Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-p9bg8 Total loading time: 0 Render date: 2024-12-25T03:14:41.742Z Has data issue: false hasContentIssue false

Secret Writing in the Long Eighteenth Century

Theories and Practices of Cryptology

Published online by Cambridge University Press:  24 November 2022

Katherine Ellison
Affiliation:
Illinois State University

Summary

Cryptology of the long eighteenth century became an explicit discipline of secrecy. Theorized in pedagogical texts that reached wide audiences, multimodal methods of secret writing during the period in England promoted algorithmic literacy, introducing reading practices like discernment, separation, recombination, and pattern recognition. In composition, secret writing manipulated materials and inspired new technologies in instrumentation, computation, word processing, and storage. Cryptology also revealed the visual habits of print and the observational consequences of increasing standardization in writing, challenging the relationship between print and script. Secret writing served not only military strategists and politicians; it gained popularity with everyday readers as a pleasurable cognitive activity for personal improvement and as an alternative way of thinking about secrecy and literacy.
Get access
Type
Element
Information
Online ISBN: 9781009086820
Publisher: Cambridge University Press
Print publication: 08 December 2022

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Akkerman, N., ed. (2011). The Correspondence of Elizabeth Stuart, Queen of Bohemia, 3 vols. Oxford: Oxford University Press.Google Scholar
Anonymous. (1727). The Art of Decyphering Discovered: In a Copy of Verses to a Lady, Upon Sending Her an Ӕnigma, Written in Cyphers. London: Printed for Step. Fletcher.Google Scholar
Anonymous. (1665). Rarities: Or the Incomparable Curiosities in Secret Writing. London.Google Scholar
Bender, J. & Marrinan, M. (2010). The Culture of Diagram. Stanford: Stanford University Press.Google Scholar
Bobker, D. (2014). The Literature and Culture of the Closet in the Eighteenth Century. Digital Defoe: Studies in Defoe and His Contemporaries, 6(1), 7094.Google Scholar
Bok, S. (1984). Secrets: Concealment and Revelation. Oxford: Oxford University Press.Google Scholar
Braganza, V. M. (2022). “Many Ciphers, although but One for Meaning”: Lady Mary Wroth’s Many-Sided Monograph. English Literary Renaissance, 52(1), 124152.Google Scholar
Bridges, N. (1659). Stenographie and Cryptographie: Or, the Arts of Short and Secret Writing. London: J. G. for the Author.Google Scholar
Britland, K. (2014). Reading between the Lines: Royalist Letters and Encryption in the English Civil Wars. Critical Quarterly, 55(4), 1526.Google Scholar
Bullard, R. (2016). Secret History, Politics, and the Early Novel. In Downie, J. A., ed., The Oxford Handbook of the Eighteenth-Century Novel. Oxford: Oxford University Press, pp. 137154.Google Scholar
Bullard, R. & Carnell, R., eds. (2017). The Secret History in Literature, 1660–1820. Cambridge: Cambridge University Press.Google Scholar
Buonafalce, A. (2004). Sir Samuel Morland’s Machina Cyclologica Cryptographica. Cryptologia, 28(3), 253264.Google Scholar
Burke, P. (2016). Secret History and Historical Consciousness: From Renaissance to Romanticism. Brighton: Edward Everett Root.Google Scholar
Campbell, M. B. (1999). Wonder and Science: Imagining Worlds in Early Modern Europe. Ithaca, NY: Cornell University Press.Google Scholar
Charles, I. (1645). The Kings Cabinet Opened: Or, Certain Packets of Secret Letters and Papers, Written with the Kings Own Hand, and Taken in His Cabinet at Nasby-Field, June 14, 1645. London: Printed for Robert Bostock.Google Scholar
Collins, A. S. (1926). The Growth of the Reading Public During the Eighteenth Century. The Review of English Studies, 2(8), 428438.Google Scholar
Cowan, B. (2018). The History of Secret Histories. Huntington Library Quarterly, 81(1), 121151.Google Scholar
Cressy, D. (1980). Literacy and the Social Order: Reading and Writing in Tudor and Stuart England. Cambridge: Cambridge University Press.Google Scholar
Davys, J. (1737). An Essay on the Art of Decyphering, in Which Is Inserted a Discourse of Dr. Wallis. Now First Publish’d from His Original Manuscript in the Publick Library at Oxford. London: L. Gilliver and J. Clarke.Google Scholar
Deacon, R. (1969). A History of the British Secret Service. London: The Garden City Press Limited.Google Scholar
Defoe, D. (March 28, 1704). Mercure Scandale: Or, Advice from the Scandalous Club. Review.Google Scholar
Defoe, D. (1720). Serious Reflections During the Life and Surprising Adventures of Robinson Crusoe: With His Vision of the Angelick World. London.Google Scholar
Defoe, D. (1726). The Complete English Tradesman, in Familiar Letters, Directing Him in All the Several Parts and Progressions of Trade. London: Charles Rivington.Google Scholar
De Luca, E. & Haines, J. (2017). Medieval Musical Notes as Cryptography. In Ellison, K. & Kim, S., eds., A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy. New York, NY: Routledge.Google Scholar
De Stains, V. D. (1836). Phonography: Or, the Writing of Sounds. London: E. Wilson.Google Scholar
Douglas, A. (2017). Work in Hand: Script, Print, and Writing, 1690–1840. Oxford: Oxford University Press.Google Scholar
Dunton, A. (1705). Dunton’s Wit’s Exercise. London: Printed for the Author.Google Scholar
Eamon, W. (1994). Science and the Secrets of Nature: Books of Secrets in Medieval and Early Modern Culture. Princeton, NJ: Princeton University Press.Google Scholar
Eisenstein, E. (1982). The Printing Press as an Agent of Change. Cambridge: Cambridge University Press.Google Scholar
Ellison, K. (2016). A Cultural History of Early Modern Cryptography Manuals. New York, NY: Routledge.Google Scholar
Ellison, K. & Kim, S., eds. (2017). A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy. New York, NY: Routledge.Google Scholar
Ezell, M. (2018). Multimodal Literacies, Late Seventeenth-Century Illustrated Broadsheets, and Graphic Narratives. Eighteenth-Century Studies, 51(3), 357373.Google Scholar
Falconer, J. (1685). Cryptomenysis Patefacta: Or the Art of Secret Information Disclosed without a Key. London: Daniel Brown.Google Scholar
Goldberg, J. (1990). Writing Matter: From the Hands of the English Renaissance. Stanford, CA: Stanford University Press.Google Scholar
Goodey, C. F. (2011). A History of Intelligence and “Intellectual Disability”: The Shaping of Psychology in Early Modern Europe. Surrey: Ashgate.Google Scholar
Jung, S. (2020). Reading, Visual Literacy and the Illustrated Literary Text in Eighteenth-Century Britain. In Hammond, M., ed., Early Readers. Edinburgh: Edinburgh University Press.Google Scholar
Kahn, D. (1996). The Codebreakers: The Story of Secret Writing. New York, NY: Scribner.Google Scholar
Kavey, A. (2007). Books of Secrets: Natural Philosophy in England, 1550–1600. Champaign, IL: University of Illinois Press.Google Scholar
Koscak, S. (2016). The Royal Sign and Visual Literacy in Eighteenth-Century London. Journal of British Studies, 55(1), 2456.Google Scholar
La Fin, C. (1692). Sermo Mirabilis: Or the Silent Language. London: Printed for Thom. Salusbury.Google Scholar
Láng, B. (2018). Real Life Cryptology: Ciphers and Secrets in Early Modern Hungary. Amsterdam: Amsterdam University Press.Google Scholar
Long, P. O. (2004). Openness, Secrecy, Authorship: Technical Arts and the Culture of Knowledge from Antiquity to the Renaissance. Baltimore, MA: Johns Hopkins University Press.Google Scholar
Lupton, C. (2014). Gender and Materiality on the Eighteenth-Century Page. Studies in English Literature, 1500–1900, 54(3), 605624.Google Scholar
Mair, J. (1741). Book-Keeping Methodized. Edinburgh.Google Scholar
McKeon, M. (2006). The Secret History of Domesticity. Baltimore, MA: Johns Hopkins University Press.Google Scholar
More, R. (1716). Of the First Invention of Writing: An Essay. London: Sold by the author, and by Major Hatley, and Mr Holland, in St Paul’s Church-Yard.Google Scholar
Morland, S. (1666). A New Method of Cryptography. London.Google Scholar
Morland, S. (1672). Tuba Stentoro-Phonica, An Instrument of Excellent Use, As Well at Sea, As at Land, Invented and Variously Experimented in the Year 1670, and Humbly Presented to the Kings Most Excellent Majesty Charles II, In the Year, 1671. London.Google Scholar
Neocleous, M. (2002). Privacy, Secrecy, Idiocy. Social Research, 69(1), 85110.Google Scholar
Neve, R. (1702). Apopiroscopy: Or, a Compleat and Faithful History of Experiments and Observations. London: D. Brown.Google Scholar
Oldfield, J. (1707). An Essay Towards the Improvement of Reason; in the Pursuit of Learning, and Conduct of Life. London.Google Scholar
Peters, J. D. (1999). Speaking in the Air: The History of the Idea of Communication. Chicago, IL: The University of Chicago Press.Google Scholar
Pepys, S. (2000). The Diary of Samuel Pepys, Latham, R. & and Matthews, W., eds., vol. 8. Berkeley, CA: University of California Press.Google Scholar
Petty, W. (1674). The Discourse Made Before the Royal Society … Concerning the Use of Duplicate Proportion. London: Printed for John Martyn.Google Scholar
Porter, B. (1989). Plots and Paranoia: A History of Political Espionage in Britain, 1790–1988. New York, NY: Routledge.Google Scholar
Potter, L. (1989). Secret Rites and Secret Writing: Royalist Literature 1641–1660. Cambridge: Cambridge University Press.Google Scholar
Poynting, S. (2006). Deciphering the King: Charles I’s Letters to Jane Whorwood. The Seventeenth Century, 21(1), 128140.CrossRefGoogle Scholar
Ratcliff, J. R. (2007). Samuel Morland and his calculating machines c. 1666: the early career of a courtier-inventor in Restoration London. BJHS, 40(2), 159179.CrossRefGoogle Scholar
Rider, R. E. (2020). Equations as Unruly Objects. Nuncius, 35, 471505.CrossRefGoogle Scholar
Schott, P. G. (1665). Schola steganographica, in classes octo distribute. Nuremberg.Google Scholar
Selenus, G. (1624). Cryptomenytices et cryptographiae libri IX. Lüneburg: Typis & impensis J. & H. der Sternen.Google Scholar
Sheffield, J. (The Duke of Buckingham). (1682). An Essay upon Poetry. London: Printed for Joseph Hindmarsh.Google Scholar
Simmel, G. (1950). The Sociology of Georg Simmel. Wolff, K. H., trans. Glencoe, IL: Free Press.Google Scholar
Stanica, M. (2014). Bundles, Trunks, Magazines: Storage, Aperpectival Description, and the Generation of Narrative. Style: A Quarterly Journal of Aesthetics, Poetics, Stylistics, and Literary Criticism, 48(4), 513528.Google Scholar
Stewart, A. (1995). The Early Modern Closet Discovered. Representations, 50, 76100.Google Scholar
Swaine, J. & Simms, J. (1761). Cryptography: Or a New, Easy, and Compendious System of Short-Hand, Adapted to All the Various Arts, Sciences, and Professions. London.Google Scholar
Taub, M. (2020). Sold: 53 Letters Deciphered by a Groundbreaking English Codebreaker. Atlas Obscura, www.atlasobscura.com/articles/john-wallis-cryptography.Google Scholar
Temple, W. (1701). Select Letters to the Prince of Orange (Now King of England) King Charles the IId. and the Earl of Arlington, Upon Important Subjects, vol. III. London.Google Scholar
Thicknesse, P. (1772). A Treatise on the Art of Decyphering and of Writing in Cypher: With an Harmonic Alphabet. London.Google Scholar
Usk, T. (1897). Testament of Love. Thynne, W., ed. Oxford: Clarendon Press.Google Scholar
Vellenga Berman, C. (2020). Tracing Characters: Political Shorthand and the History of Victorian Writing. Victorian Studies, 63(1), 5784.Google Scholar
Vermeir, K. (2012). Openness versus Secrecy? Historical and Historiographical Remarks. The British Journal for the History of Science, 45(2), 165188.Google Scholar
Vermeir, K. & Margócsy, D. (2012). States of Secrecy: An Introduction. The British Journal for the History of Science, 45(2), 153164.CrossRefGoogle Scholar
West, W. (1641). To His Honour’d Friend I. W. on His Learned Tract. In Mercury; the Secret and Swift Messenger. London.Google Scholar
West, S. M. (2018). Cryptographic Imaginaries and the Networked Public. Internet Policy Review, 7(2). https://policyreview.info/articles/analysis/cryptographic-imaginaries-and-networked-public.Google Scholar
White, J. (1704). A Rich Cabinet of Modern Curiosities. London.Google Scholar
Wiles, R. M. (1968). Middle-Class Literacy in Eighteenth-Century England: Fresh Evidence. In Brissenden, R. F., ed., Studies in the Eighteenth Century. Toronto: University of Toronto Press.Google Scholar
Wilkes, J. (1799?). The Art of Making Pens Scientifically. London: Printed by J. Vigevena.Google Scholar
Wilkins, J. (1641). Mercury; or, the Secret and Swift Messenger. London: I. Norton for John Maynard and Timothy Wilkins.Google Scholar

Save element to Kindle

To save this element to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Secret Writing in the Long Eighteenth Century
Available formats
×

Save element to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Secret Writing in the Long Eighteenth Century
Available formats
×

Save element to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Secret Writing in the Long Eighteenth Century
Available formats
×