Read The Lost Treasure of the Templars Online
Authors: James Becker
Robin began reading out the individual letters that formed the text of the medieval parchment, drawing a neat diagonal line through each one as she did so. Where the letter was in any way ambiguousâsometimes the letter
O
, for example, could look like a
Q
, or
C
resemble a
G
âshe drew a circle around the letter and told Mallory to put both the possible letters in brackets for the decryption that would follow.
She also told him to put a space after every letter that appeared to be the last one in a particular word. She was fairly sure she wasn't always getting everything right, because Mallory's earlier comment had been accurate: in a few places the words seemed to run one into the next without any break that she could see, and the quill or whatever had been used to write the text had had a thick point, so the letters themselves were heavy and difficult
to interpret. To complicate it still further, in some areas the ink had faded significantly, and the letters were even more difficult to read in consequence.
But they quickly settled into a routine as the parchment began to yield its secrets, or at least the encrypted text, in its entirety.
Via di Sant' Alessio, Aventine Hill, Rome, Italy
“It's not the first time this has happened,” Toscanelli responded. “Are you quite certain about it?”
Vitale nodded. “We've never before had such a precise result from any of our surveillance mechanisms. This time we are positive that the relic has at last been discovered again after having been lost for so many centuries.”
“Please convince me,” Toscanelli said.
“The term was entered into a search engine in Britain. In fact, the user carried out quite a number of searches, most of them including the one expression we are almost certain would be used, the Latin
Ipse Dixitâ”
“The master's words,” Toscanelli interjected.
“Exactly, but some of the searches, especially the later ones, also included words like
manuscript
and
medieval
, so it seems almost certain that the person who initiated those searches is in possession of the relic. We've printed all the search terms entered from that one location.”
Vitale picked up one of the sheets of paper from the desk in front of him and passed it across.
Toscanelli glanced at it with professional interest.
“They got the title right,” he said. “As far as we know, the relic bore the name
Ipse Dixit
, and that's not likely to be a mistake. So that looks like a confirmation that they have somehow found it. We need to move fast.”
“Faster than you think. We want this sorted within hours, not days. We simply can't afford under any circumstances for the text to be decrypted, not after all the years we've been looking for it.”
Toscanelli nodded.
“Where do I need to go?” he asked, “and how big a team am I taking?”
“The target is a man named Robin Jessop and he's in southwest England in a town named Dartmouth. There will be six of you in total, and the other five have already been briefed and are on their way to Ciampino Airport, where there's a private jet waiting for you. You will use your real name, and you alone will be responsible for communicating with this office. All your equipment, including weapons and the documentation you'll need, will be on the aircraft when you get there. As always, none of you are to take any personal identification with you whatsoever. This has to be a completely deniable operation. Under no circumstances are the British authorities to find out what is happening, and the usual rules will apply in the event of any of your team being compromised or apprehended.”
Toscanelli nodded. “They are to be silenced, permanently, before they can be interrogated.”
“Exactly. Ensure that they all know that before the operation commences. In this case, you should meet no problems. The man is a bookseller in a small coastal town in England. He will not be armed, and may well be elderlyâso far, our systems have not been able to
determine that. Once you have retrieved the relic, any and all evidence that he may have already deduced about it is to be either recovered and brought back here or destroyed. Fire is probably the preferred method, as it will conceal almost everything.”
Vitale handed over a black-colored folder. “All the information we have is in here. The whole sequence of events, the search terms used, and of course all the address details for this man Jessop.”
Toscanelli nodded again. The operation sounded simple and straightforward, and he only had one final question to which he thought he probably already knew the answer. But for the benefit of the recorders that he knew would be running in the background in the office, he needed to hear the instruction. “And Jessop himself? What about him?”
“He is to be eliminated. If possible, make it look like an accident. If not, use any method that seems expedient and effective. But it is essential that he is dead before you leave the scene.”
Dartmouth, Devon
It took the pair of them well over an hour to transcribe the entire text of the parchment into the computer, a long, boring, and tiresome operation.
When they'd finally finished, Mallory copied the file onto a memory stick and gave it to Robin, who transferred the file onto her own laptop and printed two copies of the transcribed text on her laser. Then she handed back the memory stick, stood up from her chair, and stretched.
“I don't think I can face starting the decryption right now,” she said. “I need a caffeine injection as a matter of some urgency, and this time I'm buying.”
“Good idea.”
Mallory stood up as well, closed the lid on his laptop and unplugged the charger cable, then slid the computer back into his bag.
Robin looked at him quizzically.
“I can't afford to lose this machine,” Mallory said simply. “I do a lot of my work for my clients offsite, and so I have a lot of commercially sensitive material on this
computer as well as some expensive utility programs, plus all my personal stuff. So where I go, the laptop goes.”
“Even fifty yards down the road for a coffee?”
“Even fifty yards down the road for a coffee,” Mallory confirmed.
Robin locked the apartment door behind her and at the bottom of the spiral staircase she opened the rear door to the shop and led the way inside.
A pleasant-looking middle-aged woman turned around from her seat behind the counter as they walked in, lowering the novel she had been reading as she did so.
“Betty,” Robin said, “this is David Mallory. He's helping me with a little project I'm working on.” She turned to Mallory. “Betty runs the place,” she went on. “I simply couldn't manage the shop without her. I know that's a cliché, but in this case it also happens to be absolutely true.”
The coffee in the café Robin had selected was far better than it had been in the one where they had met. Somewhat revived and fortified, they were back in her office within twenty minutes, and Mallory started work on the decryption almost immediately. And almost immediately he ran into problems.
“You're quite right,” he said. “It's only the first nine words that I can decode using the Atbash cipher with the eleven-place shift to the left. It doesn't work for the tenth word, nor the eleventh or twelfth.” He thought for a few seconds, then continued. “I suppose realistically there are only two possibilities. Either whoever wrote this switched to a different type of encryption method, or they simply used a different shift but carried on using Atbash.”
“If it's medieval, and I still think that's the most likely period, then I have no idea what other possible types of cipher were around, if any. Do you know?”
“Oddly enough, yes. Ciphers of various sorts have
been around for a long time. Researchers have identified three kinds of monoalphabetic ciphers in the Old Testament, and there are even records of an early type of steganographyâthat's a technique for hiding a message inside another mediumâusing wax tablets from around the fifth century BC. The idea was to scratch the real message in plaintext on a block of wood used as the backing for a wax tablet, then apply the normal wax surface to hide it and write another, entirely innocent, message on the wax. Melt the wax off the wood, and then the important message could be read.”
Mallory laughed shortly.
“That was a fairly efficient method of sending a hidden message, because it could travel as fast as the messenger could run or a horse could gallop, but there was another classic example of steganography that was a lot slower. According to Herodotus, in ancient Greece a vital message about Persian invasion plans was tattooed on the shaved scalp of a slave. Weeks later, when his hair had grown long enough to hide the tattoo, he was sent off to the recipient of the message, his head was shaved again, and the warning was delivered, but that was obviously a really slow option.”
“I've actually heard of steganography,” Robin said. “That includes things like microdots, doesn't it?”
“Microdots and almost everything else, yes. There was a famous case back in the sixties when an American serviceman who'd been captured by the North Vietnamese blinked his eyelids to spell out the word
torture
in Morse code during a press conference he was forced to attend, which is one of the more unusual examples. These days, because of digital transmission media, you can hide data or images in almost everything from pictures to sound files and documents.
“One very simple and obvious way of doing that would be to include a passage of text in a blank area of a word-processing document, and to make the text the same color as the background. It would be invisible to anyone reading the document, but if the recipient knows where it is he can simply highlight the block, change the text color, and read it. But more usually the text would be shrunk down to the size of a full stop or other punctuation mark and embedded somewhere in a document, or reduced to the size of a single pixel and then hidden in an image file of some type.
“Then there was a thing called a Polybius square, developed by a Greek historian in the second century BC, which was used to convert letters into numbers, most commonly employed in signaling. A variant of that is still in use today. And it was most probably Julius Caesar who used what you might call a shifted Atbash in his military communications, usually without reversing the cipher alphabet, and a monoalphabetic cipher of that kind is still known today as a Caesar alphabet. He also did things like substituting Greek for Latin letters. Coming a bit more up to date, the Vikings used simple encryption methods in some of their rune stones, and in the thirteenth century, Roger Bacon wrote quite a lot about the cryptography methods that were then in common use. Techniques for encrypting messages and information have been around in various forms for a long time. There's even a section in the Kama Sutra about the importance of using and understanding ciphers.”
“The Kama Sutra?” Robin asked. “I thought that dealt with slightly more interesting subjects, like sex.”
“It does.” Mallory grinned. “And those are the only bits that everybody reads, but there's a lot more in that work than just finding the rightâor even the wrongâposition to adopt when you're in bed with somebody.”
He looked back at the printed text in front of him.
“But almost all of these methods were various types of substitution ciphers,” he finished, pointing at the paper he had been scribbling on, “and I'm pretty certain that this is just a kind of Atbash, nothing more complicated than that. And using this method of shifting, there are only twenty-six possible alternative keys, or fifty-two if we include the nonreversed cipher alphabets. I'll write out all of them and then we'll pick a word that's fairly short, four or five letters, something like that, and try each of them until we find the one that decodes it.”
Writing them all out was laborious, but easy, not least because Robin did half of them.
“I'll start from the beginning,” Mallory said, “with a right shift of one place, and see where that gets us.”
The short answer was nowhere, because it didn't work. Nor did the right shift of two, but when he tried the next possible key, right-shifted three places, the first four-letter word he had selected deciphered as
deus
.
“That looks like Latin,” he said.
“That's because it is,” Robin confirmed. “It's the Latin word for God.”
Mallory quickly decoded the nine words that followed the first group he had deciphered.
“If the guy who wrote this was following a pattern,” he said, “I'll probably need to use a different key for the next word.”
But to his surprise, he decrypted the next word, the nineteenth in the manuscript, using the same key, and did the same with the following eight. However, the twenty-eighth word refused to decipher using that key, and Mallory took several minutes, trying each possible Atbash key until it finally yielded to a left shift of seven. That worked for the next eight words, but not for the ninth.
“That's interesting,” he said. “There's obviously something important about the number nine, because I've now used three different Atbash ciphers, two of them decoding nine words each and the other one decoding eighteen, which is of course nine multiplied by two. I'll bet this cipher works either for nine words or for a multiple of nine.”
It did. The thirty-seventh word didn't decode until Mallory tried a left shift of eight, and then he was able to decipher the next eight words to make a total of nine for that particular key. The next group decoded using Atbash shifted eleven places left, and the following eighteen using a right shift of three.
“He's starting to repeat himself,” Mallory said, “and that might make it a bit easierâor at least quickerâto sort out the rest.”
The first section of the document was eighty-three words in length, and because Mallory could guess where the cipher changed and what the subsequent one was likely to be, he made short work of decrypting the text into Latin. But when he tried to decode the first word of the second paragraph or section, none of the keys he'd used before decrypted it, and in fact none of the twenty-six possible shifted Atbash keys worked, and nor did the keys using the nonreversed alphabet.
“I didn't expect that,” he said. “This section has obviously been written using either a different encryption method or a different type of Atbash cipher. I know I told you that there weren't that many alternative types of code in use in the Middle Ages, but I think we're looking at one.”
“But however it was done,” Robin said, “it surely can't be that sophisticated?”
“Probably not. Atbash is the simplest possible type of
monoalphabetic substitution cipher, and it wouldn't be that great a leap of logic for somebody who used that code to make the transition from it to another type of substitution cipher, but using a keyword or several keywords, instead of just the alphabet written forward or backward and shifted left or right.”
Robin looked slightly blank.
“Let me give you a very simple example.”
Mallory jotted down the letters
A
to
F
in a horizontal line on the paper, and then wrote
BRANDY
directly underneath them.
“Right, that's the first part of the alphabet and let's assume that
BRANDY
is the keyword you've chosen. Suppose you wanted to encode the word
DECADE
. You do it exactly the same as you'd do in Atbash: just read off the letters from the code word that correspond to the plaintext letters, so
D
would be enciphered as
N
,
E
as
D
, and so on. So using that code word,
DECADE
would be encrypted as
NDABND
. Two ciphers that are still in use todayâthe single and double substitution ciphersâuse exactly the same technique. In theory, you can't decrypt the text without knowing what the code word was, and certainly not with a double substitution cipher that uses two different code words that both have to be applied. You encrypt the plaintext using the first code word, then encrypt the enciphered text using the second code word, so it's really difficult to crack. But that's a comparatively recent technique, and I don't believe that's been used here.”
“You said that in theory you can't crack it, but what about in practice? Is it possible?” Robin asked.
“In practice, the biggest problem in decoding encrypted text is usually time. Today, given enough computing power and sufficient time, almost any code can be
cracked. That's what places like GCHQ out at Cheltenham do. That's their job over at Spook Central, the whole reason they're there. They have banks of supercomputers, things like Crays, and they run what are called brute force attacks, trying every possible combination of letters, numbers, punctuation marks, and symbols against messages they believe are important. That technique only works because these computers can try tens or hundreds of millions of combinations every
second
. I don't have access to a supercomputer, obviously, but with simple ciphers there are things you can do quite quickly to try to work out what at least some of the encrypted letters stand for. Have you ever heard about a technique called frequency analysis?”
“Oddly enough, yes, if you're talking about an alphabet. In English, the most commonly used letters of the alphabet are, in order,
E T A O I N
. Don't ask me how or why I remember that, but I just do.”
“Exactly,” Mallory said, looking at her with new respect. “Most people have never even heard of it. So looking back at my simple example using
BRANDY
as a code word, if you applied frequency analysis to the result, you could reasonably assume that either the encrypted letter
N
or
D
represented the plaintext letter
E
, and of course you'd be quite right: it's
D
. The bigger the sample you have to work with, the more accurate the result is likely to be. Unfortunately I don't know the frequency analysis details for Latin, so that method wouldn't necessarily be much use to us here. And the other problem is that if the person who wrote this text decided to change the key every nine words, we might never be able to decipher it completely because we just wouldn't have enough material to work with.”
“So, is there anything we can do?” Robin asked.
“That's really where you come in. I've deciphered the first eighty-odd words of this, so we now have the Latin text. If you can translate that into English so that I can understand it, then we might find a clue.”
Ten minutes later, Robin passed Mallory a sheet of paper on which she had written out a translation of the Latin text. He took it eagerly, but the expression on his face changed as he read it. Then he put the paper on the desk and looked across at Robin.