## The Doghouse: Privacy Inside

I’m just going to quote without comment:

About the file:

the text message file encrypted with a symmetric key combine 3 modes1st changing the original text with random (white noise) and PHR (Pure Human Randomness) shuffle command , move and replace instruction combine with the key from mode 1 (white noise) and 2 (PHR)

2nd mode xor PHR – Pure Human random ( or ROEE Random Oriented Enhanced Encryption) with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different

3rd mode xor WNS – White Noise Signal with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different

4th Reconstructs file, levels and dimensions to a

this is a none mathematical with zero use of calculation algorithm – so no brute force , Rainbow Crack , or gpu cuda nvidia brute force crack can be applied on this technology . Sorry you have to find a new way to crack chaos theory for that.We use 0% of any mathematical calculation algorithm so we can perform any ware with unparalleled strength

Key Strength – 1million bit or more

Speed performance 400% faster Compeer to AES

MPU use – Mathematical Process Unit in CPU use 3% – 7% only

Overhead of the file from original 5% +/- (original+5%) +/-

A combination of mode 1 and 2 applied with a new variation of XOR – to perform the encrypted message

Anyone have any ideas?

gilberto • October 13, 2009 3:05 PM

Does not merit much comment, just a lot of incoherent crypto-babble crap.