The Spartan Scytale
The Spartan Scytale
The Spartan Scytale
The Spartan
es in the context of warfare, including the Spartan command-
ers Lysander, Clearchus, and Agesilaus.
Two complete descriptions of the use of the scytale as a cryp-
scytale
tographic device can be found, in Plutarch (Lysander, 19.5–7) and
in Aulus Gellius (Attic Nights, 17.9.6–16). Both authors were ac-
tive in the second century AD so were writing at some consider-
able temporal distance from the period in which the scytale were
used: in the fifth and fourth centuries BC, and especially the pe-
Communication security is of major importance to our riod between the outbreak of the Peloponnesian War in 431 and
the Battle of Leuctra in 371. Nevertheless, Plutarch and Gellius of-
modern world. The gathering of intelligence and spying
fer useful accounts of the scytale that can tell us much about how
on one’s enemies is essential for any government in this deceptively simple cryptographic device could and would
order to determine the political and military direction have been useful to send encoded messages in the field.
of the state, especially in times of conflict when es- Sending secret messages
sential information on enemies can obviously facilitate The sending of secret scytale-messages worked as follows, ac-
the war effort. Since antiquity, individuals in all civili- cording to Plutarch (Lysander 19.5–6):
sations have been trying to encipher confidential cor- When the ephors send out an admiral or a general, they
make two round pieces of wood exactly alike in length and
respondence – mainly in a military context – while oth-
thickness… and keep one themselves, while they give the
ers have been trying to decipher it. The ancient Greeks other to their envoy. These pieces of wood they call scytalae.
and Romans in particular seem to have been experts Whenever… they wish to send some secret and important
message, they make a scroll of parchment long and narrow,
in the art of secret writing, known as cryptography. like a leathern strap, and wind it round their scytale… After
doing this, they write what they wish on the parchment…
By Martine Diepenbroek and when they have written their message, they take the
parchment off, and send it… to the commander.
O
ne such example of ancient cryptography we
find in fifth and fourth century BC Sparta. Ac- Aulus Gellius’ description later in the second century is very
cording to these sources, the ephors (leaders) similar to Plutarch’s (Attic Nights 17.9.6–16):
of Sparta used a scytale – literally ‘a stick’ – to [When the] ancient Lacedaemonians… wanted to conceal
communicate with commanders in the field and disguise… public dispatches sent to their generals…
on confidential matters. This article discusses what exactly a Spar- [they] used to send letters written in the following manner.
tan scytale was and how was it used to create secret messages. There were two thin, cylindrical wands of the same thick-
ness and length… One of these was given to the general
The Spartan scytale when he went to war, the other the magistrates kept at
Greek sources vary widely in their discussions of the scytale home… [Then] they bound about the staff a thong… [and]
and, although they are broadly consistent in associating the they wrote the dispatch on that thong… When the letter
scytale with messaging, they do not always associate it with had been written… the thong was unrolled from the wand
secret messaging. According to our sources, the scytale could and sent to the general… This kind of letter the Lacedae-
and would have been used for a variety of purposes, including monians called skutalè [scytale].
as a messenger authentication stick, as a sort of military name
tag, and perhaps even as a reference to an erect penis/phal- In other words, before an admiral or a general was sent to war,
lus in a comedy. Another purpose of the scytale was its use he was given a scytale to communicate with the ephors in Spar-
as a cryptographic device. Following these sources, modern ta. The ephors and commander, the two communicating par-
cryptographers often do not see the scytale as a useful cryp- ties, therefore both had a scytale of the exact same length and
tography device. Instead, they often see it as a ‘toy cipher’ thickness. It was of the utmost importance that the two scytalae
that children could use to communicate with each other. From were the exact same size. Otherwise, the method would not have
Plutarch, however, we know that scytalae were highly likely to worked well, as will be discussed below. Whenever either party
have been used successfully as cryptographic devices in the wanted to send an important confidential message to the other,