Ancient zero: scientists have unraveled the mystery of the origin of the number. The Russian is sure that he has cracked the code of the great Nostradamus. This difficult simplicity

Since the time humanity has reached the age of written speech, codes and ciphers have been used to protect messages. The Greeks and Egyptians used ciphers to protect personal correspondence. In fact, it is from this glorious tradition that the modern tradition of breaking codes and ciphers grows. Cryptanalysis studies codes and methods of breaking them, and this activity can bring a lot of benefits in modern realities. If you want to learn this, you can start by studying the most common ciphers and everything connected with them. In general, read this article!

Steps

Decryption of substitution ciphers

    Start by looking for one-letter words. Most ciphers based on relatively simple substitution are most easily broken by simple brute-force substitution. Yes, you will have to tinker, but it will only get more difficult.

    • Words from one letter in Russian are pronouns and prepositions (ya, v, u, o, a). To find them, you will have to carefully study the text. Guess, check, fix or try new options - there is no other method of solving the cipher.
    • You must learn to read the code. Hacking it is not that important. Learn to pick out the patterns and rules underlying the cipher, and then breaking it will not be fundamentally difficult for you.
  1. Look for the most frequently used symbols and letters. For example, in English these are “e”, “t” and “a”. When working with a code, use your knowledge of language and sentence structure, based on which you make hypotheses and assumptions. Yes, you will rarely be 100% sure, but solving codes is a game where you are required to make guesses and correct your own mistakes!

    • Look for double symbols and short words first, try to start decoding with them. It’s easier, after all, to work with two letters than with 7-10.
  2. Pay attention to apostrophes and symbols around. If the text contains apostrophes, then you are in luck! So, in the case of English, the use of an apostrophe means that after symbols such as s, t, d, m, ll or re are encrypted. Accordingly, if there are two identical characters after the apostrophe, then this is probably L!

    Try to determine what type of cipher you have. If, while solving a code, at a certain moment you understand which of the types described above it belongs to, then you have practically solved it. Of course, this will not happen very often, but the more codes you solve, the easier it will be for you later.

    • Digital substitution and keyboard ciphers are most common these days. When working on a cipher, first check to see if it is the same type.

    Recognition of common ciphers

    1. Substitution ciphers. Strictly speaking, substitution ciphers encode a message by replacing some letters with others, according to a predetermined algorithm. The algorithm is the key to solving the cipher; if you solve it, then decoding the message will not be a problem.

      • Even if the code contains numbers, Cyrillic or Latin, hieroglyphs or unusual characters - as long as the same types of characters are used, then you are probably working with a substitution cipher. Accordingly, you need to study the alphabet used and derive substitution rules from it.
    2. Square cipher. The simplest encryption, used by the ancient Greeks, based on the use of a table of numbers, each of which corresponds to a letter and from which words are subsequently composed. This is really simple code, kind of the basics. If you need to solve a cipher in the form of a long string of numbers, it is likely that the methods of working with a square cipher will be useful.

      Caesar's cipher. Caesar could not only do three things at once, he also understood encryption. Caesar created a good, simple, understandable and, at the same time, crack-resistant cipher, which was named in his honor. The Caesar Cipher is the first step towards learning complex codes and ciphers. The essence of the Caesar cipher is that all characters of the alphabet are shifted in one direction by a certain number of characters. For example, shifting 3 characters to the left will change A to D, B to E, etc.

      Watch out for keyboard patterns. Based on the traditional QWERTY keyboard layout, various ciphers are now being created that work on the principle of displacement and substitution. The letters are shifted left, right, up and down by a certain number of characters, which allows you to create a cipher. In the case of such ciphers, you need to know in which direction the characters were shifted.

      • So, by moving the columns up one position, “wikihow” becomes “28i8y92”.
      • Polyalphabetic ciphers. Simple substitution ciphers rely on the cipher creating a kind of alphabet for encryption. But already in the Middle Ages it became too unreliable, too easy to hack. Then cryptography took a step forward and became more complex, starting to use symbols from several alphabets for encryption. Needless to say, the reliability of encryption immediately increased.

    What does it mean to be a code breaker?

      Be patient. Breaking a code requires patience, patience and more patience. And perseverance, of course. It is slow, painstaking work, with a lot of frustration due to frequent mistakes and the need to constantly adjust symbols, words, methods, etc. A good codebreaker simply has to be patient.

      Write your own ciphers. Of course, cryptograms are one thing, and polyalphabetic ciphers without code words are completely different, but you still need to write your own ciphers. It is through this activity that you will be able to understand the mindset of those who encrypt messages in one way or another. It’s like “a shield and a sword” - the sharper the sword, the more reliable the shield. Many decipherers themselves are not the last people in terms of composing ciphers. Study more and more complex methods, learn to decipher them - and you will reach the heights of mastery.

      Solve known and still unsolved ciphers. The FBI, for example, regularly gives the cryptography community food for thought by publishing various ciphers and inviting everyone to solve them. Solve them, submit your answers... perhaps you will soon change your job.

      Enjoy the complexity of the work and the atmosphere of the mystery! Decoding is like diving into a Dan Brown novel, but for real! Complexity, mystery, anticipation of discovery - all this is the mysterious and exciting world of ciphers.

    • In English, the letter “e” is used more often than any other.
    • If the cipher is printed, then there is a chance that it was printed in a special font - such as Windings. And this could be... double cipher!
    • Don't give up if the code hasn't been broken for a long time. This is fine.
    • The longer the cipher, the easier it is to crack.
    • One letter in the cipher does not necessarily correspond to one letter in the decrypted message. The opposite is also true.
    • A letter in a cipher almost never represents itself (“a” is not “a”).

For almost 500 years, people from different countries have been interested in the encrypted prophecies of Michel Nostradamus. Books by different authors on the decipherment of quatrains are published, but you will not find among them two identical decipherments of all quatrains.

This conclusion at one time surprised me, as one of the co-authors, and Viktor Georgievich Grozov, the author of future books on this topic. At the beginning, questions arose: who is to blame?, what to do?, where to start? Naturally, a thorough study of the French language suggested the answer.

Conclusion one


To accurately translate quatrains from Old French into modern Russian, it is not necessary to study French.

Conclusion two

Promotional video:

To decipher the quatrains, obviously, somewhere there must be codes, keys, some kind of scheme or auxiliary table for arranging all the quatrains in their original state in view of their deliberate, non-sequential arrangement in the centuries, judging by the events described in them.

Through lengthy inferences and mathematical calculations, Viktor Georgievich Grozov for the first time discovered a single encryption table of the sequence of quatrains encrypted in quatrains for any century of prophecies of M. Nostradamus. (Next - Table). The table presented in this article was discovered in July 1999. Quatrain No. 72, centuries 10 in this case, as a reason for reflection and personal opinion. Those who decipher quatrains one by one, counting each quatrain as a separate event (contrary to the obvious), do not need a table, because quatrains can be “successfully” deciphered for centuries, tying them to different historical events.

The table contributed to the decipherment of all quatrains from July 10, 1999 to May 20, 2004 through the titanic work of V.G. Grozov. and the help of co-authors. The following were involved: the Bible, the Koran, Vedic predictions of India, the history of Europe, Asia, Africa and America. Astronomy, Astrology, Mathematics and Physics. Prophecies of the prophets: Zarathustra, Daniel, Jesus Christ, John the Evangelist, Mohammed, Omar Khayyam and Nostradamus. Translations of prophecies of other prophets from foreign languages.

And Nostradamus created quatrains-prophecies after studying the prophecies of past prophets. Prophets from century to century pass on their encrypted knowledge to each other, each time clarifying it. During their lifetime, their teachings were not accepted by many. Their life was short and often under the threat of death. It was. Unfortunately, this will happen. In 2381, a new prophet will be born, a follower of Jesus Christ. There will be a pilgrimage of believers from different countries to him. After 9 years of imprisonment in an underground prison, his death will occur in April 2430. Century No. 2, quatrains No. 27,8,74 and 75. Century No. 3, quatrain No. 38 and others.

The table confirmed:

1. The events described in different quatrains, parts of one event, are deliberately arranged chaotically in centuries, but the serial numbers of all quatrains increase, which allows the use of the table. By selecting the numbers of quatrains along the horizontal line, in the table we obtain a chronological, semantic series (group) of quatrains for deciphering and describing predicted events including up to 20 quatrains.

For example, from the already deciphered quatrains, several sequences of events in the quatrains according to the table:


The beginning of the Second and similar World Wars: century No. 2, quatrains No. 41,76,10,30,42,77,11,31,43,78,12,32,44,79,13,45,80 and 14.

America's anger and irritation against the Peace Treaty between Russia and China: c. No. 5, room No. 70 and 4.

Beginning of the Fourth World War: c. No. 1, room No. 49,53,66 and 68.

Terrorist act. Attempt on the life of the Pope: c. No. 6, room No. 25,37,72,6,26,38 and 73.

Military march of Muslims from Africa through the states of Western Europe: c. No. 5, room No. 66,68,2,22,34,50,54, and 57.

For forty-two years France will be under the yoke of Islamic conquerors: c. No. 3, room No. 32,44,79,13,45,80,14,46,81,15,47 and 82.

Life in arks - anti-flood structures: c. No. 10, room No. 8,28,40,75,92,9 and 41.

Meeting of our cosmonauts with people on another planet: c. No. 9, room No. 65,69,71.5 and 25.

A written message from a past civilization addressed to our civilization was found: c. No. 8, room No. 29.

The sequence of quatrains according to the table is confirmed by the events described in more than 20 articles on the Internet.

2. Using the table, it became possible, using the first quatrain, in a group of quatrains, to determine the time of occurrence of the predicted events in years, often in months, sometimes in days of the month. Subsequent quatrains in groups describe the place and course of the event, special signs of past and future historical figures, their violent or natural death.

The beginning and end of peaceful or war periods of life in different countries and much more over the course of 9 thousand years. Of these, 1240 years before the Ice Age (Glacial Flood) of the past civilization, 7021 years of the present civilization, and 800 years of the new life following our civilization on planet Earth, after the next Great Flood. Over 9 thousand years, previously encrypted clear time cycles of repeating events have been discovered, which are so necessary in our time for long-term forecasting and prospects for self-preservation.

The upcoming Mixed World Flood is the most complex, insidious and tragic compared to past World Floods - Water and Glacial. A complex of long-term anti-flood underground structures, according to the Bible - the Ark, in which Noah was saved with his family and every creature in pairs, was built according to the Bible for 600 years. The people of the previous civilization built this complex with a great delay, that is, in 3197, if it was built in comparison with our civilization. 3797- 600=3197. Where 3797 is the beginning of the flood.

The construction of Noah's Ark began 1179 years later (3197-2018). Now it is clear why Noah alone barely escaped with his family and every creature in pairs. The rest of the people did not have time to build Arks for the mass salvation of people in 600 years. There were good reasons. Minerals were already running out at that time. Pre-Flood elements began to rage more often on the surface of the earth: hurricane winds, earthquakes, torrential rains, large hail, floods, a sharp change in temperature from heat to cold beyond 80 degrees Celsius, various curable and incurable diseases.

The prophets sacrificed their lives to convey this truth to the people of the 21st century, to make it known that if we start building the Arks at the beginning of the 21st century, then everyone will have the opportunity of salvation. Nostradamus has more than 60 quatrains about this, based on the experience of saving people of past civilizations, described in ancient books, which he burned, betrayed, as he wrote, to “Vulcan” because of the threat of death to him.

Vladimir Bocharov

A third of the world's population professes the Christian faith. But there are also a significant number of atheists. Many are looking for clear, rather than mythical, evidence of the existence of the Almighty. There are also many who consider the Book of Books to be just a collection of ancient legends and metaphors that have survived time. Is it really?

The Russian mathematician Ivan Nikolaevich Panin (1855-1942) is considered an outstanding expert in the field of Bible study, who devoted a lot of time to the mathematical analysis of the text of Scripture. Panin was born in Russia, but at the age of 19 he was expelled from the country for participating in revolutionary activities. He graduated from the mathematics department of the University of Berlin, then continued his studies at Harvard, becoming a Bachelor of Arts.

He was known as a convinced agnostic, but, having identified a certain mathematical (numerical) pattern in the text of the Holy Scriptures, he neglected his career and settled with his wife on a small Canadian farm, where for more than 50 years he worked every day to constantly improve his theory.

The essence of Ivan Panin’s discovery is that in the original text of the Bible, consisting of the Old Testament (Hebrew) and the New Testament (Greek), the number 7 is incomprehensibly encoded in every word and in every letter, just as it is encoded in our entire universe. It is one of the so-called prime numbers, meaning it is not divisible by any other integer except itself and one.

So, it turns out that this not at all simple prime number is a kind of brick of the universe, the basis of everything! Here we don’t even have to talk about well-known proverbs and sayings like “One with a fry, and seven with a spoon,” “Seven don’t wait for one,” or “Measure seven times, cut once.” Everything is much more precise, more complex and unshakable.

Let us recall, for example, that a lunar month is equal to 28 days (7 x 4), white sunlight consists of 7 colors, a musical octave consists of 7 full tones, and the pregnancy period for women lasts 280 days (7 x 40). We observe the same thing in animals and birds: in a mouse - 21 days (7 x 3), in hares and rats - 28 days (7 x 4), in a cat - 56 days (7 x 8), in a dog - 63 days (7 x 9), for a lion - 98 days (7 x 14), for a sheep - 147 days (7 x 21), for a chicken - 21 days (7 x 3), for a duck - 28 days (7 x 4) and etc.

And in general, experts know: a person usually remembers 7 concepts from the first reading. Even the fact that there were 7 wonders of the world, and the crow can perform simple arithmetic operations within the number 7, adds mysticism to this simple number. All these and other numerous facts point to the existence of a certain pattern that is extremely important for humans, and also to the fact that the key to revealing the secret of the Creator of the universe can be the simple number 7.

The activities of I. N. Panin aroused criticism, but he also has followers, such as Viktor Iosifovich Veinik and the American preacher Chuck Missler.

BIBLE CIPHERS

The first phrase of the Old Testament, “In the beginning God created the heavens and the earth,” has 7 Hebrew words consisting of 28 (7 x 4) letters, and the first 3 words, naming the subject and predicate, have 14 (7 x 2) letters, containing the same amount and the last 4 words (additions). The shortest word is located in the middle of the phrase, the number of letters in it and the word on the left is 7, the number of letters in the middle word and the word on the right is also 7.

In the New Testament, the first 17 verses of the first chapter (Gospel of Matthew) tell the story of the genealogy of Christ. Moreover, the first 11 verses cover the period before the migration to Babylon, they contain 49 (7 x 7) vocabulary units of the Greek language, the number of letters in them is 266 (7 x 38), of which 140 are vowels (7 x 20), and consonants are - 126 (7 x 18); the number of words starting with a vowel is 28 (7 x 4), and with a consonant - 21 (7 x 3); the number of nouns is 42 (7 x 6), non-nouns - 7; proper names - 35 (7 x 5), they occur 63 times (7 x 9), of which male names - 28 (7 x 4), female - 7, male names occur 56 times (7 x 8).

Similar numerical patterns are embedded in the remaining verses of the genealogy, as well as in the entire text of the Bible. Amazingly, this principle is not violated anywhere - everything is a multiple of the number 7!

In ancient times, Jews and Greeks expressed numbers using the letters of their alphabet. Incredibly, substituting these numbers in place of the corresponding letters of the biblical text leads to similar results! For example, if in the three main nouns of the first phrase of the Old Testament (God, heaven, earth) the letters are replaced by numbers, then the sum is equal to 777 (7 x 111), the Hebrew verb “created” has a total numerical value of 203 (7 x 29).

It may seem incredible, but these three sevens are framed by the equally magical word “Jesus”, which has a sum of 888, and the number of the beast, or Antichrist, equal to 666! It is obtained if the Greek word for “beast” is denoted by the letters of the Hebrew alphabet.

GOD'S DESIGN

Panin managed to identify chain-like numerical patterns that run through all of Scripture and connect its entire text together. The results of the study led to an unambiguous conclusion: the numerical features discovered in the structure of the original biblical text could not have arisen by chance, the probability of this is zero, i.e. all the discovered patterns are the result of someone’s design.

However, they are present only in the canonical Bible, which consists of 66 books - 39 books of the Old Testament and 27 books of the New Testament. But this plan is almost impossible to implement using arbitrary alphabetic, vocabulary and grammatical material.

And the most amazing thing is that if you add or remove from the Bible not only a book, but even one (!) word or one (!) letter, or change the order of words, then all the corresponding patterns and connections will be broken! The plan should have provided for the creation of appropriate alphabets and systems of the Hebrew and Greek languages, taking into account the mental, educational, stylistic, age and other individual characteristics of each executor of this plan.

But it is known that the Bible was written over 1,600 years with a break of 400 years before the New Testament, and it is absolutely clear that this could not have been done by the minds of the authors who wrote it, who lived in different eras, since under such conditions the complexity of solving this problem increases to infinity.

But if a person cannot do this, it turns out that in such a simple and infinitely difficult way, the Almighty protected His Scripture from all errors, changes, insertions and cuts. God's copyright, so to speak.

However, modern scientists have figured out some of the mysteries of antiquity!

Animals of Ancient Egypt

As we all remember from our history and geography courses (and from our colleagues’ vacation photographs), Egypt is located in the desert. The only living creatures there are lizards and gloomy people with equally gloomy camels. However, frescoes in tombs, stone carvings, the content of myths and other compelling evidence indicate that in Ancient Egypt everything was very good with the animal world. In the drawings alone, archaeologists counted 37 species of animals. Where is all this fauna now?

The reason turned out to be quite understandable. The desert gradually encroached on Egypt, and lions, wildebeest, zebras and jackals simply could not adapt to climate change and became extinct.

Cahokia, City of Mounds

About a thousand years ago, on the territory of North America, which is usually portrayed as a country of forests, prairies and wild Indians, there was a real metropolis - Cahokia. On an area of ​​15 square kilometers there were 109 mounds, on top of the highest of which there was a temple. The city was surrounded by a secure palisade. Its inhabitants, those same wild Indians, traded with the entire continent (as evidenced by arrowheads from all over North America found in Cahokia burials). Cahokia's population was 40 thousand, larger than London or any other European capital. And, by the way, the first city in the USA with the same population appeared in the 19th century.

Cahokia lasted until about the 13th century. By the time Columbus arrived in America, it was already abandoned and uninhabited. Scientists have put forward different versions of what led to the decline of the once great city. Among the guesses were: the disappearance of game in the forests (due to excessive hunting by townspeople), political squabbles and a natural disaster.

Those who came closest to the truth were the supporters of the latter version. In a study published in the journal Proceedings of the National Academy of Sciences, scientists Sam Muñoz and Aylward Williams provide evidence of an ancient flood that occurred around 1200 AD. This was probably the beginning of the city's decline. Computer modeling showed that the level of the Mississippi rose by 10-12 meters, this destroyed crops, which, in turn, led to famine and a decrease in population. Around 1400, the inhabitants abandoned their city and migrated to other parts of the continent.

Rock paintings in the caves of Cappadocia

Archaeologists working in the caves of Cappadocia in Turkey were surprised to find abstract images on the walls that resemble, if not a masterpiece of modern painting, then at least the patterns of an oriental carpet. In the 1960s, when the images were first discovered, scientists decided that this was the oldest map of the world, or, more precisely, a 9,000-year-old map of the area of ​​the Chatal settlement.

Recent research has shown that the mysterious picture represents documented evidence of a volcanic eruption: the black cells are houses, and the fuzzy objects nearby are lava flows from Mount Khasan, which in those years was an active volcano. After analyzing the igneous rocks, scientists concluded that the volcanic eruption occurred about 8,900 years ago.

Skull from Otranto

In 1480, the Apulian city of Otranto was captured by the Ottoman Turks. Most of the inhabitants were killed or taken into slavery, but 813 men between the ages of 15 and 50 were beheaded. According to legend, this happened because the vanquished refused to convert to Islam. In 1771, those executed were considered patron saints of the city, and in 2013, Pope Francis canonized them.

Their relics are displayed in the city cathedral. One of the skulls attracts attention: 16 holes are drilled in it. The priests did not allow scientists to take the remains for analysis, and the mystery of the skull remained a secret for a long time.

It was only in early 2015 that a study on the skull was published in the Journal of Ethnopharmacology. According to its authors, holes were drilled in the skull to obtain bone powder, which in the Middle Ages was considered an effective remedy for many diseases, and powder from the skull of a violently killed person was valued higher than that of someone who died a natural death, and powder from the skull of a saint was generally considered a panacea. It is assumed that the holes were drilled in the 18th century, when the skulls were placed in the cathedral.

Viking code

The cipher, called "jötunvellur", is found on messages in different parts of Scandinavia. Such tablets were widely distributed and exchanged like modern SMS messages, scientists say. Jötunvöllur remained a Chinese charter for a long time. The cipher was broken by the Norwegian scientist Jonas Norbdu when he came across a text duplicated in different types of writing, one of which turned out to be Jötunvöllur.

It turned out that the runes were written in numbers. The inscriptions on the deciphered tablets read: “Kiss me”, “Unravel if you can”, “The runes were written by the most skillful scribe west of the sea.” Norbdu suggests that the Vikings encoded these records simply for fun and to teach runic script.

Acre

Recently, the biggest archaeological mystery of Jerusalem was solved: after more than a century of searching, during excavations in a car park in Jerusalem, near the City of David, the ancient city of Acre was discovered, more precisely, the remains of a fortress wall. The enthusiasm of scientists was spurred by numerous references to Acre in historical documents. The fortress was built by the Syrian ruler Antiochus Epiphanes, who reigned around 146 BC. and carried out forced Hellenization of the population. For example, he turned the Temple of Jerusalem into a sanctuary of Zeus. This led to mass unrest among the Jews. The Acre fortress was built to pacify them.

During one of the uprisings, the fortress was destroyed, and only now scientists have managed to discover fragments of the fortifications, find weapons, ceramics and coins.

Ancient Roman concrete

For many years, scientists have been intrigued by the fact that the ancient Romans managed to invent concrete that was as strong as modern concrete. And now the secret is finally revealed.

Not far from Naples is the inactive volcano Campi Flegrei. Its last eruption occurred about 500 years ago. Nearby is the town of Pozzuoli, founded about 600 years ago. In 1982, due to underground processes, the soil underneath began to rise at a phenomenal rate. Residents of the city had to be evacuated. However, scientists became interested in the city. The Pozzuoli phenomenon is unique: with tectonic processes of such force, cracks and faults in the ground are inevitable. In Pozzuoli, nothing like this was observed. It turned out that due to the proximity of the volcano, a natural process similar to the production of concrete occurs at depth.

The ancient Romans used this same chemical reaction to create their famous concrete. The Roman philosopher Seneca, for example, noted that “the dust in Puteoli (the Latin name of the city) becomes stone if it touches water.” Pozzuoli's trade connections made it possible to trade this material (it was even called "pozzolan") throughout the Mediterranean Sea.

In the courtyard of the CIA building in Langley stands S-shaped copper plate with encrypted text. This is the most famous element of the sculpture "Kryptos", its authors are sculptor James Sanborn and Ed Scheidt, the retired head of the CIA cryptographic department. They came up with a code that is difficult to decipher, but quite possible. At least that's what they thought.


According to the authors, “Kryptos” personifies the process of collecting information. The Kryptos cipher is 869 characters, divided into four parts. The creators assumed that it would take about seven months to solve the first three parts, and about seven years to solve the entire problem. 23 years later, there is still no complete decryption. "Cryptos" is practiced by amateurs (there has been a group of about 1,500 people on Yahoo! since 2003) and professionals (from the CIA and NSA) - their task is complicated by intentional mistakes made by Sanborn and Scheidt (partly to confuse people, partly for aesthetic reasons).
It is believed that Sanborn is the only person on the planet who knows the answer to "Kryptos". The sculptor says that people, obsessed with the code he created, call and say terrible things: “They call me the devil’s servant, because I have a secret that I don’t share with anyone.” Sanborn says that if he dies, the answer will definitely go to someone else, but adds that he wouldn't be completely upset if the right decision remains a mystery forever.

Murderer, about whom nothing is still known, sent encrypted letters to California newspapers, promising that they would contain clues to his identity. The first message of the Zodiac (August 1969) consisted of three parts and 408 characters; an ordinary Californian couple deciphered it the fastest. The meaning of the letter was that killing people is much more interesting than killing animals, because man is the most dangerous creature on the planet. “I will go to heaven where those I killed will become my slaves,” the note read. This was the last successful attempt to decipher the Zodiac cryptogram. The contents of the postcard with a 340-character code, which arrived three months later at the San Francisco Chronicle, remains a mystery. “Can you print it on the first page? I feel terribly lonely when people don’t notice me,” the killer asked in the accompanying letter. It is this code that is depicted on the poster of David Fincher's film Zodiac.


A few days later, Zodiac sent another letter in which he encrypted his name - it also remained unsolved. Then there was a letter in which the killer threatened to blow up a school bus. He attached a map and a code to it - with their help it was allegedly possible to find a bomb that was planned to be used for a terrorist attack. No one could figure out this code either, but there was no explosion either. Attempts to unravel the Zodiac codes continue. In 2011, amateur cryptographer Corey Starliper said he deciphered a 340-character message and found in it a confession from Arthur Lee Allen, once the prime suspect in the Zodiac case, but released due to lack of evidence. Many newspapers wrote about Starliper, but it quickly became clear that his method did not stand up to criticism.

Phaistos disc. It is believed that the hieroglyphic inscriptions on the Phaistos Disc presumably belong to the Minoan civilization that lived on the island of Crete. A clay disk with hieroglyphs written on both sides in the form of a spiral was discovered in 1908. Experts have determined that there are 45 different hieroglyphs on the disk, and some of them are similar to signs used in the early palace period.

18th century shepherd's monument in Staffordshire, England. It contains a strange sequence of letters DOUOSVAVVM - a code that has not been deciphered for more than 250 years. The author of this cipher is unknown, some believe that this code may be a clue left by the Knights Templar as to the location of the Holy Grail. Many of the greatest minds have tried to decipher this code and failed, including Charles Dickens and Charles Darwin.

Linear writing. Also found in Crete and named after British archaeologist Arthur Evans. In 1952, Michael Ventris deciphered Linear B, which was used to encrypt Mycenaean, the oldest known variant of Greek. But Linear A has only been partially solved, and the solved fragments are written in some language unknown to science, not related to any known language.


In 1933, General Wang of Shanghai, China, was issued seven gold bars. The bars were engraved with designs, inscriptions in Chinese and cryptograms, partly in Latin letters. Presumably these are certificates issued by an American bank. The inscriptions in Chinese speak of a deal worth more than US$300 million.

John F. Byrne invented the Chaocipher encryption method in 1918. Byrne considered it very simple, but still difficult to decipher, and for 40 years he tried unsuccessfully to interest the American government in his invention. He even offered a reward to anyone who could solve his code, but no one ever applied for the reward. Only last year, his family handed over all the papers regarding the cipher to the museum, and specialists managed to figure out his method.

Signal "Wow!"- a strong narrow-band cosmic radio signal recorded by Dr. Jerry Eyman on August 15, 1977 while working on the Big Ear radio telescope at Ohio State University. Under this name, the Signal was captured in the history of the “Program for the Search for Extraterrestrial Civilizations”, as still undeciphered.

British mathematicians participated in the underwater battles of World War II in their own way. Halfway between Oxford and Cambridge, in the town of Milton Keynes, at the height of the war, a kind of institute was set up where Alan Turing and other famous scientists worked on breaking the code that Germany used to communicate with submarines. German code breakers used a device similar to a typewriter with two keyboards: one regular, the other with light bulbs. When the radio operator hit the key with her finger, the light flashed under some other letter. This letter should have been added to the encrypted version of the message. Without a single sample of Enigma at hand, Turing was able to understand the principle of the machine’s operation and build his decoder based on logical reasoning alone. British historian Hinsley even stated that the breakthrough in cryptanalysis brought the end of World War II closer by two, if not four years. The exceptional role that breaking the Enigma code played in the victory over the Nazis was also cited by Queen Elizabeth II of Great Britain when she posthumously pardoned the mathematician several months ago. In 1952, Turing was sentenced to chemical castration for homosexuality, after which the scientist committed suicide.

Jotunvillur. There are only a few thousand runic inscriptions: orders of magnitude fewer texts than classical antiquity left behind. And then we are usually talking about short fragmentary phrases on tablets or on stones. Jonas Nordby, a graduate student in linguistics at the University of Oslo, focused on 80 encrypted ones: if you try to read them as is, it will come out nonsense. Nine, as it turned out, use a fairly simple algorithm, by the standards of modern cryptography - the author of the study calls it Jotunvillur: the rune is replaced by one whose name (“rune name”) ends with the desired letter. Why be so secretive is understandable in some cases. One of the inscriptions on the tablets read by Nordby reads “Kiss me.” Given that both the recipient and the sender of the message had to at least be able to read, then both were probably men.

During World War II, the British Army often used pigeons to transmit encrypted messages. In 2012, a resident of Surrey (southern England) found the remains of a bird in the chimney of his house, with a container with a message attached to its leg. The text was intended for a certain XO2 and was signed “W Stot Sjt”. After studying the message, experts from the British Government Communications Center came to the conclusion that without access to the code books used to create the cipher, it is almost impossible to find the correct solution. “Messages like this were designed to be read only by the sender and the recipient. Unless we know something about who wrote the letter or who it was intended for, we will not be able to decipher it,” said an anonymous GCC worker in an interview with the BBC.

On December 1, 1948, a man's body was found on Somerton Beach in Adelaide.. There were no signs of violence on the body; all that was on him were cigarettes, a box of matches, a pack of chewing gum, a comb, a bus ticket and a train ticket. The pathologist who performed the autopsy was unable to determine the exact cause of his death, but suggested that the victim was most likely poisoned with a poison, traces of which disappear from the body within a few hours. A month and a half later, police found a suitcase at Adelaide train station that apparently belonged to the murdered man. Inside were various tools and clothes with tags torn off - including trousers with a secret pocket in which they found a piece of paper torn from a book with the inscription “Tamam Shud”. The required book turned out to be an extremely rare edition of a collection of poetry by Omar Khayyam. On the last page there was a code written in pencil that has not been solved for more than 60 years. In 1978, the Australian Department of Defense issued a statement: it could be a code, it could be a meaningless set of characters, it’s impossible to say for sure. Since 2009, attempts to decipher the cryptogram have been underway at the University of Adelaide. Researchers have come to the conclusion that this is indeed some kind of cipher, but there is still no solution to either the cipher or the Taman Shud case itself, one of the most famous mysteries in the history of Australia.

In the first edition of the book Codes and Ciphers English cartographer and cryptographer of Russian origin Alexander D'Agapeev published a code that still remains unsolved. After the book was published, the author admitted that he had forgotten the correct answer. There was no cryptogram in subsequent editions of Codes and Ciphers. It has been proven that the D’Agapeev cipher is indeed based on a certain system (that is, it is not just a random set of symbols), but it turned out to be too complicated. In the early 1950s, The Cryptogram magazine announced a reward for deciphering the code, but the correct answer was still not found.

On July 14, 1897, the famous English composer Edward Elgar sent a note to Dorabella- that’s what he called his friend Dora Penny. "Miss Penny," it said on one side of the card. The other had a three-line cipher of 87 characters. Dora was unable to decipher the message, and it sat in her desk drawer for 40 years before it was reprinted in Penny's book of Elgar memoirs. Deciphering the composer's letter, some tried to make do with the simplest method of replacing symbols with letters, others came to the conclusion that it was not the words that were hidden here, but the melody. Some received messages in which absolutely nothing was clear, while others received extremely lyrical texts, full of dreaminess and love. There is still no final decision; The decoding competition held in 2007 in honor of Elgar’s 150th anniversary also ended in nothing.

Georgia Tablets- a large granite monument in Elbert County in Georgia, USA. The monument contains a long inscription in 8 modern languages, and at the top of the monument there is a shorter inscription in 4 ancient languages: Akkadian, classical Greek, Sanskrit and ancient Egyptian. The monument contains no encrypted messages, but its purpose and origin remain a mystery. It was erected by a man whose identity has never been established.

Voynich manuscript, which is often called the most mysterious book in the world. The manuscript uses a unique alphabet, has about 250 pages and includes drawings depicting unknown flowers, naked nymphs and astrological symbols. It first appeared at the end of the 16th century, when Holy Roman Emperor Rudolf II bought it in Prague from an unknown merchant for 600 ducats (about 3.5 kg of gold, today more than 50 thousand dollars). From Rudolph II the book passed to nobles and scientists, and at the end of the 17th century it disappeared. The manuscript reappeared around 1912, when it was purchased by the American bookseller Wilfrid Voynich. After his death, the manuscript was donated to Yale University. British scientist Gordon Wragg believes that the book is a clever hoax.


The text contains features that are not characteristic of any language. On the other hand, some features, such as the length of words and the way letters and syllables are connected, are similar to those existing in real languages. “Many people think that this is all too complicated to be a hoax, and it would take some mad alchemist years to build such a system,” says Rugg. However, Rugg shows that such complexity could be achieved easily by using a encryption device invented around 1550 called Cardan's reticle. In this symbol table, words are created by moving a card with holes cut in it. The spaces left in the table result in words of different lengths. By superimposing such lattices on the manuscript's syllable table, Rugg created a language that shares many, if not all, of the features of the manuscript's language. According to him, it would take three months to create the entire book.

Inspired by the Voynich manuscript, in 1981, the Italian designer and architect Luigi Serafini published his album, designed in the same style: 360 pages of text in an unknown language and miniatures in the spirit of a medieval natural science treatise. Only if a historical manuscript can be suspected of describing some real flora and fauna, then in Serafini horses smoothly turn into caterpillars, and a young man and girl having sex on the storyboard turn into a crocodile.


In all interviews, Serafini claims that the text is meaningless, and there is no need to look for logic in the sequence of miniatures - which, of course, only fuels interest in the book among cryptology enthusiasts.

Rongo-rongo, kohau rongorongo- wooden tablets with letters from the inhabitants of Easter Island. It is currently unclear whether each symbol represents a separate word or syllable. All rongo-rongos are made from toromiro wood. Today, only about 25 “tablets” have survived in museums around the world. Traditionally, they are numbered with letters of the Latin alphabet, which, however, is not the only way to designate the “tables”, among which there is one staff, two inscriptions on the chest decoration of the reimiro, as well as an inscription on the snuff box and on the figure of tangata manu. The hieroglyphs are partly symbolic, partly geometric, in total about eight hundred different characters (according to Bartel's catalogue).

Bale cryptograms- 3 encrypted messages containing information about the location of a treasure of gold, silver and precious stones, allegedly buried in Virginia near Lynchburg by a party of gold miners led by Thomas Jefferson Bale. The price of the unfound treasure in modern terms should be about 30 million dollars.


Telegraf