View allAll Photos Tagged cryptography

Anja is talking about 'Message Authentication for Streams with Delayed Keys'

The radio/crypto room. Decrypting messages was done manually - type in the mess you got over Morse into the crypto teletext, and then see what you got out.

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

To demonstrate the complexities of ciphers, cryptography and codebreaking, James Grime brought along this original Wehrmacht Enigma 1, now 80 years old, and used by the German air force and army. It works perfectly. The only concession to modernity is the replacement battery.

 

This Enigma machine is serial number A6551, and is owned by none other than Simon Singh, author of The Code Book and Fermat's Last Theorem.

 

Original D72_2040.JPG

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

If you’re a parent looking for a way to prevent the chorus of ‘I’m borrrrrrred’ in your house this coming summer, consider inspiring your child with an immersion into the world of science at the University of the Fraser Valley.

 

Back by popular demand, UFV’s Science Rocks! summer day camps are designed for local students in Grades 4-6 (as of Sept ’11). Each of the five different camps is structured to encourage the development of scientific problem-solving skills and to help campers learn fundamental scientific principles in a fun, hands-on way.

 

The camps are led by current senior UFV science students or recent alumni, and are supervised by UFV science professors.

 

For returning campers: we have changed the themes for the weeks so that every week includes all the various science areas. In any of the weeks you can expect to do activities from physics, biology, chemistry, mathematics, computer science, geography and kinesiology.

2011 camps:

 

Camp 1: July 4–8, Abbotsford

Volcanoes, Van de Graaff and Vapor

What causes waves?

Does space ever stop?

What causes potholes?

  

Camp 2: July 11–15, Abbotsford

Cryptography, Codes and Crime Scenes

Can fish breathe air?

Why is there liquid inside a blister

Where does weight go when you lose it?

 

Camp 3: July 18–22, Abbotsford

Animation, Animals and Artifacts

Why do mosquito bites itch?

Where do fish go in winter?

Why do camels spit a lot?

 

Camp 4: July 25–29, Abbotsford

Lasers, Light sabers and Lightning

What is a googol?

How does the earth float in space and not fall?

Do rocks grow?

 

Camp 5: Aug 8–12, Chilliwack

The very best of Science Rocks!

For this week we plan to offer our most popular activities from all

the weeks of Science Rocks!

 

Registration forms and additional information — as well as some great photos from last year’s camps — are available online at www.ufv.ca/sciencerocks. Registration opened April 1 and seats fill up quickly!

 

Camps are limited to 30 students each and will run Monday–Friday, 8 am–5 pm. UFV Science students will provide guidance for campers as they explore intriguing scientific phenomena and participate in fun physical activities between sessions.

 

Each individual camp costs $250 (includes all activities and supplies, lunches, t-shirt, and completion certificate). There is a discount if you enroll your child in more than one week.

 

For more information please email sciencerocks@ufv.ca or leave a message at 604-851-6346 and we will get right back to you!

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Close up of the steam-driven generator showing tiny pressure gauge and ammeter.

Motorola SECTEL 2500 Going Secure

Tunny machine for cracking Lorenz. Uses punch-tape programming.

Vishruti is from Ahmedabad, India, and has dreamed of turning Tartan ever since she was 12 years old. She hopes the robust courses and hands-on practical approach at the INI will help her land her dream career as a security expert in the field of cryptography. Fun fact: "People are amused when I tell them that my alternate career choice was to become a painter! I love painting, as it provides me a sense of freedom that the real world cannot."

Edgar Allan Poe (January 19, 1809 – October 7, 1849) was an American poet, short-story writer, editor and literary critic, and is considered part of the American Romantic Movement. Best known for his tales of mystery and the macabre, Poe was one of the earliest American practitioners of the short story and is considered the inventor the detective-fiction genre. He is credited with contributing to the emerging genre of science fiction. He was the first well-known American writer to try to earn a living through writing alone, resulting in a financially difficult life and career.He was born Edgar Poe in Boston, Massachusetts. Poe, whose parents died when he was young, was taken in by John and Frances Allan, of Richmond, Virginia but was never formally adopted by them. After spending a short period at the University of Virginia and briefly attempting a military career, Poe and the Allans parted ways. Poe’s publishing career began humbly, with an anonymous collection of poems, Tamerlane and Other Poems (1827), credited only to “a Bostonian”.

 

Poe switched his focus to prose and spent the next several years working for literary journals and periodicals, becoming known for his own style of literary criticism. His work forced him to move between several cities, including Baltimore, Philadelphia, Pennsylvania and New York City. In Baltimore in 1835, he married Virginia Clemm, his 13-year-old cousin. In January 1845, Poe published his poem “The Raven” to instant success. His wife died of tuberculosis two years later. He began planning to produce his own journal, The Penn (later renamed The Stylus), though he died before it could be produced. On October 7, 1849, at age 40, Poe died in Baltimore; the cause of his death is unknown and has been attributed to alcohol, brain congestion, cholera, drugs, heart disease, rabies, suicide, tuberculosis, and other agents.

 

Poe and his works influenced literature in the United States and around the world, as well as in specialized fields, such as cosmology and cryptography. Poe and his work appear throughout popular culture in literature, music, films, and television. A number of his homes are dedicated museums today.

 

ACTIVITY:

 

Read Edgar Allan Poe's life. Look at the pictures and locate them on a map. Classify them in chronological order following Poe's lifelines.

An Enigma machine

 

Taken at Bletchley Park

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Royal Holloway finds a mention in the Harry Potter series of books and a few parts of the college can be seen in 'Basic Instinct 2' and in some of the 'Harry Potter' movies. Also Sophie Neveu (from the Da Vinci Code) studied cryptography at Royal Holloway (if u can recall).

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

 

Alan Turing es pot anomenar el Pare de la Informàtica, ja que fou ell qui teoritzà el funcionament dels ordinadors, i contribuí fonamentalment a la seva construcció. Malauradament, al final de la seva vida és tragic per algú que contribuí a salvar tants milers de vides escurçant la Segona Guerra Mundial.

 

ca.wikipedia.org/wiki/Alan_Turing

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

Alan Turing is the father of computing; he layed out the theory and was involved in the development of the first computers. Sadly, all his huge contribution to shortening WWII and thus saving hundreds of lives wasn't recognized, and even died in terrible circunstances.

 

en.wikipedia.org/wiki/Alan_Turing

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

 

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

150416-N-FQ994-063 MEDITERRANEAN SEA (April 16, 2015) USS Ross (DDG 71) Command Master Chief Ricardo Galvin, center-left, and Chief Cryptographic Technician Eduardo Modero, from Trujillo Alto, Puetro Rico, center-right, administer a divisional service dress blue uniform inspection aboard the ship April 16, 2015. Ross, an Arleigh Burke-class guided-missile destroyer, forward-deployed to Rota, Spain, is conducting naval operations in the U.S. 6th Fleet area of operations in support of U.S. national security interests in Europe. (U.S. Navy photo by Mass Communication Specialist 3rd Class Robert S. Price/Released)

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

ENIGMA machine at Bletchley Park.

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

please take the time to scan my hidden message in this QR code. QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two-dimensional barcode) first designed for the automotive industry in Japan. A barcode is a machine-readable optical label that contains information about the item to which it is attached. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte / binary, and kanji) to efficiently store data; extensions may also be used.

The QR Code system has become popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard UPC barcodes. Applications include product tracking, item identification, time tracking, document management, general marketing, and much more.

A QR code consists of black modules (square dots) arranged in a square grid on a white background, which can be read by an imaging device (such as a camera) and processed using Reed–Solomon error correction until the image can be appropriately interpreted. The required data are then extracted from patterns present in both horizontal and vertical components of the image.

History

 

The QR code system was invented in 1994 by Denso Wave. Its purpose was to track vehicles during manufacture; it was designed to allow high-speed component scanning. Although initially used for tracking parts in vehicle manufacturing, QR codes now are used in a much broader context, including both commercial tracking applications and convenience-oriented applications aimed at mobile-phone users (termed mobile tagging). QR codes may be used to display text to the user, to add a vCard contact to the user's device, to open a Uniform Resource Identifier (URI), or to compose an e-mail or text message. Users can generate and print their own QR codes for others to scan and use by visiting one of several paid and free QR code generating sites or apps. The technology has since become one of the most-used types of two-dimensional barcode.

 

Uses

 

Originally designed for industrial uses, QR codes have become common in consumer advertising. Typically, a smartphone is used as a QR code scanner, displaying the code and converting it to some useful form (such as a standard URL for a website, thereby obviating the need for a user to type it into a web browser).

 

A QR code in Japan used on a large billboard. sagasou.mobi MEBKM:TITLE:探そうモビで専門学校探し!;URL:http://sagasou.mobi;

"In the shopping industry, knowing what causes the consumers to be motivated when approaching products by the use of QR codes, advertisers and marketers can use the behavior of scanning to get consumers to buy, causing it to have the best impact on ad and marketing design." As a result, the QR code has become a focus of advertising strategy, since it provides quick and effortless access to the brand's website.Beyond mere convenience to the consumer, the importance of this capability is that it increases the conversion rate (that is, it increases the chance that contact with the advertisement will convert to a sale), by coaxing interested prospects further down the conversion funnel without any delay or effort, bringing the viewer to the advertiser's website immediately, where a longer and more targeted sales pitch may continue. In this way, the consumer is whisked seamlessly to a detailed advertisement that is rich in engaging audio-visual content specifically designed to create a strong desire to purchase the product, even if the consumer had no intention to purchase anything at the time he/she first saw the display ad.

 

Although initially used to track parts in vehicle manufacturing, QR codes are now (as of 2012) used over a much wider range of applications, including commercial tracking, entertainment and transport ticketing, product/loyalty marketing (examples: mobile couponing where a company's discounted and percent discount can be captured using a QR code decoder which is a mobile app, or storing a company's information such as address and related information alongside its alpha-numeric text data as can be seen in Yellow Pages directory), and in-store product labeling. It can also be used in storing personal information for use by organizations. An example of this is Philippines National Bureau of Investigation (NBI) where NBI clearances now come with a QR code. Many of these applications target mobile-phone users (via mobile tagging). Users may receive text, add a vCard contact to their device, open a Uniform Resource Identifier (URI), or compose an e-mail or text message after scanning QR codes. They can generate and print their own QR codes for others to scan and use by visiting one of several pay or free QR code-generating sites or apps. Google had a popular API to generate QR codes, and apps for scanning QR codes can be found on nearly all smartphone devices.

 

QR codes storing addresses and Uniform Resource Locators (URLs) may appear in magazines, on signs, on buses, on business cards, or on almost any object about which users might want information. Users with a camera phone equipped with the correct reader application can scan the image of the QR code to display text, contact information, connect to a wireless network, or open a web page in the telephone's browser. This act of linking from physical world objects is termed hardlinking or object hyperlinking. QR codes also may be linked to a location to track where a code has been scanned. Either the application that scans the QR code retrieves the geo information by using GPS and cell tower triangulation (aGPS) or the URL encoded in the QR code itself is associated with a location.

QR codes have been used and printed on Chinese train tickets since 2010

QR codes are used as a basis for art and as embedded 'extra information' providers in works of art. Recruiters have started placing QR codes in job advertisements,while applicants have started sporting it in their CVs and visiting cards.

  

In June 2011, The Royal Dutch Mint (Koninklijke Nederlandse Munt) issued the world's first official coin with a QR code to celebrate the centenary of its current building and premises. The coin can be scanned by a smartphone and link to a special website with contents about the historical event and design of the coin.In 2008, a Japanese stonemason announced plans to engrave QR codes on gravestones, allowing visitors to view information about the deceased, and family members to keep track of visits.

 

In November 2013, Microsoft released the XBOX One. On the One, codes could be redeemed by using Kinect to scan QR codes instead of typing them by hand.

 

Mobile operating systems

 

QR codes can be used in Google's Android, BlackBerry OS, Nokia Symbian Belle and Apple iOS devices (iPhone/iPod/iPad), as well as Microsoft's Windows Phone operating system, Google Goggles, 3rd party barcode scanners, and the Nintendo 3DS. The browser supports URL redirection, which allows QR codes to send metadata to existing applications on the device. mbarcode is a QR code reader for the Maemo operating system. In Apple's iOS, a QR code reader is not natively included, but more than fifty paid and free apps are available with both the ability to scan the codes and hard-link to an external URL. Google Goggles is an example of one of many applications that can scan and hard-link URLs for iOS and Android. BlackBerry 10 devices have a native QR reader as well as several third party readers. Windows Phone 7.5 is able to scan QR codes through the Bing search app.

 

URLs

 

URLs aided marketing conversion rates even in the pre-smartphone era, but during those years faced several limitations: ad viewers usually had to type the URL and often did not have a web browser in front of them at the moment they viewed the ad. The chances were high that they would forget to visit the site later, not bother to type a URL, or forget what URL to type. Clean URLs decreased these risks but did not eliminate them. Some of these disadvantages to URL conversion rates are fading away now that smartphones are putting web access and voice recognition in constant reach. Thus an advert viewer need only reach for his or her phone and speak the URL, at the moment of ad contact, rather than remember to type it into a PC later.

 

Virtual stores

 

During the month of June 2011, according to one study, 14 million mobile users scanned a QR code or a barcode. Some 58% of those users scanned a QR or barcode from their homes, while 39% scanned from retail stores; 53% of the 14 million users were men between the ages of 18 and 34. The use of QR codes for "virtual store" formats started in South Korea, and Argentina, but is currently expanding globally. Big companies such as Walmart, Procter & Gamble and Woolworths have already adopted the Virtual Store concept.

 

Code payments

 

QR codes can be used to store bank account information or credit card information, or they can be specifically designed to work with particular payment provider applications. There are several trial applications of QR code payments across the world.

 

In November 2012, QR code payments were deployed on a larger scale in the Czech Republic when an open format for payment information exchange - a Short Payment Descriptor - was introduced and endorsed by the Czech Banking Association as the official local solution for QR payments.

 

QR codes are commonly used in the field of cryptographic currencies, particularly those based off and including Bitcoin. Payment addresses, cryptographic keys and transaction information are often shared between digital wallets in this way.

 

Website login

 

QR codes can be used to log in into websites: a QR Code is shown on the login page on a computer screen, and when a registered user scans it with a verified smartphone, they will automatically be logged in on the computer. Authentication is performed by the smartphone which contacts the server. Google tested such a login method in January 2012.

 

Funerary use

 

In 2008-04-01, Ishinokoe in Yamanashi Prefecture, Japan began to sell tombstones with QR codes produced by IT DeSign, where the code leads to a virtual grave site of the deceased.

 

In 2011, Seattle-based Quiring Monuments Inc. began to sell an item branded as a 'Living Headstone,' where a QR code is added to a grave marker through a small plastic-metal composite tag affixed to the gravestone and a QR-operated website to back it up. Anyone can scan a grave maker with their smartphone and learn more about the person buried there.

 

In 2014, in the Jewish Cemetery of La Paz, Uruguay, QR codes are being implemented for tombstones, in order to enable remote access to cemetery images and know the exact location of every tomb via websites; it is the first cemetery in the world to introduce this innovation.

 

Design

Unlike the older, one-dimensional barcode that was designed to be mechanically scanned by a narrow beam of light, a QR code is detected by a 2-dimensional digital image sensor and then digitally analyzed by a programmed processor. The processor locates the three distinctive squares at the corners of the QR code image, using a smaller square (or multiple squares) near the fourth corner to normalize the image for size, orientation, and angle of viewing. The small dots throughout the QR code are then converted to binary numbers and validated with an error-correcting code.

 

Software

 

Software for scanning and processing QR codes are availible for multiple platforms, with free and paid options. Applications can be downloaded from app stores like Apple's App Store and Google Play for Android.

 

Storage

 

The amount of data that can be stored in the QR code symbol depends on the datatype (mode, or input character set), version (1, …, 40, indicating the overall dimensions of the symbol), and error correction level. The maximum storage capacities occur for 40-L symbols (version 40, error correction level L):

 

Microchip's low-cost ENC624J600 standalone, IEEE 802.3™ compliant, 100 Mbps Ethernet interface controllers. These Ethernet controllers combine a 10/100Base-TX physical interface (PHY) and a Media Access Controller (MAC) with a hardware cryptographic security engine, and can connect to any PIC® microcontroller via an industry-standard Serial Peripheral Interface (SPI) or a flexible parallel interface. Additionally, each device has a unique, factory-preprogrammed MAC address and 24 Kbytes of configurable SRAM for packet transmit/receive buffering and data storage. This combination of speed, flexibility and features enables designers to create fast, secure network- and Internet-connected embedded applications with minimized board space, cost and complexity. All of Microchip’s Ethernet products, tools, documentation and other design resources can be found on the Company’s online Ethernet Design Center, located at: www.microchip.com/Ethernet

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

charismathics exhibits at Infosecurity Europe, London, UK - 19-21 April 2011

 

www.charismathics.com/

 

charismathics is a global leader in identity management software. Its premier product, the charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPM) and the first PKI client to be fully integrated with pre-boot environments. charismathics also bundles its premier solution with silicon based hardware devices, primarily smart cards and USB cryptographic tokens, where physical and logical security needs also meet when contactless chips and RFID tags are embedded. charismathics is partnering with a growing number of world key players in the field of single sign on, hard disk encryption, digital certificate issuance. Envisioning a revolution in mobile Internet devices, charismathics has turned to this technology as well releasing iEnigma, a software which secures handheld units such as the iPhone, the iPod Touch and most phones featuring Windows Mobile, and provides streamlined two-factor authentication for the enterprise. charismathics offers its security products and services in a variety of industries including building security, banking and finance, healthcare, telecommunications, government and computer manufacturing.

Red Bottle Design, LLC launches GlassPay in the Wearables category during DEMO Fall 2013 at the Santa Clara Convention Center in Santa Clara, California Thursday October 17, 2013. Glasspay will enable Google Glass users to make payments with one another by leveraging the power of the Bitcoin and Litecoin cryptographic currencies. For more on GlassPay please visit bit.ly/GlassPay. Complete coverage of DEMO, the Launchpad for Emerging Technologies and Trends, can be found at bit.ly/DEMOsite.

This cipher device was used by the Ministry of the Interior of Denmark to secure its communications at least from 1910 to 1914, although the device itself may be much older. Individual letters are inscribed on ivory tiles which can be taken out and easily rescrambled around the central disk to change the substitutions for letters. The Danish Ministry probably issued a chart listing the letter arrangements and changes for a stated period, such as daily, weekly, or monthly.

 

The Italian scholar Leon Battista Alberti wrote an essay in 1466 laying out the principles of polyalphabetic substitution. These principles were used by the U.S. as late as the Vietnam War.

 

Seen at the National Security Agency’s National Cryptologic Museum, Fort Meade, Maryland.

 

An observation from someone who is not an expert in cryptography: Cryptography is about converting order (a written or spoken message) to disorder (an encrypted communication with no clear patterns) and vice versa. Thus, I find it interesting that a number of tools for cryptography—especially prior to the digital age—have a physical order or pattern.

Ananth Raghunathan, Senior Research Scientist, GOOGLE

The church "St. Martin und Maria", now used as the parish church of Sponheim, was part of an abbey, founded by Meginhard of Sponheim and his father. The abbey got consecrated in 1123, the first monks came from Mainz. After the Reformation the monks left the abbey. A try to reestablish monastic life here with the support of the Bursfelde Congregation ended unsuccessful. Another try ended in 1794, when the last monks fled the monastery from the approaching French troops.

 

The first buildings of the monastary burnt down in 1156. The rebuilding process started soon after. The layout of the church is a Greek cross, what was never planned, but the nave never got completed.

 

Johannes Trithemius was abbot here between 1483 and 1505. He was not liked by the monks, as he was preferred a very harsh monastic life. Johannes was very popular among the intellectual community in Germany as an lexicographer and historian. As an early cryptographer, he was one of the greatgrandfathers of Alan Turing. In 1516, he published the "Polygraphiae", containing a "tabula recta", a cornerstone of modern cryptography.

 

Johannes Trithemius is still known for his (very) imaginative "story-telling". So he knew for sure the meaning of an eagle talking to a pigeon on it´s back..

Jean-Philippe is talking about 'Cube Testers: theory and practice'

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Red Bottle Design, LLC launches GlassPay in the Wearables category during DEMO Fall 2013 at the Santa Clara Convention Center in Santa Clara, California Thursday October 17, 2013. Glasspay will enable Google Glass users to make payments with one another by leveraging the power of the Bitcoin and Litecoin cryptographic currencies. For more on GlassPay please visit bit.ly/GlassPay. Complete coverage of DEMO, the Launchpad for Emerging Technologies and Trends, can be found at bit.ly/DEMOsite.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Memorial for Alan Turing at Bletchley Park.

1 2 ••• 18 19 21 23 24 ••• 79 80