Skip to main content

Posts

Do you support us?

Business address
0x1D24D8f27ea73ff604C7685246bdC6ae55bddaEF

Rosicrucian cipher

In 1513 Cornelius Agrippa introduce early form Rosicrucian Cipher in his books Occult of Philosophy. Geometric and simple substitution cipher are well known ciphers      Pigpen , Freemason, Napoleon and tic tac toe ciphers in which alphabets or symbols arrange in grids.  This is an anagram, "How to reconstruct a data " lets encode the message.       Pigpen cipher , Rosicrucian and Tic tac toe Cipher                      Thank you have a good day.    
Recent posts

ROT13 community

ROT13 is a member of  substitution cipher class. I had discuss two members of  this class, if you remember.            Atbash cipher           Affine Cipher (shift cipher) If you remember the history which I had share you. Atbash cipher encode message by shifting key = -1 but in inverse direction.           A = Z, B = Y and so on. However in shift cipher key = 3.                 Message : HELLO                                 : JGNNQ Both ciphers are special affine cipher case. As you know shift cipher had introduced by julius caesar in rome. Julius had encoded message by shifting letter 3 time forward, so that it will not understand. However after 2 or 3 decade later it's is easy to decipher. The above example use same technique. In Rot13 alphabets shift by 13 letters.             A = N, B = O and so on.          Let time to solve a riddle:                     Yrg cynl n tnzr. Zl anzr vf Ze K. Zngurzngvpf fbyir ernyvgl ceboyrzf, ohg fpvrapr yngre cebir gur inyvqvg

Solve Juggle Pieces

Hello guys, Today is quite interesting topic "Juggle the pieces", this is elaborate after affine ciphers. Affine Ciphers are monoalphabetic ciphers, because every alphabet map against a number. Affine cipher introduce modulus operator. There are so many ciphers build on affine ciphers. Previous cipher Oh yeah, very well Atbash cipher also a good example of this category. Mathematical Statement:                 E(X) = D(E(X))-----------------------------------------------------(0)                 here E is a function that take parameter x and return encrypted text. Similar with D function but this is inverse function of E.                  E(x) = (ax+b) mod m--------------------------------------------(1)                   a, b are keys and m is size of alphabetic, while modules (mod) is an operator which help to solve the equation. a , m both of them are co prime. X key-factor{R{0,..... m-1}}                 D(x) = a^-1 (x-b) mod m------------------------------------

Dirt speak truth.

Hello, Welcome back. Many people believe that ciphers start from caesar cipher. Some are believe  hieroglyphics are first. When archeologist had discovered that israel civilization use cipher, 1000 years before egyptian civilization. Israel civilization had introduced first cipher system named as atbash cipher system. Atbash cipher belong to monoalphabetic substitution cipher category. It's simple, You can replace first letter with last one and so on.                         A = Z , B = Y ...     Do you solve decipher a text               message : "Meet me at 9pm " you can comment your  answer in comment section. In holy book ingir(Bible) there are many verses proves atbash cipher system existence.  Sheshach    is word used in Holy Book. According to wikipedia Sheshach is common example. However this verse where Sheshach found  "The king of  Sheshach  shall drink after them". When cryptographer decrypt with the help of atbash cipher, it provide us mind

Cryptography and Writings

Hello Guys, welcome back. I hope you had read so many poems, but cryptography also used in poetry. Wired Idea? No it's true, even cryptography use in Holy Books, writings etc.  The Morning Sun , I hope you like to read this poem . How cryptography works in poetry , writings and holy books.  Let's start with Holy books, there are thousand of meaning a single verses. That's a beauty of cryptography. In Sufism it's called divine layer which can hide in their verses. Verses are generic and abstract, so you can take advantage in any context, it will guide you. You can try it. People impress with this techniques, so they use in their own writing i.e Rumi, Sheikh Saadi etc. Everyone knows they had passed for hundred, thousands years ago but there are people who read them and understand them. Later Scientists like newtons, galileo etc also used in their books so that people don't understand how they calculate nature laws. I can know this because I have read most interes

Cryptography

Message decipher Introduction Cryptography is a field of science in which a sender encrypt information from outside world and then deliver through insecure medium. A person who work in secret intelligence, must share a his location with his friends so that they should complete their mission, or a person who know how to read ancient texts can protect information from some bad people. The prefix "crypt" means "hidden" or "vault" and the suffix "graphy" stands for "writing." Every writing system have one common property and that is "encoded message property". According to this property if you don't know how to read it then you don't know about key. For example I write a line another language and check whether this property satisfy my hypothesis.                                      علم  انسا ن کا اک رشتہ ئے This is a message which i need to understand. There are two possibilities to understand this message

Receiver bind to special type of methods

Welcome, After a long time, I will share next article about advance methods that can increase problem efficiency, very useful . Let's begin this. Method Value :      Method Value are special type of methods. These methods don't receive receiver parameter. That why they are special methods. These are generally use in package level api or client defined behaviour. Let study example case i package main import ( "fmt" ) type Op struct{ x int } func(o *Op)Add(y int)int{ return o.x +y } func main() { // case i op := Op{4}  // method value res := op.Add fmt.Println(res(4)) //case ii oprend := &Op{5}   // method expression add := (*oprend).Add fmt.Println(add(4)) } Method Expression:         Method Expression are similar like to method values, but there is one great difference and is methods take parameter as a receiver, just like old example but you can bind with more than one methods. In method expression (*T).f is an