Password Plan

The Cuneiform can be used to print out password listings. The 26 English letters can be custom mapped for 26 Cuneiform characters. The mapping is chosen to remind the user of the shapes of letters so a password can be retrieved. Passwords need to be written down on paper for most people be sure of several passwords and updates. That paper can be done one one sheet in English and one sheet in Cuneiform. The one in Cuneiform can be taped up on your cubicle wall. Your rivals might see it, but they will be unable to produce your password from it. You will have trained yourself to recognize the secret alphabets like I did. I can read the Short Story from Cuneiform because of some easy training on the 26 characters that have similarities with English.

𒀀 𒁀 𒉒 𒁓 𒀾 𒁕 𒂝 𒂠 𒁹 𒂚 𒁐 𒁇 𒁈 𒁑 𒄆 𒄍 𒁲 𒆧 𒈝 𒂡 𒌋 𒃻 𒉼 𒀭 𒁁 𒃱

Those 26 characters were put in this blog by entering text like this & # 73728 without two spaces. The ampersand-pound prefix tells the blogger and browser software that this is a Unicode UTF-32 code point to look like an A in cuneiform.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

February 24, 2012


Cuneiform is an alphabet that was used 5000 years ago in Iraq. The Empire of Sumer was a leader in written languages. Neighboring countries (Hittites) copied and changed the alphabets. The ASCII characters are like Cuneiform characters, but they look modern. The Cuneiform looks ancient and obsolete, like Egyptian Hieroglyphics. Unicode uses 32 bits to store a Cuneiform character.

In cryptography, this message about Cuneiform is under the category of Alphabetic Substitution. In past centuries, block ciphers did not decrypt 128 bit blocks, they used 7 bit blocks to store each character of an alphabet. But cryptanalysis showed that the block size should be larger for best security. The 981 characters of Cuneiform allow more security choices than the 26 letters of English.

You can look at the Cuneiform letters here, on any browser, because .pdf files do not need fonts installed:

http://www.unicode.org/charts/PDF/U12000.pdf

The hexadecimal code points are from 0x12000 to 0x123FF

Cryptographic strength increases with the block size and the 10 bits of choice for the 981 characters provide more strength than old Latin 7 bit ASCII. The 32 bit Unicode code point is the block size being stored and that allows the free Perl program to handle Mayan and Egyptian symbols to hint at your printed passwords.

Here is the Perl program that makes a Cuneiform file in .rtf format for Word or Wordpad wordprocessors:
http://nutron.folmsbee.com/Alan/drums/baffle_cuneiform_69.pl

You can edit that program’s array to print Mayan Glyphs or any Unicode you want to hint at your passwords on a paper printout. You can put Cuneiform in a blog by entering text like & # 73728. The browsers recognize the ampersand-pound suffix to indicate a Unicode character.

Mayan Fonts
http://users.teilar.gr/~g1951d/

Conclusion
Cuneiform is also called Akkadian. The Bible has more details on the old empires of the cradle of civilization: Iraq, Turkey, and Egypt. When Moses and Aaron battled the Hittites, the alphabets were Cuneiform and Hieroglyphics and both are now obsolete. By using an obsolete alphabet, agents can use secret codes to record messages that can be read by someone who has trained for two pi minutes, but which cannot be read by someone who asks, “What is Cuneiform?”
Begin 2016 Notes
The password plan can be extended to a more general message decryption plan for internet website communications. The initiator sends a true type font file to the recipient to use as the training key. The initiator can post some 32 bit Unicode values on a website, to send the secret alphabet. Most people cannot see any useful-seeming characters. If they have a standard font file, they see Cuneiform characters. Without the .ttf true type font file, all they see is numbers. With the .ttf key, the recipient sees the 26 letters in Cuneiform that will be learned for future use. Somewhere on the web is a Cuneiform essay using the new alphabet, but not with the same code points in Unicode as the key .ttf., just the characters that look like the ones used in training..
The keyed .ttf file has duplicated entries for the same 26 characters. This allows a way to defeat frequency analysis. By having each English letter represented by four possible code points for one Cuneiform Glyph, the messages can be tailored and crafted to have flat frequencies of letters. Automated decryption is defeated because the human vision sees the glyphs that match the training. Software only sees the Unicode numbers, but attacking software has no key .ttf file to help with a decryption of a website essay in Cuneiform that is human readable. July 1, 2016