Cardan grille

Last updated

The Cardan grille is a method of writing secret messages using a grid.

Contents

History

This technique was used in ancient China. [1] [ additional citation(s) needed ]

In 1550, Girolamo Cardano (1501–1576), known in French as Jérôme Cardan, proposed a simple grid for writing hidden messages. He intended to cloak his messages inside an ordinary letter so that the whole would not appear to be a cipher at all.

Such a disguised message is considered to be an example of steganography, which is a sub-branch of general cryptography. But the name Cardan was applied to grilles that may not have been Cardan's invention, and, so, Cardan is a generic name for cardboard grille ciphers.

Cardinal Richelieu (1585–1642) was reputed to be fond of the Cardan grille and to have used it in both private and diplomatic correspondence. Educated men in 17th century Europe were familiar with word games in literature, including acrostics, anagrams, and ciphers.

Although the original Cardan grilles were little used by the end of the 17th century, they still appeared occasionally in the form of masked letters and as literary curiosities. George Gordon Byron, for example, claimed to have written Cardan-grille verse – but as a demonstration of verbal skill rather than a serious cipher.[ citation needed ]

Alternative grilles possess apertures for single letters only and can be used quickly. Messages are filled out with a jumble of letters or numbers and are clearly cryptograms whereas Cardano intended to create steganograms.

These single-letter grilles may be named after Cardano, but they are also called simply cardboard ciphers.

A further variation is a turning grille or trellis, based on the chess board, which was used in the latter 16th century.

The turning grille reappeared in a more sophisticated form at the end of the 19th century; but, by this time, any connection with Cardano was in name alone.

Construction

A Cardan grille has no fixed pattern CardanGrille.png
A Cardan grille has no fixed pattern

A Cardan grille is made from a sheet of fairly rigid paper or parchment, or from thin metal. The paper is ruled to represent lines of handwriting and rectangular areas are cut out at arbitrary intervals between these lines.

An encipherer places the grille on a sheet of paper and writes his message in the rectangular apertures, some of which might allow a single letter, a syllable, or a whole word. Then, removing the grille, the fragments are filled out to create a note or letter that disguises the true message. Cardano suggested drafting the text three times in order to smooth any irregularities that might indicate the hidden words.

The recipient of the message must possess an identical grille. Copies of grilles are cut from an original template, but many different patterns could be made for one-to-one correspondence.

The grille can be placed in four positions – face up and face down, upright and reversed – which increases the number of possible cell positions fourfold.

Four positions of the grille. 4Positions.svg
Four positions of the grille.

In practice it can be difficult to construct an innocent message around a hidden text. Stilted language draws attention to itself and the purpose of the Cardan grille is to create a message “without suspicion”[ citation needed ] in the words of Francis Bacon. But the task was easier for Cardano, because 16th century spelling was not standardised and left much room for contractions and adornments of penmanship.

Detection of messages

When executed badly, a Cardan message stands out because of stilted language and uneven writing. An analyst may attempt to reconstruct the grille when there are several examples of suspect messages from a correspondent.

When executed well, a Cardan message can be difficult to spot. Even when an analyst suspects the presence of a message, an innocent letter can contain apparently hidden text. So, in practice, the only solution is to obtain the grille itself.

Disadvantages

The method is slow and requires literary skill. Above all, any physical cipher device is subject to loss, theft and seizure; so to lose one grille is to lose all secret correspondence constructed with that grille. Possession of a grille may be incriminating.

The Cardan grille, in its original form, is of more literary than cryptographic interest. For example, controversy surrounds the Voynich manuscript which could be a 16th-century fake cipher text, possibly constructed with a Cardan grille which was used to generate pseudo-random nonsense from a pre-existing text. [2]

See also

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Caesar cipher</span> Simple and widely known encryption technique

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">Cryptogram</span> Puzzle

A cryptogram is a type of puzzle that consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough that the cryptogram can be solved by hand. Substitution ciphers where each letter is replaced by a different letter or number are frequently used. To solve the puzzle, one must recover the original lettering. Though once used in more serious applications, they are now mainly printed for entertainment in newspapers and magazines.

<span class="mw-page-title-main">Frequency analysis</span> Study of the frequency of letters or groups of letters in a ciphertext

In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.

<span class="mw-page-title-main">Playfair cipher</span> Early block substitution cipher

The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair for promoting its use.

A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext.

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

<span class="mw-page-title-main">Polybius square</span> Type of code

The Polybius square, also known as the Polybius checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius. The device is used for fractionating plaintext characters so that they can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire signalling, allowing for the coded transmission of any message, not just a finite number of predetermined options as was the convention before.

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

<span class="mw-page-title-main">Pigpen cipher</span> Type of substitution cipher

The pigpen cipher is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

<span class="mw-page-title-main">Bacon's cipher</span> Steganography method

Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content. Baconian ciphers are categorized as both a substitution cipher and a concealment cipher.

<span class="mw-page-title-main">Tradecraft</span> Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern espionage (spying) and generally as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

In the history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet. The earliest known description is due to Jacopo Silvestri in 1526. His proposal was for a rectangular stencil allowing single letters, syllables, or words to be written, then later read, through its various apertures. The written fragments of the plaintext could be further disguised by filling the gaps between the fragments with anodyne words or letters. This variant is also an example of steganography, as are many of the grille ciphers.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

References

  1. Fabien A. P. Petitcolas and Stefan Katzenbeisser. Information Hiding Techniques for Steganography and Digital Watermarking. 2000.
  2. Nature news article: World's most mysterious book may be a hoax (2003), a summary of Gordon Rugg's paper