Alphabetical, page 5
In French, ‘c’ is soft when it is followed by an ‘e’ or ‘i’ and hard when it is followed by an ‘a’, ‘o’ or ‘u’ . . . unless a ‘cedilla’ has been stuck to its bottom. This little sign (a figure 5 without a hat) tells us that the colloquial ‘ça’ is pronounced ‘sa’. Whether the cedilla outlasts the smartphone keypad epoch is another matter.
‘C’ combines with all the vowels along with ‘r’ to make ‘crab’ ‘cress’, ‘crisis’, ‘cross’ and ‘crunch’, with ‘l’ to make ‘clam’, clench’, ‘clip’, ‘close’ and ‘clunk’ and with a ‘z’ in the loan word ‘czar’. It can combine with vowel ‘y’ in ‘Cyprus’, ‘cynic’ and ‘Cyril’.
You can find it embedded in the three-letter consonant sound ‘-tch’ as in ‘itch’ but that sound is of course much more usually written as ‘ch’ as in ‘church’. Putting a consonant sound in front of the ‘c’ also gives us the very different ‘arc’, ‘alchemy’ and ‘anchor’.
For sound-play with the ‘hard c’ see ‘The Story of K’, and for ‘soft c’ see ‘The Story of S’.
‘Ch’ word-play gives us ‘choo-choo train’, ‘choochy face’, ‘hoochie-coochie man’, ‘cheep-cheep’, ‘cheeky-cheeky’, ‘chop-chop’, ‘the Chattanooga Choo-choo’ and ‘cheap and cheerful’.
C IS FOR CIPHERS
AN ISSUE OF the Daily Telegraph during the Second World War included the usual crossword but on one particular occasion was accompanied by a challenge, in which readers were invited to solve the puzzle in under twelve minutes. If they thought they could, they were asked to make contact with the newspaper. Some twenty-five readers were invited to Fleet Street to sit a new crossword test. Five of them completed the crossword in twelve minutes while one other had only one word missing when the time was up. A few weeks later, these six people were interviewed by the intelligence services and recruited as codebreakers at Bletchley Park, where a team of people were deciphering the messages transmitted by the German military through Enigma machines. Some of the clues are straightforward: ‘16 across: Pretend (5)’, for which the answer is ‘feign’.
Others are what are known as ‘cryptic’:
13 across: Much that could be got from a timber merchant (two words – 5, 4), for which the answer is ‘Great deal’.
14 down: The right sort of woman to start a dame school (3), for which the answer is ‘Ada’.
18 ‘The War’ (anag.) (6), for which the answer is ‘Wreath’.
The most cryptic is: ‘22 across: The little fellow has some beer: it makes me lose colour, I say (6)’, with ‘impale’ being the answer, though the last thing I ‘impaled’ was a barbecue sausage.
If you tot up the techniques needed to solve these they include: memory of synonyms and definitions; awareness of idioms, homonyms and puns; an ability to see letters on the page divorced from their meaning, usual punctuation and spacing; and the ability to jumble and reassemble letters. At the time it was felt that these capabilities would be useful when faced with the encrypted messages that the centre at Bletchley picked up – pages that looked like this:
FDJKM LDAHH YEOEF PTWYB LENDP
MKOXL DFAMU DWIJD XRJZY DFRIO
MFTEV KTGUY DDZED TPOQX FDRIU
CCBFM MQWYE FIPUL WSXHG YHJZE
. . . and so on across several pages.
I’m not particularly good at crosswords though I did win the Boy’s Own Paper crossword competition in 1958. I’m pretty sure I was imitating my parents who spent every Sunday afternoon in a huddle over the Sunday Observer’s ‘Everyman’ crossword, an activity that seemed even then to be full of dubious motives: repetitive, compulsive behaviour; enjoyable masochism; rigid, rule-bound process; succumbing to the will of an anonymous tyrant . . . To watch them was an initiation into the inner recesses of the alphabet. The anagram procedure they followed was to write the letters in a ring; words for which they had some letters were written out on the white margins of the Observer with the blanks written as dashes; they talked of possible and impossible letter combinations and then roared with laughter when they overlooked the ‘cn’ in the middle of ‘picnic’.
Cryptic crosswords today have become yet more cryptic, using many encoded ways of indicating what procedure you must use whilst embedding the code in a feasible phrase or sentence: the word ‘about’ will inform you that you must work out an anagram of what comes next, though there is an alternative use telling you that the word preceding ‘about’ will be split up and positioned around (i.e. ‘about’) the following word. So, ‘Boss about tearfully (4)’ is ‘sobs’ but ‘Boss about one trying to be a scary gangsta (7)’ is ‘booness’. There are at least twenty other procedures like these to make crosswords, some of which involve codes – substituting parts or all of words, and some of which involve ciphers which, like anagrams, involve substituting one letter for another. Together, these methods can be called ‘encryption’.
In June 2013, as I’ve been writing this book, and indeed this particular chapter, an event has had a devastating impact on our ideas about the secrecy of encryption. The first decades of the internet have seen new literacies emerging. These are not simply matters of how we configure letters, words and phrases but are also about the nature of who participates in conversations. Using the instruments of instant messaging, emails and social networks, we’ve created worldwide interest groups, people who want to write on the internet about things they’re interested in. I am an avid ‘user’ of these. Alongside that, I buy train tickets and secondhand books, and spend hours searching and researching anything from family history to the weather details at our holiday destination. Edward Snowden’s revelation was that not one single part, not one tiny jot of it, is secret. It is all available to the security services of one country. It has all been stored and this too is available to the security services.
In other words, our communications can be analysed in two key ways: instantaneously and historically. Put another way, we can be ‘spotted’ saying or doing something at a given moment, or the pattern of our existence over time can be captured and described. However, this isn’t truly public knowledge. I don’t have the technological skills to do this myself, nor do I have one of the few jobs which would enable me to get into any of this spotting and storing. The knowledge and the jobs belong to only a tiny number of people, the security services of one country, who choose whether to share what they find with their elected representatives or, indeed, with anyone at all from other countries. Or not.
In one sense, this is no different from Elizabeth I’s team of spies collecting knowledge about plots against the Crown, and, for example, deciphering messages between Mary Queen of Scots and her conspiratorial chums. The regime defended itself by finding out what people who endangered that regime were saying to each other. Picture Mary confined in Chartley Hall, Staffordshire. A Catholic supporter called Gilbert Gifford smuggles letters to her by the ruse of arranging with a local brewer for them to be concealed in the bung that plugged a barrel of beer. Mary herself didn’t splosh around in the beer, her servants did that for her. In March 1586, in the Plough, near Temple Bar, a dashing young blade of the same religious persuasion, one Anthony Babington, gathered together six conspirators suitable for planning the springing of Mary from her prison, the assassination of Queen Elizabeth, inciting a rebellion and raising support from abroad. All they needed was for Mary to agree to this Shakespearean plot.
Mary heard about this from her French supporters and wrote to Babington indicating that she looked forward to hearing from him; Gifford was the courier. Surely all that needed to be done now was for Babington and Mary to communicate via the beer-barrel bung. Yes, but Babington made doubly sure of concealment by encrypting his letter, using twenty-three symbols for letters, such as the Greek letter ‘theta’ for ‘g’, the infinity sign for ‘h’, and ‘delta’ for ‘s’. He also used thirty-five numbers, letters and signs to substitute for some whole words: ‘2’ for ‘and’, ‘x’ for ‘in’ and so on. There were five other symbols for blanks or spaces and for double letters. Wily Gifford knew his way round the underground and highly endangered Catholic community of Tudor England and he made various detours in order to throw off possible pursuers. A good man to have on your side, was Gifford. One problem: he wasn’t on Mary’s side. He was acting as a double agent and for at least a year he had been showing Mary’s letters to Elizabeth’s spymaster-in-chief, Sir Francis Walsingham.
Walsingham had a cipher school going in London with one Thomas Phelippes (Philips) as his main man, who was described at the time as small, short-sighted and ‘slender every way, dark yellow haired on the head, and clear yellow bearded, eaten in the face with small pox’. Phelippes worked on the ‘frequency principle’, matching the frequency of symbols to the frequency of real letters in normal writing, cracked the cipher and the codes, figured out what Babington was up to and told Walsingham. The Tudor regime was extremely well geared up for torturing, disembowelling and executing (in that order) its enemies, in particular Catholics. The point for Walsingham was not simply rounding up a dashing blade like Babington. The real prize was Mary herself. To secure her, they needed Mary’s authorization of the Babington plot, otherwise Elizabeth wouldn’t authorize Mary’s execution. Sure enough, on 17 July 1586, Mary incriminated herself by talking of the ‘design’. Phelippes deciphered the letter and marked it with a gallows sign.
But Walsingham was a belt-and-braces spymaster. He wanted names, more names. So he asked Phelippes to forge a postscript (in the cipher) on Mary’s letter to Babington, saying: ‘I would be glad to know the names and qualities of the six gentlemen which are to accomplish the designment [plot].’ Babington and his pals were ‘cut down, their privities were cut off, bowelled alive and seeing, and quartered’. (For the record, it was their bodies that were cut into quarters, not their bowels or privities.)
Mary tried it on at her trial: ‘Can I be responsible for the criminal projects of a few desperate men which they planned without my knowledge and participation?’ It didn’t wash and she was beheaded in front of 300 people in the Great Hall of Fotheringhay Castle.
The Snowden story is similar to that of Mary Queen of Scots in that it involves the codes and ciphers that are available to the rulers of a country or countries to defend themselves. In another way, though, it is completely different. No matter how suspicious we have been about the visibility of internet communication, many of us probably believed that our passwords were ‘secure’ and that most of our internet ‘history’ got deleted and died. We didn’t invent these encryptions. They were given to us. Part of this false sense of security (literally and metaphorically) is intertwined with what we’ve understood about ‘encryption’. If, like me, you are illiterate in relation to the language(s) by which computers turn keyboard taps into words and images, then ‘encryption’ is a piece of mystical babble. It’s like saying: my account is quite secure because it’s ‘abracadabra-ed’. It turns out that this piece of babble is not only mystical for people like me, it’s also nonsense. It’s not secure at all. Usually, the reason why encryptions are not secure is because extremely clever people unlock them. In this case, though, something different has happened.
One way of relating the story of global power is to tell the stories of how people in power have tried to make their messages secret whilst trying to read the secret messages of others: it’s the history of codes, ciphers and various kinds of encryptions. Novels, films and memoirs have taken us into top-secret rooms and shown us skulduggery in high places, assassinations, lone unhappy geniuses, cranks, saviours and mass murderers. At times, the fate of millions, it’s been suggested, has rested on code-setting or code-breaking. The small-room, top-secret-clique image of encryption still holds good with the Edward Snowden revelation – but with some key differences.
Before the age of the internet, the security services used ‘intelligence’ to locate and observe people. In those days, most people thought that if something was described as ‘confidential’ this meant that it was kept confidential between the participants, whilst knowing that, under extreme conditions, the police or the security services could get hold of it. What’s more, if for any reason you encoded what you said or did, then someone would have to decode it in order to find out what was going on. All this has been wiped away. Now, the ‘intelligence’ has already been gathered. In effect, it’s sitting in the security services’ office, in the huge silos of stored electronic data we provide to the security services.
No electronic communication is confidential. The fact that a piece of electronic communication has been encoded is irrelevant. It doesn’t even have to be decoded – because we’ve handed over the keys to the codes even as we thought we had encrypted or encoded something! We are each a double agent cunningly acting undercover against ourselves on behalf of the security services of one country. Snowden’s name must go down in the new histories of encryption as the man who revealed this.
This chapter is not called ‘C is for Codes’ because of a fiddly technical distinction which I’ll stick to: if I say my real name is Michael Rosen but my undercover name is ‘Alphabetico’, that’s a code. A whole word is substituted. If I find a way of substituting each of the letters of my name with other letters, numbers or any other kind of sign according to a principle or system, that’s a cipher. So, if I write:
A = 1
B = 2
C = 3
D = 4
and so on through the alphabet, I could substitute the ‘M’, ‘I’, ‘C’, ‘H’, ‘A’, ‘E’ and ‘L’ of my name with numbers and write it as:
13 9 3 8 15 12
Alternatively I could write:
A = B
B = C
C = D
and so on with the two alphabets lined up next to each other as I’ve begun to do here. If I use that parallel alignment of alphabets, I could choose to write my messages using the letter that comes after the letter I would normally use.
I could write this as a formula. My cipher is N + 1 where ‘N’ = any letter in the real alphabet and N + 1 takes me to the letter I will use for my ciphered message.
My first name would now be:
Njdibfm
Clearly, you can create ciphers on the principle of N plus any number or N minus any number. You can do this by writing out alphabets on to two strips of paper and sliding one alphabet underneath the other. You’ll need to write the alphabet more than once on the strips so that every letter has a counterpart to a letter on the other strip! This is a good game to play with children.
What you would have created here is known as a ‘monoalphabetic cipher’. In Lives of the Caesars, Suetonius explains that Julius Caesar used a monoalphabetic code. His formula was N + 3.
If you want to turn this into a game, try this, a party trick I have called ‘Cave, Caesar!’ (If you want to pronounce it as it’s thought the Romans pronounced it, you can say ‘Kah-way Ky-sar’ with ‘Ky’ rhyming with ‘fly’. It means ‘Watch out, Caesar!’).
Caesar (probably you) sits with his followers in the room, and Cassius the codebreaker says that whatever cipher (‘code’) Caesar uses he will be able to crack it. He needs to do this, he says, because Caesar is getting too big for his boots and he’s keeping an eye on him. Caesar says that Cassius thinks he’s clever but he’s not that clever. Cassius leaves the room, ready to take on the challenge. Someone can be chosen to stand guard on him to show that Cassius is not cheating by listening to what’s going on from outside the door.
Caesar tells his followers that they are going to choose an object in the room, and they’re going to write it in a ‘code’. He suggests to his followers that they use the N + 3 formula which is his favourite and no one has ever cracked it yet. Caesar and his followers choose an object, let’s say it’s ‘table’. Make sure that it’s a suggestion from one of the followers and not from Caesar. Vote on it so that it’s obviously not been chosen by Caesar. Caesar shows his followers how to make the two strips of the alphabets and apply the formula by sliding the strips. This will deliver ‘table’ as ‘wdeoh’. Hide the strips.
Call Cassius back into the room. Cassius sits down and watches Caesar’s hand. When Caesar hands over the ciphered message ‘wdeoh’, he does so with three fingers on the paper but in a way that the others won’t see. Cassius reads that as ‘N + 3’ and cracks the code, putting on a great show of staring at the letters and doing magic signs and various kinds of hocus-pocus. Cassius then warns Caesar and his followers that he knows everything he’s up to and he had better watch out: ‘Cave, Caesar!’
Someone in the room may say that Caesar and Cassius obviously worked this out beforehand. So suggest that Cassius goes out again. Choose another object. Change the formula to N + any other number. Call Cassius back, revealing this new number with the same method, leaving your fingers on the page when you hand over the ciphered message.
Now, we can step up the complexity of this, if you have either the mind or the machine to do it. What you can do is change the formula each time you write a letter. So, you could decide to start with N + 1 for the first letter, then N + 2 for the second and so on all through the message you want to send. Or you could make it more complicated by using any sequence of numbers to decide how you make the cipher. You could use your phone number or the repeated use of your flat or house number.







