Abstract
In this paper, using cryptanalysis as an example, I explain a general method, or strategy, already in use, for uncovering objective knowledge of hidden realities. I call this strategy IVS (the investigative strategy). To help in the understanding of the IVS process, I shall compare IVS, itself an operating principle, with other operating principles (I shall explain what an operating principle is in the body of the paper). Two points, among others, I shall be addressing myself to are the following.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brumbaugh, R.S. The Most Mysterious Manuscript: The Voynich ‘Roger Bacon’ Cipher Manuscript (Carbondale: Southern Illinois University Press, 1978).
Friedman, W.F. Cryptography and Cryptanalysis Articles, 2 vols. (Laguna Hills, California: Aegean Park Press, 1976).
Kahn, D. The Codebreakers (New York: Macmillan, 1967).
Lai, T. ‘Empirical Tests Are Only Auxiliary Devices.’ Forthcoming, British Journal for the Philosophy of Science, Vol. 39(1988), pp. 211–223.
Plato. Meno, trans. W.K.C. Guthrie, in The Collected Dialogues of Plato (Princeton: Princeton University Press, 1969).
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1989 Kluwer Academic Publishers
About this chapter
Cite this chapter
Lai, T. (1989). Cryptanalysis: Uncovering Objective Knowledge of Hidden Realities. In: Byrne, E.F., Pitt, J.C. (eds) Technological Transformation. Philosophy and Technology, vol 5. Springer, Dordrecht. https://doi.org/10.1007/978-94-009-2597-7_2
Download citation
DOI: https://doi.org/10.1007/978-94-009-2597-7_2
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-277-2827-2
Online ISBN: 978-94-009-2597-7
eBook Packages: Springer Book Archive