Because Öttingen-Wallerstein's cipher uses relative
scale degrees, rather than fixed note names, it is effectively a
polyalphabetic cipher. The same enciphered message could be transposed to a different musical key––with different note names––and still retain the same meaning. The musical key literally becomes a cipher key (or
cryptovariable), because the recipient needs that additional information to correctly decipher the melody. Öttingen-Wallerstein inserted
rests as cipherkey markers to indicate when a new musical key was needed to decrypt the message.
Francesco Lana de Terzi used a more conventional text-string cryptovariable, to add security to a very straightforward 'Porta-style' music cipher (1670). Similar to a
Vigenère cipher, a single-letter cipher key shifts the position of the plaintext alphabet in relation to the sequence musical cipher symbols; a multi-letter key word shifts the musical scale for each letter of the text in a repeating cycle. A more elaborate cipherkey algorithm was found in an anonymous manuscript in Port-Lesney, France, most likely from the mid-18th century. The so-called
'Port-Lesney' music cipher uses a mechanical device known as an
Alberti cipher disk There are two rotating disks: the outer disk contains two concentric rings (one with
time signatures and the other with letters of the alphabet); the inner disk has a ring of compound musical symbols, and a small inner circle with three different
clef signs. The disks are rotated to align the letters of the alphabet with compound musical symbols to encrypt the message. When the melody is written out on a music staff, the corresponding clef and time signature are added to the beginning to indicate the cipher key (which the recipient aligns on their disk to decipher the message). This particular music cipher was apparently very popular, with a dozen variations (in French, German, and English) appearing throughout the 18th and 19th centuries. The more recent Solfa Cipher combines some of the above cryptovariable techniques. As the name suggests, Solfa Cipher uses relative
solfege degrees (like Öttingen-Wallerstein) rather than fixed pitches, which allows the same encrypted message to be transposable to different musical keys. Since there are only seven scale degrees, these are combined with a rhythmic component to create enough unique cipher symbols. However, instead of absolute note lengths (e.g., quarter note, half note, etc.) that are employed in most music ciphers, Solfa Cipher uses relative
metric placement. This type of
tonal-metric cipher makes the encrypted melody both harder to break and more musically natural (i.e. similar to common-practice tonal melodies). To decrypt a cipher melody, the recipient needs to know in which musical key and with what rhythmic unit the original message was encrypted, as well as the clef sign and metric location of the first note. The cipher key could also be transmitted as a date by using
Solfalogy, a method of associating each unique date with a tone and modal scale. To further confound interceptors, the transcribed sheet music could be written with a decoy clef, key signature, and time signature. The musical output, however, is a relatively normal, simple, singable tune in comparison to the disjunct, atonal melodies produced by fixed-pitch substitution ciphers. ==References==