Dorabella Cipher

Last updated
The Dorabella cipher Dorabella-cipher-image.png
The Dorabella cipher

The Dorabella Cipher is an enciphered letter written by composer Edward Elgar to Dora Penny, which was accompanied by another dated July 14, 1897. Penny never deciphered it and its meaning remains unknown.

Contents

The cipher, consisting of 87 characters spread over 3 lines, appears to be made up from 24 symbols, each symbol consisting of 1, 2, or 3 approximate semicircles oriented in one of 8 directions (the orientation of several characters is ambiguous). A small dot appears after the fifth character on the third line.

Background

Dora Penny (1874–1964) was the daughter of the Reverend Alfred Penny (1845–1935) of Wolverhampton. Dora's mother died in February 1874, six days after giving birth to Dora, after which her father worked for many years as a missionary in Melanesia. In 1895 Dora's father remarried, and Dora's stepmother was a friend of Caroline Alice Elgar. In July 1897 the Penny family invited Edward and Alice Elgar to stay at the Wolverhampton Rectory for a few days.

Edward Elgar was a forty-year-old music teacher who had yet to become a successful composer. Dora Penny was almost seventeen years his junior. Edward and Dora liked one another and remained friends for the rest of the composer's life: Elgar named Variation 10 of his 1899 Variations on an Original Theme (Enigma) Dorabella as a dedication to Dora Penny.

On returning to Great Malvern on 14 July 1897 Alice wrote a letter of thanks to the Penny family. Edward Elgar inserted a note with cryptic writing: he pencilled the name 'Miss Penny' on the reverse. This note lay in a drawer for forty years and became generally known when Dora had it reproduced in her memoir Edward Elgar: Memories of a Variation, published by Methuen Publishing in 1937. Subsequently, the original note was lost.[ citation needed ] Dora claimed that she had never been able to read the note, which she assumed to be a cipher message.

Composer and historian Kevin Jones advanced one view;

Dora's father had just returned from Melanesia where he had been a missionary for many years. Fascinated by local language and culture, he possessed a few traditional talismans decorated with arcane glyphs. Perhaps such an item surfaced as a conversation piece during the Elgars' week in Wolverhampton? And if Dora recalled this when writing her memoirs, it might account for the fact the coded message was referred to as an 'inscription' when communicating with the director of SOAS many years later. [1]

The Dorabella Cipher is not the only document penned by Elgar that contains the approximately semi-circular characters. At a concert in April 1886 (over ten years prior to his letter to Penny), he annotated a concert program with 18 similar characters followed by an underscore. This fragment became known as the "Liszt fragment". The symbols also appear in a 1920s notebook of Elgar, along with diagrams resembling clock faces, and on the so-called "Cryptogram card", which forms part of a series of cards detailing Elgar's solution to a cryptographic challenge set in Pall Mall magazine in 1896. [2]

Proposed solutions

Eric Sams, the musicologist, produced an interpretation in 1970. [3] His interpretation of the message is:

STARTS: LARKS! IT'S CHAOTIC, BUT A CLOAK OBSCURES MY NEW LETTERS, A, B [alpha, beta, ie Greek letters or alphabet] BELOW: I OWN THE DARK MAKES E. E. SIGH WHEN YOU ARE TOO LONG GONE.

The length of this text is 109 letters (ignoring the parenthetic note on Greek), whereas the original text contains only 87 or 88 characters: Sams claimed the surplus letters are implied by phonetic shorthand.

Javier Atance has suggested that the solution is not a text but a melody, the 8 different positions of the semicircles, turning clockwise, corresponding to the notes of the scale, and that each semicircle has 3 different levels corresponding to natural, flat or sharp notes.

Tim S. Roberts claims a solution via a simple substitution cipher and offers a statistical justification: [4] [5]

P.S. Now droop beige weeds set in it – pure idiocy – one entire bed! Luigi Ccibunud luv’ngly tuned liuto studo two.

In December 2011 Canadian cryptographer enthusiast Richard Henderson claimed [6] to have found the correct clear text, encoded once again as a simple substitution cipher (with two letters as nulls), although some details remain to be worked out. His solution would read:

whY AM I VERY SAD, BELLE. I SAG AS WE SEE ROSES DO. E.E. IS EVER FOND OF U, DORA. I kNOw I PeN ONE I LOVe. All Of My Affection.

In July 2020, Wayne Packwood claimed in the journal Musical Opinion to have produced a complete decryption: [7]

A WOMAN IS LIKE CHESS ONE HAS TO MAKE MANY SACRIFICES FOR ITS QUEEN IT IS VICTORY SHE COMMANDS NOT DO BETTER

The secondary message below was identified as the word RATS, which Packwood believed was a playful acknowledgement from Sir Edward to the individual that broke his cipher. Packwood's method involved rearranging the cipher based on the position of several dots, which Packwood identified as representing a conductor's baton, and then arbitrarily shifting the presumed values of each glyph independently until a message emerged. The logic behind the pattern of shifts is not explained. [7]

In a 2023 study, Viktor Wase applied cipher-solving computer algorithms to the Dorabella cipher and discovered that it is unlikely to be a monoalphabetic substitution cipher in English or Latin. This was done by showing that these algorithms can solve ciphers that are as short as Dorabella, yet they fail to solve the Dorabella cipher. [8]

2007 Elgar Society Competition

The Elgar Society advertised a Dorabella Cipher Competition in 2007 to mark the 150th anniversary of Elgar's birth. A number of entries were received but none were found to be satisfactory: "One or two entries did contain some impressively ambitious and thoughtful analysis. These entries, though, having matched Elgar's symbols to the alphabet, invariably ended up with a fairly arbitrary sequence of letters. ... [T]he results read as a disconnected chain of bizarre utterances, such as an imaginative mind could conjure up from any group of random letters". [9]

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Type B Cipher Machine</span> Japanese diplomatic code named Purple by the US

In the history of cryptography, the "System 97 Typewriter for European Characters" or "Type B Cipher Machine", codenamed Purple by the United States, was an encryption machine used by the Japanese Foreign Office from February 1939 to the end of World War II. The machine was an electromechanical device that used stepping-switches to encrypt the most sensitive diplomatic traffic. All messages were written in the 26-letter English alphabet, which was commonly used for telegraphy. Any Japanese text had to be transliterated or coded. The 26-letters were separated using a plug board into two groups, of six and twenty letters respectively. The letters in the sixes group were scrambled using a 6 × 25 substitution table, while letters in the twenties group were more thoroughly scrambled using three successive 20 × 25 substitution tables.

<span class="mw-page-title-main">Cryptogram</span> Puzzle

A cryptogram is a type of puzzle that consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough that the cryptogram can be solved by hand. Substitution ciphers where each letter is replaced by a different letter or number are frequently used. To solve the puzzle, one must recover the original lettering. Though once used in more serious applications, they are now mainly printed for entertainment in newspapers and magazines.

<i>Enigma Variations</i> Musical composition by Edward Elgar

Edward Elgar composed his Variations on an Original Theme, Op. 36, popularly known as the Enigma Variations, between October 1898 and February 1899. It is an orchestral work comprising fourteen variations on an original theme.

<span class="mw-page-title-main">Frequency analysis</span> Study of the frequency of letters or groups of letters in a ciphertext

In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.

<span class="mw-page-title-main">Playfair cipher</span> Early block substitution cipher

The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair for promoting its use.

<span class="mw-page-title-main">Beale ciphers</span> A set of three ciphertexts

The Beale ciphers are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated to be worth over 43 Million US dollars as of January 2018. Comprising three ciphertexts, the first (unsolved) text describes the location, the second (solved) ciphertext accounts the content of the treasure, and the third (unsolved) lists the names of the treasure's owners and their next of kin.

<span class="mw-page-title-main">Pigpen cipher</span> Type of substitution cipher

The pigpen cipher is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

The Two-square cipher, also called double Playfair, is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four-square cipher while still being slightly stronger than the single-square Playfair cipher.

<span class="mw-page-title-main">Alberti cipher</span> Polyalphabetic substitution encryption and decryption system

The Alberti Cipher, created in 1467 by Italian architect Leon Battista Alberti, was one of the first polyalphabetic ciphers. In the opening pages of his treatise De componendis cifris he explained how his conversation with the papal secretary Leonardo Dati about a recently developed movable type printing press led to the development of his cipher wheel.

<span class="mw-page-title-main">Giovan Battista Bellaso</span>

Giovan Battista Bellaso was an Italian cryptologist.

The cipher system that the Uesugi are said to have used is a simple substitution usually known as a Polybius square or "checkerboard." The i-ro-ha alphabet contains forty-eight letters, so a seven-by-seven square is used, with one of the cells left blank. The rows and columns are labeled with a number or a letter. In the table below, the numbers start in the top left, as does the i-ro-ha alphabet. In practice these could start in any corner.

A musical cryptogram is a cryptogrammatic sequence of musical symbols which can be taken to refer to an extra-musical text by some 'logical' relationship, usually between note names and letters. The most common and best known examples result from composers using musically translated versions of their own or their friends' names as themes or motifs in their compositions. These are not really rigorous cipher algorithms in the formal sense, but more like musical monograms. The methods used historically by composers were either too incomplete or too simplistic to meaningfully encrypt long text messages. There is a separate history of music ciphers utilizing music notation to encode messages for reasons of espionage or personal security that involved encryption and/or steganography.

ʻAfīf al-Dīn ʻAlī ibn ʻAdlān al-Mawsilī, born in Mosul, was an Arab cryptologist, linguist and poet who is known for his early contributions to cryptanalysis, to which he dedicated at least two books. He was also involved in literature and poetry, and taught on the Arabic language at the Al-Salihiyya Mosque of Cairo.

Enigma Variations (My Friends Pictured Within) is a one-act ballet by Frederick Ashton, to the music of the Variations on an Original Theme (Enigma Variations), Op. 36, by Edward Elgar. The work was first given by the Royal Ballet at the Royal Opera House, Covent Garden, London, on 25 October 1968. It has been revived in every subsequent decade.

Unsolved! The History and Mystery of the World’s Greatest Ciphers from Ancient Egypt to Online Secret Societies is a 2017 book by American mathematician and cryptologist Craig P. Bauer. The book explores the history and challenges of various unsolved ciphers, ranging from ancient scripts to modern codes and puzzles. The book also invites readers to try their hand at cracking the ciphers, offering clues and hints along the way. The book received positive reviews from critics and readers, who praised its engaging style, comprehensive coverage, and intriguing content.

<span class="mw-page-title-main">Music cipher</span> Musical algorithm for encrypting and decrypting information

In cryptography, a music cipher is an algorithm for the encryption of a plaintext into musical symbols or sounds. Music-based ciphers are related to, but not the same as musical cryptograms. The latter were systems used by composers to create musical themes or motifs to represent names based on similarities between letters of the alphabet and musical note names, such as the BACH motif. Whereas music ciphers were systems typically used by cryptographers to hide or encode messages for reasons of secrecy or espionage.

References

  1. "BBC – Proms – The Dorabella Code". Archived from the original on 2012-03-16. Retrieved 2009-11-10.
  2. Bauer, Craig (2017). Unsolved! The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies. Princeton University Press. p. 127. ISBN   978-0691167671.
  3. Eric Sams (1970). "Elgar's Cipher Letter to Dorabella". The Musical Times . 111 (1524): 151–154. doi:10.2307/956733. ISSN   0027-4666. JSTOR   956733. Wikidata   Q115626069.
  4. "Archived copy" (PDF). Archived from the original (PDF) on 2013-05-09. Retrieved 2012-06-19.{{cite web}}: CS1 maint: archived copy as title (link)
  5. "Archived copy" (PDF). Archived from the original (PDF) on 2012-03-13. Retrieved 2011-12-29.{{cite web}}: CS1 maint: archived copy as title (link)
  6. Henderson, Richard. "Dorabella Solved". Ancient Cryptography. Archived from the original on 17 March 2012. Retrieved 19 December 2011.
  7. 1 2 Packwood, Wayne (2020). "Elgar as cryptographer – Tuning and Turing". Musical Opinion. Vol. 143. pp. 34–37. ProQuest   2423815327.
  8. Wase, Viktor (2023-11-20). "Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher". Cryptologia: 1–10. doi:10.1080/01611194.2023.2271466. ISSN   0161-1194.
  9. No longer on Elgar.org: archival copy at "Intro to the Cipher". Archived from the original on 2011-07-07. Retrieved 2010-02-08.