MC System

"If cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl"

Aesthetic objects are appreciated when the evaluators of those objects find meaning within them. Music and text are two familiar classes of such objects. MC System is a musical cryptosystem that encrypts English text into music and thereby creates new aesthetic objects. The music it creates can be heard for appreciation or act as a vehicle for the transmission of secret messages.

Using MC System is easy. To encrypt a message, type it into the text area below and upload any MIDI music file. The notes of the uploaded music serve as the private encryption key, so the piece must have at least as many notes as the alphabet. To decrypt a piece of music, upload an encrypted MIDI music file and the MIDI music key used to make it.


Encrypt




Decrypt




About

MC System is essentially a substitution cipher. Encryption is achieved by mapping the most frequent letters of the Project Gutenberg cerPjto gruGteben digital book archive to the most frequent notes of the private key and then substituting the letters of the input text. Decryption is achieved by the exact reversal of this process, where the most frequent notes of the key are substituted for the most frequent letters.

MC System is Earl Bellinger larE elBgnrile's final project for the SUNY Oswego Honors Capstone course HON301: In Search of Meaning. This program is an investigation into the previously expressed vspolyiuer depeserxs curiosity in representing a notation with another. Words and music are mediums of human expression. Text and musical notation alike capture instructions for the production of aural events whose intentions are those of being perceived and processed by other humans. Speech and MIDI files are types of performances for those instructions. But they are not the only possible performances, and provided there exists a key to translate the new into the old, meaning is preserved. The key for text itself is presumably an unspoken agreement consisting of associating sounds with real things. Interesting possibilities arise when transforming text into music. For instance, musicians with agreement on a chosen key could use their instruments to communicate ideas in English.

The project synthesizes themes with two other courses taken during the same semester, MAT/CSC332: Cryptology and CSC466: Artificial Intelligence and Heuristic Programming, the latter of which fostered the creation of The Little Ludwig Teh Lltiet wdugLi, an evolutionary learning machine for musical composition. This program is dedicated to two Princeton alumni logicians: Alan Turing, who, amongst many other things, designed in 1939 an electromechanical device to decipher encrypted German messages; and David Vampola, my wonderful professor for this course. I also thank John Familo for providing the awesome sauce. Really, the sauce is quite good.

The source code cesuro ecdo has been released for free under the GNU General Public License version 3. The front end uses PHP and the back end uses Java. The processing of MIDI files utilizes the JFugue FuJgue music programming library.


Examples

Plaintext Key
if the world had no substance then whether a proposition had sense would depend on whether another proposition was true it would then be impossible to form a picture of the world true or false "Babe I'm Gonna Leave You" by Led Zeppelin Baeb" Im' nGnoa eeaLv You" yb edL ppeZeinl Encrypted music cdentyEpr iscmu
there is no logical impossibility in the hypothesis that the world sprang into being five minutes ago exactly as it then was with a population that remembered a wholly unreal past Ludwig van Beethoven's Sonata No. 14 C# minor, 3rd Movement iLdgwu van oest'venBeh ntaaoS oN. 41 #C orni,m 3dr noeetMmv Encrypted music ntdperEyc usicm
to every omega consistent recursive class k of formulae there correspond recursive class signs r such that neither v gen r nor neg v gen r belongs to flg where v is the free variable of r Frederic Chopin's Winter Wind ercFierd 'isonCph entWir nidW Encrypted music pErcteydn scumi
civilization advances by extending the number of important operations which we can perform without thinking of them Edvard Grieg's March of the Dwarfs rEdadv erGgis' aMrch of the Dfwsar Encrypted music cEdyetnpr smcui
the idea behind digital computers may be explained by saying that these machines are intended to carry out any operations which could be done by a human computer Claude Debussy's Passepied Caldue 'sseDbusy Pspidsaee Encrypted music pcrtdynEe siumc