The Pathology of Cryptology—A Current Survey

@article{Schmeh2012ThePO,
  title={The Pathology of Cryptology—A Current Survey},
  author={Klaus Schmeh},
  journal={Cryptologia},
  year={2012},
  volume={36},
  pages={14 - 45}
}
  • Klaus Schmeh
  • Published 1 January 2012
  • Computer Science
  • Cryptologia
Abstract “The Pathology of Cryptology” is the title of a chapter in David Kahn's book The Codebreakers. This chapter mainly deals with hidden messages, which amateur scientists claim to have discovered in the works of William Shakespeare and in other literary works. The present article picks up this subject and provides it with a theoretic framework under the name of “para-steganography.” Moreover, further case studies are added to those given by Kahn, including many examples that only became… 
1 Citations
A Study in Authenticity : Admissible Concealed Indicators of Authority and Other Features of Forgeries : A Case Study on Clement of Alexandria, Letter to Theodore, and the Longer Gospel of Mark
A standard approach in historically minded disciplines to documents and other artefacts that have become suspect is to concentrate on their dissimilarities with known genuine artefacts. While such an

References

SHOWING 1-10 OF 129 REFERENCES
The Da RSA Code
TLDR
As this paper demonstrates, cryptical messages are hidden between the lines, using complex Cabalistic techniques (only mastered by experts like Louise Ciccone or Claude Vorilhon), and may deliver fundamental prophecies for the future status of RSA, and cryptology in general.
Why Don't We Decipher an Outdated Cipher System? The Codex of Rohonc
TLDR
If the text of the Rohonc codex is not a hoax, it must be a consciously encoded or enciphered text, and these possibilities are systematically assessed in the article with the help of historical analogies.
The Bible Code
TLDR
Whatever “code” is found in the book of Genesis can be replicated in any other text of comparable length, according to the Random Samples item.
Solving the Bible Code Puzzle
TLDR
It is argued that Witztum, Rips and Rosenberg's case is fatally defective, indeed that their result merely reflects on the choices made in designing their experiment and collecting the data for it.
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
The Bible Code
TLDR
This paper challenges the conceptual basis for the ELS research performed by Rip's team and suggests its use over centuries (as potentially meaningful predictors) is well beyond the information derivable from the underlying database.
The da vinci code
The Da Vinci Code, a novel by thril ler-writer Dan Brown, is big business. Despite its length, mil lions have bought and read the book. The film, with Tom Hanks as the lead, will be seen by millions
The Holy Blood and the Holy Grail
A vast number of people have become enthralled with the story of the nineteenth-century French priest who, in his mountain village at the foot of the Pyrenees, discovered something which enabled him
The Twin Towers Cluster in Torah Codes
TLDR
A Torah Code experiment which focuses on a famous contemporary event, has a simple and explicit data collection, and has considerably simpler measurements than in previous Torah Code experiments is described.
The Historical Figure of Jesus
This biography of the historical figure of Jesus is for a non-specialist readership. In the first part of this study, Professor Sanders proposes that people can have an excellent knowledge about
...
...