bk AHC: Recovery of encrypted data. (13.2)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

To make sure that your encrypted data is always recoverable you must create the method which isn’t cryptographically dependant over long distances in the cipher text. Just a few cryptic symbols in length of dependance is enough for a secure code against hacking and yet secure against loss of data. If your symbols of encryption modify each other over many elements in distance then just one error may mean the loss of entire word, while in shorter interdependence within the cipher text will mean a loss of just a few symbols, in case of an error of encryption. The method which I’m presenting in this book does not require the code to be severely interdependent over long distances to be secure. The method was developed keeping in mind that people do make errors, thus the errors must not affect the recovery of data. To secure yourself against the loss of unrecoverable data — like a digit of a code or of a phone number — you better write it down twice, encrypted in different ways. Do not be over-confident while encrypting the data that in case of loss may cause you troubles. Rather take the trouble to encrypt the important part few times differently to be sure to recover the code/number when there’s an error in one section of the cipher text.

Advertisements

bk AHC: Recovery of encryption method. (13.1)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Against the loss of certain elements of the encryption method which you have created it is a good idea to have written down some irrelevant data, but which is logically continuous, using the encryption elements which are rather rarely in use. Then you can check the sample record and to recover the forgotten element of the code at any time. After that had happened couple of times then you won’t even need to look at the sample script anymore — you can then think of it in your mind and the rarely used encryption element will be in your mind quite fast. If some of the elements has had taken very long time and much effort to recover then write an additional sample code using that hard to remember element, then the next time you will recall it faster, if forgotten again. These things do happen, because it’s unlikely that you’ll be using every single element of your encryption method whole the time. So, thinking of the possible troubles you can protect the integrity of your code with the samples of cipher text.

the absolute truth.

if there’s anything absolute in the world, encompassing everything, being everywhere, treating everyone equally depending how they follow the rules, then this is mathematics. your opinions, wishes and prayers won’t change its integrity.. everyone can only get it right or wrong. it’s available for everyone at all times — you only need to learn it to understand its workings. and if you do — if you believe in it, follow it and rely on it — then it will benefit your life more than you can imagine. there’s nothing closer to the description of god than mathematics. i believe in it more than anything else, because i can trust it — the mathematics always tells the truth, if you understand it correctly, and there are ways to verify it. if you listen to mathematics what it really tells you, it never fails you. you cannot disturbe its purity with your thoughts and prayers — everything has ever gone, goes, and will be going for ever according to the plan of mathematics. it is way bigger than you — it is impossible for any one person to grasp all the workings of mathematics.. you only need to learn enough of mathematics to follow its rules to improve your life, to rely on its help when needed. mathematics is pure and perfect — you will never be able to compete with its absolute truth and power.

it all makes sense

if that’s true that god exists then no wonder the world is so messed up. imagine the god trying to carry out his plan when there are millions of people insisting on him to change his plan with prayers, in their favor. what a disrespect towards the god’s plan anyway.. it’s like almost all the passengers of an airplane teaching a pilot how to fly the plane, in the middle of the flight. the more people there are praying the more messed up the world becomes. it will be better for the world if the god will be left alone and people be relying on the tools that the god has already provided them with, according to his original plan. particularly their brains.

bk AHC: Securing the method for recovery. (13)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

To secure your encryption method against problems from possible gaps in your memory, especially after not using your code for a while, you must have all parts of the code organized in a clear order. The code can be safer if all of the cryptic symbols are in random order and memorized as such, but what the code is worth if you can’t remember your own cryptic symbols after a while. Definitely the system of cryptic symbols cannot be made completely in a logical order, that if few of the symbols are known then all the others could be determined. Rather the elements of the method must be a compromise between total randomness and total order. The cryptic symbols must be created in small logical blocks while the blocks themselves should better be not related by the design of the symbols. Each block of the symbols must have enough logically ordered symbols in them so that in case of forgetting one of the symbols you can think of another symbol within the block, and after recalling it you can determine the design of the forgotten symbol. Same with the real symbols in the matrix — these must be ordered in small blocks where all the elements of the block are in certain order which would be easy to recall if one symbol is forgotten. In case of the rules of access of the real symbols in the matrix by the cryptic symbols there’s no real need to use certain order, because you will be using the rules any time you encrypt and decrypt — the rules are difficult to forget. With the design of cryptic symbols and with the location of real symbols in the matrix it is possible that you won’t be using one particular symbol for so long time that it may get forgotten, thus certain order must be established. If there are some rules of access that you rarely use then you better memorize the exact number of rules you have created and repeat the rules in mind recalling each and every rule, from time to time. Repeating every element of the code, be it all of the cryptic symbols, all of the real symbols in the matrix, or all of the rules of access, must be done regularly, if you wish to never encounter gaps in memory. For that all the elements of the code is better to create in blocks of certain size which you could easily remember. The repeating process of all of the elements is much easier when you know exactly how many elements there is in each block of your system, then there’s no worries that you will forget to repeat one of the elements. Repeating itself must be done not too often that it will become boring and you will abandon the cryptography. Rather challenge yourself — after a good memorizing do not think of any of the elements of the code for a while, even for few months, and then try to recall every single element without errors. You’ll be surprised how good your memory actually is in recalling the things you yourself have created.

bk AHC: Key delivery. (12.5)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Whenever you have the chance to meet the other person to hand over the keys to the code directly, that’s the safest way, if the person memorizes the keys to the code immediately and eliminates all traces of the keys. If that’s impossible, if you must send the keys using help of other people, for diminishing the risk of the keys being disclosed to unwanted parties you can send them in separate parts through different people. For delivery you can divide the keys into so many separate parts as necessary. The different keys themselves can be divided — the matrix can be divided and each part of the matrix can be sent to the other person by a different route. You can also send false parts of a matrix, which won’t be used. In case of the most basic version of the code the vertical set of glyph parts can be sent separately from the horizontal set of glyph parts, and the additional symbols (modifiers) can be sent separately. You can also send the parts of the key by regular mail service using special envelopes. Or even better: send some parts of the key by regular mail and some parts by a person you trust. All these precautions are symbolic, because if someone really wants to know what’s going on then your house can be bugged with hidden cameras — the technology is in such a level now that even if the handwriting cryptography is needed in certain cases, no encryption will ever provide total security in exchange of information. Your cryptography method can remain secure for ever — it will not need to be cracked to figure out your activities and most probable intentions. There are ways around all the encryptions to access the decrypted information directly, when the stakes are sufficiently high or the curiosity is sufficiently big.

bk AHC: Urgent sharing. (12.4)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

For an urgent sharing of a new code when an old code has been compromised, when there’s no possibilities to deliver the entire key to the new code confidentially in person, then there can be made different modifications to the compromised code. The simple modifications can be made to the positions of real symbols within the matrix, moving around entire blocks, and within the glyphs, moving them few steps back or forth. The specific modifications are possible to explain in words over a secondary channel, not by which the cipher text is delivered, even by phone. If you’re wise enough and preview such possibility then you can agree in advance with all the involved parties which changes to the code will be made in case of an urgency or emergency, but never use these modifications until there’s a real urgent need for it. Then you spare yourselves from possible misunderstandings by verbal explanation of the modifications over a phone.  After a code has been compromised it is safer to create a new code, of course, but in certain conditions, in case of an urgency, an old code can be used for delivering short messages using the modified keys. The modifications to the positions of the glyphs and to the symbols in the matrix accumulate into a quite a significant change in the code and in case of an urgency it may temporarily help you out. You can have several most basic codes ready for such cases, numbered or given code names to them, but that implies that the keys of these codes must be somewhere ready to use, not only in your memory. It will be safer to use urgent modifications and deliver them verbally than relying on a key that has been lying around somewhere, in places of all involved parties.