{"id":67515,"date":"2020-03-17T14:15:06","date_gmt":"2020-03-17T18:15:06","guid":{"rendered":"https:\/\/www.ludwig-van.com\/toronto\/?p=67515"},"modified":"2020-03-17T14:15:06","modified_gmt":"2020-03-17T18:15:06","slug":"feature-b-c-h-glazunovs-dog-brahms-lost-loves-look-music-cryptography","status":"publish","type":"post","link":"https:\/\/www.ludwig-van.com\/toronto\/2020\/03\/17\/feature-b-c-h-glazunovs-dog-brahms-lost-loves-look-music-cryptography\/","title":{"rendered":"FEATURE | B-A-C-H, Glazunov\u2019s Dog, And Brahms\u2019 Lost Loves \u2014 A Look At Music Cryptography"},"content":{"rendered":"<figure id=\"attachment_67516\" aria-describedby=\"caption-attachment-67516\" style=\"width: 1199px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-67516\" src=\"https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/Music-cryptography-header.jpg\" alt=\"Sheet music (Photo: wal_172619 from Pixabay) \" width=\"1199\" height=\"628\" srcset=\"https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/Music-cryptography-header.jpg 1199w, https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/Music-cryptography-header-300x157.jpg 300w, https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/Music-cryptography-header-1024x536.jpg 1024w, https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/Music-cryptography-header-768x402.jpg 768w\" sizes=\"(max-width: 1199px) 100vw, 1199px\" \/><figcaption id=\"caption-attachment-67516\" class=\"wp-caption-text\">Sheet music (Photo: wal_172619 from Pixabay)<\/figcaption><\/figure>\n<p><span class=\"wpsdc-drop-cap\">B<\/span>rahms used it to exorcise himself of his failed loves, while many composers simply spelled out their own names. They represent examples of what is called <strong>musical cryptography<\/strong> or a <strong>music cryptogram<\/strong>.<\/p>\n<p>Musical cryptography is the use of music to encode messages. In its simplest form, the letters A through G can be used to spell out words or codes.<\/p>\n<p>Most students of classical music are familiar with the B-A-C-H sequence to be found in J.S. Bach\u2019s work. H is the equivalent of a B-natural in the German system of music cryptography, allowing Bach to spell out his name quite easily. It\u2019s a motif that he incorporated into several pieces, including <em>The Art of the Fugue<\/em>. While Bach is perhaps its most famous user, music cryptography was fairly common, largely in the Classical and Romantic periods.<\/p>\n<p>Music cryptography had its proponents in the 17th- and 18th-century, chiefly mathematicians. Composer Michael Haydn, brother of Franz Josef, allegedly proposed a musical cipher system that was published in a biography of his brother in 1808. In his system, the alphabet begins at the G on the bass clef as A, then G-sharp as B, and so on.<\/p>\n<figure id=\"attachment_67517\" aria-describedby=\"caption-attachment-67517\" style=\"width: 1280px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-67517\" src=\"https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/b-a-c-h-motif.jpg\" alt=\"B-A-C-H motif\" width=\"1280\" height=\"384\" srcset=\"https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/b-a-c-h-motif.jpg 1280w, https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/b-a-c-h-motif-300x90.jpg 300w, https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/b-a-c-h-motif-1024x307.jpg 1024w, https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/b-a-c-h-motif-768x230.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><figcaption id=\"caption-attachment-67517\" class=\"wp-caption-text\">B-A-C-H motif (public domain image)<\/figcaption><\/figure>\n<p><span class=\"wpsdc-drop-cap\">K<\/span>nowing a little about the life of Johannes Brahms makes it easy to believe he might choose musical cryptography as a way of expressing himself.<\/p>\n<p>Famously, Brahms and Clara Schumann fell in love, and Clara was finally free to pursue a relationship with him after the decline and tragic death of husband Robert at 46. But, Brahms kept his distance, and made it clear that, despite his feelings for her, he would never marry her.<\/p>\n<p>Their relationship was over by 1856, just before he met Agathe von Siebold, his second great love. Agathe was a soprano who was taking lessons from his friend Julius Otto Grimm. Clara actually caught the two of them canoodling in September 1858. \u201cHe left me alone with words of love and devotion, and now he falls for this girl because she has a pretty voice,\u201d she <span style=\"color: #ff0000\"><a style=\"color: #ff0000\" href=\"http:\/\/www.onyxclassics.com\/sleevenotes.php?ID=72\" target=\"_blank\" rel=\"noopener noreferrer\">complained in a letter<\/a><\/span>.<\/p>\n<p>However, even though Brahms proposed marriage at first, the relationship was doomed after his <em>Piano Concerto No.1 D minor<\/em> tanked at its premiere. He was worried about being able to provide for a wife, and called the wedding off in January 1859.<\/p>\n<p>In the summer of 1864, Brahms heard that Agathe had left Germany for Ireland to work as a governess. His next composition, already in progress, was his <em>String Sextet No. 2 in G major<\/em>. In the climax of the first movement, bars 162 to 168, he refers to his lost love with a theme that goes A-G-A-H-E.<\/p>\n<p>In a different sort of cipher, he also incorporated a melody that he had first written in a letter to Clara Schumann years earlier. The theme opens the first movement, and is present throughout the composition. Brahms wrote about the composition in a letter to his friend Josef G\u00e4nsbacher, \u201cby this work, I have freed myself of my last love.\u201d<\/p>\n<p>Agathe later wrote about the relationship in a novel. She eventually married and by all accounts happily, although she always admitted to carrying a torch for Johannes, while for Brahms, love remained something idealized but not lived. Though he remained unmarried, Brahms retained his penchant for musical codes, referring to Adele Strauss by the notes A\u2013Eb (A.S.) and to Gisela von Arnim, a writer known for her fairy tales, with the notes G#\u2013E\u2013A (Gis-e-la) in his letters.<\/p>\n<p>Brahms: <em>String Sextet No. 2, Op. 36<\/em>; Harriet Krijgh &amp; Friends \u2014 Live HD<\/p>\n<div class=\"jetpack-video-wrapper\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/MVKwCjZ_zUQ?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/div>\n<p><span class=\"wpsdc-drop-cap\">T<\/span>here are also many examples of musical cryptography outside the world of classical music composers. The earliest known reference to the practice comes from a late 15th-century manuscript titled <em>Rules for Carrying on a Secret Correspondence by Cipher<\/em>, currently in a collection at the British Library.<\/p>\n<p>The first time the <span style=\"color: #ff0000\"><a style=\"color: #ff0000\" href=\"http:\/\/ericsams.org\/index.php\/on-cryptography\/333-musical-cryptography\" target=\"_blank\" rel=\"noopener noreferrer\">New York City Police Department<\/a><\/span> successfully intercepted and interpreted a secret message in code, it was a melody on a treble clef being used by local bookmakers to keep track of illegal bets.<\/p>\n<p>There are many rumours and stories about musical cryptography being used for spies, notably during the Jacobite Rising of 1745 in Scotland. Various schemes and purposes have been proposed, even in multiple academic papers, but there is no confirmed case of using musical cryptography for spying or other secretive purposes in modern times.<\/p>\n<p>However, it is also known that candidates for the crypto-analysis service in the British army during WWII were asked if they could read an orchestral score.<\/p>\n<p>The practice appears in books and TV. In <em>Outlander<\/em>, the romantic time travel drama set in 18th-century time Scotland, our heroes Jamie and Claire decipher the code in a piece of German sheet music that uses key changes in Bach\u2019s Goldberg Variations to transmit the message. Author Stefanie Pintoff also uses the ruse in her novel <em>Secret of the White Rose<\/em>.<\/p>\n<p>Schumann, Carnaval, op. 9 by Boris Giltburg<\/p>\n<div class=\"jetpack-video-wrapper\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/LNo2aiKV-a0?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/div>\n<p><span class=\"wpsdc-drop-cap\">M<\/span>usic cryptograms weren\u2019t always used for such dramatic or significant reasons. A diverse list of composers that includes Liszt, Rimsky-Korsakov, Busoni, Beethoven, Ravel, Debussy, Poulenc, Elgar and Shostakovich have used music cryptography to simply spell out their own names within their works.<\/p>\n<p>Olivier Messiaen created a code that used different notes to spell out all 26 letters of the alphabet. In his work for organ, <em>M\u00e9ditations sur le myst\u00e8re de la Sainte Trinit\u00e9<\/em>, the complex web of tones and rhythms spells out French words from the work <em>Summa Theologica<\/em> by philosopher Thomas Aquinas.<\/p>\n<p><span style=\"color: #ff0000\"><a style=\"color: #ff0000\" href=\"https:\/\/www.independent.co.uk\/news\/obituaries\/eric-sams-550567.html\" target=\"_blank\" rel=\"noopener noreferrer\">Irish composer John Field<\/a><\/span> composed melodies encrypting the words B\u2013E\u2013E\u2013F and C-A-B-B-A-G\u2013E as a tribute to a generous hostess, while Glazunov wrote a theme based on the name of his dog, S\u2013A\u2013C\u2013H\u2013A.<\/p>\n<p>Often, composers marked an obvious tribute to another composer with a musical cryptogram, such as Ravel, who wrote <em>Menuet sur le nom d&#8217;Haydn<\/em> for piano in 1909. In 1929, Poulenc, Honegger, Milhaud, Ibert and others got together to commemorate Albert Roussel in their works.<\/p>\n<p>Brahms\u2019 friend<strong> Robert Schumann<\/strong> was also known to use cryptography in his compositions. In his <em>Carnaval Op. 9<\/em> for solo piano, he includes more than one. A-S-C-H (with S represented by E-flat and A by A-flat in the German system) is a shout-out to his (then) fianc\u00e9e Ernestine von Fricken\u2019s hometown of Asch, Germany, and the sequence S-C-H-A is just riffs off his name, proving that great composers can be as random as anyone else.<\/p>\n<h3 class=\"western\"><em>#LUDWIGVAN<\/em><\/h3>\n<p class=\"western\"><em>Want more updates on classical music and opera news and reviews? Follow us\u00a0on <\/em><span style=\"color: #ff0000\"><em><a style=\"color: #ff0000\" href=\"https:\/\/www.facebook.com\/LudwigVanToronto\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Facebook<\/b><\/a><\/em><\/span><em>, <\/em><span style=\"color: #ff0000\"><em><a style=\"color: #ff0000\" href=\"https:\/\/www.instagram.com\/ludwigvantoronto\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Instagram<\/b><\/a><\/em><\/span><b> <\/b><em>or <\/em><span style=\"color: #ff0000\"><em><a style=\"color: #ff0000\" href=\"https:\/\/twitter.com\/LudwigVanTO\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Twitter<\/b><\/a><\/em><\/span><em> for all the latest.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Musical cryptography is the use of music to encode messages. In its simplest form, the letters A through G can be used to spell out words or codes.<\/p>\n","protected":false},"author":64,"featured_media":67516,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"jetpack_post_was_ever_published":false},"categories":[33451,18,4967,36,37],"tags":[35810,35809,1743,35808,2863],"yst_prominent_words":[10217,35805,35804,6715,7599,35801,7850,35803,10359,6616,35800,6735,35799,35806,35802,35807,29368,31324,14794,9960],"acf":[],"jetpack_featured_media_url":"https:\/\/www.ludwig-van.com\/toronto\/wp-content\/uploads\/sites\/2\/2020\/03\/Music-cryptography-header.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9bakr-hyX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/posts\/67515"}],"collection":[{"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/comments?post=67515"}],"version-history":[{"count":2,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/posts\/67515\/revisions"}],"predecessor-version":[{"id":67519,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/posts\/67515\/revisions\/67519"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/media\/67516"}],"wp:attachment":[{"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/media?parent=67515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/categories?post=67515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/tags?post=67515"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.ludwig-van.com\/toronto\/wp-json\/wp\/v2\/yst_prominent_words?post=67515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}