Javascript must be enabled to continue!
The Qurʾān Encrypted
View through CrossRef
Abstract
This article (re-)considers a unique Qurʾān manuscript (MS London, SOAS, 12217) in ciphered characters (Ar. al-taʿmiya), reminiscent of the ring letters of the Graeco-Egyptian tradition (Brillenbuchstaben). The case of this Qurʾān manuscript offers an opportunity to decode (Ar. istikhrāj al-muʿammà) a cryptographed text, to date and localize a very special Quranic codex, and to investigate the history of the collections it passed through, as well as the religious and cultural context of its production. Lastly, it examines the relations between Islam and magic—with which cryptography is often associated.
Title: The Qurʾān Encrypted
Description:
Abstract
This article (re-)considers a unique Qurʾān manuscript (MS London, SOAS, 12217) in ciphered characters (Ar.
al-taʿmiya), reminiscent of the ring letters of the Graeco-Egyptian tradition (Brillenbuchstaben).
The case of this Qurʾān manuscript offers an opportunity to decode (Ar.
istikhrāj al-muʿammà) a cryptographed text, to date and localize a very special Quranic codex, and to investigate the history of the collections it passed through, as well as the religious and cultural context of its production.
Lastly, it examines the relations between Islam and magic—with which cryptography is often associated.
Related Results
The Qurʾan in Manuscript, Print, and Digital Form
The Qurʾan in Manuscript, Print, and Digital Form
Over the past six centuries, the way believers, theologians, and scholars in Europe have produced, received, and studied copies of the Qurʾanic text has evolved alongside changes i...
Revisiting Wansbrough’s Perspective on the Qurʾān’s Synoptic Problem
Revisiting Wansbrough’s Perspective on the Qurʾān’s Synoptic Problem
Abstract
The occurrence of variant versions of the same story is not uncommon in the Qurʾān. In response to this phenomenon, different approaches have been developed...
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan–Meier Survival Analysis
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan–Meier Survival Analysis
Abstract
The proliferation of real-world healthcare data has substantially expanded opportunities for collaborative research, yet stringent privacy regulations hinder the p...
Educational Peace Theory in the Holy Qurʾan
Educational Peace Theory in the Holy Qurʾan
Abstract
This study aimed to explore the educational theory of peace in the Holy Qurʾan by conducting a holistic, systematic analysis of the word “peace” and in...
Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
The increasing prevalence of encrypted traffic in modern networks presents significant challenges in detecting malicious activities, necessitating advanced techniques for effective...
A Novel Separable Scheme for Encryption and Reversible Data Hiding
A Novel Separable Scheme for Encryption and Reversible Data Hiding
With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be stored and processed in an encrypted format. To facilitate the indexing and tampering...
Explainable Anomaly Detection in Encrypted Network Traffic Using Data Analytics
Explainable Anomaly Detection in Encrypted Network Traffic Using Data Analytics
The unsanctioned growth of the encrypted network traffic is a two-sided problem for the cybersecurity, on one hand, it preserves the privacy of the users, and, on the other hand, i...
Ahmed Cevdet Pasha’s Printed Quranic Manuscript in the Ottoman Empire: a Critical Study
Ahmed Cevdet Pasha’s Printed Quranic Manuscript in the Ottoman Empire: a Critical Study
Abstract
This article discusses a discovery made by the author involving the wrong manuscript of calligrapher Şekerzâde being printed by the Ottoman Empire. It was initially illega...

