Purpose of this presentation is to highlight one of the unique characteristics of an enigmatic epic created by Jain Acārya Kumudēndu more than a century ago. Yet not fully revealed this scripture had remained out-of-sight for centuries and was rediscovered about 70 years ago by Pandit Yellappa Shastri in Bengaluru, Karnataka State of India.
Acārya Kumudēndu regarded Acārya Virasen as his Guru. Subject matter of ‘Siribhūvalaya’ covers wide spectrum of Jain canonical topics along with discourses on ancient sciences and scriptures of non-jain religious streams. This is very rightfully described as a scripture of scriptures (Śātron Ka Śātra).
Siri Bhoovalaya from Computer Science PerspectiveAnil Jain
Muni Kumudendu creatively incorporated Cryptographic mechanisms in his unique epic 'Siri Bhoovalaya', which is scripted in numerals only. This presentation explains key characteristics from Computer Science perspective with relevant examples from Siri Bhoovalaya.
IKE is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKEv2 is the
second and latest version of the IKE protocol. Adoption for this protocol started as early as 2006.
IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication - either
pre-shared or distributed using DNS (preferably with DNSSEC) and a Diffie–Hellman key exchange - to
set up a shared session secret from which cryptographic keys are derived.
Lattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWEPriyanka Aash
Destructive and constructive methods in lattice-based cryptography will be discussed. Topic 1: Cryptanalysis of Compact-LWE Authors: Jonathan Bootle; Mehdi Tibouchi; Keita Xagawa Topic 2: Two-message Key Exchange with Strong Security from Ideal Lattices Authors: Zheng Yang; Yu Chen; Song Luo
(Source: RSA Conference USA 2018)
This document provides an introduction and overview of the Necronomicon spellbook. It describes how Simon, an ordained bishop, came into possession of the ancient spellbook after two monks stole it from a university. Simon worked to translate and publish the spells from the Sumerian text. The introduction outlines some of the spells focused on topics like love, wealth, protection and wisdom. It provides context on the mysterious Sumerian civilization that originally developed the magical system contained in the Necronomicon.
This document describes a free copy of the first volume of Lal Kitab 1952 in Hindi. The original 3 volume book's photocopy is being sold illegally in the black market for Rs. 2100. This free copy is being provided by Astrostudents.
The document discusses public key cryptography, digital certificates, and Transport Layer Security (TLS). It provides an overview of symmetric and asymmetric key cryptography, algorithms like RSA and ElGamal, the use of digital signatures and certificates, and how TLS uses public key encryption to securely transmit data over the internet, such as for email.
This presentation describes the procedure of preparing ARKA LAVANA, a classical formulation mentioned in Rasatarangani. Its a simple medicine that can be prepared even at small level and can be prescribed for various GIT disorders.
Siri Bhoovalaya from Computer Science PerspectiveAnil Jain
Muni Kumudendu creatively incorporated Cryptographic mechanisms in his unique epic 'Siri Bhoovalaya', which is scripted in numerals only. This presentation explains key characteristics from Computer Science perspective with relevant examples from Siri Bhoovalaya.
IKE is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKEv2 is the
second and latest version of the IKE protocol. Adoption for this protocol started as early as 2006.
IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication - either
pre-shared or distributed using DNS (preferably with DNSSEC) and a Diffie–Hellman key exchange - to
set up a shared session secret from which cryptographic keys are derived.
Lattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWEPriyanka Aash
Destructive and constructive methods in lattice-based cryptography will be discussed. Topic 1: Cryptanalysis of Compact-LWE Authors: Jonathan Bootle; Mehdi Tibouchi; Keita Xagawa Topic 2: Two-message Key Exchange with Strong Security from Ideal Lattices Authors: Zheng Yang; Yu Chen; Song Luo
(Source: RSA Conference USA 2018)
This document provides an introduction and overview of the Necronomicon spellbook. It describes how Simon, an ordained bishop, came into possession of the ancient spellbook after two monks stole it from a university. Simon worked to translate and publish the spells from the Sumerian text. The introduction outlines some of the spells focused on topics like love, wealth, protection and wisdom. It provides context on the mysterious Sumerian civilization that originally developed the magical system contained in the Necronomicon.
This document describes a free copy of the first volume of Lal Kitab 1952 in Hindi. The original 3 volume book's photocopy is being sold illegally in the black market for Rs. 2100. This free copy is being provided by Astrostudents.
The document discusses public key cryptography, digital certificates, and Transport Layer Security (TLS). It provides an overview of symmetric and asymmetric key cryptography, algorithms like RSA and ElGamal, the use of digital signatures and certificates, and how TLS uses public key encryption to securely transmit data over the internet, such as for email.
This presentation describes the procedure of preparing ARKA LAVANA, a classical formulation mentioned in Rasatarangani. Its a simple medicine that can be prepared even at small level and can be prescribed for various GIT disorders.
1. The document discusses the modification of traditional Ayurvedic formulations into different dosage forms like granules and tablets. It provides examples of research projects modifying Amalakyadi churna into dispersible tablets and Kantakaryadi kwatha into a syrup.
2. Analytical studies were conducted on the modified formulations to analyze characteristics like hardness, friability, disintegration time, and microbial quality. The studies found the modifications helped provide convenient dosage forms while maintaining the formulations' qualities.
3. Modifying Ayurvedic formulations can make them easier for patients to consume while meeting modern standards, helping increase their acceptance and use. However, standardization of such complex formulations remains challenging.
Cryptanalysis involves techniques to decode encrypted messages without knowledge of the encryption key. It includes attacking security protocols, breaking codes, and guessing keys. There are different models of cryptanalysis attacks including known ciphertext attacks, known plaintext attacks, chosen plaintext attacks, and chosen ciphertext attacks where the cryptanalyst has increasing amounts of encrypted or decrypted text that can be used to deduce the key and decrypt messages. The goal of cryptanalysis is to decrypt encrypted messages by analyzing patterns in the ciphertext or exploiting weaknesses in the encryption algorithms.
Mercury or Parada Have 3 types of Harmful effects, known as Dosha. Yayugika or Yougika or harmful effects due to Compound with Lead (Naga) & Tin(Vanga) amalgamation
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASEDR AJITH KUMAR
Iam Dr Ajith kumar
Practicing Dermatology since 3 years
Here iam presenting few formulation which is regularly used in skin disease and result oriented and also available in the market...
Do not follow anyone until understanding the concept...
All the best to all...
Dr. Ajith The famous Integrative dermatology practitioner. And all the ppt which i have updated is prepared by myself and if you find out the same in anywhere else, inform us and its 100% copied from my profile.
Thanking you
Dr Ajith kumar M.D,DCP
Fellowship in infectious disease
Chaitanya mahaprabhu's advent predictions from various vedicDeepak Kumar
The document provides numerous predictions and descriptions from major Hindu scriptures such as the Puranas and Vedas regarding the future advent of Lord Chaitanya. It describes His golden complexion, birthplace in Navadvipa, mother Sachi, inauguration of sankirtana movement, and appearance as a renounced sannyasi to deliver people suffering in the age of Kali. The predictions span from His specific birth details to the time of His appearance in the 7th manvantara of Kali Yuga between 4000-5000 years after its start.
The document outlines the schedule and contents of a DamodaraKatha program. It includes:
- An introduction lasting 5 minutes
- Singing of Damodarastakam arti for 15 minutes
- A 30 minute DamodaraKatha narration
- A 10 minute conclusion
The main part of the program is the DamodaraKatha narration, which covers the eight verses of Damodarastakam describing Lord Krishna's childhood pastimes of being bound by mother Yashoda to the wooden grinding mortar. It aims to reveal Krishna's supreme majesty and how he is conquered by pure love and intimacy, not awe.
Mari jaga masa depan generasi ummat Islam dengan menjaga perempuan-perempuan muslim dari tipu daya isu-isu jahiliah seperti feminisme liberal dan isu-isu kesetaraan gender yang menganggap perempuan muslim termarjinalkan, rapatkan shaf dan barisan jangan sampai syeitan masuk di antara barisan kaum muslimin, ingat kisah Adam bagaimana setan masuk bisikan dan godaan sesat nya melalui perempuan yang tidak dikuatkan oleh lelakinya, ambil ini menjadi ibrah sepanjang dunia masih menerima kita sebagai khalifahnya. فاعتبروا يا اولى الأبصار لعلّكم ترحمون
The document discusses stream ciphers and how they can be implemented in either hardware or software. It describes how stream ciphers work by generating a pseudorandom bitstream from a key and nonce that is XOR'd with the plaintext. Hardware-oriented stream ciphers were initially more efficient to implement than block ciphers using dedicated circuits like LFSRs. However, LFSR-based designs are insecure and modern software-oriented stream ciphers like Salsa20 are more efficient on CPUs. The document cautions that stream ciphers can be broken if the key and nonce are reused or if there are flaws in the implementation.
This document discusses the role of agni, or digestive fire, in women's health according to Ayurveda. It states that balanced doshas, agni, and dhatus are necessary for good health. Agni helps process food into nutrients that nourish the body tissues. When agni is weak, it can lead to issues like irregular menstruation, PCOS, and poor fetal development. Maintaining a balanced agni through a healthy diet and lifestyle is important for preventing women's health problems according to Ayurvedic principles.
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGTsibaprasad Rout
This document summarizes 50 Ayurvedic drugs based on their clinical pharmacological properties or "karmas" as described in classical Ayurvedic texts. It provides the Sanskrit name, English name, family, and key synonyms for each drug derived from descriptions of their specific karmas or actions in major Ayurvedic texts. For some drugs, it highlights key chemical constituents and references modern research that helps validate their traditional uses. The drugs are categorized based on their actions on different body systems, such as the digestive, respiratory, cardiovascular and nervous systems.
Cryptography its history application and beyondkinleay
1) The document discusses the history of cryptography from ancient times to the 19th century.
2) It describes early encryption methods used by Greeks, Spartans, and Julius Caesar that involved transposition ciphers and substitution ciphers.
3) A major advance was the polyalphabetic cipher invented by Leon Battista Alberti in the 15th century, which used multiple cipher alphabets and was considered "unbreakable" at the time.
Nasya is an Ayurvedic Panchakarma procedure where medicine is administered through the nose. Pratimarsha Nasya involves administering 2 drops of oil in each nostril daily and can be done easily at any time from birth to death. It nourishes the head and prevents diseases by stimulating the olfactory channels and brain. Regular Pratimarsha Nasya strengthens tissues in the head and neck and prevents aging effects, without risk of complications.
The document discusses using Vedic astrology for health purposes. It outlines how medical astrology examines health in a birth chart. Planets represent different body systems, and signs and houses relate to parts of the body. The author analyzes charts to identify health issues and recommend gemstones, mantras, or medicines. The objectives are to discuss disease identification using astrology and selecting appropriate remedies.
This document discusses the purification (shodhana) process of karavira (Cerebra thevetia) according to Ayurvedic texts. It begins with an introduction to karavira and its classification. Key points include:
1. Karavira shodhana is typically done using godugdha (cow's milk) and dolayantra (heating method) for 1 prahara as this removes toxins.
2. A comparative study found ashuddha karavira had more foreign matter and lower loss on drying than shuddha karavira after the shodhana process, indicating removal of impurities.
3. During shodhana
This document discusses various classifications of Rasadravya (mercurial substances) mentioned in Ayurvedic texts. It describes 8 main classifications: 1) Maharasa, 2) Uparasa, 3) Sadharana Rasa, 4) Loha, 5) Ratna, 6) Uparatna, 7) Sudhavarga, 8) Sikata varga. It provides details on the substances included in each classification, citing sources from classical Ayurvedic texts. It also briefly covers classifications of poisons (visha) into Mahavisha, Upavisha, Sthavara visha, Jaangama visha etc. based on factors like origin, potency and
Vaikranta is a type of mineral that comes in 8 colors and has properties that destroy iron. It has 8 sides, is hexagonal, and soft to the touch. It is purified using a processing technique involving heating in a liquid medium. It is then combined with purified sulfur in equal quantities and subjected to further processing until purity standards are met, resulting in a bhasma form. Vaikranta bhasma is used as a digestive aid and detoxifier, and to treat cough, asthma, abdominal diseases, wasting, and diabetes. Dosages range from 5.2 to 11.3 mg depending on age.
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
This document summarizes a survey on efficient privacy-preserving ranked keyword search methods. It discusses how cloud computing allows large amounts of data to be outsourced but raises privacy concerns. Encrypting data is one way to reduce information leakage while outsourcing data. The paper reviews existing searchable symmetric encryption techniques that allow searching on encrypted data. It proposes a hierarchical clustering method that clusters documents into subclusters to improve search efficiency in linear time even as data size increases exponentially. A hash subtree is designed to authenticate search results. The objective is to investigate maintaining relationships between encrypted documents and propose a fast search architecture while improving rank privacy.
1. The document discusses the modification of traditional Ayurvedic formulations into different dosage forms like granules and tablets. It provides examples of research projects modifying Amalakyadi churna into dispersible tablets and Kantakaryadi kwatha into a syrup.
2. Analytical studies were conducted on the modified formulations to analyze characteristics like hardness, friability, disintegration time, and microbial quality. The studies found the modifications helped provide convenient dosage forms while maintaining the formulations' qualities.
3. Modifying Ayurvedic formulations can make them easier for patients to consume while meeting modern standards, helping increase their acceptance and use. However, standardization of such complex formulations remains challenging.
Cryptanalysis involves techniques to decode encrypted messages without knowledge of the encryption key. It includes attacking security protocols, breaking codes, and guessing keys. There are different models of cryptanalysis attacks including known ciphertext attacks, known plaintext attacks, chosen plaintext attacks, and chosen ciphertext attacks where the cryptanalyst has increasing amounts of encrypted or decrypted text that can be used to deduce the key and decrypt messages. The goal of cryptanalysis is to decrypt encrypted messages by analyzing patterns in the ciphertext or exploiting weaknesses in the encryption algorithms.
Mercury or Parada Have 3 types of Harmful effects, known as Dosha. Yayugika or Yougika or harmful effects due to Compound with Lead (Naga) & Tin(Vanga) amalgamation
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASEDR AJITH KUMAR
Iam Dr Ajith kumar
Practicing Dermatology since 3 years
Here iam presenting few formulation which is regularly used in skin disease and result oriented and also available in the market...
Do not follow anyone until understanding the concept...
All the best to all...
Dr. Ajith The famous Integrative dermatology practitioner. And all the ppt which i have updated is prepared by myself and if you find out the same in anywhere else, inform us and its 100% copied from my profile.
Thanking you
Dr Ajith kumar M.D,DCP
Fellowship in infectious disease
Chaitanya mahaprabhu's advent predictions from various vedicDeepak Kumar
The document provides numerous predictions and descriptions from major Hindu scriptures such as the Puranas and Vedas regarding the future advent of Lord Chaitanya. It describes His golden complexion, birthplace in Navadvipa, mother Sachi, inauguration of sankirtana movement, and appearance as a renounced sannyasi to deliver people suffering in the age of Kali. The predictions span from His specific birth details to the time of His appearance in the 7th manvantara of Kali Yuga between 4000-5000 years after its start.
The document outlines the schedule and contents of a DamodaraKatha program. It includes:
- An introduction lasting 5 minutes
- Singing of Damodarastakam arti for 15 minutes
- A 30 minute DamodaraKatha narration
- A 10 minute conclusion
The main part of the program is the DamodaraKatha narration, which covers the eight verses of Damodarastakam describing Lord Krishna's childhood pastimes of being bound by mother Yashoda to the wooden grinding mortar. It aims to reveal Krishna's supreme majesty and how he is conquered by pure love and intimacy, not awe.
Mari jaga masa depan generasi ummat Islam dengan menjaga perempuan-perempuan muslim dari tipu daya isu-isu jahiliah seperti feminisme liberal dan isu-isu kesetaraan gender yang menganggap perempuan muslim termarjinalkan, rapatkan shaf dan barisan jangan sampai syeitan masuk di antara barisan kaum muslimin, ingat kisah Adam bagaimana setan masuk bisikan dan godaan sesat nya melalui perempuan yang tidak dikuatkan oleh lelakinya, ambil ini menjadi ibrah sepanjang dunia masih menerima kita sebagai khalifahnya. فاعتبروا يا اولى الأبصار لعلّكم ترحمون
The document discusses stream ciphers and how they can be implemented in either hardware or software. It describes how stream ciphers work by generating a pseudorandom bitstream from a key and nonce that is XOR'd with the plaintext. Hardware-oriented stream ciphers were initially more efficient to implement than block ciphers using dedicated circuits like LFSRs. However, LFSR-based designs are insecure and modern software-oriented stream ciphers like Salsa20 are more efficient on CPUs. The document cautions that stream ciphers can be broken if the key and nonce are reused or if there are flaws in the implementation.
This document discusses the role of agni, or digestive fire, in women's health according to Ayurveda. It states that balanced doshas, agni, and dhatus are necessary for good health. Agni helps process food into nutrients that nourish the body tissues. When agni is weak, it can lead to issues like irregular menstruation, PCOS, and poor fetal development. Maintaining a balanced agni through a healthy diet and lifestyle is important for preventing women's health problems according to Ayurvedic principles.
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGTsibaprasad Rout
This document summarizes 50 Ayurvedic drugs based on their clinical pharmacological properties or "karmas" as described in classical Ayurvedic texts. It provides the Sanskrit name, English name, family, and key synonyms for each drug derived from descriptions of their specific karmas or actions in major Ayurvedic texts. For some drugs, it highlights key chemical constituents and references modern research that helps validate their traditional uses. The drugs are categorized based on their actions on different body systems, such as the digestive, respiratory, cardiovascular and nervous systems.
Cryptography its history application and beyondkinleay
1) The document discusses the history of cryptography from ancient times to the 19th century.
2) It describes early encryption methods used by Greeks, Spartans, and Julius Caesar that involved transposition ciphers and substitution ciphers.
3) A major advance was the polyalphabetic cipher invented by Leon Battista Alberti in the 15th century, which used multiple cipher alphabets and was considered "unbreakable" at the time.
Nasya is an Ayurvedic Panchakarma procedure where medicine is administered through the nose. Pratimarsha Nasya involves administering 2 drops of oil in each nostril daily and can be done easily at any time from birth to death. It nourishes the head and prevents diseases by stimulating the olfactory channels and brain. Regular Pratimarsha Nasya strengthens tissues in the head and neck and prevents aging effects, without risk of complications.
The document discusses using Vedic astrology for health purposes. It outlines how medical astrology examines health in a birth chart. Planets represent different body systems, and signs and houses relate to parts of the body. The author analyzes charts to identify health issues and recommend gemstones, mantras, or medicines. The objectives are to discuss disease identification using astrology and selecting appropriate remedies.
This document discusses the purification (shodhana) process of karavira (Cerebra thevetia) according to Ayurvedic texts. It begins with an introduction to karavira and its classification. Key points include:
1. Karavira shodhana is typically done using godugdha (cow's milk) and dolayantra (heating method) for 1 prahara as this removes toxins.
2. A comparative study found ashuddha karavira had more foreign matter and lower loss on drying than shuddha karavira after the shodhana process, indicating removal of impurities.
3. During shodhana
This document discusses various classifications of Rasadravya (mercurial substances) mentioned in Ayurvedic texts. It describes 8 main classifications: 1) Maharasa, 2) Uparasa, 3) Sadharana Rasa, 4) Loha, 5) Ratna, 6) Uparatna, 7) Sudhavarga, 8) Sikata varga. It provides details on the substances included in each classification, citing sources from classical Ayurvedic texts. It also briefly covers classifications of poisons (visha) into Mahavisha, Upavisha, Sthavara visha, Jaangama visha etc. based on factors like origin, potency and
Vaikranta is a type of mineral that comes in 8 colors and has properties that destroy iron. It has 8 sides, is hexagonal, and soft to the touch. It is purified using a processing technique involving heating in a liquid medium. It is then combined with purified sulfur in equal quantities and subjected to further processing until purity standards are met, resulting in a bhasma form. Vaikranta bhasma is used as a digestive aid and detoxifier, and to treat cough, asthma, abdominal diseases, wasting, and diabetes. Dosages range from 5.2 to 11.3 mg depending on age.
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
This document summarizes a survey on efficient privacy-preserving ranked keyword search methods. It discusses how cloud computing allows large amounts of data to be outsourced but raises privacy concerns. Encrypting data is one way to reduce information leakage while outsourcing data. The paper reviews existing searchable symmetric encryption techniques that allow searching on encrypted data. It proposes a hierarchical clustering method that clusters documents into subclusters to improve search efficiency in linear time even as data size increases exponentially. A hash subtree is designed to authenticate search results. The objective is to investigate maintaining relationships between encrypted documents and propose a fast search architecture while improving rank privacy.
Key aggregate cryptosystem for scalable data sharing in cloud storage using pairng based cryptography. We used JPBC tool to implement Key Aggregate cryptosystem.
survey paper on object oriented cryptographic security for runtime entitiesINFOGAIN PUBLICATION
With the advent of complex systems the need for large data storage with less space utility & high performance have become the vital features. Another important concern of the data is the security which is assured via the cryptographic techniques implemented at all levels of data storage. In this survey paper we introduce the concept of security between two hierarchical data accesses and propose the concept of hierarchical cryptography between data of different classes of different hierarchies.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Marisa Paryasto
This document discusses issues related to implementing elliptic curve cryptography (ECC). It provides a brief overview of ECC basics and theory, as well as guidance on implementation. Specifically, it notes that ECC offers advantages over RSA like shorter key sizes but presents challenges for performance, security, and flexibility depending on whether implemented in software or hardware. Software allows flexibility but has lower performance while hardware has higher performance but less flexibility. The document also summarizes ECC operations and the layers involved in scalar multiplication, the most computationally intensive operation.
The document describes the Hummingbird ultra-lightweight cryptographic algorithm targeted for resource-constrained devices. It presents the hybrid model of Hummingbird which combines a block cipher and stream cipher. The algorithm uses a 256-bit key, 80-bit internal state, and 16-bit blocks. It consists of four 16-bit block ciphers and registers that encrypt plaintext blocks through consecutive operations. Simulation results show it encrypting a sample plaintext into ciphertext on an FPGA with lower area requirements than other lightweight algorithms. The algorithm is suitable for high-security embedded applications with limited resources.
Data Security Using Elliptic Curve CryptographyIJCERT
Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
Wireless communication systems, multi-input multi-output (MIMO) technology has been recognized as the key ingredient to support higher data rate as well as better transmission quality after using this algorithm of a XTEA or MTEA scheme. Modified TEA is used for encryption of the text. Then decryption unit for decrypting the cipher text and convert that to plain text. Key generation unit is to generate 128bit key and these keys are send along with cipher text. Encryption and decryption system ensures the original data are send and received by the users in secured environment. The Received data are retrieving by the authorized users by providing key generation like private keys this Key Pattern generations provide more security to the messages. Extended tiny encryption algorithm or modified tiny encryption algorithm and tiny encryption algorithm are used to enhance the size, speed and security in the system. These algorithms are better compared to configurable joint detection decoding algorithm (CJDD) and valid symbol finder algorithm.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Improved Caesar Cipher with Random Number Generation Technique and Multistage...ijcisjournal
Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation operations. The Caesar cipher has been expanded so as to include alphabets, numbers and symbols. The original Caesar cipher was restricted only for alphabets. The key used for Caesar Substitution has been derived using a key Matrix Trace value restricted to Modulo 94. The Matrix elements are generated using recursive random number generation equation, the output of which solely depends on the value of seed selected . In this paper, we made an effort to incorporate modern cipher properties to classical cipher. The second stage of encryption has been performed using columnar transposition with arbitrary random order column selection. Thus the proposed Scheme is a hybrid version of classical and modern cipher properties. The proposed method provides appreciable Security with high throughput and occupies minimum memory space. The Method is resistant against brute-force attack with 93! Combinations of keys, for Caesar encryption.
Improved Caesar Cipher with Random Number Generation Technique and Multistage...ijcisjournal
Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation operations. The Caesar cipher has been expanded so as to include alphabets, numbers and symbols. The original Caesar cipher was restricted only for alphabets. The key used for Caesar Substitution has been derived using a key Matrix Trace value restricted to Modulo 94. The Matrix elements are generated using recursive random number generation equation, the output of which solely depends on the value of seed selected . In this paper, we made an effort to incorporate modern cipher properties to classical cipher. The second stage of encryption has been performed using columnar transposition with arbitrary random order column selection. Thus the proposed Scheme is a hybrid version of classical and modern cipher properties. The proposed method provides appreciable Security with high throughput and occupies minimum memory space. The Method is resistant against brute-force attack with 93! Combinations of keys, for Caesar encryption.
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...dbpublications
The document proposes a new password-authenticated key agreement protocol using chaotic maps towards a multiple servers to server architecture in the standard model. The proposed protocol aims to solve issues with single-point security, efficiency, and failure in centralized registration centers by adopting a multiple servers to server architecture. The protocol provides perfect forward secrecy and resistance to dictionary attacks while allowing weak passwords. A security proof is given for the standard model and an efficiency analysis is presented.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
Cryptanalysis of block ciphers involves massive computations which are independent of each other and can
be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low
cost Field Programmable Gate Arrays (FPGA’s), building special purpose hardware for computationally
intensive applications has now become possible. For this the Data Encryption Standard (DES) is used as a
proof of concept. This paper presents the design for Hardware implementation of DES cryptanalysis on
FPGA using exhaustive key search. Two architectures viz. Rolled and Unrolled DES architecture are compared
and based on experimental result the Rolled architecture is implemented on FPGA. The aim of this
work is to make cryptanalysis faster and better.
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
The document discusses various cryptographic techniques for encrypting data, including symmetric, asymmetric, stream ciphers, block ciphers, and hashing. Symmetric cryptography uses the same key for encryption and decryption, while asymmetric cryptography uses public and private key pairs. Common attacks on cryptographic systems are also outlined, such as known-plaintext attacks where an attacker has plaintext and ciphertext, chosen-plaintext attacks where an attacker can select plaintext to encrypt, and side-channel attacks which analyze power consumption or timing. The document provides background information on existing cryptographic techniques and attacks.
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
The document discusses various cryptographic techniques for encrypting data, including symmetric, asymmetric, stream ciphers, block ciphers, and hashing. Symmetric cryptography uses the same key for encryption and decryption, while asymmetric cryptography uses public and private key pairs. Common attacks on cryptographic systems are also outlined, such as known-plaintext attacks where an attacker has plaintext and ciphertext, chosen-plaintext attacks where an attacker can select plaintext to encrypt, and side-channel attacks which analyze power consumption or timing. The document provides background information on existing cryptographic techniques and attacks.
An Efficient File Hierarchy Attribute-Based an IEEE projects, here Cloud Technologies giving to information on An Efficient File Hierarchy Attribute-Based
Similar to Symposium on Jainism and Mathematics - presentation : 2020 (20)
"Introduction to Siribhūvalaya" - Talk at Jain Academy of ScholarsAnil Jain
"Siribhūvalaya" is one of its kind mind-boggling creations in the whole world. This grand poetry has been crafted by Ācārya Kumudēndu in Numeral Script in 9th century. It is a treasure house of knowledge and encompasses verses in many languages.
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Anil Jain
Kumudendu Encryption Scheme: An Efficient and Versatile Indian Cryptographic System, devised about 1000 years ago. It has Modern Cryptography constituents for a very robust encryption.
The document provides information about a workshop on understanding the basics of Siri-Bhoovalaya, an ancient Indian epic scripted using numerals. It discusses the history and rediscovery of the text over the past 1000 years. Key figures involved include Muni Kumudendu who originally authored the text, and 20th century scholars like Yellappa Shastri who worked to decipher and publish it. The summary also provides a high-level overview of the structure and content of Siri-Bhoovalaya, which is divided into 9 chapters containing verses and stories hidden within numeric matrices known as chakras.
Some Structural Aspects of Siri-BhoovalayaAnil Jain
This is the presentation by Er. Anil Kumar Jain at "Research Workshop on Siri-Bhoovalaya" during 13-14th September 2017 at KundKund Gyanpeeth, Indore, INDIA
Siri Bhoovalaya is a Kannada literary work entirely written in Kannada numerals believed to be the only book of its kind. It was written around 800 AD by Sage Kumudendu and comprises 1270 number charts arranged in a 27x27 matrix. The matrices contain 64 Kannada numerals assigned to phonetic alphabets and hidden within are claimed to be 718 languages, scripts, religious texts and scientific information. To decipher the book, the numerals are read using defined patterns called 'bandhas' which is a form of ancient Vedic cryptography.
An inimitable cryptographic creation : Siri BhoovalayaAnil Jain
Muni Kumudendu, a great genius, created a unique treasure house of knowledge known as ‘Siri Bhoovalaya’ about a thousand years ago in Karnataka, India. The unique feature of this literature is that it is scripted in numerals only and enciphered in such manner that deciphering could be done in different fashions which result in plain-texts in different languages. One page of this epic corresponds to one ‘Chakra’. A scheme for deciphering of Chakra is termed as ‘Bandha’. Only 1270 of Chakras available this day. A Chakra is a 27x27 matrix of integers in range from 1 to 64 only. Each of the Integers is associated or encoded with a phonetic character primarily of origin in Kannada Language. Deciphering of a Chakra in specific manners or applying corresponding Bandhas reveals poetry and verses in different languages. In addition to primarily in Kannada, the languages in which the Chakras manifest poetry and verses include Prakrita, Sanskrit, Telugu, Tamil, Apabhramsha and Pali etc.. It is considered that this wonderful design contains verses in 18 major languages and 700 minor one thus totaling 718 of dialects. The subject matter covers religious scriptures of Jains, Vedas, Ayurveda, Astrology and Mathematics too. This unique piece of literature could not attract attention of masses because it is scripted in numerals and decipherment is a very tedious job. This led to loss of not only the original manuscript of this precious work but also of five of the copies during the course of time. After this being laid dormant for about thousand years, great efforts of Pandit Yellappa Shastri brought it to light with the only available copy of it in existence. We all owe sincere gratitude to Pandit Yellappa Shastri for protecting and revealing this magnificent heritage. Sizeable content of this composition has not come to light due to difficulty in deciphering the schemes in respective Chakras.
The objective of this presentation is to illustrate some of the decipherment schemes which are deployed on Chakras to reveal plain-text. These schemes are labeled as Bandhas by Muni Kumudendu and he himself has described many of these Bandhas with associated nomenclature. It is remarkable to note that Bandhas implement many of Cryptographic algorithms, which have contemporary relevance and those were envisioned by Muni Kumudendu thousand years ago. These algorithms largely include substitution, transposition or permutation, and principles of Steganography etc. It may be another subject of investigation that how could Muni Kumudendu accomplish this unique highly complicated and complex mission which not only involved mathematical brilliance but also dexterity to put in great literature and enormous knowledge in it.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Symposium on Jainism and Mathematics - presentation : 2020
1. ‘Siribhūvalaya’: A Unique Scripture crafted
with Modern Cryptography Constituents
by
Er. Anil Kumar Jain
FIETE, FIE(I), SMCSI, LM-ISCA
email: jain.anilk@gmail.com
web-site: siri-bhoovalaya.org
Virtual Symposium on Jainism and Mathematics
Dec. 12 to Dec. 14, 2020
2. Main Objectives of this Presentation
1. To reveal that Cryptographic mechanisms devised by Acārya
Kumudēndu about 1200 years ago are strikingly similar to ones
used in modern Information Security applications.
2. To convey in modern mathematical expressions the underlying
premise of the cryptographic Writing System (Anka-Lipi) as
conceived by Acārya Kumudēndu. This is labeled as Kumudēndu
Encryption System (KES) by this author.
3. To present rudiments of KES (Kumudēndu Encryption System) in
modern terminology of Information Security and to corroborate
its potential in present scenario.
siri-bhoovalaya.org
3. Siribhūvalaya by Ācārya Kumudēndu
• Siribhūvalaya was scripted by Ācārya Kumudēndu during 8th
century AD in the state of in Karnataka, India.
• Ācārya Kumudēndu devised an exclusive ‘Writing System’ for
this unique creation which was based on universal script of
numerals only. [Anka-Lipi]
• Herein one Cakra or a page contained only integer numbers
arranged in a square matrix of dimension 27.
• Integer, in each of the cells of the matrix in the range of 1 to
64, represented one of the 64 Mūla Varṇas or basic phonetic
alphabets as enumerated in texts of earlier Ācāryas in lineage
to which Ācārya Kumudēndu belonged to.
• It is claimed to be the largest scripture in the world (only one
out of total of nine Khaṇḍas is available in public domain).
siri-bhoovalaya.org
4. Siribhūvalaya manuscript at National Archives of India
[One CAKRA ( 27x27 matrix) with numerals in Kannaḍa script]
siri-bhoovalaya.org
5. siri-bhoovalaya.org
Symmetric Cipher Model by Claude E. Shannon
(Father of Modern Information Theory)
C. E. Shannon: “Communication Theory of Secrecy Systems” : Bell Systems Technical
Journal, Vol. 28, pp. 656–715, 1948.
Earlier version of this research was presented in the classified report : “A Mathematical
Theory of Cryptography”: Memorandum MM 45-110-02, Sept. 1, 1945, Bell Laboratories.
7. Basic Building Blocks of KES framework
siri-bhoovalaya.org
KES (Kumudēndu Encryption System) framework, as deployed in Siribhūvalaya,
consists of two symmetric encryption ciphers and an Integrity check mechanism :
Mono Alphabetic Substitution Cipher : Here Key is identified as ‘Kumudendu Code
Table’ (KCT). Here each of phonetic alphabet or Mūla Varṇa of the target script is
assigned an integer numeric value in range 1 to 64.
Transposition Cipher : Here key is named as ‘Bandha Traversal Path Matrix’ (BTPM).
It is a matrix of 27x27 integers or a vector of 729 integers. Herein each element is a
distinct integer in the range 1 to 729, and which is indicative of place of the
transposed phonetic alphabets in corresponding Cakra matrix (27x27).
Transposition Cipher has two variants – Cakra-Bandha and Navmānk Bandha ,
wherein BTPM operates over whole of 27x27 matrix or 9x9 sub-matrices of the
Cakra respectively.
Integrity Check : To ensure accuracy and consistency of content in Siribhūvalaya, at
the end of each Adhyaya there is mention of total number of phonetic alphabets in
basic decoded and derived text of the Adhyaya. This ensures that there is no
addition, deletion or modification of Cakras consisting the Adhyaya.
8. Substitution Cipher Key (KCT) for Devanāgarī, Kannaḍa
and Brāhmī scripts
कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर
siri-bhoovalaya.org
9. Mathematical Representation of Decryption
Mechanism (Transposition) – [Step-1]
siri-bhoovalaya.org
Transformation function (matrix to vector conversion function) i.e. ‘nvfunc’ converts
CAKRA matrix into NVECTOR by implementation of a method called ‘locate’ which has
got two arguments viz. BTPM and an integer variable ‘p’ in the range from 1 to 729.
10. Mathematical Representation of Decryption
Mechanism (Transposition) in Cakra 1-1-1 – [Step-2 ]
siri-bhoovalaya.org
Value of p 1 2 3 4 5 6 7 8
(x,y) in BTPM 1,14 27,15 26,16 25,17 24,18 23,19 22,20 21,21
cxy in CAKRA 1 58 38 1 52 1 60 2
12. Mathematical Representation of Decryption
Mechanism (Substitution & Assimilation) – [Step-4 ]
siri-bhoovalaya.org
Resultant text after conjoining phonetic alphabets or Mūla Varṇas into words,
phrases and verses results in following:
अष्ट महाप्रातिहार्य वय्भवदिन्ि | अष्ट गुणन्गळौल् ओोम्िं ||
स्र्ष्ष्टगे मन्गळ पर्ायर्दितिि | अष्टम स्र्षििगेर गुवेिु ||1||
This is the first verse of first Khaṇḍa i.e. ṁagala Prābhr̥ta of Siribhūvalaya.
13. Robustness of KES against Brute Force Attacks
siri-bhoovalaya.org
Depending on the security requirements, the substitution table can be altered in
size and assignment of integers. Thus even with 64 element KCT, there are
possible Factorial (64) permutations resulting in a number with 89 digits.
Size of Transposition key can be adjusted to thwart anticipated brute-force
attacks. Preliminary estimations reveal that possible Transposition schemes of
729 elements, of 27x27 matrix as deployed in “Siribhūvalaya”, amount to
Factorial (729) permutations and that results in massive number of approximately
1772 digits. That means a brute-force attacker will have to find correct
Transposition Key out of so many possible ones. This will require massive
computational resources which is very highly impractical in contemporary
scenario.
Current cryptographic standards of symmetric key encryption recommend key
length of 256 bits, wherein possible key combinations are of the order 78 digits
only for a brute-force attack.
14. KES in present Scenario
siri-bhoovalaya.org
KES is inherently suitable for applications on variety of platforms which use
Indian Languages and Scripts.
With its variable length dual key symmetric encryption scheme it can be
customised for Information Security requirements of wide-range of systems
and applications.
Since it requires small computational overhead, KES can efficiently be deployed
on systems with nominal computing resources. Even in absence of computing
machines, KES can be implemented with manual operations only. That is how
Acārya Kumudēndu encrypted Siribhūvalaya in 8th century and later in 20th
century Pandit Yellappa Shastri was able to decrypt it manually.
In addition to KES there are other Cryptographic mechanisms very creatively
integrated in Siribhūvalaya. These are termed in modern terminology as Visual
Cryptography (Citra Bandha) and Steganography (Antara Sāhitya).
Editor's Notes
There are many distinctive features of this unique creation, but in this presentation focus is on the Cryptographic constituents which are strikingly similar to ones used in modern applications of Cryptography in Information Security. One can noticeably observe creative deployment of Substitution and Transposition Ciphers in Cakras of this epic. Built upon notions of Matrices these are mathematical applications of combinatorics and permutations. A generalized version of this mechanism in modern terminology has been proposed as KES (Kumudendu Encryption System) which can measure up to a versatile and robust block cipher as compared to existing ones. Besides encryption mechanisms Muni Kumudendu implemented a scheme to check Integrity of the verses in each of Adhyāyas in a smart manner. Muni Kumudendu has very creatively used Steganography for interweaving not only multi-lingual verses in base Kannada text but also deployed this technique to enclose scriptures from other sources.
Purpose of this presentation is to highlight one of the unique characteristics of an enigmatic epic created by Jain Acārya Kumudēndu more than a century ago. Yet not fully revealed this scripture had remained out-of-sight for centuries and was rediscovered about 70 years ago by Pandit Yellappa Shastri in Bengaluru, Karnataka State of India.
Acārya Kumudēndu regarded Acārya Virasen as his Guru. Subject matter of Siribhuvalaya covers wide spectrum of Jain canonical topics along with discourses on ancient sciences and scriptures of non-jain religious streams. This is very rightfully described as a scripture of scriptures (Shatron and Shatra).
This is the image of one sheet of manuscript wherein we can identify one matrix of size 27x27 and another matrix of size 3x3 near top left corner. Elements in both of these matrix contains integer numerals in Kannada script.
On minute observation one can identify partitioning of 27x27 matrix into nine sub-matrices of size 9x9 each.
3x3 matrix at the top left corner provides vital clue in construction of key for the Transposition Cipher.
It is to be noted that concept of structuring and processing of data elements in matrix form is quite recent in modern mathematics, about 150 years old only. It is not yet known whether any of mathematicians prior to Acarya Kumudendu has deployed matrices so creatively.
This slide exhibits Schematic of General Secrecy System of Claude E. Shannon which is also termed as Symmetric Key Cipher Model in Modern Cryptography. References for this model are mentioned on this slide.
Kindly note that Shannon was an alumni and later a faculty member at MIT.
Noticeable on this schematic are two transformation processors namely Encipherer and Decipherer which are complimentary to each other. Message source sends message to Encipherer which transforms message into a cryptogram. This transformation function has two parameters – the message M and a Key from Key source. The cryptogram is decrypted at the recipient’s end by Decipherer Transformation Processor which operates with two parameters, namely Cryptogram and the same key K from the Key Source.
This model represents Symmetric Key Cryptography mechanism and is very widely deployed in modern Information Security Application. DES, 3DES, AES, IDEA are few examples of this.
This slide brings forth the resemblance of Kumudendu Encryption System with Shannon’s Model of General Secrecy System.
In this model Message source is Text in Mula Varnas, Key Source contains two keys one for Transposition Cipher and Another one for Substitution Cipher. Encipherer transforms message using Transposition and Substitution mechanisms and the Output is a CAKRA which is termed a Cryptogram by Shannon. Decipherer Transformation converts CAKRA into a string of Mula Varnas using the same Keys from Key Source.
Slide Nos 9 to 12 describe in mathematical terms the Deciphering mechanism as applied to a CAKRA in Siribhuvalaya. Detailed description of Deciphering and Enciphering is presented in the Full Length Paper submitted for the Symposium.
Here is representation of CAKRA and BTPM (Transposition Cipher Key) as 27x27 matrices respectively.
Deciphering of Transposed Matrix is basically a transformation function to convert CAKRA matrix into a row-vector of 729 elements as per transpositions scheme contained in BTPM.
This slide describes the transformation of CAKRA matrix into a row-vector - cell by cell – in accordance to place value and its location in BTPM.
As an example first CAKRA of Siribhūvalaya is referred in the slide.
This slide describes KCT - the Key for Substitution Cipher. KCT is basically an ordered row-vector of 64 elements containing Mula Varnas of the target script. KCT for Devanagari Script is taken as an example.
Substitution of integers in the transposed row-vector of 729 elements results in string of Mula Varnas in target script.
This slide represents final outcome of Deciphering. Resultant text after conjoining or assimilating phonetic alphabets into words, phrases results finally in verses.
Shown in this slide is First verse of Siribhuvalaya – which the Mangalacharan and is dedicated to Eight Jina.
अष्ट महाप्रातिहार्य वय्भवदिन्द | अष्ट गुणन्गळौल् ओोम्दं ||
स्र्ष्टिगे मन्गळ पर्यायदिनित | अष्टम जिनगेर गुवेनु ||
Herein, Overwhelmed with immense external grandeur of eight Mahāprātihāryas - which are attributed to Arihanta Paramēṣṭhī - Ācārya Kumudēndu envisages internal majesty of Aṣṭaguṇas i.e. eight infinite qualities which are derivatives of ‘ŌM’ and are attributed to Siddha Parameśṭhī. He pronounces that these two forms i.e. Arihanta & Siddha are enormous benefactor for the well-being of whole of the universe. Ācārya Kumudēndu thus commences Maṅgala Prābhr̥ta of Siribhūvalaya by bowing down to pay humble homage to Eighth Jina i.e. Lord Candra Prabhu or Candra Nāth.