Re: The Greatest Fraud of All
Its obvious you have no understanding of military cryptography or equivocation. Don't be upset, most security "experts" don't either.
Let me educate you. Hyper encryption is encryption with three or more independent encryption algorithms.
"Perpetual encryption" is just a name created for it, because the encryption keys are updated in a perpetual manner. The OTP key creation entropy and the encrypted message are sent at the same time.
The message is constant. But the key used to encrypt the message is dynamic and changed with every encryption block. So the same message if encrypted with the same key, will produce a different ciphertext. There is no relationship between ciphertext and message, given the same key.
Let me explain. Encryption is usually message M + key K = cyphertext C. We use an additional variable so that M + K + R(Random) = C. So using the same message and key will produce a different ciphertext because of the random sequence R. Usually, M(1) + K(2) will always = C(3). In our case, M(1) + K(2) + R(?, say 7) will produce C(?10). Note that a different M and K may produce the same C M(3) + K(7) + R(0) will also = C(10).
The point is this stuff can be graphically depicted. One can visualize information security, by plotting the message and key equivocation of a cipher. A cipher with no equivocation graph, is really just snakeoil and has not been properly analysed. In military cryptography, we create equivocatiuon graphs for all ciphers since it tells us how much ciphertext we need to break the cipher. AES 256 is snakeoil, it's pseudo security, incapable of securing any message beyond 40 characters (assuming all languages have similar redundancy).
So, one does not encrypt something such that it continuously updates itself. Once encrypted the cyphertext is frozen in time as you say. However, the random entropy used to update the encryption process can be extracted in reverse.
At the time you responded, we were still working in secret, and no public information on the cipher was available. However, the cipher has been subsequently approved for patenting by WIPO and our US patent has been approved. Look up "Equivocation Augmentation".
The other thing I wanted to mention, is that people's opinions are in general BS. Science does not depend on people's opinions. Either the cipher holds up to scientific experimentation or its does not. Note that current crypto has no scientific basis for credibility, just the opinions of mathematicians that some maths problems are "hard". This condition is about to be blow completely out of the water.
You really think that it's impossible to break RSA 1024 quickly? That's the same mistake the Germans made during the war.
Your facts suck. Don't confuse physical reality with digital reality. Some maths problems cannot be solved (why the one-time pad works). Take a number between 1 and 64. All you know is that the number is divisible by 8. Exactly which number is it? Unmake that problem. Oh, and I don't know which one it is either. so keep your hose where you keep it.
Jesus buddy, did you go to school? Because my ignoramous meter has just gone 720. Please tell me that you purpose to life is greater than just talking rubbish.