Show Less
Restricted access

Cryptographic Crimes

The Use of Cryptography in Real and Fictional Crimes

Series:

Marcel Danesi

This book examines the use of cryptography in both real and fictional crimes—a topic that is rarely broached. It discusses famous crimes, such as that of the Zodiac Killer, that revolve around cryptic messages and current uses of encryption that make solving cases harder and harder. It then draws parallels with the use of cryptography and secret writing in crime fiction, starting with Edgar Allan Poe and Arthur Conan Doyle, claiming that there is an implicit principle in all such writing—namely, that if the cryptogram is deciphered then the crime itself reveals its structure. The general conclusion drawn is that solving crimes is akin to solving cryptograms, as the crime fiction writers suggested. Cases of cryptographic crime, from unsolved cold cases to the Mafia crimes, are discussed and mapped against this basic theoretical assumption. The book concludes by suggesting that by studying cryptographic crimes the key to understanding crime may be revealed.
Show Summary Details
Restricted access

1. The Origins and Uses of Cryptography

Extract

← x | 1 →

Chapter One

 

The Origins and Uses of Cryptography

What affected me most profoundly was the realization that the sciences of cryptography and mathematics are very elegant, pure sciences. I found that the ends for which these pure sciences are used are less elegant.

James Sanborn (b. 1945)

Prologue

One of the most frustrating of all cold cases in the annals of modern forensic science is the so-called Zodiac Killer one. The Zodiac was a mysterious serial killer who used Northern California as his killing ground in the late 1960s and early 1970s. The unknown murderer initiated the pseudonym of “Zodiac” himself in a series of letters designed to taunt the police and the media, adding to the mystery that he himself was obviously attempting to spin, as if he were writing his own version of a roman à clef. In several of his letters, the killer included four cryptograms. One has been definitively decoded, but three others remain unsolved and, presumably, hide the murderer’s real identity. ← 1 | 2 →

What makes the case particularly maddening is the possibility of unmasking the killer by decoding his seemingly simple ciphers. The whole case, actually, brings out the intrinsic connection among crime, mystery, and puzzles. The American writer, Henry David Thoreau, once remarked that, for some truly enigmatic reason, “We require that all things be mysterious and unexplorable.”1 Supporting Thoreau’s perceptive insight is the worldwide popularity...

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.