Triple S tra nge Loop
Double Cros s S ys te m
         Informa tion S e curity ba s e d on de ce ption
               S pe...
S ingle S tra nge Loop
•   s e nd lo ts o f data


    m o s t is fals e


•   s o m e is true


    o nly Valid Partic ip...
P roble m : ine fficie nt
•   m o s t data is no is e and a w as te

    o f bandw idth


•   hig h no is e /s ig nal rati...
fals e


    Triple2 p re lay m e sLoop te rs
     us e p S tra nge h c lus          to

     s e nd data


•    Multipo i...
•   P rinciple s ofe Ope ra, tion yo u
     Yo u c an inte rc pt data but

    do n ’t kno w w ho it ’s inte nde d fo r


...
•


    inte g e r as bas e phi po s itio nal

    Algorithm te m
    num e ral s ys


    Re duc tio n to m inim al

    ...
•   By unique tw o pro pe rtie s o f bas e

    phi re pre s e ntatio n and re duc tio n
    S e curity is P rove -a ble
 ...
•


    auto no m o us s ys te m s and s o m e

    Explam variable la s t bit
    rando na tion of


    c an be m ade at...
do e s no t re quire hum an

    inte rve ntio n

    The Be a uty of It
    Inte rc e ptio n and de c ryptio n do e s


•...
•   Conclusbe ing
    Witho ut ion          c e rtain o f all

    thre e do uble c ro s s lo o ps are

    ac tually true...
Upcoming SlideShare
Loading in …5
×

triple strange loop double cross information security based on deception

372 views
333 views

Published on

Based on Alan Turing, a high level information security design based on disinformation and deception

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
372
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

triple strange loop double cross information security based on deception

  1. 1. Triple S tra nge Loop Double Cros s S ys te m Informa tion S e curity ba s e d on de ce ption S pe cia l Tha nks to A. Turing Micha e l Ca lvin Le e Tue s da y J uly 21 2009 Filing US P TO pa te nt a pplica tion a nd a pplying for DARP A S BIR re s e a rch funding = forma l s ta te me nt of inte nt.
  2. 2. S ingle S tra nge Loop • s e nd lo ts o f data m o s t is fals e • s o m e is true o nly Valid Partic ipants kno w the diffe re nc e
  3. 3. P roble m : ine fficie nt • m o s t data is no is e and a w as te o f bandw idth • hig h no is e /s ig nal ratio to be s e c ure 3
  4. 4. fals e Triple2 p re lay m e sLoop te rs us e p S tra nge h c lus to s e nd data • Multipo int to Multipo int e ffic ie nc y • The valid re c ipie nt is o nly kno w n 4 to partic ipants
  5. 5. • P rinciple s ofe Ope ra, tion yo u Yo u c an inte rc pt data but do n ’t kno w w ho it ’s inte nde d fo r Eve n if yo u de te rm ine that , yo u do n ’t kno w the c o nte xt • If yo u g e t bo th o f tho s e , the re is 5 a que s tio n o f is it true o r no t .
  6. 6. • inte g e r as bas e phi po s itio nal Algorithm te m num e ral s ys Re duc tio n to m inim al re pre s e ntatio n in bas e phi • Mathe m atic ally o ffe rs tw o unique pro pe rtie s fo r data s e c urity 6
  7. 7. • By unique tw o pro pe rtie s o f bas e phi re pre s e ntatio n and re duc tio n S e curity is P rove -a ble to m inim alis t re pre s e ntatio n Truth is that the unique pro pe rtie s ho ld afte r the rando m m o difie r is applie d • The no de s do n ’t e ve n kno w until 7
  8. 8. • auto no m o us s ys te m s and s o m e Explam variable la s t bit rando na tion of c an be m ade at any tim e and c hang e s all thre e s trang e lo o ps • o nly afte r m e s s ag e blo c k is re c e ive d by all do e s ‘w hat to do 8
  9. 9. do e s no t re quire hum an inte rve ntio n The Be a uty of It Inte rc e ptio n and de c ryptio n do e s • kno w le dg e o f bas e phi num e rals , private ke y o f all pe e rs , and auto no m o us s ys te m s to be c e rtain anything is true 9
  10. 10. • Conclusbe ing Witho ut ion c e rtain o f all thre e do uble c ro s s lo o ps are ac tually true ... w hat us e is the data ? • nag g ing do ubts is an inte ntio nal de s ig n as pe c t ...

×