Can a Computer Crack the Beale Ciphers?

  • Thread starter Thread starter Jaziel
  • Start date Start date
  • Tags Tags
    Computing
AI Thread Summary
The discussion centers on the potential for computers to decipher the first and third ciphers of the Beale Ciphers, which remain undeciphered. Success in cracking these ciphers may hinge on locating the specific edition of the book used as the key for encoding. The digitization of old texts could facilitate this process, but issues such as OCR errors and the preservation of text formatting complicate matters. The Beale Ciphers operate as book ciphers, where words are represented by their positions in a text, making knowledge of the original document crucial for decryption. While there is skepticism regarding the authenticity of the ciphers, with some suggesting they could be a hoax, it is acknowledged that the ciphers themselves might still be genuine. The effectiveness of cryptanalysis will depend on the key length used in the encoding process, with shorter keys posing a higher risk of quick decryption.
Jaziel
Messages
14
Reaction score
4
(Please excuse me if this is the wrong section to ask this question) With reference to 'The Code Book' by Simon Singh, will it be possible for a computer to crack the as yet still undeciphered first and third (alleged) ciphers of the famous Beale Ciphers? If so, how might this be achieved? Many thanks.
 
Computer science news on Phys.org
I believe they can't be deciphered until the right edition of the code book on which they based is found.

Nowadays, we have a lot of old books that are digitized so i suppose an algorithm could be designed to test each book against the two texts to see if we get something understandable.
 
Jaziel said:
... will it be possible for a computer to crack the as yet still undeciphered first and third (alleged) ciphers of the famous Beale Ciphers?
It is still possible, but it will depend on the length of the key employed to generate the transformation. A computer may convolve the cipher text into several different plausible texts, without giving any indication if the original is actually included in the set.

In order to be productive, a cryptanalyst should balance their work on several ciphers at the one time. That way there will be some success, even if some ciphers have insufficient depth, or are deliberate hoaxes. It is not unusual to find faked ciphers, designed to waste the time of otherwise competent cryptanalysts, or to make money selling dreams of great treasure.

jedishrfu said:
Nowadays, we have a lot of old books that are digitized so i suppose an algorithm could be designed to test each book against the two texts to see if we get something understandable.
The digitisation of books is not helpful if the page, line, word spelling, ligatures and hyphenation is not preserved. The order of digitised blocks of text are not preserved in common digitised file formats, and there are often invisible errors in OCR and the distribution of spaces, that confound the use of what otherwise appears to be a true facsimile.
 
The Beale cipher is a form of book cipher. The encoder numbered the words in a document and when he needed the word he'd write down its number.

THE BOOK
1-The 2-quick 3-brown 4-fox 5-jumped 6-over 7-my 8-lazy 9-dog.

THE CIPHER
so if I wrote 7 8 9 5 6 1 3 4 you could decode it as:

THE ANSWER
My lazy dog jumped over the brown fox.

Basically you need to know the basis text document as standard statistical based cryptoanalytics won't work.

https://en.wikipedia.org/wiki/Beale_ciphers
https://en.wikipedia.org/wiki/Beale_ciphers
There is also a belief that the ciphers are a hoax perpetrated to sell the pamphlets that advertised them.
 
It has been pointed out that even if the Beale papers are a hoax, the two undeciphered ciphers themselves could still be genuine ciphers. There's no treasure at the end of the day, that's all. A possible alternative, mentioned by Simon Singh (I think?) is that the Beale papers are genuine and that Thomas Beale deliberately scrambled parts of the two ciphers for added security.

Baluncore said:
It is still possible, but it will depend on the length of the key employed to generate the transformation.

That is very interesting. Just how short can the keytext of a book cipher be without risking quick decryption?
 
In my discussions elsewhere, I've noticed a lot of disagreement regarding AI. A question that comes up is, "Is AI hype?" Unfortunately, when this question is asked, the one asking, as far as I can tell, may mean one of three things which can lead to lots of confusion. I'll list them out now for clarity. 1. Can AI do everything a human can do and how close are we to that? 2. Are corporations and governments using the promise of AI to gain more power for themselves? 3. Are AI and transhumans...
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...
Back
Top