Jump to content

User:Groventune/sandbox

From Wikipedia, the free encyclopedia


Solfa Cipher

[edit]
Solfa cipher interface

Solfa Cipher[1] is a musical code for turning words into melodies. As the name suggests, Solfa Cipher uses solfege syllables (e.g., Do, Re, Mi, Fa, So, La, Ti) rather than fixed pitched names (e.g., C, D#, Eb), which allows the same encrypted message to be transposable to different musical keys. Since there are only seven scale degrees, these are combined with a rhythmic component to create enough unique cipher symbols. However, instead of absolute note lengths (e.g., quarter note, half note, etc.) that are employed in most music ciphers, Solfa Cipher uses relative metric placement. This type of tonal-metric[2] cipher makes the encrypted melody both harder to break and more musically natural (i.e. similar to common-practice tonal melodies).[3] To decrypt a cipher melody, the recipient needs to know in which musical key and with what rhythmic unit the original message was encrypted, as well as the clef sign and metric location of the first note. To further confound interceptors, the transcribed sheet music could be written with a decoy clef, key signature, and time signature. The musical output, however, is a relatively normal, simple, singable tune in comparison to the disjunct, atonal melodies produced by fixed-pitch substitution ciphers.

Applications

[edit]

Literature

[edit]

Stories in which the plot includes the use of a Solfa Cipher.

  • The Vivaldi Cipher, by Gary McAvoy, 2021[4]
  • Cherringham - A Score to Settle: A Cosy Crime Series, by Matthew Costello and Neil Richards, 2022[5]
  • Message in a Melody, by Tyler S. Harris, 2023[6]
  • Mistake (a Naruto Fan Fiction), by EmzySS, 2018[7]

Technology

[edit]
  • Vibration System Localized Proximate A Target Artery, Arkady Uryash and Andrew Kenneth Hoffman, 2018. [8] An invention for directly stimulating arteries with acoustic vibrations which proposes transmitting text messages as Solfa Cipher melodies for therapeutic purposes.
  • Listening Watch, Prakash Shrestha and Nitesh Saxena, 2018. [9][10]

Solfalogy

[edit]

The cipher key could also be transmitted as a date by using Solfalogy, a method of associating each unique date with a tone and modal scale.[11]

See also

[edit]

Notes

[edit]
  1. ^ Solfa Cipher: https://solfa-co.de
  2. ^ Prince, Jon and Mark Schmuckler. 2014. "The Tonal-Metric Hierarchy: A Corpus Analysis," Music Perception, 31(3), 254-270.
  3. ^ Code (2023), p.352.
  4. ^ McAvoy, Gary, The Vivaldi Cipher, Literati Editions, 2021, ISBN 978-1-954123-06-9. https://garymcavoy.com/books-reviews/the-vivaldi-cipher/
  5. ^ Costello, Matthew and Neil Richards, Cherringham - A Score to Settle: A Cosy Crime Series, Bastei Lübbe AG, 2022, ISBN 978-3-7517-1543-0
  6. ^ Harris, Tyler S. Message in a Melody (podcast), 2023. https://www.listennotes.com/podcasts/science-fiction/message-in-a-melody-40VMyYtqJTe/
  7. ^ EmzySS, Mistake (a Naruto Fan Fiction), 2018. https://www.webnovel.com/book/mistake---a-naruto-fan-fiction_11938681306631305
  8. ^ Uryash, Arkady and Andrew Kenneth Hoffman, "Vibration System Localized Proximate A Target Artery", 2018. US Patent Application US2019/0175895 
  9. ^ Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks
  10. ^ Sound-based Two-factor Authentication: Vulnerabilities and Redesign
  11. ^ "Solfalogy". music-co.de/solfalogy.

References

[edit]
  • Alberti, Leon Battista. 1467. De Cifris. Biblioteca Nazionale Marciana. Cod. Marc. Lat. XIV 32 (4702) f. 1r. (sec. XVI).
  • Arnold, George. 1862. The Magician's Own Book. New York: Dick & Fitzgerald.
  • Bacon, Francis. 1605. The Proficience and Advancement of Learning Divine and Humane. Oxford
  • Belloni, Gabriella. 1982. "Conoscenza magica e ricerca scientifica in G. B. Della Porta". Criptologia / Giovan Battista Della Porta. Rome: Centro internazionale di studi umanistici
  • Bernard, Francis. c.1400. Sloan MS 351, British Library.
  • Bertini, A. 1811. Stigmatographie ou l'art d'écrire avec des points. France: Martinet.
  • Boethius, Anicius Manlius Severinus. c.524. De Institutione Musica. Translated by Calvin Bower, 1989, Fundamentals of Music (ed. C. Palisca), Yale University Press.
  • Bücking, Johannn. J. 1804. Anweisung zur geheimen Correpondenz. Heinrich Georg Albreht.
  • Cazden, Norman. 1961a. "Staff Notation as a Non-Musical Communications Code," Perspectives of New Music, Vol. 5, No. 1, 113-128
  • Cazden, Norman. 1961b. "How to Compose Non-Music," Perspectives of New Music, Vol. 5, No. 2, 287-296
  • Chailley, Jacques. 1981. "Anagrammes Musicales Et "langages Communicables"." Revue De Musicologie 67, no. 1: 69-80. doi:10.2307/928141.
  • Champour, MM. de and François Malepeyre. 1856. Nouveau manuel complet de la fabrication des encres telles. A la Librairie encyclopédique de Roret.
  • Code, David Løberg. 2023. "Can musical encryption be both? A survey of music-based ciphers." Cryptologia Volume 47 - Issue 4, https://doi.org/10.1080/01611194.2021.2021565
  • Daverio, John. 2002. Crossing Paths: Schubert, Schumann, and Brahms. Oxford University Press.
  • Djossa, Christina Ayele. 2018. "With Music Cryptography, Composers Can Hide Messages in Their Melodies," Atlas Obscura. https://www.atlasobscura.com/articles/musical-cryptography-codes
  • Duruflé, Maurice. 1942. Prélude et fugue sur le nom d'Alain, Op. 7.
  • Écorcheville, Jules. 1909. "Homage à Joseph Haydn," Revue musicale S.I.M. Société internationale de musique. https://gallica.bnf.fr/ark:/12148/bpt6k5589273s/f51.item
  • Ernst, Thomas. 1996. “Schwarzweisse Magie. Der Schlussel zum dritten Buch der Steganographia des Trithemius.” Daphnis 25, Heft 1.
[edit]