Knitting Spies & Crochet Ciphers

Knitting Spies & Crochet Ciphers

The note added to the previous post referencing KGB spies using crochet to encrypt secret cold war messages was added for personal amusement being unaware that knitting and crochet have actually been used to encrypt secret messages. Atlas Obscura explores the story of Phyllis Latour Doyle, a secret agent during World War II who encrypted sensitive information in knitware for the British Secret Service. A precursor (or predictor?) to this story is the fictional steganographic tricoteuse Madame Defarge who appeared Charles Dickens’s Tale of Two Cities. Defarge used pattern stitches as a code to knit a list of names from the upper classes destined to face the guillotine. In his A History of Hand Knitting Richard Rutt explains:

Dickens was inspired by the “tricoteuses”, women who attended the National Convention in which the fate of the unfortunate rich was debated during the French revolution, knitting while they listened. Such a macabre pastime earned them a reputation as sadists, and an archetypal evil character was born in Madame Defarge. Dickens’was able to turn knitting, the frequent symbol of loving grandmothers and charming domesticity, into an ominous, cruel, inhuman act

Knitting Spies & Crochet Ciphers

Knitting Spies & Crochet Ciphers

The number of ways to encrypt text strings, or numerical data, into crochet is infinite but one way to start would be to look at simple cipher key-encoding systems and apply them to the process of interlocking loops of yarn. For example, Naomi Parkhurst at String Geekery, proposes converting letters into binary or Morse code and knitting secret messages in rows of noughts or dots (knits) and ones or dashes (purls).

But an encrypted message is only as secure as the key that was used to encrypt it. Given that modern highly secure keys use pseudo-random numbers to encode plaintext (human readable) into ciphertext (non-human readable) we could expect that more cryptically secure messages may create more random looking encrypted crochet (concealing any intelligible patterns that might give the game away). But the increase in randomness would also increase the probability of a series of consecutive knits or purls too large to sustain a physical structure. The most secure cryptograms might well be unknittable or create very fragile filigrees of fabric. But what would be more secure than a concealed message that literally just falls apart in the enemy’s hands without the (encrypted) knowledge of how to handle it to prevent its disintegration?

Knitting Spies & Crochet Ciphers

Knitting Spies & Crochet Ciphers

Knitting Spies & Crochet Ciphers

Knitting Spies & Crochet Ciphers

Knitting Spies & Crochet Ciphers

Other mathematical systems that have been used in cryptographic keys include prime numbers, cellular automatons and chaotic functions. Just how well crochet (essentially a binary system) can be seen as vehicle for mathematical information – further lending itself well to steganography – can be seen in the following few links:

Knitting Chaotic Attractors and Hyperbolic Surfaces.

Cellular Automaton Crochet – A lace Sierpinski triangle.

Cellular Automaton Pattern Generator (for knitting).

Cellular Automata Charts for Knitting.

Knitting Spies & Crochet Ciphers

Note: This post may well have been an excuse to post another set of anonymous, aesthetically cryptic crochet patterns, some of which resemble medieval cipher wheels and language mapping charts.

2 Responses to “Knitting Spies & Crochet Ciphers”

  1. Mariska writes:

    Hey Paul, i’ve been collecting round crochet from the places i visited over the past years now, with the idea it will grow into a piece someday. And indeed what you say in the previous post, it is difficult to find out about the origins or the history of those patterns. Although it easy to refer to symmetrical patterns growing in nature, I felt a mystery is hidden within them.
    Thank you for these great posts. Hope you don’t mind me further investigating it in the near future. Cheers. :)

  2. jesse c mckeown writes:

    The problem of long-repeat strings making encodings delicate has been known to signal processing people for a few decades; and so (e.g.) USB uses NRZI/RLL-6 encoding instead, which forces a change between knit and purl once per seven stitches (which may encode seven or six bits, depending); while most Ethernet today uses “Manchester” coding, which encodes bits as *pairs* of signals, so e.g. 1 \-> knit-purl, 0 \-> purl-knit; NRZ? can get wavy/curly over short stretches, but in a controlled way; Manchester makes the signal twice as long as one would like ideally, and there are synchronization/ordering problems to sort out… But, then, all Design is negotiating trade-offs.

    I seem to remember reading of ordinary writing systems (not intended for cryptography) built on knotting light ropes; but I can’t recall where or when.

Leave a Reply