{"id":32069,"date":"2017-06-07T17:45:54","date_gmt":"2017-06-07T21:45:54","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/cryptography-the-codes-that-got-away-nature-com.php"},"modified":"2017-06-07T17:45:54","modified_gmt":"2017-06-07T21:45:54","slug":"cryptography-the-codes-that-got-away-nature-com","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-the-codes-that-got-away-nature-com.php","title":{"rendered":"Cryptography: The codes that got away &#8211; Nature.com"},"content":{"rendered":"<p><p>      Craig Bauer Princeton University Press: 2017.      ISBN: 9780691167671    <\/p>\n<p>      Buy this book:       US       UK       Japan    <\/p>\n<p>        Leemage\/Corbis via Getty      <\/p>\n<p>          The Phaistos disc, discovered in Crete in 1908, remains          untranslated.        <\/p>\n<p>    The concluding words of Unsolved! are a call to action.    Craig Bauer, a US mathematician and editor-in-chief of the    journal Cryptologia, ends his hefty history of    cryptography by noting that even as he was compiling the book,    unsolved ciphers from decades, sometimes centuries, in the    past were coming to light on a regular basis, along with a    plethora of new puzzles. For cryptography fiends, it's a thrown    gauntlet.  <\/p>\n<p>    Unsolved! spans a huge arc of time and space, from    Julius Caesar's simple substitution cipher to composer Edward    Elgar's 1897 Dorabella Cipher  a still-unsolved letter to Dora    Penny, a dedicatee of his Enigma Variations. Uncracked    ciphers from the twentieth century are associated with the    Irish Republican Army, a series of grisly murders in California     and messages 'detected' from Mars.  <\/p>\n<p>    Bauer's compelling chapter on the medieval Voynich manuscript    occupies one-sixth of the book. In his 1967 The    Codebreakers, cryptography historian David Kahn called the    manuscript the longest, the best known, the most tantalizing,    the most heavily attacked, the most resistant, and the most    expensive of historical cryptograms. Its weird colour    illustrations and indecipherable calligraphy attract    16% of online traffic to the library at    Yale University in New Haven, Connecticut, where it is held    (A. Robinson    Nature 539, 2829;    2016). Bauer speculates as to    whether the manuscript is written in a monoalphabetic    substitution cipher (MASC)  each plaintext letter substituted    with a letter from a single scrambled alphabet. A crackable    MASCed text in English reveals the principles. But, as he    shows, the Voynich manuscript has too much redundancy (order)    to be MASCed English, French, German, Italian, Spanish or    Japanese. (Wisely, Bauer offers no theories of his own.)  <\/p>\n<p>    Unsolved! digs into the riches of ancient Viking, Roman,    Greek and Egyptian cryptography. Egyptologists tend to avoid    tackling the latter because of its sheer complexity. Bauer    reveals how Caesar's cipher worked, substituting each    plain-text letter with a letter a fixed number of places away    in the alphabet. Inexplicably, however, he relegates to an    endnote the undeciphered Phaistos disc found on Crete in 1908     the only example of its much-discussed script (A.Robinson    Nature 453, 990991;    2008). Nor is there even a    passing reference to Michael Ventris, celebrated for his 1952    decipherment of the script Linear B as a form of archaic Greek,    or to the exciting solution of Central America's Mayan script,    launched by Soviet linguist Yuri Knorozov.  <\/p>\n<p>    Perhaps the most successful chapter centres on ciphers by the    notorious, never-captured 'Zodiac Killer', who murdered at    least five people in California in 196870 (dramatized in David    Fincher's 2007 film Zodiac.) The murderer sent taunting    letters to local newspapers, featuring four ciphers offering    clues to his identity. The first was broken by husband-and-wife    amateurs Donald and Bettye Harden. She guessed that a    self-centred person might begin his message with 'I'; that    'KILL' might feature in it more than once; and even that the    phrase 'I LIKE KILLING' might appear. This proved the key to    translating the simple MASC to meaningful, if misspelt,    English, although no sense could be made of the killer's    signature, EBEORIETEMETHHPITI.  <\/p>\n<p>    The Zodiac's other ciphers have proved resistant. Bauer hazards    that a nine-letter 'word' with some resemblance to the    ten-letter 'CALIFORNIA' may mean just that, although a letter    is missing  possibly due to lousy spelling. But would a    killer with poor spelling, as opposed to someone like the    wordplay-loving Elgar, be attracted to ciphering? Later, Bauer    guesses that such misspellings were likely intentional.  <\/p>\n<p>    The level of decoding skill needed for Unsolved! varies    significantly. A willingness to grapple with plain text and    cipher text is necessary, but some parts require    undergraduate-level mathematics. One is the section on RSA,    unveiled in the 1970s as one of the first practical public-key    cryptosystems. The book's combination of convincing logic and    sometimes-convincing speculation is a familiar mix to those of    us interested in undeciphered writing, such as the script of    the Indus civilization (A. Robinson    Nature 526, 499501;    2015) and the rongorongo script    used on Easter Island.  <\/p>\n<p>    As science-fiction writer Arthur C. Clarke commented when I    published Lost Languages (McGraw-Hill, 2002): Many, it    seems likely, will never be deciphered  which raises an    interesting question. If we cannot always understand messages    from our fellow humans  how successful will we be when we    receive the first communication from Outer Space? And Clarke    was talking about ordinary writing systems. For all the clues    analysed in Unsolved!, there is plenty of Earthly    decoding to do before we tackle any extraterrestrial    communiqus.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.nature.com\/nature\/journal\/v546\/n7657\/full\/546208a.html\" title=\"Cryptography: The codes that got away - Nature.com\">Cryptography: The codes that got away - Nature.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Craig Bauer Princeton University Press: 2017. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-32069","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32069"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32069"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32069\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}