HOME

TheInfoList



OR:

Bacon's cipher or the Baconian cipher is a method of
steganographic Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
message encoding devised by
Francis Bacon Francis Bacon, 1st Viscount St Alban (; 22 January 1561 – 9 April 1626), also known as Lord Verulam, was an English philosopher and statesman who served as Attorney General and Lord Chancellor of England. Bacon led the advancement of both ...
in 1605. A message is concealed in the presentation of text, rather than its content.


Cipher details

To encode a message, each letter of the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is replaced by a group of five of the letters 'A' or 'B'. This replacement is a 5-bit
binary Binary may refer to: Science and technology Mathematics * Binary number, a representation of numbers using only two digits (0 and 1) * Binary function, a function that takes two arguments * Binary operation, a mathematical operation that t ...
encoding and is done according to the alphabet of the Baconian cipher (from the Latin Alphabet), shown below: A second version of Bacon's cipher uses a unique code for each letter. In other words, ''I'', ''J'', ''U'' and ''V'' each have their own pattern in this variant: The writer must make use of two different
typeface A typeface (or font family) is the design of lettering that can include variations in size, weight (e.g. bold), slope (e.g. italic), width (e.g. condensed), and so on. Each of these variations of the typeface is a font. There are thousands ...
s for this cipher. After preparing a false message with the same number of letters as all of the ''As'' and ''Bs'' in the real, secret message, two typefaces are chosen, one to represent ''As'' and the other ''Bs''. Then each letter of the false message must be presented in the appropriate typeface, according to whether it stands for an ''A'' or a ''B''. To decode the message, the reverse method is applied. Each "typeface 1" letter in the false message is replaced with an ''A'' and each "typeface 2" letter is replaced with a ''B''. The Baconian alphabet is then used to recover the original message. Any method of writing the message that allows two distinct representations for each character can be used for the Bacon Cipher. Bacon himself prepared a ''Biliteral Alphabet'' for handwritten capital and small letters with each having two alternative forms, one to be used as ''A'' and the other as ''B''. This was published as an illustrated plate in his ''De Augmentis Scientiarum'' (The Advancement of Learning). Because any message of the right length can be used to carry the encoding, the secret message is effectively hidden in plain sight. The false message can be on any topic and thus can distract a person seeking to find the real message.


Baconian cipher example

The word 'steganography', encoded with quotation marks, where standard text represents "typeface 1" and text in boldface represents "typeface 2": The pattern of standard and boldface letters is: This decodes in groups of five as where the last three groups, being unintelligible, are assumed not to form part of the message.


Bacon and Shakespeare

Some proponents of the Baconian theory of Shakespeare authorship, such as Elizabeth Wells Gallup, have claimed that Bacon used the cipher to encode messages revealing his authorship in the
First Folio ''Mr. William Shakespeare's Comedies, Histories, & Tragedies'' is a collection of plays by William Shakespeare, commonly referred to by modern scholars as the First Folio, published in 1623, about seven years after Shakespeare's death. It is cons ...
. However, American cryptologists
William William is a male Male (symbol: ♂) is the sex of an organism that produces the gamete (sex cell) known as sperm, which fuses with the larger female gamete, or ovum, in the process of fertilization. A male organism cannot reproduce sex ...
and Elizebeth Friedman refuted the claims that the works of Shakespeare contain hidden ciphers that disclose Bacon's or any other candidate's secret authorship in their ''The Shakespeare Ciphers Examined'' (1957). Typographical analysis of the First Folio shows that a large number of typefaces were used, instead of the two required for the cipher, and that printing practices of the time would have made it impossible to transmit a message accurately. The Friedmans' tombstone included a message in Bacon's cypher not spotted for many years.


See also

* Baudot, a set of 5-bit codes for the English alphabet, used world-wide for teleprinter communications during most of the 20th century.


References


Further reading

* William Friedman and Elizebeth Friedman, ''The Shakespearean Ciphers Examined'',
Cambridge University Press Cambridge University Press is the university press of the University of Cambridge. Granted letters patent by King Henry VIII in 1534, it is the oldest university press in the world. It is also the King's Printer. Cambridge University Pres ...
, 1957


External links


How to Make Anything Signify Anything

-> {{DEFAULTSORT:Bacon's Cipher
Cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode ...
Steganography Classical ciphers