An Account of Early Statistical Inference in Arab Cryptology

  title={An Account of Early Statistical Inference in Arab Cryptology},
  author={Lyle D. Broemeling},
  journal={The American Statistician},
  pages={255 - 257}
  • L. Broemeling
  • Published 1 November 2011
  • Computer Science
  • The American Statistician
Recently discovered manuscripts reveal an early use of statistical inference in Arab cryptology in the eighth through twelfth centuries A.D. The manuscripts report that al-Kindi (801–873) used relative frequency analysis some 1100 years ago to decode messages, some 800 years before the correspondence between Pascal and Fermat. Among his many accomplishments, al-Kindi is the author of the oldest known book on cryptology. This article describes an early use of statistical methods for the… 
Compression-based methods for the automatic cryptanalysis of classical ciphers
The study has shown how a good model of the source (i.e. the PPM compression model) can also be effectively used in the automatic decryption of different classical ciphers, and highlighted why better models are of vital importance in cryptology.
Breaking an image encryption scheme based on Arnold map and Lucas series
The key space of the scheme under study could be reduced considerably after the equivalent keys analysis, and thus the system is breakable under reasonable brute force attack and is therefore not recommend for any cryptographic concern or security purpose.
Security analysis of an audio data encryption scheme based on key chaining and DNA encoding
This study proves that the scheme is extremely weak and should not be used for any information security or cryptographic concern and lessons learned are outlined in order to be considered in further designs and proposals.
Cryptanalysis of Selected Block Ciphers
A proposed attack named the Invariant Subspace Attack is utilized to break the full block cipher PRINTcipher for a significant fraction of its keys and shows that for weak keys, strongly biased linear approximations exists for any number of rounds.
Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation
A simple and robust experiment and theory for a senior level undergraduate investigation of quantum key distribution are described and key principles from the BB84 protocol are emulated using an optical apparatus and computational scripts independently.
The origins of the treatment of uncertainty in clinical medicine – Part 2: the emergence of probability theory and its limitations
  • R. Matthews
  • Medicine
    Journal of the Royal Society of Medicine
  • 2020
In the second part of this history, this work examines how the theory of probability, initially seen by some as a panacea for the treatment of uncertainty in medicine, quickly sparked bitter disputes about its implications and relevance which continue to this day.
Some Remarks on the Temporal Significance of Verbs and Auxiliary Verbs in the Ancient Egyptian Sentence between the Synthetic and Analytic Systems "A Linguistic Study Applied to Selected Models"
: Linguistically, the time is one of the most important indicators that affected the ancient Egyptian sentence, as well as the temporal indicators and connotations that express the time of sentence
Machine and deep learning in MS research are just powerful statistics – Yes
  • C. Tur
  • Computer Science
    Multiple sclerosis
  • 2021
Deep Learning, which is now considered as a subtype of Machine Learning based on the use of artificial neural networks, started to be explored in the 1940s to refer to a model that mirrored the human brain, based on neurons and their connections to learn patterns from the data with a main focus on outcome prediction.
An improved evidence fusion algorithm in multi-sensor systems
An improved algorithm of evidence theory is proposed to address the weakness in D-S evidence theory when dealing with highly conflicting evidence, and has the best performance than other methods.
Clinical Decision Support Systems and Predictive Analytics
The chapter discusses the practical challenges in the implementation of the clinical decision support systems in healthcare organisations and elaborates the various types of clinical decision supports systems.


Origins of Cryptology: the Arab Contributions
Factors behind the emergence and advancement of Arab cryptology are discussed and the specific contributions of some Arab cryptologists are highlighted based on newly discovered documents.
The code book : the secret history of codes and codebreaking
Simon Singh investigates other codes, the unravelling of genes and the rediscovery of ancient languages and most tantalisingly, the Beale ciphers, an unbroken code that could hold the key to a $20 million treasure.
The codebreakers : the story of secret writing
CONTENTS Preface to the Revised Edition Preface A Few Words 1. One Day of Magic THE PAGENT OF CRYPTOLOGY 2. The First 3,000 Years 3. The Rise of the West 4. On the Origin of a Species 5. The Era of
A History of Probability and Statistics and Their Applications before 1750
2. A History of Probability and Statistics and Their Applications before 1750. By A. Hald. ISBN 0 471 50230 8. Wiley, New York, 1990. xiv + 586pp. $69.95.
A History of Probability and Statistics and Their Applications before 1750
A History of Probability and Statistics and their Applications before 1750. By A. Hald. ISBN 0 471 50230 8. Wiley, New York, 1990. xiv + 590pp. £55.15.
The Code Book
The Coder should refer to the publicly available copy of the award at (or available in hard copy in Professor Franck’s library), and write manuscript notes on their copies of the Chart identifying the relevant, omitted information and its location within the award.
Games, Gods and Gambling: A History of Probability and Statistical Ideas
The History of Statistics: The Measurement of Uncertainty before 1900
Introduction PART 1: The Development of Mathematical Statistics in Astronomy and Geodesy before 1827 1. Least Squares and the Combination of Observations Legendre in 1805 Cotes's Rule Tobias Mayer