II ended. With the war over, funding for Friedman's department dried up and the group was disbanded before an exhaustive statistical profile could be developed. Still, just from the work they had done, one or two points caught Friedman's eye.

Every language has “entropy,” a measure of disorder that is derived from the degree of repetition of words or letters. For simple languages entropy is very low, and for more complex languages it is somewhat higher. If the manuscript was a hoax—nonsense made to look like ciphertext—entropy would be higher still, a good deal higher than in genuine language patterns. What Friedman found was just the opposite. Entropy in the Voynich manuscript was much lower than that for most real languages—so low, in fact, that it was later determined that the only actual language with so much repetition was Polynesian. Yet the repetition was never longer than five-word segments, unlike the long repeated phrases that one would expect in a hoax. Also, in most cases, it is words that repeat, rather than phrases, the manner in which genuine language is structured.

Last, and perhaps most important, was that, as Manly had first pointed out, the manuscript was so specifically rendered, so consistent in structure, the illustrations so detailed and finely drawn, that if it was a hoax, it was sufficiently elaborate to have taken years to fashion, even if the text was meaningless. If Kelley had fabricated the manuscript to hoodwink Rudolph, he would not have needed to go to nearly so much trouble.

William Friedman rejected the hoax alternative. He also rejected the notion that the manuscript could be written in substitution cipher, no matter how sophisticated. Instead, he came up with a different theory entirely, one that has guided most of the research ever since. When asked to explain his theory in an article for
Philological Quarterly,
Friedman chose to do so in anagram cipher, the solution to which he sealed in a time-stamped envelope, inviting readers to try and unravel it. He wrote:

I put no trust in anagrammatic acrostic cyphers for they are of little real value—a waste—and may prove nothing.—Finis.

To prove Friedman's point, at ninety-six letters, this anagram lends itself to a variety of plausible solutions. Readers of
Philological Quarterly
sent in a number of possibilities, including, “To arrive at a solution of the Voynich Manuscript, try these general tactics: a song, a punt, and a prayer. William F. Friedman.” Another was, “This is a trap, not a trot. Actually, I can see no apt way of unraveling the rare Voynich Manuscript. For me, defeat is grim.” When the envelope was opened, however, the actual message was

The Voynich MSS was an early attempt to construct an artificial or universal language of the a priori type. Friedman.

What Friedman had in mind was pasigraphy, a universal language based on classification in which symbols stand in for words. Efforts to create such languages were thought to have begun in the sixteenth century but had their origins in the Orient, where ideographs represented entire concepts rather than simply words or phrases. Francis Bacon had attempted such a system, as had Leibniz. No modern scholar has ever attributed such an effort to Roger Bacon, but given his interest in the study of comparative language and accuracy of translation in scholarly work, a universal language, particularly one with such obvious applications to scientific study, would have been an ideal creation. Also, if Francis Bacon was attempting to formulate an artificial universal language, it is not at all outrageous to speculate on whether the idea might have originated elsewhere. Finally, when John Dee's library was sacked, many of his books and papers were stolen. If Roger Bacon had hypothesized about a universal language, evidence of it might well have disappeared.

William Friedman
COURTESY OF THE NATIONAL SECURITY AGENCY

In the Friedman pasigraphical variation, broad categories of knowledge were given symbol or “letter” equivalents and placed at the beginning of a word, then basic subcategories, also assigned a symbol (from the same “alphabet”), were then placed in the second position, and so on. If this was the method used, sets of letters would repeat frequently at the beginnings of “words” but would then break off into variances as the words got longer. This appeared to be the case with the Voynich manuscript, but Friedman's attempts to study the matter further were hampered by a shortage of both time and money. (By this time, the manuscript had been so discredited that when Friedman tried to obtain funding from a private foundation he was denied on the grounds that the manuscript held nothing new.)

Elizebeth Friedman
COURTESY OF THE NATIONAL SECURITY AGENCY

In the 1950s, the Friedmans returned to the other Bacon to try to determine once and for all whether it was possible that he was the author of Shakespeare's plays. They were both by now in their sixties and, while still active, had to choose projects for which there was more than an outside chance of resolution. In 1955, they published
The Shakespeare Ciphers Examined
, in which they demolished not only Mary Wells Gallup's reading of biliteral messages—Gallup, it seemed, although honestly believing her readings, had assigned typefaces based more on what she wanted to find than on similarities or differences—but also a number of other Baconian theories that were a good deal quirkier. In most of these cases, the Friedmans found not that the various interpretations were impossible, but simply—like Newbold's Voynich transcription—that they were subjective and ambiguous, thereby violating the one rule of cryptology that conspiracy theorists most often ignore—the need for a secret message to have one and only one solution.

 

WHILE FATHER PETERSON AND THE FRIEDMANS WERE ANALYZING
the data, two “solutions” were put forth, with great fanfare. In 1943, a Rochester, New York, lawyer named Joseph Martin Feely self-published a book entitled
Roger Bacon's Cipher: The Right Key Found
. Feely, who became interested in the cipher after reading Newbold and Kent's book, hired a team of researchers, who then completed an exhaustive frequency analysis of both the manuscript and several of Roger Bacon's original texts. From these results, Feely attempted a substitution based on the most common letters and symbols. Frustrated both by Bacon's penchant for abbreviation and the differences in classical and medieval Latin (to say nothing of never seeing the original manuscript and working completely from the illustrations in the book), Feely all the same attempted to “crib” the words that were associated with the drawings, then move from that to a detailed transcription. (A “crib” in cryptology is a piece of ciphertext with a plaintext equivalent that is known or can be deduced without decryption.) He concluded that the manuscript was a scientific journal with a specific emphasis on gynecology. (The naked women were actually ova, and he found references to ovaries and tubes throughout the work.) As to the cipher itself, Feely concluded that it was a simple substitution of abbreviated Latin, most likely written by Roger Bacon.

No one either then or since has found his solution persuasive.

A more compelling resolution was put forth by Dr. Leonell Clarence Strong, a distinguished geneticist and cancer researcher from Yale and (of course) amateur cryptographer. Claiming that he could decipher anything, and also working from the illustrations in the Newbold and Kent book, Dr. Strong asserted in a 1945 article in the journal
Science
that the manuscript was written in a “peculiar double system of arithmetical progressions of a multiple alphabet.” He refused, however, to publish the details of his method, claiming that such a disclosure might be used by the nation's enemies.

Dr. Strong's solution “revealed” that the manuscript was actually an herbal and sex manual written by Anthony Ascham, a sixteenth-century alchemist and astrologer and the brother of Roger Ascham, the humanist tutor to Edward VI and Elizabeth I. (He also claimed to have decoded Ascham's name on the very same page that held O'Neill's sunflower.) The text contained, according to a contemporary newspaper account, “an extremely candid discussion of women's ailments and practical matters of the conjugal bed,” as well as a recipe for an herbal contraceptive. Ordinarily, such a bizarre theory would have been greeted with a snort, but Dr. Strong had a thirty-year record of brilliant work in medical research. On the other hand, after Newbold, academic credentials did not carry the weight they once might have. Elizebeth Friedman observed, “He said little about [his method], but what he did say made no sense to cryptologists.”

 

IN THE YEARS AFTER WORLD WAR II,
interest in the manuscript gradually waned, and, when Ethel Voynich died in 1960, Anne Nill, now the sole owner, decided to sell it. Rather than the millions that Voynich had expected when he wrote out his will, its highest bid came from a book dealer, Hans Kraus, who paid $24,500. He listed the item in his catalog at $160,000, then tried to find a buyer at $100,000. Although the Friedmans had set up a second study group in 1962, interest in the manuscript had fallen off, and the group soon disbanded. Unable to get even the lower price for “the most mysterious manuscript in the world,” in 1969, Kraus finally donated it to the Beinecke Rare Book and Manuscript Library at Yale, getting nothing but a tax write-off. The Beinecke librarians filed the manuscript as MS 408 and expected, along with Kraus, that that would be that. The Voynich manuscript would become just another oddity—a unique but essentially anonymous item, blending in to what is doubtless one of the finest bibliographic collections in the world.

It did not work out quite that way.

CHAPTER EIGHTEEN

MS 408

•   •   •

MS 408 IS ANYTHING BUT ANONYMOUS.
In fact, it is by far the most requested item in the entire Beinecke collection. The Voynich manuscript has its own curator, who is assigned to field requests and queries; there is a Voynich “kit” sent to the curious; and images of various Voynich pages are posted regularly on the Beinecke Web site. One of the librarians noted facetiously, “We get busloads of people from Cleveland pulling up to the curb and coming in wanting to see the Voynich manuscript.” If auctioned today, the manuscript would almost certainly, after almost three quarters of a century, finally garner the kind of money that Voynich expected.

 

INTEREST IN THE MANUSCRIPT WAS REKINDLED
soon after it arrived at Yale. A member of the university's philosophy department and former army intelligence officer named Robert Brumbaugh had become fascinated with the manuscript thirty years before, when, as a young student of medieval philosophy, he had read both Newbold's account and Manly's reply. He found himself “unable to resist” taking a look now that the manuscript was at the Beinecke.

Soon, Brumbaugh was visiting the library in every spare moment to pore over the symbols and the illustrations, and he even recruited his son to help. While examining the first page under ultraviolet light, Brumbaugh's son confirmed that there was indeed a transcription of the key attributing the manuscript to Roger Bacon, dated 1*30, which Brumbaugh concluded must be 1630, although he initially thought the illegible second number was lower than a six.

Brumbaugh himself focused on the key on the last page, as well as those illustrations that he could identify as representing genuine medicinal plants. (He admitted that “there were not many.”) Using a different selection of letters and applying a completely different methodology than had Newbold, Brumbaugh nonetheless also arrived at the conclusion that Roger Bacon's name was embedded within the key. He later wrote, “The line [in the key] that opens: MICHI CON . . . BA. The CON . . . BA could be a Bacon anagram (like the modern pig-Latin ACONBAY) but one would not be sure without further confirmation. The letters OLADA between CON and BA are not a standard Latin word. But, in standard medieval cipher (where each letter of ciphertext stands for the letter three places later in the standard alphabet) OLADA deciphers as RODGD.” The trailing isolated
O
at the end of the third line of the key, he added, would also have a plaintext equivalent of
R,
which added some confirmation.

From there, Brumbaugh worked furiously to try to make some sense of the ciphertext that encaptioned the medicinal plant section. He noticed that some of the characters appeared to be similar to a Renaissance Milanese code that he had run across, which had a base that was in numbers that transcribed into letters. This time, employing his daughter as well as his son, Brumbaugh came up with a partial decipherment based on a numbering system so astoundingly complex that it made Newbold's method seem straightforward. His plaintext transcription yielded what seemed to be part mystical herbal and part astrological manual.

However, even if part of the key did decipher into “RODG.R BACON”—questionable enough in itself—Brumbaugh hastened to add that it did not necessarily mean that Bacon himself had penned the manuscript. Citing bits of evidence found in the text and illustrations (for example, Sagittarius is drawn wearing a sixteenth-century cap) and other more circumstantial data (the lettering in a set of Leonardo da Vinci manuscripts “matched many characters” in the Voynich cipher), Brumbaugh decided that the manuscript must have been written much later than the thirteenth century. Because the “key” was so easily deciphered, he further observed, it must have been a plant, part of an elaborate fraud concocted by someone, probably Dee or Kelley, who knew that evoking the name of the famed friar would elicit great interest and render the document more valuable—possibly far more valuable. And no one, Brumbaugh concluded, would have valued a mysterious Roger Bacon cipher manuscript more than the gullible and willing Rudolph. Although the text was not gibberish and could be read—and probably would be someday—the content would hardly qualify it as a great work of science.

Brumbaugh's explanation attracted a good deal of interest, but not one professional cryptologist signed on to his solution. Their disagreement seemed to be as much with his conspiracy theory as the details of his solution. No one, they decided, would go to the enormous and unnecessary trouble of constructing a genuine underlying text to fool someone who could never have deciphered it in the first place.

While Brumbaugh was working at Yale, interest had also been renewed at the National Security Agency. Working at the agency at the time, on loan from the United Kingdom, was Brigadier John Hessel Tiltman, the man, according to General Communications Headquarters (GCHQ), the English version of the NSA, “generally acknowledged as the greatest British code breaker of all time.” Tiltman was a prodigy. Born in 1894, he entered Oxford at age thirteen. He joined the army at the beginning of World War I, and after the war was assigned to a newly formed code-breaking unit called Government Code & Cipher School. He founded the military section of GC&CS in 1930 and during the years that followed established himself as a premier cryptanalyst by breaking most of the codes used by Communist parties around the world in communicating with Moscow. When tensions rose with Japan at the end of the 1930s, Tiltman set himself to preparing his country for war. He broke the main Japanese naval code in 1939, then, realizing that there was a paucity of cryptologists in his section sufficiently proficient in Japanese, taught himself enough of the language in six months to allow him to break the codes used by Japanese military attachés.

When GC&CS moved to Bletchley Park in 1939 (where the tortured mathematical genius Alan Turing would break the Nazis' seemingly impenetrable Enigma code), Tiltman remained in charge of the military section. While he was there, he attacked the cipher with which the German High Command communicated by radio. Given the code name “Fish,” the cipher had been created by the Lorenz Company in response to the High Command's request for a secure means to send their radio messages. Lorenz had built a machine with letter wheels and keys similar to Enigma, but which transmitted signals in a thirty-two-character set of symbols called the Baudot code, not in the twenty-six-letter alphabet as did the Enigma machine. Without ever seeing the Lorenz machine, beginning entirely with cribs, Tiltman and his group eventually broke Fish and were able to intercept German military communication at the highest level.

After the war, in 1950, William Friedman sent Tiltman copies of the last twenty pages of the Voynich manuscript—a section with only text and no illustrations—as well as Newbold's book. Planning to use Tiltman as a “control,” Friedman asked him what he could make of the symbols.

Tiltman first performed a quick frequency analysis, focusing on the symbols that appeared most often in the text and how they combined with other symbols. He discovered that some symbols appeared with overwhelming incidence at the beginning of words, some in the middle, and others at the end. What's more, there were symbol groups that seemed to cluster at the beginning of many words. Tiltman concluded that these were roots and that the ending symbols were suffixes, and therefore Friedman's hypothesis of a pasigraphic system was most likely correct. If this was true, of course, a substitution cipher was not a possibility.

He remained fascinated by the manuscript and, while he was in Washington in the late 1960s, began an investigation of some early attempts at artificial language, but there was no parallel system that had been created early enough or with sufficient similarity to provide any clues. He also undertook a history of herbals, but once more he could find nothing that would be of help. No herbal or medicinal manuscript before 1700 bore any resemblance to the document he was studying.

By 1970, Tiltman had become yet another of the greatest cryptanalysts in history who had reached a dead end in trying to decipher the Voynich manuscript. Like Friedman and Manly before him, he had unearthed new clues but found no solution. Tiltman's labors in many ways epitomized the entire frustrating history of the efforts to decrypt the manuscript. Cryptology involves an almost superhuman degree of patience and persistence, to say nothing of an artist's eye. After trying cribs, substitutions, concordances, frequencies, combinations, after checking provenance, medical history, philology, botany, and astronomy, after subjecting the cipher to both computer analysis and human instinct, no one was able to (persuasively) penetrate the code. There was too much detail in the manuscript, too much order, too much precision, for it to be a fraud, but too much obscurity to provide an answer.

While Tiltman was working on the cipher, another veteran NSA analyst, Prescott Currier, noticed that, particularly in the herbal sections, some of the pages were written tightly, the letters small and cramped, while in most of the text the script was looser and more flowing. Studying the characters separately, Captain Currier theorized that not only were there two styles in the manuscript but two separate languages, which he named “Voynich A” and “Voynich B.” He couldn't penetrate either language, but, if he was correct, Currier had eliminated a potential source of error. While not everyone has agreed with Currier's assessment, the dual-language hypothesis has been incorporated into most of the subsequent research.

In the early 1970s, Tiltman, now nearing eighty years old, heard that another young analyst at NSA named Mary D'Imperio had taken an interest in the manuscript. He turned over coordination of the Voynich transcription effort to her. (Whether the analysts were engaged in their Voynich activities in their spare time or as part of an official effort to see if the Voynich cipher had any utility has never been made clear.) In 1972, D'Imperio chaired a seminar, and then, four years later, published a monograph—actually under NSA auspices—entitled “The Voynich Manuscript: An Elegant Enigma.” Although there is little in this work that is new, it is extraordinarily detailed, complete, and well researched, covering even the most peripheral aspects of the manuscript's scholarship. If nothing else, it provides remarkable insight into the methodology of contemporary cryptanalysis and supplies some pretty revealing hints as to how they go about things at the NSA. A quarter century later, this work is still considered definitive, but D'Imperio personally (if she was in fact a real person and not an NSA phantom) has faded back into the NSA mist, never to be publicly seen or heard from again.

 

THROUGH THE LATE 1970S AND 1980S,
with nothing more heard from NSA analysts (at least for attribution), the spotlight was left to maverick amateurs. One of the most inventive entries came in 1978 when a self-styled philologist named John Stojko produced a solution in which he claimed that the manuscript was a copy of correspondence written in Ukrainian. In a book he called
Letters to the God's Eye
, Stojko claimed that before encryption all the vowels had been removed from the plaintext. The consonants were then encrypted by use of a secret alphabet with Etruscan roots. As a result, Stojko—who is Ukrainian himself and claimed to be able to read Etruscan—came up with sentences such as “Mr. is that you who believe in your believe? Miss, your Sust will renew eye and will rule. Tell me Eye of God; will God's eye of Sust heal?”

Stojko's solution quickly went the way of Feely's. Not only did the text of the letters bear no relation to illustrations on the pages on which they appeared, but in his transcription he had inserted vowels and word spaces arbitrarily. In addition, Stojko, who also claims to be a historian, was said by others interested in the manuscript to often deviate from “the generally accepted history of the Ukraine.”

There was little limit to the lengths that amateur cryptologists would go to be able to claim that they had cracked the code. In 1987, Leo Levitov, a New Jersey physician, produced a detailed solution in which he claimed that the Voynich manuscript was actually the last surviving liturgical document of the great Cathar heresy of thirteenth-century France and that the Cathars themselves were an offshoot of a cult that worshipped the Egyptian goddess Isis. Dr. Levitov noted,

There is not a single so-called botanical illustration that does not contain some Cathari symbol or Isis symbol. The astrological drawings are likewise easy to deal with. The innumerable stars are representative of the stars in Isis' mantle. The reason it has been so difficult to decipher the Voynich Manuscript is that it is not encrypted at all, but merely written in a special script, and is an adaptation of a polyglot oral tongue into a literary language which would be understandable to people who did not understand Latin and to whom this language could be read. Specifically, a highly polyglot form of medieval Flemish with a large number of Old French and Old High German loan words.

Further, according to Dr. Levitov, the streams of naked women depicted a Cathar sacrament called
endura,
the cutting of a vein in order to bleed to death in a warm bath.

Like Newbold, Brumbaugh, and even Stojko, Dr. Levitov, after years of work, had created a tightly knit logical structure and transcription alphabet to support his case. Although his solution was at first met with some tentatively favorable comments, his methods and conclusions soon came under more harsh scrutiny. His transcribed text did not match details in surviving Cathari records (the existence of which he was seemingly unaware), and the
endura
was almost always a ritual fast at the end of life and not a form of suicide. Dr. Levitov's linguistics was also called into question.

In 1991, in order to promote more serious research, Jim Gillogly, a computer scientist at the Rand Corporation, the California think tank, and Jim Reeds at AT&T Laboratories used the fledgling Internet to form a loosely knit colloquium of other Voynich devotees around the world. Some, like Reeds and Gillogly, had worked with encryption techniques professionally, whereas others were merely dedicated amateurs. The group soon grew into a cyber-study network with members from the United States, Europe, and Asia. “It's very orderly,” observed Dr. Reeds. “Everyone is listened to politely, even the crackpots.”

BOOK: The Friar and the Cipher
7.88Mb size Format: txt, pdf, ePub
ads

Other books

BIOHAZARD by Curran, Tim
Transfigured by Zavora, Ava
The Next Thing on My List by Jill Smolinski
Grace Hardie by Anne Melville
The Living Dead Boy by Frater, Rhiannon
Cera's Place by Elizabeth McKenna
A Little Bit on the Side by John W O' Sullivan
Last Ghost at Gettysburg by Paul Ferrante
A Bid for Love by Rachel Ann Nunes