Unsurpassed Cryptographic Protection™ Secure By Design Cryptography™

Future Proof Cryptography™

ShapeShift^{®} Ciphers is a uniquely novel data encryption technology based on Deterministic Chaos foundations.

In contrast, today's Public Key Encryption methods have “mathematical foundations” vulnerable to Quantum Computing Superpositioning Periodicity analysis.

Discreet Deterministic Chaos Foundation, Not Mathematics!

ShapeShift ciphers comprise a family of evolutionary, amorphous, military-grade, symmetric data encryption procedures that utilize customizable ensembles of obfuscation techniques. Through Quantum Superpositioning emulation and well-known standard principles, instantiations provide unsurpassed data encryption strength and unsurpassed performance.

Unlike traditional and newly emerging Post Quantum Cryptography methods that rely on complex, esoteric mathematical foundations, ShapeShift ciphers has a simple, discreet Deterministic Chaos foundation that avoids mathematical complexity. This allows ShapeShift ciphers to produce mathematically barren plateau ciphertexts that naturally neutralize unauthorized Quantum and classical computer decryption attempts on first principles. Specifically, while mathematical foundations enable cryptographers to construct difficult-to-solve challenges, Deterministic Chaos foundations enable cryptographers to construct unsolvable challenges that have no patternicity or solution.

Extremely simple, atomic, bijective, invertible operations provide unsurpassed encryption and decryption performance under the direction of a dynamically constructed, discreet Deterministic Chaos Entropy Source. A complete encryption process typically involves three processes, collectively referred to as ShapeShift Triplex™ Entropy Infusion. Each process references the Deterministic Chaos Entropy Source to affect different purposes. (Read more...)

ShapeShift implementations can be high-performance, software-only versions. They can also benefit from simple hardware acceleration well-suited to chiplet SoC designs. Because Pseudo-Random Number Generator (PRNG) output directs all ShapeShift operations, ShapeShift does not need but can use decryption keys. Each encryption constructs a unique PRNG, allowing ShapeShift to produce substantially different ciphertext output from two plaintext input files containing identical data.

Encryption

ShapeShift encryption creates a multi-level plaintext hierarchy. It then independently encrypts the fragments (lowest level elements) using high-performance encryption operations that ensure plaintext bit values can change bit-positions and reverse values multiple times. Significant, unpredictable plaintext byte-fractionation and relocation occur during fragment encryption. Processor-agnostic (X86, ARM, RISC-V, et al.), ShapeShift operations support multi-core parallelism and GPU acceleration and other hardware acceleration options.

Reassembly

ShapeShift reassembles encrypted fragments out-of-order (scrambles) to create associated encrypted elements at the next higher level. Those elements are similarly reassembled out of order, et cetera. Out-of-order reassembly alone adds significant ciphertext complexity. Small, 125 Mbyte files easily result in the number of “(Atoms in the observable universe^{2648})” different reassembly combinations. Decryption operations simply reverse encryption and scrambling operations.

Wicked fragment encryption significantly increases ciphertext encryption strength and can trade off encryption strength for computational performance, enabling scalability from the Edge to the Cloud.