Hi Nick,
you forgot another (4th) way to look: the dedicated reader (if there was one):The auditorium of the encrypted text must be considered.Such a reader has to able to read such a long text without too much effort.That means IMO sophisticted widgets, multiple alfabets and such are not usable in the long run.Even the Enigma with highest level of encryption was cracked.And I think that Enigma's secrets where more important (to their origin) than any medieval MS.
Claus
Nick wrote:
-----Ursprüngliche Nachricht-----
Von: Nick Pelling [mailto:incoming@xxxxxxxxxxxxxxxxx]
Gesendet: Mittwoch, 9. Juli 2003 10:41
An: vms-list@xxxxxxxxxxx
Betreff: Re: VMs: Re: word length counts
Hi Jeff,
At 09:04 09/07/2003 +0100, Jeff wrote:
>With my spinning wheel theory the glyphs could change due to a change of
>starting point, therefore mapping each character pair combination to a
>different grid in the matrix. The fixing position to restart from could be
>signified by those wierdo glyphs.
Broadly speaking, there are (IMO) three useful ways of looking at encrypted
texts:-
(1) as a cryptographer - this asks the question "how could I construct a
code that looks like the VMS, ie one that duplicates its properties?" Hoax
theorists (as Gordon has demonstrated) can share this
"forward-constructional" frame of mind - they might ask "if it's a hoax,
how was the text generated, how can I duplicate that construction process?"
(2) as a cryptologist - this asks the question "what interesting features
of the code can I determine from the stats, and can I reconstruct the
code's internal mechanisms from those features?" Similarly, hoax theorists
can take on this "backwards-reconstructional" frame of mind, by asking "if
it's a hoax, what signs can I find that point me towards the way it was made?"
(3) as an historian - this asks the question "from the observable signs
(cipherbet, structure, presentation, palaeography, layout, etc), what can I
deduce about the author's socio-cultural milieu, location, status,
intention, need, position? And from that (and my additional research), what
internal properties of the code can I predict?" This is more a
"postmodern-deconstructional" frame of mind.
Right now, you appear to be trying to do (1) by single-handedly
recapitulating the history of cryptography 1400-1550, but without really
getting to grips with the properties of the VMS: a valiant effort, but one
which is unlikely to get a great deal of support on-list.
Perhaps it might be an idea to get hold of an accessible book on the
history of cryptography (like David Kahn's classic "The Codebreakers", or
Simon Singh's more recent "The Code Book") and see how (for example)
Alberti, Trithemius and Vigenere did it, to put your own thoughts on
cryptography into a historical context.
Basically: don't reinvent the (coding) wheel, read up on it first. :-)
FWIW, when a breakthrough comes for the VMS, I think it's likely to be from
a combination of all three approaches, as any one of them would probably be
insufficient... but people naturally have a bias towards one of the three
paths... which is perhaps why this requires collaboration so acutely.
Cheers, .....Nick Pelling.....
______________________________________________________________________
To unsubscribe, send mail to majordomo@xxxxxxxxxxx with a body saying:
unsubscribe vms-list