Unbreakable Ciphers

Unbreakable Ciphers

Unbreakable Ciphers

Cryptography, a strategy for putting away and transmitting information in a specific frame with the goal that only those for whom it is…

Unbreakable Ciphers

Cryptography, a strategy for putting away and transmitting information in a specific frame with the goal that only those for whom it is planned can read and process it. It protects data from theft or alteration, furthermore can also be used for authentication and authorization of user.
Plain text or message is converted to unreadable form, i.e cipher text, if we go through history there are many ciphers that are not yet solved; some of them are described here;

Beale Cipher

The Beale cipher was an arrangement of three magical ciphertexts, the primary cipher which is yet unsolved portrays the area where the treasure is hidden, the second ciphertext, which is fathomed, depicts the substance and content of the treasure, and the third cipher which is also unsolved, records the names of the hidden treasure proprietors and their closest relative. these ciphers are also referred to as Beale papers.

DoraBella Cipher

The Dorabella Cipher is a message composed by author Edward Elgar to Dora Penny in 1897. Dora never deciphered it and its significance stays obscure.

Cipher text

The cipher, consisting of 87 characters spread over 3 lines, appears to be made up from 24 symbols, each symbol consisting of 1, 2, or 3 approximate semicircles oriented in multiple directions. A small dot appears after the fifth character on the third line.

Ricky McCormick’s Cipher

In 1999, Two manually written records were found in the pockets of murder casualty Ricky McCormick when his body was found in a field in St. Charles County, Missouri.
The FBI, and other services, have tried decoding the notes unsuccessfully. The FBI has posted it online asking for help. If they have investigated it, and then asked for help, we can assume it’s not just a case of bad spelling and handwriting.

ciphers that were found in his pocket

The Blitz Ciphers

The Blitz Ciphers were found after WWII. They were found in wooden boxes hid in the mass of an East London basement that German shelling had uncovered. Only eight page scans have been published yet.

one of the page of blitz cipher

Chinese Gold Bar Ciphers

General Wang of Shanghai, China received seven gold bars like 1933. The design of those gold bars were similar to the metal certificates, people get when make deposits in U.S. banks. but there were mysterious pictures and writings engraved on these bars in the form of Chinese writing, and Latin cryptograms.

Plate showing chinese gold cipher

The true reason behind General Wang receiving such an elaborate gift from a secret admirer would be a lot easier to determine if we knew what in the world the gold bars said. Able to read them or not, we looked at the engravings and we’re pretty sure there were some big bucks involved in the transaction.

In a NutShell

The history of ciphers and cryptography is very deep and dark also, the era from 1800 to World War II has many fascinating events.

“Cryptography is the essential building block of independence for organisations on the Internet, just like armies are the essential building blocks of states, because otherwise one state just takes over another.”
- Julian Assange

Playing With JavaScript

Playing with JavaScript

Playing with JavaScript

If you are a Web developer and interested in exploring JavaScript and its libraries then you must go through these interesting and…

Playing with JavaScript

If you are a Web developer and interested in exploring JavaScript and its libraries then you must go through these interesting and mind-blowing JavaScript libraries and Different styles of programming with JavaScript ;

1) JS FUCK

JSFuck, well it is not what it’s name is saying, it is basically an esoteric programming style of JavaScript, a style in which the code is written using certain characters [,], (, )!, and + . The name JSFuck is derived from BrainFuck and it is an esoteric programming language.
For example, In JavaScript, the code alert("Hello World!"), which causes an alert window to open but in JSFuck, the same code has a length of 22948 characters.

2) HIGH CHARTS / AMCHARTS

Data visualization is very significance in understanding the importance of huge piles of data. To cater this corner, JavaScript provides multiple libraries like highcharts and amcharts, these are very powerful and Interactive JavaScript charts for your web pages, It is very simple and easy to use, you just have to provide data source and then create and grab meaningful information in the form of charts, graphs and heatmaps etc.

3) D3.JS

D3.js is another rich and powerful JavaScript library that is used for administration of documents based on data. It supports you to bind arbitrary data to a Document Object Model (DOM). D3 helps bring life to your data using HTML, Scalable Vector Graphics, and CSS.

4) Cannon.JS

It is a JavaScript based 3D physics engine, designed for creating 2D and 3D shapes, It is an open-source project. It supports a number of shapes like sphere, plane, box, cylinder, convex polyhedron, particle, and heightfield. 
Just look at an example of animation using cannon JS

http://schteppe.github.io/cannon.js/examples/threejs_cloth.html

There are many more interesting libraries and engines in JavaScript,one can explore. so go on and explore it, make your web pages more interactive and meaningful.

“JavaScript, being a loosely typed language, never casts. The lineage of an object is irrelevant. What matters about an object is what it can do, not what it is descended from.” — Douglas Crockford

EXPECT in Bash Scripting

“EXPECT” in Bash

“EXPECT” in Bash

Expect scripting language is utilized to nourish input consequently to an intuitive program. It is very easy to learn contrasted with other…

“EXPECT” in Bash

Expect scripting language is utilized to nourish input consequently to an intuitive program. It is very easy to learn contrasted with other scripting languages. 
Utilizing expect allows sysadmins and developers can to automate repetitive and bulky tasks effortlessly. It works by expecting particular strings, and sending or reacting to strings appropriately.

automation using expect

Following three expect commands are used in automation of any interactive processes with certain commands.

  • send — to send the strings to the process
  • expect — wait for the specific string from the process
  • spawn — to start the command

Generally, expect script files has .exp as extensions.

Installing Expect

apt-get install expect

Expect Examples

Expect “Hello World” Example. The following expect script is expecting the specific string “hello”. When it finds it (after user enters it), “world” string will be send as response.

#!/usr/bin/expect
expect "hello"
send "world"

SSH example using expect

#!/usr/bin/expect
set timeout 60
spawn ssh user_name@ip_address
expect “pass”
send “password\r”
interact

These little scripting techniques helps you automating your daily life hectic and lengthy tasks, use expect and save your time.

Fibonacci and its Magic

Fibonacci Magic

Fibonacci Magic

A magic created from a series of number comes out from Indian mathematics, but it get its name “FIBONACCI SERIES” from an Italian…

Fibonacci Magic

A magic created from a series of number comes out from Indian mathematics, but it get its name “FIBONACCI SERIES” from an Italian mathematician Leonardo Pisa;
1 1 2 3 5 8 13 21 34 55. . .
It follows golden ratio denoted as “Phi”, i.e a+b/a is equals to 1.6, whereas “a” should be the greater number.
Let’s see how it creates magic in natural phenomenon. The presence of Fibonacci sequence all around us is mesmerizing;

1) Plants
Small lines on a leaf follows this sequence, Petals of a growing flower supersede this sequence, Roots of a tree also follows the golden sequence.

2) Human Being
Yes, human are also the example of Fibonacci sequence, The ratio of forearm to hand is also golden ratio. one hand has five fingers, 3 boxes in each finger with couple of joints means 2,3,5. Interesting !
Just look at your face, the distance between your eyes, eyes and nose, mouth and nose are also considered to be in a fixed proportion which follows the Golden ratio, the more sharp the proportion is the more attractive and comely the face would be.

3) Nature
Inside many fruits, like banana and apple, you will easily find the Fibonacci sequence. Furthermore shells of many animals strictly follows the golden ratio, Fish like dolphins, its fins and arms also exhibit this ratio. The famous five-point symmetry with Golden proportions is found in starfish.