Superposition as a Means of Data Encryption in N-Dimensional Value Spaces

Tyler Burgee
{"title":"Superposition as a Means of Data Encryption in N-Dimensional Value Spaces","authors":"Tyler Burgee","doi":"10.55632/pwvas.v95i2.956","DOIUrl":null,"url":null,"abstract":"The objective of this study was to provide a new method for creating quantum-proof encryption algorithms. I accomplished this by designing a symmetric 2-key cryptosystem that exploits the superposition principle to encrypt data in multi-dimensional value spaces. \n   The proposed cryptosystem substitutes characters for frequencies, as determined by two private keys: component wave order key (CWOK) and character transmission order key (CTOK). A CWOK defines the values and theoretical spatial arrangement of frequencies in a complex wave. A CTOK defines the unique arrangement of system characters (i.e., characters in an encoding scheme such as ASCII), determined by a hash function, to identify a user. Combining the CWOK and CTOK, we construct a character-lookup table (CLT), which defines the character-frequency relationships used to generate a substitution cipher. A cipher’s frequency values must be superimposed in accordance with the CWOK. Fast Fourier Transforms are used during the decryption stage to perform complex wave analysis. \n   Complex waves can have n! frequency configurations, where n = the number of component frequencies; each CTOK can have a! character configurations, where a = the number of characters defined in an encoding scheme. Therefore, by requiring n ≥128 and using the ASCII encoding scheme (a = 128), there are n!+a!=128!+128!=2*128! possible key configurations for any given cipher. This is approximately 3.330284e+138 times as many key configurations possible with AES 256. \n   Exploiting the multi-dimensional nature of complex waves, and combining these techniques with other powerful encryption algorithms used today, it appears likely that we can create a quantum-proof cryptosystem.","PeriodicalId":92280,"journal":{"name":"Proceedings of the West Virginia Academy of Science","volume":"51 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the West Virginia Academy of Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55632/pwvas.v95i2.956","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The objective of this study was to provide a new method for creating quantum-proof encryption algorithms. I accomplished this by designing a symmetric 2-key cryptosystem that exploits the superposition principle to encrypt data in multi-dimensional value spaces.    The proposed cryptosystem substitutes characters for frequencies, as determined by two private keys: component wave order key (CWOK) and character transmission order key (CTOK). A CWOK defines the values and theoretical spatial arrangement of frequencies in a complex wave. A CTOK defines the unique arrangement of system characters (i.e., characters in an encoding scheme such as ASCII), determined by a hash function, to identify a user. Combining the CWOK and CTOK, we construct a character-lookup table (CLT), which defines the character-frequency relationships used to generate a substitution cipher. A cipher’s frequency values must be superimposed in accordance with the CWOK. Fast Fourier Transforms are used during the decryption stage to perform complex wave analysis.    Complex waves can have n! frequency configurations, where n = the number of component frequencies; each CTOK can have a! character configurations, where a = the number of characters defined in an encoding scheme. Therefore, by requiring n ≥128 and using the ASCII encoding scheme (a = 128), there are n!+a!=128!+128!=2*128! possible key configurations for any given cipher. This is approximately 3.330284e+138 times as many key configurations possible with AES 256.    Exploiting the multi-dimensional nature of complex waves, and combining these techniques with other powerful encryption algorithms used today, it appears likely that we can create a quantum-proof cryptosystem.
n维值空间中数据加密的叠加方法
本研究的目的是提供一种创建量子证明加密算法的新方法。我通过设计一个对称的2密钥密码系统来实现这一点,该系统利用叠加原理对多维值空间中的数据进行加密。提出的密码系统用字符代替频率,由两个私钥确定:分量波序密钥(CWOK)和字符传输顺序密钥(CTOK)。CWOK定义了复波中频率的值和理论空间排列。CTOK定义了由哈希函数确定的系统字符(即编码方案(如ASCII)中的字符)的唯一排列,以标识用户。结合CWOK和CTOK,我们构建了一个字符查找表(CLT),它定义了用于生成替换密码的字符-频率关系。密码的频率值必须按照CWOK进行叠加。在解密阶段使用快速傅里叶变换来执行复波分析。复波可以有n!频率配置,其中n =组成频率的个数;每个CTOK都可以有一个!字符配置,其中a =在编码方案中定义的字符数。因此,通过要求n≥128,并使用ASCII编码方案(a =128),有n!+a!=128!+128!=2*128!任何给定密码的可能密钥配置。这大约是AES 256可能的密钥配置的3.330284e+138倍。利用复杂波的多维特性,并将这些技术与目前使用的其他强大的加密算法相结合,我们似乎可以创建一个量子证明的密码系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信