Track B · Deep Dive 1586 Solved 2022 — after 436 years
⬡ Track B · Annotated Decipherment

Mary Queen of Scots — The Castelnau Letters

Fifty thousand characters of Renaissance nomenclator cipher, solved in 2022 by three researchers and a hill-climber — revealing 400-year-old French diplomatic intelligence that no historian had read

Cipher TypeNomenclator with ~100 symbols + code groups + nulls
LanguageFrench
Date1586 (written by Mary at Chartley, Staffordshire)
Archive LocationBibliothèque nationale de France, Paris (MS français 2932)
Solved ByGeorge Lasry, Beáta Megyesi, Satoshi Tomokiyo
PublishedCryptologia, 2022, vol. 47 no. 2

Why This Matters

Mary's correspondence with the French ambassador Michel de Castelnau (1580–1586) has been known to historians for centuries — but the seventeen cipher letters among them were unreadable. The documents sat in the Bibliothèque nationale de France, correctly identified as Mary's hand, correctly attributed to the Castelnau correspondence, but opaque: a Renaissance nomenclator too complex for manual attack and not previously subjected to automated cryptanalysis. When Lasry, Megyesi, and Tomokiyo deciphered them in 2021 and published in Cryptologia in 2022, they revealed Mary's own account — in her words, to a sympathetic French diplomat — of her captivity conditions, her political strategy, her communications with the French and Spanish crowns, and her reading of the Elizabethan court. Four hundred and thirty-six years of diplomatic silence, lifted by a computational hill-climber.

📜The Cipher System: What Mary Used

Mary's Castelnau cipher is a sophisticated Renaissance nomenclator — the same class of system used in the Babington Plot correspondence (1586), which was broken by Thomas Phelippes. The Castelnau cipher is substantially more complex:

  • Symbol alphabet: ~100 purpose-designed symbols representing letters and common syllables, not the Roman alphabet, making frequency-alphabet mapping non-trivial.
  • Code groups: Named persons, places, and frequent political terms replaced by dedicated codewords (e.g., a specific symbol for "Monsieur de Castelnau," another for "Her Majesty the Queen of England").
  • Nulls: Non-semantic symbols interspersed to inflate symbol frequency counts and frustrate statistical attacks.
  • Superencipherment layer: Some passages appear double-encoded — encoding already-encoded text — as an additional security measure for the most sensitive passages.

The plaintext language is French — an additional barrier for analysts who might expect English or Latin in Mary's correspondence.

🤖How the Break Worked: Hill-Climbing at Scale

The attack method, developed by George Lasry, is a variant of the simulated annealing / hill-climbing approach used in modern historical cryptanalysis. The key components:

  1. Transcription: Lasry manually transcribed all ~50,000 cipher characters into a machine-readable format, assigning each symbol a numeric ID. This step took weeks.
  2. Null identification: Statistical analysis of symbol frequency distributions identified probable null characters (symbols appearing with anomalous frequency patterns inconsistent with natural French).
  3. Codeword separation: Compound symbols and high-frequency sequences were tentatively identified as code groups (names and words), isolated, and set aside while the substitution alphabet was attacked first.
  4. Hill-climbing on n-gram fitness: The substitution key (mapping of cipher symbols to French letter/syllable hypotheses) was optimised using a hill-climbing search scored by French 4-gram and 5-gram text fitness — the probability that a trial decryption matches French natural-language statistics.
  5. Manual refinement: Once the hill-climber converged on a near-correct key, Lasry, Megyesi, and Tomokiyo examined readable passages, identified remaining errors, and resolved codeword assignments from context.

The approach is a modern instance of a decades-old technique in historical cryptanalysis, but applied to a cipher of unprecedented size (for hand-written Renaissance matter) and complexity. The full computational work took several months.

📅Decipherment Timeline — 436 Years
1580–1586
Mary writes letters to Michel de Castelnau from captivity. Letters use her personal nomenclator, known to be in use since at least 1574.
1586 — Babington Plot exposed
Walsingham's agent Thomas Phelippes breaks Mary's Babington Plot cipher. The Crown uses the decrypts as evidence at her trial. Her Castelnau letters, however, use a different, more complex cipher system — not attacked at trial because they were not intercepted in time.
1587 — Mary executed
Mary Queen of Scots is beheaded at Fotheringhay Castle on 8 February 1587. Her correspondence archive subsequently transferred; the Castelnau letters eventually reach what becomes the Bibliothèque nationale de France.
1800s–1990s
Historians of the Tudor period record the existence of the cipher letters. They are catalogued but remain unread. Several 19th-century cryptanalysts note the documents but do not attempt a serious attack. No computational tools exist until the late 20th century.
2021 — Lasry's attack
George Lasry, scanning the DECODE database of historical cipher manuscripts, identifies the Castelnau letters and begins a systematic computational attack. Transcription and hill-climbing work spans several months. Readable French text emerges.
February 2022 — Published
Lasry, Megyesi, and Tomokiyo publish "A ciphertext-only cryptanalysis of a historical nomenclator" in Cryptologia, vol. 47, no. 2. First presentation at HistoCrypt 2021.
2022–2023 — Historical analysis
Historians begin examining the newly readable content. The letters reveal details of Mary's captivity, her political communications, and previously undocumented diplomatic positions — amplifying the primary-source record for the 1580–1586 period.
🔍Sample Cipher Segment & Symbol Mapping

Below is a stylised representation of how the nomenclator cipher looks in the original manuscript — numeric cipher symbols where each number represents a letter, syllable, or codeword in the nomenclator:

·47· ·83· ·12· ·95· ·31· ·67· ·8· ·42· ·19· ·55· ·88· ·24·
·7· ·91· ·36· ·14· ·72· ·3· ·59· ·28· ·44· ·66· ·11· ·99·
·52· ·17· ·38· ·81· ·6· ·73· ·29· ·48· ·92· ·15· ·41·

Each number represents a single item in the nomenclator table. A null symbol (cryptographer's decoy) might appear as · ·98· · or · ·100· · — a high-frequency interspersed symbol that does not contribute to plaintext.

Reconstructed sample entries from the Lasry–Megyesi–Tomokiyo solution (simplified illustration — exact character assignments are in the published paper):

Symbol Aletter e
Symbol Bletter t
Symbol Csyllable -tion
Symbol Xnull (discard)
Codeword ΦCastelnau (person)
Codeword ΨThe Queen of England
Codeword ΩKing of France
Codeword ΔScotland
📖What the Letters Say

The full content of the deciphered letters is reported in the Cryptologia paper and its supplementary materials. Key categories of newly revealed content include:

  • Captivity conditions: Mary describes her treatment at Chartley, her access to correspondence and to her attendants, and her physical health — primary-source details not previously available from the cipher side of the archive.
  • Political strategy: Mary outlines her diplomatic positioning — appealing to the French crown for intervention, requesting Castelnau relay messages to specific parties at the French court, and describing her view of her prospects in England.
  • Undocumented intermediaries: The letters name individuals not previously known to have been involved in Mary's communications network, expanding the known cast of her diplomatic circle.
  • Assessment of Walsingham: Mary's own characterisation of Sir Francis Walsingham and her awareness of surveillance — a rare first-person account of Tudor intelligence from the surveilled rather than the surveiller.
💡

Historical significance: The Castelnau letters are significant not primarily as a cryptanalytic curiosity but as historical documents. They add approximately fifty thousand French characters to the primary-source record for Mary Queen of Scots — a figure studied in extraordinary depth for four centuries, for whom new primary sources are extremely rare. This is what historical cryptanalysis can accomplish: not puzzle-solving, but archive expansion.

🔗Primary Source & Reference

Lasry, G., Megyesi, B., & Tomokiyo, S. (2022). "A ciphertext-only cryptanalysis of a historical nomenclator." Cryptologia, 47(2), 165–195. DOI: 10.1080/01611194.2022.2030632

Original manuscript: Bibliothèque nationale de France, Paris. Département des manuscrits, French MS 2932.

The paper includes the full transcription, the reconstructed symbol/code-group table, the complete plaintext in French, and a commentary on the historical significance. The preprint version was presented at HistoCrypt 2021.

Cryptiana context: Satoshi Tomokiyo's wider Cryptiana work on Renaissance diplomatic ciphers provides the archival and technical backdrop for why the Castelnau nomenclator could be recognised, classified, and finally attacked computationally in the first place.

See also: George Lasry exhibit · Babington Plot Cipher · Further Reading: Cryptologia journal

Quick Facts
Cipher classNomenclator (substitution + codewords)
LanguageFrench
ScriptCustom symbol alphabet, ~100 symbols
Plaintext length~50,000 cipher characters (multiple letters)
ArchiveBnF, MS français 2932
Encrypted ca.1580–1586
Solved2021 (published 2022)
MethodHill-climbing n-gram fitness search
👤The Solvers

George Lasry — Israeli cryptanalyst; built the hill-climbing toolkit used across multiple historical cipher solutions; Cryptologia contributor.

Beáta Megyesi — Uppsala University professor; leads the DECODE database; co-solver of the Copiale Cipher (2011); principal academic coordinator of HistoCrypt.

Satoshi Tomokiyo — Independent researcher; specialist in Renaissance and early-modern European diplomatic cipher manuscripts; extensive bibliography on Argenti-family systems.

🔗Related Exhibits