The Works of Edgar Allan Poe โ Volume 1 by Edgar Allan Poe (best adventure books to read TXT) ๐
Read free book ยซThe Works of Edgar Allan Poe โ Volume 1 by Edgar Allan Poe (best adventure books to read TXT) ๐ยป - read online or download for free at americanlibrarybooks.com
- Author: Edgar Allan Poe
Read book online ยซThe Works of Edgar Allan Poe โ Volume 1 by Edgar Allan Poe (best adventure books to read TXT) ๐ยป. Author - Edgar Allan Poe
Here Legrand, having re-heated the parchment, submitted it to my inspection. The following characters were rudely traced, in a red tint, between the deathโs-head and the goat:
โ53โกโกโ 305))6*;4826)4โก.)4โก);806*;48โ 8ยถ60))85;1โก(;:โก*8โ 83(88)5*โ
;46(;88*96*?;8)*โก(;485);5*โ 2:*โก(;4956*2(5*โ4)8ยถ8*;4069285);)
6โ 8)4โกโก;1(โก9;48081;8:8โก1;48โ 85;4)485โ 528806*81(โก9;48;(88;4(โก?3
4;48)4โก;161;:188;โก?;โ
โBut,โ said I, returning him the slip, โI am as much in the dark as ever. Were all the jewels of Golconda awaiting me upon my solution of this enigma, I am quite sure that I should be unable to earn them.โ
โAnd yet,โ said Legrand, โthe solution is by no means so difficult as you might be lead to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a cipherโthat is to say, they convey a meaning; but then, from what is known of Kidd, I could not suppose him capable of constructing any of the more abstruse cryptographs. I made up my mind, at once, that this was of a simple speciesโsuch, however, as would appear, to the crude intellect of the sailor, absolutely insoluble without the key.โ
โAnd you really solved it?โ
โReadily; I have solved others of an abstruseness ten thousand times greater. Circumstances, and a certain bias of mind, have led me to take interest in such riddles, and it may well be doubted whether human ingenuity can construct an enigma of the kind which human ingenuity may not, by proper application, resolve. In fact, having once established connected and legible characters, I scarcely gave a thought to the mere difficulty of developing their import.
โIn the present caseโindeed in all cases of secret writingโthe first question regards the language of the cipher; for the principles of solution, so far, especially, as the more simple ciphers are concerned, depend upon, and are varied by, the genius of the particular idiom. In general, there is no alternative but experiment (directed by probabilities) of every tongue known to him who attempts the solution, until the true one be attained. But, with the cipher now before us, all difficulty was removed by the signature. The pun upon the word โKiddโ is appreciable in no other language than the English. But for this consideration I should have begun my attempts with the Spanish and French, as the tongues in which a secret of this kind would most naturally have been written by a pirate of the Spanish main. As it was, I assumed the cryptograph to be English.
โYou observe there are no divisions between the words. Had there been divisions, the task would have been comparatively easy. In such case I should have commenced with a collation and analysis of the shorter words, and, had a word of a single letter occurred, as is most likely, (a or I, for example,) I should have considered the solution as assured. But, there being no division, my first step was to ascertain the predominant letters, as well as the least frequent. Counting all, I constructed a table, thus:
Of the character 8 there are 33.
; โ 26. 4 โ 19. โก ) โ 16. * โ 13. 5 โ 12. 6 โ 11. โ 1 โ 8. 0 โ 6. 9 2 โ 5. : 3 โ 4. ? โ 3. ยถ โ 2. -. โ 1.โNow, in English, the letter which most frequently occurs is e. Afterwards, succession runs thus: a o i d h n r s t u y c f g l m w b k p q x z. E predominates so remarkably that an individual sentence of any length is rarely seen, in which it is not the prevailing character.
โHere, then, we leave, in the very beginning, the groundwork for something more than a mere guess. The general use which may be made of the table is obviousโbut, in this particular cipher, we shall only very partially require its aid. As our predominant character is 8, we will commence by assuming it as the e of the natural alphabet. To verify the supposition, let us observe if the 8 be seen often in couplesโfor e is doubled with great frequency in Englishโin such words, for example, as โmeet,โ โ.fleet,โ โspeed,โ โseen,โ been,โ โagree,โ &c. In the present instance we see it doubled no less than five times, although the cryptograph is brief.
โLet us assume 8, then, as e. Now, of all words in the language, โtheโ is most usual; let us see, therefore, whether there are not repetitions of any three characters, in the same order of collocation, the last of them being 8. If we discover repetitions of such letters, so arranged, they will most probably represent the word โthe.โ Upon inspection, we find no less than seven such arrangements, the characters being ;48. We may, therefore, assume that ; represents t, 4 represents h, and 8 represents eโthe last being now well confirmed. Thus a great step has been taken.
โBut, having established a single word, we are enabled to establish a vastly important point; that is to say, several commencements and terminations of other words. Let us refer, for example, to the last instance but one, in which the combination ;48 occursโnot far from the end of the cipher. We know that the ; immediately ensuing is the commencement of a word, and, of the six characters succeeding this โthe,โ we are cognizant of no less than five. Let us set these characters down, thus, by the letters we know them to represent, leaving a space for the unknownโ
t eeth.
โHere we are enabled, at once, to discard the โth,โ as forming no portion of the word commencing with the first t; since, by experiment of the entire alphabet
Comments (0)