Chapter 1: Clueing You In about Codes and Cryptograms
13
In Eastern Asia, the use of idiograms (picture writing) in such
languages as Chinese made it impractical to use ciphers (sub-
stitutes for letters). However, real codes were sometimes
used. For example, in 11th century AD China, one military
code was based on the 30 words of a particular poem. Each
word corresponded to a brief message, like “need more bows
and arrows.” A single word of the poem would be sent as the
message from one commander to his superior.
The rebirth of learning during the Renaissance, which continued
in the Enlightenment, saw a great increase in the use of codes
and ciphers in the Western world. The emergence of the central
text of Kabbalah, the Zohar, in about 1300, led many Christian
scholars to look into the use of gematria to detect secret mean-
ings in sacred writ. The publication of Agrippa’s Three Books of
Occult Philosophy in 1531 did a great deal to spread the use of
special alphabets to conceal secret religious writings because
Agrippa was the first to publish together in tabular form the
magical alphabets called “Celestial,” “Malachim” (Hebrew for
“angels”), and the enigmatically named “Passing the River.”
These magical alphabets were republished centuries later in
Francis Barrett’s popular work, The Magus (1801), through which
these alphabets became a permanent part of the landscape of
esoteric and magical studies. (You can try some of these magical
alphabets in Chapters 6 and 8.)
But it is the worlds of politics and military actions that have seen
an explosion of activity in the area of secret writing over the last
600 years. The destinies of nations have hung on the making and
breaking of codes. For example, the attempt by Mary Queen of
Scots to take the British throne from Elizabeth I of England in
1585 collapsed when the cipher used by her conspirators, led by
Anthony Babington, was broken by Elizabeth’s agents.
As cryptography made and unmade nations in Europe, it did
the same in the New World. For example, in the American
Revolutionary War, a wide variety of cryptographic techniques
(including ciphers, code books, and invisible inks) was used on
both sides. The same is true of the use of cryptography during
the American War Between the States, or Civil War.
Cryptography and the Great Wars
During the wars of the 20th century, cryptography came to
determine the destiny, not just of nations, but of the globe.