Cryptology (SECRET CODES) with Simon Singh - podcast episode cover

Cryptology (SECRET CODES) with Simon Singh

Jun 04, 20251 hr 15 min
--:--
--:--
Listen in podcast apps:
Metacast
Spotify
Youtube
RSS

Summary

Join cryptology expert Simon Singh to unravel the history and science of secret codes. Discover ancient methods like steganography and substitution ciphers, learn how frequency analysis helped crack codes like Mary Queen of Scots', and delve into the mechanical marvel of the Enigma machine and the groundbreaking work at Bletchley Park. Explore the evolution of public key cryptography, the role of Indigenous code talkers, famous unsolved mysteries like the Voynich manuscript and Beale cipher, and ponder the future challenges posed by quantum computing and AI.

Episode description

Secret ciphers. Hidden treasure. Enigma breakers. Mysterious manuscripts. And … hog Latin. Cryptology expert and author of “The Code Book,” Simon Singh finally lets me ask him about the small mistakes that lost huge battles, the prison plots of Mary Queen of Scots, a cryptology reality show that I wish existed, the legacy of Alan Turing, Indigenous code-talking war heroes, hiding messages in your skin and guts, the role of A.I. in future deciphering and the possibility of a quantum computing apocalypse. Also: one whole ball of wax that you do not want to get into. 

Visit Dr. Singh’s website and follow him on Bluesky and X

Browse Dr. Singh’s books including The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, available on Bookshop.org and Amazon

A donation went to GiveWell

More episode sources and links

Smologies (short, classroom-safe) episodes

Other episodes you may enjoy: Egyptology (ANCIENT EGYPT), Momiology (MUMMIFICATION), Curiology (EMOJI), Graphology (HANDWRITING/FORGERY), Anagnosology (READING), Oneirology (DREAMS), Salugenology (WHY HUMANS REQUIRE HOBBIES), Architectural Technology (COMPUTER PROGRAMMING), Neurotechnology (AI + BRAIN TECH), Artificial Intelligence Ethicology (WILL A.I. CRASH OUT?), Abstract Mathematology (UH, IS MATH REAL?)

Sponsors of Ologies

Transcripts and bleeped episodes

Become a patron of Ologies for as little as a buck a month

OlogiesMerch.com has hats, shirts, hoodies, totes!

Follow Ologies on Instagram and Bluesky

Follow Alie Ward on Instagram and TikTok

Editing by Mercedes Maitland of Maitland Audio Productions and Jake Chaffee

Managing Director: Susan Hale

Scheduling Producer: Noel Dilworth

Transcripts by Aveline Malek 

Website by Kelly R. Dwyer

Theme song by Nick Thorburn

Transcript

Oh, hey, it's the sweatshirt that you will never get back from them. Allie Ward. And I have wanted to cover secret codes and cryptology for years and years. And I thought one day I'll go to Maryland. and interview someone at the National Cryptologic Museum. And then I realized that it's run by the National Security Agency. And I was like, they're going to be tight-lipped. They're not going to give it the goods. So then a little more digging unearthed a better...

more perfect guest, the guy who wrote the literal book on code breaking titled The Code Book, The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Done. He's in. He's a PhD theoretical particle physicist by training, an author by trade now, and has worked at CERN. And the BBC even made a BAFTA-winning documentary about a mathematician called Fermat's Last Theorem.

He's also the author of the books Big Bang, The Origin of the Universe, and The Simpsons and Their Mathematical Secrets. He knows so much about the function and history of secret ciphers and code breaking and has several additional... honorary degrees and he joined the video chat with a salt and pepper mohawk and for some reason a mic and earbuds that refused to play ball with our recording software.

Enigmatic indeed. So our first introduction was amid an absolutely horrific amount of tech diffs. And I was pretty sure he hated me. Thank you for spending a half hour troubleshooting. I swear that is not. Typical at all. No, no, no. These things happen. But look at that. Brilliant.

and forgiving. So let's get to this great convo. But first, thank you so much to all the patrons who support the show at patreon.com slash ologies where you can join for a simple dollar a month and submit your questions ahead of time. Thank you to everyone who is buying and wearing ologies merch.

from ologiesmerch.com where we have some lovely shirts and stuff thank you to everyone who leaves reviews for me to read and as proof that i do read them they help so much thank you to jen gm 017 who wrote long time ology here still cannot get enough. And for anyone complaining about explicit, it's in the description. So check out Smologies instead.

Thank you for reminding listeners that, yes, we have a G-rated and we have shortened episodes. They're called Smologies. They're in their own feed wherever you get podcasts. They're linked in the show notes. Look at that. A review and a reminder about Smologies all at once. Perfect. Okay. But for now... Enjoy this full-length conversation about slip-ups that lost wars, the cracking of the Enigma machine.

hog Latin, pig pen ciphers, the prison plots of Mary, Queen of Scots, a code-breaking reality show that I wish existed.

Indigenous code talking war heroes, hiding messages in your skin and guts, plus one method that's a whole ball of wax you might not want to get into, hidden treasure, a quantum computing apocalypse, and a sketchbook that has puzzled people for nearly a thousand years with mathematics enthusiast, best-selling author, award-winning filmmaker, and secret code expert and cryptologist Simon Singh.

So cryptology, we obviously we've never done this topic. That's how it works here. But I know very little about code, but you've written an entire book on it. And I'm curious why. cryptology? What caused you to research and go back to the history of cryptology and do a steep dive?

So two reasons, really. I'd written a book. My first book was called Fermat's Last Theorem, or Fermat's Enigma, I think it was called in America. And it was the story of the world's most notorious maths problem. And it was a 350-year-old romp through... mathematics and somewhere in there was the story of cryptography during the second world war particularly alan turing the british mathematician who cracked the enigma code and his story

and the story of cryptography and how it changed the course of the second world war was something i just wanted to explore more so what was a few paragraphs in fermar's enigma turned out to be a whole chapter in the code book and also previously i've been working on a tv show in the uk called tomorrow's world and every week it was a magazine show so every week we were going through lots of different science and technology stories

And each week I'd come up with a story about codes or code breaking or, you know, the internet was kind of just beginning to take off. So these were really important and interesting stories, but they weren't very visual. So my TV editor never accepted my cryptography stories. But I had a whole folder full of them. And I could see that cryptography was more important today than ever before. And so you have this topic with a fantastically long history.

And something which, you know, we live in the information age today. And the way you protect information is not really by locking it up in a safe. You do it by locking it up with a code. Were you always a maths person? Yeah, I was. I'm a physicist by training. But if you want to do physics, you have to be a mathematician. And as a science journalist, I was covering all sorts of different things for Tomorrow's World. So I have a broad interest.

and the interesting thing about cryptography is it is very mathematical particularly today but it's also about linguistics it's also about all sorts of different things so as a writer it's lovely to have a topic which ranges so broadly and that was one of the tricky things about writing the book was you know which parts of history do you focus on which parts of the globe do you focus on

So Simon's book, The Code Book, The Science of Secrecy from Ancient Egypt to Quantum Cryptography, is highly lauded and 432 pages. And yet... Were you absolutely heartbroken at having certain chapters or pieces that you just had to cut out or else it would be like a book of biblical proportions? Yeah, absolutely. No, there were huge chunks that got thrown out. I was fascinated by the decryption of ancient languages.

So something like hieroglyphs. The decryption of hieroglyphs is an extraordinary story. And unless you can read hieroglyphs, you can't really read into the history of the Egyptians. It's a lost story unless you can read their texts. Just a side note, if you're into hieroglyphs, we have an Egyptology episode as well as a mommyology episode about mummies with Egyptologist Dr. Kara Cooney. Oh, we also have a curiology episode about emoji and what they mean, depending on who you...

them and their similarities and major differences to hieroglyphs. So we'll link those in the show notes. But yeah, let's talk ancient codes and language. Are they the same? Simon says. And I had chapters also about the Mayan codes and so on. But you know what? It's not really a code. A code for me is where you deliberately obfuscate the meaning of something.

So I'm sending you a secret message. I don't want anybody else in the world to read it. So I encrypt it so only you and I can read the message. Now, Egyptian hieroglyphs were not a code in that sense. They were written as a form of communication.

and it's just that we've forgotten how to read them. So you have to use code-breaking techniques to read hieroglyphs to crack the code, but it wasn't ever meant to be a code. Same with Morse code, for example. Morse code is not a secret way of communication.

It's an efficient way of communication for the telegraph. We didn't have to crack the Morse code. We knew how it all worked. But the use of the word code in most of the things I write about are things which were hidden, that the meaning has been hidden from the reader.

from the reader who's not supposed to be spying. I was wondering, because that was my first question, what's the difference between a code and a language? Is language meant to communicate, code is essentially meant to not communicate? Is that like a chief distinguishing difference?

Yeah, I think that's a good way of putting it. And today, encryption goes beyond just hiding the meaning of a message. So, for example, I might send you a secret message and I don't want anybody else to read it. That's a traditional form of encryption.

But sometimes I want to make sure that you've read it and you can't deny that you didn't read it. So that's important as well. And sometimes I want to guarantee that I sent the message so that you can't accuse me later on of not sending you the message. And sometimes I want to make sure that not only do you get the message, but nobody changed it on the way. So if you imagine voting in an election, I want to make sure that you know I cast my vote.

I want to make sure that you can't deny that you didn't receive the vote. I want to make sure the vote wasn't changed and I want to make sure the vote is secret. So today we have... different aspects to cryptography, all of which are important in different situations. I'm curious how far back you found that it goes. And is that a philosophical question? Is there anything to suggest in the development of language that at some point it was

turned into a cipher or a code, I imagine so much of that has to be war-related, right? Well, I think to start with, so few people can read that you don't really need to bother encrypting. Writing itself is almost a secret code. But once you start having military plans or one of the first examples of encryption is a recipe for a pottery glaze in ancient Sumeria. So somebody's come up with a fantastic recipe for pottery glaze and they don't want anybody else to steal it.

And this was around 1500 BC. It was like the Colonel Sanders original recipe of 11 herbs and spices of ceramics. So those are the kind of things that start emerging. As I say, hieroglyphs are just a way of writing. But sometimes people would write hieroglyphs in a very, very cryptic way on the tombs of important people. And the idea there was that as people passed the tomb, rather than just reading it and walking on.

they'd have to spend time there in order to decrypt what was going on. So you kind of got extra reverence from those passers-by, yeah. That's so sweet and also so sad. They're like, don't go, don't go, don't go. Here's a puzzle. Exactly, exactly. Make your final resting place a mausoleum escape room. But then there's one other type of thing which is maybe worth talking about, which is if I encrypt a message and I send it to you and somebody intercepts it, it looks like gobbledygook.

so they know that i'm sending you a secret message because this just doesn't look normal so there's another technology maybe we can call it called steganography and steganography doesn't just really hide the meaning of the message, it hides its very existence. Oh, wow. So here we're talking about things like invisible inks. If I send you a message on invisible ink, nobody even knows the message exists.

And typically, I don't send you a blank sheet of paper. I maybe send you a normal postcard about my holiday. But in between the normal ink are writing invisible ink. Wow. So it looks like a very normal postcard. And in fact, the invisible ink is what's got the real message. It was a very nice invitation to... a military cryptography conference in san antonio this is going back maybe 40 years and it looked like a very innocent

sketch of the river. I guess it's the San Antonio River that runs through the town. I don't know my geography very well, but the way you're supposed to read it is if you look at the blades of grass along the side of the river bank.

no there are long blades and short blades and so if you turn the long blades and short blades into instead of long long long short short short you turn them into dot dot dot dash dash dash you have a morse code message which tells you when the conferences happening where you're supposed to go and so on so these are examples of steganography and my favorite example actually loads of these examples one is the message will be written on silk you wrap the silk into a wax ball

And then you swallow the ball. So again, nobody knows there's a message at all. So my morbid curiosity led me to a DePaul University paper titled simply, Steganography, which notes that, quote, there are quite a couple of sources that mention this technique that the Chinese used, but no one mentions how the ball of wax was recovered from the messenger. It continues, one is only left to imagine the possible...

and probably painful ways the ball could have come out. Okay. Or, even crazier, I think Herodotus, the Greek historian, writes about a messenger who had his head shaved. They tattooed the message on his scalp. waited for the hair to regrow and then sent him on his way. And then at the other end, you shave the head and recover the message. And I remember talking about this once and somebody said, it's a great code, but it's very low bandwidth.

Not going to be a great way to transfer much information very quickly, but effective. Also, it's a long game. You're in it for a while. Yes, yes. I suppose that messenger has one message and one message only to carry. Do you remember what that message was? Or did they do a lot of communicating through tattooed heads?

Oh, I think it was possibly so remarkable, which is why maybe Herodotus wrote about it. Maybe it was an exception rather than the rule. So yes, one low commitment method of steganography might be using a wax writing tablet. it back then but writing a message on the wood underneath the wax which is very sneaky or yeah embedding a note via ink into the flesh of a trusted servant and because I'm nosy I wanted to find out what that

great tattoo message was. And according to the 1999 historical paper, Information Hiding, a survey, there was a passage that said, the purpose was to instigate a revolt against the Persians. Just like people love doing fighting. And it's never a bad year to get inked. This practice continued with German cryptography, according to the 1940 text, Secrets of German Espionage. But how do you make sure that no one else sees the tattoo head?

message if you don't have time for your hairstyles like awkwardly grow back well you could do a cover-up or a revision tattoo kind of like turning a blurry college era astrological sign into a hummingbird or covering up your ex-wife's name with a dragon or you could just kill the servant or the soldier whose head you

used as a notepad. Can you imagine if it was just a pottery glaze recipe? You'd be like, all that for life. Well, okay, basic question. Is Pig Latin a code? Does that count as code or language? Now I have, what is pig Latin? It's when you put the last syllable, it's like itty-gay, bitty-gay, you know what I mean? Ah, right. What are you studying at college? Pig Latin.

Yeah, I mean, that's another nice thing about codes. They're childish in many ways. We all wrote secret codes when we were a kid, and I've got a couple of kids, and they certainly had their invisible inks and other secret messages that we used to write. And so, yeah, it's a playful code, absolutely.

And this kind of code is also sometimes called an argo or a cant. And in the case of pig Latin, you pretty much take the first letter and you move it to the back of the word and add an A. So cat becomes at K, ball becomes all bay, yarn. becomes Arnie. Fae becomes something you could say around Grandma. And Pig Latin is also called Hog Latin. But it is not the same as the written system of Pig Pen. There's a very nice code called Pig Pen.

which you just reminded me of, which is you draw two tic-tac-toe grids. Yes, kind of tic-tac-toe grids. And then you put the letters in, instead of X and Y, you put A, B, C, D, E, F, G. And if you imagine A is in the top left-hand corner of a tic-tac-toe grid, instead of writing the letter A, you would write kind of backwards L.

because the A is inside a kind of backwards L. E is in the middle of the tic-tac-toe grid. So E is represented by a square because the E is wrapped around by a square. Oh, okay. Picture two tic-tac-toe grids. and then two big x's so in tic-tac-toe grid number one are the letters a through i in grid number two

are the letters J through R with some extra dots thrown in. Now, in the first X, you have S-T-U-V, like northeast, southwest, and the second X has W-X-Y-Z with some extra dots. So whatever... the shape around the letter with dots if need be becomes a cipher and you can make secret words just using those shapes. It's easily crackable if you know

this pig pen cipher and absolutely useless garbage shapes if you don't. I'm a big fan. Pretty cool. So there are lots of lovely little codes that you can invent yourself or that have been used for literally hundreds of years. You know, I was surprised. One thing I love about the way your book is structured is how much history it goes through. So there's so much narrative and stories. Mary, Queen of Scots, I didn't know this about her code. Can you tell me a little bit more about that?

why that was such an interesting thing that you wanted to include? Yeah, sure. Absolutely. So the most famous type of code that we probably used as kids is you substitute one letter for a different letter. And in fact, Julius Caesar, I think Julius Caesar wrote about codes quite extensively when he was a general of Gaul in France.

explained that instead of writing A, I'm going to write B. Instead of writing B, I'm going to write C. Or I could shift it even more. I could shift the alphabet five places or ten places. But essentially, he was swapping one letter for a different letter. you can change that substitution cipher. You can make it better. Instead of just shifting every letter, you can just randomly swap the letters around. So A is E, B is D.

Z, C is Y, and so on. You mix up all the letters, essentially. And that's really quite a strong code in some ways. There are so many ways of rearranging the alphabet. There are so many ways of randomly swapping letters around. I think it's something like 400 million billion billion. It's extraordinary. So on the face of it, it looks like an unbreakable code.

And this is the kind of code that Mary Queen of Scots used. Now, why was she using codes? Well, she was Mary Queen of Scots. She fell out with her rivals. She was driven out of Scotland. She fled to England. and sought safety and sanctuary from her cousin, Queen Elizabeth I. I love my family. Now, Queen Elizabeth I wasn't particularly keen on Mary because Mary was a Catholic and Elizabeth was a Protestant.

And Elizabeth feared that Mary might try and trigger a Catholic rebellion, possibly invite foreign invaders from France and Spain and usurp her throne. For safety, Elizabeth put Mary in prison and she locked her up. And that was it. Now, while she was locked away in prison, she had a secretary and she had a few people around her. While she was in prison, she started writing.

treacherous letters she did start writing to these foreign powers particularly spain and she was saying look let's coordinate some kind of rebellion invade britain invade england and let's turn england catholic again put me on the throne and get rid of elizabeth now she wrote these letters using this kind of code where you substitute each letter for a different letter or a different symbol perhaps and she smuggled the letters out

via beer barrels. Water was so contaminated at that time that it was much safer to drink a very diluted form of beer. that was kind of just the general thing you would drink day in day out and so these beer barrels were coming in and out of the prison these notes were smuggled out in these beer barrels now

Elizabeth had spy masters who knew exactly what Mary might be up to. So they would intercept these beer barrels and they would intercept the messages and they could decode the messages. They knew how to crack. this simple substitution site and that shouldn't have been a surprise to mary because uh this code had been cracked about a thousand years ago. We're talking about the 16th century for Mary, Queen of Scots and Elizabeth, but it had been cracked in the 10th and 11th century in Baghdad.

There was a guy called Al-Kindi, an Arabic philosopher, mathematician, and he realized that every letter has got a personality. How so? So E, for example, is very common. It's the most common letter in English.

13% of all letters are E. Oh, wow. And if you disguise E by drawing it as a diamond, well, then the diamonds are going to be really popular and common, and therefore you know the diamond really is an E. If you have two symbols that... only ever follow each other so you know a square that only ever follows a circle well that could be q and u because you know q is always followed by a u

Also, words have personalities, so the is the most common three-letter word. So if you apply this kind of personality analysis to the letters or symbols in front of you, you can very rapidly decipher a message. But according to the 2022 paper, Al Kindy, the father of crypto analysis, if the letter of the encrypted message K has a frequency in the encryption equal to about 10%,

probably the K of the encrypted message corresponds to an E in the decoded message. And thus, it says within a few attempts, the encrypted message can be resolved. So that rate at which a letter appears in regular language is the personality of the letter. And it can be applied to the encrypted message to find that connection. And based on those and spelling patterns.

the spies could be onto you. Also, apparently, your choices were to die of thirst or have dysentery or just be drunk all the time. So maybe this wasn't Mary's best work. So Phillips, I think it was Thomas Phillips, was Elizabeth's. By master, he decrypted this message that he'd intercepted from Mary. The message was clearly asking for the Spanish to invade. Elizabeth then had the evidence she needed to then put

Mary on trial for treason. She was put on trial, found guilty and executed. So busted. Which kind of put an end to any hopes of a Catholic revival in England.

And so it's an example of a match of life and death, changing the course of history, all because a code was broken. Does that make switching letters of the alphabet? You can do it mathematically a lot of ways, but that's... easy to break yeah absolutely absolutely you know it's one of those things if you checked every permutation if you checked every one of the 400 million billion billion permutations you'd spend the age of the universe

you know, trying to crack a code. But there's a shortcut. You just look at the message and you say, well, there are all these diamonds. They've got to be E's. Second most common symbol, that's probably going to be a T. Third most common symbol is going to be an A. And once you've got a handful of symbols.

you can begin to decipher the whole message. The whole thing just falls into your hands very easily after that. But I think one of the analogies I use in the book is to describe cryptography as a bit like the battle between bacteria and antibiotics you know we have these antibiotics and they're great for killing off a certain bug but then the bugs evolve to become stronger and no longer

killed by the antibiotics so scientists have to go away and make clever antibiotics until the bacteria become immune again so there's constant evolutionary battle between bacteria and antibiotics and it's the same in codes and code breaking you know i make a code somebody else breaks it i have to make a better code somebody breaks i have to come up with an even cleverer code so what happened here

As you said, the simple substitution cipher can easily be cracked once you figure out this personality analysis, this frequency analysis. So one simple step forward is If E accounts for 13% of all letters, if I use a diamond for E, then diamonds appear 13% of the time, and I know that a diamond is really E. But if I use 13 symbols to represent E, then each of those symbols only appears 1% of the time.

And let's say B appears 3% of the time. Well, if I use three symbols to represent B, then again, each symbol appears 1% of the time. You flatten out all the frequencies and that becomes a much, much tougher code to break. Hence, Al-Kindi was also known as the pioneer of statistics, and this was back in the year 800, so 1,200 years ago.

Some days, I can't remember my bank pin, and I was the one who said it. It's between me and me, and I still can't crack it. And I'm assuming that the person on the other side, the receiving side, they've got this on lock. They know exactly that there's 13 different E's. They're not left having to bust it either, right? You agree on it ahead of time? Yeah, and that's a really important point. There's something called the key. The key is...

the recipe for encryption and it's the recipe for decryption. So if I'm sending you a message, I need to have a key which I share with you and which I don't want anybody else to steal. So we could jump ahead because... I think the most extraordinary thing about cryptography is it seems impossible. It seems as though if you're going to decrypt a message from me, you have to have my key. And you're on the other side of the ocean.

So how on earth can I get this key to you? And particularly today, you know, when we're encrypting our credit card details, data's flying all over the globe. You don't see people running around distributing keys everywhere. This is something people had to do for hundreds of years.

Keys, in this sense, meaning the secret instruction manual to the code, like a legend of a map. But for the sake of explanation, keys are a great analogy. So the British government would have to send keys to its diplomats all over the world. in suitcases literally having to physically transfer them around the world navy ships would have to come back to port to pick up the keys so that they could communicate with their port so for hundreds of years key distribution was a real pain

It's expensive and risky. You know, if somebody hijacks the guy who's distributing the keys, then they can read all your secret messages. So key distribution is expensive, it's slow, it's risky. But it seems unavoidable. It seems as though you and I cannot communicate secretly unless I give you the key in advance and that's slow, risky and expensive. And yet today, somehow we managed to do it. Today.

We found a way around it, and this is an incredible breakthrough. How does that work? Let me try and explain to you how that works. Let's imagine I want to send you a message, and I'm going to put the message in a box, and I put a padlock on the box.

and I lock it with a key and I send it to you. Okay. Now you can't open the box and read the message because I've still got the key. Yeah, that sucks. I don't want to send the key to you because that's slow, expensive, and risky. So how can we avoid it? Well, this is what we can do. You, your end, you've got this box that's locked. You can add a second padlock to the box, your padlock with your key, and you send it back to me.

Now, I've got a box with two padlocks. How does that help? Well, I can take my padlock off because I've got my key. I can send the box back to you. It's still secure. It's still padlocked, and it's padlocked with your padlock. Ah, nice. And you can then unlock it, open the box and read the message. Nice. Daisy chain. Yeah. So suddenly something that was impossible becomes, actually, it's not so difficult.

after all but there's even a cleverer way of doing it which is i have a padlock and a key and i make a million copies of my padlock and i distribute it all over the world Let's imagine you're trying to send me something now. You go to your local post office, you say, can I have Simon Singh's padlock? You snap the padlock shut on the box, because you don't need a key to shut a padlock, it just snaps shut.

You send it to me and I've got the key already to open it. So we're not distributing the keys. We're just distributing the padlocks. Got it. And again, I think it was in the 1970s. this technology was invented. It's a mathematical padlock that we'd be talking about. That was invented by three guys at what we call GCHQ. You've got the NSA, you have the National Security Agency. We have the Government Communications Headquarters.

And three people there invented this mathematical padlock. One of them was a chap called Clifford Cox, who I actually got to meet. And he was working at GCHQ. He'd only just started there. He was in his 20s. He was a young Cambridge maths graduate. And he went home one evening and he started thinking about how would you invent a mathematical padlock? And he came up with the idea. He came up with the whole mathematics and he came up with it entirely in his head.

He couldn't write down anything because when you work for GCHQ, you're forbidden from writing down anything at home. that relates to your work oh my god so he had to go to bed that night he wouldn't forget the mathematical idea and then rushed into work early the next day and wrote it all down it's literally the greatest cryptographic breakthrough in a thousand years and then and then having explained it to his colleagues he couldn't tell the rest of the world because

The British government made it confidential. They felt this was just too big a breakthrough to share with the rest of the world. But it was then rediscovered a decade later in California. by Whit Diffie and Martin Hellman. And they are the people who then share that technology with the rest of the world. Okay, who cares? What does this mean for you?

It's what's really enabled the internet to take off in terms of financial transactions, secure databases, sharing information securely. We can do that today because we don't need to run around sharing keys. instead we can run around sharing these well we don't need to run around we can just share our mathematical padlocks

And if you were dying to know what system Clifford Cox came up with just off the dome, it was prime factorization, which led to a public key crypto system. And because Wikipedia is not written in any kind of secret code. I'm going to read you what it told me about this to make this brief, which is in a public key crypto system, the encryption key is public and distinct from the decryption key, which is kept secret or private.

Okay, so the public key is based on these two large prime numbers. Anyone can use the public key, but it can only be decrypted by someone who knows the private key. And you know what mathematical genius and cryptologic comprehension can get you? Well, sometimes nothing.

Sometimes worse than nothing. And we're going to hear about that later. But in the case of Clifford Cox, it got him the title of Companion of the Order of the Bath and then Fellow of the Royal Society. Simon himself is now in the most excellent order of the British Empire. But yeah, Clifford Cox was struck by this inspiration in 1973. And it wasn't until the method was declassified from its top secret status in like 1999 that he was recognized for it.

I wonder what he was doing when he came up with that. Was that like a shower thought or, you know, you're washing dishes and you have a great idea? Yeah. you know a lot of mathematicians talk about the idea of really thinking hard for a problem thinking about a problem really deeply for hours and hours and then suddenly when

they relax and suddenly maybe the brain goes into a kind of instinctive mode. Suddenly, clarity emerges. And yeah, it seems to have been in one of those moments that the mathematical padlock was invented. So as we learned from the oneurology episodes on dreams, this is when the brain shifts to the default network. And we also did a two-part cellulogenology episode on hobbies and why leisure activities are vital if we don't want...

to lose our marbles. But going back a few decades. What about mechanics? Like, when did things become mechanical? When did a code-breaking machine sort of emerge? And how did Turing do what he did? without the computer power that we have now? So I think cryptography develops because, you know, I break your code and I need a better code. Cryptography also develops as a result of communications technology advancing.

So when the telegraph was invented, we needed more secure forms of encryption. You know, the British Empire was being run by people in London sending messages over telegraph lines across the world. And then when the radio was invented... Again, we needed even better forms of communication because somebody on a battlefield could send a radio message over hundreds of miles and send lots of information in just a few seconds. So we needed even more effective encryption.

that was rapid and secure and so what you have in between the first and the second world war is the idea of the encryption machine a mechanical machine and something looks a bit like a typewriter where you type in a message And it gets encrypted automatically by the cogs and wheels inside the machine. And the Americans worked on one, the Dutch worked on one, the Swedes had an encryption device, and the Germans had one as well.

But all of these companies really struggled because there wasn't a huge need for secret communication. And so all of these companies were gradually going bankrupt apart from the German one. The Enigma was designed by a guy called Arthur Sherbius because just as his company was struggling, Germany started gearing up for what would be the Second World War. War, it's great for business.

And Germany began to buy these Enigma machines, not just for every army unit, but for every naval ship, for every air base, for every train station, and so on. Hundreds and thousands of these Enigma machines were made and distributed, and they were essential for the German concept of Blitzkrieg. coordinated attack you have bombardment from land you have attack from the air and then ships off the coast also bombarding so this coordinated kind of attack is only possible if you've got secure

effective rapid communication. So again, you have a key. And that means that, because we're going back to the era where people had keys, how do you set up your Enigma machine? And again, if I'm sending you a message on an Enigma machine, you have an Enigma machine. I didn't know what an Enigma machine looked like before this. And honestly, it's hard to picture something whose name means mystery or riddle. But yeah, these 1940s secret message machines.

They look like a regular QWERTY vintage typewriter with keys, but where the paper would be scrolling up, there are a few more rows of buttons with the alphabet on each button, and each button can light up. Now above... those two rows of buttons, are a few turning sawtooth cogwheels that have numbers 1 through 26 on them. Now, you don't need to know all the electrical engineering. Trust me. it's complex but essentially when

A key is pressed at the bottom. Electrical signals travel through a mess of kind of tangly wires inside each of those wheels, which can turn the next wheel's mess of wires. And if you press... like let's say the letter K, that letter K will be changed. via the wires and via the turning cogs seven times before spitting out a new letter which illuminates on that row of buttons and it all depends on the settings on the machine so one person usually would be

pushing the keys to spell something out and the other is writing down which button lights up. Then they send that series of lighted buttons as text over Morse code to the receiver. So it turns a series of letters or into Absolute jibber-jabber unless you knew exactly how the rotors were dialed and what was plugged in where when that message was typed. And the configuration of the machine was changed daily according to this printed log.

It was kept in a safe. And then each day they would burn that day's instructions. Oh, and there was another. three-letter code to encrypt each individual message. So overall, these wheels and plugs can be arranged in some calculate, I think, 151 trillion ways, and they change daily. So it is a horrifying... terrifyingly complicated and swiftly moving target that's relaying information that is life and death to people.

Breaking the enigma is like if Satan wrote Sudoku puzzles and then if you didn't get it, he swallowed your children. There are rotors that you need to put into place. You need to select the right rotors. You need to orientate them in the right way. It's got a plug board, a bit like an old-fashioned telephone plug board, switchboard. You have to plug those cables in correctly. You have to plug those in.

correct way and if you and I have the same setup and obviously we agree the key in advance then we can communicate with each other but for everybody else it's impossible to guess our key. The number of combinations is just too vast. And things like frequency analysis and the personality of letters is just useless. This code was so utterly strong.

Everybody gave up hope of ever trying to crack it. Actually, the only people, the only country that had the audacity to try and crack the Enigma was the Poles. Poland was in this desperate situation of being trapped between Germany on one side and Russia on the other. We understand. And the Poles knew that they were going to get invaded sooner or later. And so...

They set their best mathematicians at the task of trying to crack the enigma. And this was before the war even started. They were working on this. And they made some progress. They made some crucial progress. And those breakthroughs were smuggled out of Poland to Paris and from Paris to London. And it gave the British code breakers a real head start in trying to break the enigma.

The British set up a code-breaking center outside of London called Bletchley Park, where they hired a whole... weird bunch of people from crosswalk addicts to mathematicians to engineers to classic scholars and they all worked at Bletchley trying to break the enigma but also lots of other codes from Japan and Italy and also Germany. Imagine if a reality show cast a bunch of the best nerds and made them live in an English countryside mansion trying to defeat...

the Nazis. I would watch that in a heartbeat. Also, around 75% of the people working at Bletchley Park were women employed as translators, cryptographic operators.

They constructed and operated some of the world's first programmable electric computers. And one of these... bletchley park nerds was named valerie and she had a granddaughter who you are not supposed to call kate middleton because according to the internet her granddaughter's name is her royal highness the princess of wales but yeah tons of folks

including Valerie, worked at this 9,000-square-foot manor on 58 acres like a wartime period piece set in a hazy, cigarette-smoky, vintage computer lab. Alan Turing was one of those mathematicians. He was one of the mathematicians who worked on the Enigma. He and many others came up with a whole series of ways of trying to crack the Enigma. One of the weird things...

One of the ways that the Enigma was broken was that when you type the letter A into an Enigma machine, it can be encrypted as any other letter except the letter A. Okay, which doesn't seem like a big problem because A can be encrypted into 25 other letters. B, similarly, cannot be encrypted into a B, but it can be encrypted into any of the other 25 letters. So that's fine.

Except there was a letter that was once, a message that was once intercepted. And the code breakers at Bletchley Park looked at this message. And it was a mess of different letters. all different letters that look like complete gobbledygook, except there wasn't a single W in the encrypted usage. So you've got 300 characters, but not a single W.

And the code breakers looked at that and they thought about it for a while. And then they realized the only way you can get a message, an output message with no Ws is if the input message is just W 300 times. Oh, wow. If I type it W 300 times, I'm going to get everything except W 300 times. And so they'd crack the code.

That's not the most interesting message in the world. It's just W300 times. But what that gives you, once you know the output of the message, what you have in your hand, and once you have the input, which is W300 times. You can then work out the settings of the machine for that day. The same machine settings were effectively used for the whole day. So now you can decipher all sorts of other messages sent that day which are more interesting.

For example, one of the messages that was sent that day that was intercepted and deciphered was about an attack on the British fleet in Alexandria. And the British fleet were warned. And the result was the first Allied victory in the Mediterranean because the Enigma had been broken and because the Navy, the British Navy now had advanced notice of this attack on Alexandria. So some Nazi fucked up bad.

thankfully. Now that kind of maybe raises the question of why would somebody send the message W300 times? It seems like a pointless message. The reason somebody sent W300 times is If you've got an unbreakable code, I can't read your messages, but what I can do is count how many messages you sent. And if you said one on Monday, one on Tuesday, one on Wednesday, 20 on Thursday. I know something big is going to happen on Friday.

So this would be a real tell, to have a sudden flurry. Like imagine if you texted someone once a day, but then suddenly you got 45 messages from them in an hour. You'd be like, story time, what's happening? Because your communication suddenly peaked. So you combat that by sending 20 messages every day. And then what we call the traffic is then flat.

So when that person sent W 300 times, they were just sending their quota of messages for the day. They were just trying to build up their quota. Had they sent a random message, if they just randomly typed with two fingers, it would have been fine. But that W300 times compromised the security of the Enigma. What Turing did that built on this was he said, you know, maybe we won't be lucky enough to have W300 times again. You can't rely on that.

But we can rely on the fact that maybe we can guess the beginning of a message. If the message is going to Berlin, maybe the message reads Heil Hitler. If the message comes from a weather station at the Atlantic. Maybe it starts off with pressure readings or wind directions. We can always guess a little bit of the message. And if we can guess a little bit of the original message, we can compare it with what came out the other end.

and begin to narrow down what the keys might be. And Turing designed a machine called a BOM that could effectively use a little bit of the input, a little bit of the guest message, what's called a crib. against what was intercepted to try and identify what the key actually is. And the bombs were very effective. The bombs managed to work out the key on most days pretty rapidly. And I know we're talking about the theater of war in the 1940s. So the word bomb...

It's a little distracting. But a bomb with an E at the end was a machine used to try to break the Enigma's code. And a bomb got its name. Well, this is also a source of... battle the etymology of it but some legends say that the mechanized rotors made a ticking sound like a bomb others said parts would sometimes fall off and make a very startling crashing noise on the floor

There's this other legend that tells the tale of a cryptologist eating this round shaped ice cream dessert and getting inspiration from that. But it doesn't matter as much as the messages deciphered through it. So the Allies. then just kind of knew where the ships were in the Atlantic, where air raids were going to happen at night, where armies were going to be moved to. It gave the Allies a huge advantage in trying to win the war.

I have some questions from listeners. Can I lightning round you with some of them? Yes, sure. They are great questions. And we will hear from them in a moment. But first, let's give away some money per Simon. And this week, he chose GiveWell.org, which vets and researches the most impactful charities and then grants accordingly. And donations go to the most reliably high impact.

and cost-effective charities that they've identified, such as malaria prevention, childhood vaccination incentives, and vitamin A supplementation. You can learn more at givewell.org. So thank you, Simon, and sponsors of the show for making that possible. Okay, we're back. Let's crack into your queries. Many of you had pop cultural cryptological questions such as Cooper Michael, Mouse Paxton, Addy Capello, Matt Zaccato, first time question asker Chris F. And Bree asked...

In the movies you often hear or see of people cracking these secret codes so quickly or without much research. How often does that happen in real life? How often do you come across some sort of secret code where it's that easy to just decipher versus how long does it take? to actually decipher. Does that ever piss you off about movies when someone cracks a code like instantly? Well, the codes we have today are effectively unbreakable. You know, we live in a golden age of encryption.

You can't break any of these codes. There is a fear that we have new computing technology, quantum computing, might break some of today's codes. And that would be disastrous because... Our economic systems would begin to collapse. Giant corporations like Amazon would no longer have a business model if you can't send secure online payments. But encryption today, it's unbreakable.

It's absolutely unbreakable. You and I can buy free software and send each other secret messages that nobody in the world could ever decrypt. But there is more information being sent around the world than ever before. And inevitably, some of it is going to be badly encrypted. Maybe people will make silly mistakes. And so I think the code breakers are really looking for those slip ups and those mistakes.

Because if the code is implemented properly, it's almost an impossible task. So no, it is not as easy as you see in the movies. For now. But more than one person had singularity and super position questions, such as first time question asker Paul S.R. Chris Holm. Computer scientist and security engineer Stephen Moxley, John Buckner, Mark Rubin, M. Rowe, Maximilian Galindo, Jan Bundesman, Post, Qubit, Concern, Joshua, YYZ, Adam Foote, Pafco34, Raya the Tiger, Katze, and Adam Silk said how.

How worried should people be about quantum cryptography and quantum computers breaking encryption? It's a very important question, but like we were saying a while ago... Throughout history, if somebody breaks a code, they don't necessarily tell the world about it. So when the British cracked the Enigma, they didn't tell the Germans that. They wanted the Germans to keep sending information via Enigma so they could keep intercepting it and exploiting it.

And it's a little bit the same with quantum computing today. We don't really know how advanced the technology is getting, particularly, say, in China. So I think people are right to be worried as to where... what the future of secure communication might be. There are some other options. There's something called quantum cryptography, which would combat quantum computing, but it's much harder to implement.

And so it's not quite clear that quantum cryptography would provide us all with the same level of secure communication that cryptography today does. Are you looking for up-to-date info on this? How about an article published last week via New Scientist with the headline, Breaking encryption with a quantum computer just got 20 times easier. But it does concede in the first paragraph that these machines don't exist yet. But when they do...

it is going to be way easier for them than we thought. And by we, I mean the people who make quantum computers. And then yesterday, the conversation posted an article titled, Is a Quantum Cryptography Apocalypse Imminent? That's casual. In it, Information Security Group professor Keith Martin explains that the most common ways of encrypting information that we use will be impacted less than that public key encryption that we talk about.

talked about earlier, the one that Clifford Cox worked on that's used in messaging and shopping transactions. And public key cryptography is also at the heart of cryptocurrency, which cryptocurrency, it's a... form of money that's decentralized from different nations' currencies. And the public key for that is like your wallet and the private key can open your wallet. And I know that we need a whole episode on cryptocurrency because I'm not going to make it make sense in an aside.

And that's OK. But the point of this is to say that Keith Martin writing about the imminent crypto apocalypse answers his own headline question by writing that those in the know fight about it all the time. They fight about if and when quantum computing is going to be up and running. And right now, the most advanced quantum computing is able to handle tiny amounts of info and it's prone to screwing up a lot.

Keith says that most experts believe it's a future possibility, but the prognoses range from between 10 to 20 years to well beyond that. And he also writes, my core message is don't panic. Okay, Keith. But also no one expected AI to go from like putting cat ears on an Instagram filter to effortlessly generating a video of your dead ant twerking. But here we are. Life. comes at you fast. Now, let's look back to the past instead, all right?

Oh, look, another war, but an interesting story. So Jordan Crosby, first time question asker, wants to know, what's been the lasting impact of the Navajo code talkers? How did they choose Navajo over other languages? And this was also voiced by their... patrons, Katie Biardi, John Worcester, Emma O.E., Nikki G., Dawn Smallcheck, Dave Brewer, H., and Capybara Gall. They all asked about ciphers and codes developed from and relying on indigenous languages.

And going backwards in time a little bit, Jordan Crosby, first time question asker, wanted to know about the lasting impact of Navajo. code talkers and how they chose Navajo over other languages. Was that a pretty isolated instance of using language to crack? codes in English or any thoughts on that? So the first example I think was in the First World War, where I think some of the Canadian troops used Choctaw, which was a language which nobody else could understand.

Well, people of the Choctaw Nation could understand it, at least those who... were not forced away from their families and cultures in the indigenous genocide upon which our country is built. Also, side note, the people of the Navajo Nation didn't call themselves Navajo. That was a name used by the Spanish to describe them.

You may hear the more accurate term Diné used by that nation. And we've had some great indigenousologists who touch on this and we'll link their episodes in the show notes. But yes, code breaking. When the Americans thought about using Navajo as a secret language. for some of the forces in the Pacific, first they thought, well, what would be the right language to use? What right group to work with? And they needed a tribe that was big enough.

to supply the men that would be needed. They needed a tribe that had a high level of literacy as well. And they needed a tribe that hadn't been studied by German anthropologists. you know that would have again compromised the code so that's why the navajo were chosen and so you had these navajo soldiers who would travel with every uh radio unit and all the messages would be given in navajo

spoken to another Navajo speaker at the other end, who would then translate them back into English. And of course, nobody in the Pacific arena could understand Navajo. So it was a truly unbreakable code and it was highly effective. And yeah, it's one of the great stories of the Second World War.

And yes, they used their languages just spoken, but also as a base for ciphers, substituting words in their native language for letters in the English alphabet to spell out messages. And North America being home to this broad... range of native languages, it was difficult for enemies to learn or guess which ones were being used. But many nations were tapped to lend their heritage and language and skill in co-talking.

Were they given parades after World War II? No, of course not. All of this remained classified into the late 1960s. And in the decades that followed, some of the surviving co-talkers were awarded Medals of Honor for their services. And for more on this history, we're going to link the Smithsonian National Museum of the American Indians documentary, The Power of Words, Native Languages as Weapons.

of war. That one focuses on the Hopi nation's role. And there's also PBS's 2019 documentary, Secrets of the Code Talkers, The Warrior Tradition, which also explores how indigenous nations helped win the war by scrambling up sentences. Speaking of words, I don't know. Let's talk Voynich. This is the name of a manuscript. written on calfskin sometime in the 1400s. It was discovered by a Polish book collector. His name was Wilfrid Wojnicz. Wojnicz? Wojnicz?

Either way, it was on the minds of patrons John Buckner, Kurt Swanson, Eric Kay, Yngwie, Jennifer Grogan, Baz Bugmeier, Felipe Jimenez, and... How about Aaron White wants to know if you've heard of the Voynich manuscript, secret code, language, horseshit? Yeah, there are lots of these very peculiar codes, one-off codes. This is an ancient manuscript, not so ancient, a few centuries old. We don't know. why it was written and we have no idea really what it talks about

So yes, this priceless and legendarily mysterious text now lives in New Haven, Connecticut. It's at Yale's Rare Book and Manuscript Library. And it was inherited by Voynich's widows. friend in the late 1960s. No one was interested in buying it. She was like, I inherited this from my friend's husband. And they're like, Annie, nobody wants it. So she donated it to Yale.

But now you have to know someone who knows someone important to glimpse it in person. Although Yale was kind enough to digitize the 213 page butte in 2020. No one knows. what the writing means or what it says, but there are drawings of flowers and titties in it. And we're going to link that in the show notes in case you are the code cracking genius it's been waiting 800 years for, or if you just like drawings.

of everything from plants to bloodletting. Now, if you love that kind of stuff, also, we have a recent episode on illuminated manuscripts called medieval codicology. We also have a mammology episode, but yeah. It's anyone's guess. Some people think it was a hoax or just a really creative or unmedicated person. And so the Voynich manuscript is one that often gets discussed.

There's the Beale cipher, which is about a couple of cowboys in America who discovered gold out west and brought it back. And there are secret messages that say where the gold is buried, but nobody's ever been able to crack the messages or find the gold.

So just a quick note on this, a guy named Thomas Beale supposedly left a lockbox with an innkeeper in 1820 and in it were three coded texts describing the location in Virginia of a treasure worth now from what I gather around a hundred million dollars. No one has been able to crack the texts one or three, but text two was based on the first paragraphs of the U.S. Constitution. And it was a heads up about how much gold and jewels and silver were buried somewhere.

deep in Bedford County. So how did people even find out about this? Well, years after Beale left the lockbox at the inn and never showed up again, the innkeeper was finally like, enough of this crap, and opened it up, and it contained these three pre-coded texts. And then eventually a friend of the innkeeper was like, let's publish and sell a pamphlet describing that it's the key to treasure and people who buy this pamphlet can try to decode it.

But here's the thing. Even the most modern and sophisticated code breakers and programs have not been able to crack texts one and three. And some people think it was all a hoax with text two and the inventory of all the treasure. Easily crackable, but the location text being absolute random numbers and just a good story to sell these pamphlets. Essentially, some people think it's an old-timey clickbait prank. But...

Time will tell. Who knows? There's an ancient metal disc called the Phaistos disc, which again, nobody's been able to read. And then there are some ancient languages which still remain.

unbroken which we still can't read and one of them is called linear a nobody can make head nor tail of what linear a means or knows can understand what the alphabet is or even the language I looked up this ancient 4,000-year-old script from the extinct language of ancient Crete, and honestly, it looks like the alien squid language from the movie Arrival, or like abstract brushstroke art.

in a hotel lobby. Like, what the heck is this shit? But Linear B was cracked, I think in the 50s, by a guy called Michael Ventress, building on the work of an American woman called Alice Koba. also in league with a guy called John Chadwick. Several people all head down on this linear B. And John Chadwick, I interviewed him shortly before he died. And I said, John, you're a classic scholar at Cambridge.

How did you get into deciphering ancient languages? Why was that the thing that obsessed you? And he told me that he'd worked at Bletchley Park with the code breakers in the Second World War alongside Alan Turing. Oh, wow. And he never told anybody that he'd been a Bletchley Park codebreaker because all of those people were sworn to secrecy. Again, everybody keeps their secrets. Yeah. But that work in the Second World War.

led directly to inspiring Chadwick to crack Linear B. What a flex that he kept hidden, you know what I mean? Some people be bragging up and down in the pubs about that. Yeah, no, it's an incredible thing, the story of Bletchley Park. When the war ended, everybody went back to their lives and got on with their day-to-day work. Alan Turing, for example, went to work on computing, as well as being an incredible co-breaker. He's the father of computer technology.

computer theory, computer science. And the thing was that later on, he was a homosexual and the government was aware of that. And so he wasn't given the clearance required to work on certain projects. He was sidelined. He went to Manchester and did some incredible work in Manchester. And then he was arrested.

Because he was found with a man and I guess found guilty of indecent behavior or some such accusation. He was found guilty. He was given hormone treatment and chemically castrated. And eventually... just took his own life and when he died virtually nobody was aware not even his family were aware of the incredible work he'd done

in terms of changing the course of the Second World War. And now he's celebrated and recognized and people are aware of the crime that was committed against him. And in fact, I was very proud to be part of a panel. The governor of the Bank of England, Mark Carney, who I think now is hoping to be Prime Minister of Canada. Mission accomplished. He was governor of the Bank of England. He wanted to have a scientist or a mathematician on the new £50 banknote.

possibly one of our last ever bank notes, depending how money goes. We were on a panel and our proposal to him was that Alan Turing...

beyond the new £50 note. So it's great to say if you're lucky enough to have a £50 note in Britain, Alan Turing is the person on it. Because not only did he change the course of the Second World War, not only was he a mathematician of epic... you know epic achievements in mathematics not only did he you know was he the father of computer science but he also pioneered you know a lot of the concepts within artificial intelligence so you know it's great that he's now on our 50 pound note

But the fact that he did so much for the world and suffered so greatly is something that no one should forget, especially as we see LGBTQ people under baffling and increasing hostility from political regimes. And the future can only get better if people learn from the past. Speaking of darkness and the future. You know, on the topic of artificial intelligence, two more listener questions, if you don't mind.

We talked a little bit about quantum computing, but several people wanted to know what role AI might have in modern cryptology. On the real-life squishy brains of Dabe Philip Meter, Cass the dog nerd, Megan Walker, Stephanie Coombs, Kate E. Quinn West, Corey, and Sarah Rossero, who asked, can AI solve secret codes? If so, should we unplug it now?

And are we getting much closer to that? I think the modern codes are so utterly unbreakable that artificial intelligence won't make any difference. It's just the sheer computing power is just not there. to have any impact on secure communication. But AI could have, you know, an impact on trying to crack ancient codes, ancient messages or ancient languages. where it's not about lacking computer power, it's about lacking that vital insight or it's about getting all of the texts that are available.

and looking for patterns. Code breaking is about pattern recognition and AI is terrific at pattern recognition. Yeah, some people wanted to know why do some people... really excel at like escape rooms and things like that. Some people, some of us are just great at that. Some of us myself are not. But let's talk about stuff he hates, or at least his least favorite. Patron Kat, you're going to love this one.

So there's a code which I didn't actually write about in the code book because the code book was published. There was another book out at almost the same time. In fact, it was at the same time because we were both kind of in the top 10 bestseller list and we were kind of competing against each other. And it was called The Bible Code. So there was my book, The Code Book, and then there was The Bible Code. And The Bible Code was getting a lot of attention. And the idea in The Bible Code...

was that there are encrypted messages in the most ancient Hebrew manuscripts. And it's a very intriguing idea. The book was written by a guy called Michael Droznan. So Michael Droznan wrote this book called the Bible code. And the way you find these encrypted messages in the ancient Hebrew text is you put all the letters out in the form of an array, in the form of a grid. And you look for Hebrew letters that are equally spaced in a straight line. Okay.

So you don't read it left to right or right to left, I suppose. You're looking for diagonals. You're looking for lines going in all different directions that are equally spaced. And when you do that, something really weird happens. You find these messages, not just messages, but predictions that actually turned out to be true. You find the word Newton crossing with gravity. It's kind of extraordinary.

you find the word Kennedy, Dallas, assassinate. No. Yeah, yeah, 100% true. Absolutely. No word of a lie. Take the most ancient Hebrew texts, put them in a grid, look for these patterns, and these predictions emerge. Literally hundreds and hundreds of predictions, every single one has come true. I've got goosebumps. Now, a mathematician...

in Australia said, you know, I'm not sure I quite believe this. So he got another book, not the Bible, but he got Moby Dick. He said, you know, Moby Dick is a huge text. It's about the same size as these ancient manuscripts. What happens if I apply the same algorithm to Moby Dick? And he looked at Moby Dick, he put all the letters in Moby Dick in a grid, in an array. He looked for letters that are equally spaced in a straight line.

And exactly the same thing happened. He found hundreds and hundreds of predictions, all of which came true. There's one about the death of Diana, Lady Diana, Princess of Wales, Rhodes, Skid. the passenger who was killed with her, Dodie, Dodie, the name of the driver, Henri Paul, they all appear in Moby Dick. So the bottom line is that books are big objects. They contain millions of letters.

That's millions of starting points, millions of ways you can jump around, millions of different diagonals you can find. And when you have so many possibilities... You will find anything you want to find. It's purely, it's about the law of large numbers or the laws of large combinations. So you'll find everything.

ever happened, everything that won't happen, everything that will happen. It's all there in any large tech. So that's kind of one of my favorite codes and one of the codes I really hate, I suppose. Could it point to a simulation or it's really just chance? You get enough letters, you're going to get some messages. That's really the point, right? My favorite coincidence, you put your finger on it, it's really about coincidences.

Shakespeare's Hamlet quotation, to be or not to be, that is the question. If you take that wonderful soliloquy and you juggle the letters around... you get the following anagram. You get the anagram which is in one of the Bard's best thought of tragedies, our insistent hero Hamlet queries on two fronts about how life turns rotten, which is a perfect summary of the entire play. built from an anagram of its most famous soliloquy. So yes, Seattleite.

graphic designer and anagram enthusiast Corey Calhoun sat down about 15 years ago and thought, I wonder if you can anagram Hamlet's speech. And within just a few hours took... The Shakespearean text, to be or not to be, that is the question. Whether tis nobler in the mind to suffer the slings and arrows of outrageous fortune and...

Then he anagrammed that and it spells out, in one of the Bard's best thought of tragedies, our insistent hero Hamlet queries on two fronts about how life turns rotten. Way to go, Corey. Who knew all of those letters could spell all of those words? I now follow Corey Calhoun on Instagram because I think that that's so cool. And he is probably wondering why a podcast lady wants to see pictures of his kids and cakes. Let him wonder.

And you can either say, well, gosh, wasn't Shakespeare amazing that he could build in these incredible puzzles? But he just wrote so much stuff that eventually these weird coincidences will happen. Oh, I've never heard that. And I love it. Is there any codes that you ever keep an eye on? Like, when are they going to crack that one? Gosh. The one that people write to me the most about is the Beale code, the Beale cipher. Everybody...

regularly on a monthly basis, somebody thinks they've cracked the Beale cipher. That was the old-timey treasure buried in the Virginia foothills, which made a fortune for the anonymous pamphlet maker. To which the reply is, well, if you've cracked... the Beale cipher, then show me where the gold is. That's the ultimate, whether someone's cracked it or not. So yeah, that's the one that people still seem to pursue. Well, maybe they've got it in a double padlocked.

treasure chest yeah absolutely absolutely or maybe somebody's found the treasure stolen it and as we say the whole world of cryptography is full of secrets and so maybe you doubt about it when you have discovered uh the gold i would keep that under a tight heavy lid i don't think i'd tell i wouldn't go out tweeting about it um well this has been so wonderful to talk to you thank you so much for

My pleasure. It's been nice to kind of think about cryptography all over again. And we started off talking about ancient Sumerians and their pottery glazes. And we've come all the way up to the internet and padlock boxes. So that's great. cryptological people cryptic and sometimes illogical questions because what fun is a cat

unless it's out of a bag. So thank you so much, Dr. Simon Singh, for humoring me with so many not smart questions. You can enjoy some of his other work, like the BBC documentary and book Firma's Last Theorem, other books such as The Simpsons. and their mathematical secrets and trick or treatment.

alternative medicine on trial. His social media is linked in the show notes as is his website, which is just his name dot net. And we are at ologies on blue sky and Instagram. I personally am at Allie Ward on both. We have shorter kid friendly episodes called small. you can subscribe to wherever you get your podcasts. They're also linked in the show notes.

Join our Patreon and submit questions before we record at patreon.com slash ologies. We have merch at ologiesmerch.com, including hats and bathing suits and totes and gifts for the cute little weirdos in your life. Thank you to Erin Talbert for admitting.

Neologies podcast Facebook group. Aveline Malik makes our professional transcripts. Kelly Ardwire does the website. Noelle Dilworth is our lovely scheduling producer. Susan Hale puts it all together as managing director and deciphering my transcripts into an actual episode are our brain.

editors Jake Chafee and lead editor Mercedes Maitland of Maitland Audio. Extra editing by the wonderful Jarrett Sleeper of Mindjam Media who helped out in a pinch for me because I had a mic malfunction late at night on some of the asides. You may have noticed it, you may not have.

because he is great at helping out. And also he's married to me, so he had no choice. Nick Thorburn orchestrated the theme music. And if you stick around to the end of the episode, I'll tell you a secret. And first off, if you are stuck and annoyed, about that Pig Latin clip from earlier. What are you studying at college? Pig Latin.

You wouldn't know a thing about that, would you? Oh, only. Two fun facts about it. It's from an old Three Stooges clip called Three Little Pigskins. And the pig Latin spoken was, what are you doing tonight? And then she says, no. And it features a little-known actress in a part of one of her earliest roles. Her name was Lucille Ball.

she was blonde in it which really threw me also i could not not sign off with another low message don't work on this if you're driving 5 22 5 18 25 20 8 9 14, 7, 9, 19, 1, 19, 5, 3, 18, 5, 20. 21, 14, 20, 9, 12, 25, 15, 21, 12, 5, 1, 18, 14, 9, 20. Bye bye. Pachydermatology. Homeology. Cryptozoology. Litology. And technology. Meteorology. Now you can break the code.

This transcript was generated by Metacast using AI and may contain inaccuracies. Learn more about transcripts.
For the best experience, listen in Metacast app for iOS or Android
Open in Metacast