View allAll Photos Tagged cryptology
A new mural has appeared on the wall of the renovated tenement house. It is dedicated to Jan Kowalewski - a certified lieutenant colonel of the Polish Army, a mathematician, linguist and cryptologist. Founder of the cryptology and radio intelligence department in Poland after regaining independence after the First World War. He broke Soviet codes during the war with the Bolsheviks (1919), for many years he was an officer of the Second Department of the General Staff.
The mural is made with an interesting technique (it reminds me a bit of the Matrix movie). Here, the execution technique is associated with decoding the ciphers.
340-character Zodiac cipher observations
Ngram observations
Cipher contains 25 repeated bigrams, 2 repeated trigrams, and 0 repeated quadgrams.
In a test of 1,000,000 random shuffles, 110,147 (11%) had 25 or more repeated bigrams, and the average number of repeats was 20.
In a test of 1,000,000 random shuffles, 67,573 (7%) had 2 or more repeated trigrams, and the average number of repeats was 0.4.
In a test of 1,000,000 random shuffles, 7,857 (0.8%) had at least one repeated quadgram, and the average number of repeats was 0.008.
5-gram repeating fragments study
The IOF trigram repeats in the same columns, and are spaced 8 lines apart, reminiscent of the 8-line height of each of the original 3 parts of the 408 cipher.
TODO: Multidirectional ngram study (including multiple distances, and repeating fragments)
TODO: Periodicity of repeating fragments study
Reading the cipher text from left to right and top to bottom, the longest sequence containing no repeated bigrams starts at position 168, and has length 123
TODO: periodic ngram / fragment test of individual halves of the 340 (horizontally and vertically), as well as individual "even/odd" transformations.
Unusual biases in the number of bigram repeats
Top half / bottom half bias
The lower left of the cipher text seems to contain very few repeated bigrams
The top half of the cipher text, considered on its own, contains 9 repeated bigrams. However, the bottom half of the cipher text, considered on its own, contains only 1 repeated bigram.
In 1,000,000 shuffles, only 2.4% of them had halves with a repeated bigram discrepancy as large as the one observed in the 340 (i.e., a difference of at least 8 repeated bigrams between the halves).
By contrast, the 408's top half has 17 repeated bigrams and its bottom half has 14.
Even / odd position bias
The cipher text also shows a bias in repeated bigram counts within even positions and odd positions.
If you remove all symbols that are in even-numbered positions, there are only 2 repeated bigrams.
In this case, there are also 0 repeated trigrams.
If you remove all symbols that are in odd-numbered positions, there are 10 repeated bigrams.
In this case, there are also 2 repeated trigrams.
(Illustration)
The difference in bigram repeats between both cases is 8. During shuffle tests, the difference was 8 or higher in only 2.4% of shuffles. This is the same difference and percentage found for the top half / bottom half bias.
(Distribution of repeated bigram discrepancy among shuffles)
In the unmodified 340, there is a "box corner" pattern that repeats. After removing all symbols falling on odd-numbered positions, repeating trigrams appear where the box corner patterns were observed.
In this illustration, the box corners are highlighted in green on the left. The repeating trigrams are shown on the right, highlighted in purple. Note the repeating sequence "O, half-filled square, C" that is seen in both cases.
Similar repeating patterns can be also found (illustration)
Periodic ngram bias
Consider the normal way of counting bigrams (one symbol right next to another). Let's call this "period 1" bigrams, because the symbols are one position apart. There are 25 repeating period 1 bigrams. But at other periods, there is a higher count of repeating bigrams. In fact, at period 19, there are 37 repeating bigrams. (Illustration of a small sample of repeating period 19 bigrams) (Daikon's initial observation) (Jarlve's initial observation)
Repeating period 19 bigrams highlighted in the cipher text
The same, but easier to spot when cipher is written into 19 columns
A test of 1,000,000 random shuffles suggests a 1 in 216 chance that this is happening by chance
If you look at all periods from 2 to 170, 34 of them have 25 or more repeating bigrams. In other words: 20% of other periods have equal or better repeating bigram response than period 1.
Also, if you flip the ciphertext horizontally (horizontal mirroring), a higher peak occurs at period 15, which produces 41 repeating bigrams. This is consistent with the phenomenon that normal (period 1) bigrams have more repeats when the cipher text is flipped horizontally.
A test of 1,000,000 random shuffles suggests a 1 in 12821 chance that this is happening by chance
A second peak of of 34 repeating bigrams occurs at period 29.
A third peak of 33 repeating bigrams occurs at period 100.
Plot of periodic bigram counts in normal and mirrored cipher texts (Raw data: Period, # of repeated bigrams in normal 340, # of repeated bigrams in mirrored 340)
Plot of periodic trigram counts in normal and mirrored cipher texts (Raw data: Period, # of repeated trigrams in normal 340, # of repeated trigrams in mirrored 340)
Repeated quadgrams appear only at periods 101 and 116. They do not appear when considering the mirrored ciphertext.
A repeated 5-grams appears at period 101
Bigram peaks still seem to appear even if you filter out the effects of the symbols that occur 10 or more times.
Jarlve's repeating fragment measurements seem to correlate strongly with periods 19 (normal cipher) and 15 (mirrored cipher).
Inserting a randomized column causes a 40 bigram peak to occur at period 5
TODO: Jarlve's "symbol expansion" test, higher ordered ngrams and fragments
TODO: how often does a random shuffle show a period that has repeated quadgrams/5grams?
Visualization tool showing effects of various transposition schemes on bigram/trigram/fragment counts
Period calculator - A way to visualize the relation of periods to mirrored counterparts, and the effect of untransposition on the interesting patterns (pivots, box corners, and repeating bigrams)
Repeated symbols by columns and rows
The 340 cipher has 9 rows that each contain no repeated symbols (Illustration. Rows are marked in yellow.) In 1,000,000 shuffles, no shuffled cipher text had at least 9 rows with no repeated symbols (plot of distribution) (raw data)
If you split the cipher in half with a horizontal cut in the middle, the top and bottom halves each start with 3 lines that have no repeated symbols. This symmetry is discussed in Dan Olson's analysis.
Every column contains at least one repeated symbol.
Homophone cycles
Tests of cycle significance with shuffle experiments
Longest-repeating substring search for cycles, compared to shuffles
Kasiski Examination
A Kasiski examination performed on unigrams in Z340 reveals a spike at shift of 78 (Source: Bart Wenmeckers).
The pivot patterns turn into repeating bigrams at period 39. The number 39 is exactly half of 78. And half of 39 is tantalizingly close to 19, which is the period that produces the peak number of repeating bigrams.
Application of Z408's key to Z340 results in a "plaintext" that still retains a Kasiski examination spike at shift of 78.
Among 1,000,000 random shuffles, only 0.28% of them had a spike as good or better as the one observed in Z340.
For shift values of 2 through 6, the number of repeats is unusually low (1 or 2).
Visualization of peak at shift 78 by viewing as doubles in untransposed period 78 (with pivots highlighted)
The doubles are easier to see when Z340 is transcribed to width 26
When calculating column IoC at different column widths, spikes are observed at widths 39 and 78. (Source: Bart Wenmeckers)
The "Pivots"
The 340 contains a pair of intersecting repeating trigrams. We refer to each repeating trigram as a "pivot". Illustration and analysis
The pivot patterns become repeating bigrams if you rewrite the cipher text at period 39.
When calculating column IoC at different column widths, spikes are observed at widths 39 and 78 (see Kasiski examination section above)
When numbering the cipher text from 1 to 340, the intersections of the pivot patterns fall on positions 195 and 234, which are 39 positions apart. Interestingly, 195 and 234 are both evenly divisible by 39.
Similarly, the pivot patterns become repeating bigrams if you mirror the cipher text horizontally and rewrite it at period 29.
Period 29 is the 2nd highest periodic bigram peak for the mirrored 340 (see the Periodic ngram bias section above)
In an experiment, the 340 was randomly shuffled over 41 million times. A pair of pivots that point in the same direction was only observed in about 1 in 237,000 shuffles.
In this study the 340 was shuffled and the number of repeating bigrams was fixed at a set number. Transposition was performed and pivot pairs were counted. The results show that higher bigram counts cause pivot pairs to be created more often, but they are still rare.
Other observations
Some symbols in the 340 were not in the 408's alphabet
The paper the cipher is written on contains several Fifth Avenue watermarks (here's glurk's animation to help you spot where they appear).
The first 3 symbols of the 340 do not reappear soon. It starts with "HER", and H only appears 3 other times, E only appears 2 other times. (From Duman)
In the third column, the 3 occurrences of the "R" symbol are evenly spaced, each separated by four rows. (From Wrench)
The author of the cipher does not use the forward-facing letter Q as a cipher symbol, but uses a backwards-facing Q instead. Similarly, he does not use the forward-facing letter C as a cipher symbol in the 408-character cipher, but uses a backwards-facing C instead. Why doesn't he use up all the normal alphabetic symbols before resorting to additional symbols and variations? (one possible explanation)
The first repeated symbol occurs at the 19th position. Thus the first 18 symbols contain no repeats. Coincidentally, the last 18 symbols of the 408 cipher do not form a legible solution. (From traveller1st)
The most frequently occurring symbol, +, occurs 24 times. Only once does it fall on a prime-numbered position in the cipher text (counting from 1 to 340), against expectations. Also both occurrences of the X symbol fall on prime positions against expectations. (From Dan Johnson) (TODO: Prime phobia distribution study for all symbols)
Possible schemes that increase probability of natural appearance of this phenomenon
The second most frequently occurring symbol, B, occurs 12 times. Only once does it fall on a prime-numbered position in the cipher text (counting from 1 to 340), against expectations. (From Dan Johnson)
The upper loop of the "B" symbol on line 19 column 9 is larger than the lower loop, making the symbol look disproportional and distinct from the other "B" symbols. (From Doc. Doc also speculates the symbol was original a "P" and the author corrected it by adding the bottom loop.)
The last occurrence of the "+" symbol is wider than the others. (From Doc. Doc speculates that the author "hesitated" on this symbol.)
Cipher symbols seem to get larger as the cipher goes on. Row 20 seems larger than Row 1. (From Doc. Doc speculates the author wrote the cipher from top to bottom, and was tiring.)
The backwards D at the end of the first line appears to have a dot in it.
The symbols that represent "R" in the 408 are Br.jpg and Backslash.jpg. Both symbols are missing from the 340 cipher. (Source: Wier)
The symbol '+' is frequently adjacent (in all directions, not just left/right) to the symbol 'R'. (Source: www.zodiackillersite.com/viewtopic.php?p=39791#p39791). 'B' is the 2nd most common symbol in the cipher (12 appearances), but for some reason it is adjacent to only one of the 24 '+' symbols.
The average of the position numbers for all occurrences of the '+' symbol is 171, which is only one position from the midpoint of the cipher. This suggests the + symbols are very uniformly distributed throughout the ciphertext. (Source: Jarlve)
The '+' symbol does not seem to cycle well with other symbols.
A tiny 'R' is written at the bottom right corner of the page. Similarly, information is written at the bottom right corner of a section of the 408, and the bottom right corner of the letter containing the map code.
Cycles of length 2 are biased towards odd-numbered positions in the cipher text
The 340 has 9 rows that each have no repeated symbols. By comparison, the 408 has 6. Moreover, in the 340, there are two triplets of rows that show symmetry about the vertical midpoint of the cipher text. (Image of row repeat comparisons)
A forward-K appears to be scratched out, and corrected with a backwards K symbol.
From Scott Akin: All occurrences of the "H" symbol are involved with this observation: Consider the rectangular regions formed by the corners highlighted in this illustration. Each region is exactly 80 characters in size (4x20 and 5x16), and there is symmetry to the corner symbols.
Largo's test finds that this often occurs by chance, even with random text.
From "Hayley25": Zodiac's "bus bomb letter" contains a section he highlighted which, when punctuation and spaces are removed, contains exactly 340 letters.
Running out of ideas for your 365 project? Join We're Here!.
On episode 14 Karl and Elgin are joined by Dutxhie Flair as they interview @cryptoalgorythm to discuss her background in science, computer programming, and technology. How she went from working for the government and flipping sneakers to quiting her job and instead of buying the new Yeezys to flip she decided to flip Crypto.
It's a spirited conversation between herself and Karl as she discusses her process to buying, selling, and her projections vs his approach and beliefs.
Lots of jewels and information in this episode
Now an exhibit at the National Museum of Cryptology near Baltimore, Maryland, this carved Great Seal of the United States was once on the wall of the U.S. Embassy in Moscow -- before it was found to hold a Soviet bugging device.
On episode 9 of the Cryptology Podcast Elgindotcom, Karl and Dutchie Flair sit down with former CoinDesk writer Tom Sharkey to talk about his experience at CoinDesk, his love for hiphop and what will happen first... Bitcoin hitting zero or Jay-Z paying off his debt to Live Nation.
On episode 11 Elgin and Karl sit down with college professor and lawyer Jadihel Rodriguez to discuss what type of market are we in. Bear market? Bull market? Or is it a “tiger market”? We also break down his investment techniques and utilizing the “tether” strategy.
A US Navy WAVE sets the Bombe rotors prior to a run
The US NAvy cryptanalytic Bombes had only one purpose: Determine the rotor settings used on the German cipher machine ENIGMA. Originally designed by Joseph Desch with the National Cash Register Company in Dayton, Ohio, the Bombes worked primarily against the German Navy's four-rotor ENIGMAs. Without the proper rotor settings, the messages were virtually unbreakable. The Bombes took only twenty minutes to complete a run, testing the 456,976 possible rotor settings with one wheel order. Different Bombes tried different wheel orders, and one of them would have the final correct settings. When the various U-boat settings were found, the Bombe could be switched over to work on German Army and Air Force three-rotor messages.
Source: National Cryptologic Museum
Comment on the above
The four rotor system had 26^4 or 456,976 settings whilst the theree rotor system had 26^3 or 17,756 settings. It looks like the problem scale in a linear way as it took 50 seconds to check 17,756 setting (~350 per second) while the four rotor solution in 20 minutes is ~ 380 settings per second.
I also think the designer Joseph Desch sounds like a remarkable engineer that I never heard of before.
Bombe on Wikipedia
Once the British had given the Americans the details about the bombe and its use, the US had the National Cash Register Company manufacture a great many additional bombes, which the US then used to assist in the code-breaking. These ran much faster than the British version, so fast that unlike the British model, which would freeze immediately (and ring a bell) when a possible solution was detected, the NCR model, upon detecting a possible solution, had to "remember" that setting and then reverse its rotors to back up to it (meanwhile the bell rang).
Source of following material : National Cryptologic Museum
Diagonal Board is the heart of the Bombe unit. Electrically, it has 26 rows and 26 columns of points, each with a diagonal wire connection. These wires connect each letter in a column with the same position in each row. A letter cannot plug into itself; these are known as "self-steckers." The resulting pattern is a series of diagonal lines. The purpose of the diagonal board is to eliminate the complications caused by the Enigma's plugboard. Given specific rotor settings, only certain plugboard settings can result in the proper encrypted letter. The diagonal board disproved hundreds of rotor settings, allowing for only a few possibly correct settings to result in a "strike".
Amplifier Chassis had two purposes, first to detect a hit and second to determine if it was useful. It provided the tie-in from the diagonal board, the locator, and the printer circuits.
Thyratron Chassis was the machine's memory. Since the wheels spun at such a high speed, they could not immediately stop rotating when a correct hit was detected. The Thyratron remembered where the correct hit was located and indicated when the Bombe has rewound to that position. It also told the machine when it had completed a run and gave the final stop signal.
Switch Banks tell the Bombe what plain to cipher letters to search for. Using menus sent to the Bombe deck by cryptanalysts, WAVES set each dial using special wrenches. 00 equates to the letter A and 25 to the letter Z. The dials work together in groups of two. One dial is set to the plain test letter and the other to its corresponding cipher letter as determined by cryptanalysts. There are sixteen sets of switch banks, however, only fourteen were required to complete a run. As the machine worked through the rotor settings, a correct hit was possible if the electrical path in all fourteen switch banks corresponded to each of their assigned plaintext/cipher combinations.
Wheel Banks represent the four rotors used on the German U-boat Enigma. Each column interconnects the four rotors, or commutators, in that column. The top commutator represented the fourth, or slowest, rotor on the Enigma, while the bottom wheel represented the rightmost, or fastest, rotor. The WAVES set the rotors according to the menu developed by the cryptanalysts. The first were set to 00, and each set after that corresponded to the plain/cipher link with the crib (the assumed plain test corresponding to the cipher text.) Usually this meant that each wheel bank stepped up one place from the one on its left. When the machine ran, each bottom rotor stepped forward, and the machine electrically checked to see if the assigned conditions were met. If not, as was usually the case, each bottom wheels moved one more place forward. However, the bottom commutator moved at 850 rpm, so it only took twenty minutes to complete a run of all 456,976 positions.
Printer automatically printed the information of a possible hit. When the Bombe determined that all the possible conditions had been met. it printed wheel order, rotor settings and plugboard connections.
Motor Control Chassis controlled both forward and reverse motors. The Bombe was an electromechanical machine and required a number of gauges for monitoring. It also needed a Braking Assembly to slow the forward motion when a hit was detected and to bring the machine to a full stop when a run was completed.
i09_0214 129
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
On episode 9 of the Cryptology Podcast Elgindotcom, Karl and Dutchie Flair sit down with former CoinDesk writer Tom Sharkey to talk about his experience at CoinDesk, his love for hiphop and what will happen first... Bitcoin hitting zero or Jay-Z paying off his debt to Live Nation.
On episode 8 Elgindotcom is joined by JudeTruth and Dutchie Flair as he sits down to interview super stockbroker Albert Nunez to discuss his deep history in wallstreet and his transition to Cryptocurrency and the future of Crypto and technology.
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
Aquesta de la imatge és una maquina enigma del tipus emprat per la Wehrmacht i la Luftwaffe. Es pot identificar perque els rotors de la part superior porten xifres, i no lletres com al model de la marina. Sense dubte és l'element més famós de la historia del xifratge i la criptologia.
ca.wikipedia.org/wiki/M%c3%a0quina_Enigma
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
This is a Wehrmacht & Luftwaffe model Enigma. You can identify it by the numbers in the rotors. The more famous navy Enigma (M), had letters on them. The Enigma machine is without doubt the most famous icon in the history of cryptology
www.youtube.com/watch?v=JJm4-lqRJDc
en.wikipedia.org/wiki/Enigma_machine
cryptomuseum.com/crypto/enigma/i/index.htm
The emulator (all the site is wonderful):
users.telenet.be/d.rijmenants/en/enigmasim.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
On episode 5 Elgin and Karl sit with special guest Michelle McCormack to discuss her transition from the fashion industry to cryptocurrency. We discuss storage options to keep your cyrpto safe from hackers and her new company "Casting Coin" which is due to shake up the model Industry by cutting out the middle man aka "Agents" and utilizing BlockChain to protect models everywhere from shady people and business tatics.
--
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
On episode 8 Elgindotcom is joined by JudeTruth and Dutchie Flair as he sits down to interview super stockbroker Albert Nunez to discuss his deep history in wallstreet and his transition to Cryptocurrency and the future of Crypto and technology.
Hebern Electric Code
This is the first encryption machine patented (1912) by Edward Hugh Hebern. Mr Hebern developed this while serving time as a horse thief.
On episode 5 Elgin and Karl sit with special guest Michelle McCormack to discuss her transition from the fashion industry to cryptocurrency. We discuss storage options to keep your cyrpto safe from hackers and her new company "Casting Coin" which is due to shake up the model Industry by cutting out the middle man aka "Agents" and utilizing BlockChain to protect models everywhere from shady people and business tatics.
--
On episode 14 Karl and Elgin are joined by Dutxhie Flair as they interview @cryptoalgorythm to discuss her background in science, computer programming, and technology. How she went from working for the government and flipping sneakers to quiting her job and instead of buying the new Yeezys to flip she decided to flip Crypto.
It's a spirited conversation between herself and Karl as she discusses her process to buying, selling, and her projections vs his approach and beliefs.
Lots of jewels and information in this episode
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
Alyssa Monks is one of the formost emerging contemporary artists in America today. Her paintings are often presented as faces behind sheets of water, whether it be steamy shower door, or within a pool of tranquility. Thoughtfully rendered, and conceptually genius, Monks' work stands alone in the world of contemporary art. Blending both realism and abstraction, Monks' paintings stop you in your tracks and leave you wanting more.
We were able to interview this talented oil artist recently and given exclusive photo access within her studio.
Read the Full Interview Here:
For more on Alyssa Monks Current Show visit David Klein Gallery:
or her personal site:
On episode 11 Elgin and Karl sit down with college professor and lawyer Jadihel Rodriguez to discuss what type of market are we in. Bear market? Bull market? Or is it a “tiger market”? We also break down his investment techniques and utilizing the “tether” strategy.
Episode 4 of Our Crypto Currency Based Podcast "Cryptology Podcast" Now Available on Soundcloud & Apple Podcast
On episode 11 Elgin and Karl sit down with college professor and lawyer Jadihel Rodriguez to discuss what type of market are we in. Bear market? Bull market? Or is it a “tiger market”? We also break down his investment techniques and utilizing the “tether” strategy.
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
My highest compliments to all concerned for excellent site."Sir, You have taken a right step to get those Swings removed from site of Harrapa" , Visitors thanked great scholar Dani when I visited his house in 2005. I had taken years to get it done by publishing many articles requesting peoples to create more facilities at cultural heritage sites. My kids and wife would had been cursing me for taking them to Harrapa quite often , My family was not craking Indus Scripts in 1989 because I had more than one computer as Manager Army Computer Club Okara but they had to crack Indus Scripts in 1995 becaue we had just one 486 computer for 3 kids and myself. What attraction kids and families had in ruins visiting 7th time.
“ What you think about round stone with stone round rod in the center and other on the top with hole in the center like grinding stone on top” , my expert visitor Egyptian asked on my 7th visit to Museum of Sasi & Punu two lovers near Twin port Karachi. Being from stone age cultural area , still using hand grinding in 1980 , acting as guide to my guest during last 6 tours , I thought it some sort of grinding though grinding stone are opposite to this , top has a wooen handle to move the stone , hole in the center has wooden piece a slot to where fulcrum from lower stone stone rest. Lower stone has a hole and tappered wooden piece is used for adjust ment of fuckrum. “ But how you would move this set for grinding , this is from tepmle used by issueless women “ , my expert visitor guided me on 7th visit.
My compliments to Thailand tourism , Ms Nani and the driver , she guided me in such an excellent fashon in 1995 that I still remember her. “ No guidence in the way , I would sit with driver , you have to be VIP not speaking a word “ , Nani gave the briefing on a cup of coffe before we started for visit of Royal Palace. She was such an excellent guide that she even gave out out cost of golden budda’s constume , golden bricks on the outer wall of golden temple. They had even kept book on Bhuddaism in my room. Bhudaism started from Taxila Pakistan but we have to make living model of previous prehistoric cultures of snake worshipers and other
Historical Perspective
1st success decryption of Indus Scripts confirmed through works of Dani, B B Lal , Mehdewan, Fair Server , Mark, Russian Professoers and many others in the century was approved by Dani in 2005. South Asia as most peaceful global trader and protector of global trading routes was known as ‘golden sparrow’.Everyone got job at his home and economy was stable. “ We must share our research work because there is no government support” Dani said . We have many secrets from Indus Script decryption that can make South Asia as most peaceful region for global trading. Global Peace Mega Project at. twitter.com/#!/nazeeraahmadch. We salute Anhazari for greatmove against anti corruption
Harappan civilization reached improbable heights and evolved amazing scripts .
Ancient inscriptions and pictorials starting from Mehrgarh Gedrosia 7000 BC till fall of civilization have always been an enigma. The glories of the ruined cities and their amazing un-deciphered script had many researchers imagining a gentle society of priests and scribes. Our decrypted secrets explain a culture that reached the heights of artistic achievement during 1900-1300 BC termed as Harappan civilization. New clues, unearthed from research on ruins and from our decrypted secrets point to new civilization of global trading termed as Matured Harappan
The settlement of Kot Diji culture mostly remained l hidden under the ruins of Mohenjodaro , Harappa and other big cities now known as Harappan Civilization 2600-1900 BC . Ethno-archaeological model is assuming much as it was when the first 50 hunting groups arrived in perhaps 8000 – 7000 BC connected with the arrival of Adam on earth. A dense forest , marshes and barren land where wild animals ruled was shared by manlike creatures . scarlet macaws, toucans, and vultures nest in towering tropical hardwoods. Scorpions , mountain , goats , fish , water buffalos lived together . These creatures and monkeys swing from branches and vines and howler monkeys bellow in the distance. It had been a land of jungle , marshes , mud, serpents and sweat, and tigers and horned tigers the lord of the jungle . The earliest arrivals of these creatures has been excavated in Samma Soan Valley of stone age where we find caves is probably had no choice—overcrowding elsewhere may have forced them into this forbidding environment. But once there, they mastered its challenges. Settling near rivers, lakes, and swamps, they learned to maximize the thin soil's productivity. They cleared the forest for maize, squash, and other crops by slashing and burning, much as today's Maya do, then re-enriched the land by alternating crops and letting fields lie fallow.
As populations grew, they adopted more intensive methods of cultivation—composting, terracing, irrigation. They filled in swamps to create fields and carried silt and muck from bottomlands to fertilize enclosed gardens. Artificial ponds yielded fish, and corrals held deer and other game flushed from the forest. The ancient Maya ultimately coaxed enough sustenance from the meager land for several million people, many times more than now live in the region.
Over the centuries, as the Maya learned to prosper in the rain forest, the settlements grew into city-states, and the culture became ever more refined. The Maya built elegant multiroom palaces with vaulted ceilings; their temples rose hundreds of feet toward the heavens. Ceramics, murals, and sculpture displayed their distinctive artistic style, intricate and colorful. Though they used neither the wheel nor metal tools, they developed a complete hieroglyphic writing system and grasped the concept of zero, adopting it for everyday calculations. They also had a 365-day year and were sophisticated enough to make leap-year-like corrections. They regularly observed the stars, predicted solar eclipses, and angled their ceremonial buildings so that they faced sunrise or sunset at particular times of year.
Mediating between the heavens and earth were the Maya kings—the kuhul ajaw, or holy lords, who derived their power from the gods. They functioned both as shamans, interpreting religion and ideology, and rulers who led their subjects in peace and war. Demarest and others have described the Maya centers as "theater states" in which the kuhul ajaw conducted elaborate public rituals to give metaphysical meaning to movements of the heavens, changes of the calendar, and the royal succession.
Behind the cloak of ritual, the Maya cities acted like states everywhere, making alliances, fighting wars, and trading for goods over territory that ultimately stretched from what is today southern Mexico through the Petén to the Caribbean coast of Honduras. Well-worn trails and stucco-paved causeways crisscrossed the forest, and canoes plied the rivers. But until Fire Is Born arrived, the Maya remained politically fragmented, the city-states charting their own courses in the jungle.
By 378 Waka was a prestigious center, boasting four main plazas, hundreds of buildings, temple mounds up to 300 feet (90 meters) tall, ceremonial palaces clad in painted stucco, and courtyards graced with carved limestone altars and monuments. A trading power, it occupied a strategic location on the San Pedro River, which flowed westward from the heart of the Petén. Its market was filled with Maya foodstuffs such as maize, beans, chilies, and avocados, along with chicle harvested from sapodilla trees to make glue, and latex from rubber trees to make balls for ceremonial games. Exotic goods found their way to Waka as well. Jade for sculpture and jewelry and quetzal feathers for costumes came from the mountains to the south, and obsidian for weapons and pyrite for mirrors from the Mexican plateau to the west, the domain of Teotihuacan.
A sprawling metropolis of 100,000 people or more—perhaps the largest city in the world at the time—Teotihuacan left no records that epigraphers have been able to decipher. But its motives in dispatching Fire Is Born to the Maya region seem clear. Waka sat on a promontory overlooking a tributary of the San Pedro with a protected harbor, excellent for berthing large canoes. "It was a perfect staging area" for military action, notes Southern Methodist University archaeologist David Freidel, co-director of excavations at Waka. Which may be precisely what Fire Is Born had in mind.
Waka appears to have been key to the envoy's mission: to bring the entire central Petén into Teotihuacan's orbit, through persuasion if possible, force if necessary. His principal target was Tikal, a kingdom 50 miles (80 kilometers) east of Waka. Tikal was the most influential city-state in the central Petén. Bring Tikal into the fold, and the other cities would follow.
Fire Is Born's soldiers were probably shock troops, designed principally to display his bona fides and demonstrate good faith. He needed reinforcements, and he had come to Waka to get them. In return, he could offer the goodwill of his patron, a mysterious ruler known from inscriptions as Spear-thrower Owl, probably a highland king, perhaps even the lord of Teotihuacan.
Waka's ruler, Sun-faced Jaguar, apparently welcomed Fire Is Born. Based on hints in texts from Waka and other sources, Freidel, project co-director Héctor Escobedo, and epigrapher Stanley Guenter suggest that the two rulers cemented their alliance by building a fire shrine to house the sacred flame of Teotihuacan.
Along with moral support, Fire Is Born probably secured troops. His expeditionary force likely carried the spear-throwers and javelins typical of Teotihuacan and wore backshields covered with glittery pyrite, perhaps meant to dazzle the enemy when the soldiers spun around to hurl their weapons. Now warriors from the Petén, equipped with stone axes and short stabbing spears, swelled their ranks. As armor, many wore cotton vests stuffed with rock salt. Eleven hundred years later, the Spanish conquistadores shed their own metal armor in the sweltering rain forest in favor of these Maya "flak jackets."
The military expedition most likely set out for Tikal in war canoes, heading east, up the San Pedro River. Reaching the headwaters, the soldiers disembarked and marched either along the river or on the canyon rim overlooking it.
Garrisons probably dotted the route. News of the advancing column must have reached Tikal, and somewhere along the stretch of riverbank and roadway, perhaps at a break in the cliffs about 16 miles (26 kilometers) from the city, Tikal's army tried to stop Fire Is Born's advance. Inscribed slabs, called stelae, later erected at Tikal suggest that the defenders were routed. Fire Is Born's forces continued their march on the city. By January 16, 378—barely a week after his arrival in Waka—the conqueror was in Tikal.
The date is noted on Tikal's now famous Stela 31, which yielded early clues to Fire Is Born's importance when David Stuart of the University of Texas at Austin deciphered it in 2000. The second passage on the stela records what happened after the city fell: Tikal's king, Great Jaguar Paw, died that very day, probably at the hands of the vanquishers.
Fire Is Born appears to have dropped whatever pretense he had assumed as a goodwill ambassador. His forces destroyed most of Tikal's existing monuments—stelae put in place by 14 earlier rulers of Tikal. A new era had begun, and later monuments celebrated the victors. Stela 31, erected long after the conquest, describes Fire Is Born as Ochkin Kaloomte, or Lord of the West, probably referring to his origins in Teotihuacan. Some Maya experts have also suggested another meaning: that Fire Is Born represented a faction that had fled to the west—to Teotihuacan—after a coup d'état by Great Jaguar Paw's father years earlier and had now returned to power.
It apparently took Fire Is Born some time to pacify Tikal and its environs. But a year after his arrival, Tikal's monuments record that he presided over the ascension of a new, foreign king. Inscriptions identify him as the son of Spear-thrower Owl, Fire Is Born's patron in Teotihuacan. According to Stela 31, the new king was less than 20 years old, so Fire Is Born probably became Tikal's regent. He was certainly the city's de facto overlord.
In the years that followed the conquest, Tikal itself went on the offensive, expanding its reach across the Maya region. Fire Is Born appears to have masterminded the campaign, or at least inspired it. References to him have been identified in cities as distant as Palenque, more than 150 miles (240 kilometers) to the northwest. But the most poignant testimony to his empire-building comes from Uaxactún, just 12 miles (19 kilometers) from Tikal. There a mural shows a Maya nobleman giving homage to a warrior in Teotihuacan regalia—perhaps one of Fire Is Born's troops. A stela depicting a similar warrior guards a tomb where archaeologists found the remains of two women, one pregnant, a child, and an infant. Freidel and others have concluded that these were the remains of Uaxactún's royal family, slain by Tikal's forces. The king, presumably, was taken to Tikal and sacrificed there.
Decades after the arrival of Fire Is Born and long after he must have died, the aggressive rulers of Tikal continued to invoke Fire Is Born and his patron state, Teotihuacan. In 426, Tikal took over Copán, 170 miles (274 kilometers) to the south in present-day Honduras, and crowned its own king, Kinich Yax Kuk Mo, who became the founder of a new dynasty. A posthumous portrait shows him wearing a costume typical of central Mexico—a reference to Teotihuacan—and like Fire Is Born, he bore the title Lord of the West.
Some Mayanists believe that Tikal was acting as a vassal state for Teotihuacan, expanding its dominion throughout the Maya lowlands, with Fire Is Born acting as a kind of military governor. Others see him less as a conqueror and more as a catalyst who spurred Tikal to expand its own power and influence.
His fate is a mystery. There is no known record of his death, and no evidence that he ever ruled a Maya kingdom. But his prestige lived on. The Waka stela recording his arrival there wasn't erected until a generation later, indicating that even a long-ago visit from the great Fire Is Born was a matter of civic pride.
For more than a millennium, the Maya had entrusted their religious and temporal well-being to their god-kings. These leaders displayed their might and majesty in lavish rituals and pageants, in opulent art and architecture, and in written records of their triumphs, inscribed on stone, murals, and ceramics.
The system prospered—indeed, its excesses created the artistic achievements and learning that defined the Maya as one of the ancient world's great cultures—as long as the land could satisfy people's basic needs. This was easy at first when cities were small and resources relatively plentiful, but over time, growing populations, an expanding nobility, and rivalry between the city-states strained the limits of the environment.
Today the Petén, geographically the largest province in Guatemala, has a population of 367,000, living in isolated towns scattered through a forested wilderness. In the eighth century, by some estimates, ten million people lived in the Maya lowlands. The landscape was an almost unbroken fabric of intensely cultivated farms, gardens, and villages, linked by a web of trails and paved causeways connecting monumental city-states.
Maya farmers were well schooled in sophisticated techniques designed to get maximum production from delicate tropical soils. But beginning in the ninth century, studies of lake-bed sediments show, a series of prolonged droughts struck the Maya world, hitting especially hard in cities like Tikal, which depended on rain both for drinking water and to reinvigorate the swampland bajos where farmers grew their crops. River ports like Cancuén might have escaped water shortages, but across much of the Maya region the lake-bed sediments also show ancient layers of eroded soil, testimony to deforestation and overuse of the land.
When bad times came, there was little the kuhul ajaw could do to help their people. Monoculture farming—growing one staple food crop that could be accumulated and stored for hard times or for trade—could not be sustained in the rain forest. Instead, each city-state produced small quantities of many different food items, such as maize, beans, squash, and cacao. There was enough, at least at first, to feed the kingdom, but little left over.
Meanwhile, Maya society was growing dangerously top heavy. Over time, elite polygamy and intermarriage among royal families swelled the ruling class. The lords demanded jade, shells, feathers from the exotic quetzal bird, fancy ceramics, and other expensive ceremonial accoutrements to affirm their status in the Maya cosmos. A king who could not meet the requirements of his relatives risked alienating them.
The traditional rivalry among states only made matters worse. The kuhul ajaw strove to outdo their neighbors, building bigger temples and more elegant palaces and staging more elaborate public pageants. All of this required more labor, which required larger populations and, perhaps, more wars to exact tribute in forced labor from fallen enemies. Overtaxed, the Maya political system began to falter.
This period marked the golden age of Classic Maya civilization. The kuhul ajaw were in full flower in these two great alliances, competing in art and monuments as well as in frequent but limited wars. Calakmul defeated Tikal in a major battle in 562 but destroyed neither the city nor its population. Eventually Tikal rebounded and defeated Calakmul, subsequently building many of its most spectacular monuments.
Simon Martin, with Nikolai Grube of the University of Bonn, compares the Tikal-Calakmul rivalry to the superpower struggle of the 20th century, when the U.S. and the Soviet Union competed to outdo each other in fields ranging from weaponry to space travel. With neither side ever able to gain the upper hand, the Cold War arguably brought stability, and so did the standoff in the Maya world. "There was a certain degree of destruction" because of the rivalry, says Guatemalan archaeologist Héctor Escobedo. "But there was also equilibrium."
It did not last. Martin suggests the balance may have been intrinsically unstable, like the competition among the city-states of ancient Greece, or the nervous grappling between North and South in the United States prior to the Civil War. Or perhaps an overstressed environment finally caught up with the proud Maya powers, bringing a new edge of desperation to their rivalry. Either way, the unraveling began at the small garrison state of Dos Pilas, near the Pasión River downstream of Cancuén.
In 630 Tikal, trying to reassert a presence along Pasión River trade routes increasingly dominated by Calakmul, expanded an existing outpost near two large springs—pilas, in Spanish. The site had little else to recommend it. Dos Pilas grew no crops and sold nothing. Scholars call it a "predator state" that depended on tribute from the surrounding countryside. War, for Dos Pilas, was not only a ritual to glorify kings and appease gods. War was what Dos Pilas did to survive.
The kingdom's history of violence and duplicity began when Tikal installed one of its princes, Balaj Chan Kawiil, as Dos Pilas's ruler in 635. The garrison slapped together a fancy-looking capital for the young prince, using carved facades to mask loose and unstable construction fill. But in 658 Calakmul overran Dos Pilas and drove Balaj Chan Kawiil into exile.
We know the next chapter thanks to a thunderstorm that toppled a tree at Dos Pilas six years ago, exposing a carved stairway hidden beneath its roots. Inscriptions on the stairway reveal that Balaj Chan Kawiil returned two years after his exile—but as a Calakmul surrogate. Dos Pilas's turncoat king helped Calakmul cement its control over the Pasión Valley during the next two decades. Then Calakmul delivered fateful news. Its rulers ordered Balaj Chan Kawiil to fight his brother in Tikal itself.
For a time, fleeing nobles could find refuge in Cancuén, a quiet port at the headwaters of the Pasión River. Even as downriver cities sank into chaos during the eighth century, Cancuén prospered by trading luxury items and providing sumptuous lodgings for elite visitors. The architect of this golden age was King Taj Chan Ahk, who came to power in 757 at the age of 15. Cancuén had a long history as a strategic trading post, but Taj Chan Ahk transformed the city into a stunning ceremonial center. Its heart was a 270,000-square-foot (25,000 square meters), three-story royal palace with vaulted ceilings and 11 courtyards, made of solid limestone and elegantly placed on a riverside promontory. It was a perfect stage for a Maya god-king, and Taj Chan Ahk was master of the role, even as it was dying out elsewhere.
There is no evidence that Taj Chan Ahk ever fought a war or even won a battle. Instead he managed to dominate the upper Pasión Valley for nearly 40 years by coaxing advantage through patronage and alliances. An altar monument at Cancuén dated 790 shows him in action, engaged in a ceremonial ball game with an unknown noble, perhaps to celebrate a treaty or a state visit.
Taj Chan Ahk died in 795 and was succeeded by his son Kan Maax, who sought to trump his father by expanding the palace. But pomp and ritual—the old trappings of kingship—could no longer hold the Maya universe together. Within five years the spreading chaos had reached the gates of the city. In one terrible day its glory winked out, another light extinguished in the world of the Classic Maya.
Nazeer Ahmad Chaudhry
Independent Researcher from Pakistan
Author & Researcher: Decryption of Harappan Ciphers 1st successful solution in a century
President TPI Inc., President IT Genetics , Manager Asia Women Global Justice Group , Chairman Welfare Committee,
TPI has offered over 0.5 million free predicted solutions at all levels. Integrated solution based on Borderland Sciences, cryptanalysis, forecasting techniques Delphi, Scenarios and multi scenarios, war gaming and other spiritual techniques. We attach no claim with free predicted solutions. Error correction techniques and analysis may be carried out by users.
An analysis might be carried out if I can be of any use for establishing global peace by ending terrorism. I have been subjected to over 30 killing attacks, killing of over 10 members of my family and losses in millions. I have given details at petitions at Care-2, Peace pink, yahoo and other comments. Mega project research work aimed at establishing peace and security at global level by ending terrorism. I desire global board of directors sponsored by UNO to come forward for benefits of all.
I offer 1st decryption of Harappan Scripts in a century; the decrypted secrets not yet published have solution to many problems. The strategic location of Pakistan offer global trading of $ 7.5 billion per year to global community, oil and gas trading of over $ 15 trillions. I have been trained by over 250 foreign telecomm firms; I had lot of interaction with my friends from many countries as class fellows, R&D Engineer at Research Establishment, visit to Thailand, Ministry of Interior Saudi Arabia Border Guards, as operational engineer, as Zonal Manager of NGO and service in the army. I have given lot of material at Internet. My friends , colleagues , group members and others can carry out an analysis of mega project including integrated energy , renewable energy , befouls , safety and security of global trading, safe train link, herbal foods , new employments , new concepts in housing , overhauling of education systems , innovations and integration of new global technologies and many others.. We must establish an accountability system to stop official terrorists and corrupt gangs failing all the global projects.
Mega Project: Problems in offering Global Solutions
The establishment of global peace and stability by ending terrorism has been delayed due to 30 killing attacks on me, killing of 10 members of my family, loss in millions, terrorists attack on 3 sick and crippled women of 3 families, 11 of witnesses and me. Petitions have been registered. May I request global peace lovers to sign the petitions; they may not display their names.
Research Interests Nazeer ’s fundamental research is on discovering and understanding the problems and offering free solutions by forecasting/prediction through economic, social, organizational and technical interactions and techniques evolved through TPI Inc. Over 0.5 million free solutions have been offered at all level but aim of ending terrorism, corruption and prevention of fraud at any level has yet to achieve. Research Projects • Research in any field that can give protection to mankind from fraud, terrorism and human right protection. • Ethno-archaeological Model on Harappan Ciphers: Decryption of Harappan Cipher is over 30 years research project, the 1st successful cryptanalysis in the century • Axiomatic Education Strategy for 21st Century • Prevention of Fraud: Nazeer and his wife Hamida are heir to the lands & property of about 7 families hence an effort underground had been going on for killing of every member of this family. It is very interesting research work scanning the centuries how people slaughter others to become landlords by using fraud and terrorism. • Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people. He suffered over 30 killing attacks, killing of 10 members of his family by the snakes brought up by them; the relatives of his step mother.
Contents
[hide]
•1 Education
o1.1 Experience
o1.2 Research Work
•2 Projects
o2.1 Publications:
[Edit] Education
B.Sc. Telecomm Engineering, B Sc Honors, Technical Graduate NUST-EME, LLB, PEC, MIE Pak, IEEEP, IEEE, IEEE Computer Society, IEEE- ISST
MBA , M. Phil. Electronics Engineering , MA , Cryptology NUST-MCS , Arabic AIOU , Ph D Total Technology approved researcher Bradford
•B.Sc. (Telecomm. Engineering), Member:PEC,IEEE &Computer Society IEEE USA MIE (Pak.)
•M.B.A. Preston Univ. 1995 , M.A.( Political Science), B.Sc. (Honors War Studies), L.L.B. , Arabic Diploma AIOU Islamabad
•Doctor of Philosophy in Total Technology at University of Bradford UK approved researcher in since 1995. M Phil at MUET was accepted for credit in Ph.D. Second part M.B.A completed from Preston University USA, Courses /research/ 15 years experience/foreign firm training from 250 firms as R&D engineer in cryptographic security completed. Member PEC , TSO graduate from NUST Campus ,Advance Cryptology Course , Refresher Cryptology Course from NUST
•M. Phil. (Electronics Engineering,) Cryptology (NUST), Technical Staff Course (NUST,, Ph.D. (Electrical/Electronics Engineering) approved researcher at Uni. of Bradford U.K. Masters of Science and M Phil at MUET Jamshoro Pakistan was got transferred for PhD
•M.B.A. from Preston University USA from Islamabad Campus getting 98 % in MIS, Organizational Communication and International Marketing subjects. (98 % marks in Information Theory in Advance Cryptology NUST Campus. M.A. (Political Science) from Sindh Uni.
[edit] Experience
•1996-1997 Telecommunication Engineers at Ministry of Interior Saudi Arabia Border Guards
•1978- 1994 Telecommunication Engineer in Sindh and Baluchistan Provinces , Technical Staff Course , Research & Development Engineer at Signals Research Establishment . Telecommunication Engineer and Communication officer in Army 1972-1994
•Teaching: Teaching Assistant and teaching staff for science and technology subjects at Higher Secondary School, Signal Training Center, Computer Clubs, Divisional Battle School NUST Campus MCS, National Institute of Computer Sciences
•Administration: Zonal Manager Hamdard Laboratories Rawalpindi Zone (1998-1999). 24 years experience in Pakistan Army
•Training: Training by foreign Telecom firms from USA, UK, Canada, China, France, Germany, Japan, South Korea, Norway, Sweden and many other countries as R&D Engineer.
Computers: Student Member IEEE USA (1994-95), Manager Army Computer Clubs at Okara and Hyderabad, Teaching Staff National Institute of Computer Sciences Rawalpindi (1995)
•Engineering: Student Member IEEE USA (1994-1997), Telecommunication Member Pakistan Engineering Council, Member Institute of Electrical Engineers Pakistan
[edit] Research Work
Decryption of Indus Valley Scripts has been my research work since last 30 years .This is 1st successful decryption in a century. Dani had confirmed the decryption in 2005 though 1st script was decrypted in 1995 when Secure MIS high security high compression book draft was approved by Artech House USA and Dorrance Publishers USA approved the draft for publication both books not yet published. Rolex Award also approved the research for an award.
B.B. Lal , Russian Professors , and US Scholars Farmer , Sprout , Fair Service, Mark , Durani , F.A. Khan, Mughal and many conclusions of the decryption supported by many other scholars through their written work.
•In 2004, Steve Farmer published, The Collapse of the Indus-Script Thesis: The Myth of a Literate Harappan Civilization, arguing that the Indus valley figures are merely a non-structured symbol system and do not represent a full language.
•In ancient cryptography used by Egyptians or code & ciphers used by lovers, diarists and underworld people, you don't require full language. As a kid, he had just a chance by compulsion to evolve coded language and a writing system to be read by kid girls who could just read Arabic without understanding it.
•All most all the population counted as the people of Indus Valley counted. He was 1st student to qualify Matric (O level) in 1968 and taught new science syllabus to his class as volunteer teacher because his science teacher declined to teach the syllabus unless he had undergone a course.
•He had over 50 of teacher’s 1st &2nd World War soldiers and there were few who had been living in the jungle. His county of 7 treasures in oldest Stone Age culture got electricity in 1990.They used ancient agricultural tools and animal transport like camels, horses, donkeys, bulls and buffalos were used.
[edit] Projects
•Large number of Design and modification projects in Telecommunication Engineering and Cryptology
•Research in any field that can give protection to mankind from fraud, terrorism and human right protection.
•Ethno-archaeological Model on Harappan Ciphers : Decryption of Harappan Cipher is over 30 years research project the 1st successful cryptanalysis in the century
•Axiomatic Education Strategy for 21st Century
•Prevention of Fraud: 50 years Research Work
•Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people.
•Codes and Ciphers: Evolution of Coded Language based on Harappan Scripts
•Codes and Ciphers: Evolution of Written Script based on Harappan Scripts
•Design & Development of Maintenance Free Exchange for Desert Working
•Design & Development of Secrecy Electronics Communication System
•Cryptology : Design of High Security High Compression System
•Design & Development of Exchange for Nuclear Warfare
•Design & Development of Battery Charging and Lighting System on Wind Energy
•Design & Development of Energy Saying System
•Decryption of Moenjodaro Scripts
•Decryption of Matured Harappan Scripts
•Herbal Medicine : Medicated Foods and Treatment of Cancer
•Herbal Medicine : New Treatment for Asthma
•Evolution of Recycling Technologies for Low Cost Housing
•Evolution of Integrated Technologies for Energy Crisis
[edit] Publications:
1.Decryption of Moenjodaro Scripts approved in 1995 based on the Thesis: Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K. Not yet published.
2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood
3.Nazeer Ahmad, Secure MIS in Business Communication, Research Paper in MIS.
4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29
5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56
6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29
7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,
8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995
10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994
11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defense Review, Volume 6, 1994, pp 80-92
12.N. A. Chaudhry , Integrated National Defense , Pakistan Army Green Book, 1991, pp343-346
13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985
14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992
15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995
16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290
17.Nazeer A. , Cryptographic and Computer Security , The Hilal Magazine ,19 January 1995
18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine ,8 February 1995
19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , 15 December 1994
20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press
22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998
23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995
24.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994
25.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998
26.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad
27.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000
28.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998
29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 3 April,1999,
30.Nazeer Ahmad , Solution to National Problems , Daily Markaz, April,1999
31.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 11 April,1999, Islamabad
32.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996
33.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999
34.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991
35.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87
36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994
37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999
38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad
39.N. A. Chaudhry , Modern Technology Impacts of Defense , Pakistan Army Journal , 1994, pp62-74
40.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
41.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999
42.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999
43.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
44.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer , 11 December 1994
45.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994
46.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995
47.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998
48.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad
49.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, 1974.
50.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998,
51.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999,
52.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad
53.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004
54.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004,
55.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999,
56.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defense Review, 2005
57.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defense Review ,1995
58.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad
59.Nazeer Ahmad Chaudhry , Neo Scenario for Armed Forces of Pakistan , Pakistan Army Journal ( Urdu) , Winter 2009 , pp 25-42
60.ibid, PAJ, The J curve , Rise and Fall of Nations by Ian Beemer , Book Review , pp107-108
61.Nazeer Ahmad Chaudhry , Science & Technology : New Challenges for Defense , Pakistan Army Journal ( Urdu) , Summer 2009 , pp 15-25
62.ibid, PAJ , Curveball: Spies, Lies and the Con Man Who caused a War by Bob Dorgan , Book Review , pp- 85-87
63.Nazeer Ahmad Chaudhry , Nuclear Strategy for Future , Pakistan Army Journal ( Urdu) , Winter 2008 , pp 45-55
64.ibid, PAJ, the Failure of American Foreign Policy and Next Great Crisis in Middle East by Ali M. An sari , Book Review , pp104-106
65.Nazeer Ahmad Chaudhry , Defense Strategy for Future , Pakistan Army Journal ( Urdu) , Summer 2008 , pp 42-51
66.ibid, PAJ , Winning the Right War by Phillips H Gordon, Book Review , pp 85-87
On episode 5 Elgin and Karl sit with special guest Michelle McCormack to discuss her transition from the fashion industry to cryptocurrency. We discuss storage options to keep your cyrpto safe from hackers and her new company "Casting Coin" which is due to shake up the model Industry by cutting out the middle man aka "Agents" and utilizing BlockChain to protect models everywhere from shady people and business tatics.
--
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
Episode 4 of Our Crypto Currency Based Podcast "Cryptology Podcast" Now Available on Soundcloud & Apple Podcast
La SG-41 (Schlüsselgerät 41), màquina de xifratge alemanya molt poc coneguda, hauria estat la substituta de la famosissima Enigma, si la SGM hagués durat més.
cryptomuseum.com/crypto/sg41/index.htm
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
The quite unknown German SG-41 (Schlüsselgerät 41) would had been the substitute of the World famous Enigma cipher machine, had WW2 ended later. It was a very different machine, and looks like it was harder to crack.
cryptomuseum.com/crypto/sg41/index.htm
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
Alyssa Monks is one of the formost emerging contemporary artists in America today. Her paintings are often presented as faces behind sheets of water, whether it be steamy shower door, or within a pool of tranquility. Thoughtfully rendered, and conceptually genius, Monks' work stands alone in the world of contemporary art. Blending both realism and abstraction, Monks' paintings stop you in your tracks and leave you wanting more.
We were able to interview this talented oil artist recently and given exclusive photo access within her studio.
Read the Full Interview Here:
For more on Alyssa Monks Current Show visit David Klein Gallery:
or her personal site:
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
Aqui teniu un parell de rotors de la famosa máquina de xifratge Enigma.
ca.wikipedia.org/wiki/M%c3%a0quina_Enigma
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
These are a couple of german Enigma's rotors (walzen), showing their electrical contacts.
www.youtube.com/watch?v=JJm4-lqRJDc
en.wikipedia.org/wiki/Enigma_machine
cryptomuseum.com/crypto/enigma/i/index.htm
The emulator (all the site is wonderful):
users.telenet.be/d.rijmenants/en/enigmasim.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
SAN DIEGO (Sep. 13, 2016) Cryptologic Technician (Technical) 3rd Class Brooke Wilms conducts antenna maintenance aboard the aircraft carrier USS Theodore Roosevelt (CVN 71). Theodore Roosevelt is currently moored and homeported in San Diego undergoing a scheduled Planned Maintenance Availability. (U.S. Navy photo by Mass Communication Specialist Seaman Bill M. Sanders/Released)