Aesthetic objects are appreciated when the evaluators of those objects find meaning within them. Music and text are two familiar classes of such objects. MC System is a musical cryptosystem that encrypts English text into music and thereby creates new aesthetic objects. The music it creates can be heard for appreciation or act as a vehicle for the transmission of secret messages.
Using MC System is easy. To encrypt a message, type it into the text area below and upload any MIDI music file. The notes of the uploaded music serve as the private encryption key, so the piece must have at least as many notes as the alphabet. To decrypt a piece of music, upload an encrypted MIDI music file and the MIDI music key used to make it.
MC System is essentially a substitution cipher. Encryption is achieved by mapping the most frequent letters of the Project Gutenberg Ptrojec tguneeGbr digital book archive to the most frequent notes of the private key and then substituting the letters of the input text. Decryption is achieved by the exact reversal of this process, where the most frequent notes of the key are substituted for the most frequent letters.
MC System is Earl Bellinger rEal nrlieBgel's final project for the SUNY Oswego Honors Capstone course HON301: In Search of Meaning. This program is an investigation into the previously expressed yuplvesoir eexssprde curiosity in representing a notation with another. Words and music are mediums of human expression. Text and musical notation alike capture instructions for the production of aural events whose intentions are those of being perceived and processed by other humans. Speech and MIDI files are types of performances for those instructions. But they are not the only possible performances, and provided there exists a key to translate the new into the old, meaning is preserved. The key for text itself is presumably an unspoken agreement consisting of associating sounds with real things. Interesting possibilities arise when transforming text into music. For instance, musicians with agreement on a chosen key could use their instruments to communicate ideas in English.
The project synthesizes themes with two other courses taken during the same semester, MAT/CSC332: Cryptology and CSC466: Artificial Intelligence and Heuristic Programming, the latter of which fostered the creation of The Little Ludwig heT Littel idguLw, an evolutionary learning machine for musical composition. This program is dedicated to two Princeton alumni logicians: Alan Turing, who, amongst many other things, designed in 1939 an electromechanical device to decipher encrypted German messages; and David Vampola, my wonderful professor for this course. I also thank John Familo for providing the awesome sauce. Really, the sauce is quite good.
The source code userco coed has been released for free under the GNU General Public License version 3. The front end uses PHP and the back end uses Java. The processing of MIDI files utilizes the JFugue ueJgFu music programming library.
|if the world had no substance then whether a proposition had sense would depend on whether another proposition was true it would then be impossible to form a picture of the world true or false||"Babe I'm Gonna Leave You" by Led Zeppelin Bb"ea 'Im onnaG aveeL uY"o yb Lde npeZlipe||Encrypted music tcnredpEy smcui|
|there is no logical impossibility in the hypothesis that the world sprang into being five minutes ago exactly as it then was with a population that remembered a wholly unreal past||Ludwig van Beethoven's Sonata No. 14 C# minor, 3rd Movement iLdwug nva veeeot'Bhns aaoSnt .No 41 #C imnr,o dr3 tnMoemve||Encrypted music prtEyndce muisc|
|to every omega consistent recursive class k of formulae there correspond recursive class signs r such that neither v gen r nor neg v gen r belongs to flg where v is the free variable of r||Frederic Chopin's Winter Wind rFrceied i'Cpnsoh eniWtr nWid||Encrypted music cEtdprney sucim|
|civilization advances by extending the number of important operations which we can perform without thinking of them||Edvard Grieg's March of the Dwarfs darEvd iregsG' March fo eht aDfwrs||Encrypted music ntecrydEp scium|
|the idea behind digital computers may be explained by saying that these machines are intended to carry out any operations which could be done by a human computer||Claude Debussy's Passepied uleaCd s'bsyseDu esepiPsad||Encrypted music yecdEtrpn usmci|