Nomenclator
The 400-year diplomatic compromise: a small substitution alphabet plus a large code dictionary.
Why This Matters
From roughly 1400 to 1850, every European court used some flavour of nomenclator. It is the longest-running cipher family in history. A nomenclator combines two things: (1) a substitution alphabet for ordinary letters, and (2) a printed codebook listing common words, names, places, and titles, each replaced by a numeric or symbol code. The Babington plot, the Great Cipher of Louis XIV, Marie Antoinette's correspondence, and the Spanish Armada's traffic are all nomenclators.
The earliest surviving nomenclator dates to the Mantua chancery in 1401. The Vatican's nomenclators from the 1500s ran to several thousand entries. By the time Antoine Rossignol designed the Great Cipher in 1626, nomenclators were standard issue across Europe. They remained in use into the early telegraphic era — the diplomatic codebook that appears in 1860s telegrams is essentially a printed industrial-era nomenclator. Black Chambers — government cryptanalytic offices in Vienna, Paris, and London — built their reputation on slowly reconstructing nomenclator codebooks from intercepted traffic.
A typical 18th-century nomenclator has three parts: (1) a substitution alphabet mapping each letter to one or more cipher symbols (often digits 01–99), (2) a vocabulary list of perhaps 1,500 common words and names mapped to higher numbers, and (3) a list of nulls — symbols that mean ‘ignore me’ — sprinkled in to break frequency. Encoding switches granularity mid-message: The ENVOY arrived in VIENNA might come out as 23 1402 41 17 1899.
Letter-level frequencies leak the substitution alphabet quickly. The codebook entries are harder: they have to be reconstructed from context across many intercepts (a number that always appears near a date is probably a month; one that always appears near a port is a city). The Vienna Black Chamber under Lambach famously broke each new diplomatic nomenclator within months of its introduction in the early 1700s. The Great Cipher resisted attack for over 200 years (see Bazeries, Hall X).
| Concept from Nomenclator | Modern Evolution |
|---|---|
| Mixed-granularity tokens | Modern compression-then-encrypt schemes have the same problem: a long token leaks more than a short one |
| Codebooks are operational poison | Distributing and updating codebooks is what eventually killed nomenclators — a problem modern key management still inherits |
| Statistical hardness must be uniform | Any easy-to-break component (the letter alphabet) opens the rest |
Ciphertext: 60 70 23 09 12 12 90 81 01 20 92
Hint: some values are full codebook entries, not single letters. Think diplomatic traffic.
| Era | Renaissance · 1400s–1800s |
| Security | Statistical + intercept-volume |
| Origin | Italian city-state diplomacy, 14th–15th c. |
| Year | 1400s onward (Mantua, Venice, the Vatican) |
| Key Type | Alphabet substitution + 1,000–2,000 entry codebook of words and names |
| Broken By | Black Chambers (Vienna, Paris, London) c. 1700–1850 by sheer intercept volume |
| Modern Lesson | Hybrid systems with mixed-granularity tokens still need uniform statistical hardness |