Complete Essays, Literary Criticism, Cryptography, Autography, Translations & Letters. Эдгар Аллан По

Чтение книги онлайн.

Читать онлайн книгу Complete Essays, Literary Criticism, Cryptography, Autography, Translations & Letters - Эдгар Аллан По страница 25

Complete Essays, Literary Criticism, Cryptography, Autography, Translations & Letters - Эдгар Аллан По

Скачать книгу

us a note, in the same manner as here proposed; and the key-phrase may be either in French, Italian, Spanish, German, Latin, or Greek, (or in any of the dialects of these languages,) and we pledge ourselves for the solution of the riddle.”

      This challenge has elicited but a single response, which is embraced in the following letter. The only quarrel we have with the epistle, is that its writer has declined giving us his name in full. We beg that he will take an early opportunity of doing this, and thus relieve us of the chance of that suspicion which was attached to the cryptography of the weekly journal above-mentioned — the suspicion of inditing ciphers to ourselves. The postmark of the letter is Stonington, Conn.

      S———————, CT., APRIL 21, 1841.

      To the Editor of Graham’s Magazine.

      SIR: — In the April number of your magazine, while reviewing the translation by Mr. Walsh of “Sketches of Conspicuous Living Characters of France,” you invite your readers to address you a note in cipher, “the key phrase to which may be either in French, Italian, Spanish, German, Latin or Greek,” and pledge yourself for its solution. My attention being called, by your remarks, to this species of cipher-writing, I composed for my own amusement the following exercises, in the first part of which the key-phrase is in English — in the second in Latin. As I did not see, (by the number for May,) that any of your correspondents had availed himself of your offer, I take the liberty to send the enclosed, on which, if you should think it worth your while, you can exercise your ingenuity.

      I am yours, respectfully,

      S. D. L.

      No. 1.

      Cauhiif aud frd sdftirf ithot tacd wdde rdchfdr tiu fuacfshffheo fdoudf hetmsafhie tuis ied herhchriai fi aeiftdu wn sdaef it iuhfheo hiidohwid wn aen deodsf ths tiu itis hf iaf iuhoheaiin rdff hedr; aer ftd auf it ftif fdoudfin oissiehoafheo hefdiihodeod taf wdde odeduaiin fdusdr ounsfiouastn. Saen fsdohdf it fdoudf ihufheo idud weiie fi ftd aeohdeff; fisdfhsdf, A fiacdf tdar ief ftacdr aer ftd ouiie iuhff de isie ihft fisd herd hwid oiiiuheo tiihr, atfdu ithot tahu wdheo sdushffdr fi ouii aoahe, hetiusafhie oiiir wd fuaefshffdr ihft ihffid raeoeu ft af rhfoicdun iiiir hefid iefhi ftd aswiiafiun dshffid fatdin udaotdr hff rdffheafhil. Ounsfiouastn tiidcdu siud suisduin dswuaodf ftifd sirdf it iuhfheo ithot aud uderdudr idohwid iein wn sdaef it fied desiaeafiun wdn ithot sawdf weiie ftd udai fhoehthoafhie it ftd onstduf dssiindr fi hff siffdffiu.

      No. 2.

      Ofoiioiiaso ortsiii sov eodisoioe afduiostifoi ft iftvi si tri oistoiv oiniafetsorit ifeov rsri inotiiiiv ridiiot, irio rivvio eovit atrotfetsoria aioriti iitri tf oitovin tri aetifei ioreitit sov usttoi oioittstifo dfti afdooitior trso ifeov tri dfit otftfeov softriedi ft oistoiv oriofiforiti suitteii viireiiitifoi ft tri iarfoisiti, iiti trir net otiiiotiv uitfti rid io tri eoviieeiiiv rfasueostr tf rii dftrit tfoeei.

      In the solution of the first of these ciphers we had little more than ordinary trouble. The second proved to be exceedingly difficult, and it was only by calling every faculty into play that we could read it at all. The first runs thus.

      “Various are the methods which have been devised for transmitting secret information from one individual to another, by means of writing, illegible to any except him for whom it was originally designed; and the art of thus secretly communicating intelligence has been generally termed cryptography. Many species of secret writing were known to the ancients. Sometimes a slave’s head was shaved, and the crown written upon with some indelible coloring fluid; after which the hair being permitted to grow again, information could be transmitted with little danger that discovery would ensue until the ambulatory epistle safely reached its destination. Cryptography, however, pure, properly embraces those modes of writing which are rendered legible only by means of some explanatory key which makes known the real signification of the ciphers employed to its possessor.”

      The key-phrase of this cryptograph is — “A word to the wise is sufficient.”

      The second is thus translated —

      “Nonsensical phrases and unmeaning combinations of words, as the learned lexicographer would have confessed himself, when hidden under cryptographic ciphers, serve to perpdex the curious enquirer, and baffle penetration more completely than would the most profound apothems of learned philosophers. Abstruse disquisitions of the scholiasts, were they but presented before him in the undisguised vocabulary of his mother tongue ——”

      The last sentence here (as will be seen) is broken off short. The spelling we have strictly adhered to. D, by mistake, has been put for l in perplex.

      The key-phrase is — “Suaviter in modo, fortiter in re.”

      In the ordinary cryptograph, as will be seen in reference to most of those we have specified above, the artificial alphabet agreed upon by the correspondents, is employed, letter for letter, in place of the usual or natural one. For example: — two parties wish to communicate secretly. It is arranged before parting that

      ) shall stand for a

       ( ———— “ b

       — ———— “ c

       * ———— “ d

       . ———— “ e

       ’ ———— “ f

       ; ———— “ g

       : ———— “ h

       ? ———— “ i or j

       ! ———— “ k

       & ———— “ l

       0 ———— “ m

       ‘ ———— “ n

       † ———— “ o

       ‡ ———— “ p

       ¶ ———— “ q

       ☞ ———— “ r

       ] ———— “ s

       [ ———— “ t

       £ shall stand for u or v

       $ ———— “ w

       ¿ ———— “ x

       ¡ ———— “ y

       ☜ ———— “ z

      Now the following note is to be communicated —

      “We must see you immediately upon a matter of great importance. Plots have been discovered, and the conspirators are in our hands. Hasten!”

      These words would be written thus —

      $ 0 . £ ] [ ] . . ¡ † £ ¿ 0 0 . * ¿ ) [ . & ¡ £ ‡ † ‘ ) 0 ) [ [ . ☞ † ’; ☞ . ) [ ? 0 ‡ † ☞ [ ) ‘ — . ‡ & † [ ] : ) £ . ( . . ‘ * . ] — † £ . ☞ . * ) ‘ * — † ‘ ] ‡ ? ☞ ) [ † ☞ ] ) ☞ ? ? ‘ † £ ☞ : ) ‘ * ] : ) ] [ . ‘

      This certainly has an intricate appearance, and would prove a most difficult cipher to any one not conversant with cryptography. But it

Скачать книгу