Decoding Anagrammed Texts Written in an Unknown Language and Script

Decoding Anagrammed Texts Written in an Unknown Language and Script

Decoding Anagrammed Texts Written in an Unknown Language and Script Bradley Hauer and Grzegorz Kondrak Department of Computing Science University of Alberta Edmonton, Canada bmhauer,gkondrak @ualberta.ca { } Abstract phering the manuscript is the lack of knowledge of what language it represents. Algorithmic decipherment is a prime exam- Identification of the underlying language has been ple of a truly unsupervised problem. The first crucial for the decipherment of ancient scripts, in- step in the decipherment process is the iden- cluding Egyptian hieroglyphics (Coptic), Linear B tification of the encrypted language. We pro- pose three methods for determining the source (Greek), and Mayan glyphs (Ch’olti’). On the other language of a document enciphered with a hand, the languages of many undeciphered scripts, monoalphabetic substitution cipher. The best such as Linear A, the Indus script, and the Phaistos method achieves 97% accuracy on 380 lan- Disc, remain unknown (Robinson, 2002). Even the guages. We then present an approach to de- order of characters within text may be in doubt; in coding anagrammed substitution ciphers, in Egyptian hieroglyphic inscriptions, for instance, the which the letters within words have been ar- symbols were sometimes rearranged within a word bitrarily transposed. It obtains the average de- in order to create a more elegant inscription (Singh, cryption word accuracy of 93% on a set of 50 ciphertexts in 5 languages. Finally, we report 2011). Another complicating factor is the omission the results on the Voynich manuscript, an un- of vowels in some writing systems. solved fifteenth century cipher, which suggest Applications of ciphertext language identification Hebrew as the language of the document. extend beyond secret ciphers and ancient scripts. Nagy et al. (1987) frame optical character recogni- tion as a decipherment task. Knight et al. (2006) 1 Introduction note that for some languages, such as Hindi, there The Voynich manuscript is a medieval codex1 con- exist many different and incompatible encoding sisting of 240 pages written in a unique script, which schemes for digital storage of text; the task of an- has been referred to as the world’s most important alyzing such an arbitrary encoding scheme can be unsolved cipher (Schmeh, 2013). The type of ci- viewed as a decipherment of a substitution cipher in pher that was used to generate the text is unknown; an unknown language. Similarly, the unsupervised a number of theories have been proposed, includ- derivation of transliteration mappings between dif- ing substitution and transposition ciphers, an abjad ferent writing scripts lends itself to a cipher formu- (a writing system in which vowels are not written), lation (Ravi and Knight, 2009). steganography, semi-random schemes, and an elab- The Voynich manuscript is written in an unknown orate hoax. However, the biggest obstacle to deci- script that encodes an unknown language, which is 1 the most challenging type of a decipherment prob- The manuscript was radiocarbon dated to 1404-1438 lem (Robinson, 2002, p. 46). Inspired by the mys- AD in the Arizona Accelerator Mass Spectrometry Labo- ratory (http://www.arizona.edu/crack-voynich-code, accessed tery of both the Voynich manuscript and the un- Nov. 20, 2015). deciphered ancient scripts, we develop a series of 75 Transactions of the Association for Computational Linguistics, vol. 4, pp. 75–86, 2016. Action Editor: Regina Barzilay. Submission batch: 12/2015; Published 4/2016. c 2016 Association for Computational Linguistics. Distributed under a CC-BY 4.0 license. algorithms for the purpose of decrypting unknown alphabetic scripts representing unknown languages. We assume that symbols in scripts which contain no more than a few dozen unique characters roughly correspond to phonemes of a language, and model them as monoalphabetic substitution ciphers. We Figure 1: A sample from the Voynich manuscript. further allow that an unknown transposition scheme could have been applied to the enciphered text, resulting in arbitrary scrambling of letters within words (anagramming). Finally, we consider the pos- Numerous languages have been proposed to un- sibility that the underlying script is an abjad, in derlie the VMS. The properties and the dating of the which only consonants are explicitly represented. manuscript imply Latin and Italian as potential can- Our decryption system is composed of three steps. didates. On the basis of the analysis of the character The first task is to identify the language of a cipher- frequency distribution, Jaskiewicz (2011) identifies text, by comparing it to samples representing known five most probable languages, which include Mol- languages. The second task is to map each symbol davian and Thai. Reddy and Knight (2011) discover of the ciphertext to the corresponding letter in the an excellent match between the VMS and Quranic identified language. The third task is to decode the Arabic in the distribution of word lengths, as well as resulting anagrams into readable text, which may in- a similarity to Chinese Pinyin in the predictability of volve the recovery of unwritten vowels. letters given the preceding letter. The paper is structured as follows. We discuss re- It has been suggested previously that some ana- lated work in Section 2. In Section 3, we propose gramming scheme may alter the sequence order of three methods for the source language identification characters within words in the VMS. Tiltman (1968) of texts enciphered with a monoalphabetic substitu- observes that each symbol behaves as if it had its tion cipher. In Section 4, we present and evaluate our own place in an “order of precedence” within words. approach to the decryption of texts composed of en- Rugg (2004) notes the apparent similarity of the ciphered anagrams. In Section 5, we apply our new VMS to a text in which each word has been replaced techniques to the Voynich manuscript. Section 6 by an alphabetically ordered anagram (alphagram). concludes the paper. Reddy and Knight (2011) show that the letter se- quences are generally more predictable than in nat- 2 Related Work ural languages. In this section, we review particularly relevant prior Some researchers have argued that the VMS may work on the Voynich manuscript, and on algorithmic be an elaborate hoax created to only appear as a decipherment in general. meaningful text. Rugg (2004) suggests a tabular method, similar to the sixteenth century technique 2.1 Voynich Manuscript of the Cardan grille, although recent dating of the Since the discovery of the Voynich manuscript manuscript to the fifteenth century provides evi- (henceforth referred to as the VMS), there have been dence to the contrary. Schinner (2007) uses analy- a number of decipherments claims. Newbold and sis of random walk techniques and textual statistics Kent (1928) proposed an interpretation based on mi- to support the hoax hypothesis. On the other hand, croscopic details in the text, which was subsequently Landini (2001) identifies in the VMS language-like refuted by Manly (1931). Other claimed decipher- statistical properties, such as Zipf’s law, which were ments by Feely (1943) and Strong (1945) have also only discovered in the last century. Similarly, Mon- been refuted (Tiltman, 1968). A detailed study of temurro and Zanette (2013) use information theo- the manuscript by d’Imperio (1978) details various retic techniques to find long-range relationships be- other proposed solutions and the arguments against tween words and sections of the manuscript, as well them. as between the text and the figures in the VMS. 76 2.2 Algorithmic Decipherment which are represented by short sample texts. The A monoalphabetic substitution cipher is a well- methods are based on: known method of enciphering a plaintext by con- 1. relative character frequencies, verting it into a ciphertext of the same length using a 1-to-1 mapping of symbols. Knight et al. (2006) 2. patterns of repeated symbols within words, propose a method for deciphering substitution ci- phers which is based on Viterbi decoding with map- 3. the outcome of a trial decipherment. ping probabilities computed with the expectation- maximization (EM) algorithm. The method cor- 3.1 Character Frequency rectly deciphers 90% of symbols in a 400-letter ci- An intuitive way of guessing the source language phertext when a trigram character language model of a ciphertext is by character frequency analysis. is used. They apply their method to ciphertext The key observation is that the relative frequencies language identification using 80 different language of symbols in the text are unchanged after encipher- samples, and report successful outcomes on three ci- ment with a 1-to-1 substitution cipher. The idea is to phers that represent English, Spanish, and a Spanish order the ciphertext symbols by frequency, normal- abjad, respectively. ize these frequencies to create a probability distri- Ravi and Knight (2008) present a more complex bution, and choose the closest matching distribution but slower method for solving substitution ciphers, from the set of candidate languages. which incorporates constraints that model the 1-to-1 More formally, let PT be a discrete probability property of the key. The objective function is again distribution where PT (i) is the probability of a ran- the probability of the decipherment relative to an n- domly selected symbol in a text T being the ith most gram character language model. A solution is found frequent symbol. We define the distance between by optimally solving an integer linear program. two texts U and V to be the Bhattacharyya (1943) Knight et al. (2011) describe a successful deci- distance between the probability distributions PU pherment of an eighteenth century text known as and PV : the Copiale Cipher. Language identification was the first step of the process. The EM-based method of d(U, V ) = ln PU (i) PV (i) − · i Knight et al. (2006) identified German as the most X p likely candidate among over 40 candidate charac- The advantages of this distance metric include its ter language models.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us