Vectorlite Encryption - Secretware.net

New - July 28, 2021 - Version 5N - True Random number usage / nonce inclusion / etc.



 

E-Mail Address: robtjmiller4249@gmail.com

 

In Brief

Vectorlite encryption is a data transform technique to protect computer files. The method involves a stochastic encryption process which greatly expands and enhances a fundamental millenium(s) old technique to render analysis impractical, made practical with modern inexpensive computing hardware.

Plain-text input is transformed into a randomized displacement domain to create cipher-text with flat distributions of byte values, distance distributions between same byte values, and the minimal repetative duplicate byte patterns which must or should exist as predicted by probability theory. The resultant cipher-text files contain randomized "byte value noise" & "uniform random byte distributions" with respect to byte values, distributions, and patterns.

Vectorlite attempts to overwhelm crypto-analysis by the massive number of possible permutations within 5 multiple concurrent key-tables (2) + randomized data biasing structures (3) used in parallel. Randomized encrypted false data is inserted within the cipher-text results randomly. The key-tables randomly dynamically self-modify during encryption to help ensure no two encryptions of identical content utilitize an identical crypto-key, to further confound analysis.

Vectorlite encryption is scalable - currently implementing 2 dimensional key-tables, which can easily expand to any <N> dimensions should computing resources for analysis continue to grow as they are currently into the future. Vectorlite scales on the order of N! factorals (approx) as computing scales linearly in speed and parallelism. A 3 dimensional prototype was constructed to demonstrate Vectorlite's scaling potential.

To comprehend the number of permitted permutations within the 2 key-tables, for a 1 plain 2 dimensional key - the magnitude power of 10 likely has more the 1,250 zeroes. This dwarfs other crypto implementations. There are 256 (x2) plains permitted, each with that number of possibilities permitted in addition. Using the maximum size key, there are approximately 3.x with 318,750 (+/-) zeroes permutations in a key. Before the inclusion of randomized false data and the key randomly permutating both at random intervals.

The US Dept. of Commerce BIS and US NSA have been notified of the version 5M update,
as required by Dept. of Commerce guidance. Redistribution of this software is
governed United States law: DOC Encryption

 

 


Patent Disclosure

Patents will be applied for. Prior disclosure to the U.S. Patent office - July 18, 1995 < details withheld>

Feedback & Contact Info: Robert Miller;

 

Sources and Binaries (United States only)

currently protected / disabled

The software & documentation is undergoing significant revision.

 

Version 5M Enhancements

1 - Multi threaded decimation of input for both encryption and decryption of files
2 - I/O buffering for better performance
3 - Elimination and simplication of command line options
4 - Improvement on (pseudo) random number generation

Version 5N In Development Now

(1) - Improved dual sourced true random number generation
(2) - Implimentation on unique nonce for every encrypt usage from a keytable
(3) - A random number generator program included to assist with keytable creations
(4) - 64 to 80 way thread testing on bare metal Linux servers w/ memory to support such

Warrenty - None!

The software is provided for demonstration and proof of concept only. The software is not to be used commercially, personally, or otherwise to protect actual user or business useful data. No warrenty is expressed or implied.