Secret Messages in Historical Fiction

Secret Messages in Historical Fiction

But boxes and chests and paintings and physical things are bulky. What if one needed to send a message that could be easily concealed by the messenger but not easily read if it was intercepted? Invisible writing – using citrus juice or milk as ink – could hide a message which would be revealed only when the paper was heated. Citrus juice or milk might not always be close at hand, though. That’s where coded messages come into play. Encryption (encoding a message) goes back as far as Julius Caesar, who used simple alphabetic substitution. His trusted allies knew that he always used an offset of three, meaning that the letter “D” would be substituted for “A,” so they could decode the message easily while his enemies, presumably, would remain confused.
In the Second Son Chronicles, Alfred (the protagonist) and his grandfather are both students of Roman history, so they know about Caesar’s method. When, in Second Son, Alfred needs to send an urgent message to his grandfather in secret, he encodes it as Caesar would have:Vxqgdb qhaw. Dwwdfn hduob pruqlqj dv phq dzdnh. Wzhoyh phq lq jdqj. Udqxoi, vrqv, vla qhz lq jdqj, Urqdq dqg vtxluh. Doiuhg
He knows his grandfather will recognize the garbled message for what it is and will know how to make sense of it. But what other precautions does he take to make sure his message isn’t intercepted. In Pestilence,Alfred faces an entirely different impediment to communicating with his friends while avoiding the prying eyes of his brother’s spies. His solution may surprise you. As the series progresses, Alfred’s lifelong interest in books and learning will lead him to new discoveries about secret communications. He finds a book from the ninth century by an Arabic mathematician that introduces the idea of polyalphabetic substitution. This concept uses a table like this:

The recipient would know that the first letter represents the row or column to be used for decoding – in this case, “M.” Throw away the first letter and then decode the rest of the message. The lovely thing about this method is that is doesn’t matter if either the sender or the recipient chooses a row or a column for the encoding and decoding. The results come out the same either way. And, just like the Caesar cipher, the sender or recipient can construct the code table when they need it and doesn’t have to carry anything with them that might fall into the wrong hands.
Follow the series to learn how Alfred puts that new knowledge to use and who he shares it with.
Published on July 07, 2020 05:30
No comments have been added yet.