02 May 2011

THE CORN-ETHANOL CONSPIRACY


      You've seen it on TV. You've read it in the newspaper. The headlines read “Too much ethanol could lead to food riots” and “Ethanol pumping up food prices”1. News pundits and doomsday theorists would have us believe that if we keep using ethanol for fuel, the whole world will starve 2. Several sites 3 tout all the disadvantages of ethanol; higher prices than gasoline, loss of farmland, rain forests sacrificed. If you look at all of these resources closely, you will notice that most specify CORN-BASED ETHANOL and almost none of them tell you that not only is corn not the only source available, it's not even the best.
     Ethanol can be produced from any source of simple sugars4, and even things that can be broken down into sugars such as certain starches and cellulose from plain old lawn clippings. Just today, I watched a History Channel program on biofuels, which in part talked about using termites in the process. While ethanol from cellulose is still experimental and quite expensive, progress is being made which shows promise of making the food-or-fuel debate moot.
      Obviously, since the ethanol is produced from sugar, the higher the sugar content of a plant the more ethanol can be produced from it. Sugar cane and sugar beets are at the top of the list, but both take up a lot of farm land also suitable for food crops. So, is there any crop that can be grown without tyeing up valuable food acreage? Yes!
      Carrots5. Carrots have a higher natural sugar content than all other vegetables with the exception of beets6. Carrots have 10% more sugar than corn per gram7. AND...an acre of carrots produces over 3 times the product in weight than an acre of corn8. Those facts in themselves make the lowly carrot a much better candidate to scoot your Chevy or Ford down the road. An excerpt from the ETHANOL PRODUCER'S DATA BASE shows:


  Feedstock listed in 
Alphabetical order


Gallons
per Ton
  Gallons
per Acre
  Best yield
per Ton
 Best Yield
per Acre
BEST YIELD
All around
Theoretical
 Carrots
 9.8
 121.0
 29
  13
 18
 Corn
 84.0
 214.0
 2
  7
 1
click HERE for complete table
From this table it would seem that carrots run a poor showing when compared to corn.
      But there's more to the story than what is seen here.
      To now, I have compared acre to acre and pound to pound; also know as an “acre harvest”. To get the true picture, one also has to consider the “harvest year”. That is; how many times can that same acre be harvested in any given year. This, times the acre harvest gives a true annual yield. Carrots come out on top every time.
      In about half of the country, you can get 2 harvests of carrots per year if grown traditionally; ie. in the ground outside9. That in itself would give 242 gal/acre according to the above chart. That is a 12% increase over corn.
      There is, however, another way to grow carrots (as well as radishes, potatoes and many other root crops). It's called hydroponics10. This can be done vertically (stacked troughs) as easily as horizontally, giving a much larger yield. Stacked 3 high, 1 acre of ground can give about 2 acres of crop (space must be provided for equipment and your feet).
      Additionally, because the growing area is artificial as opposed to valuable farm land, it can be done anywhere. Even in the rockiest, most worthless land you can find. As long as there is water available, a hydroponic system can be run. So much for eating up farmland and starving the masses.
      The other big objection given about ethanol production is the energy required for the distillation process. That energy is used in the form of heat to separate the ethanol from the fermented corn, carrots or whatever you're using as raw material, and can be created from almost anything that will burn. Yes; petroleum and coal can be used. They pollute, are non-renewable and expensive. So is there another, better way?
      Methane! Methane is a natural byproduct of organic decomposition11. It is also the primary component of natural gas12. In other words; it will be produced. We can let it go into the atmosphere as a greenhouse gas, or we can burn it, extract the energy, and pollute a lot less.

      The NEW SCIENTIST on-line publication says:Methane generated by rotting rubbish in landfill dumps could make a far greater contribution to the world's energy supply”13 and the WIH RESOURCE GROUP reports:Food that is mixed in with regular trash is estimated to make up about 40% of the trash in landfills. It also is the biggest offender in creating landfill methane which is a powerful greenhouse gas – 72 times more powerful than carbon dioxide. Reducing landfill methane is just one of the benefits of keeping this type of waste out of landfills.” 14
      Using garbage to turn into ethanol a crop that grows anywhere and gives 4 to 5 times the yield of fuel over corn makes economic, environmental and political sense. The reason you don't hear a lot about using carrots is precisely because it can be done cheaper and easier than corn and carrots can be produced without driving up prices and garnering a lot of political controversy. As long as corn prices remain artificially inflated, congressmen get regular contributions to their coffers. That will keep corn in the forefront and other crops, including carrots out of the spotlight.

At least that's my opinion. What's yours?
Have a conspiracy you'd like me to research? Got a question about crypto? Post a comment HERE and I'll do my best to post the answer.

Citations

For more information on ethanol production in the USA, please visit:

If you're interested in home fuel-ethanol production, see:
http://running_on_alcohol.tripod.com/
and

Valuable information regarding home production of methane can be found at:
or
 

 

15 April 2011

A CRYPTO READING LIST


    Whether you want to create a cipher for yourself to hide a trade secret or romantic appointment, you are trying to read an encrypted message that “fell” into your hands, or you just want to study the history of cryptography you are going to need some good books.

    Two of the earliest books dealing with cryptography are The Art of War1 by Sun Tzu and the Kama Sutra2 by Vatsyayana. The Art of War dates to the 6th century BC. No exact date is known for the Kama Sutra, but it is believed to be from around the 2nd century AD.
    In The Art of War, Sun Tzu says “The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable”. To that end, he adds: “So if you do not know the plans of your competitors, you cannot make informed alliances”. In other words, hide your plans and discover theirs. Encryption and cryptanalysis.
    The Kama Sutra lists 64 arts that a woman should study. #45 is “The art of understanding writing in cipher, and the writing of words in a peculiar way“.
    Both books are widely available in various forms from any number of outlets.

    Galileo is said to have hidden important information in anagrams to protect his discoveries; specifically that Venus had moon-like phases 3
   The writings of Nostradamus4  fall into the category of steganography because he hid his prophecies in cryptic writings called quatrains.

   With all the comments and questions I regularly receive about secret codes and the attention paid to the subject in the news lately (see my posting from earlier this month), I decided that it was time to present a list of worthwhile books on cryptography. While this list is by no means comprehensive, it will provide a lot of important information needed to understand the pitfalls in the use of ciphers and codes, a history of secret writing of all kinds and a rudimentary education in cryptanalysis. Most of these are in my personal library and I highly recommend them. Your local public library or Amazon.com should be able to supply all of the titles.
    Also, for some entertaining but fictional accounts of cryptography, The Gold Bug by Edgar Allan Poe and Sherlock Holmes story of The Dancing Men are practically required reading.

The Code-Breakers
Author: David Kahn
Publisher: Scribner
Language: English
ISBN-10: 0-684-83130-9
ISBN-13: 978-0140244328
Probably the gold standard of cryptography books from the 20th century. Almost every other book that I have ever read on the subject cites and/or quotes The Code Breakers. It's kind of pricey (about $50.00 USD) but well worth the cost. I figured that if all my other books were quoting it, I should probably own it.

Code Breaking
Author: Rudolf Kippenhahn
Publisher: The Overlook Press
Language: English-translated from German by Ewald Osers
ISBN: 1-58567-089-8
Focuses primarily on cryptanalysis, with one of the best descriptions of frequency analysis I've read, using bi-graphs and tri-graphs as well as letter frequencies in different languages. Also has an excellent discussion of the inner workings of the Enigma.

Code Breakers: The Inside Story of Bletchley Park
Authors: F. H. Hinsley & Alan Stripp
Publisher: Oxford University Press
Language: English
ISBN: 0-19-280132-5
First-hand accounts from many of the people who worked in Bletchly Park during WWII. It's what I'm reading right now- for the 3rd time. Gives a personal insight to the victories and frustrations encountered during 7 years of cryptanalysis in war-time.


Philip Johnston and the Navajo Code Talkers 
Author: Syble Lagerquist 
Publisher: Council for Indian Education 
Language: English 
ISBN-10: 0899921396 
ISBN-13: 978-0899921396 
I reviewed this excellent work back in November of 2007. These guys were real heroes. Nicholas Cage starred in a movie about them called Windtalkers. Highly fictionalised but worth seeing. Also visit: 
http://en.wikipedia.org/wiki/Philip_Johnston_%28code_talker%29 and 
http://history1900s.about.com/od/worldwarii/a/navajacode.htm

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Author: Steven Levy
Publisher: Penguin (Non-Classics); 1st edition (January 15, 2002)
Language: English
ISBN-10: 0140244328
ISBN-13: 978-0140244328
This is an in-depth history of public-key cryptography and the development of PGP. Introduces you to Ron Rivist, Adi Shamir and Leonard Adleman: the inventors of RSA encryption algorithm; Whitfield Diffie and Martin Hellman who developed the Diffie-Hellman key exchange and Phil Zimmerman: the author of PGP (Pretty Good Privacy). Good reading.

The Code Book
Author: Simon Singh
Publisher: Fourth Estate Limited
Language: English
ISBN: 0-00763-574-5
Sub-titled The Secret History of Codes and Code-breaking, this is the history lesson I mentioned. Along with Kahn's The Code-Breakers, it is the most complete history of cryptography that I have found. It also covers related topics like Egyptian hieroglyphics and Linear B. I've almost worn out my copy re-reading it.

Free-ware Encryption
Author: Michael Chesbro
Publisher: Paladin Press
Language: English
ISBN: 1-58160-270-7
A great resource for computer encryption. Contains a brief discussion of the legal implications of encryption and a plethora of websites to download various encryption programs. My favorite is VGP if I'm working in Windoze.
Written in 2001, some of the sites may be out of date, but the general information is timeless.
Visit: http://www.freebyte.com/security/  for a list of more current resources.

The Man Who Saw Tomorrow – The Prophecies of Nostradamus
Author: Michel Nostradamus (born Michel de Nostredame)
Translated by: Erika Cheetham
Publisher: Berkley Books
Language: English
ISBN: 0-0425-08757-3
Not actually a book that has much to do with cryptography, but probably the best example in history of hiding meanings within other writings (steganography).

Other Recommended books


Codes and Secret Writing
Author: Herbert Spencer Zim
Publisher: Scholastic (January 1978)
ISBN-10: 0590025856
ISBN-13: 978-0590025850
Although I no longer own this book, it was the beginning of my infatuation with cryptography. Phil Zimmerman, Whitfield Diffie and a lot of other pioneers in modern cryptography first read this book and peaked their interest. While it is primarily a children's' book, it's still a valuable resource.



Handbook of Applied Cryptography
Authors: Alfred J. Menezes, Paul C. van Oorschot & Scott A. Vanstone
Publisher: CRC Press
ISBN: 0-8493-8523-7
I have never read this, but understand that it is the definitive source for computer cryptography. It is available in print from any one of these on-line book-stores: 
Prices as of April 15, 2010 
I understand that: The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization by James Bamford will give you a fair concept of the guys in America's black chamber; the ones that are trying to undo everything that you do to protect your information. It is next on my “Have To Get It” list. High on my “Ongoing Conspiracy” list, too.


WORTHWHILE FICTION TITLES
The Cambridge Quintet
     by John L. Casti
Cryptonomicon
     by Neal Stephenson
The Da Vinci Code and Digital Fortress
     both by Dan Brown
The Eleventh Hour
     by Graeme Base (children's book)
Simple Simon
     by Ryne Douglas Pearson (see films)
PopCo
     by Scarlett Thomas
Secrets of the Alchemist Dar
     by Michael Stadther


SOME GOOD MOVIES
Enigma
      Good story and very fact-based. You get to see an original Enigma machine in use. It was loaned to the production company by none other than Mick Jagger, who also helped finance the production and even makes a cameo appearance. The convoy battle and convoy numbers (HX 229/SC 1225), several names(Fasson and Grazier6) and many other parts are right out of the history books. There has been criticism regarding some license taken, but; hey! Yes it's based on true events but it's FICTION people.


Sneakers
     One of my all-time favorites. Starring a young Robert Redford and a whole contingent of A-list actors.


Mercury Rising (based on Pearsons' Simple Simon)
     Stars Bruce Willis


The Net
      Starring Sandra Bullock. If you watch this movie, and substitute Microsoft for Gregg Microsystems, you'll have an accurate concept of my view regarding Microcrap Corp., Windoze operating System and Bill Let's-Take-Over-The-World Gates.

Citations

1 http://classics.mit.edu/Tzu/artwar.html , http://www.chinapage.com/sunzi-e.html , http://suntzusaid.com/

Additional Information
While doing some research for another posting, I came across this website.

Free Encryption / Cryptographic Software, Free On the Fly Encryption, Free Disk Encryption Tools, Steganography, Free Public Key Encryption Software


    Here you will find more resources for computer encryption as well as some good advice like "Be careful when you use cryptographic / encryption software that do not tell you which algorithm they use. Claims like "strong encryption", "military encryption" and "secure encryption" do not tell you very much — after all, anyone can simply convert the letters on (say) this page to numbers (where a=1, b=2, etc) and still claim it is strong encryption / cryptography."

    With the exception of GPG and PGP, I have not used and cannot personally endorse any of the software or information this site offers, so use with care.
    GPG (GNU Privacy Guard) works well with Linux; my os of choice. I also use KGPG; the graphic front end for GPG. I use both frequently and highly recommend them.

01 April 2011

THE FBI NEEDS YOUR HELP


     I had a whole different item planned for this post. Then: “Ricky McCormick Murder: FBI Wants Public's Help in Breaking Encrypted Clues1,2,3” showed up in the news. Suddenly cryptography jumps out of the shadowy world of trench coats and Mata Hari and into the 5 o'clock news.
      Apparently, back in 1999, a gentleman named Ricky McCormick was found dead. His death was ruled a homicide. His body was dumped in a field and the only clues left behind were two encrypted notes in his pocket.

      The FBI (and probably every group of spooks employed by the federal government4) has been working on these notes attempting to decrypt them; all with no success. So now they're asking for the public's help. Can you break the encryption, read the notes and possibly solve a twelve-year-old murder?
      While you're at it, if you're into a little mental gymnastics and like cryptography, look into the encrypted letters from the infamous Zodiac Killer4. Several of them have yet to be broken.
composite sketches of the Zodiac Killer
      There are many other old cryptograms that have never been solved5. Try your hand at a few of them. Who knows; maybe you'll find a new career. Solve the Beale cyphers and you could even become a millionaire.
      To help you get started, you might want a good example of forensic cryptanalysis. Take a look at the case of Ed Burns6 . Here you will see not only the cryptograms and their solutions, but a short lesson on how they were solved.
      Look to my next posting for a good list of resources regarding encryption and cryptanalysis.
Happy decrypting.

Citations
1 http://www.geeksaresexy.net/2011/03/31/fbi-asks-for-help-cracking-murder-victims-secret-code/

15 March 2011

In Memoriam

Montana was my constant companion and friend for the last 5 1/2 years.
Sadly, he past away on March 2nd this year, after a short fight with cancer. He was laid to rest in his favorite forest. His love and friendship will be remembered and treasured always.

Goodbye, my friend



13 March 2011

EVERYONE NEEDS A LITTLE CRYPTO



    This is a simple machine that I use frequently. It is loosely based on the Enigma algorithm. You simply print it, cut it out and use it. It is easy to make, use and hide. Because it is so simple to make, you could burn it after each use, printing another one when you need to encrypt or decrypt another message. Of course, make sure you keep the key somewhere safe.
 
SLIDE-STRIP ENCRYPTOR
Click on link for printable encryptor: Slide-Strip.xls   
This is a spreadsheet-opens in Open Office or Excel
    Print out the page on stiff card-stock. Cut the 5 strips and cut slots in the sheet as shown for the strips to slide through. Insert the strips across the page into the slots on each end and encrypt a message as shown.
ENCRYPTION
    To encrypt a message, choose 3 of the 5 strips and insert into the slots. The choice of strips, along with their order and starting position of each strip is the key. (see illustration below) In the example, the strips are V, IV, I and the starting position (orange character lined up under “A” on the top gray alphabet) is 9, E, B. Note: although the example uses the 1st character on each strip, the key can start at any character. Each strip has 2 alphabets end-to end. This allows use of the entire alphabet without having to slide strips back and forth for consecutive characters.
    As an example, let's encrypt the word: HELLO.
Find the plain-text:H (the actual message) character on the top row . (#1 in the illustration). Follow the lines. Take the character on the orange of the first strip directly below [2] [red line], and locate that character on the gray portion of that strip [blue line]. Repeat that step with the middle strip [8]. On the 3rd strip, the cypher text is the character directly below on the orange W. W is the cypher-text for H.
Now slide the top strip (#V) 1 space to the left (start position: 8). The other 2 strips (#s IV & I) don't move.
Repeat the encryption for the E to get cypher-text E. (#2 in the illustration). Notice that some characters will encrypt to themselves. This is good.
Now slide the top strip 1 more space (start position: 7) and repeat again for L (#3 in the illustration) to get cypher-text R.
Continue for the remaining letters.
The complete cypher text is WERN0.
THE CHARACTERS
On my encryptor, I use the alphabet, the 10 digits and 7 non-alphanumeric (nac) characters. I use the “~” character to designate a space. The message: MEET AT THE BRIDGE AT NOON would first be written as: MEET~AT~THE~BRIDGE~AT~NOON. This gives all spaces in the message a printable or written character. The rest allow more precise communication, and allow more word substitution like "@" for "at". Such substitutions, combined with irregular spelling and a lack of standardized message structure serve to complicate cryptanalysis. To have a unique set-up, you can insert different cypher alphabets and/or more strips for even more-and different keys. I use 43 characters. You can make a new strip slide with more or less characters and have a completely different cypher.
 KEYS
    Once you have gone through the entire character set on the first strip, move it back to its original position and advance the middle strip one character. If you have a long message, do the same with the bottom strip. This gives you 79,507 positions before repeating. Along with the 60 possible strip position choices, that is 4,770,420 possible keys. Quick to make, easy to carry and use and strong enough encryption to foil all but the most dedicated of foes. To exchange an encrypted message with someone,you can either exchange keys in advance, or agree on a method of hiding the key within the message.
EXAMPLE: 6528,0WERN0
Here I simply added 1 to the number of each strip and took the letter following the actual starting place, then placed it at the beginning of the message. Use your imagination here. Once you determine a good method to encrypt and transmit the key, that's all you have to remember. No keys list to distribute. You can then use a different key with each message making cryptanalysis almost impossible.
Your intended recipient (or a foe) must have both the slide-strip and the key to be able to read your message. Leave the foe out of the loop. The encryptor without the key is all but useless to decrypt the message.

25 April 2010

WE HAVE ARRIVED

One year ago, I wrote about the coming of socialism to the United States of America. Well folks; here we are.
The government now runs the automotive industry, with all of it's associated jobs from the iron workers to the clerk at Wal Mart selling you an oil filter. Big Brother runs the banking industry, which means they (Obama & Pelosi) determine if you : buy a house, start a business, go to school or even; because they control the purse strings of ALL business, determine if and where you can get a job.
The IRS now decides if they like your health insurance, which you have no choice but to buy. That means they (the IRS) decides who lives and dies. Can't work and pay taxes any more? Too bad! That life-saving procedure that you need isn't approved.
We're going the way of post-war Europe. Pretty soon a gallon of gas will be $25.00. A loaf of bread; $10.00. And don't even think about going out to dinner or on a vacation. Unless you're a government worker of course. Welcome to the Socialist States of America.
That's my opinion. What's yours?