Quote:Hit and run? Coward.
Well... if you guys want me to stay... I wanted to get back to work on another problem. I got this idea about how to make unbreakable encryption. Now this one is easier to understand. If you are a programmer or you work in computers you will quickly get this:
UNBREAKABLE ENCRYPTION
Algorithm Features:
A. dynamic - most algorithms (AES, SHA...) currently employed in the industry are static (i.e. input of the same string data results in the same output string data; regardless of the number and type of operations (i.e. permutations, combinations...) applied against the result); my algorithm has a dynamic result, for the same input data the end result is different each time it is applied
B. differential equations system - most algorithms are using various operations like permutations, combinations applied one after the other, and so on so forth; in my case I am using a fairly large system of differential equations
C. partially output-relevant - most algorithms have the output data relevant to input data; in my case the output is partially relevant to the input, with some of the data having no value whatsoever to the input
D. keyless - most algorithms use public or private keys; I am not using any keys
E. one-way function - very hard to invert
F. unique for each client - most algorithms have the same internal structure (i.e. permutations, combinations...) and all users share it; the system of differential equations can be customized for each user
Disadvantages:
A. more data would be generated as a result of applying the algorithm: for 100 bytes of encrypted data the output data size would be in the range of 100 KBytes or more
B. slower than standard industrial algorithms
The neural code supports self-reference. The information encoded in a part of the brain can be transferred to other parts of the brain and executed without the need to be decrypted.
If (A)lice will send a message to (B)ob from her machine to his, containing neural code in textual format, and ©harlie is eavesdropping and intercepting the message, if Charlie doesn't understand the neural code Charlie can not decode the message. Charlie would have the encrypted information but he would need the neural code theory.
Also if either (A)lice or (B)ob machines would be compromised, that would be useless as well because self-reference insures protection as well.