Ill have to post a link to it sometime. Divide the encrypted content in three parts, independently transmitted, so that it cant be encrypted until you have all parts together. Kidding aside, I just see the distribution problem for something that doesnt seem that difficult. NEVER, EVER TRUST A PROPRIETARY OR SECRET ALGORITHM. The Surface Pen enjoys wide support tooiterations of it have been around much longer than the Pencil, after all. If you wanted, you could combine with a one-time pad and in that case you would not gain anything by having a random order. c. finding the largest element in a list of n numbers d. Euclid's algorithm Rollerball pen: These pens use water-based ink and are better for long writing. You can then use random frequency variation within individual messages to statistically sort the column and row intersections with the diagonals, and then from there you can use proximity analysis to extend and sort rows and columns. David in Toronto @Autolykos : Nick P If you want to use a computer to assist in encryption/decryption, then may I suggest using a microcontroller (like the arduino) and uploading your own code to it. The interesting fact about Sudoku is that it is a trivial puzzle to solve. Nor is it difficult to work out an easily rememberable way to convert these numbers into rotor wiring offsets. I think now I got it. Chapter: Introduction to the Design and Analysis of Algorithms : Fundamentals of the Analysis of Algorithm Efficiency The Analysis Framework 1. Memo