Aug 092003
 

Cryptographic revolutionary Alan Bruzzi writes:

I was wondering where my reading level program would fit into cryptography. It takes a sentence out of a book, and computes its reading age. For example, John 3:16, spoken by Jesus Christ, would give a reading age of 33, because that’s when He died. Also, my program computes the age of the Virgin Mary, when she got married, to be 14. It’s an incredible program, but I just can’t figure out where it would be classifed under cryptography, because it converts a whole ASCII sentence into a single value, which would be the person’s age. Please help…

Dear Alan:

It is unfortunate that cryptography is already perfect, pending quantum computing, which offers a theoretical attack on RSA via Shor’s Algorithm, for this sounds like a remarkable program indeed. John 3:16 computes to 33, you say. John 3:17 through 21, also spoken by Jesus, also compute to 33, I assume. The entire Sermon on the Mount? Let me guess: 33. The number of words in the Rolling Rock legend? 33. I assume that computing marrying age, as in your example of the Virgin Mary, is a simple matter of a command-line switch.

Your program will shed light on many important historical questions. No one has been certain how old Homer was when he died or if he lived at all — until now, when we can feed a few lines of The Iliad (Pope’s translation, or Lang’s, or Butler’s, or Fitzgerald’s, I’m sure it doesn’t matter) into the computer, and voilà. If Homer should turn out to fictional, or an amalgamation of authors, will the program return zero, or an error code?

I have a few questions. Does your program require an English translation, or will other languages, say Greek or Aramaic for John 3:16, work equally well? For living authors, does it return their current age, or the age at which they can be expected to expire? Most important, do you reboot your computer by turning it upside down and shaking it until the screen goes gray?

In my professional opinion your program is unclassifiable. It is unique in the history of the cryptography, and I look forward to reviewing the source code.

I remain at your service.