A Chronology of Torah Cryptography

نویسنده

  • Grenville J. Croll
چکیده

Sometime during the early part of 1997 the author became aware of the controversial paper “Equidistant Letter Sequences in the Book of Genesis” [Witztum, Rips and Rosenberg, 1994] (WRR). This paper brought to the attention of a wider audience the possibility that the Torah (the first five books of the Hebrew Bible) was some kind of cryptographic material. Though this work was countered by a later and very comprehensive rebuttal [McKay, 1998] [McKay et al, 1999], the search for a deeper scientific understanding of the cryptographic nature of the Torah continues [Haralick, 2006a, 2006b].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Torah and Mishpat: The Law and its Liberation Spirit

This essay has two primary objectives. First, acknowledging the fact that the philosopher’s fundamental responsibility, due to the conditions of social order in many regions and nations around the world, requires not merely thought but also actions that transform this world into a more equitable and inclusive one, the author proposes to show the reader a simple way (among many other possibiliti...

متن کامل

Who Wrote the Torah

The issue of the authorship of the Torah is important for at least this one reason: since the book claims to have been written by a certain writer, it is simply a matter of integrity that that claim is verified. If this claim to authorship is not substantiated, then why should we trust what that book says? In short, if the Torah claims to be written by Moshe, and we find that it is, in fact, no...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Some A Priori Torah Decryption Principles

The author proposes, a priori, a simple set of principles that can be developed into a range of algorithms by which means the Torah might be decoded. It is assumed that the Torah is some form of transposition cipher with the unusual property that the plain text of the Torah may also be the cipher text of one or more other documents written in Biblical Hebrew. The decryption principles are based...

متن کامل

Linguistic Connections among Torah Codes 29 November 2004

This work presents a simple and verifiable method of testing the Torah code hypothesis. The hypothesis states that the Torah (the first five books of the Hebrew Bible) contains within it letter sequences (codes) that were created intentionally, as a form of communication to human beings, the intended receivers. Building on mounting evidence of multiple encodings for single events or concepts [1...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1101.5313  شماره 

صفحات  -

تاریخ انتشار 2011