fbpx
Wikipedia

Bacon's cipher

Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605.[1][2][3] A message is concealed in the presentation of text, rather than its content. Baconian ciphers are categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces).

Image of Bacon's cipher.

Cipher details edit

To encode a message, each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'. This replacement is a 5-bit binary encoding and is done according to the alphabet of the Baconian cipher (from the Latin Alphabet), shown below:

Letter Code Binary
A aaaaa 00000
B aaaab 00001
C aaaba 00010
D aaabb 00011
E aabaa 00100
F aabab 00101
G aabba 00110
H aabbb 00111
I, J abaaa 01000
K abaab 01001
L ababa 01010
M ababb 01011
Letter Code Binary
N abbaa 01100
O abbab 01101
P abbba 01110
Q abbbb 01111
R baaaa 10000
S baaab 10001
T baaba 10010
U, V baabb 10011
W babaa 10100
X babab 10101
Y babba 10110
Z babbb 10111

A second version of Bacon's cipher uses a unique code for each letter. In other words, I, J, U and V each have their own pattern in this variant:

Letter Code Binary
A aaaaa 00000
B aaaab 00001
C aaaba 00010
D aaabb 00011
E aabaa 00100
F aabab 00101
G aabba 00110
H aabbb 00111
I abaaa 01000
J abaab 01001
K ababa 01010
L ababb 01011
M abbaa 01100
Letter Code Binary
N abbab 01101
O abbba 01110
P abbbb 01111
Q baaaa 10000
R baaab 10001
S baaba 10010
T baabb 10011
U babaa 10100
V babab 10101
W babba 10110
X babbb 10111
Y bbaaa 11000
Z bbaab 11001

The writer must make use of two different typefaces for this cipher. After preparing a false message with the same number of letters as all of the As and Bs in the real, secret message, two typefaces are chosen, one to represent As and the other Bs. Then each letter of the false message must be presented in the appropriate typeface, according to whether it stands for an A or a B.[4]

To decode the message, the reverse method is applied. Each "typeface 1" letter in the false message is replaced with an A and each "typeface 2" letter is replaced with a B. The Baconian alphabet is then used to recover the original message.

Any method of writing the message that allows two distinct representations for each character can be used for the Bacon Cipher. Bacon himself prepared a Biliteral Alphabet[5] for handwritten capital and small letters with each having two alternative forms, one to be used as A and the other as B. This was published as an illustrated plate in his De Augmentis Scientiarum (The Advancement of Learning).

Because any message of the right length can be used to carry the encoding, the secret message is effectively hidden in plain sight. The false message can be on any topic and thus can distract a person seeking to find the real message.

Baconian cipher example edit

The word 'steganography', encoded with quotation marks, where standard text represents "typeface 1" and text in boldface represents "typeface 2":

To encode a message each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'.

The pattern of standard and boldface letters is:

ba aabbaa b aaabaaa abba aaaaaa bb aaa bbabaabba ba aaaaaaaa ab b baaab bb babb ab baa abbaabb 'b' bb 'b'.

This decodes in groups of five as

baaab(S) baaba(T) aabaa(E) aabba(G) aaaaa(A) abbaa(N) abbab(O) aabba(G) baaaa(R) aaaaa(A) abbba(P) aabbb(H) babba(Y) bbaaa bbaab bbbbb

where the last three groups, being unintelligible, are assumed not to form part of the message.

Bacon and Shakespeare edit

Some proponents of the Baconian theory of Shakespeare authorship, such as Elizabeth Wells Gallup, have claimed that Bacon used the cipher to encode messages revealing his authorship in the First Folio. However, American cryptologists William and Elizebeth Friedman refuted the claims that the works of Shakespeare contain hidden ciphers that disclose Bacon's or any other candidate's secret authorship in their The Shakespeare Ciphers Examined (1957). Typographical analysis of the First Folio shows that a large number of typefaces were used, instead of the two required for the cipher, and that printing practices of the time would have made it impossible to transmit a message accurately.[6]

The Friedmans' tombstone included a message in Bacon's cypher not spotted for many years.[7]

See also edit

  • Baudot, a set of 5-bit codes for the English alphabet, used world-wide for teleprinter communications during most of the 20th century.
  • Null Cipher, a related cipher.

References edit

  1. ^ Bacon, Francis (1605). The Proficience and Advancement of Learning Divine and Humane.
  2. ^ Bacon, Francis (1640). Of the Advancement and Proficience of Learning. Translated by Wats, Gilbert. Oxford University. pp. 257–271.
  3. ^ Dupuy, Jr., Paul J. "The Advancement of Learning". An Authorship Analysis – Francis Bacon as Shake-speare. London: Shake-n-Bacon. Chapter 1. from the original on 2017-03-18. Retrieved 2017-03-18.
  4. ^ Helen Fouché Gaines, Cryptanalysis: a Study of Ciphers and Their Solutions (1989), page 6]
  5. ^ Biliteral can mean: "written in two different scripts", Oxford English Dictionary
  6. ^ Kahn, David (1996). The Code-breakers (2nd ed.). New York: Scribner. pp. 882–888. ISBN 0-684-83130-9.
  7. ^ Dunin, Elonka (17 April 2017). "Cipher on the William and Elizebeth Friedman tombstone at Arlington National Cemetery is solved" (PDF). Elonka.com.

Further reading edit

External links edit

  • How to Make Anything Signify Anything

bacon, cipher, baconian, cipher, method, steganographic, message, encoding, devised, francis, bacon, 1605, message, concealed, presentation, text, rather, than, content, baconian, ciphers, categorized, both, substitution, cipher, plain, code, concealment, ciph. Bacon s cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605 1 2 3 A message is concealed in the presentation of text rather than its content Baconian ciphers are categorized as both a substitution cipher in plain code and a concealment cipher using the two typefaces Image of Bacon s cipher Contents 1 Cipher details 2 Baconian cipher example 3 Bacon and Shakespeare 4 See also 5 References 6 Further reading 7 External linksCipher details editTo encode a message each letter of the plaintext is replaced by a group of five of the letters A or B This replacement is a 5 bit binary encoding and is done according to the alphabet of the Baconian cipher from the Latin Alphabet shown below Letter Code BinaryA aaaaa 00000B aaaab 00001C aaaba 00010D aaabb 00011E aabaa 00100F aabab 00101G aabba 00110H aabbb 00111I J abaaa 01000K abaab 01001L ababa 01010M ababb 01011 Letter Code BinaryN abbaa 01100O abbab 01101P abbba 01110Q abbbb 01111R baaaa 10000S baaab 10001T baaba 10010U V baabb 10011W babaa 10100X babab 10101Y babba 10110Z babbb 10111A second version of Bacon s cipher uses a unique code for each letter In other words I J U and V each have their own pattern in this variant Letter Code BinaryA aaaaa 00000B aaaab 00001C aaaba 00010D aaabb 00011E aabaa 00100F aabab 00101G aabba 00110H aabbb 00111I abaaa 01000J abaab 01001K ababa 01010L ababb 01011M abbaa 01100 Letter Code BinaryN abbab 01101O abbba 01110P abbbb 01111Q baaaa 10000R baaab 10001S baaba 10010T baabb 10011U babaa 10100V babab 10101W babba 10110X babbb 10111Y bbaaa 11000Z bbaab 11001The writer must make use of two different typefaces for this cipher After preparing a false message with the same number of letters as all of the As and Bs in the real secret message two typefaces are chosen one to represent As and the other Bs Then each letter of the false message must be presented in the appropriate typeface according to whether it stands for an A or a B 4 To decode the message the reverse method is applied Each typeface 1 letter in the false message is replaced with an A and each typeface 2 letter is replaced with a B The Baconian alphabet is then used to recover the original message Any method of writing the message that allows two distinct representations for each character can be used for the Bacon Cipher Bacon himself prepared a Biliteral Alphabet 5 for handwritten capital and small letters with each having two alternative forms one to be used as A and the other as B This was published as an illustrated plate in his De Augmentis Scientiarum The Advancement of Learning Because any message of the right length can be used to carry the encoding the secret message is effectively hidden in plain sight The false message can be on any topic and thus can distract a person seeking to find the real message Baconian cipher example editThe word steganography encoded with quotation marks where standard text represents typeface 1 and text in boldface represents typeface 2 To encode a message each letter of the plaintext is replaced by a group of five of the letters A or B The pattern of standard and boldface letters is ba aabbaa b aaabaaa abba aaaaaa bb aaa bbabaabba ba aaaaaaaa ab b baaab bb babb ab baa abbaabb b bb b This decodes in groups of five as baaab S baaba T aabaa E aabba G aaaaa A abbaa N abbab O aabba G baaaa R aaaaa A abbba P aabbb H babba Y bbaaa bbaab bbbbb where the last three groups being unintelligible are assumed not to form part of the message Bacon and Shakespeare editSome proponents of the Baconian theory of Shakespeare authorship such as Elizabeth Wells Gallup have claimed that Bacon used the cipher to encode messages revealing his authorship in the First Folio However American cryptologists William and Elizebeth Friedman refuted the claims that the works of Shakespeare contain hidden ciphers that disclose Bacon s or any other candidate s secret authorship in their The Shakespeare Ciphers Examined 1957 Typographical analysis of the First Folio shows that a large number of typefaces were used instead of the two required for the cipher and that printing practices of the time would have made it impossible to transmit a message accurately 6 The Friedmans tombstone included a message in Bacon s cypher not spotted for many years 7 See also editBaudot a set of 5 bit codes for the English alphabet used world wide for teleprinter communications during most of the 20th century Null Cipher a related cipher References edit Bacon Francis 1605 The Proficience and Advancement of Learning Divine and Humane Bacon Francis 1640 Of the Advancement and Proficience of Learning Translated by Wats Gilbert Oxford University pp 257 271 Dupuy Jr Paul J The Advancement of Learning An Authorship Analysis Francis Bacon as Shake speare London Shake n Bacon Chapter 1 Archived from the original on 2017 03 18 Retrieved 2017 03 18 Helen Fouche Gaines Cryptanalysis a Study of Ciphers and Their Solutions 1989 page 6 Biliteral can mean written in two different scripts Oxford English Dictionary Kahn David 1996 The Code breakers 2nd ed New York Scribner pp 882 888 ISBN 0 684 83130 9 Dunin Elonka 17 April 2017 Cipher on the William and Elizebeth Friedman tombstone at Arlington National Cemetery is solved PDF Elonka com Further reading editWilliam Friedman and Elizebeth Friedman The Shakespearean Ciphers Examined Cambridge University Press 1957External links editHow to Make Anything Signify Anything Retrieved from https en wikipedia org w index php title Bacon 27s cipher amp oldid 1212191565, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.