953 research outputs found
Another Polyphonic Cipher
A polyphonic substitution cipher is one in which several different plaintext letters are enciphered into a single cipher letter or symbol. Perhaps the most simple and well-known example of a polyphonic cipher is the telephone dial, in which the letters ABC are encoded by the number 2, DEF by 3, GHI by 4, JKL by 5, MNO by 6, PRS by 7, TUV by 8, and WXY by 9. Polyphonic ciphers have tended to be shunned by cryptologists because of the inevitable ambiguity encountered in recovering a message. However, if one turns the problem around and asks how one should encode the alphabet to make it as easy as possible to recover a message, then polyphonic ciphers are deserving of study. Since the English language is highly redundant, it is possible to tolerate a considerable amount of ambiguity in decoding
A Readable Polyphonic Cipher
A polyphonic substitution cipher is one in which several different plaintext letters are enciphered into a single cipher letter or symbol. Perhaps the most simple and well-known example of a polyphonic substitution cipher is the telephone dial, in which the letters ABC are encoded by the number 2, DEF by 3, GHI by 4, JKL by 5, MNO by 6, PRS by 7, TUV by 8, and WXY by 9. This is quite different from the well-known (monophonic) substitution cipher, in which each plaintext letter is associated with a different cipher letter -- if A is encoded by T, then no other letter of the alphabet is also encoded by T
Restricted Letter Sets
In order to understand the limits of recreational linguistics, and in order to identify unsuspected possibilities for research, it is often desirable to map parts of the territory. This was the purpose of The Word Surgeon\u27s Compendium in the August 1976 issue and Words Within Words in the May 1978 one, and this is the purpose of the present article. In contrast, the ten-year topical index in February 1978 was a global map of wordplay, containing no descriptive detail to justify the taxonomy used
Historical and Pedagogical Chronology of the Development of Ethno-confessional Musical Education of Mennonites in the South of Ukraine (End of the 18th - Early XX Centuries)
Historical and chronological principles that the development of musical education of Mennonites in the South of Ukraine (from the end of the 18th century to the beginning of the 20th century) is based on were explained. With the use of archetype and historical-cultural methods of research and implementation of historical and pedagogical reconstruction, an educational-organizational criterion and its indicator (subordination of Mennonite schools) were determined. The main research problem is to maintain the integrity of the ethno-religious Mennonite group among the representatives of the titular nation with the help of spiritual music. The main result: three stages of historical and pedagogical development of musical education of Mennonites in the South of Ukraine were substantiated. The significance of the study is that the deficiency of historical and pedagogical knowledge about the spiritual music education of national minorities, which for centuries lived on Ukrainian lands and influenced the history of musical education in Ukraine, was eliminated
Multiparty talk in the novel: the distribution of tea and talk in a scene from Evelyn Waugh's Black Mischief
This article argues that studies of fictional dialogue have hitherto neglected the specific dynamics of multiparty talk. I will contend that this neglect contributes to the perpetuation of an "ideal" of conversation that allows no space for either the frustrations and inequalities of such encounters or the unique pleasures they may bring to the reader. I urge the importance of distinguishing between group talk, in which there is some element of cohesion and shared goals, and multiparty talk, in which the representation foregrounds fragmentation and explores the often subtle power games played by the participants. Focusing on a scene from Evelyn Waugh's Black Mischief (1986 [1932]), I argue that Waugh is sensitive to the dynamics of multiparty talk while orchestrating the representation for comic effect. I propose that analyzing such scenes of multiparty talk must make us reassess not only how we theorize fictional dialogue, but how far our models of everyday speech serve to privilege and universalize certain conversational practices and mechanisms based almost exclusively on the duologue
Performance Considerations for an Embedded Implementation of OMA DRM 2
As digital content services gain importance in the mobile world, Digital
Rights Management (DRM) applications will become a key component of mobile
terminals. This paper examines the effect dedicated hardware macros for
specific cryptographic functions have on the performance of a mobile terminal
that supports version 2 of the open standard for Digital Rights Management
defined by the Open Mobile Alliance (OMA). Following a general description of
the standard, the paper contains a detailed analysis of the cryptographic
operations that have to be carried out before protected content can be
accessed. The combination of this analysis with data on execution times for
specific algorithms realized in hardware and software has made it possible to
build a model which has allowed us to assert that hardware acceleration for
specific cryptographic algorithms can significantly reduce the impact DRM has
on a mobile terminal's processing performance and battery life.Comment: Submitted on behalf of EDAA (http://www.edaa.com/
Colloquy
Webster\u27s Dictionary defines colloquy as mutual discourse. Readers are encouraged to submit additions, corrections and comments about earlier articles appearing in Word Ways. Comments received up to a month prior to publication of an issue will appear in that issue
A Supplementary Topical Index
The following index has been designed to help the reader locate specific types of wordplay published in 26 issues of Word Ways from February 1978 through May 1984; it updates a similar index for 40 issues of Word Ways from February 1968 through November 1977 appearing in the February 1978 issue. Both indices use the same format: a logological core consisting of (1) letter-patterns in words, (2) operations upon letters in words, and (3) relationships between letters and sounds, and a periphery (the intersection of logology with other branches of wordplay) consisting of (1) literary wordplay and games, (2) academic language studies, and (3) word games and puzzles. Wordplay involving special sets of words (presidents, statenames, -cide words, etc.) is separately indexed
Sending Messages by Telephone
Although the telephone conveys the spoken word with ease, it is illsuited for the written one needed for pagers or communication with the deaf. The telephone keypad contains only ten alternatives (something twelve), far fewer than the 26 alphabetic letters plus space, which means that a single press of a button is ambiguous. The traditional arrangement ABC/DEF/GHI/JKL/MNO/PRS/TUV/WXY omits Q and Z, but these can be understood to be in their normal positions
- …
