Team Number: 010
School Name: Albuquerque Academy
Area of Science: Cryptography
Project Title: Encryption through three-dimensional separation and recombination of data
The goal of this project is to encrypt any digital form of data into a form that will prevent decryption by normal methods implemented even on a supercomputer. To do this, we are trying to use a format for encryption that vastly differs from what has been previously attempted. We hope to develop a format that will have an encrypted form that is impossibly to conceivably restructure without the algorithm and that would require at least a year to decrypt on a supercomputer with the algorithm. We also with to create a method that is compatible with an online data transfer of the code; one similar to current methods that allow the code to be passed along with the encrypted data but that prevents third parties from understanding the code.
To do this we are using a three dimensional form of encryption that has a visual compliment. We are inputting a data stream that represents the data into a three dimensional array or object that represents a box (using pointers instead of a previously defined data type) and then shuffling the individual members of the object, like a rubix cube. We then are restructuring them and outputting the resulting data to another stream that is nearly a random encryption. We are then performing character substitutions on this stream of characters according to a Vignere encryption method coupled with an enigma-style process. The process to encrypt will be reversible and dependent on a numerical code; this decryption code will be a number determined by both parties receiving and transmitting the encrypted data preventing a third party from understanding the encrypted data.
Progress to Date:
So far we have created a simple program that encrypts using user entered numbers. It encrypts data using a relatively small 64 character set. We are currently researching the mathematical methods to have two parties determine a single encryption code, as well as forming the final data into a pixel map that will further disguise the encryption. We will continue to work on our program to improve it.
Our final program should require an exponential amount of computing power to decrypt our data to the extent that a transmitted set of data will be essentially impossible to decrypt without the code and the method of encryption/decryption. We should have a program that allows two parties to pass data over a non-protected connection and still be able to keep their code secret. Also, we hope to develop a form that will encrypt and decrypt with the code in a time period small enough (<10seconds) to make it feasible to use for even relatively unimportant data.