{"id":49916,"date":"2021-01-08T20:04:45","date_gmt":"2021-01-09T01:04:45","guid":{"rendered":"https:\/\/languagelog.ldc.upenn.edu\/nll\/?p=49916"},"modified":"2021-01-09T07:50:16","modified_gmt":"2021-01-09T12:50:16","slug":"codes-ciphers-and-cryptography-a-la-chinoise-et-a-la-japonaise","status":"publish","type":"post","link":"https:\/\/languagelog.ldc.upenn.edu\/nll\/?p=49916","title":{"rendered":"Codes, ciphers, and cryptography \u00e0 la chinoise et \u00e0 la japonaise"},"content":{"rendered":"<p>This is a passage from chapter 3 of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Dan_Brown\">Dan Brown<\/a>'s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_Fortress\"><i>Digital Fortress<\/i><\/a> (1998)<\/p>\r\n<p style=\"padding-left: 40px;\" align=\"left\" data-comment-id=\"50\">Eventually one of them [VHM:\u00a0 NSA cryptographers] explained what Becker had already surmised. The scrambled text was a code\u2011a \u201ccipher text\u201d\u2011groups of numbers and letters representing encrypted words. The cryptographers\u2019 job was to study the code and extract from it the original message, or \u201ccleartext.\u201d The NSA had called Becker because they suspected the original message was written in Mandarin Chinese; he was to translate the symbols as the cryptographers decrypted them.<\/p>\r\n<p style=\"padding-left: 40px;\" data-comment-id=\"51\">For two hours, Becker interpreted an endless stream of Mandarin symbols. But each time he gave them a translation, the cryptographers shook their heads in despair. Apparently the code was not making sense. Eager to help, Becker pointed out that all the characters they\u2019d shown him had a common trait\u2011they were also part of the Kanji language. Instantly the bustle in the room fell silent. The man in charge, a lanky chain\u2011smoker named Morante, turned to Becker in disbelief.<\/p>\r\n<p style=\"padding-left: 40px;\" data-comment-id=\"51\"><!--more--><\/p>\r\n<p style=\"padding-left: 40px;\" data-comment-id=\"52\">\u201cYou mean these symbols have multiple meanings?\u201d<\/p>\r\n<p style=\"padding-left: 40px;\" data-comment-id=\"53\">Becker nodded. He explained that Kanji was a Japanese writing system based on modified Chinese characters. He\u2019d been giving Mandarin translations because that\u2019s what they\u2019d asked for.<\/p>\r\n<p style=\"padding-left: 40px;\" data-comment-id=\"54\">\u201cJesus Christ.\u201d Morante coughed. \u201cLet\u2019s try the Kanji.\u201d<\/p>\r\n<p style=\"padding-left: 40px;\" data-comment-id=\"55\">Like magic, everything fell into place.<\/p>\r\n<p>David Becker is:<\/p>\r\n<p style=\"padding-left: 40px;\">&#8230;The youngest full professor at Georgetown University and a brilliant foreign\u2011language specialist, he was practically a celebrity in the world of academia. Born with an eidetic memory and a love of languages, he\u2019d mastered six Asian dialects as well as Spanish, French, and Italian. His university lectures on etymology and linguistics were standing\u2011room only, and he invariably stayed late to answer a barrage of questions. He spoke with authority and enthusiasm, apparently oblivious to the adoring gazes of his star\u2011struck coeds.<\/p>\r\n<p>No matter how smart David Becker is, the above passage left me reeling and roaring with laughter.\u00a0 As is true of almost everyone on the face of the planet, Dan Brown doesn't seem to have a clue as to how the Chinese and Japanese writing systems work and how are they are related to each other.<\/p>\r\n<p>Referring to Chinese characters as \"symbols\" right away gives one cause for grave reservation.\u00a0 When Becker tells the NSA cryptographers that the Mandarin \"symbols\" had the \"common trait\" of also being \"part of the Kanji language\", the commotion in the room instantly falls silent at this amazing profundity.\u00a0 When the leader of the team, \"a lanky chain\u2011smoker named Morante\", turns to Becker and asks in disbelief, \"'You mean these symbols have multiple meanings?'\u201d, this is what happened to me:\u00a0\u00a0&#x1f923;<\/p>\r\n<p>It only gets better \/ worse. Becker explains to the breathless team of NSA cryptographers that Kanji is \"a Japanese writing system based on modified Chinese characters\", and that he'd been giving the team Mandarin translations because that's what they asked for. Whereupon lanky, chain-smoking Morante coughs and says, \"Let's try the Kanji\". Becker tries the Kanji, then, like magic, everything falls into place.<\/p>\r\n<p>Brown portrays the NSA cryptographers as not knowing the difference between language and script and being unaware that the distinction between Chinese and Japanese is not merely a matter of flipping a switch between a kanji system and a hanzi system.<\/p>\r\n<p>If that were the case, woe is us.\u00a0 Thankfully, it is not.<\/p>\r\n<p>&#8212;&#8212;&#8212;&#8212;<\/p>\r\n<p style=\"padding-left: 40px;\"><i>There is probably no subject on earth concerning which more misinformation is purveyed and more misunderstandings circulated than Chinese characters <\/i>(<span class=\"py\">\u6f22\u5b57<\/span><i>, Chinese <\/i>hanzi<i>, Japanese <\/i>kanji<i>, Korean <\/i>hanja)<i> or sinograms.<\/i> <br \/>&#8211;Victor Mair<br \/>from the foreword to <i><a href=\"http:\/\/www.pinyin.info\/readings\/ideogram.html\">Ideogram<\/a><\/i>, by J. Marshall Unger<\/p>\r\n<p style=\"padding-left: 40px;\">http:\/\/www.pinyin.info\/<\/p>\r\n<p style=\"padding-left: 40px;\">See also:<\/p>\r\n<p style=\"padding-left: 40px;\">http:\/\/pinyin.info\/readings\/ideogram.html<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><b>Selected readings<\/b><\/p>\r\n<ul>\r\n<li>\"<a title=\"Permanent link to Translation as cryptography as translation\" href=\"https:\/\/languagelog.ldc.upenn.edu\/nll\/?p=4330\" rel=\"bookmark\">Translation as cryptography as translation<\/a>\" (11\/19\/12)<\/li>\r\n<li>\"<a title=\"Permanent link to Unknown language #8\" href=\"https:\/\/languagelog.ldc.upenn.edu\/nll\/?p=32464\" rel=\"bookmark\">Unknown language #8<\/a>\" (5\/3\/17)<\/li>\r\n<li>\"<a title=\"Permanent link to The indecipherability of the Voynich manuscript\" href=\"https:\/\/languagelog.ldc.upenn.edu\/nll\/?p=44374\" rel=\"bookmark\">The indecipherability of the Voynich manuscript<\/a>\" (9\/11\/19)<\/li>\r\n<li>\"<a title=\"Permanent link to Voynich code cracked?\" href=\"https:\/\/languagelog.ldc.upenn.edu\/nll\/?p=42749\" rel=\"bookmark\">Voynich code cracked?<\/a>\" (5\/16\/19)<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p>Additional Language Log posts about Dan Brown's novels and related topics:<\/p>\r\n<ul>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/~myl\/languagelog\/archives\/000844.html\">The Dan Brown code<\/a>\" (May 1, 2004)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/~myl\/languagelog\/archives\/000906.html\">The sixteen first rules of fiction<\/a>\" (May 15, 2004)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/001622.html\">Dan Brown still moving very briskly about<\/a>\" (November 4, 2004)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/001628.html\">Renowned author Dan Brown staggered through his formulaic opening sentence<\/a>\" (November 7, 2004)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/001631.html\">Oxen, sharks, and insects: we need pictures<\/a>\" (November 8, 2004)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/001684.html\">Thank God for film: Dan Brown without the writing<\/a>\" (December 2, 2004)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/002325.html\">Learning the ropes in the trenches with Dan Brown<\/a>\" (July 14, 2005)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/002345.html\">Don't look at their eyes!<\/a>\" (July 19, 2005)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/002467.html\">A five-letter password for a man obsessed with Susan<\/a>\" (September 10, 2005)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/003145.html\">Some striking similarities<\/a>\" (May 15, 2006)<\/li>\r\n<li>\"<a href=\"http:\/\/itre.cis.upenn.edu\/%7Emyl\/languagelog\/archives\/003147.html\">Is Mark Steyn guilty of plagiarism?<\/a>\" (May 15, 2006)<\/li>\r\n<li><a href=\"http:\/\/itre.cis.upenn.edu\/~myl\/languagelog\/archives\/003151.html\">Cutting in line: what would Of Nazareth do?<\/a> (May 16, 2006)<\/li>\r\n<li><a href=\"http:\/\/itre.cis.upenn.edu\/~myl\/languagelog\/archives\/003155.html\">A tale of two copiers<\/a> (May 17, 2006)<\/li>\r\n<\/ul>\r\n<p>Also <a href=\"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?s=dan+brown\">here<\/a>.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>This is a passage from chapter 3 of Dan Brown's Digital Fortress (1998) Eventually one of them [VHM:\u00a0 NSA cryptographers] explained what Becker had already surmised. The scrambled text was a code\u2011a \u201ccipher text\u201d\u2011groups of numbers and letters representing encrypted words. The cryptographers\u2019 job was to study the code and extract from it the original [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[320,18],"tags":[],"class_list":["post-49916","post","type-post","status-publish","format-standard","hentry","category-decipherment","category-writing-systems"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=\/wp\/v2\/posts\/49916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=49916"}],"version-history":[{"count":8,"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=\/wp\/v2\/posts\/49916\/revisions"}],"predecessor-version":[{"id":49933,"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=\/wp\/v2\/posts\/49916\/revisions\/49933"}],"wp:attachment":[{"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=49916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=49916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/languagelog.ldc.upenn.edu\/nll\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=49916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}