## The Doghouse: Privacy Inside

I'm just going to quote without comment:

About the file: the text message file encrypted with a symmetric key combine 3 modes1st changing the original text with random (white noise) and PHR (Pure Human Randomness) shuffle command , move and replace instruction combine with the key from mode 1 (white noise) and 2 (PHR)

2nd mode Â xor PHR - Pure Human random ( or ROEE Random Oriented Enhanced Encryption) with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different

3rd mode Â xor WNS - White Noise Signal with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different

4th Reconstructs file, levels and dimensions to a

this is a none mathematical with zero use of calculation algorithm - so no brute force , Rainbow Crack , or gpu cuda nvidia brute force crack can be applied on this technology . Sorry you have to find a new way to crack chaos theory for that.We use 0% of any mathematical calculation algorithm Â so we can perform any ware with unparalleled strength

Key Strength - 1million bit or more

Speed performance 400% faster Compeer to AES

MPU use - Mathematical Process Unit in CPU use 3% - 7% only

Overhead of the file from original 5% +/- (original+5%) +/-

A combination of mode 1 and 2 applied with a new variation of XOR - to perform the encrypted message

Anyone have any ideas?

Posted on October 13, 2009 at 2:55 PM • 106 Comments

## Leave a comment