E-Mail Address: robtjmiller4249@gmail.com Vectorlite encryption is a data transform technique to protect computer files. The method involves a stochastic encryption process which greatly expands and enhances a fundamental millenium(s) old technique to render analysis impractical, made practical with modern inexpensive computing hardware. Plain-text input is transformed into a randomized displacement domain to create cipher-text with flat distributions of byte values, distance distributions between same byte values, and the minimal repetative duplicate byte patterns which must or should exist as predicted by probability theory. The resultant cipher-text files contain randomized "byte value noise" & "uniform random byte distributions" with respect to byte values, distributions, and patterns. Vectorlite attempts to overwhelm crypto-analysis by the massive number of possible permutations within 5 multiple concurrent key-tables (2) + randomized data biasing structures (3) used in parallel. Randomized encrypted false data is inserted within the cipher-text results randomly. The key-tables randomly dynamically self-modify during encryption to help ensure no two encryptions of identical content utilitize an identical crypto-key, to further confound analysis. Vectorlite encryption is scalable - currently implementing 2 dimensional key-tables, which can easily expand to any <N> dimensions should computing resources for analysis continue to grow as they are currently into the future. Vectorlite scales on the order of N! factorals (approx) as computing scales linearly in speed and parallelism. A 3 dimensional prototype was constructed to demonstrate Vectorlite's scaling potential. To comprehend the number of permitted permutations within the 2 key-tables, for a 1 plain 2 dimensional key - the magnitude power of 10 likely has more the 1,250 zeroes. This dwarfs other crypto implementations. There are 256 (x2) plains permitted, each with that number of possibilities permitted in addition. Using the maximum size key, there are approximately 3.x with 318,750 (+/-) zeroes permutations in a key. Before the inclusion of randomized false data and the key randomly permutating both at random intervals. The US Dept. of Commerce BIS and US NSA have been notified of the version 5M update, Patents will be applied for. Prior disclosure to the U.S. Patent office - July 18, 1995 < details withheld> Feedback & Contact Info: Robert Miller; currently protected / disabled The software & documentation is undergoing significant revision. 1 - Multi threaded decimation of input for both encryption and decryption of files Version 5N In Development Now (1) - Improved dual sourced true random number generation Warrenty - None! The software is provided for demonstration and proof of concept only. The software is not to be used commercially, personally, or otherwise to protect actual user or business useful data. No warrenty is expressed or implied. New - July 28, 2021 - Version 5N - True Random number usage / nonce inclusion / etc.
In Brief
as required by Dept. of Commerce guidance. Redistribution of this software is
governed United States law: DOC Encryption
Patent DisclosureSources and Binaries (United States only)
Version 5M Enhancements
2 - I/O buffering for better performance
3 - Elimination and simplication of command line options
4 - Improvement on (pseudo) random number generation
(2) - Implimentation on unique nonce for every encrypt usage from a keytable
(3) - A random number generator program included to assist with keytable creations
(4) - 64 to 80 way thread testing on bare metal Linux servers
w/ memory to support such