Some A Priori Torah Decryption Principles
نویسنده
چکیده
The author proposes, a priori, a simple set of principles that can be developed into a range of algorithms by which means the Torah might be decoded. It is assumed that the Torah is some form of transposition cipher with the unusual property that the plain text of the Torah may also be the cipher text of one or more other documents written in Biblical Hebrew. The decryption principles are based upon the use of Equidistant Letter Sequences (ELS’s) and the notions of Message Length, Dimensionality, Euclidean Dimension, Topology, Read Direction, Skip Distance and Offset. The principles can be applied recursively and define numerous large subsets of the 304,807! theoretically possible permutations of the characters of the Torah.
منابع مشابه
Torah Codes: New Experimental Protocols
Because of its unexpected nature, finding words as equidistant letter sequences (Torah codes) in a text may appear to be interesting. However, there is a significant probability that they occur by chance. In this paper we discuss a repeatable and objective methodology for defining a priori related pairs of key words for use in an experiment and we define a testing methodlogoy for testing the hy...
متن کاملAlgorithmic Permutation of part of the Torah
A small part of the Torah is arranged into a two dimensional array. The characters are then permuted using a simple recursive deterministic algorithm. The various permutations are then passed through three stochastic filters and one deterministic filter to identify the permutations which most closely approximate readable Biblical Hebrew. Of the 15 Billion sequences available at the second level...
متن کاملTruth : Elusive or Illusive ?
How should one react when "reality," based on observations and scientific proofs, appears to be at odds with the teachings of the Torah? Some critical observers have noted that it is common for people to accept "reality" as fact and attempt to reconcile the Torah with the "facts," regardless of how tortured and convoluted the solution may be. Rather than accepting this apologetic approach, thes...
متن کاملDecryption of pure-position permutation algorithms.
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm, we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorit...
متن کاملA Chronology of Torah Cryptography
Sometime during the early part of 1997 the author became aware of the controversial paper “Equidistant Letter Sequences in the Book of Genesis” [Witztum, Rips and Rosenberg, 1994] (WRR). This paper brought to the attention of a wider audience the possibility that the Torah (the first five books of the Hebrew Bible) was some kind of cryptographic material. Though this work was countered by a lat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0712.2605 شماره
صفحات -
تاریخ انتشار 2000