Meet the Transcendental Cipher

Keyless encryption as a One-Time-Pad for ultimate privacy. No eavesdropping, no brute-forcing, no quantum attacks.

CIPHERTEXT
HBCUNZCSYBKLJLSBRCARDICUJJHOVICUAJGJOTPEZPKZHIMSFUDYAVIGHEYBKRKOCVYSDCFCARCNKSHPDEYOBJDIGBATBRDCNWCRPLSBYBZLARPBATBRAJOUMTZPPIHPHIESVJNTKRAJYWCSDCFUBRPEZPMCBZ

YIQPJMOYYSDFWSZEZSODGCFSRRGBATBRGIGLALLRPJGEAOARATUJDIJWGRRJXXUJDIGBATCNYWCXAMOZBZASYSDCDEYCVTASOYYJGIALBJGEYIPFVYXSDEAJYSDCDEZCUJDIDCBRUJDIDVOSWSMBCSRRGBATBR

JLBSFTGBPEIHMSMICSEEGBSFDFLWGBZSDCDEYOMWHJYWCSDCDFXSVMWSHEAJYBGOMWCUAJGJOWLVGBYTYVIHZSNSZYME HPCAJGJRJGI?

PLAINTEXT
SLOWLY DESPARATLY SLOWLY THE REMAINS OF PASSAGE DEBRIS THAT ENCUMBERED THE LOWER PART OF THE DOORWAY WAS REMOVED WITH TREMBLING HANDS I MADE A TINY BREACH IN THE UPPER LEFT HAND CORNER AND THEN WIDENING THE HOLE A LITTLE I INSERTED THE CANDLE AND PEERED IN THE HOT AIR ESCAPING FROM THE CHAMBER CAUSED THE FLAME TO FLICKER BUT PRESENTLY DETAILS OF THE ROOM WITHIN EMERGED FROM THE MIST X CAN YOU SEE ANYTHING?

THE WAY THE TRANSCENDENTAL CIPHER WORKS
There is a 2-layer encryption scheme, including an expanded keyword matching.
The plaintext is first prepared by Alice by application of my Transcendental Algorithm, which produces a somewhat verbose cipher, which, taken by itself, is pretty safe already. Let's call this Layer 1 cipher.

Alice then chooses a keyword of any length desired (not numerical, though)

That keyword is then expanded to match the Layer1 cipher length by using a variant related to the Transcendental Algorithm used in step 2.

The Layer 1 cipher letters are then matched to the expanded keyword letters on a 1:1 relationship, thus effectively producing a VERNAM cipher. Let's call that Layer 2 cipher.

Layer 2 cipher is then transmitted safely over public networks to Bob, the recipient.

The keyword can now be discarded. It does NOT need to be transmitted with the Layer 2 ciphertext. Bob doesn't need to know the keyword.​

KEY FEATURES OF THE TRANSCENDENTAL CIPHER
The cipher is text-based. Numbers need to be converted to letters. Therefore, the cipher is best suited for textual encryption, but basicall

Longevity

Audioactive DNA stimulation helps scientific research

Bringen Sie Ihr Unternehmen mit Technologie auf die nächste Stufe

Cloud Computing

Migrieren Sie in die Cloud für erhöhte Flexibilität, Sicherheit und Kosteneinsparungen.

Cybersicherheit

Schützen Sie Ihr Unternehmen mit proaktiven Sicherheitslösungen.

Netzwerkinfrastruktur

Wir bauen und verwalten robuste Netzwerke, die eine nahtlose Konnektivität gewährleisten.