Recent from talks
Nothing was collected or created yet.
Bacon's cipher
View on Wikipedia
Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605.[1][2][3] In steganography, a message is concealed in the presentation of text, rather than its content. Baconian ciphers are categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces).
Cipher details
[edit]To encode a message, each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'. This replacement is a 5-bit binary encoding and is done according to the alphabet of the Baconian cipher (from the Latin Alphabet), shown below:
|
|
A second version of Bacon's cipher uses a unique code for each letter. In other words, I, J, U and V each have their own pattern in this variant:
|
|
The writer must make use of two different typefaces for this cipher. After preparing a false message with the same number of letters as all of the As and Bs in the real, secret message, two typefaces are chosen, one to represent As and the other Bs. Then each letter of the false message must be presented in the appropriate typeface, according to whether it stands for an A or a B.[4]
To decode the message, the reverse method is applied. Each "typeface 1" letter in the false message is replaced with an A and each "typeface 2" letter is replaced with a B. The Baconian alphabet is then used to recover the original message.
Any method of writing the message that allows two distinct representations for each character can be used for the Bacon Cipher. Bacon himself prepared a Biliteral Alphabet[5] for handwritten capital and small letters with each having two alternative forms, one to be used as A and the other as B. This was published as an illustrated plate in his De Augmentis Scientiarum (The Advancement of Learning).
Because any message of the right length can be used to carry the encoding, the secret message is effectively hidden in plain sight. The false message can be on any topic and thus can distract a person seeking to find the real message.
Baconian cipher example
[edit]The word 'steganography', encoded with quotation marks, where standard text represents "typeface 1" and text in boldface represents "typeface 2":
To encode a message each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'.
The pattern of standard and boldface letters is:
ba aabbaa b aaabaaa abba aaaaaa bb aaa bbabaabba ba aaaaaaaa ab b baaab bb babb ab baa abbaabb 'b' bb 'b'.
This decodes in groups of five as
baaab(S) baaba(T) aabaa(E) aabba(G) aaaaa(A) abbaa(N) abbab(O) aabba(G) baaaa(R) aaaaa(A) abbba(P) aabbb(H) babba(Y) bbaaa bbaab bbbbb
where the last three groups, being unintelligible, are assumed not to form part of the message.
Bacon and Shakespeare
[edit]Some proponents of the Baconian theory of Shakespeare authorship, such as Elizabeth Wells Gallup and François Cartier, have claimed that Bacon used the cipher to encode messages revealing his authorship in the First Folio. However, American cryptologists William and Elizebeth Friedman refuted the claims that the works of Shakespeare contain hidden ciphers that disclose Bacon's or any other candidate's secret authorship in their The Shakespeare Ciphers Examined (1957). Typographical analysis of the First Folio shows that a large number of typefaces were used, instead of the two required for the cipher, and that printing practices of the time would have made it impossible to transmit a message accurately.[6]
The Friedmans' tombstone included a message in Bacon's cipher not spotted for many years.[7]
See also
[edit]- Baudot, a set of 5-bit codes for the English alphabet, used world-wide for teleprinter communications during most of the 20th century.
- Null Cipher, a related cipher.
References
[edit]- ^ Bacon, Francis (1605). The Proficience and Advancement of Learning Divine and Humane.
- ^ Bacon, Francis (1640). Of the Advancement and Proficience of Learning. Translated by Wats, Gilbert. Oxford University. pp. 257–271.
- ^ Dupuy, Jr., Paul J. "The Advancement of Learning". An Authorship Analysis – Francis Bacon as Shake-speare. London: Shake-n-Bacon. Chapter 1. Archived from the original on 2017-03-18. Retrieved 2017-03-18.
- ^ Helen Fouché Gaines, Cryptanalysis: a Study of Ciphers and Their Solutions (1989), page 6]
- ^ Biliteral can mean: "written in two different scripts", Oxford English Dictionary
- ^ Kahn, David (1996). The Code-breakers (2nd ed.). New York: Scribner. pp. 882–888. ISBN 0-684-83130-9.
- ^ Dunin, Elonka (17 April 2017). "Cipher on the William and Elizebeth Friedman tombstone at Arlington National Cemetery is solved" (PDF). Elonka.com.
Further reading
[edit]- William Friedman and Elizebeth Friedman, The Shakespearean Ciphers Examined, Cambridge University Press, 1957
External links
[edit]Bacon's cipher
View on GrokipediaHistory and Development
Invention by Francis Bacon
Francis Bacon, a prominent English philosopher, statesman, and advocate for empirical scientific methods during the late Elizabethan and early Jacobean periods, developed the biliteral cipher as part of his innovative approaches to knowledge dissemination and secrecy. Born in 1561, Bacon served as a lawyer, essayist, and eventually Lord Chancellor under King James I, while championing the inductive method to advance human understanding through observation and experimentation. His cryptographic work emerged from this broader intellectual framework, reflecting his interest in tools that could securely convey complex ideas amid the political intrigues of the era.[4] Around 1605, Bacon outlined the cipher in his seminal essay Of the Advancement of Learning, where he positioned it within discussions on the "organ of speech" and the transmission of knowledge.[5] He described devising the system during his youth in Paris (1576–1579), emphasizing its elegance as a method for encoding messages using subtle variations in ordinary text.[2] This invention aligned with Bacon's philosophical push to expand learning beyond traditional bounds, integrating cryptography as a practical aid for intellectual exchange. The core concept of Bacon's biliteral cipher enabled messages to be concealed "omnia per omnia"—through all things—by employing two distinct forms (such as uppercase and lowercase letters or Roman and italic types) to represent binary-like sequences for the entire alphabet. Bacon highlighted its perfection in allowing any content to be hidden within a larger innocuous carrier text, provided the hidden message was proportionally shorter, thus facilitating steganography for secure communication in sensitive political or scholarly contexts. This approach underscored his vision of cryptography not merely as obfuscation, but as a versatile instrument for preserving and sharing knowledge during a time of religious and dynastic tensions.Publication and Early Influences
Francis Bacon first documented his biliteral cipher in the 1623 Latin work De Augmentis Scientiarum, an expanded and translated edition of his 1605 English text The Advancement of Learning, where he presented it as a sophisticated steganographic method within his classification of ciphers under the broader study of knowledge transmission.[5] In Book VI, Chapter I, Bacon explicitly described the cipher's mechanics, emphasizing its ability to conceal messages using two slightly varied alphabets, positioning it as an advancement in the art of secret writing.[6] The cipher's development reflected influences from the Renaissance cryptographic tradition, particularly the steganographic innovations of earlier scholars. Johannes Trithemius's Steganographia, composed around 1500 and published posthumously in 1606, introduced binary-like systems employing two distinct symbols to encode information invisibly, a conceptual precursor to Bacon's dual-font approach.[7] Similarly, Giovanni Battista della Porta's De furtivis literarum notis (1563) explored visual and material-based concealment techniques, such as hiding messages in drawings or fabrics, which paralleled Bacon's emphasis on imperceptible variations in text presentation.[7] These works contributed to a growing interest in cryptography as both a practical tool for diplomacy and an intellectual pursuit tied to philosophy and natural secrets. Despite its theoretical elegance, Bacon's cipher experienced limited adoption in the 17th century, owing to practical barriers and contextual priorities. The method's reliance on subtle visual distinctions between two typefaces proved challenging for the era's printing technology, which lacked the precision for consistent reproduction of such variants without detection.[3] Moreover, Bacon framed the cipher within his philosophical project of advancing learning, rather than promoting it as a standalone cryptographic tool for widespread use in statecraft or correspondence.[3] Contemporary references to the cipher remained scarce, underscoring its obscurity amid broader Baconian influences on intellectual discourse. Such nods highlighted the cipher's indirect legacy in fostering a culture of encoded knowledge during the Scientific Revolution.Principles and Mechanics
Binary-Like Encoding System
Bacon's biliteral cipher operates on a binary-like encoding system that uses two distinct symbols, conventionally represented as a and b, to encode the letters of the Latin alphabet through fixed-length sequences. This approach assigns each letter a unique combination of five symbols, leveraging the 32 possible permutations (2^5) to cover the 24 letters typically used in early modern English and Latin texts, which omitted J (merged with I) and treated U and V as variants of the same symbol in some contexts. The system thus provides surplus combinations for potential error correction, punctuation, or extensions, marking it as an efficient yet constrained method for alphabetic representation.[6] The complete encoding table for the 24 letters, as described in Bacon's original presentation, is as follows:| Letter | Code | Letter | Code | Letter | Code |
|---|---|---|---|---|---|
| A | aaaaa | I | abaaa | R | baaaa |
| B | aaaab | K | abaab | S | baaab |
| C | aaaba | L | ababa | T | baaba |
| D | aaabb | M | ababb | V | baabb |
| E | aabaa | N | abbaa | W | babaa |
| F | aabab | O | abbab | X | babab |
| G | aabba | P | abbba | Y | babba |
| H | aabbb | Q | abbbb | Z | babbb |
Implementation with Visual Variations
Bacon's cipher employs steganographic techniques to embed binary codes into text by exploiting subtle visual differences between letters, allowing the distinction between the two symbols (often denoted as A and B) without altering the apparent meaning of the carrier message. The primary method involves typeface variations, where one symbol is represented by roman (upright) font and the other by italic (slanted) font, as originally described by Francis Bacon in his 1623 work De Augmentis Scientiarum. Alternative typeface distinctions include uppercase versus lowercase letters or bold versus regular weight, enabling the encoding of the five-bit sequences for each alphabet letter across groups of five consecutive characters in the text.[8][10] Other implementations extend beyond typefaces to more nuanced visual cues, such as variations in ink shades (e.g., lighter versus darker intensity) to differentiate A from B, or adjustments in letter spacing and text alignment (e.g., slight shifts in justification) that remain imperceptible to casual readers. These methods rely on the binary-like encoding system, where the 24 five-bit codes (treating I/J and U/V as equivalents) are overlaid onto an innocuous cover text of sufficient length.[10][6] The steganographic advantage of these visual variations lies in their ability to conceal messages in plain sight, leveraging the natural variability of printed text—such as occasional italics for emphasis or minor typesetting inconsistencies—to mask the encoded information without arousing suspicion. This approach ensures the carrier message remains coherent and readable, with the hidden content only revealable through systematic analysis of the visual markers.[8] However, implementation faced significant challenges in the 17th century, particularly due to the limited precision of printing presses, which often resulted in inconsistent font rendering, ink blots, or alignment errors that could obscure the distinctions between A and B forms. For handwritten reproductions or low-quality printings, these subtle variations were even more prone to degradation, rendering the cipher impractical without controlled production conditions and rendering it vulnerable to misinterpretation over time.[8][10]Encoding and Decoding Processes
Step-by-Step Encoding
To encode a message using Bacon's cipher, first convert the plaintext into a sequence of binary-like codes consisting of 'a' and 'b' symbols, where each letter of the alphabet is represented by a unique 5-bit combination. This produces a coded string that is five times longer than the original message, as each plaintext letter requires five bits. These bits are then concealed within a neutral carrier text of equal length by assigning subtle visual variations—such as two different typefaces, fonts, or cases—to the letters of the carrier, corresponding to 'a' and 'b'.[5][11] The encoding process follows these detailed steps:-
Map each plaintext letter to its 5-bit code: Use the standard biliteral alphabet table attributed to Francis Bacon, which assigns a unique sequence of five 'a's and 'b's to each of the 24 letters of the Elizabethan alphabet (combining I/J and U/V). The table, based on conventional binary mapping (a=0, b=1 from 00000 to 10111), is as follows:
For example, to encode "HELLO", map H to aabbb, E to aabaa, L to ababa, L to ababa again, and O to abbab, resulting in the concatenated code: aabbbaabaaababaababaabbab.[11]
Letter Code Letter Code A aaaaa N abbaa B aaaab O abbab C aaaba P abbba D aaabb Q abbbb E aabaa R baaaa F aabab S baaab G aabba T baaba H aabbb U/V baabb I/J abaaa W babaa K abaab X babab L ababa Y babba M ababb Z babbb - Create or select a neutral carrier message: Choose an innocuous cover text that is exactly five times the length of the plaintext (in letters, ignoring spaces and punctuation in the count). The carrier should appear as ordinary prose to avoid detection. For the "HELLO" example (5 letters, requiring 25 bits), select a 25-letter phrase like "avoid suspicion at all costs now" (a v o i d s u s p i c i o n a t a l l c o s t s n o w – 25 letters).[5]
- Assign visual variations to the carrier letters based on the code bits: Divide the carrier text into groups of five letters, each group corresponding to one plaintext letter's 5-bit code. For each bit, apply a 'a'-form (e.g., lowercase or italic) or 'b'-form (e.g., uppercase or roman) to the respective carrier letter. Spaces and punctuation remain unchanged. Continuing the "HELLO" example with carrier "avoid suspicion at all costs now" (letters: a v o i d s u s p i c i o n a t a l l c o s t s n o w), the first five letters "a v o i d" would be varied as: a (a: lowercase), v (a: lowercase), o (b: uppercase), i (b: uppercase), d (b: uppercase) to match aabbb for H, yielding "a v O I D". Proceed similarly for each subsequent group.[11]
- First group "w i l l i" for aaaab: w i l l I
- Second group "a m s h a" for aaaaa: a m s h a (all lowercase)
- Third group "k e s p e" for aaaba: k e s p E
- Fourth group "a r e i s" for abbab: A R E I S
- Fifth group "t h e m a" for abbaa: t h E M A
Step-by-Step Decoding
Decoding Bacon's cipher involves systematically analyzing the carrier text to identify subtle distinctions between two character types, typically representing binary states A and B (or 0 and 1), and then reconstructing the hidden message through grouping and mapping. This reverse process extracts the concealed plaintext from what appears as innocuous ordinary text, relying on the biliteral system's use of five-bit binary sequences to encode the 24-letter alphabet.[11][5] The decoding procedure follows these detailed steps:- Identify the two-type distinction: Examine the carrier text for the predefined visual or typographic variations that differentiate the two forms, such as uppercase versus lowercase letters, italic versus roman fonts, or slight differences in type spacing as originally suggested by Bacon. This step requires careful inspection to distinguish the indicators without altering the text's apparent meaning.[11]
- Assign binary values sequentially: Read the text from left to right, assigning one type as A (or 0) and the other as B (or 1), based on the agreed convention between encoder and decoder. For instance, in a text using case variations, uppercase might represent B and lowercase A, converting the sequence into a string of A's and B's.[11]
- Group into five-bit sequences: Divide the resulting binary string into non-overlapping groups of five characters each, as each group corresponds to one letter in the plaintext. If the text length is not a multiple of five, the final incomplete group is typically ignored or handled as extraneous.[11]
- Translate using the encoding table: Map each five-bit group to its corresponding letter using the standard biliteral alphabet table, where sequences like AAAAA represent A and AAAAB represents B, continuing through to BABBB for Z. This table, derived from Bacon's original system, ensures direct correspondence back to plaintext characters.[11][5]
