Wednesday, February 20, 2013

Who Was W.B. Tyler?

Poe often wrote about his fascination with cryptography, most notably in a series of articles published in “Alexander’s Weekly Messenger” and “Graham’s Magazine.” As a result, he was often bombarded with ciphers sent by readers eager to test his puzzle-solving abilities.

Poe published the most curious of these challenges in “Graham’s” in December of 1841. A W.B. Tyler, whom Poe described as “a gentleman whose abilities we very highly respect,” sent in the following letter:

DEAR SIR:

I should perhaps apologise for again intruding a subject upon which you have so ably commented, and which may be supposed by this time to have been almost exhausted; but as I have been greatly interested in the articles upon "Cryptography," which have appeared in your Magazine, I think that you will excuse the present intrusion of a few remarks. With secret writing I have been practically conversant for several years, and I have found, both in correspondence and in the preservation of private memoranda, the frequent benefit of its peculiar virtues. I have thus a record of thoughts, feelings and occurrences, — a history of my mental existence, to which I may turn, and in imagination, retrace former pleasures, and again live through bygone scenes, — secure in the conviction that the magic scroll has a tale for my eye alone. Who has not longed for such a confidante?

Cryptography is, indeed, not only a topic of mere curiosity, but is of general interest, as furnished an excellent exercise for mental discipline, and of high practical importance on various occasions; — to the statesman and the general — to the scholar and the traveller, — and, may I not add "last though not least," to the lover? What can be so delightful amid the trials of absent lovers, as a secret intercourse between them of their hopes and fears, — safe from the prying eyes of some old aunt, or it may be, of a perverse and cruel guardian? — a billet doux that will not betray its mission, even if intercepted, and that can "tell no tales" if lost, or, (which sometimes occurs,) if stolen from its violated depository.

In the solution of the various ciphers which have been submitted to your examination, you have exhibited a power of analytical and synthetical reasoning I have never seen equalled; and the astonishing skill you have displayed — particularly in deciphering the cryptograph of Dr. Charles J. Frailey, will, I think, crown you the king of "secret-readers." But notwithstanding this, I think your opinion that the construction of a real cryptograph is impossible, not sufficiently supported. Those examples which you have published have indeed not been of that character, as you have fully proved. They have, moreover, not been sufficiently accurate, for where the key was a phrase, (and consequently the same character was employed for several letters,) different words would be formed with the same ciphers. The sense could then only be ascertained from the context, and this would amount to a probability — generally of a high degree, I admit — but still not to a positive certainty. Nay, a case might readily be imagined, where the most important word of the communication, and one on which the sense of the whole depended, should have so equivocal a nature, that the person for whose benefit it was intended, would be unable, even with the aid of his key, to discover which of two very different interpretations should be the correct one. If necessary, this can easily be shown; thus, for example, suppose a lady should receive from her affianced, a letter written in ciphers, containing this sentence, "4 5663 967 268 26 3633," and that a and n were represented by the figure 2, — e, m, and r by 3, — i by 4, — l by 5, — o, s, and v by 6, — u by 7, — w by 8, — and y by 9; a moment's inspection will show that the sentence might either be "I love you now as ever," or "I love you now no more." How "positively shocking," to say the least of it; and yet several of the ciphers that you have published have required a greater number of letters to be represented by one character, than any to be found in the example before us. It is evident, then, that this is not a very desirable system, as it would scarcely be more useful than a lock without its key, or with one that did not fit its wards.

I think, however, that there are various methods by which a hieroglyphic might be formed, whose meaning would be perfectly "hidden;" and I shall give one or two examples of what I consider such. A method which I have adopted for my own private use, is one which I am satisfied is of this nature, as it cannot possibly be solved without the assistance of its key, and that key, by which alone it can be unlocked, exists only in my mind; at the same time it is so simple, that with the practice in it which I have had, I now read it, and write it, with as much facility as I can the English character. As I prefer not giving it here, I shall be compelled to have recourse to some other plan that is more complicated. By a CRYPTOGRAPH, I understand — a communication which, though clearly ascertained by means of its proper key, cannot possibly be without it. To most persons, who have not thought much upon the subject, an article written in simple cipher, (by which I mean with each letter uniformly represented by a single distinct character,) would appear to be an impenetrable mystery; and they would doubtless imagine that the more complicated the method of constructing such a cipher, the more insoluble — to use a chemical expression — would be the puzzle, since so much less would be the chance of discovering its key. This very natural conclusion is, however, erroneous, as it is founded on the supposition that possession must first be obtained of the key, in order to unravel the difficulty, — which is not the case. The process of reasoning employed in resolving "secret writing" has not the slightest relation to the form or description of the characters used, but refers simply to their succession, and to a comparison of words in which the same letters occur. By these means any cipher of this nature can be unriddled as experience has fully shown. A very successful method of avoiding detection, would be to apply the simple cipher to words written backwards and continuously. This, I conceive, might be called a perfect cryptograph, since from the want of spaces, and consequently the impossibility of comparing words, it would utterly perplex the person attempting to discover its hidden import, and yet with the help of the key, each letter being known, the words could easily be separated and inverted. I give a short specimen of this style, and would feel much gratified with your opinion of the possibility of reading it.

, † § : ‡ ] [ , ? ‡ ) , [ ¡ ¶ ? , † , ) ¡ , § [ ¶ , : ¶ ! [ .§ ( , † § ¡ || ( ? ? , * * ( ¡ ( [ , ¶ * . [ § ¡ ¶ § ¡ .¶ ] ¿ , † § [
? ( § [ : : ( † [ . ( * ; ( || ( , † § ¡ ‡ [ * .: , ] ! ¶ † || ] ? * ! ¶ † § ¶ || , * ( † ¡ ( , ? ‡ § ( ¡ ¡ ¶ [ ¡ ¶ [ ? ( ,
; § ‡ ‡ ] † § § : ( † [ † [ ¶ ? ‡ ] : .* ¡ ¶ : ( § ? ] ! ¶ † § ‡ ] ; § ? ‡ † ¡ ‡ ¶ ! ( , † § ? ( || * ] [ § ¡ ‘ ¡ , : , , †
§ ) , ? || * ] ? , § § ( ! ¡ ( , .† § † [ ‡ ! ) * ] [ : ? ] ||

Should this not be considered perfect, (though I suspect it would puzzle even the ingenious editor to detect its meaning, ) I shall give another method below, which I can show must be, and if I am successful I think you will do me the justice to admit that " human ingenuity" has contrived "a cipher which human ingenuity cannot resolve." I wish to be distinctly understood; the secret communication above, and the one following, are not intended to show that you have promised more than you can perform. I do not take up the gauntlet. Your challenge, I am happy to testify, has been more than amply redeemed. It is merely with an incidental remark of yours, that I am at present engaged, and my object is to show that however correct it may be generally, — it is not so universally.

Agreeably to a part of my foregoing definition, that cannot be a proper cryptograph, in which a single character is made to represent more than one letter. Let us for a moment see what would be the result if this was reversed, — that is, if more than one cipher were used for a single letter. In case each letter were represented by two different characters, (used alternately or at random, ) it is evident that while the certainty of reading such a composition correctly, by help of the key, would not be at all diminished, the difficulty of its solution without that help, would be vastly increased. This then is an approach to the formation of a secret cipher. If, now, the number of the characters were extended to three or four for each letter, it might be pronounced with tolerable certainty that such a writing would be "secret." Or, to take an extreme case, a communication might be made, in which no two characters would be alike! Here all reasoning would be entirely baffled, as there would evidently be no objects of comparison; and even if half a dozen words were known, they would furnish no clue to the rest. Here, then, is a complete non plus to investigation, and we have arrived at a perfect cryptograph. For, since any given cipher would stand for but one letter in the key, there could be but a single and definite solution; and thus both conditions of my definition are fully satisfied. In the following specimen of this method, I have employed the Roman-capital, small letter, and small capital, with their several inversions, giving me the command of 130 characters, or an average of five to each letter. This is to "make assurance doubly sure," for I am satisfied that were an average of three characters used for each letter, such a writing would be emphatically secret. If you will be so kind as to give my cipher a place in your interesting Magazine, I will immediately forward you its key. Hoping that you will not be displeased with my tedious letter,

I am most respectfully yours,
W. B. TYLER.
To EDGAR A. POE, Esq.



Underneath Tyler’s communication, Poe included a cordial rebuttal of his correspondent’s views:

"The difficulty attending the cipher by key-phrase, viz: that the same characters may convey various meanings — is a difficulty upon which we commented in our first article upon this topic, and more lately at greater length in a private letter to our friend, F. W. Thomas.

The key-phrase cryptograph is, in fact, altogether inadmissible. The labor requisite for its elucidation, even with the key, would, alone, render it so. Lord Bacon very properly defines three essentials in secret correspondence. It is required, first, that the cipher be such as to elude suspicion of being a cipher; secondly, that its alphabet be so simple of formation as to demand but little time in the construction of an epistle; thirdly, that it shall be absolutely insoluble without the key — we may add, fourthly, that, with the key, it be promptly and certainly decipherable.

Admitting, now, that the ingenious cryptograph proposed by our correspondent be absolutely what he supposes it, impenetrable, it would still, we think, be inadmissible on the first point above stated and more so on the second. But of its impenetrability we are by no means sure, notwithstanding what, at a cursory glance, appears to be the demonstration of the writer. In the key-phrase cipher an arbitrary character is sometimes made to represent five, six, seven, or even more letters. Our correspondent proposes merely to reverse the operation: — and this simple statement of the case will do more towards convincing him of his error than an elaborate argument, for which he would neither have time, nor our readers patience. In a key-phrase cryptograph, equally as in his own, each discovery is independent, not necessarily affording any clue to farther discovery. Neither is the idea of our friend, although highly ingenious, philosophical, and unquestionably original with him, (since he so assures us,) original in itself. It is one of the many systems tried by Dr. Wallis and found wanting. Perhaps no good cipher was ever invented which its originator did not conceive insoluble; yet, so far, no impenetrable cryptograph has been discovered. Our correspondent will be the less startled at this, our assertion, when he bears in mind that he who has been termed the ‘wisest of mankind’ — we mean Lord Verulam — was as confident of the absolute insolubility of his own mode as our present cryptographist is of his. What he said upon the subject in his De Augmentis was, at the day of its publication, considered unanswerable. Yet his cipher has been repeatedly unriddled. We may say, in addition, that the nearest approach to perfection in this matter, is the chiffre quarre of the French Academy. This consists of a table somewhat in the form of our ordinary multiplication tables, from which the secret to be conveyed is so written that no letter is ever represented twice by the same character. Out of a thousand individuals nine hundred and ninety-nine would at once pronounce this mode inscrutable. It is yet susceptible, under peculiar circumstances, of prompt and certain solution.

Mr. T. will have still less confidence in his hastily adopted opinions on this topic when we assure him, from personal experience, that what he says in regard to writing backwards and continuously without intervals between the words — is all wrong. So far from ‘utterly perplexing the decipherer,’ it gives him no difficulty, legitimately so called — merely taxing to some extent his patience. We refer him to the files of ‘Alexander's Weekly Messenger,’ for 1839 — where he will see that we read numerous ciphers of the class described, even when very ingenious additional difficulties were interposed. We say, in brief, that we should have little trouble in reading the one now proposed.

‘Here,’ says our friend, referring to another point, ‘all reasoning would be entirely baffled, as there would evidently be no objects of comparison.’ This sentence assures us that he is laboring under much error in his conception of cipher solutions. Comparison is a vast aid unquestionably; but not an absolute essential in the elucidation of these mysteries.

We need not say, however, that this object is an excessively wide one. Our friend will forgive us for not entering into details which would lead us — God knows whither. The ratiocination actually passing through the mind in the solution of even a single cryptograph, if detailed step by step, would fill a large volume. Our time is much occupied, and notwithstanding the limits originally placed to our cartel, we have found ourselves overwhelmed with communications on this subject, and must close it, perforce — deeply interesting as we find it. To this resolution we had arrived last month; but the calm and truly ingenious reasoning of our correspondent has induced us to say these few words more. We print his cipher — with no promise to attempt its solution ourselves — much as we feel inclined to make the promise — and to keep it. Some of our hundred thousand readers will, no doubt, take up the gauntlet thrown down; and our pages shall be open for any communication on the subject, which shall not tax our own abilities or time.”


So far as is known, Poe’s readers failed to “take up the gauntlet,” and the ciphers remained unsolved and forgotten until 1985, when Professor Louis Renza theorized that “W.B. Tyler” was really Poe himself, a suggestion based largely on the rather weak evidence that Renza had been unable to find documentation that Tyler actually existed. This claim was then championed by Shawn Rosenheim in his book “Cryptographic Imagination.” Rosenheim felt that Tyler’s letter was too similar to Poe’s own beliefs to be a mere coincidence, and he noted Poe’s known habit of anonymously publishing writings to and about himself. He also pointed out that Poe acknowledged that some of his readers suspected him of “writing ciphers to ourselves,” which Rosenheim chose to think was an indirect confession.

The hunt for “W.B. Tyler” was on. In 1992, Terence Whalen solved the first of Tyler’s ciphers, which was eventually found to be a quote from Joseph Addison’s 1713 play “Cato.” Rosenheim then established the “E.A. Poe Cryptographic Challenge,” offering a prize of $2500 to the first person to solve the second cipher. Despite this lure, the puzzle was not solved for six years, when a Canadian software engineer named Gil Broza finally submitted a correct decryption. (Broza also discovered that one of the reasons for the difficulty with solving the cipher was the fact that it had numerous mistakes made either by the typesetter or the encipherer himself.) The resulting text proved to still be something of a puzzle (errors in original):

“It was early spring, warm and sultry glowed the afternoon. The very breezes seemed to share the delicious langour of universal nature, are laden the various and mingled perfumes of the rose and the essaerne, the woodbine and its wildflower. They slowly wafted their fragrant offering to the open window where sat the lovers. The ardent sun shoot fell upon her blushing face and its gentle beauty was more like the creation of romance or the fair inspiration of a dream than the actual reality on earth. Tenderly her lover gazed upon her as the clusterous ringlets were edged by amorous and sportive zephyrs and when he perceived the rude intrusion of the sunlight he sprang to draw the curtain but softly she stayed him. ‘No, no, dear Charles,’ she softly said, ‘much rather you’ld I have a little sun than no air at all.’”

Rosenheim agreed that Poe did not actually compose this text (it is a variation of a popular punning joke—sun/son, air/heir—that made the rounds during the era,) but he maintained that the poet was the cipher’s author. He cited not only his belief that “its themes…are absolutely typical of Poe’s writing,” but Poe’s oddly discouraging comments about the Tyler ciphers. In 1842 he advised a reader named Richard Bolton to not even attempt to solve the codes “for the reason that it is merely type in pi or something near it. Being absent from the office for a short time, I did not see a proof, and the compositors have made a complete medley. It has not even a remote resemblance to the MS.” Rosenheim saw Poe’s efforts to exaggerate the errors in the ciphers as evidence of his authorship—although it is difficult to understand why Poe would wish others to ignore a puzzle he himself had created.

Considering Poe’s well-known predilection for hoaxes and multiple literary identities, the circumstantial evidence for his authorship of these ciphers has been considered compelling enough for many researchers to assume he was “W.B. Tyler.” (This presumption has inspired numerous hilariously overblown efforts to interpret these ciphered quotations as Poe’s “secret autobiography”—excellent examples of the fevered lengths scholars will go to in order to try and gain insights about the man.)

There are, however, some difficulties with the “hoax” theory. Author and professor Steven Rachman (who had originally endorsed Renza’s conclusions) discovered several contemporary poems by “W.B. Tyler”—evidently sappy verses that could hardly be considered as Poe’s work--in “Graham’s” and “Alexander’s Weekly Messenger.” I myself have found several nineteenth-century poems by a William Bartlett Tyler (whose name is sometimes also given as “W.B. Tyler.”) These poems are admittedly much later in date than the ones Rachman found, so this could be a different Tyler. However, it seems stretching coincidence to have two different American sentimental poets in that era with the same name.

Some have asked why Poe would spend his valuable time creating a fake persona in order to encrypt two utterly meaningless quotations that he never even bothered to decipher. Also, Poe already knew he was suspected of inventing all the ciphers he had solved, and his pride was clearly offended at the idea he had debased himself by mere “gaggery, or more deliberately speaking, of humbug.” As John A. Hodgson, a researcher who became increasingly unconvinced Poe was Tyler, wrote: “[Poe] was entirely capable of such tricks, but he had his standards.” Hodgson gave further evidence of Poe’s sincerity in the matter:  “Among the ciphers submitted to Poe at Alexander’s was the one from a G.W. Kulp…that Poe nevertheless ‘demonstrated to be an imposition—that is to say, we fully proved it a jargon of random characters, having no meaning whatever.’ In his rigorous and even elegant proof of the cipher’s incoherence, Poe offered the fullest glimpse of his deciphering method that he would provide prior to ‘The Gold-Bug.’ Some 135 years later, however, a professor and student in a cryptology class reexamined Kulp’s cipher, found it worth pursuing, and were able to decode it with the help of some computer programs. Kulp, it seems, had indeed submitted ‘a genuine article’; but he had not been ciphering in entire good faith. Poe had clearly offered to solve simple (monoalphabetic) substitution ciphers, and had analyzed Kulp’s as such; but Kulp had in fact sent instead ‘a polyalphabetic substitution cipher working with 12 alphabets keyed by the [twelve letters of the] words ‘United States.’ Kulp’s imperfectly good faith as a cipherer, now revealed, antithetically demonstrates Poe’s genuinely good faith as a decipherer.”

Having said all that, there is still something very peculiar about the Tyler letter that suggests it contains a mystery that we do not realize even exists. The tone of the letter, as well as Poe’s strangely complimentary, but dismissive response, all gives off a certain sense of mockery towards the readers, of Poe enjoying a little private joke at our expense.

In short, is it possible that these trivial cipher messages were “red herrings,” distracting us from the fact that the important “coded message” is somehow embodied in the Tyler letter itself? Could that have been Poe’s real hoax?

We’ll probably never know. And that was very possibly Poe’s intention.