bk AHC: content, a reminder.

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3


1 Introduction.

2 A bit of history.

3 Why handwriting?

4 Relevance.

5 The method.

5.1 Getting an idea.

5.2 Seeking the information.

5.3 Learning all the details.

5.4 Working on your own.

6 Basic principles of handwriting encryption.

7 Techniques of encryption.

7.1 Confusion / substitution.

7.1a Information carriers.

7.1b Noise and distraction elements.

7.2 Diffusion / transposition.

7.3 Other techniques.

7.3a Data points method.

7.3b Mathematical method.

7.3c Art method.

7.3d Hiding method.

7.4 Writing styles.

7.5 Using switches.

8 Encryption symbols.

8.1 Base hieroglyphs.

8.2 Characters.

8.3 Additional signs.

9 Lists of symbols.

9.1 Classic text symbols (TS).

9.1a Alphabets.

9.1b Numerals.

9.1c Mathematical symbols.

9.1d Other symbols.

9.1e Highlighting and more.

9.2 Cryptic symbols (CS).

9.2a Diffusion symbols.

9.2b Correction symbols.

9.2c Assisting symbols.

9.2d Modifiers.

9.2e Switches.

9.2f Other tools.

10 How complex code is good enough?

11 Systematization and memorizing.

12 Sharing and personalization .

12.1 Sharing with one person.

12.2 Sharing with several people.

12.3 Temporary sharing.

12.4 Urgent sharing.

12.5 Key delivery.

13 Securing the method for recovery.

13.1 Recovery of encryption method.

13.2 Recovery of encrypted data.

14 For developers.

15 Application.

16 Example of glyph parts.

17 Examples of code creation.

17.1 Basic code.

17.2 Medium level code.

17.2a Matrix of symbols.

17.2b Encryption symbols.

17.2c The creation process.

17.2d Description of rules.

17.2d – 01 Basic rules of the code.

17.2d – 02 Base cryptic symbols (BCS).

17.2d – 03 Attached cryptic symbols (ACS).

17.2d – 04 Separate cryptic symbols (SCS).

17.2d – 05 Creating additional rules.

17.2e Writing sample.

18 Exercises.

18.1 Attention exercises.

18.2 Drawing exercises.

19 Commercial uses of the cryptography method.

19.1 Cryptic messages project.

19.1a Guessing of messages.

19.1b Creating a lottery.

19.1c Promotional ads.

19.2 Cryptic signatures.

19.3 Cryptic orders.

19.4 Other commercial uses.

20 Writing music.

21 Advanced games for training.

22 Cryptography in social life.

23 Cryptography in gambling.

24 The highest level method.

25 Work on the book.

26 Future of the method.

26.1 Writing without encryption.

26.2 Encoding without hieroglyphs.

26.3 About the next challenge.

27 Artwork.

28 To print / copy.

  • R-matrix.
  • C-list.
  • Drawing exercises.
  • Samples of world writings, horizontal.

  • Samples of world writings, vertical.

  • Encryption symbols, example of different parts.

  • Example of steganographic encryption.

29 Get in touch.

30 Legal notice.

31 Content.


download the full book: sellfy.com/p/ujMc


bk AHC: Examples of code creation. (17)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The examples are created as simple as possible for easy and quick understanding. While using these examples as a template for your own method you should alter the code significantly, with original keys and symbols of encryption.

17.1 Basic code. /…/ 

17.2 Medium level code. /…/

[ the chapters with examples of the basic and medium level encryption method are published in great detail in the free version of the book, on over 20 pages.. sellfy.com/p/HQH3 ]


bk AHC: Example of glyph parts. (16-b)

An excerpt from the book Advanced Handwriting Cryptography..

full book https://sellfy.com/p/ujMc / free examples https://sellfy.com/p/HQH3

Here’s an example of a cipher text how it would actually look, prior to showing you the possible different parts:


The different ways to connect the glyphs are here hard to notice to those who don’t know where ends the base glyph and where begins the connection part between glyphs, which can actually be a separate cryptic symbol. Without showing you the separate parts in different colors it would be impossible to determine (for those who don’t have the key) where are the base glyphs and where are the attached parts.

An example of separate parts in writing the glyphs together..


Now lets have another look at this. In case of different parts of the similar looking glyphs chosen as base glyphs, and therefore different ways of encoding information, the separate parts of the similar cipher text may be as this..


Notice, the attached parts weren’t possible to distinguish without knowing the base glyphs, and that’s just one of the easiest examples I have given you. During design of the encryption elements in your code you must consider all the reasonably applicable ways to confuse possible adversaries, but not going to such length as to confuse yourself. There are more tools and ways to make the code sufficiently strong, not only the style of writing and visible/invisible attached parts of the glyphs.

bk AHC: Example of glyph parts. (16-a)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

There are countless ways to create glyphs with different parts, so here I’ll give you just an idea, not a rule for following. It’s always better if each and every code is created unique, not copied from the book or anybody else. An allegoric comparison can be made with music — if someone gives you an instrument and you’re free to play then you don’t need to play the same melodies that others do, you can compose your own, but you’re still bound by the principles of music and by the possibilities of the instrument. But if you look around then you’re not bound to the instrument neither.. you can find another type of instrument. And if you’re talented enough you can even build your own original instrument. But no matter what instrument you have you’re still bound by the rules of the music. This is like the boundary of the cryptography, the rules you must follow in order for the cryptography to accomplish the task of encoding. But you can use whatever suitable instruments.. whatever hieroglyphs or other symbols that cannot be even called hieroglyphs, as long as you’re able to encode data with the tools you’ve chosen or created your own.

Here are some examples of different parts of glyphs..


In the samples above the base glyphs are black and data points are in several colors. The gray part in the end of the glyphs is an example of connecting glyphs in different ways. The different connections between glyphs can carry specific information or may be just a design element, a noise.

bk AHC: Application. (15)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The method of encryption I developed can be applied to any language, without exemptions, thus anyone can make use of it. I guess even aliens could use this method to transfer information as long as they produce sound, and even without sound. The method is based on representing one kind of information with another type of information, thus even music can be written using this encryption method. But the main application, in my opinion, is keeping your boring moments in life filled with an interesting and useful activity and keeping your brain active for the health of it. There are countless situations in life when people get stressed because something is happening just too slowly, forcing them to wait. I filled many of those moments thinking about the cryptography – either developing a system in mind or repeating the symbols not to forget them. In some occasions, when I was tired of working on a new system, I challenged myself to recall a discarded system which I have created long ago, and very successfully, being surprised how well I have remembered things I thought to have long forgotten. I wasn’t able to do it in the beginning but after years of training my capacity to memorize has grown quite a bit. My life has never been boring and for me the encryption was never a means for really hiding some information.. I don’t keep a diary and there’s no really a point in encrypting an address book – the data like phone numbers is possible to find out by other means if someone really wants to. After I did it once, for training purposes, I have never again encrypted my contacts. I am a developer.. I had interest in creating ever more sophisticated methods of encryption rather than really using them. It doesn’t mean I won’t, because now I have my own method which I’m happy with, but previously there was no point to encrypt something for a long time storage because after creating yet another code I didn’t use the old one anymore and purposefully tried to forget the old system which I didn’t use, not to confuse with the new one.

Creating your own writing method is an excellent memory training and on top of that it trains you in multitasking. For example if you stay in a queue in a shop exercising cryptography in your mind you cannot just lose your attention falling deep into thoughts – you must pay attention to everything around you, not to let have something stolen from you. You can clean your house and train your brain the same time – what an excellent application in my opinion. You can achieve the level when you walk around in a city for your daily stuff and develop cryptography in mind at the same time. I wouldn’t advise driving while doing so, unless you drive a car in a computer game. In any case, after some time of training you’ll be able to have complex tasks going on in your brain without affecting your attention to surroundings. I would even claim that you’ll be reacting more adequately to the situations around you when your brain is actively working on something than if you hang around on autopilot. When it comes to memorizing and recalling it’s quite clear from recent studies that human memory is specific to states. It means if you learn the glyphs in a quiet environment in home and try to recall them in other places, often in quite complex situations, you’ll present to your brain an extra challenge. With changed states (different surroundings, environment) between learning and recalling of learned information you’ll be creating and strengthening new paths in your brain (especially for finding connections in seemingly unrelated information), giving your brain extra capabilities which will help you in many ways.

Continue reading “bk AHC: Application. (15)”

bk AHC: For developers. (14)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

There a several methods of encoding which I have realized as a possibility but haven’t paid much attention to:

An easy one.

Develop a method of encryption which involves taking encoded symbols into separate parts and hiding them in a script or in an artwork. While hiding the symbols in an art do it the way that the parts of symbols wouldn’t be easily spotted as some kind of hidden message.

A complex one.

Add to the script a second layer of information by controlling already used symbols in the script. You can do it by combining parts of the symbols within the script or by changing their values, and pointing them out for the second layer encoding. The second layer must not change the message in the first layer. It’s possible to accomplish by utilizing some of the noise tools as the values of the second layer, without visual damage to the design of the script. You can also come up with an original solution which I haven’t realized yet.

A challenge.

Develop a method of encryption where the hieroglyphs contain encoded verification against an error. It means that if you encrypt an access code or telephone number and it doesn’t work after decryption, then you will be able to determine which symbol was encoded with an error in it, and consequently will be able to deduce the possible set of symbols one of which will be true.

bk AHC: Recovery of encrypted data. (13.2)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

To make sure that your encrypted data is always recoverable you must create the method which isn’t cryptographically dependant over long distances in the cipher text. Just a few cryptic symbols in length of dependance is enough for a secure code against hacking and yet secure against loss of data. If your symbols of encryption modify each other over many elements in distance then just one error may mean the loss of entire word, while in shorter interdependence within the cipher text will mean a loss of just a few symbols, in case of an error of encryption. The method which I’m presenting in this book does not require the code to be severely interdependent over long distances to be secure. The method was developed keeping in mind that people do make errors, thus the errors must not affect the recovery of data. To secure yourself against the loss of unrecoverable data — like a digit of a code or of a phone number — you better write it down twice, encrypted in different ways. Do not be over-confident while encrypting the data that in case of loss may cause you troubles. Rather take the trouble to encrypt the important part few times differently to be sure to recover the code/number when there’s an error in one section of the cipher text.