Tuesday, October 23, 2018

Data 38 - Cryptology and Book of the Dead




▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄

Below,    
explains  key word concepts --> 

 Cryptology and Book of the Dead 







A Grave Interest: Mausoleums, 

Crypts and their Cryptology sentences,

 and Tombs (Oh My!)

agraveinterest.blogspot.com/2011/08/mausoleums-crypts-and-tombs-oh-my.html
    Aug 26, 2011 - A lawn crypt, also known as an underground mausoleum, consists of pre-installed vaults that allow for single or double depth (stacked) burial in a cemetery lawn space. A lawn crypt may be made up of several double depth vaults laid horizontally to allow for family members to be buried togeth




    What is cryptology? - Definition from WhatIs.com - SearchSecurity

    searchsecurity.techtarget.com › Encryption technology › Network security
      Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis. Since the cryptanalysis concepts are highly specialized and complex, we concentrate here only on some of the key mathematical concepts behind   cryptography.

      Cryptography - Wikipedia

      https://en.wikipedia.org/wiki/Cryptography
        Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

        Cracking the Code —
        Central Intelligence Agency
          BRAIN DEAD study the parallel BOOK of the DEAD ...... via CIA   intellectual superiority and
         their  thought alignment processes

        https://www.cia.gov/news-information/featured-story.../cracking-the-code.html
          Aug 31, 2007 - How do you keep a secret? One way is esczfrs ncjaezrclasj.* If you understood that, you already may know a little about cryptography. For more than 3,000 years, people have encrypted messages to keep their communications secret. And encryption is still used today, though it's much more sophisticated ...




          Break the Code of bull-shit — Central Intelligence Agency

          https://www.cia.gov/kids-page/games/break-the-code
            Mar 6, 2007 - Codes have been used throughout history whenever people wanted to keep messages private. In American history, George Washington sent coded messages to his agents, and the Culper Spy ring used codes to communicate with each other. Members of the Continental Congress also encoded their ...













            End  explanation 
            ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄

            No comments:

            Post a Comment