Porta's De furtivis literarum notis (1563)

The present article describes achievements of Giovanni Battista Porta (1535?-1615) in cryptology, occasionally using David Kahn, The Codebreakers (1967) as a guide.

Editions

In 1563, Porta published a classic work on cryptology De furtivis literarum notis, vulgo de ziferis.

In 1591, a pirated edition made "almost to perfection" (Kahn p.142) was published in London (Google, Europeana).

A legitimate 1593 edition titled De occultis literarum notis (Google) added an appendix. (The term occultis (secret, occluded, hidden) and furtivis (secret, furtive) are more or less synonymous and furtivis in the title of some chapters was replaced with occultis seu furtivis in the 1593 edition.)

An enlarged and reorganized 1602 edition (Google) is reorganized into five books.

An English translation On secret notations for letters commonly called ciphers in typescript by Mrs. Keith Preston (Etta Shield Preston), used by Kahn, is in Fabian Collection of the Library of Congress (catalog entry).

Pierre François Duchesne, Notice Historique sur la vie et les ouvrages de J.-B. Porta, gentilhomme napolitain, [1801], pp.174-209 gives an extensive résumé (Kahn p.1000).

Book 1

Book 1 deals with ancient ciphers.

1-III (meaning Book 1, Chapter III herein) gives abbreviations in the Roman era: CR for "cive romanum", OP for "opportere", ABVC for "ab uribe condita", and even PPPPESSSEVVVVVVVFFFF for "primus pater patriae profectus est, secum salus sublata est, venit victor validus, vicit vires vrbis vestrae, ferro fame flamma frigore."

1-V gives simple manipulation of Latin words of the plaintext "Hostis Adest Cave Tibi" into "Stisho Estad Veca Biti" (reversing the first and second half of each word) or "Horat Stissis, Adrat Estrat Casis Verat Tisis Bisis" (inserting meaningless suffices -rat and -sis).

Well-known Polybius' checkerboard signalling (1-X) and scytale (1-XII) are also covered. Note that the illustration of the scytale below (taken from the appendix of the 1593 edition) is different from transposition cipher as commonly understood today (see another article).



1-XIIII points out such ancient modes of secret writing were no longer useful.

Chapter Titles of Book 1
1-I. Quid sint furtivae literarum notae
1-II. Quod furtivis hisce notis usi sunt, qui res sacras & occultas scientias scripserunt
1-III. Quid his etiam notis scribunt, qui velint compendiose scribere
1-IIII. Quod his notis scribere praecipue solent, qui magna negotia tractant, quamque; earum cognitio utilis semper, & necessaria extiterit
1-V. Divisio furtivarum notarum, & primo de vocalibus signis
1-VI. Semivocalia signa, quae sint, & quomodo per ea animum indicare, & percipere possimus
1-VII. Muta signa, quae sint, & quomodo per illa quicquam significare possimus, & primum de corporis motu
1-VIII. Multa tacitis ambagibus posse indicari
1-IX. Per notas Hieroglyphicas, atque; per rerum animaliumque figuras tacite sermonem exprimi posse
1-X. Noctu igne, interdiu vero pulvere posse significari
1-XI. De computo & loquela per digitorum gestum, quo maiores supputarint, & in caute loquendo usi sint
1-XII. De literis clandestinis ex veterum scriptis
1-XIII. Furtivae literarum notae, quibus maiores in scribendo usi sint
1-XIIII. Antiquorum scribendi modos nostra tempestate vanos & inutiles esse
1-XV. Furtivas literarum notas fieri, quae cerni non possunt, tum earum ratio & usus

Book 2

Book 2 deals with modern ciphers.

2-I presents three kinds of ciphering: change of letters' order (transposition), shape (substitution by symbols other than Latin letters), or value (substitution by letters of another alphabet).

Transposition Cipher

2-II and 2-III deal with transposition, the latter seeming to describe a way not to arouse suspicion.


Monoalphabetic Substitution Cipher

2-IIII appears to describe ways to create cipher symbols (inverting letters etc.).

2-V gives an example of monoalphabetic substitution, while 2-VI explains ways to make it more secure by suppressing word breaks, providing false word breaks, or including intentional misspellings. "For it is better for a scribe to be thought ignorant than to pay the penalty for the detection of plans." (Kahn p.139)


Polyalphabetic Substitution with Porta's Cipher Disk

2-VII, 2-VIII, 2-IX, and 2-X describe the famous Porta's cipher disk, with illustrations. The drawing of the cipher disk below shows the inner movable disk pasted at the initial position. Referring to the enciphering example further below, the first letter "H" is enciphered with this initial position. Then, the inner disk is rotated clockwise by one place for enciphering "O", and so on. Although a cipher disk had been described by Alberti before, Porta incorporated the idea of letter-by-letter encipherment (which per se had been anticipated by Trithemius).



Porta provides several measures to enhance secrecy. The second example below suppresses word breaks and the symbol disk includes more symbols than the letters of the alphabet, which makes the cycle of the disk positions unequal to the number of letters in the alphabet. (With the first cipher disk, every twentieth letter is enciphered with the same disk position. See "m" in "Iam" and "Milite".)



When this second cipher disk is used, the first example text is enciphered as follows.


In the following, letters I, S, H, R, Λ V, C are used as nulls.


The following third variation of Porta's cipher disk has a mixed alphabet, though its value may have been limited as long as there is no inherent ordering for the cipher symbols.


In 2-XI, Porta points out that the cipher disk is equivalent to the following table.


The 1602 edition has a new chapter (4-III) discussing use of a key phrase rather than progressive rotation after enciphering each letter. Porta wisely uses a long key: ORA PRO NOBIS SANCTA DEI GENITRIS.

Triliteral, Quadriliteral, Quinqueliteral Ciphers

2-XII describes a way to express the 21 letters of the alphabet with only five letters A, B, C, D, E with a table as follows (corrected). Since the letter P is found at the intersection of column D and row B, it is represented by DB.


If only four letters should be used, "DD" may be used instead of "E." If only three letters should be used, seven columns labelled AA, BB, CC, AB, AC, BC, CB with three columns A, B, C may be used.

Use of three symbols without such combinations is also described. According to the example given in the 1602 edition (4-XVIII), it appears to distinguish the seven positions in each row by the amount of space before the letter (A, B, C), which must be filled with insignificant letters (those other than A, B, C).


Porta was aware that the fewer symbols used, the longer the ciphertext would be. Such an idea is common with the later Francis Bacon's biliteral cipher (see another article).

In a new chapter 5-VI of the 1602 edition, a biliteral cipher with only A, B is presented but it requires representing the plaintext with only eight letters of the alphabet: a, e, r, u, o, i, f, t by replacing the other less frequent letters with these. As with Bacon, Porta was also concerned about avoiding suspicion, for which he proposes writing a word having a number of syllables corresponding to the number of A or B occurring without interruption. For example, if there is a succession of four Bs, some four-syllable word (e.g., "Antonius") is written; if there are three, e.g., "dominus" is written, etc. Subsequent chapters (5-VII to 5-XV) deal with many variants.


Digraphic Cipher

2-XIII gives a table for the earliest known digraphic cipher (Kahn p.139), whereby every combination of two letters among A-Z are given its own symbol.



Some Simple Ciphers

2-XIIII deals with some simple ciphers.

The following forms a symbol with four substitution elements. (4-XX of the 1602 edition gives a further imaginative enciphering.)



Porta sneers pigpen cipher as used by "rustics, women and children" (Kahn p.138)


Porta also mentions what is known as ATBASH (writing Z for A, X for B, V for C, ... P for O.)

He also describes inserting low-frequency letters (HKQXYZ) as nulls.


Keyed Transposition

2-XV discusses an intricate transposition cipher. Porta chose a key phrase "CASTUM FODERAT LUCRETIA PECTUS", to which a barbarous name "ALGAZEL" is appended to make it more difficult to discern. The enciphering with this key proceeds as follows.

First, one letter after another from the key phrase is written under the letters of the plaintext to be enciphered (Post Bello ...) as shown in (1) below. Each key letter indicates a number corresponding to its position in the alphabet (3 for "c", 1 for "a", etc.), as (conceptually) illustrated in (2). The number specifies a place (counting from the letter after the current position) at which the corresponding plaintext letter is to be written. For example, the first number "3" for the key letter "c" indicates the corresponding first plaintext letter "p" should be written at the third place. The second number "1" indicates the next "o" should be written at the first place after it. The third number "17" indicates the third letter "s" should be written at the 17th place after that.


Porta's Polyalphabetic System

2-XVI describes Porta's famous pairing-based polyalphabetic cipher table. (Such a reciprocal table had been described by Bellaso in 1553 (Wikipedia).)


The top row headed "AB" indicates a pairwise reciprocal transposition. That is, "A" in plaintext is enciphered as "N" and "N" in plaintext is enciphered as "A", and so on. The row to be used is switched according to a key. Porta again uses the key phrase "CASTUM FODERAT LUCRETIA PECTUS ALGAZEL" so the row headed "CD" is used for enciphering the first letter, the row "AB" for the second letter, the row "ST" for the third letter, an so on.


Although the above table is illustrated with the regular alphabet, Porta points out that "The order [of the letters in the tableau] ... may be arranged arbitrarily, provided no letter is omitted." ("ordo ex arbitrio disponatur, modo nullem elementum praeterium sit"; Kahn p.141)

The elements used in Porta's polyalphabetic system were not new. Letter-by-letter progression of the key had been anticipated by Trithemius. A cipher disk with a mixed alphabet had been described by Alberti. An easy-to-remember key had been proposed by Bellaso. Still, David Kahn appreciates that Porta was the first to enunciate "the modern concept of polyalphabeticity" (p.142).

Preconcerted Words?

2-XVII appears to describe replacing words with other words.

Grille

2-XVIII describes a so-called Cardan grille, a board with openings, which allows a reader to pick up significant letters of the true plaintext among a superficial text.


Ave Maria Cipher

2-XIX describes Trithemius' Ave Maria cipher, whereby each letter is enciphered as one of many Latin words (and other symbols) specified in a table.

Combinations

2-XX demonstrates application of five different enciphering schemes successively (to a politically incorrect plaintext "Puellam Hodie Amatam Defloravi", which was replaced in the 1602 edition (5-XXII) by "Civitatem Hodie Desideratam Depopulatas Sum").

Chapter Titles of Book 2
2-I. Quid sit furtivis literarum notis scribere
2-II. Quod per literarum transpositionem occulte scribi possit
2-III. Occulta literarum transpositione aliter sine suspicione interpretem deludi posse
2-IIII. De furtivis characterum notis effingendis
2-V. De simplici occultarum sive furtivarum literarum modo
2-VI. De dolis & fallaciis, quibus haec scribendi ratio muniatur, ut scriptum difficilius interpretetur
2-VII. De circulari scripto, cuius modi illud sit, & quae instrumenti descriptio, quo in scribendo uti debemus
2-VIII. Qua ratione ad scribendum instrumento uti possumus
2-IX. An liceat experiri utrum scribendo Rotam peccatum sit
2-X. De dolis & fallaciis, quibus huius modi scriptum Rotae indicio indissolubile fieri possit
2-XI. Eodem Rotae artificio quomodo aliter literis per tabulam expandis uti possimus
2-XII. Quomodo quinque quatuorue, vel tribus tantum notis quodlibet scribi possit
2-XIII Scribendi ratio, qua infinitis propemodum characteribus scriptum euariabitur
2-XIIII Varii scribendi modi, quibus omnes fere vulgo uti solent, tum alii ad idem exemplum a nobis excogitati
2-XV Quomodo aliter transposito literarum ordine scriptum indissolubile fiat
2-XVI Quomodo aliter clavi utendum sit, sine qua scriptum non possit aperiri
2-XVII Modus, quo dictio una alteram significat
2-XVIII Modus quo una oratio sub alia bracteis perforatis occultatur
2-XIX Abditissimus per synonyma, vel paria verba scribendi modus
2-XX Ut scriptum multiplici dolo perplexum fiat, ut & involucrum sub involucro lateat
2-XXI De clandestinis nunciis

Book 3

Book 3 deals with cryptanalysis.

Probable Words

Porta was the first to mention using "probable words" (words likely to be present in the plaintext) for cryptanalysis (Kahn p.140). For example, if the topic is love, words such as AMOR, COR, IGNIS, etc. might be expected to occur (3-II).

Frequency Analysis

For simple substitution (of Latin plaintext), Porta appears to point out vowels can be easily recognized from their position and consonants can be identified by their frequency.

According to Kahn (p.140), it was the first in Europe to describe solving a monoalphabetic cipher with no word divisions or with false word divisions (3-IX, 3-X). At the time, codebreakers often depended on such word divisions.

Solution of (Some Particular) Polyalphabetic Cipher

It is remarkable that Porta even discussed solution of polyalphabetic ciphers (3-XVI to 3-XXII), which were reputed to be undecipherable until the 19th century. Although his examples were contrived and his methodology is not generally applicable, Kahn highly appreciates his bold attitude (p.142).

Porta's solution assumes clockwise rotation by one place of the movable disk after enciphering each letter, which results in succession of the same symbol in the ciphertext if the plaintext has a sequence of letters in the regular alphabetical order (such as def in deficio or stu in studium). A shrewd reader would have noticed sequences of three identical symbols in the example ciphertexts given in Book 2 above.

The 1602 edition has a new chapter 4-XVII dealing with solution of a polyalphabetic cipher with a standard alphabet but with a literal key (rather than progressive switching) (Kahn p.142, citing Charles J. Mendelsohn, "The Earliest Solution of a Multiple Alphabet Cipher Written with the Use of a Key"). In this variant, succession of the same letter in the ciphertext indicates that the corresponding letters in the key are consecutive in alphabetical order and those in the plaintext are consecutive in reverse alphabetical order. At one point, Porta went very close to a general solution: "Since there are ... 51 letters between the first three MMM and the same three letters repeated in the thirteenth word, I conclude that the key has been given three times and decide correctly that it consists of 17 letters." With hindsight, Porta needed only to notice that repetition of any particular pattern rather than the succession of identical symbols could be used to determine the length of the key to arrive at what is known today as Kasiski's method.

Specifically, the ciphertext (contrived by Porta to be decipherable) is as follows.

MMMBTXCO PXB DFBV GST INRGTN GTC CCCTG AMHCM AHTO XTMOQ SLQPR MMMBTTH MHV, ACEOHG LLL LI NXIOG.
(The correct ciphertext seems to be:
MMMBTXCO PXB DFBV GST INXGTN GTC CC CTA AMHCM AHTB XTMOQ SLQPR MMMBTTH MHV ACEOHG LLL LI VXIOG)

The distance between the first "MMM" and the second "MMM" is 51(=17*3) and that between the second "MMM" and "LLL" is 17, which suggests the key has 17 letters. If so, the occurrence of "CCCC" suggests the corresponding key letters might also be consecutive in alphabetical order. Porta then tries key phrases satisfying these conditions, "STUDENS SIC DEFICIO", "STUDIUM SIC DEFICIO", "STUDIUM HIC DEFICIT", the last of which reveals the plaintext as follows.

PONTIANE, EST VXOR TVA MORTVA, VIX VT SIT NOMEN SVVM, NIHIL MANET, PONTIVS CVR STVDET NON ME LATET.

Chapter Titles of Book 3
3-I Notarum interpretem qualem esse conueniat
3-II Quae novisse interpretem conveniat, antequam ad scripti interpretationem accedat
3-III Distincta literarum nomina, quibus saepenumero suis oportune locis uti debemus
3-IIII Simplex commutatae figurae modus quomodo deprehendatur
3-V Consonantes quot modis in simplici permutati characteris scripto a vocalibus dignoscantur
3-VI Quot modis distinctas consonantium potestates venari possimus
3-VII Quot modis singulas vocalium potestates aucupemur
3-VIII Quomodo traditis regulis uti conveniat, tum de eo exemplum
3-IX Quomodo continuati scripti partes dirimantur
3-X Quomodo continuatum scriptum possit interpretari exemplum
3-XI Quomodo perperam scripti partes liceat deprehendere, & interpretari
3-XII Qua ratione scriptum ociosis characteribus involutum, deprehendatur, & illi ab aliis dignoscantur
3-XIII De hoc scripti genere interpretando exemplum
3-XIIII Quomodo reliquis occultandi dolis huiusmodi scripti sit occurrendum
3-XV De orbiculari simplici scripto, & rationes quibus deprehendi possit
3-XVI Quomodo hoc scripti genus interpretetur
3-XVII De simplici orbiculari scripto interpretando exemplum
3-XVIII Quomodo continuati orbicularis scripti partes discernantur
3-XIX De continuato orbiculari scripto interpretando exemplum
3-XX Duos esse modos orbicularis compositionis, quae pluribus quam alphabeti numerus exposcit characteribus implicatur, tum primus quomodo deprehendatur, & interpretetur
3-XXI Quomodo alter orbicularis compositionis modus ociosis characteribus involutus deprehendatur & interpretetur
3-XXII Proximi scripti interpretandi exemplum

Book 4

Book 4 provides characteristics of Latin that may be helpful in codebreaking.

For example, Table 3 is a list of three-letter words (including inflected forms and possibly word elements) in VVV, VVC, CCV, VCC, CVV, VCV, CVC (V: vowel, C: consonant). Table 4 is a similar list of four-letter words.

The following table appears to help identifying word divisions by providing examples of consecutive vowels etc.: "tibi ijsdem", "Tiberij ij", "eoo oone", "tu vuula."

There follows tables of words with characteristic letter arrangement patterns: abbassarsi, accurro, ..., followed by division of consecutive consonants: "urbs phtisis", ....

There are also tables of words including consecutive two letters in alphabetical order, etc., presumably to help Porta's technique of polyalphabetic solution.

Appendix

The 1593 edition includes an appendix including additional information. As one example, Porta quotes other writers' description of scytale and reproduces a drawing from one of them (see above).

There is further a table showing classification of various modes of secret writing/communication over 10 pages, occasionally with references to the chapters in the book. This table was not included in the 1602 edition.

1602 Edition

The 1602 edition underwent a major revision of the content. In particular, the original division of Book 2 (enciphering) and Book 3 (cryptanalysis) was abandoned and codebreaking techniques are described right after the relevant enciphering method. It was substantially enlarged with additional techniques and examples. Among others, a solution to a polyalphabetic cipher with a literal key (see above) is described (albeit for rather an artificial example).

Book 1

Book 1 of the 1602 edition largely corresponds to chapters I to XI of the original Book 1, except for a new chapter (1-XI) dedicated to Polybius' system.

Chapter Titles of Book 1 of the 1602 edition
1-I. Quid sint furtivae literarum notae
1-II. Quod furtivis hisce notis usi sunt, qui res sacras & occultas scientias scripserunt
1-III. Quid his etiam notis scribunt, qui velint compendiose scribere
1-IIII. Quod his notis scribere praecipue solea nt, qui magna negotia tractant, quamque; earum cognitio utilis semper & necessaria extiterit
1-V. Divisio furtivarum notarum, & primo de vocalibus signis
1-VI. Semivocalia signa quae sint, & quomodo per ea animum indicare, & percipere possimus
1-VII. Muta signa quae sint, & quomodo per illa quicquam significare possimus, & primum de corporis motu
1-VIII. Multa tacitis ambagibus posse indicari
1-IX. Per notas Hieroglyphicas, atque per rerum animaliumque figuras tacite sermonem exprimi posse
1-X. Noctu igne, interdiu vero pulvere posse significari
1-XI Quomodo facta, & literae per ignem significari possunt ex Polybio [a new chapter]
1-XII. De computo & loquela per digitorum gestum, quo maiores supputarint, & in caute loquendo usi sint

Book 2

Scytale etc. are moved into new Book 2.

Chapter Titles of Book 2 of the 1602 edition
2-I. De literis clandestinis ex veterum scriptis (orig. 1-XII)
2-II. Antiquorum scribendi modos nostra tempestate vanos & inutiles esse (orig. 1-XIIII)
2-III. Furtivas literarum notas fieri, quae cerni non possunt, & primo quae igne visibiles (orig. 1-XV)
2-IIII. (new) Quomodo notae fiant aqua visibiles
2-V. (new) Literae quae non nisi confricatis pluveribus legi possunt
2-VI. (new) Quomodo diversis artificijs occulte scribi possit
2-VII. (new) Quomodo epistolae occulte ferantur
2-VIII. (new) Quibus pro cladestinis nuncijs uti possimus
2-IX. (new) Quomodo etiam nuncij per aerem mittantur
2-X. (new) Quomodo scriptura & sigillum mentiatur

Book 3

Book 3 is dedicated to transposition and simple substitution ciphers with their solution.

Chapter Titles of Book 3 of the 1602 edition
3-I. Furtivae literarum notae, quibus maiores in scribendo usi sint (orig. 1-XIII)
3-II. Antiquorum scribendi modi vani & inutiles (orig. 1-XIIII)
3-III. Quid sit furtivis literarum notis scribere (orig. 2-I)
3-IIII. Quomodo per literarum transpositionem occulte scribi possit (orig. 2-II, substantially enlarged)
3-V. Quomodo aliter transposito literarum ordine scriptum indissolubile fiat (orig. 2-XV)
3-VI. (new) De anagrammatismo, & quomodo per illud obscure scribere possimus
3-VII. (new) Quomodo transpositae literarum notae deprehendantur, & interpretentur
3-VIII. De furtivis notis in quibus mutatur figura, & de characterum notis effingendis (orig. 2-IIII)
3-IX. De simplici furtivarum literarum modo (orig. 2-V, 2-VI)
3-IX. [sic] Notarum interpretem qualem esse conveniat (orig. 3-I)
3-X. Quae novisse interpretem conveniat, antequam ad scripti interpretationem accedat (orig. 3-II)
3-XI. Distincta literarum nomina, quibus saepenumero suis oportune locis uti debemus (orig. 3-III)
3-XII. Simplex commutatae figurae modus quomodo deprehendatur (orig. 3-IV)
3-XIII. Consonantes quot modis in simplici permutati characteris scripto a vocalibus dignoscantur (orig. 3-V)
3-XIIII. Quot modis distinctas consonantium potestates venari possimus (orig. 3-VI)
3-XV. Quot modis singulas vocalium potestates aucupemur (orig. 3-VII)
3-XVI. Quomodo traditis regulis uti conveniat, tum de eo exemplum (orig. 3-VIII)
3-XVII. Quomodo continuati scripti partes dirimantur (orig. 3-IX)
3-XVIII. Quomodo continuatum scriptum possit interpretari exemplum (orig. 3-X)
3-XIX. Quomodo perperam scripti partes liceat deprehendere, & interpretari (orig. 3-XI)
3-XX. Qua ratione scriptum ociosis characteribus involutum, deprehendatur, & illi ab aliis dignoscantur (orig. 3-XII)
3-XXI. De hoc scripti genere interpretando exemplum (orig. 3-XIII)
3-XXII. Quomodo reliquis occultandi dolis huiusmodi scripti sit occurrendum (orig. 3-XIV)
3-XXIII. Ratio usus tabularum simplici permutationis (orig. Book 4 )
3-XXIIII. Ratio & usus tabularum continuati scripti, in quo characterum figurae permutantur (orig. Book 4)

Book 4

Book 4 deals with cipher disks with their solutions and various other enciphering methods.

Chapter Titles of Book 4 of the 1602 edition
4-I. De circulari scripto, cuiusmodi illud sit, & quae instrumenti descriptio, quo in scribendo uti debemus (orig. 2-VII)
4-II. Qua ratione ad scribendum instrumento uti possumus (orig. 2-VIII)
4-III. (new) Quomodo eodem instrumento scriptum clave claudere possimus [describing application of a key phrase to a cipher disk]
4-IIII. An liceat experiri utrum scribendo ad Rotam peccatum sit (orig. 2-IX)
4-V. De dolis & fallaciis, quibus eiusmodi scriptum Rotae indicio indissolubile fieri possit (orig. 2-X)
4-VI. Eodem Rotae artificio, quomodo aliter literis per tabulam expandis uti possimus (orig. 2-XI)
4-VII. De orbiculari simplici scripto, & rationes quibus deprehendi possit (orig. 3-XV)
4-VIII. Quomodo hoc scripti genus interpretetur (orig. 3-XVI)
4-IX. De simplici orbiculari scripto interpretando exemplum (orig. 3-XVII)
4-X. Quomodo continuati scripti orbicularis partes discernantur (orig. 3-XVIII)
4-XI. De continuato orbiculari scripto interpretando exemplum (orig. 3-XIX)
4-XII. Duos esse modos orbicularis compositionis, quae pluribus, quam alphabeti numerus exposcit characteribus implicatur, tum primus quomodo deprehendatur, & interpretetur (orig. 3-XX)
4-XIII. Quomodo alter orbicularis compositionis modus ociosis characteribus involutus deprehendatur & interpretetur (orig. 3-XXI)
4-XIIII. Proximi scripti interpretandi exemplum (orig. 3-XXII)
4-XV. (new) Ratio & usus tabularum orbicularis scripti [tables including words with three consecutive letters in the alphabet etc.]
4-XVI. Quomodo aliter clavi utendum sit, sine qua scriptum non possit aperiri (orig. 2-XVI)
4-XVII. (new) Quomodo scriptum cum clavi, sine clavi aperiri, & interpretari possit [describing solution of a polyalphabetic cipher with a literal key]
4-XVIII. Quomodo quinque, quatuorue, vel tribus tantum notis quodlibet scribi possit (orig. 2-XII)
4-XIV. Scribendi ratio, qua infinitis propemodum characteribus scriptum euariabitur (orig. 2-XIII)
4-XX. Varii scribendi modi, quibus omnes fere vulgo uti solent, tum alii ad idem exemplum a nobis excogitati (orig. 2-XIIII, enlarged)
4-XXI. (new) Quomodo etian animi sensa aperire poterimus amicis

Book 5

Book 5 deals with secret writing without arousing suspicion (steganography).

Chapter Titles of Book 5 of the 1602 edition
5-I. Occulta literarum transpositione aliter sine suspicione interpretem deludi posse (orig. 2-III)
5-II. (new) Occulte scribentes literas in versuum capitibus praefigurant
5-III. (new) Quomodo sine suspicione seribere possimus, literis in medio, et principio dictionum occultatis
5-IIII. (new) Quomodo syllabae, in dictionibus abscondantur
5-V. Modus interserendi literas syllabas & dictiones sine ordine per bracteas perforatas (orig. 2-XVIII)
5-VI. (new) Occulte scribendi modus, quo syllabarum numerus literas sine suspicione demonstret
5-VII. (new) Modus, quo apertarum literarum numerus per tertiam partem deducemus
5-VIII. (new) Scribendi modus, quo literarum scripti numerus triplicato absconditum demonstret
5-IX. (new) Occultandi modus, quo apertus abstrusarum literarum numerus in sesquialtera superet proportione
5-X. (new) Quomodo syllaba una aperti, literam abstrusi demonstret
5-XI. (new) Occulte scribendi modus, quo dictionum syllabae literarum occultarum numeros demonstrent
5-XII. (new) Quod syllabarum numerus literarum numerum demonstret
5-XIII. (new) Modus, quo literarum apparentium numerus celatarum numerum demonstret
5-XIIII. (new) Quomodo numerus inter duas notas vocales positus literas occulti scripti demonstret
5-XV. (new) Vocales aperti scripti occultas celati scripti literas ostendant
5-XVI. (new) Musicis notulis quomodo sine suspicione uti possimus
5-XVII. (new) Quomodo etiam interpretem cum aperta scripti demonstratione deludere possimus
5-XVIII. Modus, quo dictio una alteram significet (orig. 2-XVII)
5-XIX. (new) Quomodo verbum verbo reddemus & sine suspicione
5-XX. Abditissimus per synonima, vel paria verba scribendi modus (orig. 2-XIX)
5-XXI. (new) Abditissimus per synonima scribendi modus per quem verba dimidio minora
5-XXII. Ut scriptum multiplici dolo perplexum fiat, & ut involucrum sub involucro lateat (orig. 2-XX)


©2015 S.Tomokiyo
First posted on 22 September 2015. Last modified on 22 September 2015.
Articles on Historical Cryptography
inserted by FC2 system