bk AHC: Introduction

An excerpt from the book Advanced Handwriting Cryptography
[ full book.. sellfy.com/p/ujMc , free examples.. sellfy.com/p/HQH3 ].

1 Introduction.

Have you ever been in a situation where you needed to write up some private data in ways no-one else could read? Have you ever forgotten any access codes to your mails, logins to websites, codes of bank accounts, etc.? If not yet then perhaps the logins and codes you’re using are very simple and easy to crack, or youre using them often enough not to forget them. As theres a growing number of the services that require to remember certain access data, and certainly youre not going to use all of them whole the time, theres coming a day when youll be in trouble while trying to access one of the sites you urgently need to use, but have forgotten your password.. or even the login itself. So it would be very handy to have your own secure way of writing down the personal access data, a kind of personal secret language.
In this book Im going to explain the basic principles for creating a highly secure personalized handwriting code, an individual cryptography, and how to operate it securely without compromising it by your own unwilling giveaways of the code. At first it may seem as a complicated thing to take on, especially considering that I have spent over thirty years creating and improving the encryption method, but while you learn it youll see how easy it actually is. The reason it took so long time to find a practical solution is that it was hard to come up with a method which is easy to learn and simple to use, possible to personalize with little effort, yet secure enough against attacks by those trying to access your private data.

The advanced handwriting cryptography method described in this book is safer (can be safer when used properly) than any computer encryption can ever be. The reason for this is that no online interceptions, no screen shots of your computer created by hidden programs and accessed by hackers, no tapped keyboards, no spy cameras hidden around your places of work, nothing will reveal the messages hidden in the cipher text — your private sensitive information will be encrypted/decrypted in your head on the go and only encoded information will see the daylight. The code will be totally safe even if there is the plaintext out there, of something you wish to encrypt, if you are careful enough to separate plaintext from the cipher text never keeping the two in the same locations, and never relating the two in the ways someone could guess the match in the messages.

When using the method only yourself it is useful for encrypting..
.. passwords/access codes of your credit/debit cards;
.. logins and access codes of online services;
.. private financial deals;
.. places, times and tasks of confidential character;
.. names and contacts of selected people for their security;
.. personal opinions about your business partners in your contacts;
.. parts of personal diary with delicate information;
.. written information of a great value to your adversaries;
.. any written information for your personal safe use only.

There are additional benefits of the method while sharing encrypted messages with others, particularly with several recipients. These can be hard to implement, requiring some work in developing the code, but once the code is created and shared with trusted individuals then it can be used during entire lifetime. The specific benefits of sharing encrypted letters with others, compared to sharing unencrypted letters, are the integrity of the messages (no part of the messages can be removed without receiving parties noticing it), safety against loss of messages as every party involved can have the same letter (with exactly the same cipher text but differently encrypted message to each, with a different content when needed), and more. Details are discussed in the book.

On top of that the method can be used for marketing, entertainment, commercial and public safety needs, which are described in the book:
product promotion;
games and lotteries;
cryptic signatures;
cryptic orders;
safe message boards;
.. and much more.



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s