- Created: Sunday, 01 July 2001
Encryption methods based upon nonprobabilistic nondeterminism show promise in the optical age.
In 1987 a discovery led to the formal proof that it is possible to use chaotic functions to arrive at a nonprobabilistic and nondeterministic method normal context of the operation of this system, and by using a virtual operational environment, the investigators are manipulating data in eight dimensions, which require a sixty-four discrete coordinate system, using eight nominative octets. Each octet is further addressed using the characters 0 through 9, and lower- or upper-case letters from A to Z. These provide the ability to address using normal ASCII characters. This format was chosen to ensure backward and forward compatibility with external third-party-written software.
This original discovery has led to the fundamental principle that the main focus of any chaotic system was what the output would look like. After watching hundreds of runs of Edward Lorenz's strange attractors show up in places that were seemingly endless, it was decided that the team would pursue the goal of placing this type of behavior into a software/hardware combination that would supply the necessary functionality and still be robust enough for a PC or minicomputer format. This was accomplished when the first modules of Fortran were created; then, as time went on in the development process, the investigators translated some of the harder features into what languages were available and able to be used.
The system that was decided upon was one where a combination of hardware and software was used. The hardware provided a means of proper transmission and error correction, and the software was utilized to create the front end and all of the virtual mechanisms used to create each message block, or octet as the case may be.
It was also discovered that this same functionality would allow the messages to be combined into still larger messages in a differential cryptographic type of format. When this was demonstrated, a single message contained several megabytes worth of data. The message blocks themselves did not contain more than a minimum of 56K to a maximum of 128K in total length.
There were additional discoveries to be made with this format, and many of these were going to be even more interesting scientifically. It was discovered that the messages could be used for storage after the shell had been created for the final encrypted product. The baseline addressing schemes started at 1024 bits, went to 2048, and then finally stopped at 2048 × 2048, or 4,194,304 bits in the single message matrix. This single matrix was demonstrated to be able to hold several orders of magnitude above the original test shell. In testing, the actual message block has contained a five-to-one ratio of encrypted data to original matrix. The largest block to date is more than five hundred megabytes with a nominal shell of three megabytes.
The message matrix, at the present time, is translated into the standard two-dimensional hardware addressing that the hardware will support. There is additional experimentation with optical methods to ensure that the output of the product is translatable into three and higher mathematical dimensions. While the creative mechanism is based upon a VRML format, the main message unit is easily translatable into any known or projected translational mechanism.