Vectorlite Encryption -

New - July 28, 2021 - Version 5M - Multi-Threaded & Improved I/O Performances


E-Mail Address:

In Brief

Vectorlite encryption is a data transform technique to protect computer files. The method involves a stochastic encryption process which greatly expands and enhances a fundamental millenium(s) old technique to render analysis impractical, made practical with modern inexpensive computing hardware.

Plain-text input is transformed into a randomized displacement domain to create cipher-text with flat distributions of byte values, distance distributions between same byte values, and the minimal repetative duplicate byte patterns which must or should exist as predicted by probability theory. The resultant cipher-text files contain randomized "byte value noise" & "uniform random byte distributions" with respect to byte values, distributions, and patterns.

Vectorlite attempts to overwhelm crypto-analysis by the massive number of possible permutations within 5 multiple concurrent key-tables (2) + randomized data biasing structures (3) used in parallel. Randomized encrypted false data is inserted within the cipher-text results randomly. The key-tables randomly dynamically self-modify during encryption to help ensure no two encryptions of identical content utilitize an identical crypto-key, to further confound analysis.

Vectorlite encryption is scalable - currently implementing 2 dimensional key-tables, which can easily expand to any <N> dimensions should computing resources for analysis continue to grow as they are currently into the future. Vectorlite scales on the order of N! factorals (approx) as computing scales linearly in speed and parallelism. A 3 dimensional prototype was constructed to demonstrate Vectorlite's scaling potential.

To comprehend the number of permitted permutations within the 2 key-tables, for a 1 plain 2 dimensional key - the magnitude power of 10 likely has more the 7,000 zeroes. This dwarfs other crypto implementations. There are 512 plains permitted, each with that number of possibilities permitted in addition...

The US Dept. of Commerce BIS and US NSA have been notified of the version 5M update,
as required by Dept. of Commerce guidance. Redistribution of this software is
governed United States law: DOC Encryption

Patent Disclosure

Patents will be applied for. Prior disclosure to the U.S. Patent office - July 18, 1995: Disclosure Doc.

Feedback & Contact Info: Robert Miller;


Sources and Binaries (United States only)

currently disabled: pending consideration for revues / patents. The software random number usage is being enhanced / changed to accepted PRNG standards and is under PRNG testing via the TestU01 suite. The software will be subjected to 64 or 80 thread testing for decimation for large files, and more formal mathematical analysis of the cipher text results before consideration for formal peer review.

User's Manual: User's Manual // Test Results: Test Results // Version History: Tech Notes

The documentation is undergoing significant revision.

Version 5M Enhancements

1 - Multi threaded decimation of input for both encryption and decryption of files
2 - I/O buffering for better performance
3 - Elimination and simplication of command line options
4 - Improvement on (pseudo) random number generation

Version 5N In Development Now

(1) - A USB Hardware Random Number Generation Option
(2) - Use of Blum Blum Shub or other PRnGs to replace initial C lib test dev
(3) - Final implementation of key use counts (nonce like behavior)
(4) - Implementation of random key table jumps (malability behavior)
(5) - Consideration of random message file / thread starting offsets
(6) - 64 to 80 way thread testing on bare metal Linux servers w/ memory to support such
(7) - Consideration of randomized / swizzling final c-text file assembly

Future Considerations

(1) Functionality for streamed / piped I/O via STDIN
(2) Integration into symetrical key portions of public / private key crypto applications

Warrenty - None!

The software is provided for demonstration and proof of concept only. The software is not to be used commercially, personally, or otherwise to protect actual user or business useful data. No warrenty is expressed or implied.