Feeds

Mysterious crypto-book dated to 15th century

Real life Da Vinci codex features nude ladies, too

High performance access to file storage

Crazy illo of nudie hairband ladies splashing about in green jelly

Other theories on the puzzling manuscript abound: some suggest that Voynich created it himself and concocted the Bacon notion to boost its value – this has now been shown to be untrue as well. Others have suggested that the book was penned by various prominent alchemists, astrologers, physicians or other savants of various periods from the medieval to the 17th century – possibly as an encoded work (this was a common practice at times) or as a hoax or sting of some sort.

An illustration from the 'Voynich manuscript'

What the bloody hell's supposed to be going on here?

Since the 1912 re-discovery, various capable cryptographers have tried to decipher the script used in the book, but all have failed. This has led to speculation that the writing is all or mostly gibberish: that any information present is concealed using steganography rather than cryptography, and that any real messages are buried amid irrelevant padding.

The prospect also exists that even if the script does actually have meaning, that the information encoded is nothing more than alchemical or astrological mumbo-jumbo: methods for transmuting base matter into gold or predicting the future from star charts, or bogus sympathetic-medicine homeopathy cures and such like. Much of the accepted body of scientific knowledge in the early 15th century consisted of such stuff.

Still, as the Arizona uni spokespersons note, "this tome makes the Da Vinci Code look downright lacklustre" – and at least it is now confirmed as being very old.

If any of our crypto or stegano enthusiast readers fancy having a go, detailed imagery of the manuscript is available here. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.