+ All Categories
Home > Documents > triple strange loop double cross information security based on deception

triple strange loop double cross information security based on deception

Date post: 26-May-2015
Category:
Upload: cawidgetwerx
View: 284 times
Download: 3 times
Share this document with a friend
Description:
Based on Alan Turing, a high level information security design based on disinformation and deception
Popular Tags:
10
Triple Strange Loop Double Cross System Information Security based on deception Special Thanks to A. Turing Michael Calvin Lee Tuesday July 21 2009 Filing USPTO patent application and applying for DARPA SBIR research funding = formal statement of intent.
Transcript
Page 1: triple strange loop double cross information security based on deception

Triple Strange Loop Double Cross

System

Triple Strange Loop Double Cross

SystemInformation Security based on deception

Special Thanks to A. Turing

Michael Calvin LeeTuesday July 21 2009

Filing USPTO patent application and applying for DARPA SBIR research funding = formal statement of

intent.

Information Security based on deceptionSpecial Thanks to A. Turing

Michael Calvin LeeTuesday July 21 2009

Filing USPTO patent application and applying for DARPA SBIR research funding = formal statement of

intent.

Page 2: triple strange loop double cross information security based on deception

Single Strange Loop

send lots of data

most is false

some is true

only Valid Participants know the difference

Page 3: triple strange loop double cross information security based on deception

Problem: inefficient

most data is noise and a waste of bandwidth

high noise/signal ratio to be secure

3

Page 4: triple strange loop double cross information security based on deception

Triple Strange LoopMost Data is true, a tiny bit is false

use p2p relay mesh clusters to send data

Multipoint to Multipoint efficiency

The valid recipient is only known to participants

The context of data only known to recipient.

4

Page 5: triple strange loop double cross information security based on deception

Principles of Operation

You can intercept data, but you don’t know who it’s intended for

Even if you determine that, you don’t know the context

If you get both of those, there is a question of is it true or not.

5

Page 6: triple strange loop double cross information security based on deception

Algorithm

Representation of base 10 integer as base phi positional numeral system

Reduction to minimal representation in base phi

Mathematically offers two unique properties for data security

third loop is based on a quormum/consensus prototcol to clarify truth 6

Page 7: triple strange loop double cross information security based on deception

Security is Prove-ableBy unique two properties of base phi representation and reduction to minimalist representation

Truth is that the unique properties hold after the random modifier is applied

The nodes don’t even know until a message block decode is agreed by consensus

7

Page 8: triple strange loop double cross information security based on deception

Explanation of last bitThe call to clarify is based on autonomous systems and some random variable

can be made at any time and changes all three strange loops

only after message block is received by all does ‘what to do with data’ step used

8

Page 9: triple strange loop double cross information security based on deception

The Beauty of ItTransmission is automated and does not require human intervention

Interception and decryption does

knowledge of base phi numerals, private key of all peers, and autonomous systems to be certain anything is true

should drive most people nuts9

Page 10: triple strange loop double cross information security based on deception

Conclusion

Without being certain of all three double cross loops are actually true...

what use is the data?

nagging doubts is an intentional design aspect...


Recommended