Daniel’s Questions 4/8: Jürgen Hermes

4. Has the thesis of Jürgen Hermes been discussed in the English speaking community?


5 thoughts on “Daniel’s Questions 4/8: Jürgen Hermes

  1. Yes.
    Thesis (German): http://kups.ub.uni-koeln.de/4561/1/jhermes.textprozessierung.pdf
    He does summarize some in his German blog. Read the entries tagged Voynich. I did read the thesis, understood maybe half of it. I’ve made a very rough synopsis without any warranty if I understood him right. I am not a scientist and probably not the best one to summarize him. It might serve as a teaser though, since he did announce to try to publish the thhesis in some English scientific magazine. I will paste my Synopsis in your solution form for you to decide weather to publish it or not.

  2. And Daniel just gave me a bit more background on Jürgen Hermes:

    >>J.H researches on text processing and analysis and developed a software called “Tesla” at the Institute for linguistics at the University of Cologne. To show Teslas capabilities, the VM is an interesting example due to its oddness. Basic question: Could a cipher generated with methods known in the 15th century produce similar values of statistical analysis (within the Tesla software).
    In his contextual research, he found the work of Johannes Trithemius, which is an interesting, but not well known chapter of cryptographic history, regardless of Voynich contexts. He took one of J.T. chryptographic approaches (described in Poligraphia III), and generated ciphers out of various texts of various 15th century contemporary and older languages. He took this particular method, as it might prospect a successful attacks on resulting ciphers. Regarding other encryption methods of J.T., he does not see fruitful attacks for reasons my understanding exeeds his expert-speak.
    All thrown into the Tesla Software, he could compare statistic analysis values to the voynich-text. The basic result was: There are similarities, however not as much as being “hoped”, though tweaks on experimental parameters might be able to adjust this. He then elaborates, how attacks might be designed with the assumption of an actual Poligraphia-III-like-cypher, however this also exeeds my understanding. I’ve enjoyed reading his thesis, although parts of it obviously deals with statistical terms I lack basic knowledge of. However he gives an interesting insight of cryptographic history, emphasizes on the work of Johannes Trithemius and does a comprehensive breakdown of clandestine textual information.<<

  3. Dear Daniel and Elmar,

    Returning from my holyday I found this very appropriate synopsis of my thesis. I hope to finish my english article about the PIII supposition during the next weeks. Feel free to contact me earlier if you have any questions about my work.

    Greetings from Cologne

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s