> "wizzofozz" wrote in message news:msrng5$pj7$1...@dont-email.me...
> > On 10-9-2015 2:15, Chris M. Thomasson wrote:
[...]
> Why not first finish the paper, then? (I personally have no problems
> with the many posts, btw).
Okay.
> Maybe here's another idea [...]
I was thinking about something similar. Thank you. I need to run some
errands,
but I will get back to typing!
:^)
BTW, Here is some more information I just sketched out that should allow a
programmer to create
encryption up to the point of using orbit traps:
-----------------------------------------------------------------
________________________________
[0] = (0, 0) = (-0.5,0.5)
[1] = (1, 0) = (0,0.5)
[2] = (2, 0) = (0.5,0.5)
[3] = (0, 1) = (-0.5,0)
[4] = (1, 1) = (0,0)
[5] = (2, 1) = (0.5,0)
[6] = (0, 2) = (-0.5,-0.5)
[7] = (1, 2) = (0,-0.5)
[8] = (2, 2) = (0.5,-0.5)
________________________________
Now, we have some actual numbers in the realm of (CP) to go ahead and
work with. So, let us iterate each of the points using the fractal (F)
(Z^2+(-0.75;0.1)) with the iteration count (IC) of 150. Here is the
output I am getting:
__________________________________________________________
[0] = (0, 0) = (-0.5,0.5) = (1.06181,-2.33484) = 6
[1] = (1, 0) = (0,0.5) = (-0.836704,2.59763) = 67
[2] = (2, 0) = (0.5,0.5) = (-0.513945,-2.02816) = 4
[3] = (0, 1) = (-0.5,0) = (-0.599895,0.135125) = 150
[4] = (1, 1) = (0,0) = (-0.747115,2.5992) = 33
[5] = (2, 1) = (0.5,0) = (-0.599895,0.135125) = 150
[6] = (0, 2) = (-0.5,-0.5) = (-0.513945,-2.02816) = 4
[7] = (1, 2) = (0,-0.5) = (-0.836704,2.59763) = 67
[8] = (2, 2) = (0.5,-0.5) = (1.06181,-2.33484) = 6
__________________________________________________________
This information can be used for encryption. The resulting ciphertext
with regard to all bytes being equal in (P) is very nice simply because
it reveals the underlying nature of the cipher itself. I can see an
obvious pattern here. This is due to the fact that (CP) is dead center
on the plane. Most escape time fractals have symmetry in the center.
The pattern above mimics this symmetry where the center of (CP) is at
byte/char [4] in the plaintext (P) at point (0,0) in (CP) with an (ET)
of 33.
Let us take a simple one-to-one mapping of escape times (ET) to bytes
in a plaintext using simple modular arithmetic to create a cipher. Also,
assume (AN) is the total number values a byte can hold. This would be
equal to (UCHAR_MAX + 1) in the realm of C/C++. Encryption on the bytes
in (P) would be:
__________________________________________________________
[0] = ((PB + ET) % AN) = ((65 + 6) % 256) = 71
[1] = ((PB + ET) % AN) = ((65 + 67) % 256) = 132
[2] = ((PB + ET) % AN) = ((65 + 4) % 256) = 69
[3] = ((PB + ET) % AN) = ((65 + 150) % 256) = 215
[4] = ((PB + ET) % AN) = ((65 + 33) % 256) = 98
[5] = ((PB + ET) % AN) = ((65 + 150) % 256) = 215
[6] = ((PB + ET) % AN) = ((65 + 4) % 256) = 69
[7] = ((PB + ET) % AN) = ((65 + 67) % 256) = 132
[8] = ((PB + ET) % AN) = ((65 + 6) % 256) = 71
__________________________________________________________
Okay, lets get rid of that nasty pattern by changing (CP) to
((-0.69,-0.19), (-0.27,0.23)) that happens to be off center. Here is
the iteration data:
__________________________________________________________
[0] = (0, 0) = (-0.69,0.23) = (-0.641686,2.32388) = 48
[1] = (1, 0) = (-0.44,0.23) = (-1.37804,2.20152) = 132
[2] = (2, 0) = (-0.19,0.23) = (-2.28137,1.40558) = 93
[3] = (0, 1) = (-0.69,-0.02) = (1.96029,1.29762) = 138
[4] = (1, 1) = (-0.44,-0.02) = (-0.7216,0.119794) = 150
[5] = (2, 1) = (-0.19,-0.02) = (0.48347,2.04063) = 34
[6] = (0, 2) = (-0.69,-0.27) = (2.18565,1.06893) = 37
[7] = (1, 2) = (-0.44,-0.27) = (-1.33963,1.83807) = 9
[8] = (2, 2) = (-0.19,-0.27) = (1.56953,-1.64208) = 34
__________________________________________________________
Therefore, the new cipher is as follows:
__________________________________________________________
[0] = ((PB + ET) % AN) = ((65 + 48) % 256) = 113
[1] = ((PB + ET) % AN) = ((65 + 132) % 256) = 197
[2] = ((PB + ET) % AN) = ((65 + 93) % 256) = 158
[3] = ((PB + ET) % AN) = ((65 + 138) % 256) = 203
[4] = ((PB + ET) % AN) = ((65 + 150) % 256) = 215
[5] = ((PB + ET) % AN) = ((65 + 34) % 256) = 99
[6] = ((PB + ET) % AN) = ((65 + 37) % 256) = 102
[7] = ((PB + ET) % AN) = ((65 + 9) % 256) = 74
[8] = ((PB + ET) % AN) = ((65 + 34) % 256) = 99
__________________________________________________________
Okay, the obvious pattern has vanished to my eyes. However, can we do
better than using escape times alone? Yes we can. For instance, let us
take a simple orbit trap into account:
https://en.wikipedia.org/wiki/Orbit_trap
[to be continued...]
-----------------------------------------------------------------
Can you still follow any of this?
Thanks again.