Editing
Final Report 2011
(section)
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Methodology=== Cipher analysis was done through a methodology established at the beginning of the project. <center>[[File:Cipher Analysis methodology.png|Cipher Analysis Methodology]]</center> <center>'''Figure 7 - Cipher analysis methodology'''</center> Initially potential ciphers were '''identified''' by broad research aimed at isolating relevant ciphers. Relevance was determined as the cipher meeting several pre-conditions: # The cipher needed to have been invented and in use prior to the time the unknown man was found in 1948. Thus no cipher invented after December 1 1948 was included in the 2011 investigation as they can be trivially discounted. # It must be possible to perform the cipher methodology by hand. This acknowledges the original code written in the back of the Rubaiyat of Omar Khayyam whilst also reflecting that computers were not in common use in 1948. Mechanically derived codes such as those generated by the Enigma machine were not included. # In accordance with the results from 2009, the ciphers were not to use a transposition-based methodology. Once identified, detailed '''research''' was conducted into each cipher determining methods for its use. Following the research, each cipher was '''investigated''' in its potential relationship to the Somerton Man code. The investigative methods that were used depended on the function and scope of the individual cipher. These ranged from exhaustive software testing to statistical analysis, structural analysis and frequency analysis. The product of the investigation stage was a '''conclusion''': whether the cipher could be ruled out as being used in encrypting the code or not. In the '''Compilation''' stage, the results of the previous three sections, namely Research, Investigation and Conclusion were compiled onto a central database; this database being a sub-page on the project’s publicly accessible wiki page known as the [[Cipher Cross-off List]]. The final stage was to '''implement''' the cipher in the cipher analysis software tool. This software tool is referred to as the CipherGUI in this report.
Summary:
Please note that all contributions to Derek may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Derek:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information