In BriefVectorlite encryption is a data transform technique to protect computer files. The method involves a stochastic encryption process which greatly expands and enhances a fundamental millenium(s) old technique to render analysis impractical, made practical with modern inexpensive computing hardware. Plaintext input is transformed into a randomized displacement domain to create ciphertext with flat distributions of byte values, distance distributions between same byte values, and the minimal repetative duplicate byte patterns which must or should exist as predicted by probability theory. The resultant ciphertext files contain randomized "byte value noise" & "uniform random byte distributions" with respect to byte values, distributions, and patterns. Vectorlite attempts to overwhelm cryptoanalysis by the massive number of possible permutations within 5 multiple concurrent keytables (2) + randomized data biasing structures (3) used in parallel. Randomized encrypted false data is inserted within the ciphertext results randomly. The keytables randomly dynamically selfmodify during encryption to help ensure no two encryptions of identical content utilitize an identical cryptokey, to further confound analysis. Vectorlite encryption is scalable  currently implementing 2 dimensional keytables, which can easily expand to any <N> dimensions should computing resources for analysis continue to grow as they are currently into the future. Vectorlite scales on the order of N! factorals (approx) as computing scales linearly in speed and parallelism. A 3 dimensional prototype was constructed to demonstrate Vectorlite's scaling potential. To comprehend the number of permitted permutations within the 2 keytables, for a 1 plain 2 dimensional key  the magnitude power of 10 likely has more the 7,000 zeroes. This dwarfs other crypto implementations. There are 512 plains permitted, each with that number of possibilities permitted in addition... The US Dept. of Commerce BIS and US NSA have been notified of the version 5M update,
Patents will be applied for. Prior disclosure to the U.S. Patent office  July 18, 1995: Disclosure Doc. Feedback & Contact Info: Robert Miller;

Sources and Binaries (United States only)currently disabled: pending consideration for revues / patents. The software random number usage is being enhanced / changed to accepted PRNG standards and is under PRNG testing via the TestU01 suite. The software will be subjected to 64 or 80 thread testing for decimation for large files, and more formal mathematical analysis of the cipher text results before consideration for formal peer review. User's Manual: User's Manual // Test Results: Test Results // Version History: Tech Notes The documentation is undergoing significant revision. Version 5M Enhancements1  Multi threaded decimation of input for both encryption and decryption of files Version 5N In Development Now (1)  A USB Hardware Random Number Generation Option Future Considerations (1) Functionality for streamed / piped I/O via STDIN Warrenty  None! The software is provided for demonstration and proof of concept only. The software is not to be used commercially, personally, or otherwise to protect actual user or business useful data. No warrenty is expressed or implied. 