Pages

05 October, 2024

JUNGLE OF FEAR (1993): The secret writing of Jess Franco, Part 1.

The article below is (C) Dirk Rijmenants- 2004-2024 In 1840, Edgar Allan Poe wrote an article in the Alexander's Weekly Messenger, a Philadelphia newspaper where he challenged the readers to submit their own substitution ciphers which he would decrypt. Initially, he received cryptograms from around Philadelphia, but soon after, they came in from all over the United States. He published many of the cryptograms and their solutions in fifteen numbers of the Alexander's Weekly Messenger. The next year, Poe published his essay called "A Few Words on Secret Writing" in Graham's Magazine, in which he commented on the response to his cipher challenge (see download below). The essay also gave birth to the famous quote that "human ingenuity cannot concoct a cipher which human ingenuity cannot resolve". In the 19th century, most people considered secret writing and cryptography as a mysterious esoteric art, and Poe had sparked a great interest in cryptography among the general public. Thanks to Poe's publications, cryptogram puzzles became popular in newspapers and magazines. Inspired by the success of the cryptograms and the interest in his essay, he decided to write a short story that involved cryptography. After writing The Gold-Bug, he submitted the story to a writing contest, winning the grand prize and $100. The story was published on June 21, 1843, in Philadelphia's Dollar Newspaper. It is regarded as the first important publication in popular non-technical literature that incorporated cryptography in its story line. The Gold-Bug contains a detailed description of how to solve a cryptogram using letter frequency analysis. The story was an instant success and helped popularize cryptography in the 19th century. Edgar Allan Poe's The Gold-Bug is as iconic to cryptography in literature as David Kahn’s book The Codebreakers is to historical publications on the subject. It became one of his most read and best-known stories. Many readers have set their first steps in cryptology after reading Poe’s story and some even became important codebreakers, such as the renowned cryptologist William Friedman. Many writers have been inspired by Poe to include ciphers and coded messages in their own books. Poe is also considered one of the pioneers of detective and mystery stories. The Story Top The main character in the story is William Legrand, a man who lives at Sullivan's Island, near Charleston, South Carolina, to escape from his misfortunes. Legrand discovers a brilliant gold-colored bug but lends it out to someone else. When his friend, the narrator of the story, visits Legrand, he is told about the rare bug with a death's-head on its back, and Legrand draws him a picture of the bug on a piece of paper. A short while later, Legrand asks his friend to come visit him immediately. Upon the friend's arrival, the strangely behaving Legrand asks his friend to follow him on an expedition into the woods near some rocks, to search for a treasure. Afraid that Legrand has lost his mind, the friend decides to accompany him out of concern for Legrand's health. As it turns out, Legrand accidentally had discovered a secret message in invisible writing on the paper he used to draw the bug. Legrand later explains his friend how he found the message and how he was able to decrypt the message that started his quest for a hidden treasure. The cryptogram, as discovered by Legrand: Image by Dirk Rijmenants - Cipher Machines & Cryptology You can download a printable version in txt format. The Gold-Bug is not only an exciting story about the discovery of an old treasure, but also a great introduction to cryptography and codebreaking. It tickles the reader's curiosity and Poe gives a detailed description of how to decipher the cryptogram. While doing so, he also provides the solution. However, deciphering the message yourself is even more exciting than reading how Legrand did it in the story. Can I challenge you, just as Poe did, to decrypt Legrand’s message, composed more than 160 years ago? Decrypting the Message Top Rather than just reading Poe’s story, I will show you the technique and give you the chance to do it all by yourself. It might be useful to read The Gold-Bug first, as the story might provide information that will help to solve the cryptogram but read only to where the cryptogram appears. Don't cheat by reading or peeking any further! Don't search the Internet for Poe or The Gold-Bug, as this will also spoil the fun. The message is encrypted by mono-alphabetic substitution, a cipher where each letter of the alphabet is replaced by other symbol or letter. We can calculate all possible combinations for the 26 letters of the alphabet. The first letter is substituted by one of 26 symbols or letters, including itself. The second by one of the 25 remaining symbols or letters, and so on. The calculation 26 x 25 x 24…x3 x2 x 1 or 26! gives us a total of 403,291,461,126,605,635,584,000,000 different ways to replace 26 letters by another symbol or letter. How on earth could we possibly decipher such a cryptogram? For centuries, substitution ciphers were regarded as unbreakable...but it is easier than it looks. Although there are trillions of ways to allocate a set of symbols to letters, there are only a few ways to combine vowels and consonants in a natural language. Strict linguistic rules determine which letter combinations are possible and which are not. The syntax prescribes how words, and their order, are combined into a sentence, and conjugation rules determine how verbs are written. When we substitute letters with symbols, those symbols still follow all these rules and therefore create patterns that we can detect. Just as certain letter combinations are impossible (ZLG, XOJ, KFN,...), so will certain symbols avoid one another. Just as one vowel can only fit in a given set of consonants (THR?ST, L?GHT, ?NSW?R,...) so will certain symbols attract each other. But where do we start? The mystery weapon to solve our message is letter frequency analysis, the basis of all codebreaking. Each language has its own typical distribution of letters in a text. In English, the letter e is by far the dominant letter, with an average of 12.7 percent. If we locate some of the most frequent vowels or consonants in the ciphertext, or find recurring symbol combinations, then the rules of the language will give us strong leads to the words they are used in, or the letter they represent. Below, you'll find the letters of the alphabet, ordered from most frequent at the left to least frequent at the right (Poe used an older and slightly different frequency table). E T A O I N S R H L D C U M F P G W Y B V K X J Q Z
For Legrand’s message, start by taking a sheet with squares and write down the secret message with a pen. Leave some blank rows between each row of the message, to write your solution underneath the symbols with a pencil (easily corrected with a gum). Count how many times each of the symbols appears in the cryptogram and write down the results in a table, ordered from most to least frequent. You will see that one of the symbols clearly stands out. This is the first major clue. That most frequent symbol represents without doubt the most frequent letter of the alphabet. Write your first results underneath the according symbols on your message sheet. Next, you try to spot recurring combinations of symbols. The most used words in English, in order of frequency, are THE, OF, AND, TO and IN. Therefore, you must search for identical combinations of symbols that contain the most frequent letter you already found. You should spot each THE quite easily. If so, you have discovered the solution for two more letters that are used frequently. Make yourself a second table with all the symbols and their corresponding letters you already found. By now, you should be able to find more and more letters by completing fragments. If, for instance, you find a fragment T?EE, it is not hard to imagine what should follow the letter T. Vowels twins (AA, EE, OO…) are common but not that many different words contain such pairs. Try to find those words. If you can’t see it immediately, try all letters of the alphabet until you get something readable. Each new letter will help you to reconstruct more and more fragments. Be patient. It could take some time before a word appears in front of you, but once you have four or five letters, you’re in a straight line to the finish. Good luck...and make sure you don't get bitten by the bug! Note: in the original edition, one symbol "(" was not printed near the end of the message, right after ‡9;48; although Legrand describes just that missing symbol to assist in finding a word. Since the story refers to that symbol, it is unlikely that it was omitted on purpose and probably got lost during the publishing. Downloads Top Edgar Allan Poe's The Gold-Bug PDF Format The original story A few Words on Secret Writing PDF Format Poe's essay on cryptography with his comments on the 1840 cipher challenge More on Manual Ciphers Top Hand Ciphers Various techniques to encrypt messages with pen and paper. More About Poe (offsite, opens in new tab) Top The Edgar Allan Poe Society of Baltimore containing the collected works of Poe. NSA - Signal Corps Bulletin No 97, 1939 PDF Format extract pdf p43-55, renowned cryptologist William Friedman on Edgar Allan Poe (full document) The Gold Bug mp3 on BookAudio.online read by Vincent Price. The Gold-Bug Audio Book on Youtube read by Vincent Price." © Dirk Rijmenants 2004. Last changes: 13 January 2023
The above article is an ideal way to explore the numerous Jess Franco film adaptations of Edgar Allan Poe's 1842 short story, written to popularize what was then called "secret writing", cryptology and cipher writing which depends on the frequency of certain ciphers. When one studies the Franco's massive filmography one is immediately struck how the writer director uses the same plots/plot elements over and over, repurposing them to fit into various genre classifications. The various adventures of Doctor Orloff, Eugenie, Linda, etc. THE GOLD BUG is a story of a search for gold undertaken by adventurers off the coast of South Carolina. Poe's cipherchallenge was taken up by the world post haste of the publication of the story, which won first prize plus $100 dollars in Philadelphia's Dollar Newspaper. Encrypted messages, of course, become crucial communications in the contexts of espionage and warfare. Numerous Franco releases incorporate THE GOLD BUG in their story and structure, LA NOCHE DE LOS SEXOS ABIERTOS and L'ESCLAVA BLANCA to name a few. As it turned out, JUNGLE OF FEAR, an unfinished 1993 Spanish US production, was his most ambitious attempt to adapt the story. The children's film adventure EN BUSCA DEL DRAGON DORADO (1982) features neglected children as searchers for a treasure which is mapped by a parchment printed with hidden hieroglyphs which became visible when held over a flame. In the case of this film mystical Kung Fu plays a key element in the mise-en-scene and advertising. The not completed status of JUNGLE OF FEAR makes it a fascinating alternative text when helf up against the story and its other Franco adaptations. As we shall see in a future blog Franco repeatedly utilized the story and its structure as a representation of his search for cinema.
LA NOCHE DE LOS SEXOS ABIERTOS (1981)