Ologies with Alie Ward - Cryptology (SECRET CODES) with Simon Singh

Episode Date: June 4, 2025

Secret ciphers. Hidden treasure. Enigma breakers. Mysterious manuscripts. And … hog Latin. Cryptology expert and author of “The Code Book,” Simon Singh finally lets me ask him about the small mi...stakes that lost huge battles, the prison plots of Mary Queen of Scots, a cryptology reality show that I wish existed, the legacy of Alan Turing, Indigenous code-talking war heroes, hiding messages in your skin and guts, the role of A.I. in future deciphering and the possibility of a quantum computing apocalypse. Also: one whole ball of wax that you do not want to get into. Visit Dr. Singh’s website and follow him on Bluesky and XBrowse Dr. Singh’s books including The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, available on Bookshop.org and AmazonA donation went to GiveWellMore episode sources and linksSmologies (short, classroom-safe) episodesOther episodes you may enjoy: Egyptology (ANCIENT EGYPT), Momiology (MUMMIFICATION), Curiology (EMOJI), Graphology (HANDWRITING/FORGERY), Anagnosology (READING), Oneirology (DREAMS), Salugenology (WHY HUMANS REQUIRE HOBBIES), Architectural Technology (COMPUTER PROGRAMMING), Neurotechnology (AI + BRAIN TECH), Artificial Intelligence Ethicology (WILL A.I. CRASH OUT?), Abstract Mathematology (UH, IS MATH REAL?)Sponsors of OlogiesTranscripts and bleeped episodesBecome a patron of Ologies for as little as a buck a monthOlogiesMerch.com has hats, shirts, hoodies, totes!Follow Ologies on Instagram and BlueskyFollow Alie Ward on Instagram and TikTokEditing by Mercedes Maitland of Maitland Audio Productions and Jacob ChaffeeManaging Director: Susan HaleScheduling Producer: Noel DilworthTranscripts by Aveline Malek Website by Kelly R. DwyerTheme song by Nick Thorburn

Transcript
Discussion (0)
Starting point is 00:00:00 Oh hey, it's the sweatshirt that you will never get back from them. Alley Ward. And I have wanted to cover secret codes and cryptology for years and years. And I thought one day I'll go to Maryland and interview someone at the National Cryptologic Museum. And then I realized that it's run by the National Security Agency. And I was like, they're going to be tight lipped. They're not going to give it the goods.
Starting point is 00:00:22 So then a little more digging unearthed a better, more perfect guest, the guy who wrote the literal book on code breaking titled The Code Book, The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Done. He's in. He's a PhD theoretical particle physicist by training, an author by trade now and has worked at CERN and the BBC, even made a BAFTA-winning documentary about a mathematician called Fermat's Last Theorem. He's also the author of the books Big Bang, The Origin of the Universe, and The Simpsons and Their Mathematical Secrets. He knows so much about the function and history of secret ciphers and code breaking and
Starting point is 00:01:05 has several additional honorary degrees and he joined the video chat with a salt-and-pepper mohawk and for some reason a mic and earbuds that refused to play ball with our recording software. Enigmatic indeed. So our first introduction was amid an absolutely horrific amount of tech diffs, and I was pretty sure he hated me. Thank you for spending a half hour troubleshooting. I swear that is not typical at all. No, no, no.
Starting point is 00:01:36 These things happen. But look at that. Brilliant and forgiving. So let's get to this great convo. But first, thank you so much to all the patrons who support the show at patreon.com slash ologies where you can join for a simple dollar a month and submit your questions ahead of time. Thank you to everyone who is buying and wearing ologies merch from ologiesmerch.com where we have some lovely shirts and stuff. Thank you to everyone who
Starting point is 00:01:58 leaves reviews for me to read and as proof that I do read them they help so much. Thank you to JenGM017 who wrote, long time oligide here, I still cannot get enough. And for anyone complaining about explicit, it's in the description. So check out Smologies instead. JenGM017, thank you for reminding listeners that yes, we have a G rated and we have shortened episodes are called Smologies. They're in their own feed wherever you get podcasts. They're linked in the show notes. Look at that, a review and a reminder about Smologies all at once. Perfect. Okay. But for now, enjoy this full length conversation about slip ups that lost wars,
Starting point is 00:02:38 the cracking of the Enigma machine, hog Latin, pig pen ciphers, The Prison Plots of Mary Queen of Scots, a code-breaking reality show that I wish existed, Indigenous code-talking war heroes, hiding messages in your skin and guts, plus one method that's a whole ball of wax you might not want to get into, Hidden Treasure, a quantum computing apocalypse, and a sketchbook that has puzzled people for nearly a thousand years, with mathematics enthusiast, best-selling author, award-winning filmmaker, and secret code expert and cryptologist Simon Tseng. So, cryptology. We obviously, we've never done this topic. That's how it works here.
Starting point is 00:03:36 But I know very little about code, but you've written an entire book on it. And I'm curious why cryptology, what caused you to research and go back to the history of cryptology and do a steeper dive? So two reasons really. I'd written a book, my first book was called Fermat's Last Theorem or Fermat's Enigma, I think it was called in America. It was the story of the world's most notorious maths problem. It was a 350-year-old romp through mathematics. Somewhere in there was the story of cryptography during the Second World War, particularly Alan Turing, the British mathematician who cracked the Enigma code. His story and the story of cryptography and how it changed the course of the Second World War
Starting point is 00:04:25 was something I just wanted to explore more. So what was a few paragraphs in Fermat's Enigma turned out to be a whole chapter in the code book. And also, previously I'd been working on a TV show in the UK called Tomorrow's World. And every week, it was a magazine show, so every week we were going through lots of different science and technology stories. And each week I'd come up with a story about codes or code breaking or, you know, the internet was kind of just beginning to take off. So these were really important and interesting stories, but they weren't very visual. So my TV editor never accepted my cryptography stories.
Starting point is 00:05:03 But I had a whole folder full of them. And I could see that cryptography was more important today than ever before. And so you have this topic with a fantastically long history and something which, you know, we live in the information age today and the way you protect information is not really by locking it up in a safe,
Starting point is 00:05:20 you do it by locking it up with a code. Were you always a maths person? Yeah, I was. I'm a physicist by training, but if you want to do physics, you have to be a mathematician. And as a science journalist, I was covering all sorts of different things for tomorrow's world. So I have a broad interest. And the interesting thing about cryptography is it is very mathematical, particularly today. But it's also about linguistics. It's also about all sorts of different things. So as a writer, it's lovely to have a topic which ranges so broadly. And that was one of the tricky things about writing the book was, you know, which parts
Starting point is 00:05:54 of history do you focus on? Which parts of the globe do you focus on? So Simon's book, The Code Book, The Science of Secrecy from Ancient Egypt to Quantum Cryptography, is highly lauded and 432 pages. And yet, were you absolutely heartbroken at having certain chapters or pieces that you just had to cut out or else it would be like a book of biblical proportions? Yeah, absolutely.
Starting point is 00:06:20 No, there were huge chunks that got thrown out. I was fascinated by the decryption of ancient languages. So something like hieroglyphs. You know, the decryption of hieroglyphs is an extraordinary story. And unless you can read hieroglyphs, you can't really read into the history of the Egyptians. It's a lost story unless you can read their texts. Just a side note, if you're into hieroglyphs, we have an Egyptology episode as well as a Mamiology episode about mummies with Egyptologist Dr. Kara Kouni.
Starting point is 00:06:50 Oh, we also have a Curiology episode about emoji and what they mean, depending on who uses them, and their similarities and major differences to hieroglyphs. So we'll link those in the show notes. But yeah, let's talk ancient codes and language. Are they the same? Simon says. And I had chapters also about the Mayan codes and so on. But you know what?
Starting point is 00:07:11 It's not really a code. It's not a code for me is where you deliberately obfuscate the meaning of something. So I'm sending you a secret message. I don't want anybody else in the world to read it, so I encrypt it so only you and sending you a secret message. I don't want anybody else in the world to read it. So I encrypt it. So only you and I can read the message. Now, Egyptian hieroglyphs were not a code in that sense. They were written as
Starting point is 00:07:33 a form of communication. And it's just that we've forgotten how to read them. So you have to use code breaking techniques to read hieroglyphs to crack the code. But it wasn't ever meant to be a code. Same with Morse code, for example. Morse code is not a secret way of communication. It's an efficient way of communication for the telegraph. We didn't have to crack the Morse code. We knew how it all worked. But the use of the word code in most of the things I write about are things which were hidden, that the meaning has been hidden from the reader, from the reader who's
Starting point is 00:08:04 not supposed to be spying. I was wondering, because that was my first question, what's the difference between a code and a language? Is language meant to communicate code is essentially meant to not communicate? Is that like a chief distinguishing difference? Yeah, I think that that's a good way of putting it. And today, encryption goes beyond just hiding the meaning of a message. So, for example, I might send you a secret message and I don't want anybody else to read it.
Starting point is 00:08:30 That's a traditional form of encryption. But sometimes I want to make sure that you've read it and you can't deny that you didn't read it. So that's important as well. And sometimes I want to guarantee that I sent the message so that, you know, you can't accuse me later on of not sending you the message. And sometimes I want to make sure that not only do you get the message, but nobody changed it on the way. So if you imagine voting in an election, I want to make sure that, you know, I
Starting point is 00:08:59 cast my vote, I want to make sure that you can't deny that you didn't receive the vote, I want to make sure the vote wasn't changed and I want to make sure that you can't deny that you didn't receive the vote. I want to make sure the vote wasn't changed. And I want to make sure the vote is secret. So today we have different aspects to cryptography, all of which are important in different situations. I'm curious how far back you found that it goes. And is that a philosophical question? Is there anything to suggest in the development of language that at some point it was turned into kind of a cipher or a code? I imagine so much of that has to be war related, right? Well, I think to start with, so few people can read that you don't really need to bother
Starting point is 00:09:41 encrypting. Writing itself is almost a secret code. But once you start having military plans or one of the first examples of encryption is a recipe for a pottery glaze in ancient Sumeria. So somebody's come up with a fantastic recipe for pottery glaze and they don't want anybody else to steal it. And this was around 1500 BC. It was like the Colonel Sanders' original recipe of 11 herbs and spices of ceramics. So those are the kind of things that start emerging. As I say, hieroglyphs are just a way of writing. But sometimes people would write hieroglyphs in a very, very cryptic way on the tombs of important people.
Starting point is 00:10:23 And the idea there was that as people passed the tomb, rather than just reading it and walking on, they'd have to spend time there in order to decrypt what was going on. So you kind of got extra reverence from those passersby. Yeah. So sweet and also so sad. They're like, don't go, don't go, don't go.
Starting point is 00:10:41 Here's a puzzle. Exactly, exactly. Make your final resting place a mausoleum escape room. But then there's one other type of thing, which is maybe worth talking about, which is if I encrypt a message and I send it to you and somebody intercepts it, it looks like gobbledygook. So they know that I'm sending you a secret message
Starting point is 00:10:59 because this just doesn't look normal. So there's another technology, maybe we can call it, called steganography. And steganography doesn't just really hide the meaning of the message, it hides its very existence. Oh, wow. So here we're talking about things like invisible links. If I send you a message on invisible link,
Starting point is 00:11:22 nobody even knows the message exists. And typically I don't send you a message on Invisible Ink, nobody even knows the message exists. And typically, I don't send you a blank sheet of paper, I maybe send you a normal postcard about my holiday. In between the normal ink, I'll write in Invisible Ink. So it looks like a very normal postcard. And in fact, the Invisible Ink is what's got the real message. It was a very nice invitation to a military cryptography conference in San Antonio. This is going back maybe 40 years and it looked like a
Starting point is 00:11:53 very innocent sketch of the river. I guess it's a San Antonio River that runs through the town. I don't know my geography very well but the way you're supposed to read it is if you look at the blades of grass along the side of the riverbank, there are long blades and short blades. And so if you turn the long blades and short blades into instead of long, long, long, short, short, short, you turn them into dot, dot, dot, dash, dash, dash. You have a Morse code message which tells you when the conference is happening, where you're supposed to go and so on. So these are examples of steganography. My favorite example, actually loads of these examples, one is the message would be written
Starting point is 00:12:32 on silk. You wrap the silk into a wax ball, and then you swallow the ball. So again, nobody knows there's a message at all. So my morbid curiosity led me to a DePaul University paper titled simply Steganography, which notes that quote, there are quite a couple of sources that mentioned this technique that the Chinese used, but no one mentions how the ball of wax was recovered from the messenger. It continues, one is only left to imagine the possible and probably painful ways the ball could have come out.
Starting point is 00:13:04 Okay. Or, even crazier, I think Herodotus, the Greek historian, writes about a messenger who had his head shaved, they tattooed the message on his scalp, waited for the hair to regrow, and then sent him on his way. And then at the other end, you know, you shaved the head and recovered the message. And I remember talking about this once and somebody said it's a great code, but it's very low bandwidth. You know, it's not going to be a great way to transfer much information very quickly, but effective.
Starting point is 00:13:32 Also, it's a long game. You're in it for a while. Yes. Yes. I suppose that messenger has got one, messenger has one, one message and one message only is carried. Do you remember what that message was? or do they do a lot of communicating through tattooed heads? Oh, I think it was possibly so remarkable, which is why maybe Herodotus wrote about it. Maybe it was an exception rather than the rule. So yes, one low commitment method of steganography might be using a wax writing tablet back then, but writing a message on the wood underneath the wax, which is very sneaky.
Starting point is 00:14:10 Or yeah, embedding a note via ink into the flesh of a trusted servant. And because I'm nosy, I wanted to find out what that secret tattoo message was. And according to the 1999 historical paper, Information Hiding, a survey, there was a passage that said, the purpose was to instigate a revolt against the Persians. And just like people love doing fighting, and it's never a bad year to get inked, this practice continued with German cryptography,
Starting point is 00:14:41 according to the 1940 text, Secrets of German Espionage. But how do you make sure that no one else sees the tattoo head message? If you don't have time for your hairstyles, like awkwardly grow back. Well, you could do a coverup or a revision tattoo, kind of like turning a blurry college era astrological sign into a hummingbird or covering up your ex-wife's name with a
Starting point is 00:15:06 dragon or you could just kill the servant or the soldier whose head you used as a notepad. Can you imagine if it was just a pottery glaze recipe? You'd be like, all that for life. Well, okay, basic question. Is Pig Latin a code? Does that count as code or language? Now I have, what is Pig Latin? It's when you put the last syllable it's like itty-gay, bitty-gay, you know what I mean? Right. What are you studying at college? Pig Latin. Yeah, I mean that's another nice thing about codes. You know, they're childish in many ways and you know we all wrote secret codes when we were kids and I've got a couple of kids and you know they certainly had their invisible inks and other secret messages that we used to write.
Starting point is 00:15:47 And so yeah, it's a playful code, absolutely. And this kind of code is also sometimes called an Argo or a Cant. And in the case of Pig Latin, you pretty much take the first letter and you move it to the back of the word and add an A. So cat becomes atke, ball ball becomes al-bay, yarn becomes ar-nye, ak-fay becomes something you could say around grandma, and pig latin is also called hog latin. But it is not the same as the written system of pig pen. There's a very nice code called pig pen, which just reminded me of, which is you draw two tick-tack-toe grids. Yeah, it's kind of tick-tac-toe grids. Yes, kind of tic-tac-toe
Starting point is 00:16:26 grids. And then you put the letters in instead of X and Y, you put A, B, C, D, E, F, G. And if you imagine A is in the top left-hand corner of a tic-tac-toe grid, instead of writing the letter A, you would write kind of backwards L because the A is inside a kind of backwards L. E is in the middle of the tic-tac-toe grid. So E is represented by a square because the E is inside a kind of backwards L. E is in the middle of the tic-tac-toe grid, so E is represented by a square because the E is wrapped around by a square. Oh, okay. Picture two tic-tac-toe grids and then two big Xs.
Starting point is 00:16:56 So in tic-tac-toe grid number one are the letters A through I. In grid number two are the letters J through R with some extra dots thrown in. Now in the first X you have S-T-U-V like northeast southwest and the second X has W-X-Y-Z with some extra dots. So whatever the shape around the letter with dots if need be becomes a cipher and you can make secret words just using those shapes. It's easily crackable if you know this pig pen cipher and absolutely useless garbage shapes if you don't.
Starting point is 00:17:34 I'm a big fan. Pretty cool. So there are lots of lovely little codes that you can invent yourself or that have been used for literally hundreds of years. I was surprised. One thing I love about the way your book is structured is how much history it goes through. So there's so much narrative and stories.
Starting point is 00:17:51 Mary Queen of Scots, I didn't know this about her code. Can you tell me a little bit more about that and why that was such an interesting thing that you wanted to include? Yeah, sure, absolutely. So the most famous type of code that we probably used as kids is you substitute one letter for a different letter.
Starting point is 00:18:09 And in fact, Julius Caesar, I think Julius Caesar wrote about codes quite extensively when he was a general of Gaul in France. And he explained that, you know, instead of writing A, I'm going to write B. Instead of writing B, I'm going to write C. Or I could shift even more. I could shift the alphabet five places or 10 places, but essentially he was swapping one letter for a different letter. Now, you can change that substitution cipher. You can make it better. Instead of just shifting every letter, you can just randomly swap the letters around. So a is e, b is z, c is y, and so on. You mix up all the letters around. So A is E, B is Z, C is Y and so on. You mix up all
Starting point is 00:18:46 the letters essentially. And that's really quite a strong code in some ways. There are so many ways of rearranging the alphabet. There are so many ways of randomly swapping letters around. I think it's something like 400 million, billion, billion. It's extraordinary. So on the face of it, it looks like an unbreakable code. This is the kind of code that Mary, Queen of Scots used. Now, why was she using codes? Well, she was Mary, Queen of Scots. She fell out with her rivals. She was driven out of Scotland. She fled to England and sought safety and sanctuary from her cousin, Queen Elizabeth I. I love my family. Queen Elizabeth I wasn't particularly keen on Mary because Mary was a Catholic and
Starting point is 00:19:27 Elizabeth was a Protestant. And Elizabeth feared that Mary might try and trigger a Catholic rebellion, possibly invite foreign invaders from France and Spain and usurp her throne. So for safety, Elizabeth put Mary in prison and she locked her up. That was it. Now while she was locked away in prison, she had a secretary and she had a few people around her. While she was in prison, she started writing treacherous letters. She did start writing to these foreign powers, particularly Spain. And she was saying, look, let's coordinate some kind of rebellion, invade Britain, invade England, and let's turn England Catholic again, put me on the throne and get rid of
Starting point is 00:20:12 Elizabeth. Mm-hmm. Now, she wrote these letters using this kind of code where you substitute each letter for a different letter or a different symbol, perhaps. And she smuggled the letters out via beer barrels. Water was so contaminated at that time that it was much safer to drink a very diluted form of beer. That was kind of just the general thing you would drink day in day out. So these beer barrels were coming in and out of the
Starting point is 00:20:38 prison. These notes were smuggled out in these beer barrels. Now, Elizabeth had spy masters who knew exactly what Mary might be up to. So they would intercept these beer barrels, and they would intercept the messages, and they could decode the messages. They knew how to crack this simple substitution site. And that shouldn't have been a surprise to Mary, because this code had been cracked about a
Starting point is 00:21:08 thousand years ago. We're talking about the 16th century for Mary, Queen of Scotland, Elizabeth, but it had been cracked in the 10th and 11th century in Baghdad. There was a guy called Al-Kindi, an Arabic philosopher, mathematician, and he realized that every letter has got a personality. How so? So E, for example, is very common. It's the most common letter in English. 13% of all letters are E.
Starting point is 00:21:35 Oh, wow. And if you disguise E by drawing it as a diamond, well, then the diamonds are going to be really popular and common, and therefore, you know, the diamond really is an E. If you have two symbols that only ever follow each other, so, you know, a square that only ever follows a circle, well, that could be Q and U, because, you know, Q is always followed by a U. Also, you know, words have personality.
Starting point is 00:21:58 So, the is the most common three-letter word. So, if you apply this kind of personality analysis to the letters or symbols in front of you, you can very rapidly decipher a message. But according to the 2022 paper, Al-Kindi, the father of cryptoanalysis, if the letter of the encrypted message, K, has a frequency in the encryption equal to about 10%, probably the K of the encrypted message
Starting point is 00:22:24 corresponds to an E in the decoded message. And thus, it says within a few attempts, the encrypted message can be resolved. So that rate at which a letter appears in regular language is the personality of the letter, and it can be applied to the encrypted message to find that connection. And based on those and spelling patterns, the spies could be odd to you. Also, apparently your choices were to die of thirst or have dysentery or just be drunk all the time. Maybe this wasn't Mary's best work. Mason- So, Phillips, I think it was Thomas Phillips, was Elizabeth's
Starting point is 00:23:00 spymaster. He decrypted this message that he'd intercepted from Mary. The message was clearly asking for the Spanish to invade. No. Elizabeth then had the evidence she needed to then put Mary on trial for treason. She was put on trial, found guilty, and executed. Oh, so busted. Which kind of put an end to any hopes of a Catholic revival in England. And so, you know, it's an example of a match of life and death, you know, changing the
Starting point is 00:23:29 course of history, all because a code was broken. Does that make switching letters of the alphabet, like, you can do it mathematically a lot of ways, but that's easy to break? Yeah, absolutely. Absolutely. You know, it's one of those things. If you checked every permutation, if you checked every one of the 400 million, billion, billion permutations, you'd spend the age of the
Starting point is 00:23:51 universe trying to crack a code. But there's a shortcut. You just look at the message and you say, well, look, there are all these diamonds, they've got to be E's. Second most common symbol, that's probably going to be a T. Third most common symbol is going to be an A. And once you've got a handful of symbols, you can begin to decipher the whole message. The whole thing just falls into your hands very easily after that. But I think that one of the analogies I use in the book
Starting point is 00:24:15 is to describe cryptography as a bit like the battle between bacteria and antibiotics. You know, we have these antibiotics and they're great for killing off a certain bug, but then the bugs evolve to become stronger and no longer killed by the antibiotics. So, scientists have to go away and make clever antibiotics until the bacteria become immune again. So, there's constant evolutionary battle between bacteria and antibiotics.
Starting point is 00:24:44 And it's the same in codes and code breaking. I make a code, somebody else breaks it. I have to make a better code, somebody breaks it. I have to come up with an even cleverer code. So what happened here, as you said, the simple substitution cipher can easily be cracked once you figure out this personality analysis, this frequency analysis.
Starting point is 00:25:05 So one simple step forward is if E accounts for 13% of all letters, if I use a diamond for E, then diamonds appear 13% of the time, and I know that a diamond is really E. But if I use 13 symbols to represent E, then each of those symbols only appears 1% of the time. And let's say, I don't know, let's say B appears 3% of the time. Well, if I use three symbols to represent B, then again, each symbol appears 1% of the time. So you flatten out all the frequencies and that becomes a much, much tougher code to break.
Starting point is 00:25:50 Hence, Al-Kindi was also known as a pioneer of statistics. And this was back in the year 800, so 1200 years ago. Some days, I can't remember my bank pin and I was the one who said it. It's between me and me and I still can't crack it." And I'm assuming that the person on the other side, the receiving side, they've got this on lock. They know exactly that there's 13 different E's. They're not left having to bust it either, right?
Starting point is 00:26:17 You agree on it ahead of time? Yeah. And that's a really important point. There's something called the key. The key is the recipe for encryption, and it's the recipe for decryption. So if I'm sending you a message, I need to have a key which I share with you and which I don't want anybody else to steal.
Starting point is 00:26:37 So we could jump ahead because I think the most extraordinary thing about cryptography is it seems impossible. It seems as though if you're going to decrypt a message from me, you have to have my key. Okay. And you're on the other side of the ocean. So how on earth can I get this key to you? And particularly today, you know, when we're encrypting our credit card details,
Starting point is 00:27:00 data's flying all over the globe, you don't see people running around distributing keys everywhere. This is something people had to do for hundreds of years. Keys in the sense meaning the secret instruction manual to the code, like a legend of a map. But for the sake of explanation, keys are a great analogy. So, you know, the British government would have to send keys to its diplomats all over the world in suitcasescases literally having to physically transfer them around the world Navy ships would have to come back to port to pick up the keys so that they could communicate with their port So hundreds of years key distribution was a real pain It's expensive and risky, you know, if somebody hijacks the guy's distributing the keys, then they can read all your secret messages.
Starting point is 00:27:46 So key distribution is expensive. It's slow. It's risky, but it seems unavoidable. It seems as though you and I cannot communicate secretly unless I give you the key in advance and that slow, risky and expensive. And yet today, somehow we managed to do it today. We found a way around it. And this is an incredible breakthrough. How does that work? Let me try and explain to you how that works Let's imagine I want to send you a message and I'm gonna put the message in a box
Starting point is 00:28:15 And I put a padlock on the box and I lock it with a key and I send it to you. Okay Now you can't open the box and read the message because I've still got the key. Yeah, that sucks. I don't want to send the key to you because that's slow, expensive and risky. So how can we avoid it? Well, this is what we can do. You, your end, you've got this box that's locked. You can add a second padlock to the box, your padlock with your key, you can add a second padlock to the box, your padlock with your key, and you send it back to me. Now I've got a box with two padlocks. How does that help? Well, I can take my padlock off because I've got my key. I can send the box back to you. It's still secure. It's still padlocked, and it's padlocked with your padlock. Ah Ah nice. And you can then unlock it, open the box and read the message. Nice. Okay. Daisy chain. Yeah, so suddenly something that was impossible
Starting point is 00:29:13 becomes, actually it's not so difficult after all, but there's even a clever way of doing it, which is I have a padlock and a key and I make a million copies of my padlock and I distribute it all over the world Let's imagine you're trying to send me something now you go to your local post office. You say can I have Simon sings padlock? You snap the padlock shut on the box because you don't need a key to shut a padlock. It just snaps shut You send it to me and I've got the key already to open it. So we're not distributing the keys, we're just distributing the padlocks. And again, I think it was in the 1970s, this technology was invented. It's a mathematical padlock that we'd be talking about.
Starting point is 00:30:01 That was invented by three guys at what we call GCHQ. You've got the NSA, you have the National Security Agency. We have the government communications headquarters and three people there invented this mathematical padlock. One of them was a chap called Clifford Cox who I actually got to meet and he was working at GCHQ. He'd only just started there. He was in his 20s. He was a young Cambridge math graduate. And he went home one evening and he started thinking about how would you invent a mathematical padlock. And he came up with the idea he came up the whole mathematics. And he came up with it entirely in his head. He couldn't write down
Starting point is 00:30:38 anything because when you work for GCHQ, you're forbidden from writing down anything at home that relates to your work. Oh my God. So he had to go to bed that night, he wouldn't forget the mathematical idea, and then rushed into work early the next day and wrote it all down. It's literally the greatest cryptographic breakthrough in a thousand years. And then, and then having explained it to his colleagues, he couldn't tell the rest of the world because the British government made it confidential. They felt
Starting point is 00:31:10 this was just too big a breakthrough to share with the rest of the world. But it was then rediscovered a decade later in California by Whit Diffie and Martin Hellman. And they are the people who then shared that technology with the rest of the world. Okay, who cares? What does this mean for you? And it's what's really enabled the internet to take off in terms of financial transactions, secure databases, sharing information securely. We can do that today because we don't need to run around sharing keys. Instead, we can run around sharing these, well, we don't need to run around, we can just share our mathematical padlocks.
Starting point is 00:31:47 And if you were dying to know what system Clifford Cox came up with just off the dome, it was prime factorization, which led to a public key crypto system. And because Wikipedia is not written in any kind of secret code, I'm going to read you what it told me about this to make this brief, which is in a public key crypto system, the encryption key is public and distinct from the decryption key, which is kept secret or private. Okay. So the public key is based on these two large prime numbers. Anyone can use the public key, but it can only be decrypted by someone who knows the private key.
Starting point is 00:32:26 And you know what mathematical genius and cryptologic comprehension can get you? Well, sometimes nothing. Sometimes worse than nothing. And we're going to hear about that later. But in the case of Clifford Cox, it got him the title of Companion of the Order of the Bath and then Fellow of the Royal Society. Simon himself is now in the most excellent order of the British Empire. But yeah, Clifford Cox was struck by this inspiration in 1973, and it wasn't until the
Starting point is 00:32:53 method was declassified from its top secret status in like 1999 that he was recognized for it. I wonder what he was doing when he came up with that. Was that like a shower thought? Or you know, you're washing dishes and you have a great idea? Yeah, yeah. A lot of mathematicians talk about the idea of really thinking hard for a problem, thinking about a problem really deeply for hours and hours.
Starting point is 00:33:16 And then suddenly when they relax and suddenly maybe the brain goes into a kind of instinctive mode, suddenly clarity emerges. It seems to be in one of those moments that the mathematical padlock was invented. So as we learned from the o-neurology episodes on dreams, this is when the brain shifts to the default network. And we also did a two-part cell eugenology episode on hobbies and why leisure activities are vital if we don't want to lose our marbles. But going back a few decades, what about mechanics?
Starting point is 00:33:51 When did things become mechanical? When did a code breaking machine emerge? How did Turing do what he did without the computer power that we have now? So I think cryptography develops because I break your code and I need a better code. Cryptography also develops as a result of communications technology advancing. So when the telegraph was invented, we needed more secure forms of encryption. The British Empire was being run by people in London sending messages over telegraph lines across the world.
Starting point is 00:34:28 Then when the radio was invented, again, we needed even better forms of communication because somebody on a battlefield could send a radio message over hundreds of miles and send lots of information in just a few seconds. We needed even more effective encryption that was rapid and secure. And so what you have in between the First and the Second World War is the idea of the encryption machine, a mechanical machine, and something that looks a bit like a typewriter where you type in a message and it gets encrypted automatically by the cogs and wheels inside the machine. The Americans worked on one, the Dutch worked on one, the Swedes had an encryption device,
Starting point is 00:35:11 and the Germans had one as well. All of these companies really struggled because there wasn't a huge need for secret communication. All of these companies were gradually going bankrupt apart from the German one. The Enigma was designed by a guy called Arthur Sherbius because just as his company was struggling, Germany started gearing up for what would be the Second World War. War. It's great for business. And Germany began to buy these Enigma machines, not just for every army unit, but for every
Starting point is 00:35:43 naval ship, for every air base, for every train station and so on. And so hundreds and thousands of these Enigma machines were made and distributed and they were essential for the, you know, say the German concept of Blitzkrieg. We have coordinated attack, you have bombardment from land, you have attack from the air, and then ships off the coast also bombarding. So this coordinated kind of attack is only possible if you've got secure, effective, rapid communication. So again, you have a key, and that means that, because we're going back to the era where people had keys And how do you set up your enigma machine? And again if I'm sending you a message on an enigma machine you have an enigma machine I didn't know what an enigma machine looked like before this and honestly
Starting point is 00:36:34 It's hard to picture something whose name means mystery or riddle. But yeah, these 1940s secret message machines they look like a regular 1940s secret message machines. They look like a regular QWERTY vintage typewriter with keys, but where the paper would be scrolling up, there are a few more rows of buttons with the alphabet on each button, and each button can light up. Now above those two rows of buttons are a few turning sawtooth cogwheels that have numbers 1 through 26 on them. Now you don't need to know all the electrical engineering, trust me, it's complex. But essentially when a key is pressed at the bottom, electrical signals travel through a mess of kind of tangly wires inside each of those wheels, which can turn the next wheel's
Starting point is 00:37:24 mess of wires. And if you press like let's say the letter K, that letter K will be changed via the wires and via the turning cogs seven times before spitting out a new letter which illuminates on that row of buttons. And it all depends on the settings on the machine. So one person usually would be pushing the keys to spell something out and the other is writing down which button lights up. Then they send that series of lighted buttons as text over Morse code to the receiver. So it turns a series of letters or words into absolute
Starting point is 00:38:00 jibber-jabber unless you knew exactly how the rotors were dialed and what was plugged in where when that message was typed. And the configuration of the machine was changed daily according to this printed log that was kept in a safe, and then each day they would burn that day's instructions. Oh, and there was another three-letter code to encrypt each individual message. So overall, these wheels and plugs can be arranged in some calculate, I think, 151 trillion ways, and they change daily. So it is a horrifyingly complicated and swiftly moving target that's relaying information that is life and death to people.
Starting point is 00:38:43 Breaking the enigma is like if Satan wrote Sudoku puzzles and then if you didn't get it he swallowed your children. And there are rotors that you need to put into place, you need to select the right rotors, you need to orientate them in the right way. It's got a plug board a bit like an old-fashioned telephone plug board, switchboard, to plug those cables in correctly. You have to plug those in in the correct way. And if you and I have the same setup,
Starting point is 00:39:09 and obviously we agree the key in advance, then we can communicate with each other. But for everybody else, it's impossible to guess our key. The number of combinations is just too vast. And things like frequency analysis and the personality of letters is just useless. This code was so utterly strong. Everybody gave up hope of ever trying to crack it.
Starting point is 00:39:32 Actually, the only people, the only country that had the audacity to try and crack the enigma was the Poles. Poland was in this desperate situation of being trapped between Germany on one side and Russia on the other. We understand. The Poles knew that they were going to get invaded sooner or later. They set their best mathematicians the task of trying to crack the enigma. This was before the war even started.
Starting point is 00:40:01 They were working on this. They made some progress. They made some crucial progress. Those breakthroughs were smuggled out of Poland to Paris and from Paris to London. It gave the British codebreakers a real head start in trying to break the enigma. The British set up a codebreaking center outside of London called Bletchley Park, where they hired a whole weird bunch of people from cross world addicts to math teachers to engineers to classic scholars. And they all worked at Bletchley trying to break the enigma, but also lots of other codes from Japan and Italy
Starting point is 00:40:38 and also Germany. Imagine if a reality show cast a bunch of the best nerds and made them live in an English countryside mansion trying to defeat the Nazis. I would watch that in a heartbeat. Also around 75% of the people working at Bletchley Park were women employed as translators, cryptographic operators, they constructed and operated some of the world's first programmable electric computers. And one of these Bletchley Park
Starting point is 00:41:05 nerds was named Valerie. And she had a granddaughter who you are not supposed to call Kate Middleton, because according to the internet, her granddaughter's name is Her Royal Highness, the Princess of Wales. But yeah, tons of folks, including Valerie, worked at this 9,000 square foot manor on 58 acres, like a wartime period piece set in a hazy, cigarette smoky vintage computer lab. Alan Turing was one of those mathematicians. He was one of the mathematicians who worked on the enigma. He and many others came up with a whole series of ways of trying to crack the enigma.
Starting point is 00:41:41 One of the weird things, one of the ways that the enigma was broken was that when you type the letter A into an enigma machine, it can be encrypted as any other letter except the letter A. Okay? Which doesn't seem like a big problem because A can be encrypted into 25 other letters. B similarly cannot be encrypted into a B, but it can be encrypted into any of the other 25 letters. So that's fine. Except there was a letter that was once a message that was once intercepted and the code breakers of Bletchley Park looked at this message and it was a mess of different letters, all different letters, it looked like complete gobbledygook, except there wasn't a single W in the encrypted usage. So you've
Starting point is 00:42:34 got 300 characters, but not a single W. And the code breakers looked at that and they thought about it for a while. And then they realized the only way you can get a message, an output message with no Ws, is if the input message is just W 300 times. Oh, wow. If I type in W 300 times, I'm gonna get everything except W 300 times. And so they crack the code. That's not the most interesting message in the world.
Starting point is 00:43:03 It's just W300 times. But what that gives you, once you know the output of the message, what you have in your hand, and once you have the input, which is W300 times, you can then work out the settings of the machine for that day. The same machine settings were effectively used for the whole day. So now you can decipher all sorts of other messages sent that day, which are more interesting. For example, one of the messages that was sent that day that was intercepted and deciphered was about an attack on the British fleet in Alexandria. The British fleet were warned and the result was the first Allied victory in the Mediterranean because the enigma had been broken and because
Starting point is 00:43:46 the British Navy now had advanced notice of this attack on Alexandria. So some Nazi fucked up bad, thankfully. That kind of maybe raises the question of why would somebody send the message W300 times? It seems like a pointless message. The reason somebody said W 300 times is if you've got an unbreakable code, I can't read your messages, but what I can do is count how many messages you sent. And if you said one on Monday, one on Tuesday, one on Wednesday, 20 on Thursday, I know something big is going to happen on Friday. So this would be a real tell to have a sudden flurry.
Starting point is 00:44:27 Like imagine if you texted someone once a day, but then suddenly you got 45 messages from them in an hour. You'd be like, story time, what's happening? Because your communication suddenly peaked. So you combat that by sending 20 messages every day. Oh, God. And then what we call the traffic is then flat. So when that person sent W300 times, they were just sending their quota of messages
Starting point is 00:44:51 for the day. They were just trying to build up their quota. Had they sent a random message, if they just randomly typed with two fingers, it would have been fine. But that W300 times compromised the security of the enigma. What Turing did that built on this was he said, you know, maybe we won't be lucky enough to have W 300 times again. We can't rely on that.
Starting point is 00:45:15 But we can rely on the fact that maybe we can guess the beginning of a message. If the message is going to Berlin, maybe the message reads Heil Hitler. You'd be like, fuck that guy. If the message comes from a weather station at the Atlantic, maybe it starts off with pressure readings or wind directions. We can always guess a little bit of the message. If we can guess a little bit of the original message, we can compare it with what came out the other end and begin to narrow down what the keys might be. And Turing designed a machine called a BOM that could effectively use a little bit of the input,
Starting point is 00:45:53 a little bit of the guest message, what's called a crib, against what was intercepted to try and identify what the key actually is. And the B were very effective. The bombs managed to work out the key on most days pretty rapidly. And I know we're talking about the theater of war in the 1940s. So the word bomb, it's a little distracting. But a bomb with an E at the end was a machine used to try to break the Enigmas code. And a bomb got its name. Well, this is also a source of battle, the etymology of it. But some legends say that the mechanized rotors made a ticking sound like a bomb. Others said parts would sometimes fall off and make a very startling crashing noise on
Starting point is 00:46:38 the floor. There's this other legend that tells the tale of a cryptologist eating this round shaped ice cream dessert and getting inspiration from that. But it doesn't matter as much as the messages deciphered through it. So the Allies then just kind of knew where the ships were in the Atlantic, where air raids were going to happen at night, where armies were going to be moved to. It gave the Allies a huge advantage in trying to win the war. I have some questions from listeners. Can I lightning round you with some of them? Yeah, sure.
Starting point is 00:47:12 They're great questions. And we will hear from them in a moment. But first, let's give away some money per Simon. And this week he chose givewell.org, which vets and researches the most impactful charities and then grants accordingly. And donations go to the most reliably high-impact and cost-effective charities that they've identified, such as Malaria Prevention, Childhood Vaccination Incentives, and Vitamin A Supplementation. You can learn more at givewell.org. So thank you, Simon, and sponsors of the show for making that possible. Okay, we're back.
Starting point is 00:47:43 Let's crack into your queries. Many of you had pop cultural cryptological questions such as Cooper Michael, Mouse Paxton, Addie Capello, Matt Zucato, first time question asker Chris F. And Brie asked, in the movies you often hear or see of people cracking these secret codes so quickly
Starting point is 00:48:04 or without much research, how often does that happen in real life? How often do you come across some sort of secret code where it's that easy to just decipher versus how long does it take to actually decipher? Does that ever piss you off about movies when someone cracks a code like instantly? Well, the codes we have today are effectively unbreakable. We live in a golden age of encryption and you can't break any of these codes. There is a fear that we have new computing technology, quantum computing might break some of today's codes and that would be disastrous because our economic systems would begin to collapse.
Starting point is 00:48:52 Giant corporations like Amazon would no longer have a business model if you can't send secure online payments. But encryption today, it's unbreakable. It's absolutely unbreakable. You and I can buy free software and send each other secret messages that nobody in the world could ever decrypt. But there is more information being sent around the world than ever before. Inevitably, some of it is going to be badly encrypted.
Starting point is 00:49:20 Maybe people will make silly mistakes. I think the code breakers are really looking for those slip ups and those mistakes. Because if the code is implemented properly, it's almost an impossible task. So no, it is not as easy as you see in the movies for now. But more than one person had singularity and super position questions, such as first-time question
Starting point is 00:49:45 asker Paul S.R. Chrisholm, computer scientist and security engineer Steven Moxley, John Buckner, Mark Rubin, MRO, Maximilian Galindo, Jan Bundesman, post qubit concerned Joshua YYZ, Adam Foote, Pavkov34, RytheTiger, Katzay and... Adam Silk said how worried should people be about quantum cryptography and quantum computers breaking encryption? It's a very it's a very important question Adam Silk said, how worried should people be about quantum cryptography and quantum computers breaking encryption? It's a very important question. But like we were saying a while ago, throughout history, if somebody breaks a code, they don't
Starting point is 00:50:14 necessarily tell the world about it. So when the British cracked the enigma, they didn't tell the Germans that. They wanted the Germans to keep sending information via enigma so they could keep intercepting it and exploiting it. It's a little bit the same with quantum computing today. We don't really know how advanced the technology is getting, particularly, say, in China. I think people are right to be worried as to what the future of secure communication
Starting point is 00:50:41 might be. There are some other options. There's something called quantum cryptography, which would combat quantum computing. But it's much harder to implement. And so it's not quite clear that quantum cryptography would provide us all with the same level of secure communication that cryptography today does. Are you looking for up-to-date info on this?
Starting point is 00:51:04 How about an article published last week via New Scientist with the headline, Breaking Encryption with a Quantum Computer Just Got 20 Times Easier? But it does concede in the first paragraph that these machines don't exist yet. But when they do, it is going to be way easier for them than we thought.
Starting point is 00:51:22 And by we, I mean the people who make quantum computers. And then yesterday, the conversation posted an article titled, Is a Quantum Cryptography Apocalypse Imminent? That's casual. In it, information security group Professor Keith Martin explains that the most common ways of encrypting information that we use will be impacted less than that public key encryption that we talked about earlier, the one that Clifford Cox worked on that's used in messaging and shopping transactions.
Starting point is 00:51:52 And public key cryptography is also at the heart of cryptocurrency, which cryptocurrency, it's a form of money that's decentralized from different nations currencies. And the public key for that is like your wallet, and the private key can open your wallet. And I know that we need a whole episode on cryptocurrency because I'm not going to make it make sense in an aside. And that's okay.
Starting point is 00:52:15 But the point of this is to say that Keith Martin writing about the imminent crypto apocalypse answers his own headline question by writing that those in the know fight about it all the time. They fight about if and when quantum computing is going to be up and running. And right now, the most advanced quantum computing is able to handle tiny amounts of info and it's prone to screwing up a lot. But Keith says that most experts believe it's a future possibility, but the prognoses range from between 10 to 20 years
Starting point is 00:52:47 to well beyond that. And he also writes, my core message is don't panic. Okay, Keith, but also no one expected AI to go from like putting cat ears on an Instagram filter to effortlessly generating a video of your dead aunt talking, but here we are. Life comes at you fast. Now let's look back to the past instead.
Starting point is 00:53:08 All right. Oh, look, another war, but an interesting story. So Jordan Crosby, first time question asker, wants to know what's been the lasting impact of the Navajo code talkers? How did they choose Navajo over other languages? And this was also voiced by their patrons, Katie B.y, John Worcester, Emma O'e, Nikki G., Dawn Smalcheck, Dave Brewer, H., and Kathy Baragall. They all asked about ciphers and codes developed from and relying on Indigenous languages. Lylea Kay And going backwards in time a little bit,
Starting point is 00:53:39 Jordan Crosby, first-time Quest Transcript, wanted to know about the lasting impact of Navajo code talkers and how they chose Navajo over other languages. Was that a pretty isolated instance of using language to crack codes in English or any thoughts on that? So the first example, I think, was in the First World War, where I think some of the Canadian troops used Choctaw which was a language which nobody else could understand. Well people of the Choctaw Nation could understand it, at least those who were not forced away
Starting point is 00:54:11 from their families and cultures in the indigenous genocide upon which our country is built. Also side note, the people of the Navajo Nation didn't call themselves Navajo, that was a name used by the Spanish to describe them. So you may hear the more accurate term, Dine used by that nation. And we've had some great indigenousologists who touch on this and we'll link their episodes in the show notes.
Starting point is 00:54:33 But yes, code breaking. When the Americans thought about using Navajo as a secret language, some of the forces in the Pacific, first they thought, well, what would be the right language to use? What right group to work with? They needed a tribe that was big enough to supply the men that would be needed.
Starting point is 00:54:51 They needed a tribe that had a high level of literacy as well. They needed a tribe that hadn't been studied by German anthropologists because that would have, again, compromised the code. That's why the Navajo were chosen. And so you had these Navajo soldiers who would travel with every radio unit and all the messages would be given in Navajo, spoken to another Navajo speaker at the other end, who would then translate them back into English. And of course, nobody in the Pacific arena could understand Navajo.
Starting point is 00:55:24 So it was a truly unbreakable code and it was highly effective. And yeah, it's one of the great stories of the Second World War. And yes, they used their languages just spoken, but also as a base for ciphers, substituting words in their native language for letters in the English alphabet to spell out messages. And North America being home to this broad range of native languages, it was difficult for enemies to learn or guess which ones were being used. But many nations were tapped to lend their heritage and language and skill in co-talking. And were they given parades after World War II?
Starting point is 00:56:02 No, of course not. All of this remained classified into the late 1960s. And in the decades that followed, some of the surviving Code Talkers were awarded medals of honor for their services. And for more on this history, we're going to link the Smithsonian National Museum of the American Indians documentary, The Power of Words, Native Languages as Weapons of War. That one focuses on the Hopi Nations role. And there's also PBS's 2019 documentary, Secrets of the Code Talkers, The Warrior Tradition, which also explores how indigenous nations helped win
Starting point is 00:56:34 the war by scrambling up sentences. Speaking of words I don't know, let's talk Voynich. This is the name of a manuscript written on calfskin sometime in the 1400s. It was discovered by a Polish book collector. His name was Wilfrid Voynich. Voynich? Voynich? Either way, it was on the minds of patrons John Buckner, Kurt Swanson, Eric Kay, Ingve, Jennifer Grogan, Baz Bugmeier, Felipe Jimenez, and... How about Aaron White wants to know if you've heard of the Voynich manuscript, secret code, language, horse shit, any thoughts?
Starting point is 00:57:09 Yeah, there are lots of these very peculiar codes, one-off codes. This is an ancient manuscript, but not so ancient, a few centuries old. We don't know why it was written and we have no idea really what it talks about. So yes, this priceless and legendarily mysterious text now lives in New Haven, Connecticut. It's at Yale's Rare Book and Manuscript Library. And it was inherited by Vojnik's widow's friend in the late 1960s. No one was interested in buying it. She was like, I inherited this from my friend's husband. And they're like, Annie, nobody wants it. She was like, I inherited this from my friend's husband. And they're like, Annie, nobody wants it. So she donated it to Yale. But now you have to know someone who knows
Starting point is 00:57:51 someone important to glimpse it in person. Although Yale was kind enough to digitize the 213 page butte in 2020. No one knows what the writing means or what it says, but there are drawings of flowers and titties in it. And we're going to link that in the show notes in case you are the code-cracking genius it's been waiting 800 years for, or if you just like drawings of everything from plants to bloodletting. Now, if you love that kind of stuff, also we have a recent episode on illuminated manuscripts called Medieval Codicology. We also have a mammology episode. But yeah, it's anyone's guess.
Starting point is 00:58:29 Some people think it was a hoax or just a really creative or unmedicated person. The Voynich manuscript is one that often gets discussed. There's the Beel cipher, which is about a couple of cowboys in America who discovered gold out west and brought it back. And there are secret messages that say where the gold is buried, but nobody's ever been able to crack the messages or find the gold. So just a quick note on this, a guy named Thomas Beale supposedly left a lockbox with an innkeeper in 1820. And in it were three coded texts describing the location in Virginia of a treasure worth now from what I gather around $ million dollars. No one has been able to crack the texts, one or
Starting point is 00:59:09 three, but text two was based on the first paragraphs of the US Constitution, and it was a heads up about how much gold and jewels and silver were buried somewhere six feet deep in Bedford County. So how did people even find out about this? Well, years after Beale left the lock box at the inn and never showed up again, the innkeeper was finally like, enough of this crap, and opened it up and it contained these three coded texts.
Starting point is 00:59:36 And then eventually a friend of the innkeeper was like, let's publish and sell a pamphlet describing that it's the key to treasure, and people who buy this pamphlet can try to decode it. But here's the thing, even the most modern and sophisticated codebreakers and programs have not been able to crack texts one and three. And some people think it was all a hoax with text two and the inventory of all the treasure, easily crackable, but the location text being absolute random numbers and just a good story to sell these pamphlets. Essentially some people think it's an old timey click bait prank, but time will tell.
Starting point is 01:00:15 Who knows? There's an ancient metal disc called the Phaistos Disc, which again, nobody's been able to read. And then there are some ancient languages which still remain unbroken, which we still can't read. One of them is called Linear A. Nobody can make head nor tail of what Linear A means or knows, can understand what the alphabet is or even the language. I looked up this ancient 4,000 year old script from the extinct language of ancient Crete and honestly it looks like the alien squid language from the movie Arrival or like abstract brush stroke art
Starting point is 01:00:52 in a hotel lobby. Like what the heck is this shit? But Linear B was cracked I think in the 50s by a guy called Michael Ventress building on the work of an American woman called Alice Koba called Michael Ventress, building on the work of an American woman called Alice Koba, also in league with a guy called John Chadwick. Several people all head down on this linear B. And John Chadwick, I interviewed him shortly before he died and I said, John, how did, you know, you're a classic scholar at Cambridge. How did you get into deciphering ancient languages? Why was that the thing that obsessed you? And
Starting point is 01:01:25 he told me that he'd worked at Bletchley Park with the codebreakers in the Second World War alongside Alan Turing. Oh, wow. And he never told anybody that he'd been a Bletchley Park codebreaker because all of those people were sworn to secrecy. Again, everybody keeps their secrets. Yeah. But that work in the Second World War led directly to inspiring Chadwick to crack Linear B. What a flex that he kept hidden, you know what I mean? Some people
Starting point is 01:01:52 be bragging up and down in the pubs about that. Yeah, no, it's an incredible thing that the story of Bletchley Park, you know, when the war ended, everybody went back to their lives and got on with their day-to-day work. Alan Turing, for example, went to work on computing, as well as being an incredible co-breaker. He's the father of computer technology, computer theory, computer science. The thing was that later on, he was a homosexual and the government was aware of that. He wasn't given the clearance required to work on certain projects.
Starting point is 01:02:25 He was sidelined. He went to Manchester and did some incredible work in Manchester. And then he was arrested because he was found with a man and I guess found guilty of indecent behavior or some such accusation. He was found guilty. He was given hormone treatment and chemically castrated and eventually just took
Starting point is 01:02:46 his own life. When he died, virtually nobody was aware, not even his family were aware of the incredible work he'd done in terms of changing the course of the Second World War. Now, he's celebrated and recognized and people are aware of the crime that was committed against him. In fact, I was very proud to be part of a panel, the governor of the Bank of England, Mark Carney, who I think now is hoping to be Prime Minister of Canada. Mission accomplished.
Starting point is 01:03:19 He was governor of the Bank of England and he wanted to have a scientist or a mathematician on the new £ pound bank note, possibly one of our last ever bank notes, depending how money goes. We were on a panel, our proposal to him was that Alan Turing be on the new 50 pound note. So it's great to say if you're lucky enough to have a 50 pound note in Britain, Alan Turing is the person on it. Because not only did he change the course of the Second World War, not only was he a mathematician of epic achievements in mathematics, not only was he the father of computer science, but he also pioneered a lot of the concepts within artificial intelligence. So it's great that he's now on our £50 note. But the fact that he did so much for the world and suffered so greatly is something that no one should forget, especially as we see LGBTQ people under baffling and increasing
Starting point is 01:04:12 hostility from political regimes. And the future can only get better if people learn from the past. Speaking of darkness and the future. You know, on the topic of artificial intelligence, two more listener questions, if you don't mind. We talked a little bit about quantum computing, but several people wanted to know what role AI might have in modern cryptology.
Starting point is 01:04:35 On the real life squishy brains of Dabe, Philip Meter, CastTheDogNerd, Megan Walker, Stephanie Coombs, Kate E, Quinn West, Corey, and Sarah Rosara, who asked, can AI solve secret codes? If so, should we unplug it now? And are we getting much closer to that? I think the modern codes are so utterly unbreakable that artificial intelligence won't make any
Starting point is 01:04:58 difference. It's just the sheer computing power is just not there to have any impact on secure communication. But AI could have, you know, an impact on trying to crack ancient codes, ancient messages or ancient languages where it's not about lacking computer power. It's about lacking that vital insight or it's about getting all of the texts that are available and looking for patterns. You know,
Starting point is 01:05:23 that's what code breaking is about pattern recognition, and AI is terrific at pattern recognition. Yeah, some people wanted to know, why do some people really excel at escape rooms and things like that? Some of us are just great at that, some of us myself are not. But let's talk about stuff he hates, or at least
Starting point is 01:05:43 his least favorite. Patreon, Kat, you're going to love this one. So there's a code which I didn't actually write about in the code book because the code book was published. There was another book out at almost the same time. In fact, it was at the same time because we were both kind of in the top 10 bestseller lists and we were kind of competing against each other. And it was called the Bible code. So there was my book, the code book, and then there was the Bible code. The Bible code was getting a lot of attention.
Starting point is 01:06:08 The idea in the Bible code was that there are encrypted messages in the most ancient Hebrew manuscripts. And it's a very intriguing idea. The book was written by a guy called Michael Droznin. So Michael Droznin wrote this book called The Bible Code. And the way you find these encrypted messages in the ancient Hebrew text is you put all the letters at in the form of an array, in the form of a grid, and you look for Hebrew letters that are equally spaced in a straight line. Okay? So you don't read it left to right or right to left, I suppose. You're looking
Starting point is 01:06:45 for diagonals, you're looking for lines going in all different directions that are equally spaced. And when you do that, something really weird happens. You find these messages, not just messages, but predictions that actually turned out to be true. You find the word Newton crossing with gravity. It's kind of extraordinary. You find the word Kennedy, Dallas, assassinate. No. Yeah, yeah. 100% true. Absolutely. No word of a lie. Take the most ancient Hebrew texts, put them in a grid, look for these patterns and these predictions emerge. Literally hundreds and hundreds of predictions, every single one has come true. I've got goosebumps.
Starting point is 01:07:31 Now, a mathematician in Australia said, you know, I'm not sure I quite believe this. So he got another book, not the Bible, but he got Moby Dick. He said, you know, Moby Dick is a huge text. It's about the same size as these ancient manuscripts. What happens if I apply the same algorithm to Moby Dick? And he looked at Moby Dick, he put all the letters in Moby Dick in a grid and an array. He looked for letters that are equally spaced in a straight line. And exactly the same thing happened. He found hundreds and hundreds of predictions, all of which came true.
Starting point is 01:08:05 What? There's one about the death of Diana, Lady Diana, Princess of Wales, Rhodes, Skid, the passenger who was killed with her, Dodie Dodie, the name of the driver, Henry Paul. They all appear in Moby Dick. What? So the bottom line is that books are big objects. They contain millions of letters. That's millions of starting points, millions of ways you can jump around, millions of different diagonals you can find. And when you have so many possibilities, you will find anything you want to find.
Starting point is 01:08:39 It's about the law of large numbers or the laws of large combinations. So you'll find everything that's ever happened, everything that won't happen, everything that will happen, it's all there in any large tech. So that's kind of one of my favorite codes and one of the codes I really hate, I suppose. Could a point to a simulation or it's really just chance. You get enough letters, you're going to get some messages. That's really the point, right? My favorite coincidence, because you put your finger on it, it's really about coincidences.
Starting point is 01:09:11 If you take Shakespeare's Hamlet quotation, to be or not to be, that is the question. If you take that wonderful soliloquy and you juggle the letters around, you get the following anagram. You get the anagram, which is, in one of the Bard's best thought of tragedies, our insistent hero Hamlet queries on two fronts about how life turns rotten, which is a perfect summary of the entire play, built from an anagram of its most famous illiquid.
Starting point is 01:09:39 So yes, Seattleite, graphic designer, and anagram enthusiast, Corey Calhoun, sat down about 15 years ago and thought, I wonder if you can anagram Hamlet's speech. And within just a few hours took the Shakespearean text, To be or not to be, that is the question. Whether tis nobler in the mind to suffer the slings and arrows of outrageous fortune. And then he anagrammed that and it spells out, in one of the Bard's best thought of tragedies, our insistent hero Hamlet queries on two fronts about how life turns rotten. Way to go, Cory. Who knew all of those letters
Starting point is 01:10:19 could spell all of those words? I now follow Cory Calhoun on Instagram because I think that that's so cool. And he is probably wondering why a podcast lady wants to see pictures of his kids and cakes. Let him wonder. And you can either say, well gosh, wasn't Shakespeare amazing that he could build in these incredible puzzles? But he just wrote so much stuff that eventually these weird coincidences will happen. Oh, I've never heard that and I love it. Is there any codes that you ever keep an eye on like when are they going to crack that one?
Starting point is 01:10:51 Gosh, the one that people write to me the most about is the Beale code, the Beale cipher. Everybody, you know, regularly on a monthly basis, somebody thinks they've cracked the Beale cipher. That was the old timey treasure buried in the Virginia foothills, which made a fortune for the anonymous pamphlet maker. To which the reply is, well, if you've cracked the Beale cipher, then show me where the gold is. That's the ultimate answer, whether someone's cracked it or not. So yeah, that's the one that people still seem to pursue. Well, maybe they've got it in a double padlocked treasure chest. Yeah. It's not our business. Yeah, absolutely.
Starting point is 01:11:25 Or maybe somebody's found the treasure, stolen it, and as we say, the whole world of cryptography is full of secrets. And so maybe you can shout about it when you have discovered the gold. I would keep that under a tight heavy lid. I don't think I'd tell. I wouldn't go out tweeting about it. Well, this has been so wonderful to talk to you. Thank you so much for.
Starting point is 01:11:48 You know, my pleasure. It's been nice to kind of think about cryptography all over again. It's we started off talking about ancient Samarians and their pottery glazes, and we've come all the way up to the Internet and padlock boxes. So that's great. So ask cryptological people cryptic and sometimes illogical questions because what fun is a cat unless it's out of a bag. So, thank you so much Dr. Simon Singh for humoring me with so many not smart questions.
Starting point is 01:12:15 You can enjoy some of his other work like the BBC documentary and book, Pharma's Last Theorem, other books such as The Simpsons and Their Mathematical Secrets, and Trick or Treatment, Alternative Medicine on Trial. His social media is linked in the show notes, as is his website, which is just his name, .net. And we are at Ologies on Blue Sky and Instagram. I personally am at Allie Ward on both. We have shorter, kid-friendly episodes called Smologies.
Starting point is 01:12:40 You can subscribe to wherever you get your podcasts. They're also linked in the show notes. Join our Patreon and submit questions before we record at patreon.com slash ologies. We have merch at ologiesmerch.com, including hats and bathing suits and totes and gifts for the cute little weirdos in your life. Thank you to Erin Talbert for adminning the ologies podcast Facebook group. Avaline Malik makes our professional transcripts. Kelly Ardwyer does the website. Noel Dilworth is our lovely scheduling producer, Susan Hale puts it all together as managing
Starting point is 01:13:09 director and deciphering my transcripts into an actual episode are our Brainiac editors, Jake Chafee and lead editor, Mercedes Maitland of Maitland Audio. Extra editing by the wonderful Jarrett Sleeper of Mind Jam Media who helped out in a pinch for me because I had a mic malfunction late at night on some of the asides. You may have noticed it, you may not have, because he is great at helping out. And also he's married to me, so he had no choice. Nick Thorburn orchestrated the theme music, and if you stick around to the end of the episode, I'll tell you a secret.
Starting point is 01:13:36 And first off, if you are stuck and annoyed about that Pig Latin clip from earlier. What are you studying at college? Pig Latin. Atwe a ye uye uing de u nae te. You wouldn't know a thing about that, would you? Oh, won't I? Two fun facts about it. It's from an old Three Stooges clip called Three Little Pigskins, and the Pig Latin spoken
Starting point is 01:14:02 was, what are you doing tonight? Atwe a ye uye uing de u you doing tonight? And then she says no. And it features a little known actress in a part of one of her earliest roles. Her name was Lucille Ball. She was blonde in it, which really threw me. Also, I could not not sign off with another little message. Don't work on this if you're driving.
Starting point is 01:14:24 Five, 22, five, 18, 25, 20, 20, 9, 14, 7, 9, 12 5 1 18 14 9 20. Bye bye. Hacodermatology, homeology, cryptozoology, lithology, nanotechnology, meteorology, nephology, serology Nephology Seriology Selenology Now you can break the code.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.