The paper on second link was accessible. Something about the SSL cert on
the first site was making my browser refuse to proceed.
I also cannot see how knowing the primes would recover the private
numbers. At first glance instinct says you are on to something here.
Have you tried mapping sequential and random inputs to orthogonal
squares or matrices with filters? That would be a good way to test for
low-entropy patterns. It would also be a good attack to render results
in your final paper.
I also see ways to possibly gussy it up.
If you combine modular exponentiation into it, and/or fraction the prime
banach space multiplications, it will likely be a formidable trap door.
Each of those additional operations increases a combinatorial search space.
For instance with x as a secret number:
if 2*3*5*7 is converted to (x/2)*(x/3)*(x/5)*(x/7) we have fractional
banach space. We can also have {x(1)...x(n)} with coded ordering to each
slot in the series for even more combinatorial complexity for the
attacker. Coded ordering of the fraction values would be a bit more
tricky in software implementations but certainly worth the resistance to
attack.
With exponentiation:
(2^x mod n)*(3^x mod n)*(5^x mod n)*(7^x mod n) we mix in the DLP
problem, which gets hidden by the banach space and the modular addition
of your initial scheme.
or exponentiation + banach factoring x/(2^y mod n)*x/(3^y mod n)*x/(5^y
mod n)*x/(7^y mod n)
Even with all that it should still be faster than asymmetric elliptic
curves, and manageable key size will have very high bit security. What
you have is worth exploring further.
I am off on a journey and when I get back I will take a crack at it and
let you know if I discover anything. I hope you keep cracking.