ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Encrypted Books

Updated on October 18, 2021
Encrypted books do NOT come from crypts.  https://fc00.deviantart.net/fs33/i/2008/239/e/6/Gothic_Crypt_II_by_ben_er_finnue.jpg
Encrypted books do NOT come from crypts. https://fc00.deviantart.net/fs33/i/2008/239/e/6/Gothic_Crypt_II_by_ben_er_finnue.jpg | Source

Every now and then you run across interesting bits of information about things you had never thought to think about before. That happened when I attended a historical symposium on the History of Cryptology in 2013. Contrary to what the average person might first think, the subject has nothing to do with Halloween (“Tales from the Crypt”), nor anything to do with ancient tombs.

Instead we are talking about encryption and encrypted books, books created through the science of cryptology. Cryptology is all about the making and breaking of codes, usually associated with some form of written message. You might ask why anybody would do such a thing. It turns out there are many reasons, most of them really of little matter to most of us. Some folks simply seek to be discreet about their business dealings, love affairs, drug dealings, or other personal affairs.

They usually hide these things because the open share of those messages leads to some sort of negotiating or personal disadvantage. Marriage partners may not want to openly share information about their extramarital affairs. Business people may not want to share their latest market item or business strategy. Football teams may not want to share their play lists. Drug dealers may not want to share the place and location of their next meeting. They all seek to hide information about what they are doing, or when they are doing it.

Other folks might openly flaunt these same things.

This nice little folder is shared with attendees to the history symposium.
This nice little folder is shared with attendees to the history symposium. | Source

The Study

There are other more nefarious reasons why folks seek to hide their message exchanges. Such things as knowing your enemy's battlefield orders or diplomatic instructions can wreak havoc on attempting to achieve a goal if both sides know what those orders or instructions are. Concerns about this latter case serve as an impetus for developing new encryption technologies. These concerns also drive the evolution of methods (and machines) to decipher the products of these new technologies. As adversaries, one side seeks to hide the message, the other side seeks to understand those same messages before the message instructions can be exercised.

And that brings us to the science of cryptology, which studies both making encrypted messages and breaking encrypted messages. The Historical Symposium on Cryptology shares studies of that history, primarily the history of military and diplomatic cryptography and cryptanalysis. I like to think of it as the history of the cryptologic race.

The 2013 Symposium focused on the advances of technology. You may have heard about some of the most recent advances in technology in the news. If you want to know more, do Internet searches on terms such as ‘Snowden’, or other terms that you hear in the news. The short summary is, to all appearances, the folks who seek to discover and decode the hidden messages of these modern times are able to do so, seemingly easily. Worse, they appear to have taken the technology to our enemies.

An Encrypted Book

Encrypted Books

However, this article is about encrypted books, a topic that was presented at the Symposium in a 2013 presentation by German computer scientist Klaus Schmeh. His presentation was entitled “Encrypted Books: Why some secrets fill hundreds of pages”. This presenter had shared his study of the Voynich manuscript at a prior conference, and had become interested in finding out about other encrypted books that existed. He found many. The essence of his presentation was that these books covered a variety of topics, were created in different centuries, and varied in the level of their encryption and also varied in the technological level of their content. He also noted that the encryption methods used in several of these books had still not been solved. In others the method had been solved, but they had not been fully decrypted.

The interest in the audience was immediately apparent; after all, this was a conference on cryptology. And here were a bunch of open source materials that needed to be decrypted. Some were interested in specific books he named, since they appeared to be diaries by historical figures whose names were recognized by the attendees. He was also encouraged by the audience to set up a web site to help coordinate efforts to find and decode similar books.

Why I don't Climb Trees, and instead leave it to the squirrels.
Why I don't Climb Trees, and instead leave it to the squirrels. | Source

Other Encrypted Books

Some books are encrypted, so to speak, by the simple fact that they are hidden from all but the most observant or informed people.

I was made aware of one other type of book during this interesting symposium, this time by presenter Elonka Dunin, a game designer for a company called Simutronics out of St. Louis. These books were the sort that you find at the end of a miniature treasure hunt. In recent years, a new hobby/game/past-time has come into existence, enabled by technological improvements made to the global positioning system. We know the new technology as GPS. This technology comes to us in the form of little hand-held devices. These little devices can talk to us, and tell us where to go. And thus, the new game – geocaching.

Geocaching is a game where folks hide little boxes that contain things. Other folks are then invited to find those little boxes. The invitation is recorded on a web-site – geocaching.com. The web-site also allows folks to record their creation of a cache site, lets them give the cache a name, and allows visitors to their cache to record a log of their visit, the fact that they found it, or other miscellaneous notes. During the symposium we checked for nearby geocaches. We found one listed at the site that was called “Time Capsule”. We did not do as well at another called “Be a Squirrel...” The neat thing was that there was a miniature weatherproof capsule at the final destination of the first hunt, and it held a miniature log book. Elonka entered her name, and thus logged her visit. This log book had absolutely nothing to do with the trees we encountered at the next geocache site, which are a totally different (and more natural) type of log.


Kryptos Dinner Factoids (October 2013)

  • Ed Scheidt, adviser to Jim Sanborn, attended the Kryptos dinner this year. Mr. Scheidt did a presentation on computer network security and a summary of the Kryptos related FOIA information released by NSA.
  • There was a brief discussion of how the group would go about advertising to the world the solution to K4, if it is ever solved.
  • From the sculptor Jim Sanborn
    o K1, K2, K3 do not need to be solved to solve K4.
    o All four parts need to be solved to solve the next part. Many in the group have shared the opinion in the past that once K4 is solved, there is more.
  • An additional clue was released November 2014. The K4 letters NYPVTTMZFPK decode letter for letter to the phrase BERLIN CLOCK.

Kryptos

You might be wondering by now, what ties all these things together? The answer is a sculpture built in 1990 for the Central Intelligence Agency by artist Jim Sanborn. The sculpture is named Kryptos, and is located in the courtyard of the same Agency. The sculpture includes a set of encrypted characters, containing four separate messages. Three of those messages (called K1, K2, and K3) have been solved. The fourth (called K4) remains unsolved. The folks who are trying to solve the Kryptos sculpture meet roughly around the same time as the bi-annual meeting of the Cryptologic History Symposium. Most of the folks seeking to solve this puzzle do not have anywhere near the skill, understanding, or capability of the sort of folks who present at the history symposia. Nevertheless, they meet, learn, and exchange ideas and come to a better understanding of what cryptology is all about.

The 2013 meeting was especially interesting. Among those attending were members of the team that, according to recently released Freedom of Information Act (FOIA) documents from the National Security Agency, initially solved the first three parts of Kryptos. One of the original NSA team now believes he is ‘close’ to solving the fourth part. The former team members have some really stringent obligations with respect to releasing information though (even when retired), so even if the puzzle is solved it may be some time before the solution is released. Like most other significant events in the history of cryptology, the events may not be advertised until years after they occur.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)