Sie sind auf Seite 1von 2

Biochemical Encryption Methods with a Thermosensitive

Asymmetric Private Key


KEVIN HU
National University of Bonnie Brae
We introduce a novel encryption technique without reliance on the infeasibility of prime factorization. As such, this encryption technique will be no
more vulnerable to attack when the P = N P problem is inevitably solved
in the affirmative in the very near future. The encryption technique masks
communications and messages between sender and any listener through manipulation of the chemical medium upon which it is based; the intended
listener, with the proper thermal key, can decode the message with virtually no loss. With an improper thermal key, the message will either remain
hidden, or given several successive failed attempts of decryption, the message will automatically be destroyed for the sake of safety and security. Due
to the potential and potent destruction of data, this encryption algorithm is
well-suited toward highly sensitive, top-secret information.
Categories and Subject Descriptors: I.D.K. [Computer Security]: EncryptionRSA; I.D.C [Biochemistry]: Synthetic MaterialsMagic

1.

INTRODUCTION

Recently, the Federal Bureau of Investigation within the United


States was able to successfully bypass security protocols set in
place by the small, little-known computer hardware company, Apple Inc. Apples flagship product, the iPhone, has a powerful security feature in which a user must input numerous (four) characters
(digits) into a console before data is accessible. This is important
due to the nature of the data available on the phone, such as credit
card information, information about extramarital affairs, and tasteless nude photography that would potentially go unlicensed and
unattributed if released publicly.
Although this feat was mostly unnoticed in the news, the cryptography community was mildly unsettled. The breach of Apples
ingenious security technique suggested a need for rapid innovation
in encrypting data.
One area of cryptography that has not been considered in recent
literature is biochemical encryption, in which chemicals are synthesized for their obscuring properties.

2.

METHODS

Through our experiments, we have synthesized a chemical which


can be used to encrypt messages, with reliable decryption by an
intended key.
The chemical synthesis depends on a species of plant in the
Sapindales order and Rutaceae family that can be found deep in the
exotic wildernesses of Assam (northeast India), northern Burma,
and San Diego. From this plant, we can synthesize Chemical LJ,
named after U.S. President Lyndon Johnson for his contributions
to national security policy.
The synthesis instructions are rather technical in nature, but are
included below for sake of completeness (patent pending). Specialized lab safety equipment is critically important, as Chemical LJ

can be highly dangerous, especially in contact with the eye, mucous membranes, and any open wounds.
(1) Using a scalpel, bisect the seed disperal mechanism through
the plane perpendicular to its natural axis of rotation and of its
natural axis of rotational symmetry.
(2) Using a clamp, the pestle from a mortar and pestle, or a hand,
apply firm pressure to one of the bisected segments; collect the
resulting solution in a beaker, graduated cylinder, or glass.
(3) Repeat the second step on the other segment of the seed dispersal mechanism.
(4) Remove any solids greater in size than 1.00 cubic decimeters,
including any seeds.
Chemical LJ is chemically stable in its natural form. If it is attached to a narrow pointed head and extracted slowly, it can be used
to encrypt messages as follows.
(1) Trigger movement of the narrow pointed head to write data to
the chosen medium (carbon-based media, in testing, has had
optimal results more research must be done in this field for
conclusive concluding conclusions).
(2) Allow the Chemical LJ to slowly adhere to the chosen medium.
(3) Place the written data in a safe environment and allow for the
chemical to dry.
At this point, the data has successfully been encrypted, as the
placement of Chemical LJ does not create any history; without the
proper decryption technique, no data can be read from the medium.
Since the Chemical LJ adheres to the medium, decryption must
be asymmetric it is impossible to literally reverse the encryption
process.
This asymmetry between encryption and decryption allows the
encryption technique to be as strong as the highest bank security encryption protocols, such as RSA (Ridiculously Secure Algorithm).
Decryption is in the form of a thermosensitive key. By applying the proper amount of thermal energy, the intended recipient of
the data can reveal distinctions between the Chemical LJ and the
medium itself, from which the data can be read through sophisticated modern edge detection algorithms or retinal ganglion cells
(via the human eye).

3.

CONCLUSION

Importantly, the thermosensitive key is specific. Insufficient energy


will not reveal the distinctions, resulting in a failure for edge detection. Interestingly, oversufficient energy, or providing incorrect
amounts of energy successively too many times, will destroy the
data through combustion of the carbon-based medium.
This provides an additional layer of security for encrypted data,
ensuring that improper attempts to read the data are either fruitless
or destructive, appropriate for use cases in which data is better destroyed than in the wrong hands. After all, there will be situations
in which data is improperly obtained, at which point the security
Journal Of Kryptographic Exploration, Vol. 42, No. 3, Article 1, Publication date: April 2016.

K. Hu

engineer must adapt when life hands a cryptography researcher


lemons, the researcher makes lemonade.
N.B. Chemical LJ also shows promise in slowing the wilting of
common leafy vegetables present in salads and other rabbit foods.

Fig. 1. Chemical LJ appears naturally in these seed dispersal mechanisms


of certain angiosperms.

APPENDIX
A.

ADDITIONAL INFORMATION

The New Zealand government has shown great interest in this


encryption technique, supporting teams of young scientists to research the technique. More information about their efforts can be
found here:
http://www.sciencekids.co.nz/experiments/invisibleink.html
ACKNOWLEDGMENTS

We are grateful to the following people for resources, discussions


and suggestions: Mom and Dad
Received April 2016; accepted April 2016

Journal Of Kryptographic Exploration, Vol. 42, No. 3, Article 1, Publication date: April 2016.

Das könnte Ihnen auch gefallen