bk AHC: The highest level method. (24-b)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

It will be impossible to crack a properly created highest level code because those who would attempt to crack the code will have no access to so many parts of the puzzle:

  • number of dimensions in the matrix;
  • size of the dimensions in the matrix;
  • all of the real symbols used in the encryption method;
  • which alphabet letters and punctuation marks are doubled/tripled/quadrupled/.. within the matrix;

  • how many sets of numbers there are in the matrix;

  • which alphabet letters are combined into syllables in the matrix and how;

  • how numbers are combined into pairs within the matrix;

  • how many positions in the matrix are utilized for noise;

  • commands and switches used in the encryption method;

  • position of real symbols/commands/modifiers/switches in the matrix;

  • values of the elements in the glyphs (lines, line breaks, curves, dots etc.);

  • relative sizes of valid elements in glyphs;

  • valid combinations of elements in glyphs;

  • values of valid combinations of the elements in glyphs;

  • context of applying values in elements of glyphs;

  • elements in glyphs with no values, the noise;

  • reading patterns of values within glyphs;

  • number of reading patterns within glyphs and when they change;

  • up to how many glyphs takes to access one location in matrix;

  • changes in the application order of different hieroglyphs;

  • rules of access of information in the matrix;

  • context of using symbols and commands in the matrix;

  • which words are preset and encrypted with a single symbol (TS and/or CS);

  • how the preset words are created within hieroglyphs or within the matrix;

  • which prefixes and suffixes are preset and how are they used in the code;

  • which grammatical rules are preset for easy creation of sentences;

  • in which context the preset grammatical rules apply within cipher text;

  • abbreviation tools for words within cipher text (TS/CS);

  • abbreviation tools for sentences/propositions within cipher text (TS/CS);

  • highlighting tools within cipher text;

  • error correction tools within cipher text (TS and CS):

  • copy/add/paste tools within cipher text (TS and CS);

.. and more — only known to me;

.. and much much more, limited only by the imagination;

(The CS in context of the highest level method means specific combinations of the elementary parts — the elements from which the glyphs are created on the spot — lines, dots, etc., and not the ready glyph parts as in basic/medium/high level code).

The possible number of different combinations of all of this is quite impossible to determine. Even if the number of possible combinations of the separate elements (lines, angles, curves etc.) can approximately be determined by some level of human precision in writing, and by that also the number of possible combinations between the elements in a glyph, then possible number of rules can only be limited by human imagination. So the lifetime safety of your code is guaranteed because even the repeating hieroglyphs which you happen to create on the spot similar to each other, don’t need to carry the same information — the hieroglyphs can change access values depending on context (previously encrypted information or previously used elements in the cipher text). After all, you’ll not be encrypting everything in life, only in case of necessity, thus there will never be the critical mass of a cipher text out there even to consider an attempt of cracking the code. Regardless of all the mathematical impossibility to determine the used logic of encryption by third parties the code is still simple to use by those who know the key. In the sense of the cryptography method, while numbers are being used as values hidden in the glyphs to access information in the matrix, you can say that a hieroglyph is worth more than a thousand numbers.

Before going for the highest level code for your personal use you should begin practicing with the simpler versions, which can also be useful in some occasions. You should always keep in mind the Basic Principles of Handwriting Encryption (described in the chapter 6). Without paying attention to the basic principles whole your work may turn out useless – the keys to your code must remain secret.

One remark about whatever encryption method, not only the method described in this book: If there’s a real need to crack a code of a common person then in many cases a simple, verified by historic accounts method — fingers under the chair — will produce all the necessary keys. Thus, don’t overwork with this, have some common sense and consider your realistic needs, not an utopian scenario of aliens attacking and necessity to have an unbreakable code against an advanced civilisation, to save mankind.


a reminder, my books.. sellfy.com/youthextension

bk AHC: The highest level method. (24-a)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The medium and high level encoding techniques of the advanced handwriting cryptography method aren’t principally very different. Both of them are utilizing ready parts of hieroglyphs which in correct combinations are pointing to precise locations in the matrix. The difference in them comes mostly from the amount and level of complexity of the rules. The highest level encryption technique is more complex and more simple at the same time, depending on the point of view.

Lets have an overview first, beginning with the most basic level:

In the most basic level (chapter 17.1) the combinations of the cryptic symbols are very straightforward, with no many possibilities of different combinations of BCS, while utilizing several additional cryptic symbols, ACS and SCS, for safety.

In the medium level code (chapter 17.2) there are many more combinations of BCS with ACS, which can by themselves change value with the help of correction symbols and some SCS. The ACS/SCS themselves are also much more numerous.

In the high level code (which I mentioned within the chapter 17.2) the principles are similar to the medium level code but with less BCS and many more possibilities of applying different rules to access information in the matrix, with the help of a larger number of ACS/SCS in many different combinations.

Now, the highest level code has no specified BCS, ACS or SCS at all, only specific rules to read information from the angles of lines, curves, dots, circles, triangles, crossing lines in different (relative) angles, relative positions/sizes of the elements and so on. There are countless possible combinations of them with consequently changing values which are also context dependant, location dependant, relative size dependant and more.. not all the specifics I can make known here because that’s the method I use myself. You can already get the idea that in the highest level code there’s no list of cryptic symbols, only the rules of reading values from the elements of the glyphs and very complex matrix with many dimensions. All the hieroglyphs in the cipher text are created on the spot by the specific rules which allow to encrypt/decrypt values in the glyphs for accessing information in the matrix. It may all look a bit similar to the principles of Chinese/Japanese hieroglyphs but with way more clear rules, because the rules of cryptography specify precise numerical values for accessing data in the matrix — no varying exceptions which are present in any natural language. Of course you can include at will specific exceptions to your highest level code and with that to make the code even more secure, but there’s no need for it. The code is in principle already extremely secure. You can use for noise any combinations of the elements which aren’t included in the rules. As a reminder: a single specific symbol or specific combination of symbols designated for the purpose can discard all of the default rules which allows you to design for noise (and for aesthetic look) any hieroglyphs at will, including the elements which in default conditions you’re using for encoding with valid values. The options of including noise in the cipher text are limitless.


a reminder, my books.. sellfy.com/youthextension