Useful Tips

Meaning of the word

Pin
Send
Share
Send
Send


In 2011, the newspaper The Daily Telegraph identified 10 ciphers and ciphers, which until then no one could "reveal", despite modern computer technology.

1. Linear letter "A" - a view of the letter on the island of Crete, which I found and named Arthur Evans. The source of its development was Cretan hieroglyphs, and later it was replaced by the linear letter "B", which was deciphered by Michael Ventris in 1952. The second letter was used by the Greeks from Mycenae. Due to their similarity, the linear script “A” was almost deciphered, but some inscriptions are still not clear.

Scientists in the second half of the XX century, as they could, completed the systematization of the records of the letter "A". They established different spellings of many characters, compiled a vocabulary list, clarified the division of words in some inscriptions, for many characters identified the corresponding characters of the letter “B”.

2. Kryptos - the work of the American sculptor Jim Sanborn, installed in front of the entrance to the Central Office of the CIA in Langley (Virginia), in 1990. It is an S-shaped copper plate in the form of a scroll, on which 4 sections of encrypted text are applied. Section 4 has not yet been decrypted: 97 characters left.

Jim Sanborn did not have a cryptographic education when he created this work, so he consulted with retired CIA officer Ed Scheidt, who was setting up his own encryption software business.

The novice cryptologist said he had hidden the full version of the decryption of crypto text from Ed Scheidt and the CIA, with the exception of its former director, William Webster. He also said that he had done everything necessary so that they could not solve this riddle. If it is solved, then the value of his sculpture will greatly decrease, and interest in it will drop. More details about the works of this sculpture can be found in my book here.

3. Gold Bar Encryption. In 1933, someone in the manufacture of 7 gold bars in the form of banknotes applied pictures, Chinese and coded inscriptions to them. After that, he mailed gold to Chinese General Wang. Cryptanalysts believe that the encryption consists of Chinese characters and Latin characters.

Maybe the unknown sender wanted to describe a very large deal - the number 300000000 is visible on the gold bar. Maybe this is some kind of monetary equivalent that the general deserved for something. Until now, nothing is known about the sender or the reason for the very respectable gift. Perhaps the decryption of the cryptogram will help to understand this matter.

4. Bail cryptograms. In 1885, a small brochure was published in the American city of Lynchburg (Virginia) about some Bale papers containing information about treasures buried in 1819 and 1821 in Bedford County (Virginia) and still not found.

This brochure consists of 3 cryptograms written in digital code, the first of which must indicate the location, and the second is the volume of treasures containing 2 wagons of gold, silver and jewelry, buried by gold miners led by Thomas Bale.

The second cryptogram was decrypted, and the price of the treasure became known. In modern terms, it is approximately $ 30,000,000. The rest of the encryption, despite many years of repeated attempts by experienced cryptanalysts (Herbert Yardley, William Friedman, etc.), has not yet been read, so the very fact of the presence of treasures remains in doubt.

5. Voynich manuscript, or the most secret manuscript in the world, was composed using a unique alphabet. In addition to encrypted text, it is filled with pictures with unknown colors, nude women and astrological symbols. The history of the book began in the 16th century, when the emperor Rudolf II wanted to get it from a merchant in Prague. After the emperor, he went to scientists, but disappeared in the 17th century.

The manuscript appeared for the second time in 1912, when it was wanted to be bought by the American bookseller Wilfrid Voynich. When he died, she ended up at Yale as a present. According to British scholar Gordon Rugg, the manuscript is a quality falsification. Her text has a feature that is not peculiar to any language. And such properties as the duration of a word, methods of alphabetic and syllabic unification, correspond to those available in modern writing.

6. Code "Dorabela", which was invented in 1897 by the English composer Edward Elgar. He coded and sent a letter to his girlfriend Dorabella. True, she could not understand this message and wrote about it in her memoirs. Following it, a seemingly simple encryption was tried by cryptanalysts, but they did not succeed. In 2007, the Edward Elgar memory community organized a cipher disclosure contest dedicated to the 150th anniversary of the composer, but he was also unsuccessful.

7. Ciao code, which was invented in 1918 by John Byrne (1880-1960), which, on the one hand, made it easy to use, and the other, difficult to decrypt. Over the years, he tried to “push” his invention into US state and military structures, but failed.

In 1953, John Byrne published an autobiography called "Silent years." In the 21st chapter of the book, he discusses his 40-year search to demonstrate the benefits of his cipher and prove its reliability. Immediately, he cites some text and its encrypted version, as well as some encryption records without decryption. To interest readers, the author promised to pay $ 5,000 to the first who reads these inscriptions first. However, no one had to pay the prize.

However, neither John Byrne, nor his son, who was trying to commercialize his father’s business, were able to achieve any commercial benefit from the invented cryptosystem. Only recently, the Byrne family decided to transfer all documents, drawings and models of the cipher to the museum of the NSA of the USA, and only after that cryptanalysts managed to figure it out.

8. Cipher D'Agapeeva. In 1939, an English cryptographer with Russian roots, Alexander D'Agapeyev (D'Agapeyeff in their own name) published a book on cryptology, “Codes and Ciphers,” in which he boasted his own encryption system. In other editions of the book she was no longer there. The most anecdotal in this story is that the author then simply forgot how to “reveal” his code. It is assumed that unsuccessful attempts to decrypt it are due to the fact that the author made a mistake (or maybe not one) in the process of classification.

9. "Taman Shud". In 1948, a male corpse was found on the Australian coast, who was dressed in warm clothes, despite the heat. He did not have an identity document. A comparative analysis of all the corpse data on the available police information base yielded nothing. Nearby they found a case in which there were pants with a secret pocket.

They found a small scrap of a book page with the words "Taman Shud." The investigator found that the piece of paper was torn from a sheet of a poetry book by Omar Khayyam. The collection itself was found in the back of a car seat that was not closed. On the back of the book cover, a 5-line Latin entry was made, which has not yet been read.

10. Zodiac Cipher. In the 1960s, a killer appeared in the United States, the criminal acts of which led to many murders (more than 3 dozen). The police have not yet identified his identity. He sent letters to local newspapers in which he confessed to his crimes and signed with the pseudonym "Zodiac".

Some of the letters were classified. The offender claimed that all the data about him was written in these crypto texts, and as soon as they were decrypted, the police could arrest him. One of the 4 ciphers was read, but there was no information about the killer. In order to get things moving forward, the rest of the cryptograms were published with the hope that someone would be able to read them.

11. Macormick Code. In 1999, the police found the corpse of a man named Ricky Macormick. With him were 2 pieces of paper with 30 lines of encoded text. All the efforts of American cryptanalysts led to nothing, the codogram remained unread.

The family of the victim claims that he began to get involved in cryptography as a child, but for some reason none of the family members ever asked him why he was doing this. To understand who killed him and why, the police need to decode these records. However, even modern computer technology was not able to do this. It is strange how a person without a normal education and cryptographic training could create a serious problem for professional cryptologists.

Drive from Fest - clay disk found in the Cretan town of Phaistos in 1903. Each surface is covered with signs that were written in a spiral. I put this artifact at the end, because now it has been decrypted by the Russian scientist Gennady Grinevich. He proposed his option of reading the text of the disc (16th century BC) as Etruscan, based on the Slavic syllabic letter, which he described in his book (read).

Making a Word Map Better Together

Hello! My name is Lampobot, I am a computer program that helps to make a Word Map. I know how to count, but so far I don’t understand how your world works. Help me figure it out!

Thank! I became a little better at understanding the world of emotions.

Question: wit Is it neutral, positive, or negative?

Sentences with the word "cryptogram":

  • Icon not cryptogram, therefore, the process of reading it cannot consist in finding a one-time key, a long contemplation is necessary here, in which both the mind and the heart take part.
  • The words of each language are symbols that mean certain objects or concepts, therefore the decoding of the languages ​​of extinct peoples, codes and other cryptograms of the same kind rests on rules common to all languages.
  • Subsequently, the hero explains the mysterious circumstances of the find, when he says how with the help of fire he showed on parchment cryptogramwritten in invisible ink, and then decrypted it.
  • (all offers)

Pin
Send
Share
Send
Send