Feeds

Mysterious crypto-book dated to 15th century

Real life Da Vinci codex features nude ladies, too

Protecting against web application threats using SSL

A mysterious book written in a language or code that no cryptographer has ever managed to crack has been verified as being written in the early 15th century, which has upset some of the theories on its origin.

Text from the 'Voynich manuscript'

People were making up garble-languages well before J R R Tolkien came along

The "Voynich manuscript" was found in 1912 at the Villa Mondragone, a one-time papal palace complex near Rome which was at the time being used as a scientific college by the Jesuit order of the Catholic church – formerly famous for their deviousness and secrecy. Book dealer Wilfrid Voynich found the tome among a chestful of volumes offered for sale by the Jesuits.

The book is full of bizarre illustrations and contains writing in an unknown and so far undecipherable script. The pictures appear to depict such things as unidentifiable plants, astronomical and astrological objects (suns, moons, stars, signs of the zodiac), curious cosmological diagrams and so forth. There is a section which mainly shows naked women in pools or bathtubs interlinked by elaborate networks of pipework, some parts of which resemble human organs.

Voynich, who died in 1930, theorised that the book had been written by the famous 13th-century friar and polymath Roger Bacon, a sort of early Leonardo da Vinci figure often credited with the introduction of gunpowder to much of Europe and conceptual invention of flying machines, steam engines etc.

This theory at least has now been conclusively disproven, as boffins at the University of Arizona have used radiocarbon dating to discover that the book was produced at some point between 1404 and 1438 – well after Bacon's time. The dating was done last year, but Arizona uni has announced the new information publicly this week to coincide with a National Geographic Channel doco.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Bacon-related medical breakthrough wins Ig Nobel prize
Is there ANYTHING cured pork can't do?
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.