Feeds

Mysterious crypto-book dated to 15th century

Real life Da Vinci codex features nude ladies, too

5 things you didn’t know about cloud backup

Crazy illo of nudie hairband ladies splashing about in green jelly

Other theories on the puzzling manuscript abound: some suggest that Voynich created it himself and concocted the Bacon notion to boost its value – this has now been shown to be untrue as well. Others have suggested that the book was penned by various prominent alchemists, astrologers, physicians or other savants of various periods from the medieval to the 17th century – possibly as an encoded work (this was a common practice at times) or as a hoax or sting of some sort.

An illustration from the 'Voynich manuscript'

What the bloody hell's supposed to be going on here?

Since the 1912 re-discovery, various capable cryptographers have tried to decipher the script used in the book, but all have failed. This has led to speculation that the writing is all or mostly gibberish: that any information present is concealed using steganography rather than cryptography, and that any real messages are buried amid irrelevant padding.

The prospect also exists that even if the script does actually have meaning, that the information encoded is nothing more than alchemical or astrological mumbo-jumbo: methods for transmuting base matter into gold or predicting the future from star charts, or bogus sympathetic-medicine homeopathy cures and such like. Much of the accepted body of scientific knowledge in the early 15th century consisted of such stuff.

Still, as the Arizona uni spokespersons note, "this tome makes the Da Vinci Code look downright lacklustre" – and at least it is now confirmed as being very old.

If any of our crypto or stegano enthusiast readers fancy having a go, detailed imagery of the manuscript is available here. ®

Build a business case: developing custom apps

More from The Register

next story
Vulture 2 takes a battering in 100km/h test run
Still in one piece, but we're going to need MORE POWER
Boffins ID freakish spine-smothered prehistoric critter: The CLAW gave it away
Bizarre-looking creature actually related to velvet worms
TRIANGULAR orbits will help Rosetta to get up close with Comet 67P
Probe will be just 10km from Space Duck in October
ANU boffins demo 'tractor beam' in water
The current state of the art, apparently
China to test recoverable moon orbiter
I'll have some rocks and a moon cheese pizza please, home delivery
What does a flashmob of 1,024 robots look like? Just like this
Sorry, Harvard, did you say kilobots or KILLER BOTS?
NASA's rock'n'roll shock: ROLLING STONE FOUND ON MARS
No sign of Ziggy Stardust and his band
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Vulture 2 spaceplane autopilot brain surgery a total success
LOHAN slips into some sexy bespoke mission parameters
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.