Return to flip book view

Passwords PINs Paper

Page 1

Steve Mongkut

Page 2

Number Words 12Introduction 3Major MemoryLetter Codes 5Chimp Chance 6Major Rhyme 7Avoid 14Jane Doe John Buck 11Analog BLOG 9Ideas 15Mnemosyne 19LIST OF CONTENTSPassword PINs Paper420Square Ciphers21First Last22Invisible Ink25Conclusion

Page 3

Pen and Paper PublicationSan Paper and Layabout Books Steve Mongkut SIGSec Codes and Ciphers ISIG www.sansap.comsan2paper@gmail.com Mnemonics Passwords PINs

Page 4

https://en.wikipedia.org/wiki/Mnemonic_major_system Major MemoryWikipedia gives a detailed description of the so-calledMajor System which turns letters of the alphabet intonumbers.Tony Buzan of British Mensa did not invent this method: the phonetic equivalence of letters and numbers is centuries old and a version of theMajor Method appeared in Amsterdam, written in Latin,around the year 1620.It is based on an Arabic text, BIG MEMORY, and theArabic word kabir, meaning big, became translated intoLatin as maior the opposite of minor.

Page 5

MAJOR-MEMORY-LETTER-CODES 0 S, Z, SOFT C; Z IS THE FIRST LETTER OF ZERO1 T, D: T & D HAVE 1 VERTICAL STROKE2 N: N HAS TWO DOWN STROKES3 M; M HAS THREE DOWN STROKES4 R: LAST LETTER OF 4 FOUR5 L: L IS THE ROMAN NUMERAL FOR 506 J, SH, SOFT G, SOFT "CH"7 K: HARD C, HARD G, HARD "CH", Q, QU8 F, V: SCRIPT F RESEMBLES A FIGURE-89 P, B: P IS A MIRROR-IMAGE 9 UNASSIGNED LETTERS W, H, Y, X, CAN BE USEDANYWHERE WITHOUT CHANGING A WORD'S NUMBERVALUE; THEY ARE NULLS - ALONG WITH THE VOWELS A, E, I, O, U AND ALL PUNCTUATION MARKS YOU ARE WORKING WITH AN ALPHABET OF ONLY 17(SEVENTEEN) SIGNIFICANT LETTERS.

Page 6

Vowels are nulls. Double letters are treated as a single;so, for example, RUSSIA has the numerical value of 40 (forty). Strike out the nulls and see what is leftRS = 400-o-0 Bank PIN or ID PINThese often have 4 (four) or 6 (six) digits Here is a random list from monkeys with typewritersr a v e n o u s r v n st o b y j u g t b j gm u d c a k e m d c kc a f é s o l o c f s lb a r o n e t b r n tn i t e o w l s n t l sz e n k o a n z n k nm a g p i e s m g p s4 8 2 01 9 6 73 1 7 77 8 0 59 5 2 12 1 5 00 2 7 23 7 9 0 C H I M P C H A N C E

Page 7

So That No Man Rues Life Judge Kindly For PityMnemonic DittyHow do you receive a PIN and an ATM card? Generally you receive the card and the PIN separately.This is a simple form of 2-factor authentication.The first factor is possession of the card.The second factor is a number which you enter into theATM keypad after inserting the card.Can you choose your own PIN?Initially, the bank, or other organisation, provides youwith a starter PIN that allows you to access youraccount. Then, once you access the account, you areable to change that number to your own personalpreference PIN - which means a number you canremember. So, how do you choose that number?Thou shalt not ...... use your birthday or phone number or house numberor employee number etc etc etc

Page 8

Above all thou shalt not write it down ...This is partly a bit of hanky-banky: if you write downthe number where others can see it, or gave it tosomeone who takes money out of your account on yourbehalf, the bank may refuse you recompense in theevent that your card is stolen and misused.0-o-0Certainly, you do not write your PIN on the back of thecard in laundry marker pen. 'So I don't forget.' Thishappens in the same way that office workers may writetheir password on a sticky-note and affix it to theiroffice computer. Passwords are more than keys to thedoor; they are personal identifiers which make youaccountable on a network or in a computer system.0-o-0ID WHO ARE YOU? Biometrics are a solution: fingerprints, iris scans, voice and face recognition; spit in thecup for DNA analysis. The cost of these procedures isgreater than the likely loss by petty theft.0-o-0Of course, wise persons reading this trifle always keepgood care of their cards and PINs and passwords. Theyreport lost and stolen cards immediately.

Page 9

What and Where can you Write? A high powered Password Manager is the savvy key tothe treasury of all those PINs and Passwords andContacts that you guard with your life. And, like a safe,does a Password Manager require a key to gain access?PINs and NeedlesJane Doe and John Buck write in a Junk Jotter whichthey keep in plain sight. They know the old expressionto look for a needle in a haystack. The modern expression could bea pin in a junkyard.Write down your PIN, if you really can't remember it,and surround your PIN with junk.

Page 10

Page 11

Jane Doe and John BuckCreated for you by Dall-e2Artificial Intelligence.We can look at picture promptmnemonics later.Jane and John based their 4-digit PIN on the initialletters of their namesJDJBThey know the Major System so their PIN is6169 0-o-0Here are a few examples of longer numbers: Passport Number 708321546cassava monad larch Bank Pin 021482sandy raven Membership Number 20795nose cabal

Page 12

Here are examples of 1 and 2 digit numbers. Make upyour own words: 0 so; 1 do; 2 no; 3 ma; 4 row; 5 low; 6 she;7 cow; 8 foe; 9 bye; 10 dyes; 11 edit; 12 tuna;13 time; 14 dare; 15 tail; 16 dish; 17 dog;18 deaf; 19 deep; 20 nose; 21 net; 22 onion;23 name; 24 near; 25 nail; 26 nosh; 27 neck;28 nave; 29 nib; 30 mess; 31 met; 32 moon;33 mum; 34 emery; 35 mail; 36 mush; 37 mug; 38 move; 39 map; 40 rice; 41 road; 42 ruin; 43 rum;44 aurora; 45 royal; 46 rich; 47 rake;48 roof; 49 wrap; 50 lazy; 51 lady; 52 alien;53 lime; 54 lure; 55 loyal; 56 leech; 57 leg;58 lava; 59 loopy; 60 cheese; 61 cheat; 62 shin; 63; jam; 64 jury; 65 chilli; 66 cha-cha; 67 chick; 68 chef; 69 chip; 70 goose; 71 cat; 72 coin;73 game; 74 crow; 75 kill; 76 cage; 77 cook;78 give; 79 cube; 80 vase; 81 fat; 82 fan;83 foamy; 84 fry; 85 fly; 86 fishy; 87 fig; 88 viva;89 fob; 90 busy; 91 bead; 92 ban; 93 puma;94 bury; 95 peel; 96 pouch; 97 bike; 98 beef;99 pop;100 dazes

Page 13

Okay, this may take a bit of practice but it is a handymnemonic device. Perseverance pays off. Can you work out this URL?ASCII Numbers tidal pike dates detail paki deaden raj bubo dated doseup The solution is:115 97 110 115 97 112 46 99 111 109 What is the ASCII value of A to Z? The ASCII value of the lowercase alphabet is from 97 to122. And, the ASCII value of the uppercase alphabet isfrom 65 to 90. 0-o-0 So, this is another method of translating letters intonumbers and numbers into letters.Your computer understands it.

Page 14

Banks give advice to memorise your PINs andpasswords rather than write them down. Of course,people need to record this information, and, so, store itin password managers or write it down and lock it in asafe - if you happen to have one.As mentioned above, do not be obvious.The most common office passwords have remainedunchanged for years:***123456 123456789 qwerty password; 12345 qwerty23 1q2w3e 12345678 111111 1234567890***Summary of Passwords Passwords Dos and DontsLength is Strength: aim for a minimum of 15 charactersDo not include personal info such as dates of birth,names and real phone numbersUse a different password for each app/account (thesecan be variations on a theme)Avoid common dictionary words – other languages arepossible but not letters with diacritics. Plain ASCII English is safe.

Page 15

Replacing letters with symbols is nowdisparaged, for exampleD@nD@nL@v@toryM@nbut your password will include characters such as @ $ ! # * - etc and numbers 0123456789 but not specials in doublets or specials in first place; donot begin a password with a space. Password Ideas to get startedC12H22O11=sugar 1Quintal=100KilosYou can begin a password with a number but not aspecial character.In addition to single special characters there are groupedcharacters called keyboard emoticons which can includea space: yes, a spacebar press is valid within apassword.:) colon+right-bracket; :( colon+left- bracket; ;) semi-colon+right-bracket;=( equals-sign+left-bracket;:] colon+right-square-brace;:< colon+less-than; :8 colon+8;:) colon+right-bracket; :L colon+L;:S colon+S; :/ colon+forward-slash;:( colon+left-bracket; :@ colon+'at' sign;contd ...

Page 16

=0 equals-sign+zero; :3 colon+3;:! colon+exclamation; :} colon+right- curly-brace; <3 less-than+3 etc which is the opposite of >3 Songs, Rhymes, Quotations, Titles 2Bornot2B:titq?4+20BlackBirds(biap)OldKingCole:fiddlers3Only24HfromTulsa!30Ds:SepAprJunNov60Miles+10toBabylon AliBaba: )40Thieves 7thSeal: <Bergman1957 7Samurai: (Kurosawa1954 Magnificent7= {1960 TailOf2Cities? Be imaginative.What do you remember?Can you draw a mnemonic?Or ask AI to draw one for you.

Page 17

two dozen black birdsten thousand menthree blind micetwo out of four horsemenSing a Song of SixpenceThe Grand Old Duke of Yorksee how they runWar, Plague, Famine, Death -from the Book of RevelationsHave Fun With AI Generated Graphics

Page 18

Doodles and Drawings and icons and Emojis andSymbols https://getemoji.com/https://www.emojicopy.com/https://fsymbols.com/emoticons/https://coolsymbol.com/emojis/emoji-for- copy-and-paste.htmlFor simple doodles and drawings search on Pinteresthttps://www.pinterest.com/Write stuff down in a form that means something to you but not to others. Try Mind Maps and distractors.Map your password on a fantasy map.Create your own bookplate or bookmark. CATO CORKSOU CREEKERROR

Page 19

(pencil works as well) In the Internet of Things, nothing is private - yet youhave a safe space to write in your own carefully guardednotebook or journal or diary. No batteries. No Wi-Fidrops and internet outages. No ads. No intrusions. NoSPAM. No phishing. No pop-ups.This pamphlet has discussed ways you can disguiseyour meaning. Junk haystacks hide personal needles orgoodies of recollection and reflection: souvenir means arecall of memory—the past continuing in the present—areminder, an aide-memoire. Mnemonics are named afterMnemosyne [mnɛːmosýːnɛː] who is the mother of thenine Muses. Improve your handwriting. Take updrawing. Pens and Papers are Pacifying.The Case For Pen and Paper

Page 20

More serious stuff: you may want to look at simpleciphers for camouflage and security. No big sums. Nocomplex subs.Codes and Ciphers covers a variety of plain geometricciphers which do not require substitutions orcalculations. They are transpositions. A simple exampleis The Square Table Cipher [quadrata mensa]C R E T U I S T I A P E S N R H C S S E E R E Q SThis fools Fred and Freda Bloggs but is not secureagainst bright wits. Mensans do it in their heads.Cipher Secrets Set in Squares5-Square Simplebooklet

Page 21

A Final Simple CipherThis one is dignified with a Greek name and is arespectable 16th century construction: only the first andlast letters count in each word. It is calledacrostic-telestic.SA SALUTATU TOURD RAPIDAY ARRAYAT AMOUNTFO FARGOUR UNDERPM PARAM SALUTA TOU RAPID ARRAY AMOUNT FARGO UNDER PARAMFaffy? Well, it may appeal as a sort of literary game.Who are you writing to? If you intend a memo toyourself or key to your key, handwriting and drawingmay be simpler.Last Note on HandwritingCan you read this: Can you read this?

Page 22

Invisible InkWhat is this? Kiddies' playtime?Invisible ink is so unexpected that it escapes notice.There is a long history behind it and invisible inkremained in use during the early years of the 20thcentury. The general term for hiding rather thanenciphering a message is STEGANOGRAPHY.https://en.wikipedia.org/wiki/Microdot White on WhiteThis page is left blank for administrative purposes In a digital communication, such as a Word documentsent by email, you can hide your secret by turning thefont colour to white. Use the smallest font possible andwrite in the Word footer. This may be effective in anoffice where prying eyes can see the body of adocument that arrives across a network. Only you knowto select the footer and cut the hidden text when no oneis looking. Save it in a text editor such as Notepad andhide it away.

Page 23

Any acidic fruit juice (e.g., lemon, apple, or orange)Onion juiceBaking soda(sodium bicarbonate)VinegarWhite wineDiluted colaDiluted honeyMilkSoapy waterSucrose (table sugar) solutionUrine You can reveal the message by ironing the paper, settingit on a radiator, heating it in an oven, or holding it up toa hot light bulb.Holding paper over a lighted candle is notrecommended. Heat-Activated Invisible Inks

Page 24

Baking SodaI have it in the kitchen; use one part bicarb andone part water.Homemade inks require a fine brush or a broaddip pen or a cotton bud.Click the Linkhttps://bit.ly/45219MD The presenter uses three methods to reveal themessage:heat; beetroot juice; grape juiceThere is a fourth way using a wash of turmeric orcurry powder mixed with water and rubbingalcohol.Baking Soda and Turmeric

Page 25

To write in these watery inks, you need an old dip pen ora fine brush. How is your calligraphy?ConclusionPooh Pooh you may say; but if you find anything ofinterest or want to know more, you are welcome to writeto me at my Hotmail addressloblollyman@hotmail.comSteve MongkutJuly 2023