This essay makes the proposition that 'The Lizard King' is an encryption of 'TUVWXYZABCD 01234' based on the concepts described in both Hidden Number Theory and the Cobain cipher.
Firstly, ‘Mr Mojo Risin’ is an anagram of ‘Jim Morrison’. Therefore, we know Morrison was aware of this encryption method. Secondly, ‘Risin’ is not an actual word, however, it is a bastardisation of the word ‘rising’. Therefore, we know that Morrison was aware that letters can be manipulated to achieve a desired effect. Thirdly, in The Doors song ‘Soul Kitchen’, Morrison states, “Speak in secret alphabets”. Therefore, we know Morrison was aware of substitution ciphers and spoke using encrypted forms. These examples justify the potential that ‘The Lizard King’ is a cryptogram. An example (see, Quora: “What is The Lizard King encryption?”) is given demonstrating this cryptogram using techniques Morrison described in his own words.
In conclusion, based on the explicit evidence present in Jim Morrison's body of work, including confessions that his writings were encrypted with hidden meanings, the hypothesis of this essay is that the letter combination 'The Lizard King', based on the methodologies described in both Hidden Number Theory and the Cobain cipher, is an encryption of 'TUVWXYZABCD 01234'.
Firstly, ‘Mr Mojo Risin’ is an anagram of ‘Jim Morrison’. Therefore, we know Morrison was aware of this encryption method. Secondly, ‘Risin’ is not an actual word, however, it is a bastardisation of the word ‘rising’. Therefore, we know that Morrison was aware that letters can be manipulated to achieve a desired effect. Thirdly, in The Doors song ‘Soul Kitchen’, Morrison states, “Speak in secret alphabets”. Therefore, we know Morrison was aware of substitution ciphers and spoke using encrypted forms. These examples justify the potential that ‘The Lizard King’ is a cryptogram. An example (see, Quora: “What is The Lizard King encryption?”) is given demonstrating this cryptogram using techniques Morrison described in his own words.
In conclusion, based on the explicit evidence present in Jim Morrison's body of work, including confessions that his writings were encrypted with hidden meanings, the hypothesis of this essay is that the letter combination 'The Lizard King', based on the methodologies described in both Hidden Number Theory and the Cobain cipher, is an encryption of 'TUVWXYZABCD 01234'.
by STUVWX MC^234567 August 22, 2019
FRENZAL RHOMB are an Australian Punk rock band. Based on the principles of Hidden Number Theory and Cobain cipher, 'FRENZAL RHOMB' is a cryptogram of 43210 BADGED.
FRENZAL RHOMB - 4r3n2a1 rh0mb - 103643 - BADGED
FRENZAL RHOMB - 4r3n2a1 rh0mb - 103643 - BADGED
by STUVWX MC^234567 August 18, 2019
Hidden Number Theory is the umbrella term for the mode of perception that allows the observer to extract the ‘hidden’ letters, words and numbers within letters, words, and numbers. The following examples will demonstrate the method behind this concept using the words Eight and Light as well as the letter O and number 0.
Example one
Eight, Light
In this example, we can observe how the word Light is seemingly ‘hidden’ within the word Eight. All we must do is remove the top arm and the centre crossbar of the E to reveal the ‘hidden’ L. Thus, the word Light appears. This example demonstrates both a hidden letter within a letter and a hidden word within a word.
Example two
word, crow
In this example, we can observe how the word crow is seemingly ‘hidden’ within the word, word. All we must do is remove the stem from the letter d to reveal the apparent ‘hidden’ c which reveals the letter combination worc. Next, we reverse this letter combination to reveal the seemingly ‘hidden’ word crow.
This methodology allows the user artistic licence to elaborate on this methodology and develop a sentence. For example, “There are eight bright lights” and “The crows work is in misguided words”.
Example three
O, 0
In this example, we can observe the similarities between the letters O and the number 0, in that they are both circular. Through the elaboration of this idea, the Cobain cipher was developed.
Example one
Eight, Light
In this example, we can observe how the word Light is seemingly ‘hidden’ within the word Eight. All we must do is remove the top arm and the centre crossbar of the E to reveal the ‘hidden’ L. Thus, the word Light appears. This example demonstrates both a hidden letter within a letter and a hidden word within a word.
Example two
word, crow
In this example, we can observe how the word crow is seemingly ‘hidden’ within the word, word. All we must do is remove the stem from the letter d to reveal the apparent ‘hidden’ c which reveals the letter combination worc. Next, we reverse this letter combination to reveal the seemingly ‘hidden’ word crow.
This methodology allows the user artistic licence to elaborate on this methodology and develop a sentence. For example, “There are eight bright lights” and “The crows work is in misguided words”.
Example three
O, 0
In this example, we can observe the similarities between the letters O and the number 0, in that they are both circular. Through the elaboration of this idea, the Cobain cipher was developed.
Hidden Number Theory was identified and defined by Steven McCreanor to demonstrate the logic behind the deliberate cryptogram STUVWX MC^234567.
by STUVWX MC^234567 August 28, 2019
EMINEM is the stage name of Marshall Mathers III. Based on the principles of Hidden Number Theory's Cobain cipher, 'EMINEM' is a cryptogram of the numbers 1, 2, and 3.
EMINEM - 331233 - 123
EMINEM - 331233 - 123
by STUVWX MC^234567 August 18, 2019
E=mc2 is an incorrect format to write Einsteins equation for the theory of special relativity. The correct way to write the equation when the hypertext capability is not possible is to use ^2. Thus, the correct way to write the equation is E=mc^2. (ESMC)
Rest Energy=Rest Mass*Speed of Light (3.0*10^8m/s)^2
Derived by Einstein and is the fundamental equation that explains mass->energy conversion.
Rest Energy=Rest Mass*Speed of Light (3.0*10^8m/s)^2
Derived by Einstein and is the fundamental equation that explains mass->energy conversion.
E=mc^2 not E=mc2
by STUVWX MC^234567 July 11, 2019
2pac is the stage name of Tupac Shakur. Based on the principles of Hidden Number Theory's Cobain cipher, '2pac' is a cryptogram of the letters a, b, c and z.
2pac - zbac - abcz
2pac - zbac - abcz
by STUVWX MC^234567 August 18, 2019
The Cobain Cipher is an encryption key developed by Steven McCreanor. It is based on two foundation principles:
1. Basic alpha-numeric substitution (Caesar cipher).
2. Substitution of letters with numerals that possess similar appearance.
The Cobain cipher encryption key is as follows:
0 = O
1 = I, H
2 = n, S, u, Z
3 = E, M, W
4 = F
6 = b, d, g, P
7 = L, V
The Cobain cipher was developed on the proposition that certain letters possess a higher quality of visual similarity to certain numerals than others which can therefore be broken down into three major categories, that ultimately produce the Cobain cipher
Category one (most visually similar without manipulation)
0 = O
1 = I (upper-case i)
2 = Z
6 = b,
Category two (most visually similar with 360° manipulation)
1 = I, H
2 = n, S, u
3 = E, M, W
4 = F
5 = n, S, u
6 = d, P, g
7 = L, V
8 =
9 = b, d, g, P
Category three (least visually similar with three-dimensional manipulation)
0 = C, c, D, G, O, o, Q, U, u
1 = H, i, J, j, l (lowercase L), T, t
2 = G, h, N, n, S, s, U, u, Z, z
3 = E, M, m, W, w
4 = A, F, f, K, k, T, t, V, v, X, x, Y
5 = G, h, N, n, S, s, U, u, Z, z
6 = a, b,d, e, g, p, q, y
7 = H, i, J, j, L, r, T, t, V, v
8 = B, K, k, R
9 = a, b,d, e, g, p, q, y
*The Cobain cipher was produced by synthesising category one and two.
1. Basic alpha-numeric substitution (Caesar cipher).
2. Substitution of letters with numerals that possess similar appearance.
The Cobain cipher encryption key is as follows:
0 = O
1 = I, H
2 = n, S, u, Z
3 = E, M, W
4 = F
6 = b, d, g, P
7 = L, V
The Cobain cipher was developed on the proposition that certain letters possess a higher quality of visual similarity to certain numerals than others which can therefore be broken down into three major categories, that ultimately produce the Cobain cipher
Category one (most visually similar without manipulation)
0 = O
1 = I (upper-case i)
2 = Z
6 = b,
Category two (most visually similar with 360° manipulation)
1 = I, H
2 = n, S, u
3 = E, M, W
4 = F
5 = n, S, u
6 = d, P, g
7 = L, V
8 =
9 = b, d, g, P
Category three (least visually similar with three-dimensional manipulation)
0 = C, c, D, G, O, o, Q, U, u
1 = H, i, J, j, l (lowercase L), T, t
2 = G, h, N, n, S, s, U, u, Z, z
3 = E, M, m, W, w
4 = A, F, f, K, k, T, t, V, v, X, x, Y
5 = G, h, N, n, S, s, U, u, Z, z
6 = a, b,d, e, g, p, q, y
7 = H, i, J, j, L, r, T, t, V, v
8 = B, K, k, R
9 = a, b,d, e, g, p, q, y
*The Cobain cipher was produced by synthesising category one and two.
by STUVWX MC^234567 August 13, 2019