Cyphertop Encryption Software
Cipher of data

Download Cyphertop scientific technical documentation

Cell Phones Cryptography Software

RECOMBINANT ALGORITHMS RESISTANT TO QUANTUM COMPUTING

In general, it can be said that the appearance and disappearance of virtual particles in the emptiness of space, follows a random behavior due to influences not discovered yet by scientists. In this sense, the behavior of a system is random as a reflection of our ignorance regarding the functioning of such a system.

Encryption Data

CYPHERTOP’S RESISTANCE TO COMPUTATIONAL BRUTE FORCE ATTACKS

This document proves beyond any doubt that computational brute force attacks are no threat whatsoever for Cyphertop encryption. To this end, the following GEDAKEN is presented (idealized physical experiment to test a theory).

coding, cryptography, decipherment, decoding, decryption, encoding, encryption, recoding

CYPHERTOP CRYPTOGRAPHIC UNIVERSES

A radically new conceptualization is presented for the development of cryptographic models, based on the introduction of new transposition and substitution techniques of the basic unit of information: The bit. The cryptographic universes, where each universe generates a gigantic set of encoders (versions or connection points) and each encoder generates, in turn, an equally gigantic number of encryption algorithms. In addition, the concepts of DNA, Three Dimensional Bolt, Necessary Noise, Recombinant Algorithm, Pivot, Cycle are introduced. And a new generator of random numbers: Cylinder().

coding, cryptography, decipherment, decoding, decryption, encoding, encryption, recoding

CYPHERTOP EQUIVALENCES

A new operation is developed here at the level of bytes for handling information with cryptographic purposes. The Equivalence. As it is well known, at the level of bits or bytes there are two fundamental operations: Transposition and substitution. The first transposes location bits or bytes within a text and the second carries out XOR operations (exclusive OR), over bits or bytes in order to transform the content of a bit or a byte.  With the possibility of contents of a byte being up to 256 different values which range from 0000 0000 up to 1111 1111…

coding, cryptography, decipherment, decoding, decryption, encoding, encryption, recoding

FASTER AND SAFER

This document fully illustrates the two main qualities of the CYPHERTOP encrypting meta algorithm.
The reader is referred to the CYPHERTOP introductory documents, such as:
1. Brief description of Cyphertop
2. Cryptographic Universes: the Cyphertop model
3. Recombinant algorithms resistant to Quantum computing
4. Cyphertop’s Resistance to Computational Brute Force Attacks
5. CYPHERTOP Security is Priceless
In them a general description of the CYPHERTOP model is made, which is the first encrypting meta-algorithm, in other words, it is a generator of encryption algorithms…

steganography decryption

CYPHERTOP FUNCTIONAL SCHEME

OPERATING DIAGRAM OF CYPHERTOP
ENCRYPTION PROCESS

Cyphertop is an encryption meta-algorithm of two cycles. The general process of encryption is presented here, in its two cycles

Suppose that you want to encrypt the following file (10 characters):
Steps:

1. N bytes (N is a number dependent on the DNA used) of garbage information are inserted. That is, bytes produced randomly.

 

coding, cryptography, decipherment, decoding, decryption, encoding, encryption, recoding

GENERATION OF RANDOM NUMBERS AND PSEUDORANDOM SERIES

In this work, innovative research is presented related to the inclusion of randomness as a primary component of cryptographic systems. A hybrid method of random numbers generation is developed with randomness close to a uniform distribution within the range of the values of the desired random numbers. The hybrid method can be considered part of the state of the art in the purpose of generating random numbers since when electromechanical, electronical or even quantum devices are used, inputs of information are fed which,…

steganography

CYPHERTOP SECURITY IS PRICELESSS

How many political, military, state and private projects have failed, simply because some information about them fell in the wrong hands!
Every day you can hear of anonymous leaks or responsible persons that destroy an enterprise, business, political reputation or even government.
The common denominator is precise: Information leak. The information was not protected.
Even when the information is supposedly protected, leakage occurs with great magnitude and with considerable losses for the government…

coding, cryptography, decipherment, decoding, decryption, encoding, encryption, recoding

RECOMBINANT ALGORITHMS RESISTANT TO QUANTUM COMPUTING

In general, it can be said that the appearance and disappearance of virtual particles in the emptiness of space, follows a random behavior due to influences not discovered yet by scientists. In this sense, the behavior of a system is random as a reflection of our ignorance regarding the functioning of such a system. Likewise, it can be sad that if the number of samples of an event is small enough that it prevents determining its behavior,

ADN

The Challenge of the Petaflops

Last year the news came out that the United States of America had recovered first place in the supercomputer environment with the supercomputer Summit, with a performance of 200 petaflops/sec. On the 21st of September the news commenting the announcement by sources close to Google was published by Charles Plateau of Reuters which assured that Google had succeeded…