the absolute truth.

if there’s anything absolute in the world, encompassing everything, being everywhere, treating everyone equally depending how they follow the rules, then this is mathematics. your opinions, wishes and prayers won’t change its integrity.. everyone can only get it right or wrong. it’s available for everyone at all times — you only need to learn it to understand its workings. and if you do — if you believe in it, follow it and rely on it — then it will benefit your life more than you can imagine. there’s nothing closer to the description of god than mathematics. i believe in it more than anything else, because i can trust it — the mathematics always tells the truth, if you understand it correctly, and there are ways to verify it. if you listen to mathematics what it really tells you, it never fails you. you cannot disturbe its purity with your thoughts and prayers — everything has ever gone, goes, and will be going for ever according to the plan of mathematics. it is way bigger than you — it is impossible for any one person to grasp all the workings of mathematics.. you only need to learn enough of mathematics to follow its rules to improve your life, to rely on its help when needed. mathematics is pure and perfect — you will never be able to compete with its absolute truth and power.

Advertisements

it all makes sense

if that’s true that god exists then no wonder the world is so messed up. imagine the god trying to carry out his plan when there are millions of people insisting on him to change his plan with prayers, in their favor. what a disrespect towards the god’s plan anyway.. it’s like almost all the passengers of an airplane teaching a pilot how to fly the plane, in the middle of the flight. the more people there are praying the more messed up the world becomes. it will be better for the world if the god will be left alone and people be relying on the tools that the god has already provided them with, according to his original plan. particularly their brains.

bk AHC: Securing the method for recovery. (13)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

To secure your encryption method against problems from possible gaps in your memory, especially after not using your code for a while, you must have all parts of the code organized in a clear order. The code can be safer if all of the cryptic symbols are in random order and memorized as such, but what the code is worth if you can’t remember your own cryptic symbols after a while. Definitely the system of cryptic symbols cannot be made completely in a logical order, that if few of the symbols are known then all the others could be determined. Rather the elements of the method must be a compromise between total randomness and total order. The cryptic symbols must be created in small logical blocks while the blocks themselves should better be not related by the design of the symbols. Each block of the symbols must have enough logically ordered symbols in them so that in case of forgetting one of the symbols you can think of another symbol within the block, and after recalling it you can determine the design of the forgotten symbol. Same with the real symbols in the matrix — these must be ordered in small blocks where all the elements of the block are in certain order which would be easy to recall if one symbol is forgotten. In case of the rules of access of the real symbols in the matrix by the cryptic symbols there’s no real need to use certain order, because you will be using the rules any time you encrypt and decrypt — the rules are difficult to forget. With the design of cryptic symbols and with the location of real symbols in the matrix it is possible that you won’t be using one particular symbol for so long time that it may get forgotten, thus certain order must be established. If there are some rules of access that you rarely use then you better memorize the exact number of rules you have created and repeat the rules in mind recalling each and every rule, from time to time. Repeating every element of the code, be it all of the cryptic symbols, all of the real symbols in the matrix, or all of the rules of access, must be done regularly, if you wish to never encounter gaps in memory. For that all the elements of the code is better to create in blocks of certain size which you could easily remember. The repeating process of all of the elements is much easier when you know exactly how many elements there is in each block of your system, then there’s no worries that you will forget to repeat one of the elements. Repeating itself must be done not too often that it will become boring and you will abandon the cryptography. Rather challenge yourself — after a good memorizing do not think of any of the elements of the code for a while, even for few months, and then try to recall every single element without errors. You’ll be surprised how good your memory actually is in recalling the things you yourself have created.

bk AHC: Key delivery. (12.5)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Whenever you have the chance to meet the other person to hand over the keys to the code directly, that’s the safest way, if the person memorizes the keys to the code immediately and eliminates all traces of the keys. If that’s impossible, if you must send the keys using help of other people, for diminishing the risk of the keys being disclosed to unwanted parties you can send them in separate parts through different people. For delivery you can divide the keys into so many separate parts as necessary. The different keys themselves can be divided — the matrix can be divided and each part of the matrix can be sent to the other person by a different route. You can also send false parts of a matrix, which won’t be used. In case of the most basic version of the code the vertical set of glyph parts can be sent separately from the horizontal set of glyph parts, and the additional symbols (modifiers) can be sent separately. You can also send the parts of the key by regular mail service using special envelopes. Or even better: send some parts of the key by regular mail and some parts by a person you trust. All these precautions are symbolic, because if someone really wants to know what’s going on then your house can be bugged with hidden cameras — the technology is in such a level now that even if the handwriting cryptography is needed in certain cases, no encryption will ever provide total security in exchange of information. Your cryptography method can remain secure for ever — it will not need to be cracked to figure out your activities and most probable intentions. There are ways around all the encryptions to access the decrypted information directly, when the stakes are sufficiently high or the curiosity is sufficiently big.

bk AHC: Urgent sharing. (12.4)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

For an urgent sharing of a new code when an old code has been compromised, when there’s no possibilities to deliver the entire key to the new code confidentially in person, then there can be made different modifications to the compromised code. The simple modifications can be made to the positions of real symbols within the matrix, moving around entire blocks, and within the glyphs, moving them few steps back or forth. The specific modifications are possible to explain in words over a secondary channel, not by which the cipher text is delivered, even by phone. If you’re wise enough and preview such possibility then you can agree in advance with all the involved parties which changes to the code will be made in case of an urgency or emergency, but never use these modifications until there’s a real urgent need for it. Then you spare yourselves from possible misunderstandings by verbal explanation of the modifications over a phone.  After a code has been compromised it is safer to create a new code, of course, but in certain conditions, in case of an urgency, an old code can be used for delivering short messages using the modified keys. The modifications to the positions of the glyphs and to the symbols in the matrix accumulate into a quite a significant change in the code and in case of an urgency it may temporarily help you out. You can have several most basic codes ready for such cases, numbered or given code names to them, but that implies that the keys of these codes must be somewhere ready to use, not only in your memory. It will be safer to use urgent modifications and deliver them verbally than relying on a key that has been lying around somewhere, in places of all involved parties.

bk AHC: Temporary sharing. (12.3)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

When sharing the code between several people there may happen situations when you need to share the code with one of the parties only temporarily, while excluding the temporary party later from the capacity to understand the secure communication.  For not creating entirely new code for these occasions you must trust the person in general, simply having no need to disclose every secure exchange of information. For that purpose you must have for the same matrix a different layout of symbols (TS) as the new key. The cryptic symbols and the rules remain the same, so all the permanent parties will have an access to the code, while decrypting the messages in a usual way, simply with the different positioning of symbols in the matrix. This technique of only changing matrixes can be used for any arrangement of involved parties of secure communication while all of them know the general set of keys. For the parties not involved in a given communication it will be hard to get the encrypted messages because the excluded parties won’t have the specific layout of symbols in the matrix and they won’t have the specific message neither. Thus quite a large number of trusted people can use the same code with no need to create yet another code for a different message to different people — only one part of the key can be changed, and that can aslo be only a temporary key for a person temporarily involved.

AHC: Sharing with several people. (12.2)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Again, first you must make clear how long time and for how big data sets in length (in total, over time, using the same code) you’re planning to use the encryption method. And of course also for how serious issues in sense of confidentiality — this determines the level of complexity of the code you will create for sharing with several people. Mostly the procedure is the same as while sharing with one person only, with a little distinction — you may want to add to your code different sets of cryptic symbols for each party, which means that the party who accidentally gets the wrong encrypted message will discard the ‘wrong’ cryptic symbols as noise, and as the result won’t be able to decrypt the whole message. This method of encryption allows to send messages to all of the involved parties in exactly the same cipher text while each of the parties can receive specific messages meant only to them, using a set of cryptic symbols others won’t be able to read. All the other parties won’t see anything wrong with the entire message, decrypting only the general message meant for reading by all involved parties.