Date post: | 26-May-2015 |
Category: |
Documents |
Upload: | cawidgetwerx |
View: | 284 times |
Download: | 3 times |
Triple Strange Loop Double Cross
System
Triple Strange Loop Double Cross
SystemInformation Security based on deception
Special Thanks to A. Turing
Michael Calvin LeeTuesday July 21 2009
Filing USPTO patent application and applying for DARPA SBIR research funding = formal statement of
intent.
Information Security based on deceptionSpecial Thanks to A. Turing
Michael Calvin LeeTuesday July 21 2009
Filing USPTO patent application and applying for DARPA SBIR research funding = formal statement of
intent.
Single Strange Loop
send lots of data
most is false
some is true
only Valid Participants know the difference
Problem: inefficient
most data is noise and a waste of bandwidth
high noise/signal ratio to be secure
3
Triple Strange LoopMost Data is true, a tiny bit is false
use p2p relay mesh clusters to send data
Multipoint to Multipoint efficiency
The valid recipient is only known to participants
The context of data only known to recipient.
4
Principles of Operation
You can intercept data, but you don’t know who it’s intended for
Even if you determine that, you don’t know the context
If you get both of those, there is a question of is it true or not.
5
Algorithm
Representation of base 10 integer as base phi positional numeral system
Reduction to minimal representation in base phi
Mathematically offers two unique properties for data security
third loop is based on a quormum/consensus prototcol to clarify truth 6
Security is Prove-ableBy unique two properties of base phi representation and reduction to minimalist representation
Truth is that the unique properties hold after the random modifier is applied
The nodes don’t even know until a message block decode is agreed by consensus
7
Explanation of last bitThe call to clarify is based on autonomous systems and some random variable
can be made at any time and changes all three strange loops
only after message block is received by all does ‘what to do with data’ step used
8
The Beauty of ItTransmission is automated and does not require human intervention
Interception and decryption does
knowledge of base phi numerals, private key of all peers, and autonomous systems to be certain anything is true
should drive most people nuts9
Conclusion
Without being certain of all three double cross loops are actually true...
what use is the data?
nagging doubts is an intentional design aspect...