# AiS Challenge Team Interim

Team Number: 010

Area of Science: Cryptography

Project Title: Encryption through three-dimensional separation and recombination of data

Project Definition:
The goal of this project is to encrypt any digital form of data into a form that will prevent decryption by normal methods implemented even on a supercomputer. To do this, we are trying to use a format for encryption that vastly differs from what has been previously attempted. We hope to develop a format that will have an encrypted form that is impossibly to conceivably restructure without the algorithm and that would require at least a year to decrypt on a supercomputer with the algorithm. We also with to create a method that is compatible with an online data transfer of the code; one similar to current methods that allow the code to be passed along with the encrypted data but that prevents third parties from understanding the code.

Problem Solution:
To do this we are using a three dimensional form of encryption that has a visual compliment. We are inputting a data stream that represents the data into a three dimensional array or object that represents a box (using pointers instead of a previously defined data type) and then shuffling the individual members of the object, like a rubix cube. We then are restructuring them and outputting the resulting data to another stream that is nearly a random encryption. We are then performing character substitutions on this stream of characters according to a Vignere encryption method coupled with an enigma-style process. The process to encrypt will be reversible and dependent on a numerical code; this decryption code will be a number determined by both parties receiving and transmitting the encrypted data preventing a third party from understanding the encrypted data.

Progress to Date:
So far we have created a simple program that encrypts using user entered numbers. It encrypts data using a relatively small 64 character set. We are currently researching the mathematical methods to have two parties determine a single encryption code, as well as forming the final data into a pixel map that will further disguise the encryption. We will continue to work on our program to improve it.

Expected Results:
Our final program should require an exponential amount of computing power to decrypt our data to the extent that a transmitted set of data will be essentially impossible to decrypt without the code and the method of encryption/decryption. We should have a program that allows two parties to pass data over a non-protected connection and still be able to keep their code secret. Also, we hope to develop a form that will encrypt and decrypt with the code in a time period small enough (<10seconds) to make it feasible to use for even relatively unimportant data.

Team Members

Team Mail