| 
    "Project Censored" Project Censored was launched at Sonoma State University (U.S.) in 1976 as an annual review of the systematic withholding of public access to important news facts by the mainstream media. The team composed of student media researcher and media analysts annually selects and publishes what they believe are the 25 most important under-covered news stories. "The essential issue raised by the project is the failure of the mass media to provide the people with all the information they need to make informed decisions concerning their own lives and in the voting booth". (Project Censored)  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||
| 
    Introduction "A man is crazy who writes a secrete in any other way than one which will conceal it from the vulgar." Roger Bacon (~1250 AD) The essence of human communication is not only the social behavior to give or get messages (of whatever meaning) but also how to give and get them, and to include certain people by excluding others from the process of informing. e.g. whispering is an effective way of talking to exclude the majority. What about ways of writing? Already some of the first written messages in human history obviously found special forms of hiding contents from the so-called others. When the knowledge of writing meant a privilege in a stronger sense as it is true today (in China for a long period writing was forbidden to people not working for the government), the alphabet itself was a kind of cryptography (that is why Catholic churches were painted with pictures explaining the stories of the Bible). Certainly the methods of deciphering and enciphering improved a lot during the last 4.000 years. In the meantime cryptography has become a topic without end and with less technological limits every day. On the one hand there is the field of biometrics, which is highly related to cryptography but still in its beginnings, on the other hand there emerge so-called infowars, which intend to substitute or at least accompany war and are unthinkable without cryptography. But there is much more to detect, like the different forms of de- and encoding. And very important, too, there is the history of cryptography that tells us about the basics to make it easier to understand today's issues. In the actual age of (dis-)information storing and transporting electronic information safely increases its importance. Governments, institutions, economy and individuals rely on the hope that no-one can read or falsify their messages/data as it is much more difficult to detect and proof abuses in electronic media than in elder forms of written communication.  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||
| 
              Hieroglyphs Hieroglyphs are pictures, used for writing in ancient Egypt. First of all those pictures were used for the names of kings, later more and more signs were added, until a number of 750 pictures  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||
| 
              atbash Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing. for further explanations see:  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||
| 
              Aeneas Tacticus Supposedly his real name was Aeneas of Stymphalus. He was a Greek military scientist and cryptographer. He invented an optical system for communication similar to a telegraph: the  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||
| 
              Polybius Polybius was one of the greatest historians of the ancient Greek. he lived from 200-118 BC. see:  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||
              Polybius Checkerboard
 It is a system, where letters get converted into numeric characters. The numbers were not written down and sent but signaled with torches. for example: A=1-1 B=1-2 C=1-3 W=5-2 for more information see:  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||
| 
              World Wide Web (WWW) Probably the most significant Internet service, the World Wide Web is not the essence of the Internet, but a subset of it. It is constituted by documents that are linked together in a way you can switch from one document to another by simply clicking on the link connecting these documents. This is made possible by the Hypertext Mark-up Language (HTML), the authoring language used in creating World Wide Web-based documents. These so-called hypertexts can combine text documents, graphics, videos, sounds, and Especially on the World Wide Web, documents are often retrieved by entering keywords into so-called search engines, sets of programs that fetch documents from as many Among other things that is the reason why the World Wide Web is not simply a very huge database, as is sometimes said, because it lacks consistency. There is virtually almost infinite storage capacity on the Internet, that is true, a capacity, which might become an almost everlasting too, a prospect, which is sometimes According to the Internet domain survey of the  | |||||||||||||||||||||||||||||||||||||
| 
     | |||||||||||||||||||||||||||||||||||||