Encrypted Books

Encrypted books do NOT come from crypts.  http://fc00.deviantart.net/fs33/i/2008/239/e/6/Gothic_Crypt_II_by_ben_er_finnue.jpg
Encrypted books do NOT come from crypts. http://fc00.deviantart.net/fs33/i/2008/239/e/6/Gothic_Crypt_II_by_ben_er_finnue.jpg | Source

Every now and then you run across interesting bits of information about things you had never thought to think about before. That happened recently when I attended a historical symposium on the History of Cryptology (2013). Contrary to what the average person might first think, the subject has nothing to do with Halloween (“Tales from the Crypt”), nor anything to do with ancient tombs.

Instead we are talking about encryption and encrypted books, books created through the science of cryptology. Cryptology is all about the making and breaking of codes, usually associated with some form of written message. You might ask why anybody would do such a thing. It turns out there are many reasons, most of them really of little matter to most of us. Some folks simply wish to be discreet about their business dealings, love affairs, drug dealings, or other personal affairs.

They usually hide these things because the open share of those messages leads to some sort of negotiating or personal disadvantage. Marriage partners may not want to openly share information about their extramarital affairs. Business people may not want to share their latest market item or business strategy. Football teams may not want to share their play lists. Drug dealers may not want to share the place and location of their next meeting. They all seek to hide information about what they are doing, or when they are doing it.

Other folks might openly flaunt the same things.

This nice little folder is shared with attendees to the history symposium.
This nice little folder is shared with attendees to the history symposium. | Source

The Study

There are other more nefarious reasons why folks seek to hide their message exchanges. Such things as knowing your enemy's battlefield orders or diplomatic instructions can wreak havoc on attempting to achieve a goal if both sides openly know what those orders or instructions are. Concerns about this latter served as an impetus for developing new encryption technologies. The concerns drove the evolution of methods (and machines) to decipher the products of those new technologies. As adversaries, one side sought to hide the message, the other side sought to understand those same messages before its instructions could be exercised.

And that brings us to the science of cryptology, which studies both making encrypted messages and breaking encrypted messages. The Symposium studies that history, primarily the history of military and diplomatic cryptography and cryptanalysis. I like to think of it as the history of the cryptology race.

The 2013 Symposium focused on the advances of technology. You may have heard about some of the most recent advances in technology in the news. If you want to know more, do Internet searches on terms such as ‘Snowden’, or other terms that you hear in the news. The short summary is, to all appearances, the folks who seek to discover and decode the hidden messages of these modern times are able to do so, seemingly easily. Worse, they appear to have taken the technology to our enemies.

An Encrypted Book

Encrypted Books

This article is about encrypted books, a topic that was introduced in a 2013 presentation by German computer scientist Klaus Schmeh. His presentation was entitled “Encrypted Books: Why some secrets fill hundreds of pages”. This presenter had shared his study of the Voynich manuscript at a prior conference, and had become interested in finding out about other encrypted books that existed. He found many. The essence of his presentation was that these books covered a variety of topics, were created in different centuries, and varied in the level of their encryption and also varied in the technological level of their content. He also noted that the encryption methods used in several of these books had still not been solved. In others the method had been solved, but they had not been fully decrypted.

The interest in the audience was immediately apparent; after all, this was a conference on cryptology. And here were a bunch of open source materials that needed to be decrypted. Some were interested in specific books he named, since they appeared to be diaries by historical figures whose names were recognized. He was also encouraged by the audience to set up a web site to help coordinate efforts to find and decode similar books.

Why I don't Climb Trees, and instead leave it to the squirrels.
Why I don't Climb Trees, and instead leave it to the squirrels. | Source

Other Encrypted Books

Some books are encrypted, so to speak, by the simple fact that they are hidden from all but the most observant or informed people.

I was made aware of one other type of book during this interesting symposium, this time by presenter Elonka Dunin, a game designer for a company called Simutronics out of St. Louis. These books were the sort that you find at the end of a miniature treasure hunt. In recent years, a new hobby/game/past-time has come into existence, enabled by technological improvements made to the global positioning system. We know the new technology as GPS. This technology comes to us in the form of little hand-held devices. These little devices can talk to us, and tell us where to go. And thus, the new game – geocaching.

Geocaching is a game where folks hide little boxes that contain things. Other folks are then invited to find those little boxes. The invitation is recorded on a web-site – geocaching.com. The web-site also allows folks to record their creation of a cache site, lets them give the cache a name, and allows visitors to their cache to record a log of their visit, the fact that they found it, or other miscellaneous notes. During the symposium we checked for nearby geocaches. We found one listed at the site that was called “Time Capsule”. We did not do as well at another called “Be a Squirrel...” The neat thing was that there was a miniature weatherproof capsule at the final destination of the first hunt, and it held a miniature log book. Elonka entered her name, and thus logged her visit. This log book had absolutely nothing to do with the trees we encountered at the next geocache site, which are a totally different (and more natural) type of log.


Kryptos Dinner Factoids (October 2013)

  • Ed Scheidt, adviser to Jim Sanborn, attended the Kryptos dinner this year. Mr. Scheidt did a presentation on computer network security and a summary of the Kryptos related FOIA information released by NSA.
  • There was a brief discussion of how the group would go about advertising to the world the solution to K4, if it is ever solved.
  • From the sculptor Jim Sanborn
    o K1, K2, K3 do not need to be solved to solve K4.
    o All four parts need to be solved to solve the next part. Many in the group have shared the opinion in the past that once K4 is solved, there is more.
  • An additional clue was released November 2014. The K4 letters NYPVTTMZFPK decode letter for letter to the phrase BERLIN CLOCK.

Kryptos

You might be wondering by now, what ties all these things together? The answer is a sculpture built in 1990 for the Central Intelligence Agency by artist Jim Sanborn. The sculpture is named Kryptos, and is located in the courtyard of the same Agency. The sculpture includes a set of encrypted characters, containing four separate messages. Three of those messages (called K1, K2, and K3) have been solved. The fourth (called K4) remains unsolved. The folks who are trying to solve the Kryptos sculpture meet roughly around the same time as the bi-annual meeting of the Cryptologic History Symposium. Most of the folks seeking to solve this puzzle do not have anywhere near the skill, understanding, or capability of the sort of folks who present at the history symposia. Nevertheless, they meet, learn, and exchange ideas and come to a better understanding of what cryptology is all about.

The 2013 meeting was especially interesting. Among those attending were members of the team that, according to recently released Freedom of Information Act (FOIA) documents from the National Security Agency, initially solved the first three parts of Kryptos. One of the original NSA team now believes he is ‘close’ to solving the fourth part. The former team members have some really stringent obligations with respect to releasing information though (even when retired), so even if the puzzle is solved it may be some time before the solution is released. Like most other significant events in the history of cryptology, the events may not be advertised until years after they occur.

More by this Author


Comments 10 comments

jemuelO profile image

jemuelO 15 months ago from Cebu, Philippines

Great article! It's my first time to read about encrypted books and I really enjoyed the discussion - it's interesting, straightforward and easy to comprehend. Keep it up!


sparkster profile image

sparkster 17 months ago from United Kingdom

Kind of I suppose... but anyone who wanted the information bad enough would be able to figure out how to decrypt it. That's what I'm thinking. I don't know, I may just release the information anyway.


FitnezzJim profile image

FitnezzJim 17 months ago from Fredericksburg, Virginia Author

Thank you for the read and comment.

I'm the wrong person to ask about releases. Would an 'encrypted release' be a contradiction in terms?


sparkster profile image

sparkster 17 months ago from United Kingdom

Great article. I have some highly sensitive information I would like to release. I wonder if I should release it in this way!?


FitnezzJim profile image

FitnezzJim 2 years ago from Fredericksburg, Virginia Author

Thank you for the comment dragonflyfla. Perhaps in time, we will know.


dragonflyfla profile image

dragonflyfla 2 years ago from South Florida

If the Voynich manuscript is a hoax it is supposed to be a very expensive one. The type of material, especially the paper was very expensive back then.


FitnezzJim profile image

FitnezzJim 2 years ago from Fredericksburg, Virginia Author

Thank you for the comment Joe, and for the segue into Kryptos.

The Yahoo newsgroup Krytpos mentioned in the article (one of the little blue or grey boxes to the side) is a far better place for discussing solutions to the Krytpos puzzle.

This article is meant to be an introduction to the emerging effort to decrypt some of the historical encrypted books that are out there. Further comments on Kryptos will be not be accepted.


JOSEPH FROM SPAIN profile image

JOSEPH FROM SPAIN 2 years ago from Barcelona, SPAIN (Europe)

Hello from Spain

+ I suggest a solution to KRIPTOS K4

+ IF the sculptor of Kryptos Mr. Sanborn has provided The New York

Times with the answers to six letters in the sculpture’s final passage.

The characters that are the 64th through 69th in the final series on the

sculpture read NYPVTT. When deciphered, they read BERLIN

http://www.nytimes.com/interactive/2010/11/20/us/c...

+ THEN in my humble opinion the best solution is this:

"PEOPLE TO CREATE A SAFER, FREER WORLD AND SURELY THERE IS NO BETTER PLACE THAN BERLIN THE MEETING PLACE OF EAST AND WEST"

(97 characters, no more & no less)

+ BECAUSE

1_is a fragment of a speech of Ronald reagan in front of Berlin Wall

and complies with the requirements explained by the sculptor.

—Ronald Reagan, address at the Brandenburg Gate, June 12, 1987.

LOOK

http://www.americanrhetoric.com/speeches/ronaldrea...

He said:

“Today, thus, represents a moment of hope …….PEOPLE TO

CREATE A SAFER, FREER WORLD AND SURELY THERE IS NO BETTER PLACE THAN

BERLIN THE MEETING PLACE OF EAST AND WEST, to make a start.”

2_a question needs an answer:

SO, if K 3 has a question: ” …… can you see anythyngq?“. (The account

of Howard Carter, the renowned Egyptologist, as he opened King Tut’s

tomb. --and breaking the WALL--)

THEN … K 4 has an beautiful answer “ People to create a safer, freer

world ……..” (a fragment of a speech of Ronald reagan in front of Berlin

WALL)

3_is a beautiful and elegant solution, is what wanted the CIA: The

Central Intelligence Agency planned the expansion known as the New

Headquarters Building in the 1980s and asked artists to submit proposals

to create a work of art for the courtyard. The broad principles it

provided for the $250,000 commission included the notion that it should

“engender feelings of well-being, hope.”

FINALLY

+ I do not know the name of the encryption system, but this solution complies with the requirements and is lovely.

Maybe you can find the code used

Goodbye.

Reply


FitnezzJim profile image

FitnezzJim 2 years ago from Fredericksburg, Virginia Author

Concur about the manuscript. The question of whether the Voynich manuscript is language or an elaborate hoax was discussed at the Symposium.


calculus-geometry profile image

calculus-geometry 2 years ago from Germany

The Voynich manuscript is very beautiful, I have a pdf copy of it somewhere. Whether or not the text is in a real, undecipherable language, or an elaborate hoax of gibberish, the botanical drawings of alien-like plants are worth a look. Whoever wrote it had an incredible imagination.

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working