Transcendental Cipher

In general, a transcendental cipher (TC) is a cryptographic method that utilizes the digits of transcendental numbers such as pi or e to generate pseudo-random keystreams for encrypting data. These methods leverage the non-repeating, random-like expansion of said transcendental numbers to create high-security, low-cost encryption techniques with strong resistance to brute-force attacks. In the present and future technological environment, where pre-encryption site scanning (especially on smartphones) will almost universally become feasible for the global tech players - and according to Murphy's law, if something can go a certain way it eventually will - new forms of pre-screening encipherment are necessary.

However, our approach to transcendental encipherment does not rest on the above-mentioned expansion of known transcendental numbers, but on a transcendental expansion of the plaintext and keyword itself. Here, transcendental does not just mean the stochastic key expansion, but the blending of letters and numbers between plaintext, ciper layers and keywords themselves. How does the cipher look like? - Have a look at the example below:

CIPHERTEXT
HBCUNZCSYBKLJLSBRCARDICUJJHOVICUAJGJOTPEZPKZHIMSFUDYAVIGHEYBKRKOCVYSDCFCARCNKSHPDEYOBJDIGBATBRDCNWCRPLSBYBZLARPBATBRAJOUMTZPPIHPHIESVJNTKRAJYWCSDCFUBRPEZPMCBZ

YIQPJMOYYSDFWSZEZSODGCFSRRGBATBRGIGLALLRPJGEAOARATUJDIJWGRRJXXUJDIGBATCNYWCXAMOZBZASYSDCDEYCVTASOYYJGIALBJGEYIPFVYXSDEAJYSDCDEZCUJDIDCBRUJDIDVOSWSMBCSRRGBATBR

JLBSFTGBPEIHMSMICSEEGBSFDFLWGBZSDCDEYOMWHJYWCSDCDFXSVMWSHEAJYBGOMWCUAJGJOWLVGBYTYVIHZSNSZYME HPCAJGJRJGI?

PLAINTEXT
SLOWLY DESPARATLY SLOWLY THE REMAINS OF PASSAGE DEBRIS THAT ENCUMBERED THE LOWER PART OF THE DOORWAY WAS REMOVED WITH TREMBLING HANDS I MADE A TINY BREACH IN THE UPPER LEFT HAND CORNER AND THEN WIDENING THE HOLE A LITTLE I INSERTED THE CANDLE AND PEERED IN THE HOT AIR ESCAPING FROM THE CHAMBER CAUSED THE FLAME TO FLICKER BUT PRESENTLY DETAILS OF THE
ROOM WITHIN EMERGED FROM THE MIST X CAN YOU SEE ANYTHING?

TC PROTOCOL

There is at least a 2-layer encryption scheme, which can be scaled and varied without the need for much computing power or data storage.

Let this be the scenario: Alice wants to send Bob the above solution to the Kryptos 3 cipher:

STEP 1: Alice feeds the plaintext (PT) into the yet to be developed Transcendential Cipher Pad (TCP), a stand-alone small handheld device. As an alternative, Alice could also send the PT through a secure channel she trusts in to us, where the encryption will take place.

STEP 2: As an option, Alice can choose a key (K), or she can let her TCP or our server do this internally, in which case Alice will not know K, which makes it all the way safer for her, as nobody could force her to give up K.

STEP 3: PT is encrypted using our TC, or a variant of it, resulting in ciphertext layer 1 (=Ct1)

STEP 4: K is encrypted using our TC or a variant of it (=Kc)

STEP 5: Kc is applied to Ct1 (=Ct1(Kc))

STEP 6: Ct1(Kc) undergoes a second transformation using our TC or a variant of it, resulting in ciphertext layer 2 (Ct2)


STEP 7: Ct2 is then sent over the public network to Bob,
or - in the case Alice had the encryption done on our side - she sends Bob a link for him to copy/download Ct2.

STEP 8: Bob enters Ct2 into his own TCP, and the decryption takes place locally. Bob does not know the keyword.

KEY FEATURES OF THE TRANSCENDENTAL CIPHER

High Security: Safe from brute force attacks, as the cipher can be easily enhanced by multiple application of our TC algorithm or a derivative thereof.

Key Security: The enciphered key (Kc) is deeply embedded in Ct2 and does not need to be transmitted separately. Neither Alice nor Bob need to know the keyword, but they can if they wish so.


Key Efficiency: The key length can easiliy be varied and expanded to similar in length as the PT, thus creating an almost unbreakable one-time-pad (Vernam) type of cipher.

Cost Efficiency: Little computing resources and data storage is required. The yet to be developed TCP device for local encryption and decryption would be very affordable.

Recoverability: In case of loss of, or damage to the TCP, power outages as well as lack of access to a computer, the PT can theoretically be recovered using paper and pencil - albeit in the case when the PT is long and multiple cipher layers are at play this could be tedious.

If you are interested in investing or sponsoring the development oft the TCP device, please contact us. We are actively looking for financing and venture/seed capital.