Encryption Software means Cyphertop.
Cyphertop is the most secure encryption software, efficient and fast quantum encryption software that has been produced up to date. Already functions under Linux, Windows, Androids, iOs, & MAC. Available for Laptops, Tablets, Servers and Mobile Phones. We are currently working on installing this encryption software app on phone voice and image communications, making the product a first-order choice when it comes to protecting communications of all kinds, under any circumstances.
Cyphertop has become a state-of-the-art encryption system with incorporated novel securities. So far, this is the only encryption software invulnerable to quantum computing. It can be affirmed that Cyphertop constitutes a new approach quite far from the traditional schemes of the cryptographic discipline. Under encryption terminology, is a symmetric encryption system. This simplification however is a short cut to understand the true nature of Cyphertop.
Is not only an encryption software or an encryption algorithm, it is a generator of encryption algorithms. Where each algorithm generated, encrypts a file consecutively by blocks. Also decrypts it by applying the inverse function of the algorithm (Symmetry). However, reading the file and encrypting it in blocks does not produce as output a bounded block of data. This output, can not be said to belong entirely to a particular block already read previously.
Download your free version now!
CYPHERTOP’S ENCRYPTION SOFTWARE RESISTANCE TO COMPUTATIONAL BRUTE FORCE ATTACKS
This document proves beyond any doubt that computational brute force attacks are no threat whatsoever for Cyphertop encryption software. To this end, the following GEDAKEN is presented (idealized physical experiment to test a theory).
THE DATA STRUCTURE OF THIS HEREBY SAMPLE UNIVERSE OF CYPHERTOP’S ENCRYPTION SOFTWARE IS COMPRISED AS FOLLOWS:
- A list of 25.000 numbers with a range from 1 to 255.
- A list of 4 numbers with a range from 1 to 65535.
- A list of 5 numbers with a range from 1 to 2.147.483.647.
Therefore inside this sample Universe of CYPHERTOP the following connection points can be generated:
PC = Connection points = Permutations between values of three sets of numbers like this: 25.000 numbers between 1 and 255 = 25525.000 = 3,195294 x 1060.163
Five numbers between 1 and 216 – 1 = 65.5355 = 1,20883358 x 1024
Four numbers between 1 and 231 – 1 = 2.147.483.6474 = 2,126764789 x 1037
PC = (3,195294 x 1060.163) x (1,20883358 x 1024) x (2,126764789 x 1037) à
PC = 8,21479634 x 1060.224 = Connection Points of this hereby Cyphertop Sample Universe (CSU)
Within a connection point each message can be coded in 2,085924830 x 1093 different forms. This figure is broken down as follows:
Possible permutations of ten values between 1 and 231 – 1 = 2.147.483.64710 = 2,085924830 x 1093
Therefore, in the current CSU the same message can be coded in 8,21479634 x 1060.224 x 2,085924830 x 1093 = 1,7135447658999 x 1060.318 different forms.
Specifically, the attack by brute force on a determined DNA, out of the 8,21479634 x 1060.224 that this hereby CSU may contain with the current computational media is far from any consideration.
To prove with updated data why Cyphertop encryption software is invulnerable, the following GEDAKEN is presented:
The most powerful computer at present is the Summit of the National Oak Ridge Laboratory . It has a performance of = 200 petaflops = 2 x 1017 flops (Floating point operations per second).
Now suppose that a computer that performs one quadrillion times faster than the Summit could be obtained. Thus its power would be: = (2 x 1017) x (1024) = 2 x 1041 flops.
Imagine a quadrillion of these computers could be built. The combined power of this quadrillion of “improved” Summit computers would be 2 x 1065 flops.
From now on until de end of the Universe (according to cosmologists), there are 1032 years left. This represent 3.1536 x 107 seconds, given that there are 31.536.000 seconds in a year.
In this period of time 1032 x 3,1536 x 107 = 3,1536 x 1039 seconds would pass.
Therefore, the quadrillion of “improved” Summit computers, from now until the end of the universe would have a computing power of
3,1536 x 1039 x 2 x 1065 = 6,3072 x 10104 flops
The impossible is assumed here. That is, that with only one floating-point operation each one of the possible DNAs of the CSU can be evaluated. This leads to performing the encryption of a sample file and evaluate if the original text has been obtained.
Then, it is clearly impossible that with only 6.3072 x 10104 flops, the 8,21479634 x 1060.224 possible DNA’s of the current CSU can be evaluated.
And note that four assumptions have been made which verge on the impossible:
- A computer a quadrillion times more powerful than the Summit.
- A grid composed of a quadrillion of these computers.
- These computers will function until the end of our physical Universe.
- With only one flop a particular DNA can be evaluated.
Cyphertop Encryption Software
Not all the physical matter of the Universe is enough to build the grid of supercomputers that can attempt massive computational attacks on item protected by Cyphertop, during the entire time of existence that our Universe has left
Cyphertop Encryption Speed
To mention an example. Cyphertop performs only 8 transformations while AES 256 performs more than 200 transformations. Another great advantage of Cyphertop is that the vast majority of its code is parallel. Under high-performance platforms, increases its speed considerably.
Although quantum computing promises great advances, not only must the specific source code of the particular Universe of Cyphertop be obtained, but the number of analysis is unattainable, given that if it is admitted that every second a future gigantic supercomputer can analyze 101.000 different DNAs, that is, perform that same number of encryptions on the same encrypted file and analyze them, in the time that is left for this Universe, this supercomputer will have done:101.000 x 3,1536 x 1039 = 3,1536 x 101.039 analysis and of course, even then it would be very distant from its objective: 8,21479634 x 1060.224 But of course two impossible assumptions have been made:
- The quantum supercomputer will function until the end of our physical Universe.
- For every analysis, the quantum supercomputer needs at least 40 million Qbits, which is 4 x 107 Qbits and since there are 101,000 simultaneous analyses, it would be necessary for such supercomputer to have 4 x 10007 Qbits. And until now, in the best of cases, there are quantum computers with 2.000 Qbits, which is 2 x 103 Qbits of memory capacity. In fact, such a memory in Qbits (4 x 101.007) is impossible to build since the total number of elementary particles of our Universe is only 2 x 1080.
Compare Cyphertop encryption software Effectiveness regarding encryption time to current encryption algorithms
Extensive databases merit a ” database warehouse ” that truly protects them and hides them from any theft attempted performed by unauthorized parties. In addition to a truly safe channel that allows point-to-point communication. We can say that’s exactly the function of Cyphertop encryption software. This is a must have tool on the Banking Industry.
Government Protection Software
The spies really exist and are located where we least expect them. Reason why encrypting classified files is of vital importance, so no one can hack our private electronic property. Cyphertop encryption software will protect any database size on any type of environment.
A radically new conceptualization is presented for the development of cryptographic models. Based on the introduction of new transposition and substitution techniques of the basic unit of information: The bit. The cryptographic universes, where each universe generates a gigantic set of encoders (versions or connection points) and each encoder generates, in turn, an equally gigantic number of encryption algorithms. In addition, the concepts of DNA, Three Dimensional Bolt, Necessary Noise, Recombinant Algorithm, Pivot, Cycle are introduced. And a new generator of random numbers: Cylinder(). Likewise, the use of information structures with geometries of 1, 2 and 3 dimensions should be noted. Throughout this document, calculations of complexity are presented about the current universe (as sample) of Cyphertop, to give the reader an idea of the impossibility of any computational attempt to violate CYPHERTOP. The figures presented here correspond to a sample universe of Cyphertop and the corresponding calculations are presented in annex 1 of this document.
The cryptographic models have evolved throughout the history of mankind because of the obvious need for safekeeping highly sensitive information.
In ancient times techniques were used that while they seem simple today, at their time they were effective. It was the transposition of symbols from one position to another, according to a predefined pattern or substitution of symbols. The first attempt to formalize a mathematically complex model was done during the Second World War:
The famous machine Enigma, built by the Germans posed a challenge of huge proportions to British intelligence. The British possessed the Typex machine and the Americans the M-135-C machine. As for the Japanese, the counted with the transpositions machine of Ito. Cryptography makes a spectacular leap with the appearance of the integrated circuit computers.
Models like the DES, AES, RSA, BLOWFISH appear and the CCE (Elliptic Curves Cryptography in Spanish) is implemented, only to mention a few of them. Such is the current scene. Quantum cryptography begins to develop its first implementations, basically, it takes charge of using the quantum properties of photons for the safe sending of the key to be used by a pair of users for the encrypting of a file.
But one concept has remained invariant throughout human history regarding cryptography:
Formerly it was called method or procedure of concealment of information. At the dawn of the century, the cryptographic machines already described appeared and when the computer appeared it was called an algorithm. Today the encryption algorithms dominate the scenario, be it as software implementations or as integrated circuits that contain specialized processors for applying one algorithm or another.
- The Cyphertop encryption software model: Breaking the paradigm.
- Design an algorithm whose complexity was such, that it would render all brute force attacks useless.
- It had to be resistant to the already common eventuality that its source code fell in the hands of the enemy.
- It should be of easy implementation and replacement.
- Resistant to incipient quantum computing.
Thus, as the advance was made in the construction of techniques of fast movement of information in the memory of the computer (in the way of bits) and models to generate lists of random numbers so that with them, dispersion tables could be built, new ideas appeared to improve the proposal. Cyphertop, as the model was called, made no concessions with the initial goals. Furthermore, the improvements introduced made it possible to establish more ambitious goals.
- Cyphertop Encryption Software: The destruction of the Encryption Algorithm concept.
When there is talk about encrypting, the immediate and obligated figure is the encryption algorithm.
A tool with which we encrypt a file and assuming that that tool could be generalized as a function, its inverse, f-1 serves to decrypt the corresponding encryption. At an earlier stage to the design of Cyphertop, a figure called recombinant mini algorithm was implemented, which consisted of several small algorithms of transposition of bits on structures of 1, 2 and 3 dimensions. When we say recombinant we are referring to its position within a general algorithm. They are called to work on the data in a random way following one another without a predefined order, within the source code. It was precisely this figure that allowed the formulation of a daring hypothesis at its time: Is it possible to develop an encryption algorithm that is not automorphic in time, that is, that it does not remain the same through time? The known encryption algorithms are automorphic in time. That is, they perform in the same way every time they are called to work on a set of data. AES for example, provides a key for every pair of users, if user A sends the same file n times to his partner user B, the n encryptions of the file will be equal. The challenge of AES lies in the fact that currently there are not enough computational resources to cover the space of solutions of the key (128 or 256) bits in a reasonable time. Escalating the challenge, the Cyphertop encryption software model makes the following assumption: There are enough computational resources to attack algorithms of the AES type, with keys as long as 215 = 32,768 bits!! A key of this size would be impractical in the best of cases, but however, as an illustration, we refer to the fact that the National Security Agency (NSA) of the United States of America, has set itself as a challenge at the present time to count with the computational and algorithmic infrastructure to break the AES 256, that is with power of 28, in times as reasonably short as to make useless encrypted information.
Cyphertop encryption software by far exceeds the previous assumption.
Its space for the key, if we want to use the terminology of the AES type algorithms, is superior to the 200,000 bits and if we want to be more rigorous, the previous figure can only be taken as a reference since the notion of block of data that is handled by the AES type algorithms in Cyphertop is impossible to apply.
The concept of the Cryptographic universe has then been developed. Where every universe can generate an enormous number of versions or connection points that are in reality, each one of them, generators of encryption algorithms to provide secure communication between two users of a communications network. Each version or connection point can generate a huge number of Encryption Algorithms or AC (Spanish acronym). For the present Sample universe that was developed for demonstration purposes: AC = 2.085924830 x 1093 This number is obtained from the possible combinations of 10 random numbers that act as initial parameters (modifying numbers) and they are generated by the Cyphertop code every time that we want to encrypt a set of data. These numbers modify the DNA of the respective connection point that is being used in the encryption.
- Cyphertop Quantum Encryption Software: Generator of algorithms.
Cyphertop does not have a defined morphology. Every encryption will be done by fixed routines that are common to all encryptions and also, by a set of recombinant Mini algorithms. This set is different for each particular encryption. A recombinant mini algorithm is a small software routine that takes care of transposing bits within a data structure. These mini algorithms follow one after the other in different combinations for each occasion. A k number of these mini algorithms is established each one of them in charge of generating dispersion (transposition) of bits. These k mini algorithms establish their order of appearance according to the initial parameters of encryption (the 10 numbers already mentioned) and their sequence of appearance, therefore, will vary for each encryption. Hence the name of Recombinants. The order of appearance of the recombinant mini algorithms and the addressing of the data each recombinant mini algorithms makes depends on the Cylinder() function, which is the generator of pseudo-random numbers implemented for Cyphertop. Establishing a comparison, the AES 256 Algorithm, for example, is composed of 14 rounds or stages and for that, it uses structures of 1 o 2 dimensions: Vectors and matrices. All the encodings under AES rigorously repeat that scheme. In AES, the operations that are carried out within the rounds we have: rotations of bits on vectors, the substitution of bits on matrices, XOR operations and linear transformations (multiplications). The way in which these operations are done depends on an initial key, which is used to generate subkeys. But what is relevant here is that, given an initial key (which serves to communicate at least two nodes) and any set of data, if that set is encrypted n times, the n encryptions will be equal between them.
Back to Cyphertop: How many combinations are possible for these recombinant mini algorithms?
Depending on the Cyphertop universe in particular and for the present case, with the sample universe set here, we have that k = 1024 therefore, the Possible Combinations of the appearance of these recombinant mini algorithms are: CP = 1024! Which is: 5,41852879605885728307692 x 102.639 possible combinations. The probability of the repetition of sequences of recombinant algorithms will be quite small in practice. And if they are repeated in the order of occurrence they would still have to repeat the form of working of each recombinant mini algorithm. Each one of these mini algorithms can use information structures of 1 to 3 dimensions where the data is moved within these structures. In each encryption, these recombinant mini algorithms, therefore, conform along with the “XORed” routines (XOR operations), complement and movement of bytes (dispersion of bytes) what is defined as a particular encryption algorithm for that occasion and defined by the initial parameters. It should be noted that the AC algorithms generated by a version or connection point of Cyphertop, based on the initial parameters (the ten modifying numbers) are different to the AC algorithms that may be generated by another version or connection point of a given universe of Cyphertop with those same parameters (modifying numbers). Therefore, it is not viable talking about Algorithms in the Cyphertop system, like we do with other encryption systems. Cyphertop encryption software is not intrinsically an encryption algorithm but a generator of encryption algorithms since it produces the same results that would be seen if multiple encryption algorithms were applied on the same file.
- The pseudo-random machine Cylinder.
In C++ there exists an instruction: rand() which enables generating pseudo-random numbers and a random() function for generating random numbers. Cyphertop encryption software has its own system for generation of pseudo-random numbers: Cylinder, which consists of a three-dimensional structure (cylinders) particular for each version, and based on the initial parameters (modifying numbers) that are generated for each encryption, the content of these cylinders is modified and this will be used to generate the pseudo-random numbers series throughout the encryption process. The numbers produced by Cylinder are pseudo-random, but Cylinder is of such complexity that we can assure the name “random” for them. Besides, in each encryption process, its operation varies according to the initial parameters (the ten numbers). Given the complexity of algorithms and data involved in Cylinder, the pseudo-random numbers that it generates can be considered as “Random”, since the process to generate them through the Cylinder() function is highly complex and does not obey any mathematical formula or procedure, instead, it is the product of the movement of the rotational mechanism (cylinders) that has been constructed with the modifying numbers and the DNA, which are both really random and are different every time that the rotational mechanism is built. As an additional note, an interesting fact is that the randomness tests to which the random numbers produced by Cylinder were subjected to, all yielded a high randomness index. To invoke this procedure the function Cylinder() is used and just like any random function, the range within which the requested random number is desired must be specified. Cyphertop encrypts two consecutive times the same data set (Double cycle, which is explained later) and for each cycle, it uses five (5) of the ten modifying numbers. Therefore, it has at its disposal CylC = 4.567192606 x 1046 random lists or ways of configuring the Cylinder mechanism of cylinders, by cycle. Every time that a set of data is going to be coded, Cylinder is initiated in CylC different possible ways, according to five (5) of the 10 initial parameters for that encoding. Being CylC = 4.567192606 x 1046. Since there are two cycles for every encryption, the Cylinder() function provides AC random lists or ways of configuring the mechanism of cylinders: AC = (4.567192606 x 1046 )2 = 2.085924830 x 1093 The Cylinder() function then has AC series of pseudo-random numbers at its disposal for every m connection point, while rand() of C++ only has 215 = 32,768 different and invariant series for all its users. In addition, the implementation of rand() varies from compiler to compiler, which makes it ineligible for encryption purposes.
- The DNA concept in Cyphertop encryption software
For the construction of the pseudo-random machine Cylinder and for other labors of Cyphertop, a set of numbers (DNA) is required which are created at the installation of each version or connection point. The lists of numbers and its extension vary from universe to universe and are called the generic DNA of each Cyphertop Universe. And as already stated, the content of the DNA varies from one connection point to another. The capture of the DNA is done taking into account data like the system’s clock, the cycles of the processor, the identifier of processes and random variables that the C++ language provides. On mobile devices, you can go to the accelerometers of the device. The tables of data thus generated are unique and unrepeatable for each version of Cyphertop. The present universe of Cyphertop contains 25009 numbers distributed in three lists that comprise its DNA.
- A Universe of Cyphertop encryption software: A generator of Versions or Connection Points.
Just as each version of Cyphertop encryption software is a generator en encryption algorithms, each universe of Cyphertop is a generator of versions or connection points. For the sample universe, it is possible to generate: PC = 8.21479634 x 1060.224 Versions or Connection Points (PC). And what differentiates one version from another within the same Cyphertop universe is the internal data that are stored when that version is generated. This internal data is nothing more than the “DNA” of that version or connection point that as it was said before consists of collections of numbers that have been captured by the Cyphertop system at the moment of installing the new version or connection point. In biology, the DNA differentiates each living being from the others. In Cyphertop the DNA differentiates one connection point from others. A universe of Cyphertop produces AC x PC different encryptions of one same file or set of data. That is, all the encryptions of the same file that all the connection points of that universe can produce. The present sample universe has: AC x PC = 1.7135447663 x 1060.318 Forms of encrypting a data set.
- Cyphertop encryption software Universe: How many are there?
Cantor discovered that those do not always have the same size, that is, the same cardinal: for example, the set of the not enumerable rationals is of the same size than the set of the natural ones, while that of the real is not: Therefore, there exist several infinities, some larger than others. It is possible to create as many universes as multi-dimensional geometrical structures and algorithms of manipulating data between them and they can combine among them. The portions of Cyphertop code that have to do with the manipulation of these structures vary from one universe to another. Likewise, the set of recombinant mini algorithms is different for each universe of Cyphertop. Finally, the prototype of unique DNA for each universe. The initial parameters used in each Cyphertop encryption software vary from one universe to another. The model of generation of random numbers selected by the Cyphertop system, the Cylinder() function also varies from the universe to the universe.
- The necessary noise.
The majority of the encryption algorithms do not introduce noise into the encrypted contents. Cyphertop, on the other hand, does. Not only does it introduce a random quantity of noise (garbage bits) every time it executes encryption, but also those bits can be found in the encrypted contents, virtually in any place. With it, an additional uncertainty level is generated which will help to prevent all attempts to formalize patterns trying to collect enough information to achieve decoding. This noise or garbage allows masking the true length of the set of encrypted data.
Pivot is defined here as a fixed value that could be found in a determined place of an encrypted file. In order for the decoder code of Cyphertop to find the form in which the encryptor code proceeded over a set of data, it is indispensable that the encrypter “transmits”, within the encrypted file, the parameters that are used on that occasion in particular to encrypt that set of data (modifying numbers). Such parameters are constituted by a set of numbers taken randomly by the encrypting code, in reality, numerical variables that are generated by the interaction of the user with the computer at the moment of encrypting. This set of data (modifying numbers) is hidden inside the Cyphertop encryption, so that the decoding code “works”, in an inverse symmetric way (f–1) over the encrypted data and so it can obtain the original text sent. There are no fixed positions within encryption of Cyphertop encryption software where the bits that conform this set of numbers can be placed, that is, there are no pivots. In Cyphertop, the encryption of a set of data has three types of information:
- Bits corresponding to the random numbers that constitute the parameters of the encryption.
- Garbage bits that are generated in a random way.
- Bits corresponding to the encryption per se, of the set of data.
The bits corresponding to the three types that have just been stated experience throughout the encryption process, several movements through information structures of 1 to 3 dimensions. In addition, they undergo several XOR processes with text likewise elaborated with figures provided by the Cylinder() function and finally complement processes. Of the above it turns out:
- One bit of any of the three types can be located in any place within an extension greater than 320 million bits. If the file to encrypt is equal to or greater than this figure.
- Throughout the encrypting processes, this same bit has a 50 percent probability of mutating its original value, that is, if it is 0 of mutating to 1 and if it is 1 o mutating to 0.
- It is impossible, because of the way the Cyphertop system works, to divide the encrypted file into “Blocks” for its analysis.
- The Cycles of Cyphertop encryption software.
Every text processed by AES 256 experiences 14 rounds of encryption. Each round is equal to the preceding one except the initial and final round, which differs from the other intermediate ones. In Cyphertop the data are subjected to movements of bits through geometrical structures, using a sequence of recombinant algorithms, a giant table of dispersion of bytes and finally, XOR and complement operations. All the preceding set of movements and transformations of the information is called cycle. Cyphertop has two cycles: In the first cycle, the movements of bits through the geometrical structures follow the sequence of recombinant algorithms that Cyphertop arms on each occasion according to the content of the initial parameters for that cycle (the first five initial parameters). Substitution also operates that way (XOR operations and complement). But the bits transposed and transformed (substitution) correspond to the original file, to garbage bits and to the bits of the five initial parameters used to encrypt the first cycle. In the second cycle as in the first one, the same thing operates, with the difference that the bits to be transposed and substituted belong to the file already encrypted in the first cycle, to the five initial parameters for that cycle and to garbage bits created during the second cycle. In each cycle, garbage is added in amounts calculated by Cylinder(). These garbage bits add noise, that is, uncertainty. The distortion generated in the final Cyphertop encryption is high, without the length of the encrypted file increasing significantly. Each cycle has a header that contains the data (five initial parameters) that modify the structure of Cylinder and other procedures within Cyphertop. When the data is processed in the second cycle, the first “block” will contain data of the header of the first cycle, plus garbage bits and bits of the encrypted original file. Then a displacement of blocks occurs which makes it impossible for cryptanalysts to perform an analysis of the data by blocks. This is the figure that was intentionally sought when encryption at two cycles was conceptualized. And in addition, the two cycles guarantee that any text obtained when trying to break the ciphering of the second cycle will give as a result a file likewise encrypted (in the first cycle) and never the plain original text.
- The impossible reading:
The three-dimensional bolts. In the process of decoding, for the correct functioning of each one of the cycles that have just been described, the decoding code of Cyphertop must be instructed on how to proceed. The initial parameters, as it is obvious, must be transmitted within the encrypted data so that the decoding code of Cyphertop arms the inverse procedure to the encryption. These data as it has been stated already, are transmitted in the Header of the encrypted file. Five parameters per cycle. It is imperative that this information is safe from any attempt to attack by brute force. Such was the requirement of design for storing these types of data within the encryption of Cyphertop. The solution was to generate a three-dimensional data structure, within which, the bits generated randomly are inserted. Later, inside this three-dimensional structure of bits, the figure corresponding to the parameter that we wish to send is “carved”, so to speak. Finally, we go on to stir that bits of this three-dimensional structure and to transform its bits through XOR and complement operations and they are moved to a vector whose bits are inserted one by one in positions of the Header, selected by Cylinder(). For the decoding code of Cyphertop to find again the parameters, it is necessary to repeat the process inversely and finally, read in a “visual” way the figures corresponding to the parameters sent for the encrypting code. That is why this structure is called a three-dimensional Bolt since its subtle mechanism hides access to information of great importance for the crypto analyst.
- Cyphertop encryption software & a computational curiosity.
If a quadrillion computers could be created, each one of them one quadrillion times more powerful than the most powerful one of the present, the Summit computer of the National Oak Ridge Laboratory with a yield of = 200 petaflops = 2 x 1017 flops (Floating Point Operations per second). The combined power of this quadrillion “improved” Summit computers would be: 1024 x 1024 x 2.7 x 1017 = 2.7 x 1065 flops Now, from now until the end of the universe (according to cosmologists), there are 15,000 million years, that is 4.7304 x1017 seconds Then all the computers proposed above, in the time of existence remaining to our universe would have carried out 1.277208 x 1083 flops Assuming that in each flop a configuration of a Cyphertop encryption could be examined, the computational power already described would not be enough to examine all the possible forms in which one connection point or version of Cyphertop can encrypt a set of data: 2.085924830 x 1093 Such is the difficulty to proceed with an attack of brute force against one encryption made with a particular version of Cyphertop. Likewise, an attack of this kind on one encryption done with an unspecific version of a universe of Cyphertop, in particular, is discarded. And finally, what can be expected if it is an attack to a Cyphertop encryption done by an unspecific version, belonging to an unspecific universe of the Cyphertop system?
- Surjective relations, isomorphism, polymorphism, and polysomorphism.
We have already seen that each connection point can encrypt a data set in AC different ways where AC = 2.085924830 x 1093 From the point of view of a curious third party, he can see several encryptions, like the fact of belonging likewise to different files. But that is not so. Therefore there is a tautological relation here: Different sets of symbols (coded), originated by the same file. Furthermore, precisely the fact that a file can be:
- Coded in different ways by the same installed version of Cyphertop: Polymorphism in the result.
- Coded in AC different ways by each version of Cyphertop encryption software and that these encodings differ from the other versions of the same universe.
Likewise, different files coded by the same version of Cyphertop or by another version of the same universe, can give an equal encoding as a result, establishing on this occasion an inverse surjective relation: Isomorphism in the result. Several different files with the same encoding. Although this type of event is not frequent, what is remarkable here is that under the Cyphertop system, it is possible. Finally, if any encryption corresponds with several encodings of the same file by part of one or more connection points, but at the same time corresponds to encodings of different files by part of one or more connection points, we will have at the same time (in reference to the final result, in other words, to the encryption) the two figures stated before: Polymorphism and isomorphism. This figure we call “Polyisomorphism” since it shows both figures in one same result: Polymorphism and isomorphism.
- The magnificent geometry.
Cyphertop is due in great part to the geometrical disposition of its information structures. However, it is mandatory to admit that geometry has always been present in cryptography, ever since man found himself in the need to safeguard information. Look at the following historical relationship: In ancient times, romans and other peoples sent encrypted files or messages, transposing letters or substituting them, but all the labor was carried out over the file or message, in a linear way. (One dimension, that is, one vector). The encryption of Alberti appears, developed by Giovani Battista Belasso and cryptography advances to two dimensions: The matrix. Methods based on that ciphering were developed to give it more robustness: The Vigénere painting in France. In the second half of the XIX century, the Confederated States of America, for example, used a ciphering disk to implement the Alberti ciphering during the Civil War in the United States. But the encryption method by disks had its most famous exponent in the Enigma machine: used by the Germans from the 1920s till the Second World War. Currently, there are cryptographic methods that use data cubes and other structures in three dimensions. And in fact, there are encryption systems that use more than three dimensions. In the Enigma machine in a certain way, given the necessary rotation of coupled disks we can talk of a third dimension: But a detailed mathematical analysis, allows the simulation of an Enigma machine through a computer program, replacing the disks with circular vectors. Cyphertop can adopt information structures from 1 to 3 or more dimensions for any of its universes. The current sample universe of Cyphertop contemplates information structures of up to three dimensions: Vectors, Matrices, and Cylinders. Cyphertop encryption software is a cryptographic system in evolution and the Geometry of its information structures intends to escalate in complexity. The data movement within this Geometry, assisted by the random addressing that Cylinder can provide, is so to speak, the down payment of the complexity of Cyphertop.
- Randomness: From philosophy to physics.
Any event whose occurrence is totally unpredictable in the conditions of time and place is defined as random. For the purposes of everyday reality it suffices with the following statement: “Any event whose occurrence is determined by models of complexity greater than the understanding on the part of contemporary human knowledge can be considered as random”. In that order of ideas, when human knowledge advances and the understanding of the physical variables of such behavior (the occurrence of the event) become possible, we change the category of this event: It no longer belongs to the category of random events.
- The second premise.
At the beginning of this document, the two basic premises for the design of Cyphertop were illustrated:
- The impossibility of an attack by brute force: It was achieved, although, by the general nature of the description that has been made here, it is not formally proven, except for the figures that are exhibited. The final test, code in hand, is beyond the scope of this document and requires a different technical level and conditions of confidentiality that is not the case to be illustrated here.
- Even with the source code in enemy hands, Cyphertop is resistant to all attempts of decryption. Let’s look at this point next:
The history of Cryptography is full of stories about how many encryption processes were violated or as it is more common to call it, broken by a persevering enemy or, very clever who resorted not only to the ingenious spark of inverse reasoning but also to buying or stealing the encrypting procedure. During the Second World War, the Enigma machines obtained as a “loan” from the Germans, plus the previous knowledge already obtained by the Polish intelligence, were decisive so that Alan M. Turing and other English cryptographers put the “Bomb” on the verge of completion, an electromechanical device with which the German code was finally broken towards halfway through the war. In Japan, the transpositions machine of Ito (Purple Ciphering) suffered “an unauthorized loan” that allowed, among other things, to break the Japanese code, intercept the plane in which Admiral Yamamoto was traveling and destroy it. In this respect, there are many legends about the reliability of ciphering systems sold by private companies, which are susceptible to huge external political and economic pressure. In the event of an attack on Cyphertop through non-computational ways, it should be noted that it is precisely the thousands of data that the user generates interacting with the computer at the moment of installing a connection point or version of Cyphertop which makes each version possess its own identity (DNA), that is, a different encryption mechanism from other versions of Cyphertop. Guarantee that does not allow the generalization of the attacks made over a particular version of Cyphertop. And finally, the internal data of each version of Cyphertop are not contained in a common everyday file. They are hidden through stenographic techniques, inside other files of innocent aspect. To do a decryption attempt on an undetermined version of Cyphertop, it is necessary to make a brute force attack on its internal data which requires a labor of computational testing of PC = 8.21479634 x 1060.224 Possible configurations of the data of that version or connection point as long as the source code of Cyphertop is at hand! Any attack without this resource (the code) is more than discarded. That is because the challenge would be even greater, that means analyzing the content of two consecutive blocks of ciphering when they are files sufficiently large: That is, an analysis of 40 million bytes, in other words, complexity analysis over: 320 million bits. And of course, the impossibility of proceeding with an attack by brute force with code in hand has been illustrated, therefore it’s meaningless to make computational calculations vs the complexity of 320 million bits. See Cyphertop’s Mathematics (2). Assuming that the code is acquired, obtaining the internal data by computational effort, as was demonstrated, would be an almost impossible mission. But obtaining the data (DNA) of a point specifically of Cyphertop, via “loan”, only violates the compatible points of access of that connection point or version That is, the node in question and its neighbor(s). As will be seen later in the following section (17), even so, the security of Cyphertop is maintained given the mutation capacity that the DNA has in the Cyphertop system. On the other hand, it is a work of seconds to carry out the transformation of those nodes into a new version of Cyphertop with different internal data (DNA). This places Cyphertop in a prominent place regarding control of emerging damage in what is related to the information that is handled through it, for the situations of illegal appropriation of its internal platform of operation (DNA).
- Mutation in time. How and when.
It was mentioned before that each connection point of the Cyphertop model encrypts the same file in a different way on each occasion. This is partially true due to the fact that the parameters for each encryption allow generating: AC = 2.085924830 x 1093 Different ways of encrypting such file, or to say it in Cyphertop language: Different encryption algorithms. But they are not infinite. And either way the same 2.085924830 x 1093 Algorithms for each connection point will continue to be generated, therefore, the promise that the Cyphertop model would be not automorphic in time is in terms of everyday reality. The time of existence of a human being is not enough to carry out AC encryptions of a set of data. Concern also arose regarding the security of the Cyphertop model in front of thefts of codes or what is really worrying, the theft of the very DNA of the connection point. In this regard, it is good to clarify that protection mechanisms have been designed to adequately safeguard the DNA residing in a Cyphertop connection point. In essence, each connection point is comprised of two types of subscribers:
- The generator, who is the one that initially generates in his site (Host) the DNA that he will use for a connection and later will send it to the person or site with whom he wants to establish communication.
- The receiver is the one who receives the DNA by part of the Generator and thus can establish communications with him.
The intelligence services have as a rule that they keep the same passwords or keys for no more than six months maximum. The world today is composed of new challenges: Hackers, cyberspace bandits, intelligence services and all kinds of intruders who steal the intimacy of the internauts every day. Payment platforms have been constantly the target of attacks and thefts which show that for now, there is no information protection system completely invulnerable. In virtue of which Cyphertop implements the figure of cyclic regeneration of DNA of each connection point (DNA mutation) adapting itself to this trend. This event will be designed so that it occurs with a certain frequency. Requesting the users of the connection point to renew their DNA and in this way the Generator user proceeds to ask for a new DNA for the connection point when it has been used long enough and it’s time for its renewal. This process requires an agreement between users in order to safeguard the encrypted files with the DNA to be replaced. As it is logical, the new DNA will be transmitted by the generator to the receiver, encrypted with the old DNA or with the existing protocol for when a new connection point is generated. The figure of the regeneration of the DNA (by the decision of the parties), answers affirmatively the question of whether Cyphertop is an automorphic system in time or not. Therefore, now there can be talk in strict terms of a mutating system in time, not automorphic, which will give the user better protection of his information since the new set of DNA will provide the user with some other 2.085924830 x 1093 different algorithms from the ones he had been using. Anyway, would a human being live the necessary time to send during his lifetime 2.085924830 x 1093 Encryptions of the same file? And thus exhaust all the possible algorithms that Cyphertop can provide him to encrypt the same file, with a determined DNA?
- The architecture of a Cyphertop network.
- Dedicated connections point to point that serve to connect exclusively two points on the network.
- Star topology with central point communicating with the satellites, but without a connection between them.
- Star Topology but with communication between all the points in the star.
- Tree type topology with communication of the n level node to all the nodes of the n-1, n+1 levels downstream for hierarchical organizations.
- Mixed topologies gathered in only one information system dependent on a Cyphertop universe.
Cryptography has evolved from the transposition and substitution of symbols to the handling of the minimum unit of information: The bit. When we speak or we listen, we do so in a vectorial way. Television gives us information in a two-dimensional way, with three-dimension projections. With the new holographic techniques, the capture of information in a three-dimensional way becomes a reality. The future of cryptography belongs to the multidimensional geometry and to the complexity of the generation of pseudo-random numbers. The author considers that the escalation in dimensions with contributions of new geometries for the transposition of bits is the way of the future. Likewise, new and sophisticated techniques for capturing events of real life may be used through the I/O mechanisms of the computer or of the cell and also mechanisms related with the internal functioning of its processors, providing levels of randomness, that in its time exceed by a wide security margin, the frontier of the random with the predictable, which will result in an advance in the generators of pseudo-random numbers in such a way that its results can well be cataloged as random, due to their high complexity at the moment of their use. Cyphertop opens up a new approach for high-security cryptography. The paradigm of the length of the key is no more. Neither is the massive calculations to break prime numbers that are larger every time. There are no limits other than those imposed by human knowledge. And of course, there is your imagination and creativity. May this be the occasion to quote an illustrious North American writer and poet, Edgar Allan Poe: “It is doubtful that the human race will create an enigma that the same human genius will not solve”. Therefore, The challenge of Cyphertop is open…