{"title":"Can musical encryption be both? A survey of music-based ciphers","authors":"D. Code","doi":"10.1080/01611194.2021.2021565","DOIUrl":null,"url":null,"abstract":"Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded extra-musical content by means of musico-alphabetic correspondences. The cryptographers were generally interested in presenting many varieties of cryptographic methods of which ciphers incorporating musical notes were a very small part. The systems used by the former were usually so superficial they should not really be considered encryption; whereas the systems used by the latter were so mechanical that most would not consider the results to be music. Musical encryption can rarely be both because the attributes needed for convincing musicality and strong encryption are not mutually conducive. However, after examining these music-based cryptosystems in detail, I will consider what criteria might be necessary to create a reasonably secure cipher which produces a normatively-musical output and apply these in the form of an original music-based cipher. For most of the ciphers, interactive web applications have been developed which render plaintext into enciphered melodies.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"318 - 364"},"PeriodicalIF":0.3000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptologia","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1080/01611194.2021.2021565","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 1
Abstract
Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded extra-musical content by means of musico-alphabetic correspondences. The cryptographers were generally interested in presenting many varieties of cryptographic methods of which ciphers incorporating musical notes were a very small part. The systems used by the former were usually so superficial they should not really be considered encryption; whereas the systems used by the latter were so mechanical that most would not consider the results to be music. Musical encryption can rarely be both because the attributes needed for convincing musicality and strong encryption are not mutually conducive. However, after examining these music-based cryptosystems in detail, I will consider what criteria might be necessary to create a reasonably secure cipher which produces a normatively-musical output and apply these in the form of an original music-based cipher. For most of the ciphers, interactive web applications have been developed which render plaintext into enciphered melodies.
期刊介绍:
Cryptologia is the only scholarly journal in the world dealing with the history, the technology, and the effect of the most important form of intelligence in the world today - communications intelligence. It fosters the study of all aspects of cryptology -- technical as well as historical and cultural. The journal"s articles have broken many new paths in intelligence history. They have told for the first time how a special agency prepared information from codebreaking for President Roosevelt, have described the ciphers of Lewis Carroll, revealed details of Hermann Goering"s wiretapping agency, published memoirs - written for it -- of some World War II American codebreakers, disclosed how American codebreaking affected the structure of the United Nations.