By cross-referencing Dutch and German archives, this chapter details the decades-long efforts of varying groups of people in the German hinterland to claim the inheritance of the slave trader Hendrik Hertogh of the Dutch West India... more
George Boole (1815-1864) is rightly known as a logician, the author of an algebra of logic, even if he did not conceive it quite in the same way as we know it. The calculus on classes and the calculus of propositions, that he set out to... more
This paper provides an overview of the practice and use of codes in the Arabic-Islamic context while reintroducing a Qurʾān manuscript housed in the Kitābkhāna-yi markazī Āstān-i Quds-i Raḍawī (Mashhad, Iran), known for being written in... more
We examine Turing's intriguing claim, made in the philosophy journal Mind, that he had created a short computer program of such a nature that it would be impossible "to discover by observation sufficient about it to predict its future... more
This paper provides an overview of encryption systems and steganographic techniques used by the Czechoslovak Maffie, which was an anti-Austrian underground resistance organization in 1914-1918.
This is a blog - written as part of a research and Project Tvaṣṭā (त्वष्टा)
- Preserving Heritage and Sculpting our Identity through Cultural Landscape
- Preserving Heritage and Sculpting our Identity through Cultural Landscape
Heretofore, scholarly literature devoted to the earliest, Polish portion of the world history of the Enigma did not leave room to any doubt. Apart from three instances of decryption which were found among the materials of the study... more
A SENIOR MEMBER OF MI6 RESPONSIBLE FOR THE DISTRIBTUTION OF THE TOP SECRET ULTRA DECRYPTS FROM ENIGMA REVEALS THAT FRANCIS BACON IS SHAKESPEARE To anyone with real cryptological experience it is hard to reconcile the impartiality claimed... more
In this paper, we present an empirical study on plaintext entities in historical cipher keys from the 15th to the 18th century to shed light on what linguistic entities have been chosen for encryption. We focus mainly on the nomenclature... more
Colonnele Frank's 23-folio-long Frenchlanguage description of what he calls a "chiffre indéchiffrable" survived in the cipher collection of Leopold, grand duke of Tuscany, and Holy Roman Emperor. The author lists the usual weaknesses of... more
'In the foundations of cryptography as a solid scientific computer mathematical discipline there lies a big Mystery of the occult mystical sense. By a long-standing tradition, it is forbidden to talk about this Mystery. But by whom it is... more
Article discusses the oldest encrypted document that comes from the territory of Bohemia.
During 1941, codebreaking at Bletchley Park was hindered by shortages of typists and unskilled staff. These shortages could have been easily rectified, but the codebreakers’ urgent requests were ignored by offcials in Whitehall. Going... more
Az epigráfia egy olyan tudományág, amire nincs, és nem is lehet komoly iskola, hiszen még gyerekcipőben jár. Tele van kérdésekkel, tévedésekkel, megoldatlan problémákkal, amikre még nincs válasz, hogyan is lehetne akkor tanítani? Ebben az... more
In World War One (WW1), the German diplomatic services and the Imperial Navy employed codebooks as the primary means for encoding confidential communications over telegraph and radio channels. The Entente cryptographic services were able... more
Jörg Ulbert Le chiffre diplomatique français au dix-huitième siècle Plus que toutes les autres, les correspondances diplomatiques ont vocation à rester secrètes. Et plus que toutes les autres, elles sont l'objet de convoitise et de... more
The need for progressively larger and more complex accommodation necessitated a near-continuous building programme. Despite some demolitions and postwar alterations, many of the site's wartime buildings still stand. A recent programme of... more
The need for progressively larger and more complex accommodation necessitated a near-continuous building programme. Despite some demolitions and postwar alterations, many of the site's wartime buildings still stand. A recent programme of... more
This study is an extension of a Master’s study, entitled Realistic Mathematics Education and the strategies grade 8 learners develop for the solution of two simultaneous linear equations. The current study investigates how new content... more
This study is an extension of a Master's study, entitled Realistic Mathematics Education and the strategies grade 8 learners develop for the solution of two simultaneous linear equations. The current study investigates how new... more
The work of British and American codebreakers led by Alan Turing at Bletchley Park in breaking the Enigma cipher machine during World War II has been well-documented, and rightfully recognized as one of the most extraordinary achievements... more
A deciphering report found in the National Archives at The Hague presents an intriguing story. A Portuguese spy inside the walls of Recife gathered information about the Dutch defences and wrote it in encrypted letters addressed to the... more
During 1941, codebreaking at Bletchley Park was hindered by shortages of typists and unskilled staff. These shortages could have been easily rectified, but the codebreakers’ urgent requests were ignored by offcials in Whitehall. Going... more
The presentation of a brief study of the use of Enigma Machines in Spain, during the Spanish Civil War (1936-1939) and later, until their final replacement.
A deciphering report found in the National Archives at The Hague presents an intriguing story. A Portuguese spy inside the walls of Recife gathered information about the Dutch defences and wrote it in encrypted letters addressed to the... more
Writing is a cognitive, material and motor process. To transfer sound values into a symbolic form, we require writing media, tools, and instruments, as well as specific hand movements. This tension between cognition and materiality can be... more
The history of Enigma G, the counter Enigma, is presented and traced from the very beginning of the development of the small, glow-lamp Enigma machine in early 1923 until the end of the Second World War. The commercial customers and... more
Revue française de civilisation britannique est mis à disposition selon les termes de la licence Creative Commons Attribution-Pas d'Utilisation Commerciale-Pas de Modification 4.0 International.
During the last few months of 1932, the Polish mathematician Marian Rejewski solved the problem of finding the internal connections of the rotors and reflector of the Enigma cipher machine used by the German army at that time. This... more
In this paper, we present an empirical study on plaintext entities in historical cipher keys from the 15th to the 18th century to shed light on what linguistic entities have been chosen for encryption. We focus mainly on the nomenclature... more
We study the problem of decoding secret messages encrypted by the German Army with the M3 Enigma machine after September 15, 1938. We focused our attention on the algorithmization and programming of this problem. A completion and... more
In this paper, we present an empirical study on plaintext entities in historical cipher keys from the 15th to the 18th century to shed light on what linguistic entities have been chosen for encryption. We focus mainly on the nomenclature... more
Colonnele Frank's 23-folio-long French-language description of what he calls a "chiffre indéchiffrable" survived in the cipher collection of Leopold, grand duke of Tuscany, and Holy Roman Emperor. The author lists the usual weaknesses of... more
The Enigma machines were a series of electromechanical rotor cipher machines developed in Germany and used in the first half of the twentieth century to protect commercial, diplomatic, and military communications. Until 1938, the German... more
The weakness of the vigenere cipher lies in its short key and is repeated, so there is a key loop in encrypting messages, this is used by cryptanalysts using the Kasiski method to know the key length so it can solve this algorithm. The... more
In World War One (WW1), the German diplomatic services and the Imperial Navy employed codebooks as the primary means for encoding confidential communications over telegraph and radio channels. The Entente cryptographic services were able... more
In May 1943, Adam and Eve only resembled what their descendents would become: huge gray machines standing seven feet high, ten feet long, and two feet wide. But Adam and Eve were merely components, motors, and wire spread across... more
Throughout history the need for secrecy has been important. This need for secrecy brought about the invention and the art of concealment, coding and code making [1]. As early as 1900 B.C., Egyptian scribes used hieroglyphs in a... more
The German armed forces employed three different types of teleprinter cipher machines during the Second World War, the Lorenz machines SZ40 and SZ42 also called Tunny by Bletchley Park (BP), the Siemens Schlüsselfernschreibmaschine (SFM)... more
In this paper we share our experience of conducting a mathematics camp to a group of 16-years-old school students. This camp is special since throughout their learning history, the students, like most school students in Malaysia, are only... more
In this paper we share our experience of conducting a mathematics camp to a group of 16-years-old school students. This camp is special since throughout their learning history, the students, like most school students in Malaysia, are only... more
The Lorenz SZ42, codenamed Tunny, was a teleprinter encryption device used by Germany during WW2 for strategic communications. Its successful cryptanalysis at Bletchley Park (BP) provided the Allies with high-grade intelligence about... more
The Siemens and Halske T52 is a family of teleprinter encryption systems, used in WWII by the Luftwaffe, the German Navy and Army, and German diplomatic services. Codenamed “Sturgeon” by the Allied, it was designed to provide enhanced... more
This paper presents a computer simulation of the US Navy Turing bombe. The US Navy bombe, an improved version of the British Turing-Welchman bombe, was predominantly used to break German naval Enigma messages during World War II. By using... more
The German armed forces employed three different types of teleprinter cipher machines during the Second World War, the Lorenz machines SZ40 and SZ42 also called Tunny by Bletchley Park (BP), the Siemens & Halske... more