Beruflich Dokumente
Kultur Dokumente
1.
INTRODUCTION
2.
METHODS
can be highly dangerous, especially in contact with the eye, mucous membranes, and any open wounds.
(1) Using a scalpel, bisect the seed disperal mechanism through
the plane perpendicular to its natural axis of rotation and of its
natural axis of rotational symmetry.
(2) Using a clamp, the pestle from a mortar and pestle, or a hand,
apply firm pressure to one of the bisected segments; collect the
resulting solution in a beaker, graduated cylinder, or glass.
(3) Repeat the second step on the other segment of the seed dispersal mechanism.
(4) Remove any solids greater in size than 1.00 cubic decimeters,
including any seeds.
Chemical LJ is chemically stable in its natural form. If it is attached to a narrow pointed head and extracted slowly, it can be used
to encrypt messages as follows.
(1) Trigger movement of the narrow pointed head to write data to
the chosen medium (carbon-based media, in testing, has had
optimal results more research must be done in this field for
conclusive concluding conclusions).
(2) Allow the Chemical LJ to slowly adhere to the chosen medium.
(3) Place the written data in a safe environment and allow for the
chemical to dry.
At this point, the data has successfully been encrypted, as the
placement of Chemical LJ does not create any history; without the
proper decryption technique, no data can be read from the medium.
Since the Chemical LJ adheres to the medium, decryption must
be asymmetric it is impossible to literally reverse the encryption
process.
This asymmetry between encryption and decryption allows the
encryption technique to be as strong as the highest bank security encryption protocols, such as RSA (Ridiculously Secure Algorithm).
Decryption is in the form of a thermosensitive key. By applying the proper amount of thermal energy, the intended recipient of
the data can reveal distinctions between the Chemical LJ and the
medium itself, from which the data can be read through sophisticated modern edge detection algorithms or retinal ganglion cells
(via the human eye).
3.
CONCLUSION
K. Hu
APPENDIX
A.
ADDITIONAL INFORMATION
Journal Of Kryptographic Exploration, Vol. 42, No. 3, Article 1, Publication date: April 2016.