SlideShare a Scribd company logo
1 of 15
CRYPTOLOGY, STEGANOGRAPHY AND
PROPAGANDA: THE EXCLUSION AND
INCLUSION ROLES OF LANGUAGE IN
HUMAN COMMUNICATION.
Hajer Albalawi
Introduction:
• Communication includes a sender and recipient in a
linguistic context, and frequently excludes others.
• Inclusion and exclusion are major roles performed by
language as a communicative tool.
• These roles can be a natural consequence of the development
of a language, such as dialectical differences, which are
based on social determinants, including class, gender, and
age.
• Exclusion and inclusion can be manipulated to produce
secure communication.
• cryptology (i.e. the study of writing and solving codes), and
steganography (i.e. the practice of concealing messages or
information within non-secret text or data), which are
effectively and intentionally used to conceal important
communications.
• The role of propaganda as a legitimate and innocent
platform.
Unintentional Exclusion and Inclusion
1- The Dialect Differences:
(it is a natural growth of the language that develops over time and
distance).
R. A. Hudson, in his book Sociolinguistics, says, “It could be that we
use the pronunciation in order to identify our origins [. . .] we might use
morphology, syntax, and vocabulary in order to identify our current
status in society.” (43).
Cryptology and Steganography
• The language in code-making is manipulated in order to achieve a
conscious, purposeful, and direct inclusion and exclusion.
• The linguistic features are intentionally designed and controlled by
humans.
• The ambiguity and the difficulty are one of the characteristics of the
code-making.
• On the contrast, steganography appears innocent and everyone can
read the surface message, but it hides a crucial message that is only
read by a particular recipient.
Cryptology and Steganography Throughout
History. (Part 1)
• Steganography is originally derived from the Greek
language.
• The Greeks used the process of hiding
writing in many situations and forms.
• For instance, the sender wrote a secret message on
the shaved scalp of a messenger. Then, they waited
until the hair grew to secure the safety of hiding writing
or tattoo.
• In the Roman Period, invisible ink was known to hide
Secret information within an innocent letter.
Cryptology and Steganography Throughout
History (Part 2).
• The Egyptian drawing that still exists on the
tombs’ Walls inside the Giza Pyramid in Cairo,
the ancient Egyptians covertly communicated using
the Hieroglyphic language, a series of symbols
representing a message.
• The clay tablets from Mesopotamia
indicate the existence of secret
communication in the ancient age.
The Origin of Cryptology and Cryptanalysis
(House of Wisdom).
• The Arabs wrote down the major methods and
principals of cryptology.
• David Kahn, in his book, The Codebreakers, says that,
“Cryptology was born among the Arabs. They were
the first to discover and write down the methods of
cryptanalysis[. . .] Storytelling, exemplified by
Scheherazade’s Thousand and One Nights, word-
riddles, rebuses, puns, anagrams, and similar games
abounded; grammar became a major study. And
included was secret writing. (76).
Encryption during the
Wars: The Enigma
• The use of language in code-making and code-breaking
becomes more complicated in the sense that it is
combined with modern devices and tools.
• Simon Singh says in his book The Code Book, that,
“Cryptanalysis could not be invented until civilization
had reached a sufficiently sophisticated level of
scholarship in several disciplines, including
mathematics, statistics, and linguistics.” (15).
• In the military field, the intent of exclusion and
inclusion is the primary objective for communication.
The Bombe
• The Bombe worked as a code-breaking machine.
• The teamwork which consists of ten thousand
linguists and mathematicians, enabled them to crack
the German machine when they discovered the clue
of the Enigma.
The Language Barrier
• On the battlefield, speed and security
are very important.
• The use of Navajo language is crucial in
WWII.
•
• The need to have a secret language and
unbreakable codes to communicate
within the U.S. Navy became very
urgent because Japan broke every code
that the Americans tried to use.
The Relation between Cryptology, Steganography, and
Propaganda (Part I).
• Propaganda is legitimate and unsuspicious platforms.
• Propaganda also performs this role skillfully and deliberately.
• It adds rhetorical strength to both cryptology and steganography.
• Garth S. Jowett in his book, Propaganda and Persuasion, describes propaganda as, “suspicious rhetoric” (3).
• The effectiveness and deception of propaganda arise from its adherence to persuasive strategies.
• the persuasive and rhetorical sides of propaganda are fundamental in creating a fertile and secure
setting for cryptologists and steganographists to hide their real intent and purpose.
The Relation between Cryptology,
Steganography, and Propaganda (Part II).
• It is the rhetorical and persuasive functions that enable it to penetrate our
daily communication, especially in the internet age.
• It uses persuasive techniques that combine with the ideological
concepts of a society, shaping public opinion and influencing one’s
decision as a consequence. Leonard Doob defines propaganda as,
“the attempt to affect the personalities and to control the behavior of
individuals towards desired ends” (4).
Conclusion
• First, the human ability to adapt the linguistic behavior to cover their secret language.
• Second, the flexibility of language to serve human desires and purpose under any
circumstance.
• Third, critical thinking is essential for developing the human reaction towards
suspicious and secret communication.
• Fourth, in order to develop our critical sense, it is vital to first understand the ways,
methods, and roles used by powerful forces in society when controlling and shaping
decisions and reactions.
Thus, an overview of propaganda and its relationship to cryptology and steganography
will contribute to clarifying the human capacity to be deceived, while also raising
awareness of this important aspect of contemporary life.
References
Kahn, David. The Codebreakers: The Story of Secret Writing. New York: Macmillan, 1967. Print.
Jowett, Garth S., and Victoria ODonnell. Propaganda and Persuasion. Washington DC: SAGE Publications, 1986. Print.
Singh, Simon. The Code Book: The Secret History of Codes and Code-breaking Cryptography. London: Fourth Estate, 2000. Print.
Desoky, Abdelrahman. “Litegsa: list-based Steganography Methodology.” International Journal of Information Security 8.4 (2009): 247-261.
Print.
Desoky, Abdelrahman. “Notestega: Notes-based steganography methodology.” International Journal of Information Security 18.4 (2009): 178-
193. Print.
Edwards, A. D. Language in Culture and Class: The Sociology of Language and Education.
London: Heinemann Educational, 1976. Print.
Ellul, Jacques, Propaganda: The Formation of Men’s Attitudes. New York: Vintage Books. 1965.
Print.
Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the
Mass Media. New York: Pantheon Books. 2019. Print.
Jack, Meadows. “Limitations on the Publishing of Scientific Research.” Information Security: A Comparative Handout. Ed. Karl De Leeuw, Jan
Bergstra. Oxford: Elsevier, 2007.29-51. Print.
Josef, A., DeVito, The communication handbook: a dictionary. New York: Harper & Row, 1986.
Print.
Thank you.

More Related Content

Similar to IJAS Presentation

Intercultural Communication by Claire Kramsch
Intercultural Communication by Claire KramschIntercultural Communication by Claire Kramsch
Intercultural Communication by Claire KramschParth Bhatt
 
Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...
Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...
Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...Liz Milligan
 
OC1 Nature and elements of communication.pptx
OC1 Nature and elements of communication.pptxOC1 Nature and elements of communication.pptx
OC1 Nature and elements of communication.pptxSuJinRustia
 
Culture and Language
Culture  and LanguageCulture  and Language
Culture and LanguageAli Shiri
 
Language and culture 7
Language and culture 7Language and culture 7
Language and culture 7EdgarHeredia4
 
Identity in Dialogue, Klammer S
Identity in Dialogue, Klammer SIdentity in Dialogue, Klammer S
Identity in Dialogue, Klammer SSarah Klammer
 
Historical background of Interpreting
Historical background of Interpreting Historical background of Interpreting
Historical background of Interpreting hanie_dirgantara
 
Linguistic and nonlinguistic codes
Linguistic and nonlinguistic codesLinguistic and nonlinguistic codes
Linguistic and nonlinguistic codesmihaela stinga
 
1 Media Early Civil
1 Media Early Civil1 Media Early Civil
1 Media Early Civilerrolvieth
 
CURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docx
CURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docxCURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docx
CURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docxannettsparrow
 
How To Write A Process Analysis Essay
How To Write A Process Analysis EssayHow To Write A Process Analysis Essay
How To Write A Process Analysis EssayMelissa Elliott
 
Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...
Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...
Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...abdulshaikh5253
 
How media and social scientists present migration
How media and social scientists present migrationHow media and social scientists present migration
How media and social scientists present migrationMyna German Schleifer
 
Essays On Plagiarism
Essays On PlagiarismEssays On Plagiarism
Essays On PlagiarismRobin King
 
Sujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdf
Sujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdfSujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdf
Sujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdfSujay Rao Mandavilli
 
History of communication saranti
History of communication sarantiHistory of communication saranti
History of communication sarantiddertili
 

Similar to IJAS Presentation (20)

Intercultural Communication by Claire Kramsch
Intercultural Communication by Claire KramschIntercultural Communication by Claire Kramsch
Intercultural Communication by Claire Kramsch
 
Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...
Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...
Techniques Of Essay Writing. Great Techniques For Quick and Sensible Essay Wr...
 
OC1 Nature and elements of communication.pptx
OC1 Nature and elements of communication.pptxOC1 Nature and elements of communication.pptx
OC1 Nature and elements of communication.pptx
 
Culture and Language
Culture  and LanguageCulture  and Language
Culture and Language
 
Language and culture 7
Language and culture 7Language and culture 7
Language and culture 7
 
Identity in Dialogue, Klammer S
Identity in Dialogue, Klammer SIdentity in Dialogue, Klammer S
Identity in Dialogue, Klammer S
 
Historical background of Interpreting
Historical background of Interpreting Historical background of Interpreting
Historical background of Interpreting
 
Linguistic and nonlinguistic codes
Linguistic and nonlinguistic codesLinguistic and nonlinguistic codes
Linguistic and nonlinguistic codes
 
Language identity
Language identityLanguage identity
Language identity
 
1 Media Early Civil
1 Media Early Civil1 Media Early Civil
1 Media Early Civil
 
CURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docx
CURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docxCURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docx
CURRENT ANTHROPOLOGY Volume 34, Number r, February 1993© 199.docx
 
How To Write A Process Analysis Essay
How To Write A Process Analysis EssayHow To Write A Process Analysis Essay
How To Write A Process Analysis Essay
 
Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...
Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...
Language Illuminated: Navigating the Profound Importance and Dynamic Evolutio...
 
FinalEssay_IM
FinalEssay_IMFinalEssay_IM
FinalEssay_IM
 
Intercultural Pragmatics
Intercultural PragmaticsIntercultural Pragmatics
Intercultural Pragmatics
 
How media and social scientists present migration
How media and social scientists present migrationHow media and social scientists present migration
How media and social scientists present migration
 
Essays On Plagiarism
Essays On PlagiarismEssays On Plagiarism
Essays On Plagiarism
 
Transculturation, Transliteracy And Generative Poetics
Transculturation, Transliteracy And Generative PoeticsTransculturation, Transliteracy And Generative Poetics
Transculturation, Transliteracy And Generative Poetics
 
Sujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdf
Sujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdfSujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdf
Sujay Laws of Language Dynamics FINAL FINAL FINAL FINAL FINAL.pdf
 
History of communication saranti
History of communication sarantiHistory of communication saranti
History of communication saranti
 

Recently uploaded

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 

Recently uploaded (17)

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 

IJAS Presentation

  • 1. CRYPTOLOGY, STEGANOGRAPHY AND PROPAGANDA: THE EXCLUSION AND INCLUSION ROLES OF LANGUAGE IN HUMAN COMMUNICATION. Hajer Albalawi
  • 2. Introduction: • Communication includes a sender and recipient in a linguistic context, and frequently excludes others. • Inclusion and exclusion are major roles performed by language as a communicative tool. • These roles can be a natural consequence of the development of a language, such as dialectical differences, which are based on social determinants, including class, gender, and age. • Exclusion and inclusion can be manipulated to produce secure communication. • cryptology (i.e. the study of writing and solving codes), and steganography (i.e. the practice of concealing messages or information within non-secret text or data), which are effectively and intentionally used to conceal important communications. • The role of propaganda as a legitimate and innocent platform.
  • 3. Unintentional Exclusion and Inclusion 1- The Dialect Differences: (it is a natural growth of the language that develops over time and distance). R. A. Hudson, in his book Sociolinguistics, says, “It could be that we use the pronunciation in order to identify our origins [. . .] we might use morphology, syntax, and vocabulary in order to identify our current status in society.” (43).
  • 4. Cryptology and Steganography • The language in code-making is manipulated in order to achieve a conscious, purposeful, and direct inclusion and exclusion. • The linguistic features are intentionally designed and controlled by humans. • The ambiguity and the difficulty are one of the characteristics of the code-making. • On the contrast, steganography appears innocent and everyone can read the surface message, but it hides a crucial message that is only read by a particular recipient.
  • 5. Cryptology and Steganography Throughout History. (Part 1) • Steganography is originally derived from the Greek language. • The Greeks used the process of hiding writing in many situations and forms. • For instance, the sender wrote a secret message on the shaved scalp of a messenger. Then, they waited until the hair grew to secure the safety of hiding writing or tattoo. • In the Roman Period, invisible ink was known to hide Secret information within an innocent letter.
  • 6. Cryptology and Steganography Throughout History (Part 2). • The Egyptian drawing that still exists on the tombs’ Walls inside the Giza Pyramid in Cairo, the ancient Egyptians covertly communicated using the Hieroglyphic language, a series of symbols representing a message. • The clay tablets from Mesopotamia indicate the existence of secret communication in the ancient age.
  • 7. The Origin of Cryptology and Cryptanalysis (House of Wisdom). • The Arabs wrote down the major methods and principals of cryptology. • David Kahn, in his book, The Codebreakers, says that, “Cryptology was born among the Arabs. They were the first to discover and write down the methods of cryptanalysis[. . .] Storytelling, exemplified by Scheherazade’s Thousand and One Nights, word- riddles, rebuses, puns, anagrams, and similar games abounded; grammar became a major study. And included was secret writing. (76).
  • 8. Encryption during the Wars: The Enigma • The use of language in code-making and code-breaking becomes more complicated in the sense that it is combined with modern devices and tools. • Simon Singh says in his book The Code Book, that, “Cryptanalysis could not be invented until civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics.” (15). • In the military field, the intent of exclusion and inclusion is the primary objective for communication.
  • 9. The Bombe • The Bombe worked as a code-breaking machine. • The teamwork which consists of ten thousand linguists and mathematicians, enabled them to crack the German machine when they discovered the clue of the Enigma.
  • 10. The Language Barrier • On the battlefield, speed and security are very important. • The use of Navajo language is crucial in WWII. • • The need to have a secret language and unbreakable codes to communicate within the U.S. Navy became very urgent because Japan broke every code that the Americans tried to use.
  • 11. The Relation between Cryptology, Steganography, and Propaganda (Part I). • Propaganda is legitimate and unsuspicious platforms. • Propaganda also performs this role skillfully and deliberately. • It adds rhetorical strength to both cryptology and steganography. • Garth S. Jowett in his book, Propaganda and Persuasion, describes propaganda as, “suspicious rhetoric” (3). • The effectiveness and deception of propaganda arise from its adherence to persuasive strategies. • the persuasive and rhetorical sides of propaganda are fundamental in creating a fertile and secure setting for cryptologists and steganographists to hide their real intent and purpose.
  • 12. The Relation between Cryptology, Steganography, and Propaganda (Part II). • It is the rhetorical and persuasive functions that enable it to penetrate our daily communication, especially in the internet age. • It uses persuasive techniques that combine with the ideological concepts of a society, shaping public opinion and influencing one’s decision as a consequence. Leonard Doob defines propaganda as, “the attempt to affect the personalities and to control the behavior of individuals towards desired ends” (4).
  • 13. Conclusion • First, the human ability to adapt the linguistic behavior to cover their secret language. • Second, the flexibility of language to serve human desires and purpose under any circumstance. • Third, critical thinking is essential for developing the human reaction towards suspicious and secret communication. • Fourth, in order to develop our critical sense, it is vital to first understand the ways, methods, and roles used by powerful forces in society when controlling and shaping decisions and reactions. Thus, an overview of propaganda and its relationship to cryptology and steganography will contribute to clarifying the human capacity to be deceived, while also raising awareness of this important aspect of contemporary life.
  • 14. References Kahn, David. The Codebreakers: The Story of Secret Writing. New York: Macmillan, 1967. Print. Jowett, Garth S., and Victoria ODonnell. Propaganda and Persuasion. Washington DC: SAGE Publications, 1986. Print. Singh, Simon. The Code Book: The Secret History of Codes and Code-breaking Cryptography. London: Fourth Estate, 2000. Print. Desoky, Abdelrahman. “Litegsa: list-based Steganography Methodology.” International Journal of Information Security 8.4 (2009): 247-261. Print. Desoky, Abdelrahman. “Notestega: Notes-based steganography methodology.” International Journal of Information Security 18.4 (2009): 178- 193. Print. Edwards, A. D. Language in Culture and Class: The Sociology of Language and Education. London: Heinemann Educational, 1976. Print. Ellul, Jacques, Propaganda: The Formation of Men’s Attitudes. New York: Vintage Books. 1965. Print. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. New York: Pantheon Books. 2019. Print. Jack, Meadows. “Limitations on the Publishing of Scientific Research.” Information Security: A Comparative Handout. Ed. Karl De Leeuw, Jan Bergstra. Oxford: Elsevier, 2007.29-51. Print. Josef, A., DeVito, The communication handbook: a dictionary. New York: Harper & Row, 1986. Print.