cryptanalysis and language deciphering: a 'brute force attack' … · 2020-06-18 ·...

37
Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System Loh Jia Sheng Colin Dr Perono Cacciafoco, Francesco Loh Jia Sheng ColinDr Perono Cacciafoco, Francesco Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System 1 / 24

Upload: others

Post on 14-Aug-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Cryptanalysis and Language Deciphering: A’Brute Force Attack’ on an Undeciphered Writing

System

Loh Jia Sheng ColinDr Perono Cacciafoco, Francesco

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System1 / 24

Page 2: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Content Outline

Background on Linear A as an Ancient Writing System

Python as a powerful programming language

Overview of the Linear A decipherment Python program

Visual representation of how the Python program works

References and acknowledgement

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System2 / 24

Page 3: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Introduction

Linear A

Linear A is one of the writing systems of the Ancient Aegean Minoancivilization of Crete, dating back to the Bronze Age. Despite many pastattempts by scholars, glyph-breakers and linguists, Linear A continues toremain undeciphered due to its elusive underlying language

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System3 / 24

Page 4: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Linear A

Background

Linear A has around 90 signs/ symbols in regular use, where a largemajority of them are considered distinct when compared to Linear B.

Source

Linear A symbols and inscriptions are found on a variety of artefactswhich includes roundels, tablets and seals that indicate economictransactions.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System4 / 24

Page 5: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Linear A

Background

Linear A has around 90 signs/ symbols in regular use, where a largemajority of them are considered distinct when compared to Linear B.

Source

Linear A symbols and inscriptions are found on a variety of artefactswhich includes roundels, tablets and seals that indicate economictransactions.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System4 / 24

Page 6: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Linear A tablets

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System5 / 24

Page 7: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Linear B syllabary

Figure: Linear B syllabary, deciphered by Michael Ventris in 1952

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System6 / 24

Page 8: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Linear A

Attempts to decipher Linear A

Many attempted to decipher Linear A by assigning Linear B phoneticvalues to Linear A signs that appear graphically similar.

Flaws in past decipherments

Linear B encodes Mycenaean Greek whereas Linear A encodes AegeanMinoan. There is a disproportionate time difference between the use ofeach writing system.Furthermore, close to 80% of Linear A symbols areunique to that of Linear B.

Recent studies

Recent studies on the decipherment on Linear A has proposed that LinearA could have relations with other languages such as Luwian and variouslanguage families such as the Semitic language family, Indo-Europeanlanguage family and even the Afro-Asiatic language family.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System7 / 24

Page 9: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Linear A

Attempts to decipher Linear A

Many attempted to decipher Linear A by assigning Linear B phoneticvalues to Linear A signs that appear graphically similar.

Flaws in past decipherments

Linear B encodes Mycenaean Greek whereas Linear A encodes AegeanMinoan. There is a disproportionate time difference between the use ofeach writing system.Furthermore, close to 80% of Linear A symbols areunique to that of Linear B.

Recent studies

Recent studies on the decipherment on Linear A has proposed that LinearA could have relations with other languages such as Luwian and variouslanguage families such as the Semitic language family, Indo-Europeanlanguage family and even the Afro-Asiatic language family.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System7 / 24

Page 10: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Linear A

Attempts to decipher Linear A

Many attempted to decipher Linear A by assigning Linear B phoneticvalues to Linear A signs that appear graphically similar.

Flaws in past decipherments

Linear B encodes Mycenaean Greek whereas Linear A encodes AegeanMinoan. There is a disproportionate time difference between the use ofeach writing system.Furthermore, close to 80% of Linear A symbols areunique to that of Linear B.

Recent studies

Recent studies on the decipherment on Linear A has proposed that LinearA could have relations with other languages such as Luwian and variouslanguage families such as the Semitic language family, Indo-Europeanlanguage family and even the Afro-Asiatic language family.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System7 / 24

Page 11: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Aim

Programming

With the computational power of programming, we aim to develop asoftware that is able to isolate significant clusters of Linear A symbolswhile attempt to reconstruct the Minoan phonetics.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System8 / 24

Page 12: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Python

Python is one of the mostpopular programminglanguage.

Python can serve ascross-compliers to otherprogramming languagessuch as Javascript, whilehaving variousimplementations.

Data analytics using Pythonmodule ’pandas’

Creation of computergraphical user interface(GUI) using Python module’PyQt’

Web application designusing Python module ’Flask’

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System9 / 24

Page 13: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Python

Python is one of the mostpopular programminglanguage.

Python can serve ascross-compliers to otherprogramming languagessuch as Javascript, whilehaving variousimplementations.

Data analytics using Pythonmodule ’pandas’

Creation of computergraphical user interface(GUI) using Python module’PyQt’

Web application designusing Python module ’Flask’

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System9 / 24

Page 14: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Python Program

Python modules

Our research team has adopted ’pandas’ and ’PyQt’ to be the two mainPython modules used for our Python program.

Python program

To start off, the Python program can be segmented into ’SpecificDecipherment’ and ’General Decipherment’.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System10 / 24

Page 15: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Specific Decipherment - Overview

Overview

Incorporate the comparison of numerous language dictionaries with ourLinear A master list, comprised of GORILA 1 - 5.

Basis of Comparison

Basis of comparison would be identical matches between Linear A words,and the words in the dictionaries, after having the vowels removed.

Results

Results will be displayed in a clear table format with four columns.

’Identical Matches’ - Strings with a one-to-one character match

’Linear A word’ - Original Linear A word, without any modifications.

’Source’ - Tablet source which the original Linear A word can befound.

’Dictionary Word’ - the original word from the dictionary of interest.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System11 / 24

Page 16: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Specific Decipherment - Overview

Overview

Incorporate the comparison of numerous language dictionaries with ourLinear A master list, comprised of GORILA 1 - 5.

Basis of Comparison

Basis of comparison would be identical matches between Linear A words,and the words in the dictionaries, after having the vowels removed.

Results

Results will be displayed in a clear table format with four columns.

’Identical Matches’ - Strings with a one-to-one character match

’Linear A word’ - Original Linear A word, without any modifications.

’Source’ - Tablet source which the original Linear A word can befound.

’Dictionary Word’ - the original word from the dictionary of interest.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System11 / 24

Page 17: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Specific Decipherment - Overview

Overview

Incorporate the comparison of numerous language dictionaries with ourLinear A master list, comprised of GORILA 1 - 5.

Basis of Comparison

Basis of comparison would be identical matches between Linear A words,and the words in the dictionaries, after having the vowels removed.

Results

Results will be displayed in a clear table format with four columns.

’Identical Matches’ - Strings with a one-to-one character match

’Linear A word’ - Original Linear A word, without any modifications.

’Source’ - Tablet source which the original Linear A word can befound.

’Dictionary Word’ - the original word from the dictionary of interest.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System11 / 24

Page 18: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Specific Decipherment - Visual

Specific Decipherment Front Page

Specific Decipherment Results Page

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System12 / 24

Page 19: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Specific Decipherment - Triplets Analysis

Analysis

Analysis of the ’triplets’ present in Linear A words is also included. Forsymbols in Linear A that do not appear graphically similar to any of thesymbols present in the Linear B syllabary, these symbols would berepresented as numbers in the form of a ’triplet’.

Overview

A ’triplet’ is able to take on any possible character ranging from A-Z.

Comparison with the words in the other dictionaries is conducted.

Frequency of which a character replacing the ’triplet’ would haveidentical matches is further analysed.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System13 / 24

Page 20: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Specific Decipherment - Triplets Analysis

Analysis

Analysis of the ’triplets’ present in Linear A words is also included. Forsymbols in Linear A that do not appear graphically similar to any of thesymbols present in the Linear B syllabary, these symbols would berepresented as numbers in the form of a ’triplet’.

Overview

A ’triplet’ is able to take on any possible character ranging from A-Z.

Comparison with the words in the other dictionaries is conducted.

Frequency of which a character replacing the ’triplet’ would haveidentical matches is further analysed.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System13 / 24

Page 21: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Specific Decipherment - Visual 2

Figure: ’Triplets’ Analysis

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System14 / 24

Page 22: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment

Overview

Users are able to input any spreadsheet files available in their computerinto the program.

Results

With the same basis of comparison, the program would churn out theresults of comparison in the same table format, comprised of fourcolumns: ’Identical matches’, ’Linear A word’ ,’Source’, ’ File Word’.

Results - Extension

Downloading of the results is made available locally in their computers,where the results are stored in a CSV file.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System15 / 24

Page 23: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment

Overview

Users are able to input any spreadsheet files available in their computerinto the program.

Results

With the same basis of comparison, the program would churn out theresults of comparison in the same table format, comprised of fourcolumns: ’Identical matches’, ’Linear A word’ ,’Source’, ’ File Word’.

Results - Extension

Downloading of the results is made available locally in their computers,where the results are stored in a CSV file.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System15 / 24

Page 24: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment

Overview

Users are able to input any spreadsheet files available in their computerinto the program.

Results

With the same basis of comparison, the program would churn out theresults of comparison in the same table format, comprised of fourcolumns: ’Identical matches’, ’Linear A word’ ,’Source’, ’ File Word’.

Results - Extension

Downloading of the results is made available locally in their computers,where the results are stored in a CSV file.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System15 / 24

Page 25: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment Visual

Figure: Requirements for Upload file

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System16 / 24

Page 26: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment Visual

General Decipherment BeforeUpload General Decipherment After

Upload

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System17 / 24

Page 27: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment 2

Overview

General Decipherment 2 is a function developed to allow user to makedynamic changes in their comparisons. Through this function, users areable to make comparisons based on their two files of choice, namely”Base Sheet” and ”Comparison Sheet”.

Results

Similar to the earlier function, this function would output the results in atable format comprised of four columns, and users are able to downloadthe results in a CSV file.

Addition Benefit

This allow users to have higher degree of freedom and enables moreefficient research work as changes to both their ”Comparison Sheet” andmaster list dynamically.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System18 / 24

Page 28: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment 2

Overview

General Decipherment 2 is a function developed to allow user to makedynamic changes in their comparisons. Through this function, users areable to make comparisons based on their two files of choice, namely”Base Sheet” and ”Comparison Sheet”.

Results

Similar to the earlier function, this function would output the results in atable format comprised of four columns, and users are able to downloadthe results in a CSV file.

Addition Benefit

This allow users to have higher degree of freedom and enables moreefficient research work as changes to both their ”Comparison Sheet” andmaster list dynamically.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System18 / 24

Page 29: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment 2

Overview

General Decipherment 2 is a function developed to allow user to makedynamic changes in their comparisons. Through this function, users areable to make comparisons based on their two files of choice, namely”Base Sheet” and ”Comparison Sheet”.

Results

Similar to the earlier function, this function would output the results in atable format comprised of four columns, and users are able to downloadthe results in a CSV file.

Addition Benefit

This allow users to have higher degree of freedom and enables moreefficient research work as changes to both their ”Comparison Sheet” andmaster list dynamically.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System18 / 24

Page 30: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment 2 Visual

Requirements for the Base Sheet Requirements for the SecondSheet

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System19 / 24

Page 31: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

General Decipherment 2 Visual

General Decipherment 2 BeforeUploads

General Decipherment 2 AfterUploads

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System20 / 24

Page 32: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Desktop Icon

Figure: Desktop Icon

Ergonomics

The program has been designed to be an executable GUI file in thecomputer using the ’PyQt’ module.

Benefits

Users of the program need not have Python installed in their computers,instead they can use the shortcut created and have direct access to theprogram.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System21 / 24

Page 33: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Desktop Icon

Figure: Desktop Icon

Ergonomics

The program has been designed to be an executable GUI file in thecomputer using the ’PyQt’ module.

Benefits

Users of the program need not have Python installed in their computers,instead they can use the shortcut created and have direct access to theprogram.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System21 / 24

Page 34: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Conclusion

Conclusion

An indiscriminate comparisons of the words of choice and the Linear Amaster list provides a large-scale ’brute-force-attack’ on the currentLinear A corpus.

Benefits

Decipherment of Linear A would now involve a more rigorous statisticalapproach, as we look to isolate and analyze clusters of Linear A words, inattempt to have better understanding of the Linear A symbols and signs.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System22 / 24

Page 35: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Conclusion

Conclusion

An indiscriminate comparisons of the words of choice and the Linear Amaster list provides a large-scale ’brute-force-attack’ on the currentLinear A corpus.

Benefits

Decipherment of Linear A would now involve a more rigorous statisticalapproach, as we look to isolate and analyze clusters of Linear A words, inattempt to have better understanding of the Linear A symbols and signs.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System22 / 24

Page 36: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

References and Acknowledgement

Coding to Decipher Linear APerono Cacciafoco, Francesco; DuoDuo, Xu; Niki Cassandra Min, Eu

Minoan Linguistic Resources: The Linear A Digital CorpusPetrolito, Tommaso et al

https://linearbknossosmycenae.com/

https://omniglot.com/writing/linearb.htmSimon Ager

Evidence for the Minoan LanguageC.H.Gordon

Some preliminary remarks on the decipherment of Linear AJ. G. P. Best

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System23 / 24

Page 37: Cryptanalysis and Language Deciphering: A 'Brute Force Attack' … · 2020-06-18 · Cryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing

Acknowledgement

Acknowledgement

We wish to acknowledge the funding support for this project fromNanyang Technological University under the Undergraduate ResearchExperience on CAmpus (URECA) programme.

Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A ’Brute Force Attack’ on an Undeciphered Writing System24 / 24