Skip to main content


Showing posts from October, 2019

Do you support us?

Business address

Rosicrucian cipher

In 1513 Cornelius Agrippa introduce early form Rosicrucian Cipher in his books Occult of Philosophy. Geometric and simple substitution cipher are well known ciphers      Pigpen , Freemason, Napoleon and tic tac toe ciphers in which alphabets or symbols arrange in grids.  This is an anagram, "How to reconstruct a data " lets encode the message.       Pigpen cipher , Rosicrucian and Tic tac toe Cipher                      Thank you have a good day.    

ROT13 community

ROT13 is a member of  substitution cipher class. I had discuss two members of  this class, if you remember.            Atbash cipher           Affine Cipher (shift cipher) If you remember the history which I had share you. Atbash cipher encode message by shifting key = -1 but in inverse direction.           A = Z, B = Y and so on. However in shift cipher key = 3.                 Message : HELLO                                 : JGNNQ Both ciphers are special affine cipher case. As you know shift cipher had introduced by julius caesar in rome. Julius had encoded message by shifting letter 3 time forward, so that it will not understand. However after 2 or 3 decade later it's is easy to decipher. The above example use same technique. In Rot13 alphabets shift by 13 letters.             A = N, B = O and so on.          Let time to solve a riddle:                     Yrg cynl n tnzr. Zl anzr vf Ze K. Zngurzngvpf fbyir ernyvgl ceboyrzf, ohg fpvrapr yngre cebir gur inyvqvg

Solve Juggle Pieces

Hello guys, Today is quite interesting topic "Juggle the pieces", this is elaborate after affine ciphers. Affine Ciphers are monoalphabetic ciphers, because every alphabet map against a number. Affine cipher introduce modulus operator. There are so many ciphers build on affine ciphers. Previous cipher Oh yeah, very well Atbash cipher also a good example of this category. Mathematical Statement:                 E(X) = D(E(X))-----------------------------------------------------(0)                 here E is a function that take parameter x and return encrypted text. Similar with D function but this is inverse function of E.                  E(x) = (ax+b) mod m--------------------------------------------(1)                   a, b are keys and m is size of alphabetic, while modules (mod) is an operator which help to solve the equation. a , m both of them are co prime. X key-factor{R{0,..... m-1}}                 D(x) = a^-1 (x-b) mod m------------------------------------

Dirt speak truth.

Hello, Welcome back. Many people believe that ciphers start from caesar cipher. Some are believe  hieroglyphics are first. When archeologist had discovered that israel civilization use cipher, 1000 years before egyptian civilization. Israel civilization had introduced first cipher system named as atbash cipher system. Atbash cipher belong to monoalphabetic substitution cipher category. It's simple, You can replace first letter with last one and so on.                         A = Z , B = Y ...     Do you solve decipher a text               message : "Meet me at 9pm " you can comment your  answer in comment section. In holy book ingir(Bible) there are many verses proves atbash cipher system existence.  Sheshach    is word used in Holy Book. According to wikipedia Sheshach is common example. However this verse where Sheshach found  "The king of  Sheshach  shall drink after them". When cryptographer decrypt with the help of atbash cipher, it provide us mind

Cryptography and Writings

Hello Guys, welcome back. I hope you had read so many poems, but cryptography also used in poetry. Wired Idea? No it's true, even cryptography use in Holy Books, writings etc.  The Morning Sun , I hope you like to read this poem . How cryptography works in poetry , writings and holy books.  Let's start with Holy books, there are thousand of meaning a single verses. That's a beauty of cryptography. In Sufism it's called divine layer which can hide in their verses. Verses are generic and abstract, so you can take advantage in any context, it will guide you. You can try it. People impress with this techniques, so they use in their own writing i.e Rumi, Sheikh Saadi etc. Everyone knows they had passed for hundred, thousands years ago but there are people who read them and understand them. Later Scientists like newtons, galileo etc also used in their books so that people don't understand how they calculate nature laws. I can know this because I have read most interes