Musical cryptogram
A musical cryptogram is a cryptogrammatic sequence of musical symbols which can be taken to refer to an extra-musical text by some 'logical' relationship, usually between note names and letters. The most common and best known examples result from composers using musically translated versions of their own or their friends' names (or initials) as themes or motifs in their compositions. These are not really rigorous cipher algorithms in the formal sense, but more like musical monograms. The methods used historically by composers were either too incomplete (i.e., did not include all of the letters of the alphabet) or too simplistic to meaningfully encrypt long text messages. There is a separate history of music ciphers utilizing music notation to encode messages for reasons of espionage or personal security that involved encryption and/or steganography.
Because of the multitudinous ways in which notes and letters can be related, detecting hidden ciphers in music and proving accurate decipherment can be difficult.
History
[edit]From the initial assignment by Western music theorists of letter names to notes in the 9th century[1] it became possible to reverse the procedure and assign notes to the letters of names. However, this does not seem to have become a recognized technique until the Romantic period. From the mid-19th century it has become quite common. Sporadic earlier encipherments used solmization syllables.
Systems
[edit]Syllables to solmization names
[edit]It is believed that this method was first used by Josquin des Prez in his Missa Hercules Dux Ferrarie. It was named Soggetto cavato by the later theorist Zarlino. Under this scheme the vowel sounds in the text are matched to the vowel sounds of the solmization syllables of Guido of Arezzo (where 'ut' is the root, which we now call 'do'). Thus the Latin name of the dedicatee 'Hercules Dux Ferrarie' (Ercole d'Este, Duke of Ferrara) becomes re-ut-re-ut-re-fa-mi-re, which translates as D-C-D-C-D-F-E-D in modern notation with C as 'ut'. This is used as the cantus firmus of the mass setting. Josquin's method was imitated by several of his contemporaries and successors, including Adrian Willaert and Costanzo Festa.
Letters to note names
[edit]Since the note names only cover letters A to G (reflecting the octave repetition of these names), the problem arises as to how to cipher the rest of the alphabet. Historically there have been two main solutions, which may be labelled for convenience the 'German' and the 'French' methods.[2]
German
[edit]Because the development of note names took place within the framework of modes, in the German-speaking world B-flat was named 'B' and B-natural was named 'H'. The most common musical cryptogram is the B-A-C-H motif, which was used by Johann Sebastian Bach himself, by his contemporaries and by many later composers. Other note names were derived by sound, for example E-flat, 'Es' in German, could represent 'S' and A-flat the digraph 'As'.
Composers less fortunate than Bach usually seem to have chosen to ignore non-musical letters in generating their motifs. For example, Robert Schumann, an inveterate user of cryptograms, has just S-C-H-A (E-flat, C, B-natural, A) to represent himself in Carnaval. Sometimes phonetic substitution could be used, Schumann representing Bezeth by B-E-S-E-D-H. Johannes Brahms used B-A-H-S (B-flat, A, B-natural, E-flat) for his surname in the A-flat minor organ fugue, and the mixed language Gis-E-La (G-sharp, E, A) for Gisela von Arnim, among many examples.[3]
French
[edit]The 'French' method of generating cryptograms arose late in the 19th century and was more akin to normal encipherment. The most popular version involved writing out the letters H-N, O-U and V-Z in lines under the original diatonic notes A-G, as follows:
A | B | C | D | E | F | G |
---|---|---|---|---|---|---|
H | I | J | K | L | M | N |
O | P | Q | R | S | T | U |
V | W | X | Y | Z |
so that A, H, O, and V are enciphered by note 'A', B, I, P and W by 'B' (flat or natural) and so on.[4] This scheme was used by Jules Écorcheville, editor of the journal S.I.M., to solicit centenary commemorations of Joseph Haydn in 1909, except that he diverted the 'H' to B-natural, presumably to avoid too many repeated notes.[3] Writing to Gabriel Fauré about the invitation, Camille Saint-Saëns said he was writing to Écorcheville asking him to prove that Y and N could signify D and G as "it would be annoying to get mixed up in a farcical business which would make us a laughing stock in the German musical world."[5] The many-to-one mapping of this method makes it more difficult to extract possible motifs from the musical score than the one-to-one correspondence (apart from 'As') of the German system.
20th century
[edit]A French tradition of celebratory uses developed from the Haydn centenary, with tributes to Gabriel Fauré by Maurice Ravel, Florent Schmitt, Charles Koechlin and others in 1922 (added to later by Arnold Bax, 1949[6]) and to Albert Roussel by Francis Poulenc, Arthur Honegger, Darius Milhaud and others (using various ciphering schemes) in 1929. Honegger's system involved placing the letters after 'H' under sharpened and flattened notes,[3] an example of how chromatic cryptograms could be more easily accommodated in 20th-century music.[7]
Olivier Messiaen developed his own full cipher, involving pitches and note lengths, for his organ work Méditations sur le mystère de la Sainte Trinité (1969).[8][9]
Dmitri Shostakovich used the German scheme for his personal motto D-Es-C-H (D, E-flat, C, B-natural), representing D.SCH, which appears in many of his works. Elliott Carter featured both a cryptogram for the last name "Boulez" in his piece Réflexions (2004) and a sonic symbol of the first name "Pierre".[10]
Cryptograms were less common in England, but Edward Elgar, who was also interested in general cryptography and puzzles, wrote an early Allegretto for his pupils the Gedge sisters using G-E-D-G-E[11] and part of the 'enigma' in the Enigma Variations involves cryptograms.
Others
[edit]In 1947 Friedrich Smend suggested that Bach enciphered significant numbers through methods including repetitions of a motif, word, or phrase; the notes played on the continuo; the use of sequence; and the notes played by the accompaniment. However, Ruth Tatlow has presented evidence questioning the plausibility of Smend's claims.[12]
During the first quarter of the 20th century, American author and occultist Paul Foster Case established an esoteric musical cryptogram for the purposes of ceremonial magick. The system was a derivative of a cipher used by an affiliated magical order called the Hermetic Order of the Golden Dawn.[13] Each note of the 12 tone system was assigned a set of correspondences including colors, planets, zodiacal signs, and Hebrew letters. The holy names of biblical characters were translated letter by letter into a linear sequence of musical notes, so that each letter could be sung by the congregation in unison.
Ezra Sandzer-Bell has written and published two books on this subject,[14] describing how Paul Foster Case's system of musical cryptography could be applied to songwriting. Any word can be translated phonetically into Hebrew and converted using Case's cryptogram to generate a series of notes. Sandzer-Bell's project involves the conversion of the common and Latin names of plants, trees, and mushrooms into melodies. Each song was composed by consuming the plant in tea or tincture form, then using the physical effects of the plant to determine what kind of rhythm, harmony, instruments, and dynamics to use. A lengthy demonstration and proof concept is publicly available on the author's website.[15]
Solfa Cipher, invented in 2013, uses a combination of scale degrees and rhythms to represent letters of the alphabet with the goal generating encrypted texts which sound like relatively normal singable melodies.[16] As such, it has been used by musicians to create longer pieces with hidden messages. It has also been featured as a plot device in mysteries such as Gary McAvoy's Vivaldi Cipher.[17] and purportedly the video game Fortnite.[18]
Summary of signature motifs
[edit]The following list includes only motifs which are known to have been used in published works.
- A, B, E, B, A
- for Aubrey Brain, used in Gordon Jacob's Sextet for Piano and Winds, which was inscribed "In memoriam Aubrey Brain"
- A, B♭, B♮, F (= A, B, H, F)
- for Alban Berg and Hanna Fuchs-Robettin (A. B. and H. F.), used in Berg's Lyric Suite[22]
- A, B♭, E, G, G (= A, B, E, G, G)
- for Meta Abegg, the fictional inspiration for Robert Schumann's Abegg Variations, op. 1[23]
- A, C, A, D, A, C, A
- the nickname ("Acka Dacka") for AC/DC, used in the guitar riff for the band's 1977 song Whole Lotta Rosie
- A, D, A, A, F (= A, L, A, I, N)
- for Jehan Alain, used by Maurice Duruflé in his Prélude et Fuge sur le nom d'Alain (op. 7) and derived on the French system but leaving H = B-natural and starting the second line with 'I'
- A, D, E♭, C, B, F, E (= A, D, S, C, H, F, E)
- for Alfred Schnittke and Vladimir Feltzmann, used by Alfred Schnittke in his Sonata No. 1
- A, E♭, C, B♮ (= A, S, C, H) and A♭, C, B♮ (= As, C, H)
- used in Schumann's Carnaval, Op. 9.[23] He was romantically involved with Ernestine von Fricken, who came from the town of Aš, in German "Asch". Every piece in the whole cycle is based on one or other of these motifs. The letters are also the note names from 'Schumann' and he added the motif E♭, C, B, A (= S, C, H, A) so that three are displayed in breves in the section 'Sphinxes'. It has been noted that ASCH and SCHA also appear in the title of Schumann's Faschingsschwank aus Wien, Op. 26.
- [A], E♭, C, B♮, B♭, E(♮), G (= [A], S, C, H, B, E, G)
- for Arnold Schoenberg (A. Schönberg),[19] set 6-Z44
- A, E♭, G, E, B, B (= La, Es, Sol, Mi, Ti, Ti)
- for the initials of the London Symphony Orchestra (=La Es Sol) and Michael Tilson Thomas (=Mi Ti Ti), used by Oliver Knussen in Flourish with fireworks. Thomas commissioned Knussen for the opening concert of his first season as principal conductor of the London Symphony Orchestra - the piece is "affectionately dedicated to Michael Tilson Thomas and the London Symphony Orchestra."[24]
- B♭, A, B, E♭ (= B, r, A, H, m, Es)
- for Brahms, used by Alfred Schnittke in his Quasi Una Sonata along with the B-A-C-H motif and other quotations, and allusions[25]
- B♭, A, C, B♮ (= B, A, C, H)
- for Johann Sebastian Bach
- B, A, D, D, G (= H, A, Y, D, N)
- for Joseph Haydn, used by Maurice Ravel in his Menuet sur le nom d'Haydn and by other contributors to the S.I.M. commemoration and derived on the French system
- B, A, F (= B, La, F)
- for Mitrofan Belyayev, used by Nikolay Rimsky-Korsakov, Alexander Borodin, Anatoly Lyadov and Alexander Glazunov in a string quartet
- B♭, D, G♯, A, C, F (= B, Re, Gis, La, Do, Fa)
- from the Russian phrase берегись Лядова (beregis' Lyadova, beware of Lyadov), used by Nikolay Myaskovsky in his String Quartet No. 3
- B, E, B, A or B, A, B, E
- for Béla Bartók (Béla Bartók, the latter motif recognizing the Hungarian practice of placing the family name before the personal name)
- C, A, G, E
- for John Cage, used by Pauline Oliveros[26] and, in the composition CAGE DEAD, by Simon Jeffes of the Penguin Cafe Orchestra[27]
- C, F, E, B, A, C, H
- for Carl Philipp Emanuel Bach with the initials of his name - Carl Philipp (Filippo) Emanuel Bach -. The motif is based on the German musical nomenclature, however the initials of the composer’s name appear partially in German and in Italian version, instead of Philipp as Filippo. The C. F. E. BACH motif appears in an unpublished Fughetta in F major of C. Ph. E. Bach, found in the Brussels Conservatorium.[28]
- D, A, C, H, S
- for Josef Dachs. He was a piano teacher at the Vienna conservatory. Hans Rott was probably one of his students at the conservatory when he composed his Dachs-Studie for string orchestra.
- D, E♭, C, B (= D, S, C, H)
- for Dmitri Shostakovich (D. Schostakowitsch)
- E♭, A, C, B, E, D (= Es, A, C, H, E, Re)
- for Paul Sacher, known as the Sacher hexachord
- E, A, E, D, A (= E, La, Mi, Re, A)
- for Elmira Nazirova, pupil of Dmitri Shostakovich, used in his Symphony No. 10
- E, B, G (= E, H, G)
- for Edvard Grieg; his full name being Edvard Hagerup Grieg, the motif is a descending E-minor arpeggio which opens his Piano Sonata (Grieg)
- E♭, C, B♮, A (= S, C, H, A)
- for Schumann, used in Carnaval, it is a re-ordering of that piece's A-S-C-H motif
- F, A, E and F, A, F
- for Frei aber einsam and Frei aber froh, "free but lonely" and "free but happy" in German; the former, his friend Joseph Joachim's motto (F-A-E Sonata), described as "more romantic" than the latter, a "gender-separatist" motto of Johannes Brahms's[29] Symphony No. 3
- F, E♭, C, B (= F, S, C, H)
- for Franz Schubert (F. Schubert) [citation needed]
- G, A, B, D, B, E, E, F, A, G, D, E (= G, A, B, Re, H, E, Le - F, A, Ug, Re, E)
- for Gabriel Fauré, used by contributors to Henri Prunières' Fauré celebration in the October 1922 issue of La revue musicale[30] (F, A, G, D had also been used 20 years earlier for "Fauré" in a collaborative string quartet)
- G, A, D, E
- for Niels Gade; the motif is the basis of Robert Schumann's "Nordisches Lied", No. 41 from Album for the Young, Op. 68. Its subtitle is "Gruss an G."
- G, E♭, A, B (= G, Es, A, H)
- for Gustav Holst (Gustav Holst), used as the opening motif in the movement Uranus from The Planets.
See also
[edit]References
[edit]- ^ Hiley, David 'Notation III, 1 (vi)' in Sadie, Stanley (ed.), The New Grove dictionary of music and musicians, Macmillan, 1980, (6th ed. of the Grove dictionary), vol.13, p. 348–349
- ^ Sandzer-Bell, Ezra. "What is a Musical Cryptogram?". AudioCipher. Retrieved 17 November 2021.
- ^ a b c Sams, Eric 'Cryptography, musical' in Sadie, Stanley (ed.), The New Grove dictionary of music and musicians, Macmillan, 1980, (6th ed. of the Grove dictionary), vol.5, p. 80
- ^ An interactive tool to convert text into melodies using this 'French' music cipher is at https://wmich.edu/mus-theo/ciphers/ecorcheville.html
- ^ quoted in Nichols, Roger, Ravel, Dent, 1977, ISBN 0-460-03146-5, page 66
- ^ David Parlett, ed. "Baxworks"[permanent dead link ], Music by Arnold Bax.
- ^ An interactive tool to convert text into melodies using Honegger's music cipher is at https://wmich.edu/mus-theo/ciphers/honegger.html
- ^ Halbreich, C., 'Ciphered creed', Music and musicians, vol. 20 (1972) p. 18
- ^ An interactive tool to convert text into melodies using Messiean's music cipher is at https://wmich.edu/mus-theo/ciphers/messiean.html
- ^ Justin Wintle (2009). The Concise Makers of Modern Culture, p.123. ISBN 0-415-47782-4.
- ^ McVeagh, Diana (2007) Elgar the Music Maker. Woodbridge, Suffolk: Boydell Press. p. 3. ISBN 978-1-84383-295-9. "The Allegretto on GEDGE (1885) is based, Schumann-like, on the musical letters of Elgar's pupils, the Gedge sisters."
- ^ Tatlow, Ruth (1991). Bach and the Riddle of the Number Alphabet, p.25. ISBN 0-521-36191-5.
- ^ Regardie, Israel; Cicero, Chic; Cicero, Sandra Tabatha (1998-01-01). The Middle Pillar: The Balance Between Mind and Magic. Llewellyn Worldwide. ISBN 9781567181401.
- ^ "Books". Music and Magick. Archived from the original on 2016-04-10. Retrieved 2015-12-30.
- ^ "Music". Music and Magick. Archived from the original on 2016-03-04. Retrieved 2015-12-30.
- ^ https://solfa-co.de [bare URL]
- ^ McAvoy, Gary (2021) Vivaldi Cipher, Literati Editions. ISBN 978-1-954123-07-6
- ^ "Fortnite Season 7: Top 5 Secrets Fans May Have Missed in the Cinematic Trailer". 8 June 2021.
- ^ a b Taruskin, Richard (2009). Music in the Early Twentieth Century, p.324. ISBN 0-19-538484-9. "the 'Eschbeg set,' Schoenberg's musical signature." and "the 'A. Schbeg' (or 'Aschbeg') set."
- ^ a b Christopher Alan Reynolds (2003). Motives for Allusion: Context and Content in Nineteenth-Century Music, p.31. ISBN 0-674-01037-X.
- ^ Whittall, Arnold. 2008. The Cambridge Introduction to Serialism, p.206. Cambridge Introductions to Music. New York: Cambridge University Press. ISBN 978-0-521-86341-4 (hardback) ISBN 978-0-521-68200-8 (pbk).
- ^ Reel, James (2010). "Lyric Suite", AllMusic.com.
- ^ a b Blom, Eric (1961). Some Great Composers, p.85. ISBN 0-19-315133-2.
- ^ Anderson, Julian (July 2002). "Harmonic Practices in Oliver Knussen's Music since 1988: Part I". Tempo (New Series, No. 221): 2–13. doi:10.1017/S0040298200015618. JSTOR 946777. S2CID 145399155.
- ^ Schmelz, Peter J. (2009). Such Freedom, If Only Musical, p.254. ISBN 0-19-534193-7.
- ^ "Dear.John: A Canon on the Name of Cage", Larry Polansky, BMARS.
- ^ (). Gramophone Explorations. Vol. II. Gramophone. ISBN .
- ^ Komlós, Katalin (2015). Tanulmányok a 18. századi zene történetéből. Rózsavölgyi és Társa. p. 31. ISBN 978-615-80071-7-7.
- ^ Adam Krims, ed. (1998). Music and Ideology: Resisting the Aesthetic, p.Z-69. ISBN 90-5701-321-5.
- ^ Nectoux, Jean-Michel (translated by Roger Nichols), Gabriel Fauré: a musical life, Cambridge University Press, 1991, ISBN 0-521-23524-3, p. 427
Further reading
[edit]- Code, David Løberg (2023). "Can musical encryption be both? A survey of music-based ciphers." Cryptologia Volume 47 - Issue 4, https://doi.org/10.1080/01611194.2021.2021565
- Djossa, Christina Ayele (2018). "With Musical Cryptography, Composers Can Hide Messages in Their Melodies" Atlas Obscura March 26, 2018. https://www.atlasobscura.com/articles/musical-cryptography-codes
- Young, Ondine Tobin (1996). Frei aber einsam, frei aber froh: cyphered motives and performance practice. University of California, Santa Cruz.