Friday, November 21, 2025

Opprobrium vis à vis balance of power


 Opprobrium vis à vis balance of power... A prosperous city always ensures that equilibrium is maintained as long as... 

https://youtube.com/shorts/VdaN3jTFz7U?si=YHMSlpN62XLpz2xq

Thursday, October 24, 2019

Rosicrucian cipher

In 1513 Cornelius Agrippa introduce early form Rosicrucian Cipher in his books Occult of Philosophy. Geometric and simple substitution cipher are well known ciphers 
    Pigpen , Freemason, Napoleon and tic tac toe ciphers in which alphabets or symbols arrange in grids. 
This is an anagram, "How to reconstruct a data " lets encode the message.
      Pigpen cipher , Rosicrucian and Tic tac toe Cipher
                     Thank you have a good day.

   

Wednesday, October 16, 2019

ROT13 community

ROT13 is a member of substitution cipher class. I had discuss two members of  this class, if you remember. 
          Atbash cipher
          Affine Cipher (shift cipher)

If you remember the history which I had share you. Atbash cipher encode message by shifting key = -1 but in inverse direction.
          A = Z, B = Y and so on.
However in shift cipher key = 3.

                Message : HELLO
                                : JGNNQ
Both ciphers are special affine cipher case.
As you know shift cipher had introduced by julius caesar in rome. Julius had encoded message by shifting letter 3 time forward, so that it will not understand. However after 2 or 3 decade later it's is easy to decipher. The above example use same technique.In Rot13 alphabets shift by 13 letters. 
           A = N, B = O and so on.
        

Let time to solve a riddle: 
                 Yrg cynl n tnzr. Zl anzr vf Ze K. Zngurzngvpf fbyir ernyvgl ceboyrzf, ohg fpvrapr yngre cebir gur inyvqvgl bs zngurzngvpf ehyrf. Pna lbh qrpvcure gur grkg 


Rot13 use in encoded email, window xp registry and many places. Later prove that this cipher is not enough power to protect confidential data. 

Rot is very large community. Rot1, Rot 2,.... Rot 26, Rot 47 are available .
Rot5 deal with numeric but there is limit 0 - 4 
Rot13 deal with uppercase letter have 26 limit
Rot18 deal with uppercase letters and numeric values.
In Rot47 numbers, uppercase letters, lowercase letters, punctuations are use to secure the message. Best of luck 
                              vFC 59GAI @63;2 D3< H9K47 3:C6 `b J?>= B3E7]
                               Sgzmj xnt Gzud z mhbd czx

   

Friday, October 11, 2019

Solve Juggle Pieces

Hello guys, Today is quite interesting topic "Juggle the pieces", this is elaborate after affine ciphers.

Affine Ciphers are monoalphabetic ciphers, because every alphabet map against a number. Affine cipher introduce modulus operator. There are so many ciphers build on affine ciphers. Previous cipher Oh yeah, very well Atbash cipher also a good example of this category.
Mathematical Statement:
                E(X) = D(E(X))-----------------------------------------------------(0)
                here E is a function that take parameter x and return encrypted text. Similar with D function but this is inverse function of E.
                 E(x) = (ax+b) mod m--------------------------------------------(1)
                  a, b are keys and m is size of alphabetic, while modules (mod) is an operator which help to solve the equation. a , m both of them are co prime. X key-factor{R{0,..... m-1}}
                D(x) = a^-1 (x-b) mod m----------------------------------------(2)
 If inverse of a doesn't exit then you can't solve through affine cipher. It's a only condition that is necessary for this type of ciphers.
                   1 = aa^-1 mod m --------------------------------------------- (3)
Equation 3 prove that if a , m are co prime and a doesn't have any restriction it's solvable.

Rail Fence Cipher
Now you can solve monoalphabetic ciphers because you know game rules.
Now time to play with pieces.
This cipher belong to another class of cipher transposition cipher, this cipher called zig zag or rail fence cipher.
  There is a man who had receive a call from a private and he say "HOENEL MSEGRL SE" and then call had ended. He think that is just a prank call but the scene is quit awkward, so he try to decrypt the message will you help him. You can send me answer of this puzzle.
               Example 
                      message : "All is well"
                     A        L          S        E        L
                          L            I       W        L
                      Cipher text:  ALSELLIWL
How can I write like this, it's simple. In this cipher you can write text in zigzag form. Start from first row, then second row then first and so on. This is the case when key should be 2.
 However if K should be 3 or 4 or any higher order.
       
              A            S        W            X

                 L         I              E       L

                      L                       L 

Cipher text :      ASWLIELLL
One that i skip X means termination of string.
Thank you for reading


Thursday, October 10, 2019

Dirt speak truth.

Hello, Welcome back. Many people believe that ciphers start from caesar cipher. Some are believe hieroglyphics are first. When archeologist had discovered that israel civilization use cipher, 1000 years before egyptian civilization. Israel civilization had introduced first cipher system named as atbash cipher system.
Atbash cipher belong to monoalphabetic substitution cipher category. It's simple, You can replace first letter with last one and so on.
                        A = Z ,B = Y ...   
 Do you solve decipher a text
              message : "Meet me at 9pm "
you can comment your  answer in comment section.

In holy book ingir(Bible) there are many verses proves atbash cipher system existence. Sheshach  is word used in Holy Book. According to wikipedia Sheshach is common example. However this verse where Sheshach found "The king of Sheshach shall drink after them". When cryptographer decrypt with the help of atbash cipher, it provide us mind blowing information and that is Babylon. Babylon was a kingdom of Mesopotamia (Iran and iraq ).

Mathematical formula Encrypted message and return back original state.
                              E(X) = D(E(X))
This cipher is a special case of affine cipher.
                    E(X) = ((m-1)x+(m-1))mode m
    More details about affine cipher will be share next time.
Thank you , Have a nice day

Tuesday, October 8, 2019

Cryptography and Writings

Hello Guys, welcome back. I hope you had read so many poems, but cryptography also used in poetry. Wired Idea? No it's true, even cryptography use in Holy Books, writings etc. The Morning Sun, I hope you like to read this poem . How cryptography works in poetry , writings and holy books. 

Let's start with Holy books, there are thousand of meaning a single verses. That's a beauty of cryptography. In Sufism it's called divine layer which can hide in their verses. Verses are generic and abstract, so you can take advantage in any context, it will guide you. You can try it. People impress with this techniques, so they use in their own writing i.e Rumi, Sheikh Saadi etc. Everyone knows they had passed for hundred, thousands years ago but there are people who read them and understand them. Later Scientists like newtons, galileo etc also used in their books so that people don't understand how they calculate nature laws. I can know this because I have read most interesting novels Angels and Demons by Dan Brown. In the novel events and place are true but story are fictional. You like it if you want to read it.
Next is how poets used, most of time poets used different way to writing to tell you something. Words have meanings, but sometimes stanzas hide something i.e Paradise Lost
,Masnavi Rumi prove my point. However it's not same which I discuss last blog, it's entirely different. Layering similar to cryptography actually layering apply on abstract messages.

Another things many painters , architectures, artists use this technique. Magic square 4x4, Taj Mahals, Mona Lisa etc are various examples. Peoples builds great things, but now a days artists play with mathematics rules, like our grandparents and their grandparents did. Thank you Have a good day.

Monday, August 19, 2019

Cryptography



Message decipher
Introduction
Cryptography is a field of science in which a sender encrypt information from outside world and then deliver through insecure medium. A person who work in secret intelligence, must share a his location with his friends so that they should complete their mission, or a person who know how to read ancient texts can protect information from some bad people.

The prefix "crypt" means "hidden" or "vault" and the suffix "graphy" stands for "writing."
Every writing system have one common property and that is "encoded message property". According to this property if you don't know how to read it then you don't know about key.
For example I write a line another language and check whether this property satisfy my hypothesis.
                                     علم  انسا ن کا اک رشتہ ئے
This is a message which i need to understand. There are two possibilities to understand this message
1. I know about every word and where to read (language rules)
2. I have a reference which guide me.

"Knowledge and man have relation" , I can decipher it easily because this my native tongue.
 However when old civilizations invade one another territory, Nations who win battle, abandon their civilization, destroy their engineering sites. Some of them also learn native.

                                              History

First cipher had introduced by julius caesar, when cleopatra fallen in love with julius. Soldiers had search Cleopatra and julius everywhere. They introduce own method, so that they protect from soldiers and no one find them. More than 300 years their people understand what they say to each other. 
Holy cipher named as "atbash" which had found in Holy book Bible (Hebrew).     
Later 7 Century arab mathematician "Al Kundi" who introduce cryptography in mathematics field. First time mathematics serve for this purpose.
Al Kundi cryptography 

This is brief introduction of cryptography. Modern Cryptographist play with mathematics rules specially algebraic,number theory. However since the advent of computer cryptography techniques also enhance such as quantum security. 





Do you support us?

Business address
0x1D24D8f27ea73ff604C7685246bdC6ae55bddaEF

Opprobrium vis à vis balance of power

 Opprobrium vis à vis balance of power... A prosperous city always ensures that equilibrium is maintained as long as...  https://youtube.com...

Achieves