Foundation

In the late 1970s the Belgian linguist Lic. Didier Elias Meulemans worked on the development of Cryptonomy. For what we know his approach started with the study of natural cryptonomy because he based his studies on endolinguistics and comparative computational linguistics. Our aim is to continue his findings in both artificial and natural cryptonomy.

Definition

Cryptonomy is the interdisciplinary study of encrypted communication systems, encompassing both artificially constructed and naturally occurring cryptolanguages. It aims to investigate, analyze, and interpret these systems using a combination of mathematical, logical, and analytical methods appropriate to each type of system.

Cryptonomy comprises two main subfields:

1. Artificial Cryptonomy

This subfield focuses on the study of deliberately designed and constructed cryptolanguages. It employs rigorous mathematical methods, including:

  • Mathematical modeling and analysis of cryptolanguage structures
  • Development of encryption and decryption algorithms
  • Application of information theory, algebra, and number theory
  • Exploration of computational complexity and security aspects
  • Study of relationships between different artificial cryptolanguages

2. Natural Cryptonomy

This subfield investigates naturally occurring encrypted communication systems, such as the language of the unconscious or other implicit forms of communication such as non verbal languages. It utilizes:

  • Logical analysis to identify patterns and structures
  • Psychological and cognitive approaches to interpretation
  • Interdisciplinary methods drawing from linguistics, neuroscience, and psychology
  • Limited mathematical modeling where applicable, acknowledging the inherent complexity and potential limitations in quantifying these systems
  • Natural Cryptonomy would be of great service for the development and study of psychoanalysis, endolinguistics and paralinguistics

Cryptonomy as a whole aims to advance our understanding of secure and private communication, both in technological applications and human cognition. It provides insights that can be applied to fields such as data security, artificial intelligence, psychoanalysis, and communication theory.