[net.crypt] The Beale Ciphers

ed@oakhill.UUCP (Ed Rupp) (07/06/84)

I'd like to start some discussion about the Beale Ciphers.  If
you haven't heard of them, here's a quick description:

About 1817 a group of 30 Virginian's went west on a hunting expedition.
They unexpectedly discovered gold and silver somewhere north of
Santa Fe, NM.  After digging it up for a few years they carried
two loads of it back to Virginia and buried it.  Not wanting their
fortune to be lost in case they were killed (by Indians, etc.) their
leader Thomas J. Beale made up a set of 3 ciphers and gave them
to an innkeeper, promising to send the key along in 10 years if they
didn't return.....  They never returned.  The key never appeared.
The innkeeper (Robert Morriss) waited 32 years, opened the box
containing the ciphers and some letters, spent many years trying
to break the ciphers, failed and gave them to a friend.
His friend also tried to break the ciphers, and was successful
in breaking one of them (#2).  The cleartext to #2 reads:

> I have deposited in the county of Bedford about four miles from Bufords
> in an excavation or vault six feet below the surface of the ground the
> following articles belonging jointly to the parties whose names are given
> in number three herewith.
> The first deposit consisted of ten hundred and fourteen pounds of
> gold and thirty-eight hundred and twelve pounds of silver deposited
> Nov. eighteen nineteen.
> The second was made Dec. eighteen twenty-one
> and consisted of nineteen hundred and seven pounds of gold and
> twelve hundred and eighty-eight of silver.
> Also jewels obtained in St. Louis in exchange to save transportation
> and valued at thirteen thousand dollars.
> The above is securely packed in iron pots with iron covers.
> The vault is roughly lined with stone and the vessels
> rest on solid stone and are covered with others.
> Paper number one describes the exact locality of the vault so that no
> difficulty will be had in finding it.

The other 2 ciphers are unbroken as far as is known.  
All 3 ciphers consist of numbers.  The key to #2 is the 
Declaration of Independence.  One takes the DOI, numbers the words
then substitutes the first letter of each word for the numbers
in the cipher.  Doing this for the other 2 ciphers gives mostly
garbage except for partial strings of the alphabet in #1 (named
Gillogly Strings for their discoverer).

The above description is based on a document "The Beale Papers"
published in 1885 by J.B.Ward.  I got interested in this about
2 years ago, but have run out of things to try.  The 'clearing-house'
for the ciphers is:
	The Beale Cypher Association
	P.O. Box 216
	Medfield, Mass 02052
	Send $1.00 and a large SASE to them for basic info.
	(Newsletter is $25/year)

I have (on-line): All 3 ciphers, the DOI, the 1885 Ward pamphlet,
	the obvious programs to apply keytexts to the ciphers and
	a (meager) list of oddities and observations.

So....  Is it a hoax?  Is the treasure still there (est. $18 Million)?
	What method was used for B1 and/or B3?
	Any experts out there willing to venture an opinion?
	Replies to my mailbox or net.crypt please.

Ed Rupp		{ihnp4,seismo,gatech,ctvax}!ut-sally!oakhill!ed

gwyn@brl-tgr.ARPA (Doug Gwyn <gwyn>) (07/07/84)

I am convinced that the Beale ciphers are real, although who knows what
the undeciphered ones say.  They do have similar statistical characteristics
to the one that has been deciphered.  I did a bit of research years ago
to try to find the key document for the cipher that supposedly tells
where the treasure is (after all, why decipher the one that tells who is
legitimately entitled to the treasure?).  My premise was that some other
writing of Thomas Jefferson was most likely the key document.  However,
Jefferson wrote few documents that have enough words in them.  The one I
found most promising was also the one that T. J. considered his most
important, something like "A Bill to Repeal Slavery in Virginia".  I never
could get it to work, though.  Maybe there was a misnumbering or
something.

cbspt002@abnjh.UUCP (Marc E. Kenig ) (07/08/84)

<Beale's first two names are Thomas Jefferson...hmmm sort of obvious, no?>

  The owners of the land would only be abe to stake a claim if they KNEW
that the treasure was there when they acquired the land, or if they are
direct descendants to TJ Beale and/or company. Also, come into play the
laws of slavage in W. Virginia (and W. Va. Lawyers out there?).  You'd
pay tax immediately to the feds on those articles on which could be placed
immediate value (i.e. the gold and silver).  Fortunately, the 3rd
cipher (giving relatives names of those in Beales expedition) can not
be considered a will or title.
  Personally, I think it's a hoax.  Why put the most expository narrative
in the second, rather than the first cipher?? Also, if one is encoding a
message, you tend to write in a dry 'telegram' style.  TJ Beale not only
repeats himself, but uses qualifiers like 'vault or excavation', etc.
How about the ability to haul all that weight thousands of miles given
1820's wangons and a distinct lack of roads through tough terrain? Or the
fact that it was only buried six-feet deep (I'd of buried it a lot deeper
myself).  And why use such a popular document such as the Declaration for
one cipher key and then turn around and use far less obvious keys for the
others?  How come there are absolutely no Spanish records on such a party
ever visiting New Mexico (which had pretty thoroughly been picked clean by
the Spanish for over two centuries)?  And Mr. Morriss was either very honest
or had absolutely no curiosity to hold a lockbox for over 20 years and not
peek inside.
  Proving the ciphers to be hoaxes can only be done by indirect evidence and
hostorical analysis - which is as much part of cryptanalysis as codebreaking.
The Beale Cipher Society has some good collections of papers along this line.

M. Kenig  "Of course, somebody could've already dug it up and not told
...abnjh!cbspt002                          anybody. That's what I'd do!"

jim@randvax.UUCP (07/09/84)

--------
As the discoverer of the so-called "Gillogly strings" referred to in
the article to which this is a followup, I ought to enlarge on the
description of my discovery and give my opinion on the Beale Ciphers
in general.

My article was published in _Cryptologia_, vol 4 # 2 (Apr 1980),
titled "The Beale Cypher: A Dissenting Opinion."

To recap, the cipher algorithm of Paper #2 consists of numbering the
words in the Declaration of Independence (DOI) and replacing each plaintext
letter in the message with the number of a word in the DOI which begins
with that number.  I applied the DOI to Paper #1 and discovered garbage at
the beginning of the cipher, but significant patches of non-garbage a ways
into it.  The most striking sequence is "ABFDEFGHIIJKLMMNOHPP".  The
first F is encrypted as 195, and letter 194 of the DOI is a C.  The last
H is 301, and letter 302 of the DOI is an O.  Carl Hammer, a strong
defender of the legitimacy of the Beale Cyphers, did a thorough analysis
of Paper #2 and discovered 23 examples where the encryptor made errors
of this type, or about one every 33 letters.  There are several other
sequences that look non-random, such as AABBCCACDD.

The point of all this is that if one of the papers is decrypted with the
wrong document, the result should be a random assortment of initial letters
from the document being tried, and all sequences occurring in it must be
the result of random processes.  In the paper I computed the odds against
that sequence occurring randomly, but that was a bit silly since anyone
can see that it's totally out of the question.

So any explanation of the Beale as a legitimate cipher must explain how
that sequence could legitimately come about.  Hammer suggests that the
first paper could be encrypted as a "pun", where this sequence is there
intentionally, but if one used the right document a real message would
appear again.  He attempted to construct an example using two documents,
but could not achieve such a long sequence, nor use such small numbers
(one needs to go farther in the documents to find an initial letter that
fits both your intended message and the "pun").  I think this is
unlikely, if only because the writer was unlikely to have the kind of
time necessary to find two documents which would allow this extended
pun, nor any particular reason to do it.  (I discount Hammer's theory
that it was put there as a signal that the decryptor is on the right
track, because the original story assumed that the legitimate recipient
would have the keys and method for all three papers.)

My opinion is that a hoaxer made up the second message, then produced
two sets of garbage numbers.  While making up the first set of garbage
numbers, he picked numbers from the DOI that he had numbered in front
of him that ran in patterns (Hammer calls this my "doodle" hypothesis).

This opinion is supported by a number of internal and external clues.
One is alluded to by another writer in the followup:  why give a synopsis
of papers #1 and #3, since the expected legitimate recipient will know
exactly what is in them as soon as he deciphers them!  The numerous
errors made in the encryption testify that it was a painful process for
the writer, so why add extra verbiage to it?  Second, Paper #3 is supposed
to contain the names and addresses of all 30 members of the party (or
their heirs).  Paper #3 has only 600 or 700 numbers, so that each name
and address can have only about 20 characters.  A little sparse.

Greg Mellen discusses at some length the fact that the originals are
missing and that there are odd discrepancies in the different versions
of the ciphers that are still intact (BCA Newsletter, March 1980).
He also gives further examples that another net.crypt writer noticed about
Paper #2:
	The "vault" is "an excavation or vault".  It is not someplace,
	but has an "exact locality."  It is not "six feet down," but
	"six feet below the surface of the ground."  It is not "lined",
	but "roughly lined."  Things are not "packed", but "securely
	packed."  Vessels rest not on "stone," but on "solid stone".

A number of other points have been made by other authors, but this should
be plenty to convince those who haven't yet decided one way or the other...
(Was that a little snotty?  I apologize for any offense taken...)

	Jim Gillogly
	{vortex, decvax}!randvax!jim