Science is really, really real.
The phrase, coined by Dr Phil Beddoes in his bestselling book, is so common that you would be forgiven for thinking that it had been invented by the great American mathematician, Alan Turing.
But in fact it has its origins in the science of cryptography.
It is a key element of the theory of mathematics, and its use in cryptography was invented by Sir Isaac Newton.
In 1832, Newton had a vision that he could write a mathematical formula that would encode information, which would be able to be transferred between humans.
This would be the first encryption.
Sir Isaac, who died in 1883, was inspired by Einstein, who had written about the theory in the year 1887.
His mathematical formula for the ciphertext, known as the “Euclidean formula”, would be a series of letters.
When he wrote it, Newton believed that it would be an extremely difficult thing to break.
But he was wrong.
There are many ways in which the word “cryptography” is used, and each has its own history.
“There are those who think the phrase is an invented one,” says Alan Dyer, a mathematician at the University of Kent.
“It has come to mean something quite different to the people who actually used it.
So you have those who say it was invented because it is used in cryptography, and there are others who think it was originally coined by Newton, but was invented to make it seem like the most important thing about cryptography.”
The term has come about to capture what we believe to be the best way to describe it, and I think that is the way it should be.”
For more on the history of cryptography, read BBC Sport’s article about the origins of the word.
Professor Stephen Hawking has also been one of the most prominent people to use the phrase.
He used it as a title to a book he co-wrote in the 1980s called A Brief History of Time.
Although the word has become more common over the years, it has not been the first thing used to describe cryptography, nor is it the only one.
Ciphers were developed by Albert Einstein in the late 18th Century, after his famous experiment in 1915.
According to Einstein’s theory of relativity, light travels faster when two bodies are travelling at the same speed.
But he was not the first to propose that it should also travel at the speed of light.
Albert Einstein’s work was a key part of the development of the field of quantum mechanics, which is one of our world’s greatest inventions.
As quantum mechanics is an integral part of modern science, and as the field’s theories can be applied to a range of everyday situations, it is very likely that quantum computers could one day be built to solve a wide range of real-world problems.
While the phrase “crypto” has its roots in mathematics, it was also popularised by the likes of Alice and Wonderland author Lewis Carroll.
He wrote about a world where the number “10” could be decoded by writing it backwards, and a world of computers with “10 million possible solutions” to real-life problems.
Alice and Wonderland was first published in 1887, but it was only in the 1990s that the book became widely read and used as a guide to the world of cryptology.
Alice, a “girly” girl, was trapped by her stepfather in a box and left for dead.
After spending the next two years looking for her, Alice comes across the story of Lewis Carroll, the creator of Alice in Wonderland.
Carroll’s book was published in 1893 and remains a best-seller.
Like Einstein’s famous “Einstein equation”, the “cryptocipher” was designed to be able transfer information between people.
To encode it, Carroll wrote a series.
One of these was the “Alice formula”.
This was a series with a letter “a” which represented the “A”.
Alice was able to decipher the code and use it to unlock a keyhole in a locked box.
By looking through the box, Alice was able the “a”.
But Carroll had one major flaw in his code: it was very difficult to decipher.
Because the keyhole was so hard to open, Alice’s code would not work.
However, the code had been written in the style of a storybook, and it was not as easy to decode.
Instead of trying to decipher what was being written in a story, Carroll instead wrote a “cryptic” cipher.
Each letter was separated by a space.
Using a mathematical technique called the decryption of symbols, Alice could write her code backwards, using letters like “b”, “c”, “d”, and so on.
If the code could be broken, it would unlock the key.
With this key, Carroll was