The Doghouse: Privacy Inside
I’m just going to quote without comment:
About the file:
the text message file encrypted with a symmetric key combine 3 modes1st changing the original text with random (white noise) and PHR (Pure Human Randomness) shuffle command , move and replace instruction combine with the key from mode 1 (white noise) and 2 (PHR)
2nd mode xor PHR – Pure Human random ( or ROEE Random Oriented Enhanced Encryption) with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,
Text will transform to a cipher the last will be different
3rd mode xor WNS – White Noise Signal with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,
Text will transform to a cipher the last will be different
4th Reconstructs file, levels and dimensions to a
this is a none mathematical with zero use of calculation algorithm – so no brute force , Rainbow Crack , or gpu cuda nvidia brute force crack can be applied on this technology . Sorry you have to find a new way to crack chaos theory for that.We use 0% of any mathematical calculation algorithm so we can perform any ware with unparalleled strength
Key Strength – 1million bit or more
Speed performance 400% faster Compeer to AES
MPU use – Mathematical Process Unit in CPU use 3% – 7% only
Overhead of the file from original 5% +/- (original+5%) +/-
A combination of mode 1 and 2 applied with a new variation of XOR – to perform the encrypted message
Anyone have any ideas?
gilberto • October 13, 2009 3:05 PM
Does not merit much comment, just a lot of incoherent crypto-babble crap.