Great Cipher

Great Cipher

In the history of cryptography, the Great Cipher was a nomenclator cipher developed by the Rossignols, several generations of whom served the French Crown as cryptographers. It was excellent of its class and so was given this name; it was reputed to be unbreakable. And, indeed, after it went out of current use, messages in the French archives (mostly diplomatic, apparently) were entirely unreadable.

Antoine Rossignol's cryptographic skills became known when in 1626 an encrypted letter was taken from a messenger leaving the city of Réalmont, controlled by the Huguenots and surrounded by the French army. The letter told that the Huguenots would not be able to hold onto the city for much longer, and by the end of the day Rossignol had successfully deciphered it. The French returned the letter with the deciphered message, forcing the Huguenots to surrender. He and his son, Bonaventure Rossignol, were soon appointed to prominent roles in the court.

Together, the two devised a code which used 587 different numbers that was so strong it baffled cryptanalysts for centuries until Commandant Étienne Bazeries managed to break the cipher around 1893, realizing that each number stood for a French syllable rather than single letters as traditional codes did. He guessed that a particular sequence of repeated numbers, 124-22-125-46-345, stood for "les ennemis" ("the enemies") and from that information was able to unravel the entire cipher.

In one of the letters appeared a possible solution to the mystery of The Man in the Iron Mask. It concerned a general named Vivien de Bulonde who was to attack the Italian town of Cuneo but instead fled, fearing the arrival of the Austrians, and consequently put in serious danger the success of the entire French campaign in Piedmont. The letter said:

:"His Majesty knows better than any other person the consequences of this act, and he is also aware of how deeply our failure to take the place will prejudice our cause, a failure which must be repaired during the winter. His Majesty desires that you immediately arrest General Bulonde and cause him to be conducted to the fortress of Pignerole, where he will be locked in a cell under guard at night, and permitted to walk the battlement during the day with a mask."

References

* Singh, Simon. "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography." New York: Anchor Books, 1999. ISBN 0-385-49532-3


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Cipher (album) — Cipher Studio album by The Alpha Conspiracy Released 2001 …   Wikipedia

  • Cipher Manuscripts — Main article: Hermetic Order of the Golden Dawn The Cipher Manuscripts are a collection of 60 folios containing the structural outline of a series of magical initiation rituals corresponding to the spiritual elements of Earth, Air, Water and Fire …   Wikipedia

  • Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… …   Wikipedia

  • Classical cipher — A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical cipher is a type of cipher that was used… …   Wikipedia

  • Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… …   Wikipedia

  • Caesar cipher — The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the p …   Wikipedia

  • Hill cipher — Hill s cipher machine, from figure 4 of the patent In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was… …   Wikipedia

  • Book cipher — A book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden… …   Wikipedia

  • Pigpen cipher — The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram.[1] The pigpen cipher (sometimes referred to as the masonic cipher, Freemason s cipher, Rosicrucian cipher, or Tic tac toe cipher) …   Wikipedia

  • Dorabella Cipher — The text of the Dorabella Cipher, in Elgar s handwriting The Dorabella Cipher is an enciphered letter written by Edward Elgar to Miss Dora Penny, which was accompanied by another dated July 14, 1897. Penny was never able to decipher it and its… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”